Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Cloud Security

Similar presentations


Presentation on theme: "Introduction to Cloud Security"— Presentation transcript:

1 Introduction to Cloud Security
Peer Learning Programme By Mr. T.N.Prabhu, Assistant Professor (Sr.Gr) / IT

2 Cloud Computing Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

3 Essential Characteristics
On-demand self service Use resources as and when needed Minimal human interaction between user and CSP Ubiquitous Network Access Services accessible over Internet using Web applications Resource Pooling Large and flexible resource pooling to meet the consumers’ need Allocating resources efficiently and optimally for execution of applications

4 Contd… Location Independence Rapid Elasticity Measured Services
Resources may be located at geographically dispersed locations Rapid Elasticity Dynamic scaling up and down of resources Measured Services Customers charged based on measured usage of the cloud resources

5 Types of cloud service Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS)

6 Software-as-a-Service (SaaS)
No hardware or software to manage Service delivered through a browser Customers use the service on demand Instant Scalability Compatibility, license, security patch management, maintenance Provider’s concerns

7 SaaS Providers

8 Platform-as-a-Service (PaaS)
Platforms are built upon Infrastructure, which is expensive Platform management is not fun! Standards, application stacks, testing and validation toolkits, ready-made distribution channel for public developers Provider’s concern

9 PaaS Providers

10 Infrastructure-as-a-Service (IaaS)
Basic infrastructures (e.g. computing, networking, storage etc.) Platform virtualization environment Deploy and run arbitrary softwares (including operating systems and applications) Elasticity  A step further to Virtualization

11 IaaS Providers

12 Cloud Deployment Models

13 Cloud Security Security and privacy Identify Management
Physical and Personal Security Availability Application Security Legal Issues

14 Mapping the Cloud Model to the Security Control & Compliance

15


Download ppt "Introduction to Cloud Security"

Similar presentations


Ads by Google