SlideShare a Scribd company logo
OPTIMIZE THE QOS AND
SECURITY ISSUES IN CLOUD
COMPUTING
CONTENT
• Introduction
• Why Cloud Computing
• Cloud Service Models
• Cloud Computing deployment
models
• Characteristics
• Cloud Computing Architectures
• Cloud Computing Architectures
• Transparency of cloud
• Energy Management
• Security and Privacy Issues
• Azure Cloud
• Conclusion
INTRODUCTION
The practice of using a network of remote servers hosted on the Internet to store, manage, and
process data, rather than a local server or a personal computer.
We use cloud and its services to save ourselves to:
• Hire new management
• New Infrastructure
• Place to secure infrastructure.
• Controlling devices
• Increase in performance.
• Easy access to advanced resources.
• Pay per use service.
• No need to indulge in back end
maintenance.
• Full utilization of server.
• Security about their data.
• Cloud ensures auditing process.
• Reporting and tracking.
• Three services and four deployment
models.
• On-demand self-service.
• Resource pooling.
• Flexibility and scalability.
• Skilled management and
maintenance.
• Resource sharing
WHY CLOUD COMPUTING
CLOUD SCENARIO
CLOUD SERVICE MODELS
Infrastructure as a service (IaaS):
• The cost reduces as the resources exist already in the cloud.
• User just had to pay for infrastructure and the usage of capacity, like disk space, CPU,
memory server, storage and network.
• Cost service using fixed prices per resources.
• Many major computing resources coexist on IaaS.
In this model users are searching for computing resources. It is like
self-contained IT structure.
CLOUD SERVICE MODELS
Software as a service (SaaS):
• The productivity of internal resources is improved without of managing
and maintenance.
• The updating of software will be immediately given
• The complexity decreases by managing the system from central location.
• Resources are available on the network they will be accessed any time as pay
per use basis.
CLOUD SERVICE MODELS
Platform as a service (PaaS):
• The cost to manage, maintain is lower.
• Management and maintenance is responsibility of vendor.
• System is now flexible and scalable.
• Services for development, testing, deployment collaboration, hosting are now in
same environment which is deployed in cloud.
• The web based creation tools are now easily implemented.
• I provide ease to create components that are needed for user interface.
CLOUD SERVICE MODELS
CLOUD COMPUTING DEPLOYMENT MODELS
Model Managed by Used by Place location Accessibility
Public
Third party
provider
Third party
provider Off-premise Untrusted
Private
Organization
itself
Organization
itself
On-premise
Off-premise
Trusted
Third party
provider
Third party
provider
On-premise
Off-premise
Hybrid
Both
organization
and third party
provider
Both
organization
and third party
provider
Both On-
premise
Off-premise
Trusted or
Untrusted
CHARACTERISTICS REGARDING CLOUD
COMPUTING
Broad network Access. Resource Pooling. Rapid Elasticity.
Measured Service. On demand self service.
CLOUD COMPUTING ARCHITECTURES
Cloud have different Architecture:
• Aneka
• Market-oriented Cloud Architecture
• Service-Oriented Architecture
• Service-Oriented Cloud Computing Architecture (SOCCA)
• Layered Architecture of Service-Oriented Cloud Computing Architecture
• Comparison of Cloud Architectures
• Importance of Service-Oriented Architecture to Cloud Computing
SECURITY AND PRIVACY ISSUES
• What are the user privileges?
• At which level are regulatory compliance being?
• Is the data located at data center is safe enough?
• What are the issues regarding segregation of data?
• If the data is lost or damaged what are the recovery methods, Is there is any
