SlideShare uma empresa Scribd logo
1 de 6
Business implementation and Security Concerns of “Cloud
                         Computing”

          Qaid Johar Abbasi Sodawala, Rahul Telang, (MCA II Year)
                  & Prof. Sham S. Malgikar, Asst Professor
  JSPM’s Jayawant Institute of Computer Application, Tathawade, Pune.
     Mail: shammalgikar@gmail.com,quaidjohar.sodawala@gmail.com



Abstract:

      Cloud computing is boasted as the next big thing in enterprise IT. The
corporate data centers and on premise software will not shed their light soon but
"the clouds" will have growing impact on enterprise IT and business activities in
many small and large organizations.

      The paper attempts to explore the corporate implementation of cloud
computing and in how many ways it can be done. Also a very concerning issues
regarding      cloud      computing       security      are       discussed.

-------------------------------------------------------------------------------------------------------------

Introduction:
                                                          computing can be understood as more of a
Few years back when internet was just                     service rather than a product.
born, business activities moved at very slow
pace. Now in twenty first century the pace                What is cloud computing?
of business is much quicker and it continues
to increase as the constant stream of new                 Cloud       computing       is    an    emerging
technologies make their way to stimulate                  computing model by which users can gain
business processes.                                       access to their applications from anywhere,
                                                          through any connected device. A user-
Cloud as a metaphor for "internet" is a
                                                          centric interface makes the cloud
combination of various servers and
                                                          infrastructure supporting the applications
networks which is under veil to provide
                                                          transparent to users. The applications
services like computation, software, data
                                                          reside in massively scalable data centers
access and storage to end user hiding its
                                                          where computational resources can be
actual physical location and configuration of
                                                          dynamically provisioned and shared to
the system that delivers the service. Cloud
achieve significant scalability. A strong         resources are optimally leveraged to
service management platform is build, so         provide innovative services over the Web,
that management costs of adding more IT          and servers are provisioned in accordance
resources to the cloud can be significantly       with the logical needs of the service using
lower than those associated with alternate       advanced, automated tools. The cloud then
infrastructures.                                 enables the service creators, program
                                                 administrators and others to use these
Why cloud:                                       services via a Web-based interface that
                                                 abstracts away the complexity of the
   1. Scalability:
                                                 underlying dynamic infrastructure.
      Servers can easily grow or shrink as
      per demand                                         The infrastructure management
                                                 methodology enables IT organizations to
   2. Cost:                                      manage large numbers of highly virtualized
        It helps keep the cost down for both     resources as a single large resource. It also
        the users and website owners. Also
                                                 allows IT organizations to massively
        for the users, they can access it from
        any computer and still have the file     increase their data center resources
        they need. For the owners, they do       without significantly increasing the number
        not need to reproduce the software       of people traditionally required to maintain
        and ship it out. They just rent the      that increase.
        server space.
                                                         For organizations currently using
   3. Instant:                                   traditional infrastructures, a cloud will
      The scalability can be achieved            enable users to consume IT resources in the
      instantly. It’s like controlling light     data center in ways that were never
      brightness by regulator.                   available before. Companies that employ
   4. Mobility:                                  traditional data center management
      User can access their data                 practices know that making IT resources
      anywhere.                                  available to an end user can be time-
                                                 intensive. It involves many steps, such as
                                                 procuring hardware; finding raised floor
                                                 space and sufficient power and cooling;
Business value of cloud computing:
                                                 allocating administrators to install operating
                                                 systems, middleware and software;
Cloud    computing is both a business
                                                 provisioning the network; and securing the
delivery model and an infrastructure             environment. Most companies find that this
management methodology. The business             process can take upwards of two to three
delivery model provides a user experience        months. Those IT organizations that are re-
by which hardware, software and network          provisioning existing hardware resources
find that it still takes several weeks to       distinguish between grid computing and
accomplish. A cloud dramatically alleviates    cloud computing.
this problem by implementing automation,
                                               In the 1990s, the concept of virtualization
business workflow and resource abstraction
                                               was expanded beyond virtual servers to
that allows a user to browse a catalog of IT
                                               higher levels of abstraction—the virtual
services, add them to a shopping cart and
                                               platform, including storage and network
submit the order. After an administrator
                                               resources. Utility computing offered
approves the order, the cloud does the rest.
                                               clusters as virtual platforms for computing
This process reduces the time required to
                                               with a metered business model. More
make those resources available to the
                                               recently software as a service (SaaS) has
customer from months to minutes.
                                               raised the level of virtualization to the
Evolution:                                     application, with a business model of
                                               charging not by the resources consumed
       Cloud   computing is an important       but by the value of the application to
                                               subscribers.
topic. However, it is not a revolutionary
new development, but an evolution that         The concept of cloud computing has
has taken place over several decades.          evolved from the concepts of grid, utility
                                               and SaaS. It is an emerging model through
        The trend toward cloud computing
                                               which users can gain access to their
started in the late 1980s with the concept
                                               applications from anywhere, at any time,
of grid computing when, for the first time, a
                                               through their connected devices.
large number of systems were applied to a
single                                         Cloud computing Models:

