SlideShare una empresa de Scribd logo
1 de 20
SALEH ALGHAMDI-N26846627
 VO HONG HANH –N7704283
   Introduction
    ◦ Scope
    ◦ Definition of key terms
   History of cloud computing
   Cloud service models
   Cloud deployment models
   Advantages of cloud computing
   Issues
    ◦ Privacy and security
       Confidentiality
       Integrity
       Availability
    ◦ Laws and regulations
   Recommendations                 This image is taken from
                                    http://www.itp.net/584104-gartner-warns-of-
                                    cloud-service-contract-risks
   Cloud computing – a technology that provides web-based solutions and
      services to the public using networks, servers, data warehouses‟, software
      applications and internet services managed by a third party (Giard &
      Lessard, 2010).
     Nowadays, cloud-based services are being adopted by organisations at a
      rapid rate.
     Web 2.0 tools, social networking sites are all examples in which individuals
      are moving their activities to „the cloud‟
     In 2010, Gartner predicted that cloud-based services generated more than
      $68 billion in worldwide revenue (Mielke, 2010).




This image is taken from http://www.theindiagate.info/2011/04/regulations-for-the-
cloud-ieee/
History of cloud computing
   Back to the 1960s, computer scientist John McCarthy wrote that “computation
    may someday be organized as a public utility”
   In 1997, the term was used for the first time in its current context by lecturer
    Ramnath Chellappa who defined it as a new “computing paradigm where the
    boundaries of computing will be determined by economic rationale rather
    than technical limits alone” (Biswas-a, 2011).
   In 1999, Salesforce.com - one of the first movers in cloud
    computing, introduced the concept of delivering enterprise applications via a
    website.
   Amazon launched Amazon Web Service in 2002, Google launched GoogleDocs
    in 2006
   In 2007, an industry-wide collaboration between Google, IBM and a number
    of universities across the United States soon followed.
   Microsoft‟s entry into cloud computing came in 2009 with the launch of
    Windows Azure
                                                        (Biswas, 2011)
Cloud service types

There are 3 major models for cloud computing which are:

   Infrastructure as a Service (IaaS)
   Platform as a Service (PaaS)
   Software as a Service (SaaS).




                              This image is taken from:
                              http://www.maintec.com/blog/cloud-computing-demystified/ /
IAAS

IAAS – Infrastructure as a Service

   IaaS involves physical computer hardware such as CPU
    processing, memory, data storage and network connectivity being provided
    by a vendor.
   Example of an IaaS service vendor is Amazon Elastic Compute Cloud (EC2).
   According to In-Stat, it is expected that IaaS spending will approach $4 billion
    from 2011 to 2014
PAAS

PAAS –Platform as a Service

   PaaS enables customers to use the vendor‟s cloud infrastructure to deploy
    web applications and other software developed by the customer using
    programming languages supported by the vendor .
   Example of PaaS vendors: Google App Engine, Amazon Web Services Elastic
    Beanstalk and Microsoft Windows Auzre platform.
   According to In-Stat, PaaS spending will increase 113 percent annually to
    approximately $460 million in 2014.
SAAS

SAAS – Software as a service

   The strongest cloud trend and services
   The Application itself is provided by the service provider.
   Examples: Google doc, Gmail, Hotmail, Flickr
    From 2011 to 2014, SaaS spending is expected to grow 112 percent
    annually.
Cloud deployment models




  This image is taken from:
  https://wiki.cloudsecurityalliance.org/guidance/index.php/Cloud_Computing_Architectural_
  Framework
Public cloud

   The service are provided to the client from a third party service provider
    through the Internet.
    Public clouds have a maximum potential in cost efficiencies
   Security risks must be concerned
   Examples: Amazon




                              This image is taken from:
                              http://www.definethecloud.net/tag/public-cloud/
Private cloud

   A private cloud involves an organisation‟s exclusive use of cloud
    infrastructure and services located on premises or offsite which is then
    managed by the organisation or a selected vendor.
   Reduced potential security concerns
   Examples: HP Data Centers




                             This image is taken from:
                             http://www.hightechdad.com/2012/01/31/a-cloud-for-all-seasons-
                             picking-the-right-cloud/
Hybrid cloud

   Hybrid clouds attempt to obtain most of the security benefits of a private cloud, and
    most of the economic benefits of a public cloud.




                                     This image is taken from:
                                     http://www.cloudave.com/6/perform-the-hybrid-cloud-dance-easily-
                                     with-newscale-rpath-and-eucalyptus/
Cloud computing advantages

•   Cost savings
•   No maintenance issues
•   Simplicity




                        This image is taken from
                        http://www.dailyblogging.org/internet/cloud-computing-advantages/
Cloud computing issues
     Security/Privacy                      Laws and regulations




This image is taken from
http://www.gfi.com/blog/cloud-computing-
security-implications-service-provider/    This image is taken from
                                           http://www.gfi.com/blog/cloud-computing-
                                           security-implications-service-provider/
Security/Privacy
1.     Confidentiality
privacy of information (Antonopoulos, et
al., 2010).