support for investigation?
• What are the long-term planning of viability?
There are many security issues arises when we talk about cloud computing:
• Authentication.
• Authorization and confidentiality.
• Availability.
• Integrity.
CLOUD COMPUTING SECURITY ISSUES
SOLUTIONS
Integration of policies:
• Different servers have different set of policies
Controlling the Access Method:
• The most important method is the (RBAC) role based access control method.
Method of Encryption:
• Symmetric encryption
• Asymmetric encryption
METHOD PROVIDED BY AWS & AZURE
• Amazon’s web services and Microsoft Azure system gave the facility to decide the
geographic regions for their users.
• It gives assurance that data will remain there as far as they want.
• The regions are of North West, USA and some of the regions of UK.
• Now a day’s some regions of Asia are also included.
TRANSPARENCY OF CLOUD
• Transparency mean the policies will be clear to the clients and to the service providers.
• An important protocol regarding transparency is the SLA (service level agreement), SLA
has the information about:
 Service that cloud provides
 Tracing and estimating
 Managing the problem
 Appropriate compliance
 Duties of customers
 Security
 Confidential information
SECURE AUDITING
• There are two types of auditing that are:
Integrity Audit
•Confidentially
•Lost or Damaged
•Integrity check(hash PDP)
Security Audit
•Infrastructure
•Application
•Provider/ Third-party
VIRTUALIZATION ISSUES
• Virtualization concept is the building block for cloud computing.
• Basically there is a layer between hardware and operating system
that is introduced by virtualization.
• With virtualization concept the cloud computing become:
 Flexible
 Location independence
 Situations migration
• The difficulty with these virtual machines that are running on a single physical machine is to
manage them.
ENERGY MANAGEMENT
• Lot of energy is consumed during the run-time of application, power consumption
and cooling cost goes to 53% of total.
• voltage and frequency is adjusted
• P=V2*F*C
DVFS
• MIPS is used to calculate the capacity of host
machine.
• Voltagecpu= VirtualMac.MIPS/ HostMIPS
MIPS rate
ISSUES RELATED TO APPLICATION
• To ensure the security of the system there is a need to make the application secured.
• Security for the cloud application is very necessary because any hacker can easily be entered in
the system.
• Than make malicious attacks to the system.
• We have to take care of:
 Security of cloud Browser.
 Cloud Malware Attack.
 Distributed denial of service (DDoS) Attack.
 Debug and backdoor options.
ISSUES RELATED TO APPLICATION
Cloud Malware
Attack
TLS Encryption
& Signature
IS & XML
DDoS Attack
Malicious VM
Integrity Check
Debug and
backdoor options
Different
services different
network
IDS to detect.
Solutions to
handle the
Application
Code Backdoor
Development
Process
SOLUTIONS TO HANDLE THE APPLICATION
ISSUES
• Hierarchal ASBE
• Start up
• Function of Main Authority
• New User Access
• File Development
• Revocation
• Accessing the File
AZURE CLOUD
CONCLUSION
• What is Cloud.
• Implement the cloud computing.
• Architecture comparison.
• security and privacy.
• energy management.
• Application issues.
• Solutions of the issues.
• Azure Cloud.
FUTURE WORK
Researchers still have to work a lot to make this technology mature enough to adopt
easily:
• Complexity of the system.
• Strong check by enhancement in encryption/decryption process.
• Reduce the cost of the system.
• Auditing shell algorithm.
• Quad security layer.
It is an emerging technology so a lot of threats are there and organizations should have to
work together to make a big change in the IT world.