                                               Basically there are three   types of cloud
                                               computing models which are:

                                                  1. Public.
                                                  2. Private.
                                                  3. Hybrid.

                                                      Each type of cloud computing
                                                      model—public, private or hybrid—
                                                      faces different levels of IT risk.

Problem, usually scientific in nature and                    In the private cloud delivery
requiring exceptionally high levels of                model, the cloud owner does not
parallel computation. it’s important to               share resources with any other
company. Private clouds are owned               security and privacy with a minimum
and operated by a single                        investment in fixed IT costs.
organization, delivering IT services
within the constraints of their own      Cloud Service models:
network perimeter.
                                         In   addition   to   the   different   cloud
         In    the    public     cloud   computing models, there are distinctions
computing model, IT activities and       among the most common cloud service
functions are provided as a service      models as shown in Figure. Available to
that can be billed on a pay-per-use      anyone with Internet access, cloud service
or subscription basis via the Internet   models include:
from external suppliers, using
resources not owned by the
consumer. The sharing of IT
resources in a public, multitenant
environment can help improve
utilization rates and can reduce
costs significantly while maintaining
access to high quality technology. In
a public cloud, an organization rents
IT resources instead of having to
invest in their own physical IT
infrastructure or maintain under-
                                         ● Software as a Service (SaaS) cloud
utilized equipment to service peak
                                         model—Enables software to be delivered
loads. Instead, they can scale usage
                                         from a host source over a network as
up or down, according to need, with
                                         opposed to installations or implementations
costs directly proportional to need.
                                         ● Platform as a Service (PaaS) cloud
       Many organizations embrace
                                         model—Enables operating systems and
both public and private cloud
                                         middleware services to be delivered from a
computing by integrating the two
                                         managed source over a network
models into hybrid clouds. These
hybrids are designed to meet             ● Infrastructure as a Service (IaaS) cloud
specific business and technology          model—Enables the entire infrastructure to
requirements, so that activities and     be delivered as a service over a network,
tasks are allocated to traditional IT,   including storage, routers, virtual systems,
external or internal clouds, as          hardware and servers.
appropriate, helping to optimize
Cloud computing and security: the                cloud provider to deliver secure systems.
grand challenge:                                 The clients do not have access to the
                                                 hypervisor layer—the underlying operating
While     cloud   computing     models    are    system that manages one or more virtual
                                                 machines that run on a physical machine—
attractive because of their flexibility and
                                                 which typically does not share the virtual
cost effectiveness, certain challenges must
                                                 network segment with any of the other
be addressed in order to provide a viable
                                                 hosted virtual machines to avoid network-
option to traditional data services. First and
                                                 based intrusions. The cloud provider may
foremost is the issue of security. The
                                                 also separately offer an optional virtual
externalized aspect of outsourcing can
                                                 private network (VPN) capability so that the
make it harder to maintain data integrity
                                                 client can help ensure a protected network
and privacy, support data and service
                                                 that is not directly visible for Internet-based
availability, demonstrate compliance, and
                                                 attackers. It is the client’s responsibility to
secure highly available access to
                                                 maintain the patch level for all provisioned
applications and information. In short,
                                                 virtual machines after the initial
cloud computing can present an added level
                                                 deployment as well as a properly configured
of risk.
                                                 VPN to shield their valuable data and
Although cloud computing can shift some          infrastructure. If a client, however, chooses
control over data and operations from the        to refrain from purchasing a VPN option or
client organization to its cloud provider        does not patch any of their web facing
much in the same way organizations entrust       virtual machines, the machines can be
part of their IT operations to outsourcing       vulnerable.
companies—operating a secure cloud-
                                                 If an organization decides to implement
based IT environment is, after all, a shared
                                                 these mechanisms in a private cloud using
responsibility. Even basic tasks, such as
                                                 their internal IT department, they will rely
applying patches and configuring network
                                                 on their business policies to govern aspects
security, are the responsibility of both the
                                                 like data confidentiality, access control to
cloud service provider and consumer. Let us
                                                 applications and systems, and so on.
examine an example for both public and
                                                 Employees will be entrusted to handle the
private cloud.
                                                 IT infrastructure because they are
In an IaaS model it is the cloud provider’s      recertified against the business policies on
responsibility to offer a number of pre-         a regular basis. In this environment
configured virtual machines that constantly       organizations have to deal with the risk of
have to be kept updated with the latest          unauthorized privileged user access, data
security patches. When clients provision the     loss prevention, malicious intrusions and
virtual machines, they have to trust the         unintentional user errors. They also have to
                                                 observe and comply with internal or
regulatory guidelines. If the organization          a public cloud deployment, and that
decides to implement these mechanisms in            contracts are in place to guarantee localized
a public cloud using the cloud provider             data storage.
discussed in the example above, they will
rely on written business agreements to              Reference:
govern the exact same aspects, as explained         Web reference:
in the private cloud example. They also
have to deal with the same risks and comply         http://www.ibm.com/cloud-computing/us/en/
with the same internal or regulatory
                                                    www.wikipedia.org
guidelines.
                                                    http://thecloudtutorial.com/cloudtypes.html
Other aspects about cloud computing also
require a major reassessment of security
and risk. Inside the cloud, it is often difficult
to physically locate where data is stored.
Security processes that were once visible
are now hidden behind layers of
abstraction. This lack of visibility can create
a number of security and compliance issues
and may prohibit certain IT use cases to be
implemented using a strictly public cloud
environment. Clients need to ensure that
they can select a physical location even for

