SlideShare a Scribd company logo
1 of 20
GOVERNMENT POLYTECHNIC, NAGPUR
DEPARTMENT OF INFORMATION TECHNOLOGY
CLOUD COMPUTING
TOPIC:
TABLE OF CONTENTS
โ€ข WHAT IS CLOUD COMPUTING?
โ€ข HISTORY
โ€ข CHARACTERISTICS
โ€ข ARCHITECTURE
โ€ข BASIC CONCEPTS
โ€ข EDGE COMPTUING
โ€ข CLOUD SECURITY
โ€ข ADVANTAGES
โ€ข DISADVANTAGES
โ€ข WHAT IS CLOUD COMPUTING?
Cloud computing means storing and accessing the data and
programs over the internet rather than the computerโ€™s hard disk.
The data can be anything such as music, files, images,
documents, and many more.
โ€ข HISTORY
Before cloud computing emerged, there was client/server computing, centralized storage in
which all the data, software applications and all the controls reside on the server side.
The cloud symbol was used to represent networks of computing equipment in the original
ARPANET by as early as 1977and the CSNET by 1981 both predecessors to the Internet itself.
In 1999, Salesforce.com became the 1st company to enter the cloud arena, excelling the
concept of providing enterprise-level applications to end users through the Internet.
In 2002, Amazon came up with Amazon Web Services, providing services like computation,
storage, and even human intelligence.
In 2009, Google Apps and Microsoftโ€™s Windows Azurealso started to provide cloud computing
enterprise applications.
Later on many companies like HP, Oracle, Compaq, Facebook, Twitter, Instagram and many
other social media platforms started using cloud computing.
โ€ข DIFFERENCE BETWEEN CLOUD STORAGE AND LOCAL
STORAGE
Local Storage Cloud Storage
Local Storage includes physical hardware
such as external hard drives, flash drives, and
CDs.
Cloud Storage refers to any program owned
by a third party that allows you to upload
your data using the Internet.
Your data isn't accessible unless you have the
hardware with you.
Cloud storage requires an Internet connection
for access.
It is inexpensive. If you want to store a lot of information,
youโ€™ll probably have to pay for storage.
The data is under your control. Third-party storage is vulnerable to theft and
hardware failure.
Following are the characteristics of Cloud Computing:
0. Great Availability of Resources
0. On-demand Self-service
0. Easy Maintenance
0. Large Network Access
0. Availability
0. Automatic System
0. Economical
0. Security
0. Pay as you go
โ€ข CHARACTERISTICS
โ€ข ARCHITECTURE
โ€ข BASIC CONCEPTS
There are certain services and models working behind the scene
making the cloud computing feasible and accessible to end users.
Following are the working models of cloud computing:-
โ€ข DEPLOYMENT MODEL
โ€ข SERVICE MODEL
โ€ข DEPLOYMENT MODEL
Private cloud. The cloud infrastructure is provisioned for exclusive use by a
single organization comprising multiple consumers (e.g., business units). It
may be owned, managed, and operated by the organization, a third party, or
some combination of them, and it may exist on or off premises.
Community cloud. The cloud infrastructure is provisioned for exclusive use by
a specific community of consumers from organizations that have shared
concerns (e.g., mission, security requirements, policy, and compliance
considerations). It may be owned, managed, and operated by one or more of
the organizations in the community, a third party, or some combination of
them, and it may exist on or off premises.
Public cloud. The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated by a business,
academic, or government organization, or some combination of them. It exists
on the premises of the cloud provider.
Hybrid cloud. The cloud infrastructure is a composition of two or more
distinct cloud infrastructures (private, community, or public) that remain
unique entities, but are bound together by standardized or proprietary
technology that enables data and application portability (e.g., cloud bursting
for load balancing between clouds).
โ€ข SERVICE MODEL
Software as a Service (SaaS). The capability provided to the consumer is to use the
providerโ€™s applications running on a cloud infrastructure2. The applications are
accessible from various client devices through either a thin client interface, such as a
web browser (e.g., web-based email), or a program interface. The consumer does not
manage or control the underlying cloud infrastructure including network, servers,
operating systems, storage, or even individual application capabilities, with the
possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS). The capability provided to the consumer is to deploy
onto the cloud infrastructure consumer-created or acquired applications created using
programming languages, libraries, services, and tools supported by the provider.3 The
consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting
environment.
Infrastructure as a Service (IaaS). The capability provided to the consumer is to
provision processing, storage, networks, and other fundamental computing resources
where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the
underlying cloud infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select networking components
(e.g., host firewalls).
โ€ข EDGE COMPUTING
1.Edge computing enables data to be analysed, processed and transferred at the edge of
the network.
2.Edge computing is upgrade version as well as extension of cloud computing.
3. edge computing is useful for reduce lower latency.
4.The basic difference between edge and cloud computing lies in the place where the
data processing takes place.
5.Simply when the user store data in the cloud so there is some physical distance
between device and cloud which affected on accessing data.
6.so in this physical distance the edge computing takes place which already store some
important data from the cloud and useful for accessing data faster.
7.It include local processing.
8.Edge computing has privacy benefits, but they are not guaranteed.
9.Bandwith saving is also enabled by edge computing.
EXAMPLE:
a. Smart Street lights
b. Mobile device
c. Automated vehicles
โ€ข CLOUD SECURITY
1.Cloud security is known as cloud computing security, consists of a set of policies
controls, technologies that works together to protect cloud-based system.
2.Cloud security can be configured to the exact needs of the business.
3.Implementation cloud security process should be joint responsibility between the
business owner and solution provider.
4.Selecting the right cloud security solution is helpful for protected your organization
from unauthorized access, data breaches and other treats.
5.Forcepoint cloud access security broker (CASB) is a complete cloud security solution that
protect cloud app and cloud data.
6.Security treats are constantly evolving and becoming more sophisticated, for this
reason it is essential to work with cloud provider.
7.Cloud provider that offers best security that has been customised for your
infrastructure and protect more.
8.BENEFITS:
a. Centralized security
b. Reduce cost
c. Reduce administration
d. reliability
โ€ข ADVANTAGES
1. Easy implementation.
2. Accessibility.
3. No hardware required.
4. Cost per head.
5. Flexibilityfor growth.
6. Efficient recovery.
โ€ข DISADVANTAGES
1. No longer in control.
2. May not get all the features.
3. Doesnโ€™t mean you should do away with servers.
4. No Redundancy.
5. Bandwidth issues.
THANK YOU!
QUESTIONS?

