You are on page 1of 16

CBTU presents a course on

Cloud computing
Section: Introduction
Cloud Computing

Source: Wikimedia Commons file under CCA-SA 3.0 Unported license


Cloud Computing – Service models
Cloud service providers
• Microsoft Azure
• Amazon Web Services
• Google Cloud Platform
• IBM Cloud
• Rackspace
• Verizon cloud
Cloud computing comparison
– Client server model
– Grid computing
– Fog computing
– Mainframe computer
– Utility computing
– Peer-to-peer
– Green computing
– Cloud sandbox
Cloud computing - characteristics
– Cost reductions
– Access from anywhere
– Agile and easy to maintain
– Multi-Tenancy
– Performance
– Productivity
– Reliability
– Scalability and elasticity
– Security
NIST - Definition
The NIST's definition of cloud computing identifies "five
essential characteristics":
– On-demand self-service
– Broad network access
– Resource pooling
– Rapid elasticity
– Measured service
NIST - National Institute of Standards and Technology
Cloud Computing – Service models - IaaS

Infrastructure as a service (IaaS)


Cloud Computing – Service models - PaaS

Platform as a service (PaaS)


Cloud Computing – Service models - SaaS

Software as a service (SaaS)


Cloud Computing – Cloud clients
Cloud Computing – Deployment models
Hybrid cloud definition - Gartner
• Gartner defines a hybrid cloud service as a cloud
computing service that is composed of some
combination of private, public and community cloud
services.
• It allows one to extend either the capacity or the
capability of a cloud service, by aggregation,
integration or customization with another cloud
service.
Cloud Computing –Architecture
• Cloud architecture is the software
systems involved in the delivery of cloud
computing using multiple cloud
components.
• Cloud engineering is the application of
engineering disciplines to cloud
computing.
Source: CCA-SA 4.0 license by Sam Johnston
Security and privacy in cloud
Cloud computing poses privacy concerns like
• The service provider can access the data that is in the cloud.
• Accidentally or deliberately alter or even delete information.
• Share information with third parties for the purposes of law
enforcement even without a warrant.
Countermeasures
• Check agreements on permissions and policies.
• Encrypt data.

You might also like