SlideShare a Scribd company logo
1 of 46
Download to read offline
webdev@rgu
Using cloud in an enterprise environment
Different cloud deployment models and their
characteristics
• Public Cloud
• Private Cloud
• Hybrid Cloud
The Data Protection Act and how it relates to Cloud
Computing
case study example of using a hybrid cloud model in
an enterprise environment
Today we are
covering…
Cloud
deployment
models
Public
Cloud
Private
Cloud
Public
Cloud
Private
Cloud
Hybrid
Cloud
Leadership Engineering
We want access to the
fastest and newest
cloud services straight
away
All of our data must
remain secure and we
want to remain in
control of it
National Institute of
Standards and Technology
Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared opal
of configurable computer resources that can be rapidly
provisioned and released with minimal
management effort or service provider interaction
Cloud Computing
National Institute of
Standards and Technology
The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated
by a business, academic, or government organisation, or
some combination of them. It exists on the premises of
the cloud provider.
Public Cloud
National Institute of
Standards and Technology
National Institute of
Standards and Technology
The cloud infrastructure is provisioned for exclusive use
by a single organisation comprising multiple consumers.
It may be owned, managed, and operated by the
organisation, a third parts, or some combination of them,
and it may exist on or off premises
Private Cloud
Elastic Capabilities
Opex economics (operational Expense)
Ease of operations
time to implement
data sovereignty
environmental control
cost predictability
capex economics (Capitol Expense)
Elastic Capabilities
Opex economics (operational Expense)
Ease of operations
time to implement
data sovereignty
environmental control
cost predictability
capex economics (Capitol Expense)
PrivateCloud
PublicCloud
Leadership Engineering
We want access to the
fastest and newest
cloud services straight
away
All of our data must
remain secure and we
want to remain in
control of it
National Institute of
Standards and Technology
The cloud infrastructure is a composition of two or more
distinct cloud infrastructures that remain unique
entities, but are bound together by a standardised or
proprietary technology that enables data and application
portability
Hybrid Cloud
Data
protection
act and cloud
computing
Data Protection Act 1998
http://www.legislation.gov.uk/ukpga/1998/29/contents
UK implementation of the 1995 EU
Directive on Data Protection 95/46/EC
The Data Protection Act applied to the processing of personal data. Data is
defined as information within:
• A relevant filing system (paper or electronic based)
• Any type of information held by a body subject to the freedom of
information act
• An accessible record (e.g. Health, Education, Housing)
• Equipment operating automatically in response to instructions (i.e. in a
computerised format
Data Protection Act 1998
The Data Subject The Data ProcessorThe Data Controller
An individual who is the
subject of personal data
A person or body which
decides what happens to the
personal data it processes
A person or body (other than
an employee of the data
controller) who process
personal data on behalf of the
data controller
If using a Data Processor a
written contract is needed
Data Protection Act 1998
Data must be:
1. Fairly and lawfully processed
2. Processed for limited purposes and not further purposes in a manner
which is incompatible with those purposes
3. Adequate, relevant, and not excessive
4. Accurate and up to date
5. Not kept longer than necessary
6. Processed in accordance with the individual’s rights
7. Secure
8. Not transferred to countries outside of the European Economic Area
unless adequate protection is provided
Data Controller
Responsibilities
Data Protection Act 1998
The Data Protection Act applied to the processing of personal data. Data
{can be} defined as information…in a computerised format.
Information is in the cloud…
therefore it is computerised
Data Protection Act 1998
The Data Protection Act applied to the processing of personal data. Data
{can be} defined as information…in a computerised format.
Information is in the cloud…
therefore it is computerised
Cloud information is
sometimes about living
identifiable people…so it is it
personal data
Data Protection Act 1998
The Data Protection Act applied to the processing of personal data.
Data {can be} defined as information…in a computerised format.
Information is in the cloud…
therefore it is computerised
Cloud information is
sometimes about living
identifiable people…so it is it
personal data
Something is happening to that
data…so it is being processed
Data Protection Act 1998
The Data Subject The Data ProcessorThe Data Controller
The person that you are
storing data about
A cloud service purchaser A cloud service provider
Data Protection Act 1998
The Data Subject
The Data Controller
The Data Processor
Has responsibility for
implementing 8 parts of DPA
Contracted to provide
adequate security
American Company
Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism
Act of 2001
Data Protection Act 1998
The Data Subject
The Data Controller
The Data Processor
Has responsibility for
implementing 8 parts of DPA
Contracted to provide
adequate security
Contracted to maintain data
Data Protection Act 1998
The Data Subject
The Data Controller
The Data Processor
Has responsibility for
implementing 8 parts of DPA
Contracted to provide
adequate security
Contracted to maintain data
Contracted to process in
accordance with rights
Here is a map of the world
Here is a map of the world
Here is a map of the world
that will potentially have the
same human rights law as us
in a few years time
Anyone use Google Forms?
How many of these places are you comfortable in your data being?
case study of
an enterprise
hybrid cloud
model
rgu.
My Moodle Web
Application
Server
https://github.com/moodle/moodle
Can run on an AWS
T2-Micro
1 v CPU
0.5GB Memory
Application Data User DataContent Data
Boilerplate code for
moodle. Nothing really
confidential here
Material uploaded by
staff / students
Usernames & Passwords
Grade Profiles
Student Records
Application Data
Boilerplate code for
moodle. Nothing really
confidential here
Moodle Source Code
Application Data
Moodle Database
Application Data
Material uploaded by
staff / students
Moodle Source Code
Application Data
Moodle Database
Application Data
Content Data
Uploaded Lectures
Content Data
Uploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Usernames & Passwords
Grade Profiles
Student Records
Moodle Source Code
Application Data
Moodle Database
Application Data
Uploaded Lectures
Content Data
Uploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
User Data
Usernames and
Passwords
User Data
Grade Profiles
User Data
Student Records
User Data
File Storage
Database
Storage
Code
storage
Moodle Source Code
Application Data
Moodle Database
Application Data
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Usernames and
Passwords
User Data
Grade Profiles
User Data
Student Records
User Data
File Storage
Database
Storage
Code
storage
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Usernames and
Passwords
User Data
Grade Profiles
User Data
Student Records
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
File Storage
Database
Storage
Code
storage
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
Uploaded Course
Information
Content Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
File Storage
Database
Storage
Code
storage
Uploaded Lectures
Content DataUploaded Course
Submissions
Content Data
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
File Storage
Database
Storage
Code
storage
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
AWS D3
Uploaded Lectures
Application Data
Pr. C - File Storage
Course Submissions
Application Data
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
AWS D3
Uploaded Lectures
Application Data
Pr. C - File Storage
Course Submissions
Application Data
Public Cloud Private Cloud
AWS RDS
Course Information
Application Data
Pr. C - File Storage
Student Records
User Data
Pr.C - Database
Passwords and Grade Profiles
User Data
AWS EC2
Moodle Source Code
Application Data
AWS RDS
Moodle Database
Application Data
AWS D3
Uploaded Lectures
Application Data
Pr. C - File Storage
Course Submissions
Application Data
Hybrid Cloud
Different cloud deployment models and their
characteristics
• Public Cloud
• Private Cloud
• Hybrid Cloud
The Data Protection Act and how it relates to
Cloud Computing
case study example of using a hybrid cloud model
in an enterprise environment