2.     Integrity
the authorisation to modify assets in the
cloud (Antonopoulos, et al., 2010).


3.     Availability
the availability of data when it is needed   This image is taken from
(Antonopoulos, et al., 2010).                http://www.gfi.com/blog/cloud-
                                             computing-security-implications-
                                             service-provider/
1- Confidentiality
The increased number of authorised parties to
access the cloud computing makes the data more
vulnerable to be compromised (Zissis, 2010). data
requires high algorithm encryption before it is
stored in the cloud. (Kalyani, Sonia, &
Paikrao, 2012).




                                  This image is taken from
                                  http://www.corporatecomplianceinsights.com/company/cipher
                                  cloud/
2- Integrity
Tampering QUT library data is most likely to cause daunting
damage. This issue is greater in the public cloud than it is in private
cloud. The private cloud is set up on private network, whereases;
the public cloud is off-site (Kuyoro, et al., 2011). Therefore, private
cloud is more secure for QUT library.




                                    This image is taken from
                                    http://patricksclouds.wordpress.com/2011/06/09/if-the-
                                    private-cloud-benefits-the-public-cloud-economic-model/
3- Availability
cloud computing provider must be trusted party to deal with.
Trusted third party is the one that is fully compliant in its
financial, legal, and technical elements (Zissis, 2010). The
protection of intellectual property within „the cloud‟ for QUT
library should focus on creating a strong contract, ensuring
that the business retains the rights to all data stored within the
remote servers (LegalIQ, 2011).




        This image is taken from                This image is taken from
        http://www.techrepublic.com/blog/cio-   http://meship.com/Blog/2011/03/18/cloud-
        insights/cloud-computing-how-to-make-   computing-contracts-and-services-whats-
        the-right-choices/39747431              really-happening/
Laws and regulations
One feature of cloud computing is that data can be
localised, shared and stored in several countries, depending on
what the service provider decides. However, when QUT library opt
for cloud computing services, they relinquish all control over its
information (Giard & Lessard, 2010). Therefore, it is
recommended that contract specify the countries that the
information can be accessed and used from.




                              This image is taken from http://www.gfi.com/blog/cloud-computing-
                              security-implications-service-provider/
Recommendations for QUT library
1. Use complex algorithm encryption

2. Use the private cloud

3. Choose a trusted third party

4. Negotiate Service Level Agreement

5. In the contract, specify the countries in which the information can be
   accessed and used.




                                  This image is taken from
                                  http://www.tiptopcomputers.co.uk/recommendations.html

Más contenido relacionado

La actualidad más candente

A220113
A220113A220113
A220113
irjes
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter
9505567198
 

La actualidad más candente (20)

Briefing 47
Briefing 47Briefing 47
Briefing 47
 
A220113
A220113A220113
A220113
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
B042306013
B042306013B042306013
B042306013
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1
 
H046053944
H046053944H046053944
H046053944
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 

Similar a Slides 530 a2

The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
Mike Tase
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
audeleypearl
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
IAEME Publication
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 

Similar a Slides 530 a2 (20)

Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
What is cloud computing technology
What is cloud computing technologyWhat is cloud computing technology
What is cloud computing technology
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
B017660813
B017660813B017660813
B017660813
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Slides 530 a2

