0% found this document useful (0 votes)
13 views10 pages

Cloud Computing

Cloud computing is a model that allows users to access and store data over the internet instead of on local devices, utilizing shared resources and services. It operates through a front end for user access and a back end for data management, with various deployment and service models available. While it offers advantages like cost efficiency and easy access, it also presents challenges such as technical issues, security risks, and limited user control.

Uploaded by

rockyrocks246810
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views10 pages

Cloud Computing

Cloud computing is a model that allows users to access and store data over the internet instead of on local devices, utilizing shared resources and services. It operates through a front end for user access and a back end for data management, with various deployment and service models available. While it offers advantages like cost efficiency and easy access, it also presents challenges such as technical issues, security risks, and limited user control.

Uploaded by

rockyrocks246810
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cloud Computing

What is Cloud Computing?


• A type of computing that relies on sharing computing resources
rather than having local servers or personal devices to handle
application.
• Use of various services, such as software development platforms,
servers, software over the internet.
• Inspired by the cloud symbol that's often used
to represent the internet in flowcharts and
diagrams.
• Instead of storing files on a storage device,
a user can save them on cloud to access the
files from anywhere.
How does Cloud Computing Work?

Front End Back End


• Enables a user to access data stored • Central Server facilitates operations
in the cloud. according to the protocols.
• Internet browser or a • Software, middleware, to ensure
cloud computing seamless connectivity between
software are must. devices/computers
linked via cloud computing.
• Service providers usually maintain
multiple copies of the data.
Based on Deployment

Virtual environment Loosely defined as cloud Mixed computing environment


partitioned and environments solely where applications are run
redistributed to many dedicated to a single end using a combination of
customers(tenants)which user or group, where the computing, storage, and
are usually created from environment usually runs services in different
IT infrastructures. Eg: MS behind that user or environments—public and
Azure, Google, AWS, group's firewall. private clouds
IBM Blue Cloud. Eg: AWS, Vmware. Eg: Federal Agencies.
Based on Service Model

Users can access


Computing
software hosted on
infrastructural
the cloud without
components like server
installing it on
hardware, storage,
the user’s own
bandwidth and
computer.
other computing
Eg: Office 365,
resources are shared
Google Apps.
through cloud. Eg: AWS,
MS Azure.

Allows users to rent virtualized servers and associate services


used to run existing applications, or to design, develop, test,
deploy and host apps. Eg: MS Azure, AWS.
Lifecycle of Cloud Computing Solution
1. Define the process
2. Define the hardware
3. Define the storage
4. Define the network
5. Define the security
6. Define the management process
and tools
7. Testing the process
8. Analytics
Advantages of Cloud Computing

Cost Unlimited Backup and Easy Access to


Efficiency Storage Recovery Information

Efficient method Unlimited Backing up and The process to gain


to use, maintain information can be restoring data is access to the information
and upgrade. stored in cloud. relatively easy. in cloud is simple.
Disadvantages of Cloud Computing

Technical Security in Prone to Limited Control


Issues the Cloud Cyber Attack and Flexibility

During outage or Inadequate cloud Vulnerability of Limited control and


connectivity, services security measures lead cyber attack may flexibility to customers,
get interrupted. to data leakage. lead to data theft. restricting their access
Thanks!
CREDITS: This presentation template was
created by Slidesgo, including icons by
Slidesgo

Flaticon, and infographics & images by Freepik


Flaticon Freepik

You might also like