You are on page 1of 27

What is cloud computing????

Cloud computing is Internetbased computing, whereby shared resources, software, and information are provided to computers and other devices on demand

The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams.

WHY USE cloud computing

For understanding cloud computing very deeply Let's assume you're an executive at a large corporation.. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for everyone isn't enough -- you also have to purchase software or software licenses to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It's so stressful that you find it difficult to go to sleep on your huge pile of money every night.

Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It's called cloud computing,.. and it could change the entire computer industry

Real life example is:-if we go into restaurant ,,,we eat food and give money to them,,,, Here restaurant acts as cloud computing company And food acts as software of company which are we using..

These are the companies which are hardly trying to get into business of Cloud computing AMAZON is very successful among them..

Public, Private and Hybrid clouds

These are types of cloud..

IAAS Services
Supplies the whole cloud infrastructure viz. servers

etc You pay only for the resources your actually use.

PASS Service
Is a delivery of a computing platform over the web.
Provides all the facilities required to support the

complete life cycle of building Developers to focus only on innovation

SAAS Service
The vendor supplies the hardware infrastructure
The software product Interacts with the user.

Cloud of computer over internet !!

major characteristics of cloud computing

On-demand self-service Ubiquitous network access

Location independent resource pooling

Rapid elasticity

Goals Behind Cloud Computing

Scalability Availability Reliability Security Flexibility Agility Serviceability Efficiency


Reduce run time and response time

Minimize infrastructure risk

Lower cost of entry

Increased pace of innovation

Security a major Concern

o Security And Responsibility
Security concerns arising because both customer

data and program are residing in Provider Premises.

Security is always a major concern in Open System

Customer Data Customer Customer Code Provider Premises

To ensure data confidentiality, integrity, and availability (CIA), the storage provider must offer capabilities that, at a minimum, include:
Scheduled data backup and safe storage of the backup media tested encryption schema Stringent access controls

What about Data Location??

When user use the cloud, user probably won't know exactly where your data is hosted, what country it will be stored in? Provider should also make a contractual commitment to obey local privacy requirements on behalf of their customers, Data should be stored and processed only in specific jurisdictions as define by user.


Backups of Data
Data store in database of provider should be redundantly store in multiple physical location. Data that is generated during running of program on instances is all customer data and therefore provider should not perform backups.

Control of Administrator on Databases.

Host Security Issues

The host running the job, the job may well be a virus or a

worm which can destroy the system

Some virus and worm create Job Starvation Issue : where one job takes up a huge amount of resource

resulting in a resource starvation for the other jobs.

A trusted set of users is defined through the distribution of digital certification, passwords, keys etc. and then access control policies are defined to allow the trusted users to access the resources of the hosts

Advanced reservations of resources and priority reduction

Information Security
Security related to the information exchanged between different hosts or between hosts and users.

This issues pertaining to secure communication, authentication, and issues concerning single sign on and delegation. Secure communication issues include those security concerns that arise during the communication between two entities.
These include confidentiality and integrity issues. Confidentiality indicates that all data sent by users should be accessible to only legitimate receivers, and integrity indicates that all data received should only be sent/modified by legitimate senders.

Public key encryption, X.509 certificates, and the Secure Sockets Layer (SSL) enables secure authentication and communication over computer networks

How secure is encryption Scheme?? Problems:

Who holds, maintains and

Problems: Is it possible for all of my data to be fully Problems: encrypted? Encryption accidents can make What algorithms are data totally unusable. used? Encryption can complicate availability To ensure Users that both Data and Code are safe

issues the keys? Investigating inappropriate or illegal activity may be difficult in cloud computing because

The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists.

Commitment to support specific forms of investigation, along with evidence that the vendor has already successfully supported such activities.

Provider should get some standard certificate from some governing or standardized institution that ensure users that provider has established adequate internal control

Conclusion and Future scope

Cloud computing is a disruptive technology with

profound implications not only for Internet services but also for the IT sector as a whole.
Promises to streamline the on-demand

provisioning of software, hardware, and data as a service.

Helps achieving economies of scale in IT

solutions deployment and operation.