Mais conteúdo relacionado

Mais procurados

www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Cloud for dummies easycloud
Cloud for dummies   easycloudCloud for dummies   easycloud
Cloud for dummies easycloudAlessandro Greco
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudMicrosoft Private Cloud
 
Gis In The Cloud
Gis In The CloudGis In The Cloud
Gis In The Cloudfn028791
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
Cloud computing for enterprise
Cloud computing for enterpriseCloud computing for enterprise
Cloud computing for enterprisePravin Asar
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant guptaPrashant Gupta
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam readyHai Nguyen
 
Cloud computing
Cloud computingCloud computing
Cloud computingJawhar Ali
 
Tareq Alemadi - Developing enterprise cloud computing strategy
Tareq Alemadi - Developing enterprise cloud computing strategyTareq Alemadi - Developing enterprise cloud computing strategy
Tareq Alemadi - Developing enterprise cloud computing strategyGlobal Business Events
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 

Mais procurados (20)

www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud for dummies easycloud
Cloud for dummies   easycloudCloud for dummies   easycloud
Cloud for dummies easycloud
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
 
Gis In The Cloud
Gis In The CloudGis In The Cloud
Gis In The Cloud
 
Cloud building
Cloud buildingCloud building
Cloud building
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing for enterprise
Cloud computing for enterpriseCloud computing for enterprise
Cloud computing for enterprise
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam ready
 
121 124
121 124121 124
121 124
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Tareq Alemadi - Developing enterprise cloud computing strategy
Tareq Alemadi - Developing enterprise cloud computing strategyTareq Alemadi - Developing enterprise cloud computing strategy
Tareq Alemadi - Developing enterprise cloud computing strategy
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 

Destaque

Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkSalam Shah
 
Manajemen Resiko dalam Cloud Computing
Manajemen Resiko dalam Cloud ComputingManajemen Resiko dalam Cloud Computing
Manajemen Resiko dalam Cloud ComputingAndina Nuringgani
 
