SlideShare una empresa de Scribd logo
1 de 18
Cloud computing
Prepared MSC student
SAMER A.QADER
University Of Technology
Computer Science Department
1
Contents
1. Definition of Cloud Computing
2. Characteristics of Cloud Computing
3. Deployment models
4. Service models
5. Security- Who is in control?
6. Virtualization & Cloud Computing
7. Cloud computing and IOT.
8. Conclusions
9. References
2
1. Definition of Cloud Computing :-
Cloud computing is a general term used to describe a new
class of network based computing where difference services
takes place over the internet, such as servers , storage and
application are delivered to an organization’s computers and
devices through the internet Figure (1-1)
These platforms hid the complexity and details of the
underling infrastructure from users and applications by
providing very simple graphical interface or API (application
programming infrastructure).
(Cloud just a buzz of the World)
3
Figure (1-1)
4
1.1 Example of cloud computing services Figure (1-2) :
Figure (1-2)
5
1. On demand self-service
2. Ubiquitous network access
3. Location independent resource pooling
4. Rapid elasticity
5. Measured service
2. Characteristics of Cloud Computing:-
6
3. Deployment models of cloud computing:-
Cloud computing model has three service delivery and deployment models
Figure (1.3)
1. Private cloud. Used for a single organization can be internally or externally
hosted.
2. Public cloud. Provisioned for open use for the public by a particular
organization who also hosts the service.
3. Community cloud. Provisioned for exclusive use by a specific community
of consumers from organizations that have shared concerns (e.g., mission,
security requirements, policy, and compliance considerations). It may be
owned, managed, and operated by one or more of the organizations in the
community, a third-party, or some combination of them, and it may exist on
or off premises.
4. Hybrid cloud. Composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique
entities, but are bound together by standardized or proprietary
technology that enables data and application portability
7
Figure (1.3)
8
4. Service models :-
Cloud computing model has three service deliveries, Figure (1.4).
1. Software as a Service (SaaS). The capability provided to the
consumer is to use the provider’s applications running on a cloud
infrastructure. The applications are accessible from various client
devices through a thin client interface such as a web browser
(e.g., web-based email).
2. Platform as a Service (PaaS). The capability provided to the
consumer is to deploy onto the cloud infrastructure his own
applications without installing any platform or tools on their
local machines. PaaS refers to providing platform layer
resources, including operating system support and software
development frameworks that can be used to build higher-level
services.
3. Infrastructure as a Service (IaaS). The capability provided to
the consumer is to provision processing, storage, networks, and
other fundamental 9
Figure (1.4)
10
For Example In figure (1-5) let’s see the organization control in deferent model
(the traditional & cloud computing Model).
1. On premises Organization own a data center (App, V.M, Server, and Storage
& Network) that mean the org. had a full control of all, and shared control
the network with the vendor.
2. On premises (Hosted model) the Org. go with somebody else premises, so
the org had a full control of (App, V.M) and shard control (Server, Storage &
Network) with the vendor.
3. In IaaS, the (Server, Storage & Network) would be under full control of the
vendor and the organization has only control of the (App) and shared control
the (V.M) with the vendor.
4. In PaSS , the (Server, Storage & Network) would be under full control of
the vendor and the organization have shared control the (App & V.M) with
the vendor
5. In SaaS Now the organization had no control of anything , just the vendor
In this case study we figure that in cloud computing control of vender more than the control
of the Org) another meaning the cloud acts as a big ( Black Box) nothing inside the cloud is
visible to the client .
5. Security- Who is in control?
11
figure (1-5)
12
6. Virtualization & Cloud Computing :-
Introduction Cloud computing has improved computation’s efficiency
while reducing its cost for users.
Virtualization :
Is the key component of cloud computing for providing computing
and storage services. Although most readers should be familiar with
sharing CPU and storage facilities, the memory leak and hard disk
leak have not been described as well. This paper introduces cloud
computing, virtualization technologies, and discusses the relationship
between them, and presents risk of security by the use of the
virtualization technology and the ways to bring down the danger.
13
•What is the concept behind the Virtualization?
Creation of a virtual machine over existing operating
system and hardware is known as Hardware Virtualization.
A Virtual machine provides an environment that is logically
separated from the underlying hardware. The machine on
which the virtual machine is going to create is known
as Host Machine and that virtual machine is referred as
a Guest Machine
1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization
•Types of Virtualization:
14
15
cloud computing and IoT are tightly coupled?
•The growth of IoT and the rapid development of technologies create a
widespread connection of “things.” This has lead to the production of
large amounts of data, which needs to be stored, processed and
accessed.
• Cloud computing as a paradigm for big data storage and analytics
While IoT is exciting on its own, the real innovation from combining it
with cloud computing enable new monitoring services and powerful
processing of sensory data streams. E.g.., sensory data can be uploaded
and stored with cloud computing, later to be used in BI appl. for smart
monitoring and work with other smart devices.
7. cloud computing and IOT :-
• The cloud effectively serves as the brain to improved decision-
making and optimized internet-based interactions However, when
IoT meets cloud, new challenges arise. This lead to a new concept
called “ integration”
•The virtual infrastructure for practical mobile computing and interfacing includes
integrating applications, storage devices, monitoring devices, visualization platforms,
analytics tools and client delivery. Cloud computing offers a practical utility-based
model that will enable businesses and users to access applications on demand anytime
and from anywhere .
8. Conclusions
Cloud Computing is a relatively new concept that presents a good number of
benefits for its users; however, it also Raises some security problems which may
slow down its use. Understanding what vulnerabilities exist in Cloud Computing
will help organizations to make the shift towards the Cloud. Since Cloud
Computing leverages many technologies, it also inherits their security issues.
9. References
•An analysis of security issues for cloud computing
Keiko Hashizume1*, David G Rosado2, Eduardo Fernández-Medina2 and Eduardo B
Fernandez1
•https://www.engineyard.com/platform-as-a-service-cloud
•https://www.cmg.org/wp-content/uploads/2014/03/1-Paliwal-Performance-Challenges-
in-Cloud-Computing.pdf
18

