SlideShare a Scribd company logo
1 of 9
CLOUD COMPUTING
A project by Haniel Zadok
WHAT IS CLOUD COMPUTING?
 Cloud computing is the use
  of computing resources (hardware and software)
  that are delivered as a service over a network.
 The name comes from the use of a cloud-shaped
  symbol as an representation for the complex
  infrastructure it contains in system diagrams.
 Cloud computing entrusts remote services with a
  user's data, software and computation
TYPES OF CLOUD COMPUTING
 Infrastructure as a service (IaaS)
 Platform as a service (PaaS)
 Software as a service (SaaS)
 Network as a service (NaaS)
 Storage as a service (STaaS)
 Security as a service (SECaaS)
 Data as a service (DaaS)
 Desktop as a service (DaaS )
 Database as a service (DBaaS)
 Test environment as a service (TEaaS)
 API as a service (APIaaS)
ADVANTAGES OF CLOUD COMPUTING
 Improves the speed of your work
 Cost effective

 Device and location independence

 Reliable

 Scalability and elasticity

 Security

 Easy mantainance
TYPES OF CLOUDS
 Public cloud
 Community cloud

 Hybrid cloud

 Private cloud
COMPARISON BETWEEN PRIVATE AND PUBLIC
CLOUDS

                          Public cloud           Private cloud

      Initial cost   Typically zero        Typically high

    Running cost     Predictiable          Unpredictable

    Customization    Impossible            Possible

                     No (Host has access
       Privacy                             Yes
                     to the data)

    Single sign-on   Impossible            Possible

                     Easy while within
     Scaling up                            Laborious but no limits
                     defined limits
DISADVANTAGES
 Privacy ( in public clouds)
 Legal problems

 Sustainability

 Abuse
Cloud computing

More Related Content

What's hot

cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encryptedDevanandPatil6
 
The Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsThe Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsCA API Management
 
6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private cloudsDrRajapraveenkN
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
20N2012- Is there any danger or risk in Green?
20N2012- Is there any danger or risk in Green?20N2012- Is there any danger or risk in Green?
20N2012- Is there any danger or risk in Green?Oya Şanlı
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
Enadoc how does it work
Enadoc how does it workEnadoc how does it work
Enadoc how does it workLars Jeppesen
 
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac SobańskichIT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac SobańskichFoundation IT Leader Club Poland
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Using Tags to adress big data and mobile challanges
Using Tags to adress big data and mobile challangesUsing Tags to adress big data and mobile challanges
Using Tags to adress big data and mobile challangesLars Jeppesen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 

What's hot (20)

cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encrypted
 
The Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsThe Latest in Cloud Computing Standards
The Latest in Cloud Computing Standards
 
6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private clouds
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
20N2012- Is there any danger or risk in Green?
20N2012- Is there any danger or risk in Green?20N2012- Is there any danger or risk in Green?
20N2012- Is there any danger or risk in Green?
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
True IDC Share
True IDC ShareTrue IDC Share
True IDC Share
 
Enadoc how does it work
Enadoc how does it workEnadoc how does it work
Enadoc how does it work
 
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac SobańskichIT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Using Tags to adress big data and mobile challanges
Using Tags to adress big data and mobile challangesUsing Tags to adress big data and mobile challanges
Using Tags to adress big data and mobile challanges
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 

Viewers also liked

Back that *aa s up – bridging multiple clouds for bursting and redundancy
Back that *aa s up – bridging multiple clouds for bursting and redundancyBack that *aa s up – bridging multiple clouds for bursting and redundancy
Back that *aa s up – bridging multiple clouds for bursting and redundancyRightScale
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Microservices - ALM Roadshow 2015
Microservices - ALM Roadshow 2015Microservices - ALM Roadshow 2015
Microservices - ALM Roadshow 2015Renato Groff
 
Roq.ad - NOAH16 Berlin
Roq.ad - NOAH16 BerlinRoq.ad - NOAH16 Berlin
Roq.ad - NOAH16 BerlinNOAH Advisors
 
[Webinar] An Hour with the CTO: All About APIs and the Nuxeo Platform
[Webinar] An Hour with the CTO: All About APIs and the Nuxeo Platform[Webinar] An Hour with the CTO: All About APIs and the Nuxeo Platform
[Webinar] An Hour with the CTO: All About APIs and the Nuxeo PlatformNuxeo
 
Microservices and Azure App Services
Microservices and Azure App ServicesMicroservices and Azure App Services
Microservices and Azure App ServicesDamir Dobric
 

Viewers also liked (7)

Back that *aa s up – bridging multiple clouds for bursting and redundancy
Back that *aa s up – bridging multiple clouds for bursting and redundancyBack that *aa s up – bridging multiple clouds for bursting and redundancy
Back that *aa s up – bridging multiple clouds for bursting and redundancy
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Microservices - ALM Roadshow 2015
Microservices - ALM Roadshow 2015Microservices - ALM Roadshow 2015
Microservices - ALM Roadshow 2015
 