More Related Content

PPTX
What 5G is?
Hamza Sajjad
 
PPTX
Zigbee technolgy
Haricharan Palakurthi
 
PPTX
Zigbee
WaqarAhmad444
 
PDF
Zigbee technology
Lebon Grace
 
PPTX
5 g network & technology
Frikha Nour
 
PDF
The way to 5G
Whai-En Chen
 
PPT
Zigbee
sanskar2674
 
PPTX
5G TECHNOLOGY
FarheenNishat1
 
What 5G is?
Hamza Sajjad
 
Zigbee technolgy
Haricharan Palakurthi
 
Zigbee technology
Lebon Grace
 
5 g network & technology
Frikha Nour
 
The way to 5G
Whai-En Chen
 
Zigbee
sanskar2674
 
5G TECHNOLOGY
FarheenNishat1
 

What's hot (20)

PDF
Wi fi 6 (802.11ax) presentation
Bryan Slayman
 
PPTX
Wimax Technology
SHUBHAM ANAND
 
PDF
5G Network Architecture and FMC
ITU
 
PDF
Yue Wang: AI in 5G –the Why and How - Jan 2019
3G4G
 
PPT
Wifi wireless networks
Dooremoore
 
PDF
249549548 spider-ds-scsn-90002-112513
Zarobiza
 
PPT
Wifi vignan final
PREMKUMAR
 
PDF
ZigBee Technology
Ibrahim Kazanci
 
PPTX
Diferencias 4 g 5g
JJRodrguez1
 
PPTX
Evolving sdn for low power iot networks
Hanieh Kashfi
 
PPTX
5g Mobile Technology
vineetkathan
 
PPTX
5G WIRELESS TECHNOLOGY.ppt
R.Karthick
 
PPTX
Firetide Wireless Mesh Nodes for Transportation
Paul Richards
 
PPTX
5G Wireless Technology - pavankumar_912
Pavan Kumar Sindgi
 
PPT
41 wifi technology
SALMAN SHAIKH
 
PPTX
Zigbeepresentation
Divya korrapati
 
PPTX
Broadband implementation in kg. baru
ashrawi92
 
PDF
41 wifi technology
SALMAN SHAIKH
 
Wi fi 6 (802.11ax) presentation
Bryan Slayman
 
Wimax Technology
SHUBHAM ANAND
 
5G Network Architecture and FMC
ITU
 
Yue Wang: AI in 5G –the Why and How - Jan 2019
3G4G
 
Wifi wireless networks
Dooremoore
 
249549548 spider-ds-scsn-90002-112513
Zarobiza
 
Wifi vignan final
PREMKUMAR
 
ZigBee Technology
Ibrahim Kazanci
 
Diferencias 4 g 5g
JJRodrguez1
 
Evolving sdn for low power iot networks
Hanieh Kashfi
 
5g Mobile Technology
vineetkathan
 
5G WIRELESS TECHNOLOGY.ppt
R.Karthick
 
Firetide Wireless Mesh Nodes for Transportation
Paul Richards
 
5G Wireless Technology - pavankumar_912
Pavan Kumar Sindgi
 
41 wifi technology
SALMAN SHAIKH
 
Zigbeepresentation
Divya korrapati
 
Broadband implementation in kg. baru
ashrawi92
 
41 wifi technology
SALMAN SHAIKH
 
Ad

Similar to Cloud computing (20)

PPT
CLOUD COMPUTING.ppt
Dss
 
PPTX
Cloud Computing
Naveed Farooq
 
PPTX
Cloud computing(ppt)
priyas211420
 
PPTX
Cloud computing and Service Platforms
Vibhawa Nirmal
 
PDF
CLOUD COMPUTING THE FUTURE WORLD AT RE NOW PRESEN.pdf
jayanta738438118
 
PPTX
Beginners Guide and general overview to Cloud Computing.pptx
samuelspiritus83
 
PPTX
1. introduction to cloud computing
Lokesh Ramaswamy
 
PDF
Cloud computing
ananyaakk
 
PPTX
Azure Fundamentals Part 1
CCG
 
PPT
Cloud computing computer
Sanath Surawar
 
PPTX
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Shivananda Rai
 
PPTX
Mahika cloud services
Somnath Sen
 
PPT
A Complete Guide Cloud Computing
Sripati Mahapatra
 
PDF
ch1-introduction-to-cloud-computing.pdff
datmieu2004
 
PPTX
Cloud Computing Unit 1 for computer science.pptx
Rocky142807
 
PDF
CloudComputing_UNIT 3.pdf
khan593595
 
PDF
CloudComputing_UNIT 3.pdf
khan593595
 
PPTX
Introduction to Cloud Computing
Damian T. Gordon
 
PPTX
40369A Microsoft Cloud Fundamentals - Chapter 1
AndersPistaceci1
 
PDF
Cloud computing and uses of cloud computing
jayanta738438118
 
CLOUD COMPUTING.ppt
Dss
 
Cloud Computing
Naveed Farooq
 
Cloud computing(ppt)
priyas211420
 
Cloud computing and Service Platforms
Vibhawa Nirmal
 
CLOUD COMPUTING THE FUTURE WORLD AT RE NOW PRESEN.pdf
jayanta738438118
 
Beginners Guide and general overview to Cloud Computing.pptx
samuelspiritus83
 
1. introduction to cloud computing
Lokesh Ramaswamy
 
Cloud computing
ananyaakk
 
Azure Fundamentals Part 1
CCG
 
Cloud computing computer
Sanath Surawar
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Shivananda Rai
 
