0% found this document useful (0 votes)
12 views35 pages

CLOUD-lesson 2-23

cloud com

Uploaded by

wakijoshua42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views35 pages

CLOUD-lesson 2-23

cloud com

Uploaded by

wakijoshua42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

CLOUD COMPUTING AND

INNOVATION
By

Timothy,

024 922 70 26
[email protected]

Part 2
[email protected]
Cloud Computing Technologies
It is worth to discuss some technologies in
cloud computing
• Virtualization
• Service-Oriented Architecture (SOA)
• Grid Computing
• Utility Computing
Virtualization
• This is a process of creating a virtual environment to
run multiple applications and operating systems on the
same server. The virtual environment can be anything,
such as a single instance or a combination of many
operating systems, storage devices, network
application servers, and other environments.
• The concept of Virtualization in cloud computing
increases the use of virtual machines. A virtual machine
is a software computer or software program that not
only works as a physical computer but can also function
as a physical machine and perform tasks such as
running applications or programs as per the user's
demand.
• Types include: virtualization of hardware, server,
storage, operating system, data
Service-Oriented Architecture (SOA)
• Service-Oriented Architecture (SOA) allows
organizations to access on-demand cloud-based
computing solutions according to the change of
business needs. It can work without or with cloud
computing. The advantages of using SOA is that it is
easy to maintain, platform independent, and highly
scalable.
• Service Provider and Service consumer are the two
major roles within SOA.
Applications of SOA
The following are applications of Service-Oriented
Architecture -

• It is used in the healthcare industry.


• It is used to create many mobile applications and
games.
• In the air force, SOA infrastructure is used to deploy
situational awareness systems.
Grid Computing
• Grid computing is also known as distributed
computing. It is a processor architecture that
combines various different computing resources
from multiple locations to achieve a common goal.
In grid computing, the grid is connected by
parallel nodes to form a computer cluster. These
computer clusters are in different sizes and can
run on any operating system.
• The main advantages are that it increases user
productivity by providing transparent access to
resources, and work can be completed more
quickly.
Grid computing contains the following three types of
machines

• Control Node: It is a group of servers which


administrates the whole network.
• Provider: It is a computer which contributes its
resources in the network resource pool.
• User: It is a computer which uses the resources on
the network.
Mainly, grid computing is used in the ATMs, back-end
infrastructures, and marketing research.
Utility Computing
• Utility computing is the most trending IT service
model. It provides on-demand computing resources
(computation, storage, and programming services
via API) and infrastructure based on the pay per
use method. It minimizes the associated costs and
maximizes the efficient use of resources. The
advantages of utility computing is that it reduces
the IT cost, provides greater flexibility, and easier to
manage.
• Large organizations such as Google and Amazon
have established their own utility services for
computing storage and application.
Difference btn Cloud & Grid Computing

• Cloud computing uses a client-server architecture


to deliver computing resources such as servers,
storage, databases, and software over the cloud
(Internet) with pay-as-you-go pricing.

• Grid computing is also called as "distributed


computing." It links multiple computing resources
(PC's, workstations, servers, and storage elements)
together and provides a mechanism to access them.
Cloud Computing Grid Computing

Based on client-server computing Based on a distributed computing


architecture. architecture.

It is more flexible than grid It is less flexible than cloud


computing. computing.
it operates as a centralized Grid operates as a decentralized
management system. management system.

Here, cloud servers are owned by Here, grids are owned and
infrastructure providers. managed by the organization.