Roq.ad - NOAH16 Berlin
Roq.ad - NOAH16 BerlinRoq.ad - NOAH16 Berlin
Roq.ad - NOAH16 Berlin
 
[Webinar] An Hour with the CTO: All About APIs and the Nuxeo Platform
[Webinar] An Hour with the CTO: All About APIs and the Nuxeo Platform[Webinar] An Hour with the CTO: All About APIs and the Nuxeo Platform
[Webinar] An Hour with the CTO: All About APIs and the Nuxeo Platform
 
Azure app services API apps
Azure app services API appsAzure app services API apps
Azure app services API apps
 
Microservices and Azure App Services
Microservices and Azure App ServicesMicroservices and Azure App Services
Microservices and Azure App Services
 

Similar to Cloud computing

The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industriesdirkbeth
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Building and Deploying OpenSplice DDS Based Cloud Messaging
Building and Deploying OpenSplice DDS Based Cloud Messaging Building and Deploying OpenSplice DDS Based Cloud Messaging
Building and Deploying OpenSplice DDS Based Cloud Messaging Angelo Corsaro
 
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012ProductCamp Boston
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
How DaaS Is a Secure Option For Businesses
How DaaS Is a Secure Option For Businesses How DaaS Is a Secure Option For Businesses
How DaaS Is a Secure Option For Businesses Yuvraj Jain
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remediesGiuseppe Paterno'
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Privafy CloudEdge
Privafy CloudEdgePrivafy CloudEdge
Privafy CloudEdgePrivafy
 
Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011Moullet
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computingJuber Mangure
 
100108 Cloud Age Kawauso
100108 Cloud Age Kawauso100108 Cloud Age Kawauso
100108 Cloud Age Kawausomiyamura
 
100108 Cloud Age Kawauso
100108 Cloud Age Kawauso100108 Cloud Age Kawauso
100108 Cloud Age Kawausomiyamura
 
100108 Cloud Age Kawauso
100108 Cloud Age Kawauso100108 Cloud Age Kawauso
100108 Cloud Age Kawausomiyamura
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
Cloudop security
Cloudop securityCloudop security
Cloudop securitywardspan
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudOnline Tech
 
Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7CA API Management
 

Similar to Cloud computing (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Building and Deploying OpenSplice DDS Based Cloud Messaging
Building and Deploying OpenSplice DDS Based Cloud Messaging Building and Deploying OpenSplice DDS Based Cloud Messaging
Building and Deploying OpenSplice DDS Based Cloud Messaging
 
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
How DaaS Is a Secure Option For Businesses
How DaaS Is a Secure Option For Businesses How DaaS Is a Secure Option For Businesses
How DaaS Is a Secure Option For Businesses
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Privafy CloudEdge
Privafy CloudEdgePrivafy CloudEdge
Privafy CloudEdge
 
Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computing
 
100108 Cloud Age Kawauso
100108 Cloud Age Kawauso100108 Cloud Age Kawauso
100108 Cloud Age Kawauso
 
100108 Cloud Age Kawauso
100108 Cloud Age Kawauso100108 Cloud Age Kawauso
100108 Cloud Age Kawauso
 
100108 Cloud Age Kawauso
100108 Cloud Age Kawauso100108 Cloud Age Kawauso
100108 Cloud Age Kawauso
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Cloudop security
Cloudop securityCloudop security
Cloudop security
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7
 

Cloud computing

  • 1. CLOUD COMPUTING A project by Haniel Zadok
  • 2. WHAT IS CLOUD COMPUTING?  Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network.  The name comes from the use of a cloud-shaped symbol as an representation for the complex infrastructure it contains in system diagrams.  Cloud computing entrusts remote services with a user's data, software and computation
  • 3.
  • 4. TYPES OF CLOUD COMPUTING  Infrastructure as a service (IaaS)  Platform as a service (PaaS)  Software as a service (SaaS)  Network as a service (NaaS)  Storage as a service (STaaS)  Security as a service (SECaaS)  Data as a service (DaaS)  Desktop as a service (DaaS )  Database as a service (DBaaS)  Test environment as a service (TEaaS)  API as a service (APIaaS)
  • 5. ADVANTAGES OF CLOUD COMPUTING  Improves the speed of your work  Cost effective  Device and location independence  Reliable  Scalability and elasticity  Security  Easy mantainance
  • 6. TYPES OF CLOUDS  Public cloud  Community cloud  Hybrid cloud  Private cloud
  • 7. COMPARISON BETWEEN PRIVATE AND PUBLIC CLOUDS Public cloud Private cloud Initial cost Typically zero Typically high Running cost Predictiable Unpredictable Customization Impossible Possible No (Host has access Privacy Yes to the data) Single sign-on Impossible Possible Easy while within Scaling up Laborious but no limits defined limits
  • 8. DISADVANTAGES  Privacy ( in public clouds)  Legal problems  Sustainability  Abuse