Cloud Computing - SWOT Analysis
Cloud Computing - SWOT AnalysisCloud Computing - SWOT Analysis
Cloud Computing - SWOT Analysistechieguy85
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business ModelsMourad ZEROUKHI
 
Amazon Web Services SWOT & Competitor Analysis
Amazon Web Services SWOT & Competitor AnalysisAmazon Web Services SWOT & Competitor Analysis
Amazon Web Services SWOT & Competitor AnalysisBessie Chu
 
CLOUD COMPUTING IMPLEMENTATION ORGANIZATIONAL
CLOUD COMPUTING IMPLEMENTATION ORGANIZATIONALCLOUD COMPUTING IMPLEMENTATION ORGANIZATIONAL
CLOUD COMPUTING IMPLEMENTATION ORGANIZATIONALCorey Perkins
 

Destaque (9)

Oajis 21 1405
Oajis 21 1405Oajis 21 1405
Oajis 21 1405
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
Manajemen Resiko dalam Cloud Computing
Manajemen Resiko dalam Cloud ComputingManajemen Resiko dalam Cloud Computing
Manajemen Resiko dalam Cloud Computing
 
Research 016
Research 016Research 016
Research 016
 
Cloud Computing - SWOT Analysis
Cloud Computing - SWOT AnalysisCloud Computing - SWOT Analysis
Cloud Computing - SWOT Analysis
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
 
Amazon Web Services SWOT & Competitor Analysis
Amazon Web Services SWOT & Competitor AnalysisAmazon Web Services SWOT & Competitor Analysis
Amazon Web Services SWOT & Competitor Analysis
 
CLOUD COMPUTING IMPLEMENTATION ORGANIZATIONAL
CLOUD COMPUTING IMPLEMENTATION ORGANIZATIONALCLOUD COMPUTING IMPLEMENTATION ORGANIZATIONAL
CLOUD COMPUTING IMPLEMENTATION ORGANIZATIONAL
 

Semelhante a Business implementation of Cloud Computing

Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud ComputingLiming Liu
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introductionguest90f660
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud ComputingJIM MUKERJEE
 
cloude computing report
cloude computing reportcloude computing report
cloude computing reportKrishnalal Kj
 
Accenture 6 questions_executives_should_ask_about_cloud_computing
Accenture 6 questions_executives_should_ask_about_cloud_computingAccenture 6 questions_executives_should_ask_about_cloud_computing
Accenture 6 questions_executives_should_ask_about_cloud_computingNgy Ea
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxHODIT12
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptPravesh ARYA
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfSANDY4772
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxMiltonMolla1
 
Cloud computing project report
Cloud computing project reportCloud computing project report
Cloud computing project reportNaveed Farooq
 

Semelhante a Business implementation of Cloud Computing (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
understanding and Leveraging Cloud Xcomputing
understanding and Leveraging Cloud Xcomputingunderstanding and Leveraging Cloud Xcomputing
understanding and Leveraging Cloud Xcomputing
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
119 125
119 125119 125
119 125
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
cloude computing report
cloude computing reportcloude computing report
cloude computing report
 
Accenture 6 questions_executives_should_ask_about_cloud_computing
Accenture 6 questions_executives_should_ask_about_cloud_computingAccenture 6 questions_executives_should_ask_about_cloud_computing
Accenture 6 questions_executives_should_ask_about_cloud_computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Cloud computing project report
Cloud computing project reportCloud computing project report
Cloud computing project report
 
D045031724
D045031724D045031724
D045031724
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Business implementation of Cloud Computing