Mahika cloud services
Somnath Sen
 
A Complete Guide Cloud Computing
Sripati Mahapatra
 
ch1-introduction-to-cloud-computing.pdff
datmieu2004
 
Cloud Computing Unit 1 for computer science.pptx
Rocky142807
 
CloudComputing_UNIT 3.pdf
khan593595
 
CloudComputing_UNIT 3.pdf
khan593595
 
Introduction to Cloud Computing
Damian T. Gordon
 
40369A Microsoft Cloud Fundamentals - Chapter 1
AndersPistaceci1
 
Cloud computing and uses of cloud computing
jayanta738438118
 
Ad

More from Hamza Sajjad (7)

PPTX
Indoor propogation
Hamza Sajjad
 
PPTX
Resistor and conductor
Hamza Sajjad
 
PPTX
Sonet (synchronous optical networking )
Hamza Sajjad
 
PPTX
How our body emit radiation
Hamza Sajjad
 
PPTX
Types of ram
Hamza Sajjad
 
PPTX
Laser
Hamza Sajjad
 
PPTX
What is complex number
Hamza Sajjad
 
Indoor propogation
Hamza Sajjad
 
Resistor and conductor
Hamza Sajjad
 
Sonet (synchronous optical networking )
Hamza Sajjad
 
How our body emit radiation
Hamza Sajjad
 
Types of ram
Hamza Sajjad
 
What is complex number
Hamza Sajjad
 

Recently uploaded (20)

PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
Inventory management chapter in automation and robotics.
atisht0104
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 