More Related Content

What's hot

Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
 
The rise of big data on cloud computing
The rise of big data on cloud computing The rise of big data on cloud computing
The rise of big data on cloud computing Muhammad Maaz Irfan
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in theIJNSA Journal
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Aaron Banham
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...IEEEGLOBALSOFTTECHNOLOGIES
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEDATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEijiert bestjournal
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessOmo Osagiede
 

What's hot (19)

Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
The rise of big data on cloud computing
The rise of big data on cloud computing The rise of big data on cloud computing
The rise of big data on cloud computing
 
J017547478
J017547478J017547478
J017547478
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEDATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 

Viewers also liked

Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...Xavier Amatriain
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 
Introduction to Information Architecture
Introduction to Information ArchitectureIntroduction to Information Architecture
Introduction to Information ArchitectureMike Crabb
 
11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee Recognition11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee RecognitionOfficevibe
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 
Pré teste
Pré testePré teste
Pré testeisa
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 
Memorial Day Pps
Memorial Day PpsMemorial Day Pps
Memorial Day PpsBeckys47201
 
Since...
Since...Since...
Since...Anna *
 
node-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.jsnode-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.jsMariano Iglesias
 
Turning a Thousand or so Words into a Map
Turning a Thousand or so Words into a MapTurning a Thousand or so Words into a Map
Turning a Thousand or so Words into a MapCharlie Greenbacker
 
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...Cory Scott
 
Free Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into ProjectsFree Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into ProjectsStanfordProfessionalDevelopment
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 

Viewers also liked (20)

Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
Recsys 2016 tutorial: Lessons learned from building real-life recommender sys...
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 
Introduction to Information Architecture
Introduction to Information ArchitectureIntroduction to Information Architecture
Introduction to Information Architecture
 
Enabling Autonomy
Enabling AutonomyEnabling Autonomy
Enabling Autonomy
 
11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee Recognition11 Stats You Didn’t Know About Employee Recognition
11 Stats You Didn’t Know About Employee Recognition
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
Pré teste
Pré testePré teste
Pré teste
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 
Memorial Day Pps
Memorial Day PpsMemorial Day Pps
Memorial Day Pps
 
Since...
Since...Since...
Since...
 
node-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.jsnode-db: La excusa perfecta para hablar de C++ y Node.js
node-db: La excusa perfecta para hablar de C++ y Node.js
 
Brand Identity
Brand IdentityBrand Identity
Brand Identity
 
Turning a Thousand or so Words into a Map
Turning a Thousand or so Words into a MapTurning a Thousand or so Words into a Map
Turning a Thousand or so Words into a Map
 
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
 
Manual de geología
Manual de geología  Manual de geología
Manual de geología
 
Free Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into ProjectsFree Webinar: The Art of Converting Strategy into Projects
Free Webinar: The Art of Converting Strategy into Projects
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 

Similar to Using Cloud in an Enterprise Environment

Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSAmazon Web Services
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUAmazon Web Services
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSAmazon Web Services
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksAmazon Web Services
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Amazon Web Services
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfAmazon Web Services
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 

Similar to Using Cloud in an Enterprise Environment (20)

Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
B1802041217
B1802041217B1802041217
B1802041217
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 

More from Mike Crabb

Hard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesHard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesMike Crabb
 
Accessible and Assistive Interfaces
Accessible and Assistive InterfacesAccessible and Assistive Interfaces
Accessible and Assistive InterfacesMike Crabb
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible EveryoneMike Crabb
 
The Peer Review Process
The Peer Review ProcessThe Peer Review Process
The Peer Review ProcessMike Crabb
 
Managing Quality In Qualitative Research
Managing Quality In Qualitative ResearchManaging Quality In Qualitative Research
Managing Quality In Qualitative ResearchMike Crabb
 
Analysing Qualitative Data
Analysing Qualitative DataAnalysing Qualitative Data
Analysing Qualitative DataMike Crabb
 
Conversation Discourse and Document Analysis
Conversation Discourse and Document AnalysisConversation Discourse and Document Analysis
Conversation Discourse and Document AnalysisMike Crabb
 
Ethnographic and Observational Research
Ethnographic and Observational ResearchEthnographic and Observational Research
Ethnographic and Observational ResearchMike Crabb
 
Doing Focus Groups
Doing Focus GroupsDoing Focus Groups
Doing Focus GroupsMike Crabb
 
Doing Interviews
Doing InterviewsDoing Interviews
Doing InterviewsMike Crabb
 
Designing Qualitative Research
Designing Qualitative ResearchDesigning Qualitative Research
Designing Qualitative ResearchMike Crabb
 
Introduction to Accessible Design
Introduction to Accessible DesignIntroduction to Accessible Design
Introduction to Accessible DesignMike Crabb
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible EveryoneMike Crabb
 
Texture and Glyph Design
Texture and Glyph DesignTexture and Glyph Design
Texture and Glyph DesignMike Crabb
 
Pattern Perception and Map Design
Pattern Perception and Map DesignPattern Perception and Map Design
Pattern Perception and Map DesignMike Crabb
 
Dealing with Enterprise Level Data
Dealing with Enterprise Level DataDealing with Enterprise Level Data
Dealing with Enterprise Level DataMike Crabb
 
Teaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of TomorrowTeaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of TomorrowMike Crabb
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSSMike Crabb
 
Forms and Databases in PHP
Forms and Databases in PHPForms and Databases in PHP
Forms and Databases in PHPMike Crabb
 
Using mySQL in PHP
Using mySQL in PHPUsing mySQL in PHP
Using mySQL in PHPMike Crabb
 

More from Mike Crabb (20)

Hard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesHard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach Places
 
Accessible and Assistive Interfaces
Accessible and Assistive InterfacesAccessible and Assistive Interfaces
Accessible and Assistive Interfaces
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible Everyone
 
The Peer Review Process
The Peer Review ProcessThe Peer Review Process
The Peer Review Process
 
