Source: Wikimedia Commons file under CCA-SA 3.0 Unported license
Cloud Computing – Service models Cloud service providers • Microsoft Azure • Amazon Web Services • Google Cloud Platform • IBM Cloud • Rackspace • Verizon cloud Cloud computing comparison – Client server model – Grid computing – Fog computing – Mainframe computer – Utility computing – Peer-to-peer – Green computing – Cloud sandbox Cloud computing - characteristics – Cost reductions – Access from anywhere – Agile and easy to maintain – Multi-Tenancy – Performance – Productivity – Reliability – Scalability and elasticity – Security NIST - Definition The NIST's definition of cloud computing identifies "five essential characteristics": – On-demand self-service – Broad network access – Resource pooling – Rapid elasticity – Measured service NIST - National Institute of Standards and Technology Cloud Computing – Service models - IaaS
Infrastructure as a service (IaaS)
Cloud Computing – Service models - PaaS
Platform as a service (PaaS)
Cloud Computing – Service models - SaaS
Software as a service (SaaS)
Cloud Computing – Cloud clients Cloud Computing – Deployment models Hybrid cloud definition - Gartner • Gartner defines a hybrid cloud service as a cloud computing service that is composed of some combination of private, public and community cloud services. • It allows one to extend either the capacity or the capability of a cloud service, by aggregation, integration or customization with another cloud service. Cloud Computing –Architecture • Cloud architecture is the software systems involved in the delivery of cloud computing using multiple cloud components. • Cloud engineering is the application of engineering disciplines to cloud computing. Source: CCA-SA 4.0 license by Sam Johnston Security and privacy in cloud Cloud computing poses privacy concerns like • The service provider can access the data that is in the cloud. • Accidentally or deliberately alter or even delete information. • Share information with third parties for the purposes of law enforcement even without a warrant. Countermeasures • Check agreements on permissions and policies. • Encrypt data.