SlideShare a Scribd company logo
1 of 13
Presented By:
Ms Mamta
 Cloud computing is a type of computing that relies
on sharing computing resources rather than having
local servers or personal devices to
handle applications.
 In cloud computing, the word cloud(also phrased
as "the cloud") is used as a metaphor for "the
Internet," so the phrase cloud computing means "a
type of Internet-based computing," where different
services — such as servers, storage and
applications —are delivered to an organization's
computers and devices through the Internet.
Cloud computing security also known as Cloud
Security.
It refers to a broad set of policies, technologies,
and controls deployed to protect data,
applications, and the associated infrastructure
of cloud computing .
1.Security issues faced by cloud providers
2.Security issues faced by their customers
The extensive use of virtualization in
implementing cloud infrastructure brings unique
security concerns for customers or tenants of a
public cloud service
Virtualization alters the relationship between the
OS and underlying hardware , be it computing,
storage or even networking.
1. Internal Cloud
An internal cloud is a cloud computing
service model that is implemented within an
organization's dedicated resources and
infrastructure.
Key Benefits are:
Total cloud security
Reduced infrastructure costs
Reduced hardware requirements
2. External Cloud
An external cloud is a cloud solution
that exists outside of an organization's
physical boundaries. It can be private,
public or community-based, as long as
it is not located on an organization's
property.
Cloud
Security
Controls
Deterrent
Controls
Preventive
Controls
Detective
Controls
Corrective
Controls
Correct security controls should be
implemented according to asset,
threat, and vulnerability risk
assessment matrices. While cloud
security concerns can be grouped into
any number of dimensions these
dimensions have been aggregated into
following general areas:
•Security and Privacy
•Compliance
•Legal issues
•Contractual Issues
Cloud computing offers clear and powerful
benefits to IT organizations of all sizes, but
the path to cloud computing is often cloudy.
With cloud computing, IT resources can scale
almost immediately in response to business
needs and can be delivered under a predictable
(and budget friendly) pay-as-you-go model.
Cloud computing security

More Related Content

What's hot

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 

What's hot (20)

Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private clouds
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 
Firewall
FirewallFirewall
Firewall
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 

Viewers also liked

2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn 2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn
appsforgood2014
 
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
SteveSchneid
 
Aadhar based voting system
Aadhar based voting systemAadhar based voting system
Aadhar based voting system
Nikhilesh Reddy
 

Viewers also liked (17)

Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn 2014 competition entry by Alisha, Alice, Bronwyn
2014 competition entry by Alisha, Alice, Bronwyn
 
One stop
One stopOne stop
One stop
 
CLA Powerpoint
CLA PowerpointCLA Powerpoint
CLA Powerpoint
 
типове положення
типове положеннятипове положення
типове положення
 
типове положення
типове положеннятипове положення
типове положення
 
Final rockinvel Balsamiq's
Final rockinvel Balsamiq'sFinal rockinvel Balsamiq's
Final rockinvel Balsamiq's
 
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
Guide%20 to%20being%20a%20successful%20writer%20after%20transferring[2]
 
LIC PowerPoint
LIC PowerPointLIC PowerPoint
LIC PowerPoint
 
Nancy music communication
Nancy music communicationNancy music communication
Nancy music communication
 
презентація до проекту
презентація до проектупрезентація до проекту
презентація до проекту
 
an introduction to water quality models
an introduction to water quality modelsan introduction to water quality models
an introduction to water quality models
 
Union budget watch 2014 15
Union budget watch 2014 15Union budget watch 2014 15
Union budget watch 2014 15
 
виховна система
виховна системавиховна система
виховна система
 
Licencia de construccion
Licencia de construccionLicencia de construccion
Licencia de construccion
 
Aadhar based voting system
Aadhar based voting systemAadhar based voting system
Aadhar based voting system
 

Similar to Cloud computing security

A220113
A220113A220113
A220113
irjes
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
 

Similar to Cloud computing security (20)

A220113
A220113A220113
A220113
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
G0314043
G0314043G0314043
G0314043
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Scope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptxScope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptx
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Cloud computing security

  • 2.  Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.  In cloud computing, the word cloud(also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications —are delivered to an organization's computers and devices through the Internet.
  • 3. Cloud computing security also known as Cloud Security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing .
  • 4. 1.Security issues faced by cloud providers 2.Security issues faced by their customers
  • 5. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service Virtualization alters the relationship between the OS and underlying hardware , be it computing, storage or even networking.
  • 6.
  • 7. 1. Internal Cloud An internal cloud is a cloud computing service model that is implemented within an organization's dedicated resources and infrastructure. Key Benefits are: Total cloud security Reduced infrastructure costs Reduced hardware requirements
  • 8. 2. External Cloud An external cloud is a cloud solution that exists outside of an organization's physical boundaries. It can be private, public or community-based, as long as it is not located on an organization's property.
  • 10. Correct security controls should be implemented according to asset, threat, and vulnerability risk assessment matrices. While cloud security concerns can be grouped into any number of dimensions these dimensions have been aggregated into following general areas:
  • 11. •Security and Privacy •Compliance •Legal issues •Contractual Issues
  • 12. Cloud computing offers clear and powerful benefits to IT organizations of all sizes, but the path to cloud computing is often cloudy. With cloud computing, IT resources can scale almost immediately in response to business needs and can be delivered under a predictable (and budget friendly) pay-as-you-go model.