0% found this document useful (0 votes)
54 views22 pages

Operating Systems Overview

Cloud computing provides data storage and access to web applications from remote servers. It addresses previous issues with data recovery, security, accessibility and more. The document discusses cloud computing benefits like cost savings, mobility and unlimited storage. Potential limitations include network dependency, limited features, technical issues and security attacks. It outlines security challenges involving confidentiality, integrity and availability, and proposes solutions like encryption and segregating data through algorithms.

Uploaded by

Maryam Farkash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views22 pages

Operating Systems Overview

Cloud computing provides data storage and access to web applications from remote servers. It addresses previous issues with data recovery, security, accessibility and more. The document discusses cloud computing benefits like cost savings, mobility and unlimited storage. Potential limitations include network dependency, limited features, technical issues and security attacks. It outlines security challenges involving confidentiality, integrity and availability, and proposes solutions like encryption and segregating data through algorithms.

Uploaded by

Maryam Farkash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Libyan International Medical University

Faculty of Information Technology

An Overview of
Cloud Computing

By: Maryam Farkash 1734


Abstract:

A cloud operating system is a lightweight operating


system that stores data and can access Web-based
applications from a remote server.

This poster gives an overview of the Cloud Computing,


including security attacks and challenges that might be a
risk against our personal information and their solutions as
well.
Introduction:

The operating system is the most important software. It


works as an interface between the hardware and the user.
The basic functionalities of the operating systems are:

Resource management: managers that organize and allocate


resources (which can be an equipment or materials..) to
ensure efficiency.
Introduction (cont’d):

Process scheduling: is an OS task that schedules processes


of different states like ready, waiting and running. The great
purpose of process scheduling is that it keeps the CPU busy
all the time.

Event handling: is a mechanism that controls an event &


decides what should happen if an event occurs.
Introduction:

The issue under study: before “cloud” approach there were


some issues that people didn’t know how to avoid them:

Recovery and backup issues, security Issues, transfer of


data, accessibility, power consumption and storage
management.
Background:

The idea of cloud computing moved ahead ascendingly, with


major advancement in the mid-1960s, an American computer
scientist named John McCarthy came up with an idea for an
interconnected system of computers, making it easier for
people to access their files and data.

The term “Cloud” is originated from the telecommunications


world, where some telecom companies started offering Virtual
Private Network (VPN) services with the highest quality of
services at a much lower cost.
Cloud Computing Benefits:

Cost saving: Rather than purchasing expensive systems and


equipment for your business, you can reduce your costs by
using the resources of your cloud computing service
provider. 

Mobility: Employees who are working at remote locations


can easily access all could services. All they need is an
Internet connectivity.
Cloud Computing Benefits (Cont’d):

Unlimited storage capacity: At any time you can expand your


storage capacity with monthly fees.

Back-up and restore data: Once the data is stored in a Cloud,


it is easier to get the back-up and recovery
Cloud Computing Limitations:

Network Connection Dependency: your business must always


have an internet connection.

Limited Features: When you use cloud computing for storage


and backup, you should be working with a provider who offers
the value of unlimited bandwidth. You may experience limited
storage space or accessibility.

Technical Issues: You have no choice but to call your provider’s


technical support for help. You can’t fix your cloud computing
problems at home.
Cloud Computing Limitations (cont’d):

Performance Instability: happens because of high load. The


expected behavior cannot be predicted as the cloud
resources are shared among different users with variable
process load.

Security Attacks: The main challenge of the cloud computing


users is the security of the information stored or transmitted
to/from the cloud. Some of these attacks are SQL injection,
malicious insider attack and denial of service attacks (DoS).
Cloud Computing Limitations (cont’d):

SQL Injection: is a code injection technique which is


written in a form of SQL statements to attack data-driven
applications.

Malicious Insider Attack: An employee that removes


information from the organization for his personal gain or
to damage the organization.

Denial of service attacks (DoS):  is an attack meant to shut


down a machine or network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding
the target with traffic, or sending it information that
triggers a crash.
Data Security Challenges:

In the Cloud Operating Systems, it requires great focus on


Data Security and Privacy.

Data loss or Data leakage can cause severe impact on any


business, brand or the trust of an organization.
Data Security Challenges (cont’d):

* The three main areas in data security are:

A. Confidentiality: ensure that data is protected from any


attacks.

B. Integrity: users should not store their personal data such


as passwords so that integrity can be assured.

C. Availability: It depends on the agreement between vendor


and the client.
Data Security Challenges (cont’d):

Segregation: injecting a client code or by using any


application, data can be intruded. So it is necessary to store
data separately from the remaining customer’s data.
Vulnerabilities with data segregation can be detected or found
out using the tests such as Data validation.

Data Locality: In cloud computing, the data is distributed over


the number of regions and to find the location of data is
difficult. Customers should know their data location and it is
to be intimated by the service provider.
Data Security Challenges (cont’d):

Access: The employees will be given access to the section of


data based on their company security policies. The same
data cannot be accessed by the other employees.
Encryption techniques are used to make data shared with
the valid users.

Storage: The data stored in virtual machines have many


issues one such issue is reliability of data storage.
Solutions to Data Security Challenges:

Encryption is suggested as a better solution to secure


information. Before storing data in cloud server it is better
to encrypt data.

Many algorithms such as RSA (Rivest–Shamir–Adleman),


which is an algorithm used by modern computers
to encrypt and decrypt messages.

SaaS (Software as a Service) is an algorithm which ensures


that there must be clear boundaries both at the physical
and application level to segregate data from different users.
Conclusion:

Cloud computing is the new emerging technology that


presents a good number of benefits to the users. The idea
of Cloud is to save a lot of time and money and to facilitate
data accessibility. It faces a lot of security challenges. And
the best solution for these challenges is to use data
encryption; (RSA and SaaS algorithms)
References:

(Turab, Taleb, & Masadeh, 2013)Turab, N. M., Taleb, A. A., &


Masadeh, S. R. (2013). Cloud Computing Challenges And
Solutions. International Journal of Computer Networks &
Communications, 5(5), 209–216.

(Bairagi & Bang, 2018)Bairagi, S. I., & Bang, A. O. (2018).


Cloud Computing : History , Architecture , Security Issues.
(March 2015).
THANK
YOU! 

You might also like