Cloud computing and Cloud Security - Basics and Terminologies

  • Published on
    22-Jan-2018

  • View
    58

  • Download
    1

Transcript

Cloud ComputingAnd Cloud SecurityWhat is Cloud Computing? Cloud Computing is an internet basedservice that provides on demand access toshared computer resources and data. Inother words, cloud computing meansdelivery of hosted services and resourcesover the internet. These resources includestorage, server, network and applications.These resources can be quickly equippedand can be freed easily. Virtualization isthe driving force behind cloud computing.Virtualization in Cloud Computing Virtualization means the creation of virtualresources rather than actual resources likehardware, operating system, storage, networketc. These virtual resources act as a replicaof the actual resources. The common exampleof virtualization is the partition of thehard drive to create separate hard drives. Invirtualization, there are two types ofmachines host machine and the guest machine.Host machine is the real physical machine onwhich virtualization takes place while theguest machine is the virtual machine.Types of Virtualization Hardware Virtualization Operating System Virtualization Desktop Virtualization Storage Virtualization Network VirtualizationCharacteristics of Cloud Computing On-demand self-service Broad network access Resource pooling Rapid Elasticity Measured ServiceCloud Services or Cloud Service Model IaaS(Infrastructure as a Service) PaaS(Platform as a Service) SaaS(Software as a Service)Infrastructure as a Service(IaaS) Infrastructure as a Service provides virtual computing resources such as storage, server, virtual machines and network over the internet. A third party provider provides this infrastructure to the consumer.Platform as a Service(PaaS) Platform as a Service allows the consumer to deploy applications on the cloud infrastructure. A consumer is not responsible for the underlying cloud infrastructure.Software as a Service(SaaS) Software as a Service enables the user to use the deployed applications running on the cloud infrastructure. The consumer is not responsible for managing the underlying infrastructure and the applications.Cloud Deployment Model Public Cloud Private Cloud Hybrid Cloud Community Cloud Public Cloud - Public Cloud is for public use or a large organization and is owned by a third party provider selling cloud services. Private Cloud - Private Cloud is provided for a single organization with multiple consumers. It is operated by the organization itself or by a third party. It may be operated within the premises or off the premises. Hybrid Cloud - Hybrid Cloud is a combination of two or more distinct clouds that retain their unique entity. It is used for sensitive data and strategic applications. Community Cloud - It is a type of private cloud for users with specific demands. It has several stakeholders. It is managed by the organization or by a third party provider.Advantages of Cloud Computing It is cost effective It is based on pay per use method Improved security It is much more reliable and manageable It is flexible, scalable and also environment-friendly as it reduces carbon footprintDrawbacks of Cloud Computing Security and privacy issues while using services from third party providers As it is an internet based service, it faces the risk of downtime i.e. internet breakdown or connection problems It is prone to cyber attacks Vendor lock-in It is a situation when a consumer wants to switch to other vendors services but cannot easily shift without paying a considerable cost.Cloud Security Cloud Computing security refers to setof policies and measures deployed toprotect cloud infrastructure and theunderlying data and applications. It isa part of information security. CloudComputing Security is needed as thereare certain security concerns regardingsecurity and privacy of the users andtheir data.Controls in Cloud Security Deterrent Control Preventive Control Detective Control Corrective ControlTopics in Cloud Computing and Cloud Security for Research and Thesis Virtualization Denial of Service Encryption DDoS Attack Cloud Security Dimensions Identity Management Data Security Data SeparationThank You Reference: Techsparks Techsparks, 2nd floor, D-185, Phase 8B, Industrial Area, Sahibzada AjitSingh Nagar, Mohali, Punjab 160055http://www.techsparks.co.in +91-7696666022 techsparks2013@gmail.comhttp://www.techsparks.co.in/

Recommended

View more >