Managing Quality In Qualitative Research
Managing Quality In Qualitative ResearchManaging Quality In Qualitative Research
Managing Quality In Qualitative Research
 
Analysing Qualitative Data
Analysing Qualitative DataAnalysing Qualitative Data
Analysing Qualitative Data
 
Conversation Discourse and Document Analysis
Conversation Discourse and Document AnalysisConversation Discourse and Document Analysis
Conversation Discourse and Document Analysis
 
Ethnographic and Observational Research
Ethnographic and Observational ResearchEthnographic and Observational Research
Ethnographic and Observational Research
 
Doing Focus Groups
Doing Focus GroupsDoing Focus Groups
Doing Focus Groups
 
Doing Interviews
Doing InterviewsDoing Interviews
Doing Interviews
 
Designing Qualitative Research
Designing Qualitative ResearchDesigning Qualitative Research
Designing Qualitative Research
 
Introduction to Accessible Design
Introduction to Accessible DesignIntroduction to Accessible Design
Introduction to Accessible Design
 
Accessible Everyone
Accessible EveryoneAccessible Everyone
Accessible Everyone
 
Texture and Glyph Design
Texture and Glyph DesignTexture and Glyph Design
Texture and Glyph Design
 
Pattern Perception and Map Design
Pattern Perception and Map DesignPattern Perception and Map Design
Pattern Perception and Map Design
 
Dealing with Enterprise Level Data
Dealing with Enterprise Level DataDealing with Enterprise Level Data
Dealing with Enterprise Level Data
 
Teaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of TomorrowTeaching Cloud to the Programmers of Tomorrow
Teaching Cloud to the Programmers of Tomorrow
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
 
Forms and Databases in PHP
Forms and Databases in PHPForms and Databases in PHP
Forms and Databases in PHP
 
Using mySQL in PHP
Using mySQL in PHPUsing mySQL in PHP
Using mySQL in PHP
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Using Cloud in an Enterprise Environment

