You are on page 1of 29

CLOUD

COMPUTING
Which direction will
Cloud Computing take us?
Presenter :Muhd Fauzan
What is cloud computing ?
History
Services on Cloud Computing
Issue Related To Cloud Computing
Cloud Computing in Education
Conclusion
Outline
What is cloud computing ?
What is cloud computing ?
What is cloud computing ?
The "cloud" is a set of different types of hardware and software that work
collectively to deliver many aspects of computing to the end-user as an
online service.
Cloud Computing is the use of hardware and software to deliver a
service over a network (typically the Internet).
With cloud computing, users can access files and use applications from
any device that can access the Internet.
History
when John McCarthy wrote that computation may
someday be organized as a public utility. Then, grid
computing, a concept that originated in the early 1990s as
an idea for making computer power as easy to access as
an electric power grid also contributed to cloud
computing.
The general idea behind the technology dates back to the 1960s,
Source : http://www.telegraph.co.uk/news/obituaries/8851410/John-McCarthy.html
History
One of the first movers in cloud computing was Salesforce.com,
which in 1999 introduced the concept of delivering enterprise
applications via a simple website.

In 2002 Amazon started Amazon Web Services, providing
services like storage, computation and even human intelligence.

The year 2006 also saw the introduction of Amazons Elastic Compute cloud (EC2) as a commercial
web service that allowed small companies and individuals to rent computers on which to run their
own computer applications.

History
Then came Google Docs in 2006,
History
But 2009 marked a key turning point in the evolution of cloud computing, with
the arrival of browser based cloud enterprise applications, with the best known
being Google Apps Working on Google Chrome.
Needs of cloud Computing Services on Cloud Computing
What cloud computing can provide ?
Services on Cloud Computing
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Allow users to run applications and store data online
Each offers a different level of user flexibility and control
Services on Cloud Computing
Software as a Service (SaaS)
Allows user to run existing online application
Example : Google Doc, Gmail, DropBox
Platform as a Service (PaaS)
Allows user to create their own cloud applications using supplier-specific tools and
language
Example : Google App Engine, Windows Azure Platform
Infrastructure as a Service (IaaS)
Allows users to run any applications they please on cloud hardware of their own
choice
Example : Amazon Web Services, GoGrid
Services on Cloud Computing
Issue Related To Cloud Computing
Security and Privacy
Reliability
Intellectual property
Security and Privacy Issue
Where services or data are stored?
Who can access your data?
How the provider protect your data?
Cybercrime on the cloud computing (Example: Hacking,
DDos, etc)

Security and Privacy Issue
Where services or data are stored?
Location of data stored based on your service cloud provider. Some customer
are aware of the danger of letting data control with an outside Cloud Computing
provider.
Who can access your data?
Cloud storage services typically allow you to set one of three settings to control
who can view your files:

private only you can view the files (although the cloud storage provider
may still be able to view your files)
public everyone can view the files without any restriction
shared only people you invite can view the files
How the provider protect your data?
Encrypt your data stored in the server
Provide secure line connection between user and cloud
Ex: using https, Secure Sockets Layer(SSL)
Used Username and Password
What attacks are most likely against cloud computing environments?
Security and Privacy Issue
Type of attack on Cloud Computing
Key Logger - a hardware device or a software program that
records the real time activity of a computer user including the
keyboard keys they press.
Denial-of-service attack (DoS) - make a machine or network
resource unavailable to its intended users
BruteForce Attack - trial and error method used by application
programs to decode encrypted data
Backdoor - access to a computer program that bypasses
security mechanisms.
Source : http://www.washingtontimes.com/news/2013/dec/5/hack-attack-2-million-
facebook-twitter-passwords/
http://www.cnet.com/news/adobe-hack-attack-affected-38-million-accounts/

Hack attack: 2 million Facebook, Twitter passwords stolen (5 December 2013)