More Related Content

What's hot

Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
ย 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
ย 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingGAURAV SINHA
ย 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
ย 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
ย 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
ย 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud ComputingAnshi Bhadoria
ย 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
ย 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud EncryptionRituparnaNag
ย 
Cloud security
Cloud security Cloud security
Cloud security Mohamed Shalash
ย 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
ย 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
ย 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
ย 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
ย 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Teja Babu
ย 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
ย 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
ย 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
ย 

What's hot (20)

Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
ย 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
ย 
Cloud computing
Cloud computingCloud computing
Cloud computing
ย 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
ย 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
ย 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
ย 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
ย 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
ย 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
ย 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
ย 
Cloud security
Cloud security Cloud security
Cloud security
ย 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
ย 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
ย 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
ย 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
ย 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
ย 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
ย 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ย 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
ย 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
ย 

Similar to Cloud computing

Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing pptBhuvneshYadav13
ย 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
ย 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
ย 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWJournal For Research
ย 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing Md Nazrul Islam Roxy
ย 
Cloud computing
Cloud computingCloud computing
Cloud computingUttam Kumar
ย 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptSarvesh Meena
ย 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperFaimin Khan
ย 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
ย 
Cloud computing
Cloud computing Cloud computing
Cloud computing Muhammad Yaqoob
ย 
Cloud-Computing.pptx
Cloud-Computing.pptxCloud-Computing.pptx
Cloud-Computing.pptxMayuriPatel399208
ย 
Cloud computing
Cloud computingCloud computing
Cloud computingvinitha96
ย 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
ย 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised PresentationMayank Aggarwal
ย 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
ย 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxMiltonMolla1
ย 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingSandeep Singh
ย 

Similar to Cloud computing (20)

Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
ย 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
ย 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ย 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
ย 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
ย 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
ย 
Cloud computing
Cloud computingCloud computing
Cloud computing
ย 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
ย 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
ย 
Cloud management
Cloud managementCloud management
Cloud management
ย 
Cloud computing
Cloud computing Cloud computing
Cloud computing
ย 
Cloud-Computing.pptx
Cloud-Computing.pptxCloud-Computing.pptx
Cloud-Computing.pptx
ย 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
ย 
Cloud computing
Cloud computingCloud computing
Cloud computing
ย 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
ย 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ย 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
ย 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
ย 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
ย 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
ย 

Recently uploaded

Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
ย 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Standamitlee9823
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 

Recently uploaded (20)

Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 

Cloud computing

  • 1. GOVERNMENT POLYTECHNIC, NAGPUR DEPARTMENT OF INFORMATION TECHNOLOGY
  • 3. TABLE OF CONTENTS โ€ข WHAT IS CLOUD COMPUTING? โ€ข HISTORY โ€ข CHARACTERISTICS โ€ข ARCHITECTURE โ€ข BASIC CONCEPTS โ€ข EDGE COMPTUING โ€ข CLOUD SECURITY โ€ข ADVANTAGES โ€ข DISADVANTAGES
  • 4. โ€ข WHAT IS CLOUD COMPUTING? Cloud computing means storing and accessing the data and programs over the internet rather than the computerโ€™s hard disk. The data can be anything such as music, files, images, documents, and many more.
  • 5. โ€ข HISTORY Before cloud computing emerged, there was client/server computing, centralized storage in which all the data, software applications and all the controls reside on the server side. The cloud symbol was used to represent networks of computing equipment in the original ARPANET by as early as 1977and the CSNET by 1981 both predecessors to the Internet itself. In 1999, Salesforce.com became the 1st company to enter the cloud arena, excelling the concept of providing enterprise-level applications to end users through the Internet. In 2002, Amazon came up with Amazon Web Services, providing services like computation, storage, and even human intelligence. In 2009, Google Apps and Microsoftโ€™s Windows Azurealso started to provide cloud computing enterprise applications. Later on many companies like HP, Oracle, Compaq, Facebook, Twitter, Instagram and many other social media platforms started using cloud computing.
  • 6. โ€ข DIFFERENCE BETWEEN CLOUD STORAGE AND LOCAL STORAGE Local Storage Cloud Storage Local Storage includes physical hardware such as external hard drives, flash drives, and CDs. Cloud Storage refers to any program owned by a third party that allows you to upload your data using the Internet. Your data isn't accessible unless you have the hardware with you. Cloud storage requires an Internet connection for access. It is inexpensive. If you want to store a lot of information, youโ€™ll probably have to pay for storage. The data is under your control. Third-party storage is vulnerable to theft and hardware failure.
  • 7. Following are the characteristics of Cloud Computing: 0. Great Availability of Resources 0. On-demand Self-service 0. Easy Maintenance 0. Large Network Access 0. Availability 0. Automatic System 0. Economical 0. Security 0. Pay as you go โ€ข CHARACTERISTICS
  • 9. โ€ข BASIC CONCEPTS There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models of cloud computing:- โ€ข DEPLOYMENT MODEL โ€ข SERVICE MODEL
  • 11. Private cloud. The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).
  • 13. Software as a Service (SaaS). The capability provided to the consumer is to use the providerโ€™s applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.3 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
  • 14. โ€ข EDGE COMPUTING 1.Edge computing enables data to be analysed, processed and transferred at the edge of the network. 2.Edge computing is upgrade version as well as extension of cloud computing. 3. edge computing is useful for reduce lower latency. 4.The basic difference between edge and cloud computing lies in the place where the data processing takes place. 5.Simply when the user store data in the cloud so there is some physical distance between device and cloud which affected on accessing data. 6.so in this physical distance the edge computing takes place which already store some important data from the cloud and useful for accessing data faster. 7.It include local processing. 8.Edge computing has privacy benefits, but they are not guaranteed. 9.Bandwith saving is also enabled by edge computing.
  • 15. EXAMPLE: a. Smart Street lights b. Mobile device c. Automated vehicles
  • 16. โ€ข CLOUD SECURITY 1.Cloud security is known as cloud computing security, consists of a set of policies controls, technologies that works together to protect cloud-based system. 2.Cloud security can be configured to the exact needs of the business. 3.Implementation cloud security process should be joint responsibility between the business owner and solution provider. 4.Selecting the right cloud security solution is helpful for protected your organization from unauthorized access, data breaches and other treats. 5.Forcepoint cloud access security broker (CASB) is a complete cloud security solution that protect cloud app and cloud data. 6.Security treats are constantly evolving and becoming more sophisticated, for this reason it is essential to work with cloud provider. 7.Cloud provider that offers best security that has been customised for your infrastructure and protect more.
  • 17. 8.BENEFITS: a. Centralized security b. Reduce cost c. Reduce administration d. reliability
  • 18. โ€ข ADVANTAGES 1. Easy implementation. 2. Accessibility. 3. No hardware required. 4. Cost per head. 5. Flexibilityfor growth. 6. Efficient recovery.
  • 19. โ€ข DISADVANTAGES 1. No longer in control. 2. May not get all the features. 3. Doesnโ€™t mean you should do away with servers. 4. No Redundancy. 5. Bandwidth issues.