Más contenido relacionado

La actualidad más candente

Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
Dr. Amarjeet Singh
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
shilpa bojji
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation Project
Mohamed Shorbagy
 
Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computing
asmita tarar
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 

La actualidad más candente (20)

The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Fundamental cloud computing
Fundamental cloud computingFundamental cloud computing
Fundamental cloud computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation Project
 
Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computing
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud computing Report
Cloud computing ReportCloud computing Report
Cloud computing Report
 

Similar a Cloud computing

11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
Alexander Decker
 
Cloud computing
Cloud computingCloud computing
Cloud computing
shethzaid
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptx
adad129366
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
Abdul Aslam
 

Similar a Cloud computing (20)

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
G0314043
G0314043G0314043
G0314043
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptx
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
What is cloud ?
What is cloud ?What is cloud ?
What is cloud ?
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 

Más de Sammer Qader

Más de Sammer Qader (10)

Tam & toe
Tam & toeTam & toe
Tam & toe
 
Project integration management ch 4
Project integration management ch 4Project integration management ch 4
Project integration management ch 4
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Text compression
Text compressionText compression
Text compression
 
Regression analysis algorithm
Regression analysis algorithm Regression analysis algorithm
Regression analysis algorithm
 
Transport laye
Transport laye Transport laye
Transport laye
 
Information & Data Architecture
Information & Data ArchitectureInformation & Data Architecture
Information & Data Architecture
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Project integration management ch 4
Project integration management ch 4Project integration management ch 4
Project integration management ch 4
 
Data classification sammer
Data classification sammer Data classification sammer
Data classification sammer
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Cloud computing