  • 1. Business implementation and Security Concerns of “Cloud Computing” Qaid Johar Abbasi Sodawala, Rahul Telang, (MCA II Year) & Prof. Sham S. Malgikar, Asst Professor JSPM’s Jayawant Institute of Computer Application, Tathawade, Pune. Mail: shammalgikar@gmail.com,quaidjohar.sodawala@gmail.com Abstract: Cloud computing is boasted as the next big thing in enterprise IT. The corporate data centers and on premise software will not shed their light soon but "the clouds" will have growing impact on enterprise IT and business activities in many small and large organizations. The paper attempts to explore the corporate implementation of cloud computing and in how many ways it can be done. Also a very concerning issues regarding cloud computing security are discussed. ------------------------------------------------------------------------------------------------------------- Introduction: computing can be understood as more of a Few years back when internet was just service rather than a product. born, business activities moved at very slow pace. Now in twenty first century the pace What is cloud computing? of business is much quicker and it continues to increase as the constant stream of new Cloud computing is an emerging technologies make their way to stimulate computing model by which users can gain business processes. access to their applications from anywhere, through any connected device. A user- Cloud as a metaphor for "internet" is a centric interface makes the cloud combination of various servers and infrastructure supporting the applications networks which is under veil to provide transparent to users. The applications services like computation, software, data reside in massively scalable data centers access and storage to end user hiding its where computational resources can be actual physical location and configuration of dynamically provisioned and shared to the system that delivers the service. Cloud
  • 2. achieve significant scalability. A strong resources are optimally leveraged to service management platform is build, so provide innovative services over the Web, that management costs of adding more IT and servers are provisioned in accordance resources to the cloud can be significantly with the logical needs of the service using lower than those associated with alternate advanced, automated tools. The cloud then infrastructures. enables the service creators, program administrators and others to use these Why cloud: services via a Web-based interface that abstracts away the complexity of the 1. Scalability: underlying dynamic infrastructure. Servers can easily grow or shrink as per demand The infrastructure management methodology enables IT organizations to 2. Cost: manage large numbers of highly virtualized It helps keep the cost down for both resources as a single large resource. It also the users and website owners. Also allows IT organizations to massively for the users, they can access it from any computer and still have the file increase their data center resources they need. For the owners, they do without significantly increasing the number not need to reproduce the software of people traditionally required to maintain and ship it out. They just rent the that increase. server space. For organizations currently using 3. Instant: traditional infrastructures, a cloud will The scalability can be achieved enable users to consume IT resources in the instantly. It’s like controlling light data center in ways that were never brightness by regulator. available before. Companies that employ 4. Mobility: traditional data center management User can access their data practices know that making IT resources anywhere. available to an end user can be time- intensive. It involves many steps, such as procuring hardware; finding raised floor space and sufficient power and cooling; Business value of cloud computing: allocating administrators to install operating systems, middleware and software; Cloud computing is both a business provisioning the network; and securing the delivery model and an infrastructure environment. Most companies find that this management methodology. The business process can take upwards of two to three delivery model provides a user experience months. Those IT organizations that are re- by which hardware, software and network provisioning existing hardware resources
  • 3. find that it still takes several weeks to distinguish between grid computing and accomplish. A cloud dramatically alleviates cloud computing. this problem by implementing automation, In the 1990s, the concept of virtualization business workflow and resource abstraction was expanded beyond virtual servers to that allows a user to browse a catalog of IT higher levels of abstraction—the virtual services, add them to a shopping cart and platform, including storage and network submit the order. After an administrator resources. Utility computing offered approves the order, the cloud does the rest. clusters as virtual platforms for computing This process reduces the time required to with a metered business model. More make those resources available to the recently software as a service (SaaS) has customer from months to minutes. raised the level of virtualization to the Evolution: application, with a business model of charging not by the resources consumed Cloud computing is an important but by the value of the application to subscribers. topic. However, it is not a revolutionary new development, but an evolution that The concept of cloud computing has has taken place over several decades. evolved from the concepts of grid, utility and SaaS. It is an emerging model through The trend toward cloud computing which users can gain access to their started in the late 1980s with the concept applications from anywhere, at any time, of grid computing when, for the first time, a through their connected devices. large number of systems were applied to a single Cloud computing Models: Basically there are three types of cloud computing models which are: 1. Public. 2. Private. 3. Hybrid. Each type of cloud computing model—public, private or hybrid— faces different levels of IT risk. Problem, usually scientific in nature and In the private cloud delivery requiring exceptionally high levels of model, the cloud owner does not parallel computation. it’s important to share resources with any other
