1 / 15

Cloud Computing

Cloud Computing. When Outsourcing Outsmarts Purchasing!. Presented by: Rajdeep Biswas Roll No.: 0104IT071082; Branch: IT (VII Sem.) R.K.D.F. Institute of Science & Technology. Agenda. Defining Cloud C omputing Learning a bout Cloud Computing examples Studying the deployment layers

marge
Download Presentation

Cloud Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Computing When Outsourcing Outsmarts Purchasing! Presented by: Rajdeep Biswas Roll No.: 0104IT071082; Branch: IT (VII Sem.) R.K.D.F. Institute of Science & Technology

  2. Agenda • Defining Cloud Computing • Learning about Cloud Computing examples • Studying the deployment layers • Briefing the deployment models • Briefing the Cloud characteristics • Looking into the security issues • Checking out the inadequacies and advantages • Checking the future of Cloud Computing

  3. What is Cloud? “Cloud” is a metaphor for “Internet”, based on how it is depicted in computer network, diagrams, and is an abstraction for the complex infrastructure it conceals.

  4. What is Cloud Computing? Leveraging 3rd party computing capability over the network to cut costs, increase scale, improve agility, and access best practices..

  5. Cloud Examples

  6. Layers

  7. Courtesy: Wikipedia (http://en.wikipedia.org/wiki/File:Cloud_computing_types.svg) Cloud Deployment Models

  8. Essential Cloud Characteristics • On-demand self-service • Broad network access • Resource pooling - Location independence • Rapid elasticity • Measured service

  9. Security in Cloud

  10. Two Broad Categories of Cloud Security ► Security issues faced by cloud providers (organizations providing services via the cloud). → The providers must ensure the security & protection of their infrastructure and clients’ data and applications. ► Security issues faced by the cloud customers. → The customer must ensure that the provider has taken proper security measures to protect their information.

  11. Dimensions of Cloud Security Security and Privacy • Data Protection • Identity Management • Physical and Personal Security • Availability • Application Security • Privacy • Compliance • • Business Continuity and Data Recovery • • Logs and Audit Trails • • Unique Compliance Requirements Legal and Contractual Issues • Liability • Intellectual Property • End-of-Service

  12. The Inadequacies of Cloud! • SLA (Service Level Agreements) • Performance • Trust Deficit Between Customer and Provider • Security Issues • Making False Promises

  13. Still, Why Cloud Computing? • Software as a Subscription (Pay as you go) • Reduced Software Maintenance • Increased Reliability • Increased Scalability • Cost Reduction • Environmentally Friendly • Matches Current Computing Trends • Portability/ Accessibility • Efficient Use of Computer Resources • Versionless Software

  14. The Future → A solid majority of technology experts and stakeholders expect that by 2020, most users will perform most computing and communicating activities through connections to servers operated by outside firms. → This does not mean, however, that most of these experts think the desktop computer will disappear soon. The majority sees a hybrid life in the next decade, as some computing functions move towards the cloud and others remain based on personal computers. Courtesy: Janna Quitney Anderson, Elon University and Lee Rainie, Pew Internet & American Life Project (June 11, 2010)

More Related