Professional Documents
Culture Documents
Basics of Cloud Computing
Basics of Cloud Computing
Basics of Cloud Computing
Cloud Computing
Basics of Cloud Computing
A S S T. P R O F. H A R S H K A N TA W A L A
C O M P U T E R E N G I N E E R I N G D E P T,
G . H . P AT E L C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y harshkantawala@gcet.ac.in
ASST. PROF. HARSH KANTAWALA 2/8/2023 1
Introduction
❑ It is the use of remote servers on the internet to store manage and process data rather than local
servers.
❑ In the cloud model, the provider hosts, manages and maintains the intranet software; the
customer just pays a licensing fee and uses it on demand, with none of the operational overhead.
❑ In the cloud model, the provider hosts, manages and maintains the intranet software; the
customer just pays a licensing fee and uses it on demand, with none of the operational overhead.
❑ You host it in your own data center and shoulder all the associated costs and burdens.
❑ That includes purchasing and provisioning the hardware and other infrastructure that the
software runs on; installing, testing and deploying the software; maintaining and upgrading it;
applying patches and securing it; expanding capacity as needed as your usage grows.
❑ Unlimited storage capacity: Cloud offers us a huge amount of storing capacity for storing our
important data such as documents, images, audio, video, etc. in one place.
❑ Data security: Data security is one of the biggest advantages of cloud computing. Cloud offers
many advanced features related to security and ensures that data is securely stored and handled.
❑ Vendor lock-in: Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may
face problems when transferring their services from one vendor to another. As different vendors
provide different platforms, that can cause difficulty moving from one cloud to another.
❑ Security: Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be aware that you will
be sending all your organization's sensitive information to a third party, i.e., a cloud computing
service provider. While sending the data on the cloud, there may be a chance that your
organization's information is hacked by Hackers.
❑ The process in which data is being deleted, corrupted, and unreadable by a user, software, or
application.
❑ Data loss occurs when our sensitive data is somebody else's hands, one or more data elements
can not be utilized by the data owner, hard disk is not working properly, and software is not
updated.
❑ APIs are the easiest way to communicate with most of the cloud services.
❑ These services can be accessed by third parties, so there may be a chance that these services
easily harmed and hacked by hackers.
❑ Organizations may face problems when transferring their services from one vendor to another.
❑ As different vendors provide different platforms, that can cause difficulty moving one cloud to
another.
❑ IT staff must require the extra capability and skills to manage, integrate, and maintain the data to
the cloud.
❑ It can store the password, your personal information such as images, emails, and business
documents in the memory of other running programs.
❑ Mostly, DoS attackers target web servers of large organizations such as banking sectors, media
companies, and government organizations.
❑ To recover the lost data, DoS attackers charge a great deal of time and money to handle the data.
❑ It is the process in which individual user's or organization's cloud account (bank account, e-mail
account, and social media account) is stolen by hackers.
❑ Private Cloud
❑ Hybrid Cloud
❑ Community Cloud
❑ Public cloud is a huge data center that offers the same services to all its users. The services are
accessible for everyone and much used for the consumer segment.
❑ Public cloud benefits: Low investment hurdle : Pay for what you use, Good test/development
environment for applications that scale to many servers
❑ Public cloud risks: Security concerns: Multi-tenancy and transfers over the Internet, IT
organization may react negatively to loss of control over data center function
Public cloud infrastructure is offered via web applications and Private cloud infrastructure is dedicated to a single
also as web services over Internet to the public. organization.
Azure, Amazon Web Services, Google App Engine and An example of the Private Cloud is NIRIX's one Server with
Force.com are a few examples of public clouds dedicated servers
❑ Simply put, SaaS is a method for delivering software that provides remote access to software as a
web based service. The software service can be purchased with a monthly fee and pay as you go.
❑ Saas alleviates the burden of software maintenance/support but users relinquish control over
software versions and requirements.