  • 4. company. Private clouds are owned security and privacy with a minimum and operated by a single investment in fixed IT costs. organization, delivering IT services within the constraints of their own Cloud Service models: network perimeter. In addition to the different cloud In the public cloud computing models, there are distinctions computing model, IT activities and among the most common cloud service functions are provided as a service models as shown in Figure. Available to that can be billed on a pay-per-use anyone with Internet access, cloud service or subscription basis via the Internet models include: from external suppliers, using resources not owned by the consumer. The sharing of IT resources in a public, multitenant environment can help improve utilization rates and can reduce costs significantly while maintaining access to high quality technology. In a public cloud, an organization rents IT resources instead of having to invest in their own physical IT infrastructure or maintain under- ● Software as a Service (SaaS) cloud utilized equipment to service peak model—Enables software to be delivered loads. Instead, they can scale usage from a host source over a network as up or down, according to need, with opposed to installations or implementations costs directly proportional to need. ● Platform as a Service (PaaS) cloud Many organizations embrace model—Enables operating systems and both public and private cloud middleware services to be delivered from a computing by integrating the two managed source over a network models into hybrid clouds. These hybrids are designed to meet ● Infrastructure as a Service (IaaS) cloud specific business and technology model—Enables the entire infrastructure to requirements, so that activities and be delivered as a service over a network, tasks are allocated to traditional IT, including storage, routers, virtual systems, external or internal clouds, as hardware and servers. appropriate, helping to optimize
  • 5. Cloud computing and security: the cloud provider to deliver secure systems. grand challenge: The clients do not have access to the hypervisor layer—the underlying operating While cloud computing models are system that manages one or more virtual machines that run on a physical machine— attractive because of their flexibility and which typically does not share the virtual cost effectiveness, certain challenges must network segment with any of the other be addressed in order to provide a viable hosted virtual machines to avoid network- option to traditional data services. First and based intrusions. The cloud provider may foremost is the issue of security. The also separately offer an optional virtual externalized aspect of outsourcing can private network (VPN) capability so that the make it harder to maintain data integrity client can help ensure a protected network and privacy, support data and service that is not directly visible for Internet-based availability, demonstrate compliance, and attackers. It is the client’s responsibility to secure highly available access to maintain the patch level for all provisioned applications and information. In short, virtual machines after the initial cloud computing can present an added level deployment as well as a properly configured of risk. VPN to shield their valuable data and Although cloud computing can shift some infrastructure. If a client, however, chooses control over data and operations from the to refrain from purchasing a VPN option or client organization to its cloud provider does not patch any of their web facing much in the same way organizations entrust virtual machines, the machines can be part of their IT operations to outsourcing vulnerable. companies—operating a secure cloud- If an organization decides to implement based IT environment is, after all, a shared these mechanisms in a private cloud using responsibility. Even basic tasks, such as their internal IT department, they will rely applying patches and configuring network on their business policies to govern aspects security, are the responsibility of both the like data confidentiality, access control to cloud service provider and consumer. Let us applications and systems, and so on. examine an example for both public and Employees will be entrusted to handle the private cloud. IT infrastructure because they are In an IaaS model it is the cloud provider’s recertified against the business policies on responsibility to offer a number of pre- a regular basis. In this environment configured virtual machines that constantly organizations have to deal with the risk of have to be kept updated with the latest unauthorized privileged user access, data security patches. When clients provision the loss prevention, malicious intrusions and virtual machines, they have to trust the unintentional user errors. They also have to observe and comply with internal or
  • 6. regulatory guidelines. If the organization a public cloud deployment, and that decides to implement these mechanisms in contracts are in place to guarantee localized a public cloud using the cloud provider data storage. discussed in the example above, they will rely on written business agreements to Reference: govern the exact same aspects, as explained Web reference: in the private cloud example. They also have to deal with the same risks and comply http://www.ibm.com/cloud-computing/us/en/ with the same internal or regulatory www.wikipedia.org guidelines. http://thecloudtutorial.com/cloudtypes.html Other aspects about cloud computing also require a major reassessment of security and risk. Inside the cloud, it is often difficult to physically locate where data is stored. Security processes that were once visible are now hidden behind layers of abstraction. This lack of visibility can create a number of security and compliance issues and may prohibit certain IT use cases to be implemented using a strictly public cloud environment. Clients need to ensure that they can select a physical location even for