SlideShare a Scribd company logo
1 of 13
Presented By:
Ms Mamta
 Cloud computing is a type of computing that relies
on sharing computing resources rather than having
local servers or personal devices to
handle applications.
 In cloud computing, the word cloud(also phrased
as "the cloud") is used as a metaphor for "the
Internet," so the phrase cloud computing means "a
type of Internet-based computing," where different
services — such as servers, storage and
applications —are delivered to an organization's
computers and devices through the Internet.
Cloud computing security also known as Cloud
Security.
It refers to a broad set of policies, technologies,
and controls deployed to protect data,
applications, and the associated infrastructure
of cloud computing .
1.Security issues faced by cloud providers
2.Security issues faced by their customers
The extensive use of virtualization in
implementing cloud infrastructure brings unique
security concerns for customers or tenants of a
public cloud service
Virtualization alters the relationship between the
OS and underlying hardware , be it computing,
storage or even networking.
1. Internal Cloud
An internal cloud is a cloud computing
service model that is implemented within an
organization's dedicated resources and
infrastructure.
Key Benefits are:
Total cloud security
Reduced infrastructure costs
Reduced hardware requirements
2. External Cloud
An external cloud is a cloud solution
that exists outside of an organization's
physical boundaries. It can be private,
public or community-based, as long as
it is not located on an organization's
property.
Cloud
Security
Controls
Deterrent
Controls
Preventive
Controls
Detective
Controls
Corrective
Controls
Correct security controls should be
implemented according to asset,
threat, and vulnerability risk
assessment matrices. While cloud
security concerns can be grouped into
any number of dimensions these
dimensions have been aggregated into
following general areas:
•Security and Privacy
•Compliance
•Legal issues
•Contractual Issues
Cloud computing offers clear and powerful
benefits to IT organizations of all sizes, but
the path to cloud computing is often cloudy.
With cloud computing, IT resources can scale
almost immediately in response to business
needs and can be delivered under a predictable
(and budget friendly) pay-as-you-go model.
Cloud computing security

More Related Content

What's hot

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 

What's hot (20)

Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private clouds
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 
Firewall
FirewallFirewall
Firewall
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 

Viewers also liked

2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn 2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn
appsforgood2014
 
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
SteveSchneid
 
Aadhar based voting system
Aadhar based voting systemAadhar based voting system
Aadhar based voting system
Nikhilesh Reddy
 

Viewers also liked (17)

Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn 2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn
 
One stop
One stopOne stop
One stop
 
CLA Powerpoint
CLA PowerpointCLA Powerpoint
CLA Powerpoint
 
типове положення
типове положеннятипове положення
типове положення
 
типове положення
типове положеннятипове положення
типове положення
 
Final rockinvel Balsamiq's
Final rockinvel Balsamiq'sFinal rockinvel Balsamiq's
Final rockinvel Balsamiq's
 
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
 
LIC PowerPoint
LIC PowerPointLIC PowerPoint
LIC PowerPoint
 
Nancy music communication
Nancy music communicationNancy music communication
Nancy music communication
 
презентація до проекту
презентація до проектупрезентація до проекту
презентація до проекту
 
an introduction to water quality models
an introduction to water quality modelsan introduction to water quality models
an introduction to water quality models
 
Union budget watch 2014 15
Union budget watch 2014 15Union budget watch 2014 15
Union budget watch 2014 15
 
виховна система
виховна системавиховна система
виховна система
 
Licencia de construccion
Licencia de construccionLicencia de construccion
Licencia de construccion
 
Aadhar based voting system
Aadhar based voting systemAadhar based voting system
Aadhar based voting system
 

Similar to Cloud computing security

A220113
A220113A220113
A220113
irjes
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
 

Similar to Cloud computing security (20)

A220113
A220113A220113
A220113
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
G0314043
G0314043G0314043
G0314043
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Scope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptxScope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptx
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Cloud computing security

  • 2.  Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.  In cloud computing, the word cloud(also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications —are delivered to an organization's computers and devices through the Internet.
  • 3. Cloud computing security also known as Cloud Security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing .
  • 4. 1.Security issues faced by cloud providers 2.Security issues faced by their customers
  • 5. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service Virtualization alters the relationship between the OS and underlying hardware , be it computing, storage or even networking.
  • 6.
  • 7. 1. Internal Cloud An internal cloud is a cloud computing service model that is implemented within an organization's dedicated resources and infrastructure. Key Benefits are: Total cloud security Reduced infrastructure costs Reduced hardware requirements
  • 8. 2. External Cloud An external cloud is a cloud solution that exists outside of an organization's physical boundaries. It can be private, public or community-based, as long as it is not located on an organization's property.
  • 10. Correct security controls should be implemented according to asset, threat, and vulnerability risk assessment matrices. While cloud security concerns can be grouped into any number of dimensions these dimensions have been aggregated into following general areas:
  • 11. •Security and Privacy •Compliance •Legal issues •Contractual Issues
  • 12. Cloud computing offers clear and powerful benefits to IT organizations of all sizes, but the path to cloud computing is often cloudy. With cloud computing, IT resources can scale almost immediately in response to business needs and can be delivered under a predictable (and budget friendly) pay-as-you-go model.