Cloud Computing is Service- Grid Computing is Application-


oriented. oriented.
It is accessible through standard It is accessible through grid
web protocols. middleware.
How cloud computing work
• Assume that you are an executive at a very big
corporation. Your particular responsibilities include
to make sure that all of your employees have the
right hardware and software they need to do their
jobs. To buy computers for everyone is not enough.
You also have to purchase software as well as
software licenses and then provide these
softwares to your employees as they require.
Whenever you hire a new employee, you need to
buy more software or make sure your current
software license allows another user. It is so
stressful that you have to spend lots of money.
• But, there may be an alternative. So, instead of
installing a suite of software for each computer,
you just need to load one application. That
application will allow the employees to log-in into
a Web-based service which hosts all the programs
for the user that is required for his/her job.
Remote servers owned by another company and
that will run everything from e-mail to word
processing to complex data analysis programs. It is
called cloud computing, and it could change the
entire computer industry.
• In a cloud computing system, there is a significant
workload shift. Local computers don’t have to do
all the heavy lifting when it comes to run
applications. But cloud computing can handle that
much heavy load easily and automatically.
Hardware and software demands on the user's
side have decreased. The only thing the user's
computer requires to be able to run is the cloud
computing interface software of the system, which
can be as simple as a Web browser and the cloud's
network takes care of the rest.
Cloud Computing Applications
• Cloud service providers provide various
applications in the field of art, business, data
storage and backup services, education,
entertainment, management, social networking,
etc.
• We will take a little time in the next few slides to
discuss the most widely used cloud computing
applications
Art Applications
• Cloud computing offers various art applications for
quick and easy design of attractive cards,
booklets, and images. Some most commonly used
cloud art applications are :
• Moo - is one of the best cloud art applications. It is
used for designing and printing business cards,
postcards, and mini cards.
• Vistaprint - allows us to easily design various printed
marketing products such as business cards, Postcards,
Booklets, and wedding invitations cards.
• Adobe Creative Cloud - is made for designers, artists,
filmmakers, and other creative professionals. It is a
suite of apps which includes PhotoShop image editing
programming, Illustrator, InDesign, TypeKit,
Dreamweaver, XD, and Audition.
Business Applications
• Business applications are based on cloud service
providers. Today, every organization requires the cloud
business application to grow their business. It also
ensures that business applications are 24*7 available
to users. The ff are some examples -
• MailChimp - is an email publishing platform which
provides various options to design,
send, and save templates for emails.
• Salesforce - provides tools for sales, service,
marketing, e-commerce, and more. It also provides a
cloud development platform.
• Chatter - helps us to share important
information about the organization in real time.
Business App cont.
• Bitrix24 - is a collaboration platform which provides
communication, management, and social
collaboration tools.
• Paypal - offers the simplest and easiest online
payment mode using a secure internet account.
Paypal accepts the payment through debit cards,
credit cards, and also from Paypal account holders.
• Slack - stands for Searchable Log of all Conversation
and Knowledge. It provides a user-friendly interface
that helps us to create public and private channels for
communication.
• Quickbooks - works on the terminology "Run
Enterprise anytime, anywhere, on any device." It
provides online accounting solutions for the business.
It allows more than 20 users to work simultaneously
on the same system.
Data Storage and Backup Applications
• Cloud computing allows us to store information (files,
images, audios, and videos) on the cloud and access
this information using an internet connection. As the
cloud provider is responsible for providing security, so
they offer various backup recovery application for
retrieving the lost data. A list can as follows -
• Box.com - provides an online environment for secure
content management, workflow, and collaboration. It
allows us to store different files such as Excel, Word,
PDF, and images on the cloud. The main advantage of
using box is that it provides drag & drop service for
files and easily integrates with Office 365, G Suite,
Salesforce, and more than 1400 tools.
Data Storage & B cont.
• Mozy - Mozy provides powerful online backup
solutions for our personal and business data. It
schedules automatically back up for each day at a
specific time.
• Joukuu - Joukuu provides the simplest way
to share and track cloud-based backup files. Many
users use joukuu to search files, folders, and
collaborate on documents.
• Google G Suite - Google G Suite is one of the
best cloud storage and backup application. It includes
Google Calendar, Docs, Forms, Google+, Hangouts, as
well as cloud storage and tools for managing cloud
apps. The most popular app in the Google G Suite is
Gmail. Gmail offers free email services to users.
Education Applications
• Cloud computing in the education sector becomes
very popular. It offers various online distance
learning platforms and student information
portals to the students. The advantage of using
cloud in the field of education is that it offers
strong virtual classroom environments, Ease of
accessibility, secure data storage, scalability,
greater reach for the students, and minimal
hardware requirements for the applications.
• Google Apps for Education - is the most widely
used platform for free web-based email, calendar,
documents, and collaborative study.
Education App cont.