  • 1. SALEH ALGHAMDI-N26846627 VO HONG HANH –N7704283
  • 2. Introduction ◦ Scope ◦ Definition of key terms  History of cloud computing  Cloud service models  Cloud deployment models  Advantages of cloud computing  Issues ◦ Privacy and security  Confidentiality  Integrity  Availability ◦ Laws and regulations  Recommendations This image is taken from http://www.itp.net/584104-gartner-warns-of- cloud-service-contract-risks
  • 3. Cloud computing – a technology that provides web-based solutions and services to the public using networks, servers, data warehouses‟, software applications and internet services managed by a third party (Giard & Lessard, 2010).  Nowadays, cloud-based services are being adopted by organisations at a rapid rate.  Web 2.0 tools, social networking sites are all examples in which individuals are moving their activities to „the cloud‟  In 2010, Gartner predicted that cloud-based services generated more than $68 billion in worldwide revenue (Mielke, 2010). This image is taken from http://www.theindiagate.info/2011/04/regulations-for-the- cloud-ieee/
  • 4. History of cloud computing  Back to the 1960s, computer scientist John McCarthy wrote that “computation may someday be organized as a public utility”  In 1997, the term was used for the first time in its current context by lecturer Ramnath Chellappa who defined it as a new “computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits alone” (Biswas-a, 2011).  In 1999, Salesforce.com - one of the first movers in cloud computing, introduced the concept of delivering enterprise applications via a website.  Amazon launched Amazon Web Service in 2002, Google launched GoogleDocs in 2006  In 2007, an industry-wide collaboration between Google, IBM and a number of universities across the United States soon followed.  Microsoft‟s entry into cloud computing came in 2009 with the launch of Windows Azure  (Biswas, 2011)
  • 5. Cloud service types There are 3 major models for cloud computing which are:  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS)  Software as a Service (SaaS). This image is taken from: http://www.maintec.com/blog/cloud-computing-demystified/ /
  • 6. IAAS IAAS – Infrastructure as a Service  IaaS involves physical computer hardware such as CPU processing, memory, data storage and network connectivity being provided by a vendor.  Example of an IaaS service vendor is Amazon Elastic Compute Cloud (EC2).  According to In-Stat, it is expected that IaaS spending will approach $4 billion from 2011 to 2014
  • 7. PAAS PAAS –Platform as a Service  PaaS enables customers to use the vendor‟s cloud infrastructure to deploy web applications and other software developed by the customer using programming languages supported by the vendor .  Example of PaaS vendors: Google App Engine, Amazon Web Services Elastic Beanstalk and Microsoft Windows Auzre platform.  According to In-Stat, PaaS spending will increase 113 percent annually to approximately $460 million in 2014.
  • 8. SAAS SAAS – Software as a service  The strongest cloud trend and services  The Application itself is provided by the service provider.  Examples: Google doc, Gmail, Hotmail, Flickr  From 2011 to 2014, SaaS spending is expected to grow 112 percent annually.
  • 9. Cloud deployment models This image is taken from: https://wiki.cloudsecurityalliance.org/guidance/index.php/Cloud_Computing_Architectural_ Framework
  • 10. Public cloud  The service are provided to the client from a third party service provider through the Internet.  Public clouds have a maximum potential in cost efficiencies  Security risks must be concerned  Examples: Amazon This image is taken from: http://www.definethecloud.net/tag/public-cloud/
  • 11. Private cloud  A private cloud involves an organisation‟s exclusive use of cloud infrastructure and services located on premises or offsite which is then managed by the organisation or a selected vendor.  Reduced potential security concerns  Examples: HP Data Centers This image is taken from: http://www.hightechdad.com/2012/01/31/a-cloud-for-all-seasons- picking-the-right-cloud/
  • 12. Hybrid cloud  Hybrid clouds attempt to obtain most of the security benefits of a private cloud, and most of the economic benefits of a public cloud. This image is taken from: http://www.cloudave.com/6/perform-the-hybrid-cloud-dance-easily- with-newscale-rpath-and-eucalyptus/
  • 13. Cloud computing advantages • Cost savings • No maintenance issues • Simplicity This image is taken from http://www.dailyblogging.org/internet/cloud-computing-advantages/
  • 14. Cloud computing issues Security/Privacy Laws and regulations This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/ This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
  • 15. Security/Privacy 1. Confidentiality privacy of information (Antonopoulos, et al., 2010). 2. Integrity the authorisation to modify assets in the cloud (Antonopoulos, et al., 2010). 3. Availability the availability of data when it is needed This image is taken from (Antonopoulos, et al., 2010). http://www.gfi.com/blog/cloud- computing-security-implications- service-provider/
  • 16. 1- Confidentiality The increased number of authorised parties to access the cloud computing makes the data more vulnerable to be compromised (Zissis, 2010). data requires high algorithm encryption before it is stored in the cloud. (Kalyani, Sonia, & Paikrao, 2012). This image is taken from http://www.corporatecomplianceinsights.com/company/cipher cloud/
  • 17. 2- Integrity Tampering QUT library data is most likely to cause daunting damage. This issue is greater in the public cloud than it is in private cloud. The private cloud is set up on private network, whereases; the public cloud is off-site (Kuyoro, et al., 2011). Therefore, private cloud is more secure for QUT library. This image is taken from http://patricksclouds.wordpress.com/2011/06/09/if-the- private-cloud-benefits-the-public-cloud-economic-model/
  • 18. 3- Availability cloud computing provider must be trusted party to deal with. Trusted third party is the one that is fully compliant in its financial, legal, and technical elements (Zissis, 2010). The protection of intellectual property within „the cloud‟ for QUT library should focus on creating a strong contract, ensuring that the business retains the rights to all data stored within the remote servers (LegalIQ, 2011). This image is taken from This image is taken from http://www.techrepublic.com/blog/cio- http://meship.com/Blog/2011/03/18/cloud- insights/cloud-computing-how-to-make- computing-contracts-and-services-whats- the-right-choices/39747431 really-happening/
  • 19. Laws and regulations One feature of cloud computing is that data can be localised, shared and stored in several countries, depending on what the service provider decides. However, when QUT library opt for cloud computing services, they relinquish all control over its information (Giard & Lessard, 2010). Therefore, it is recommended that contract specify the countries that the information can be accessed and used from. This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
  • 20. Recommendations for QUT library 1. Use complex algorithm encryption 2. Use the private cloud 3. Choose a trusted third party 4. Negotiate Service Level Agreement 5. In the contract, specify the countries in which the information can be accessed and used. This image is taken from http://www.tiptopcomputers.co.uk/recommendations.html