The hackers used key logging software that was surreptitiously installed on an
unknown number of computers around the world, data analysts with the cyber security
company Trustwave found, CNN reported. The computer virus has been capturing
account sign-in information for at least a month now, and sending along that data
usernames and passwords to a server thats under the control of the hackers.
Security and Privacy Issue
Adobe hack attack affected 38 million accounts (29 October 2013)

On October 3, Adobe revealed that it had been the victim of an attack that exposed
Adobe customer IDs and encrypted passwords . At the time, the company said that
hackers gained access to encrypted credit card records and login information for
around 3 million users. But the number of affected accounts has turned out to be
much higher.
Can Cloud Computing Effectively Help Prevent Cybercrime?
Security Depends on the Type of Cloud

Security and Privacy Issue
Difficult to determine which nations laws apply to the intellectual property of a cloud
client stored or created in the cloud.
Acts constituting copyright infringement or patent infringement in one jurisdiction may
not rise to the level of infringement in another jurisdiction.
These differences in law between jurisdictions will also affect whether software and
business methods instantiated in the cloud are even eligible for patent protection.
Copyright Issue
Intellectual property
How to solve it
1) Check the storage providers terms and conditions and privacy notice
2) Ask provider about location where the data is stored.
3) What type of encryption does your cloud storage provider can offer.

Data Loss & Leakage
Human error - A employee could overwrite data or accidentally
delete it
File corruption A virus could infect and permanently destroy a
file or many files
Hardware Damage or failure of central processing unit (CPU)
Site- Damage A fire, flood, earthquake or other act of nature
could destroy the servers and render the stored data irretrievable

How to Prevent Data loss?
1. Backup your data stored in cloud
2. Always monitor your data stored.
3. Control number of user that can access to your information .
Reliability
Public and Private Cloud
Public and Private Cloud
Public and Private Cloud
PRIVATE PROS
Can be secured to meet compliance
at almost every level
Private data centers usually
accessible to IT auditors
Customizable to meet an individual
organization's needs, rather than the
mass approach of public clouds

PRIVATE CONS
More expensive to deploy and
maintain than public clouds
May have longer-term commitments
than public clouds
May have less flexibility since
hardware is dedicated to a single
organization
PUBLIC PROS
Less expensive than private clouds
More accessible than private clouds
Short-term or temporary
commitments
Faster to deploy a single user than
private clouds

PUBLIC CONS
Fewer user management controls
Security and uptime might not meet
enterprise compliance standards

Cloud Computing in Education
Easier group collaboration:
Sharing documents leads directly to better collaboration.
Many users do this as it is an important advantages of cloud computing
multiple users can collaborate easily on documents and projects
Device independence.
You are no longer tethered to a single computer or network.
Changes to computers, applications and documents follow you through the
cloud.
Move to a portable device, and your applications and documents are still
available
Improved document format compatibility.
You do not have to worry about the documents you create on your machine
being compatible with other users' applications or OS
There are potentially no format incompatibilities when everyone is sharing
documents and applications in the cloud.

Advantages
Cloud Computing in Education
Resource and Time Conscious:

With the availability of content online, it is no longer necessary for teachers to spend
time and resources printing or copying lengthy documents or lesson plans. Now,
students are able to access homework assignments, lesson notes, and other materials
online.
Cloud Computing in Education
Disadvantages of Cloud
Computing In Education
Increased internet bandwidth is
necessary to allow for use of cloud
services.
If the internet goes down, most tools
and services will be inaccessible.
Costs increase dramatically as the
number of subscribed students
increases.

Cloud Computing in Education

Globalize your workforce on the cheap. People worldwide can access the cloud,
provided they have an Internet connection.
Its a much better way to spread your resources, and it becomes easier to access
things from longer distances.
Reduce spending on technology infrastructure. Maintain easy access to your
information with minimal upfront spending. Pay as you go (weekly, quarterly or
yearly), based on demand.
Improve accessibility. You have access anytime, anywhere, making your life so much
easier!
Achieve economies of scale increase volume output or productivity with fewer
people. Your cost per unit, project or product plummets.



Conclusion

You might also like