[go: up one dir, main page]

0% found this document useful (0 votes)
21 views25 pages

Slide 01 - Cloud Computing Introduction

The document provides an overview of cloud computing, defining it as a model for on-demand access to shared computing resources. It discusses how cloud computing works, its architecture, key characteristics, service models, and deployment methods, highlighting benefits such as scalability, cost efficiency, and improved reliability. Additionally, it addresses the pros and cons of cloud computing and outlines factors for adoption and main concerns.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views25 pages

Slide 01 - Cloud Computing Introduction

The document provides an overview of cloud computing, defining it as a model for on-demand access to shared computing resources. It discusses how cloud computing works, its architecture, key characteristics, service models, and deployment methods, highlighting benefits such as scalability, cost efficiency, and improved reliability. Additionally, it addresses the pros and cons of cloud computing and outlines factors for adoption and main concerns.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Security and Compliance in the

Cloud

Cloud
Computing
Introduction
Security and Compliance in the Cloud : Cloud Computing Introduction 1
Objectives Overview

How it works and Architecture and


Cloud Computing
Sharing Key
and its Definition
Comparison Characteristics

Service Model –
Why use Cloud Adoption Modes,
Layers and
Computing? Pros Selection Factors
Deployment
& Cons and Concern
Models

Security and Compliance in the Cloud : Cloud Computing Introduction 2


Cloud Computing

Security and Compliance in the Cloud : Cloud Computing Introduction 3


Definition
The National Institute of Standards and
Technology (NIST) provides a concise and
specific definition:

 Cloud computing is a model for enabling convenient,


on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.
Security and Compliance in the Cloud : Cloud Computing Introduction 4
How it Works

 Utilizes the network as a means to connect user end


point to resources that are centralized in a data center.
 The data center may by accessed via the internet or a
company network, or both.
 Allows access from a variety of end points such as a
mobile phone, a PC or a tablet.
 Cloud services may be designed to be vendor agnostic,
working equally well with Linux, Mac and PC platforms.

Security and Compliance in the Cloud : Cloud Computing 5


Introduction
How it Works continue…
 Allows access from any internet connected location,
allowing Telecommuting, and Outsourcing.

 A user endpoint with minimal software requirements


may submit a task for processing. The service provider
may pool the processing power of multiple remote
computers in "the cloud" to achieve the task, such as
data warehousing of hundreds of terabytes, managing
and synchronizing multiple documents online, or
computationally intensive work.
Security and Compliance in the Cloud : Cloud Computing 6
Introduction
Comparison

Cloud computing shares characteristics with:

 Autonomic computing
 Client–server model
 Smart Grid Computing
 Mainframe computer
 Utility computing
 Peer-to-peer
 Service-oriented computing
 Grid Computing
Security and Compliance in the Cloud : Cloud Computing Introduction 7
Architecture

 Involves multiple components communicating with


each other over application programming interfaces,
usually web services and 3-tier architecture.

 Multiple programs each doing one thing well and


working together over universal interfaces.

 Complexity is controlled and the resulting systems are


more manageable than their monolithic counterparts.

Security and Compliance in the Cloud : Cloud Computing Introduction 8


Architecture continue…
The two most significant components of cloud
computing architecture are known as the front end
and the back end.

 The front end is the part seen by the client, i.e. the
computer user. This includes the client’s network and
applications used to access the cloud via a user interface
such as a web browser.
 The back end of the cloud computing architecture is the
‘cloud’ itself, comprising various computers, servers and
data storage devices.

Security and Compliance in the Cloud : Cloud Computing Introduction 9


Architecture continue…

Security and Compliance in the Cloud : Cloud Computing Introduction 10


Key characteristics
 Agility improves with users' ability to rapidly and
inexpensively re-provision technological infrastructure
resources.
 Application Programming Interface (API) accessibility to
software that enables machines to interact with cloud
software in the same way the user interface facilitates
interaction between humans and computers.
 Cost is claimed to be greatly reduced and in a public
cloud delivery model capital expenditure is converted
to operational expenditure.

Security and Compliance in the Cloud : Cloud Computing Introduction 11


Key characteristics continue…
 Device and location independence enable users to
access systems using a web browser regardless of their
location or what device they are using
 Multi-tenancy enables sharing of resources and costs
across a large pool of users thus allowing for:
 Centralization of infrastructure in locations with
lower costs
 Peak-load capacity increases
 Utilization and efficiency improvements for systems
that are often only 10–20% utilized.
Security and Compliance in the Cloud : Cloud Computing Introduction 12
Key characteristics continue…
 Reliability is improved if multiple redundant sites are
used, which makes cloud computing suitable for
business continuity and disaster recovery.
 Scalability via dynamic "on-demand" provisioning of
resources on a fine-grained, self-service basis near
real-time.
 Performance is monitored, and consistent and loosely
coupled architectures are constructed using web
services as the system interface.
 Security could improve due to centralization of data.
Security and Compliance in the Cloud : Cloud Computing Introduction 13
Service Models

• There are three types of the cloud:

 Infrastructure as a Service (IaaS)


 Platform as a Service (PaaS)
 Software as a Service (SaaS)

Security and Compliance in the Cloud : Cloud Computing Introduction 14


Layers
 Client

 Application

 Platform

 Infrastructure

 Server

Security and Compliance in the Cloud : Cloud Computing Introduction 15


Deployment Methods
 Public cloud
 Community cloud
 Hybrid cloud and hybrid IT delivery
 Combined cloud
 Private cloud

Security and Compliance in the Cloud : Cloud Computing Introduction 16


Why use cloud computing??
 Website traffic fluctuates.
 Visitors expect steady, fast performance regardless.
 An infrastructure able to handle peak traffic requires capital
investment.
 No matter how big you build it, it still may not be enough.
 Having to choose between overspending or under-provisioning is a
classic dilemma.

By deploying your web application in the cloud, you can avoid this
dilemma. You can eliminate the upfront fixed investment, and still gain
access to compute resources to meet peak loads with on demand
scalability, while still paying only for the compute time you actually
use.

Security and Compliance in the Cloud : Cloud Computing Introduction 17


Why use cloud computing

Security and Compliance in the Cloud : Cloud Computing Introduction 18


Why use cloud computing continue…

Security and Compliance in the Cloud : Cloud Computing Introduction 19


Pros and Cons

Security and Compliance in the Cloud : Cloud Computing Introduction 20


Adoption of Cloud Computing

Security and Compliance in the Cloud : Cloud Computing Introduction 21


Selection Factors

Security and Compliance in the Cloud : Cloud Computing Introduction 22


Main Concerns

Security and Compliance in the Cloud : Cloud Computing Introduction 23


Questions?

Security and Compliance in the Cloud : Cloud Computing Introduction 24


Reading & Reference Material

• Guide to Security Assurance for Cloud Computing


(2015), by Shao Ying Zhu, Richard Hill and
Marcello Travoti
– Chapter ***

Security and Compliance in the Cloud : Cloud Computing Introduction 25

You might also like