Cloud Computing And Security : ©Abhinav_R_Kamble Presentations

22
Presented by- Kamble Abhinav Rajendra. Department of Computer Engineering. COMPUTING RESOURCES ©Copyright Abhinav_R_Kamble Presentations

Transcript of Cloud Computing And Security : ©Abhinav_R_Kamble Presentations

Presented by-

Kamble Abhinav Rajendra.

Department of Computer Engineering.

COMPUTING

RESOURCES

©Copyright Abhinav_R_Kamble Presentations

CONTENTS

1. Introduction.

2. What is cloud computing?

3. Why cloud computing?

4. Topological view of cloud computing.

5. Types of cloud deployment models.

6. Data storage.

7. Security methods.

8. My innovation.

9. Key features.

10. Advantages.

11. Disadvantages.

12. Conclusion.

©Copyright Abhinav_R_Kamble Presentations

INTRODUCTION In the world of changing technology every one of us need a reliable methods to

established fast network.

It also increases the cost of computing resources according to the change in means

of hardware and software requirements and it is much costly and also time

consuming and less efficient.

But, to diminish this problems and in according to aim to make an internet an home

for all computing resources so that user can avail according to his needs and save

data on internet without using an hardware storage device we invented a method

called as ‘CLOUD COMPUTING’.

©Copyright Abhinav_R_Kamble Presentations

WHAT IS CLOUD COMPUTING?

“Cloud computing intends to make the Internet the ultimate home of all computing

resources- storage, applications.”

It allow end user to avail these resources in:

quantities of her choice,

location of their preferences,

for duration of their liking.

©Copyright Abhinav_R_Kamble Presentations

WHY TO USE CLOUD COMPUTING?

Easy to access data.

Upload or retrieve data from cloud.

memory storage space.

Estimates the cost required to purchase new hardware or software requirements.

©Copyright Abhinav_R_Kamble Presentations

CLOUD TOPOLOGY STRACTURE.

FIGURE SHOWING CLOUD

TOPOLOGY STRUCTURE CLIENT’S.

DATACENTER

DISTRIBUTED SERVER

INTERNET

©Copyright Abhinav_R_Kamble Presentations

ELEMENTS IN CLOUD COMPUTING STRUCTURE.

CLIENTS : these are the hardware devices which are used to communicate with

cloud data center and server.

Example:computer,laptop,mobile phones, smart phones.

Clients are categorized according to their devices used:

a) Mobile.

b) Thin.

c) Thick.

©Copyright Abhinav_R_Kamble Presentations

THREE CATOGORIES OF CLIENT a) Mobile :

Smart phones

Personal digital assistance

(PDAs) Java enabled mobile phones.

©Copyright Abhinav_R_Kamble Presentations

b) Thin: Computers with no internal hard drives but, allow server to do work.

c) Thick: personal computers or laptops that we are using to connect the cloud by

regular web browsers.

Example: Mozilla Firefox , internet explorer etc.

Thin are becoming more popular because of their effective cost and working

environment.

Computer and Laptops.

©Copyright Abhinav_R_Kamble Presentations

DISTRIBUTED SERVERS AND DATA CENTER IN

CLOUD TOPOLOGY.

Distributed servers:

These are the servers which are located at different geographical location.

But, while retrieving information from them they act as if they are working next to

each other.

Example: a Google server or Amazon server.

Datacenters:

It can be called as a cloud server which stores all computing resources.

It provides various software, Hardware and information resources for use when

needed. These datacenter servers are highly virtualized.

©Copyright Abhinav_R_Kamble Presentations

TYPES OF CLOUD DEPLOYMENT MODELS: A) Private:

works for only one organization or a private network.

highly secure.

B) Public:

own by the cloud service provider

offers the highest level of efficiency in shared resources.

C) Hybrid:

combination of private and public deployment models.

specific resources are run or used in public cloud.

other are used in a private cloud and this provides a high increased efficiency.

©Copyright Abhinav_R_Kamble Presentations

DATA STORAGE

Data is stored in multiple virtual servers.

A client sends a copies of files over the internet to the data server which records the

information.

And when the client wishes to retrieve the information he or she access the server

through the web based interface

©Copyright Abhinav_R_Kamble Presentations

BEAUTY COMPANY

CLOUD COMPUTIN

G

SITUATION WHERE CLOUD COMPUTING CAN BE USED ©Copyright Abhinav_R_Kamble Presentations

SECURITY

Security is needed to secure our data from outside access or hacker to maintain our

own privacy and our own access.

Different methods to provide security:

a)Encryption.

Example-SSL(standard security link).

b)Authentication process.

Example-provide user name and ID.

c)Authorization practices.

Example: provide authorized user.

©Copyright Abhinav_R_Kamble Presentations

MY THINKING IN CLOUD SECURITY

A cloud subscriber should follow the following steps to secure data

use a Alphanumeric and symbolic password.

Example: abhi@123.

Email notifications or SMS should be enabled for login issues.

Trusted admin should be maintained for data backup purposes.

©Copyright Abhinav_R_Kamble Presentations

KEY FEATURES

Cost.

Device and location independent.

Maintenance.

Reliability.

©Copyright Abhinav_R_Kamble Presentations

ADVANTAGES

All time access.

Pay per use.

Reduce software cost as well as hardware cost.

Speed in uploading and retrieving data.

©Copyright Abhinav_R_Kamble Presentations

DISADVANTAGES

Requires constant internet connection.

Data integrity.

Depends on third party about confidentiality.

©Copyright Abhinav_R_Kamble Presentations

CONCLUSION

Will increase profits.

Will accelerate the adaptation of innovation.

Cost will be driven down.

©Copyright Abhinav_R_Kamble Presentations

BE IN TOUCH WITH THE WORD

“THINK POSITIVE”!!

©Copyright Abhinav_R_Kamble Presentations

©Copyright Abhinav_R_Kamble Presentations

©Copyright Abhinav_R_Kamble Presentations