  • 1. Cloud computing Prepared MSC student SAMER A.QADER University Of Technology Computer Science Department 1
  • 2. Contents 1. Definition of Cloud Computing 2. Characteristics of Cloud Computing 3. Deployment models 4. Service models 5. Security- Who is in control? 6. Virtualization & Cloud Computing 7. Cloud computing and IOT. 8. Conclusions 9. References 2
  • 3. 1. Definition of Cloud Computing :- Cloud computing is a general term used to describe a new class of network based computing where difference services takes place over the internet, such as servers , storage and application are delivered to an organization’s computers and devices through the internet Figure (1-1) These platforms hid the complexity and details of the underling infrastructure from users and applications by providing very simple graphical interface or API (application programming infrastructure). (Cloud just a buzz of the World) 3
  • 5. 1.1 Example of cloud computing services Figure (1-2) : Figure (1-2) 5
  • 6. 1. On demand self-service 2. Ubiquitous network access 3. Location independent resource pooling 4. Rapid elasticity 5. Measured service 2. Characteristics of Cloud Computing:- 6
  • 7. 3. Deployment models of cloud computing:- Cloud computing model has three service delivery and deployment models Figure (1.3) 1. Private cloud. Used for a single organization can be internally or externally hosted. 2. Public cloud. Provisioned for open use for the public by a particular organization who also hosts the service. 3. Community cloud. Provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third-party, or some combination of them, and it may exist on or off premises. 4. Hybrid cloud. Composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability 7
  • 9. 4. Service models :- Cloud computing model has three service deliveries, Figure (1.4). 1. Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). 2. Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure his own applications without installing any platform or tools on their local machines. PaaS refers to providing platform layer resources, including operating system support and software development frameworks that can be used to build higher-level services. 3. Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental 9
  • 11. For Example In figure (1-5) let’s see the organization control in deferent model (the traditional & cloud computing Model). 1. On premises Organization own a data center (App, V.M, Server, and Storage & Network) that mean the org. had a full control of all, and shared control the network with the vendor. 2. On premises (Hosted model) the Org. go with somebody else premises, so the org had a full control of (App, V.M) and shard control (Server, Storage & Network) with the vendor. 3. In IaaS, the (Server, Storage & Network) would be under full control of the vendor and the organization has only control of the (App) and shared control the (V.M) with the vendor. 4. In PaSS , the (Server, Storage & Network) would be under full control of the vendor and the organization have shared control the (App & V.M) with the vendor 5. In SaaS Now the organization had no control of anything , just the vendor In this case study we figure that in cloud computing control of vender more than the control of the Org) another meaning the cloud acts as a big ( Black Box) nothing inside the cloud is visible to the client . 5. Security- Who is in control? 11
  • 13. 6. Virtualization & Cloud Computing :- Introduction Cloud computing has improved computation’s efficiency while reducing its cost for users. Virtualization : Is the key component of cloud computing for providing computing and storage services. Although most readers should be familiar with sharing CPU and storage facilities, the memory leak and hard disk leak have not been described as well. This paper introduces cloud computing, virtualization technologies, and discusses the relationship between them, and presents risk of security by the use of the virtualization technology and the ways to bring down the danger. 13
  • 14. •What is the concept behind the Virtualization? Creation of a virtual machine over existing operating system and hardware is known as Hardware Virtualization. A Virtual machine provides an environment that is logically separated from the underlying hardware. The machine on which the virtual machine is going to create is known as Host Machine and that virtual machine is referred as a Guest Machine 1. Hardware Virtualization. 2. Operating system Virtualization. 3. Server Virtualization. 4. Storage Virtualization •Types of Virtualization: 14
  • 15. 15
  • 16. cloud computing and IoT are tightly coupled? •The growth of IoT and the rapid development of technologies create a widespread connection of “things.” This has lead to the production of large amounts of data, which needs to be stored, processed and accessed. • Cloud computing as a paradigm for big data storage and analytics While IoT is exciting on its own, the real innovation from combining it with cloud computing enable new monitoring services and powerful processing of sensory data streams. E.g.., sensory data can be uploaded and stored with cloud computing, later to be used in BI appl. for smart monitoring and work with other smart devices. 7. cloud computing and IOT :- • The cloud effectively serves as the brain to improved decision- making and optimized internet-based interactions However, when IoT meets cloud, new challenges arise. This lead to a new concept called “ integration”
  • 17. •The virtual infrastructure for practical mobile computing and interfacing includes integrating applications, storage devices, monitoring devices, visualization platforms, analytics tools and client delivery. Cloud computing offers a practical utility-based model that will enable businesses and users to access applications on demand anytime and from anywhere .
  • 18. 8. Conclusions Cloud Computing is a relatively new concept that presents a good number of benefits for its users; however, it also Raises some security problems which may slow down its use. Understanding what vulnerabilities exist in Cloud Computing will help organizations to make the shift towards the Cloud. Since Cloud Computing leverages many technologies, it also inherits their security issues. 9. References •An analysis of security issues for cloud computing Keiko Hashizume1*, David G Rosado2, Eduardo Fernández-Medina2 and Eduardo B Fernandez1 •https://www.engineyard.com/platform-as-a-service-cloud •https://www.cmg.org/wp-content/uploads/2014/03/1-Paliwal-Performance-Challenges- in-Cloud-Computing.pdf 18