  • 1. webdev@rgu Using cloud in an enterprise environment
  • 2. Different cloud deployment models and their characteristics • Public Cloud • Private Cloud • Hybrid Cloud The Data Protection Act and how it relates to Cloud Computing case study example of using a hybrid cloud model in an enterprise environment Today we are covering…
  • 6. Leadership Engineering We want access to the fastest and newest cloud services straight away All of our data must remain secure and we want to remain in control of it
  • 7. National Institute of Standards and Technology Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared opal of configurable computer resources that can be rapidly provisioned and released with minimal management effort or service provider interaction Cloud Computing
  • 8. National Institute of Standards and Technology The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organisation, or some combination of them. It exists on the premises of the cloud provider. Public Cloud
  • 10. National Institute of Standards and Technology The cloud infrastructure is provisioned for exclusive use by a single organisation comprising multiple consumers. It may be owned, managed, and operated by the organisation, a third parts, or some combination of them, and it may exist on or off premises Private Cloud
  • 11. Elastic Capabilities Opex economics (operational Expense) Ease of operations time to implement data sovereignty environmental control cost predictability capex economics (Capitol Expense)
  • 12. Elastic Capabilities Opex economics (operational Expense) Ease of operations time to implement data sovereignty environmental control cost predictability capex economics (Capitol Expense) PrivateCloud PublicCloud
  • 13. Leadership Engineering We want access to the fastest and newest cloud services straight away All of our data must remain secure and we want to remain in control of it
  • 14. National Institute of Standards and Technology The cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities, but are bound together by a standardised or proprietary technology that enables data and application portability Hybrid Cloud
  • 16. Data Protection Act 1998 http://www.legislation.gov.uk/ukpga/1998/29/contents UK implementation of the 1995 EU Directive on Data Protection 95/46/EC The Data Protection Act applied to the processing of personal data. Data is defined as information within: • A relevant filing system (paper or electronic based) • Any type of information held by a body subject to the freedom of information act • An accessible record (e.g. Health, Education, Housing) • Equipment operating automatically in response to instructions (i.e. in a computerised format
  • 17. Data Protection Act 1998 The Data Subject The Data ProcessorThe Data Controller An individual who is the subject of personal data A person or body which decides what happens to the personal data it processes A person or body (other than an employee of the data controller) who process personal data on behalf of the data controller If using a Data Processor a written contract is needed
  • 18. Data Protection Act 1998 Data must be: 1. Fairly and lawfully processed 2. Processed for limited purposes and not further purposes in a manner which is incompatible with those purposes 3. Adequate, relevant, and not excessive 4. Accurate and up to date 5. Not kept longer than necessary 6. Processed in accordance with the individual’s rights 7. Secure 8. Not transferred to countries outside of the European Economic Area unless adequate protection is provided Data Controller Responsibilities
  • 19. Data Protection Act 1998 The Data Protection Act applied to the processing of personal data. Data {can be} defined as information…in a computerised format. Information is in the cloud… therefore it is computerised
  • 20. Data Protection Act 1998 The Data Protection Act applied to the processing of personal data. Data {can be} defined as information…in a computerised format. Information is in the cloud… therefore it is computerised Cloud information is sometimes about living identifiable people…so it is it personal data
  • 21. Data Protection Act 1998 The Data Protection Act applied to the processing of personal data. Data {can be} defined as information…in a computerised format. Information is in the cloud… therefore it is computerised Cloud information is sometimes about living identifiable people…so it is it personal data Something is happening to that data…so it is being processed
  • 22. Data Protection Act 1998 The Data Subject The Data ProcessorThe Data Controller The person that you are storing data about A cloud service purchaser A cloud service provider
  • 23. Data Protection Act 1998 The Data Subject The Data Controller The Data Processor Has responsibility for implementing 8 parts of DPA Contracted to provide adequate security American Company
  • 24. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
  • 25. Data Protection Act 1998 The Data Subject The Data Controller The Data Processor Has responsibility for implementing 8 parts of DPA Contracted to provide adequate security Contracted to maintain data
  • 26.
  • 27. Data Protection Act 1998 The Data Subject The Data Controller The Data Processor Has responsibility for implementing 8 parts of DPA Contracted to provide adequate security Contracted to maintain data Contracted to process in accordance with rights
  • 28. Here is a map of the world
  • 29. Here is a map of the world
  • 30. Here is a map of the world that will potentially have the same human rights law as us in a few years time
  • 31.
  • 32. Anyone use Google Forms? How many of these places are you comfortable in your data being?
  • 33. case study of an enterprise hybrid cloud model
  • 35. Application Data User DataContent Data Boilerplate code for moodle. Nothing really confidential here Material uploaded by staff / students Usernames & Passwords Grade Profiles Student Records
  • 36. Application Data Boilerplate code for moodle. Nothing really confidential here Moodle Source Code Application Data Moodle Database Application Data
  • 37. Material uploaded by staff / students Moodle Source Code Application Data Moodle Database Application Data Content Data Uploaded Lectures Content Data Uploaded Course Submissions Content Data Uploaded Course Information Content Data
  • 38. Usernames & Passwords Grade Profiles Student Records Moodle Source Code Application Data Moodle Database Application Data Uploaded Lectures Content Data Uploaded Course Submissions Content Data Uploaded Course Information Content Data User Data Usernames and Passwords User Data Grade Profiles User Data Student Records User Data
  • 39. File Storage Database Storage Code storage Moodle Source Code Application Data Moodle Database Application Data Uploaded Lectures Content DataUploaded Course Submissions Content Data Uploaded Course Information Content Data Usernames and Passwords User Data Grade Profiles User Data Student Records User Data
  • 40. File Storage Database Storage Code storage Uploaded Lectures Content DataUploaded Course Submissions Content Data Uploaded Course Information Content Data Usernames and Passwords User Data Grade Profiles User Data Student Records User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data
  • 41. File Storage Database Storage Code storage Uploaded Lectures Content DataUploaded Course Submissions Content Data Uploaded Course Information Content Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data
  • 42. File Storage Database Storage Code storage Uploaded Lectures Content DataUploaded Course Submissions Content Data AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data
  • 43. File Storage Database Storage Code storage AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data AWS D3 Uploaded Lectures Application Data Pr. C - File Storage Course Submissions Application Data
  • 44. AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data AWS D3 Uploaded Lectures Application Data Pr. C - File Storage Course Submissions Application Data Public Cloud Private Cloud
  • 45. AWS RDS Course Information Application Data Pr. C - File Storage Student Records User Data Pr.C - Database Passwords and Grade Profiles User Data AWS EC2 Moodle Source Code Application Data AWS RDS Moodle Database Application Data AWS D3 Uploaded Lectures Application Data Pr. C - File Storage Course Submissions Application Data Hybrid Cloud
  • 46. Different cloud deployment models and their characteristics • Public Cloud • Private Cloud • Hybrid Cloud The Data Protection Act and how it relates to Cloud Computing case study example of using a hybrid cloud model in an enterprise environment