• Chromebooks for Education - is one of the most
important Google's projects. It is designed for the
purpose that it enhances education innovation.
• Tablets with Google Play for Education - It allows
educators to quickly implement the latest
technology solutions into the classroom and make
it available to their students.
• AWS in Education - cloud provides an education-
friendly environment to universities, community
colleges, and schools.
Entertainment Applications
• Entertainment industries use a multi-cloud
strategy to interact with the target audience. Cloud
computing offers various entertainment
applications such as online games and video
conferencing.
• Online games - Today, cloud gaming becomes one
of the most important entertainment media. It
offers various online games that run remotely from
the cloud. The best cloud gaming services are
Shaow, GeForce Now, Vortex, Project xCloud, and
PlayStation Now.
Entertainment App cont.
• Video Conferencing Apps - provides a simple and
instant connected experience. It allows us to
communicate with our business partners, friends,
and relatives using a cloud-based video
conferencing. The benefits of using video
conferencing are that it reduces cost, increases
efficiency, and removes interoperability.
Management Applications
• Cloud computing offers various cloud management
tools which help admins to manage all types of cloud
activities, such as resource deployment, data
integration, and disaster recovery. These management
tools also provide administrative control over the
platforms, applications, and infrastructure.
• Toggl - helps users to track allocated time period for a
particular project.
• Evernote - allows you to sync and save your recorded
notes, typed notes, and other notes in one convenient
place. It is available for both free as well as a paid
version.
• It uses platforms like Windows, macOS, Android, iOS,
Browser, and Unix.
Management App cont.
• Outright - Outright is used by management users
for the purpose of accounts. It helps to track
income, expenses, profits, and losses in real-time
environment.
• GoToMeeting - provides Video
Conferencing and online meeting apps, which
allows you to start a meeting with your business
partners from anytime, anywhere using mobile
phones or tablets. Using GoToMeeting app, you
can perform the tasks related to management such
as join meetings in seconds, view presentations on
the shared screen, get alerts for upcoming
meetings, etc.
Social Applications
• Social cloud applications allow a large number of users to
connect with each other using social networking
applications such as Facebook, Twitter, Linkedln, etc.
• Facebook - allows active users to share files, photos,
videos, status, more to their friends, relatives, and
business partners using the cloud storage system.
• Twitter - It is a microblogging system. It allows users to
follow high profile celebrities, friends, relatives, and
receive news. It sends and receives short posts called
tweets.
• Yammer - is the best team collaboration tool that allows a
team of employees to chat, share images, documents, and
videos.
• LinkedIn - for students, freshers, and professionals
Security Risks of Cloud Computing
• Cloud computing provides various advantages, such as
improved collaboration, excellent accessibility, Mobility,
Storage capacity, etc. But there are also security risks,
some include
• Data Loss
• Hacked Interfaces and Insecure APIs
• Data Breach
• Vendor lock-in
• Increased complexity strains IT staff
• Spectre & Meltdown
• Denial of Service (DoS) attacks
• Account hijacking
Data Loss
• Data loss is the most common cloud security risks
of cloud computing. It is also known as data
leakage. Data loss is the process in which data is
being deleted, corrupted, and unreadable by a
user, software, or application. In a cloud computing
environment, data loss occurs when our sensitive
data is somebody else's hands, one or more data
elements can not be utilized by the data owner,
hard disk is not working properly, and software is
not updated.
Hacked Interfaces and Insecure APIs
• As we all know, cloud computing completely
depends on Internet, so it is compulsory to protect
interfaces and APIs that are used by external users.
APIs are the easiest way to communicate with
most of the cloud services. In cloud computing,
few services are available in the public domain.
These services can be accessed by third parties, so
there may be a chance that these services are
easily harmed and hacked by hackers.
• Data Breach is the process in which a confidential
data is viewed, accessed, or stolen by a third party
without any authorization, eg organization's data
being hacked by hackers.

• Vendor lock-in is one of the biggest security risks


in cloud computing. Organizations may face
problems when transferring their services from
one vendor to another. As different vendors
provide different platforms, that can cause
difficulty moving from one cloud to another.
• Increased complexity strains IT staff
• Migrating, integrating, and operating the cloud
services is complex for the IT staff. IT staff must
require the extra capability and skills to manage,
integrate, and maintain the data to the cloud.
• Spectre & Meltdown allows programs to view and
steal data which is currently processed on
computer. It can run on personal computers,
mobile devices, and in the cloud. It can store the
password, your personal information such as
images, emails, and business documents in the
memory of other running programs.
• Denial of Service (DoS) attacks occur when the
system receives too much traffic to buffer the
server. Mostly, DoS attackers target web servers of
large organizations such as banking sectors, media
companies, and government organizations. To
recover the lost data, DoS attackers charge a great
deal of time and money to handle the data.
• Account hijacking is a serious security risk in cloud
computing. It is the process in which individual
user's or organization's cloud account (bank
account, e-mail account, and social media account)
is stolen by hackers. The hackers use the stolen
account to perform unauthorized activities.

You might also like