Cloud computing

  • 1. OPTIMIZE THE QOS AND SECURITY ISSUES IN CLOUD COMPUTING
  • 2. CONTENT • Introduction • Why Cloud Computing • Cloud Service Models • Cloud Computing deployment models • Characteristics • Cloud Computing Architectures • Cloud Computing Architectures • Transparency of cloud • Energy Management • Security and Privacy Issues • Azure Cloud • Conclusion
  • 3. INTRODUCTION The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. We use cloud and its services to save ourselves to: • Hire new management • New Infrastructure • Place to secure infrastructure. • Controlling devices
  • 4. • Increase in performance. • Easy access to advanced resources. • Pay per use service. • No need to indulge in back end maintenance. • Full utilization of server. • Security about their data. • Cloud ensures auditing process. • Reporting and tracking. • Three services and four deployment models. • On-demand self-service. • Resource pooling. • Flexibility and scalability. • Skilled management and maintenance. • Resource sharing WHY CLOUD COMPUTING
  • 6. CLOUD SERVICE MODELS Infrastructure as a service (IaaS): • The cost reduces as the resources exist already in the cloud. • User just had to pay for infrastructure and the usage of capacity, like disk space, CPU, memory server, storage and network. • Cost service using fixed prices per resources. • Many major computing resources coexist on IaaS. In this model users are searching for computing resources. It is like self-contained IT structure. CLOUD SERVICE MODELS
  • 7. Software as a service (SaaS): • The productivity of internal resources is improved without of managing and maintenance. • The updating of software will be immediately given • The complexity decreases by managing the system from central location. • Resources are available on the network they will be accessed any time as pay per use basis. CLOUD SERVICE MODELS
  • 8. Platform as a service (PaaS): • The cost to manage, maintain is lower. • Management and maintenance is responsibility of vendor. • System is now flexible and scalable. • Services for development, testing, deployment collaboration, hosting are now in same environment which is deployed in cloud. • The web based creation tools are now easily implemented. • I provide ease to create components that are needed for user interface. CLOUD SERVICE MODELS
  • 9. CLOUD COMPUTING DEPLOYMENT MODELS Model Managed by Used by Place location Accessibility Public Third party provider Third party provider Off-premise Untrusted Private Organization itself Organization itself On-premise Off-premise Trusted Third party provider Third party provider On-premise Off-premise Hybrid Both organization and third party provider Both organization and third party provider Both On- premise Off-premise Trusted or Untrusted
  • 10. CHARACTERISTICS REGARDING CLOUD COMPUTING Broad network Access. Resource Pooling. Rapid Elasticity. Measured Service. On demand self service.
  • 11. CLOUD COMPUTING ARCHITECTURES Cloud have different Architecture: • Aneka • Market-oriented Cloud Architecture • Service-Oriented Architecture • Service-Oriented Cloud Computing Architecture (SOCCA) • Layered Architecture of Service-Oriented Cloud Computing Architecture • Comparison of Cloud Architectures • Importance of Service-Oriented Architecture to Cloud Computing
  • 12. SECURITY AND PRIVACY ISSUES • What are the user privileges? • At which level are regulatory compliance being? • Is the data located at data center is safe enough? • What are the issues regarding segregation of data? • If the data is lost or damaged what are the recovery methods, Is there is any support for investigation? • What are the long-term planning of viability?
  • 13. There are many security issues arises when we talk about cloud computing: • Authentication. • Authorization and confidentiality. • Availability. • Integrity. CLOUD COMPUTING SECURITY ISSUES
  • 14. SOLUTIONS Integration of policies: • Different servers have different set of policies Controlling the Access Method: • The most important method is the (RBAC) role based access control method. Method of Encryption: • Symmetric encryption • Asymmetric encryption
  • 15. METHOD PROVIDED BY AWS & AZURE • Amazon’s web services and Microsoft Azure system gave the facility to decide the geographic regions for their users. • It gives assurance that data will remain there as far as they want. • The regions are of North West, USA and some of the regions of UK. • Now a day’s some regions of Asia are also included.
  • 16. TRANSPARENCY OF CLOUD • Transparency mean the policies will be clear to the clients and to the service providers. • An important protocol regarding transparency is the SLA (service level agreement), SLA has the information about:  Service that cloud provides  Tracing and estimating  Managing the problem  Appropriate compliance  Duties of customers  Security  Confidential information
  • 17. SECURE AUDITING • There are two types of auditing that are: Integrity Audit •Confidentially •Lost or Damaged •Integrity check(hash PDP) Security Audit •Infrastructure •Application •Provider/ Third-party
  • 18. VIRTUALIZATION ISSUES • Virtualization concept is the building block for cloud computing. • Basically there is a layer between hardware and operating system that is introduced by virtualization. • With virtualization concept the cloud computing become:  Flexible  Location independence  Situations migration • The difficulty with these virtual machines that are running on a single physical machine is to manage them.
  • 19. ENERGY MANAGEMENT • Lot of energy is consumed during the run-time of application, power consumption and cooling cost goes to 53% of total. • voltage and frequency is adjusted • P=V2*F*C DVFS • MIPS is used to calculate the capacity of host machine. • Voltagecpu= VirtualMac.MIPS/ HostMIPS MIPS rate
  • 20. ISSUES RELATED TO APPLICATION • To ensure the security of the system there is a need to make the application secured. • Security for the cloud application is very necessary because any hacker can easily be entered in the system. • Than make malicious attacks to the system. • We have to take care of:  Security of cloud Browser.  Cloud Malware Attack.  Distributed denial of service (DDoS) Attack.  Debug and backdoor options.
  • 21. ISSUES RELATED TO APPLICATION Cloud Malware Attack TLS Encryption & Signature IS & XML DDoS Attack Malicious VM Integrity Check Debug and backdoor options Different services different network IDS to detect. Solutions to handle the Application Code Backdoor Development Process
  • 22. SOLUTIONS TO HANDLE THE APPLICATION ISSUES • Hierarchal ASBE • Start up • Function of Main Authority • New User Access • File Development • Revocation • Accessing the File
  • 24. CONCLUSION • What is Cloud. • Implement the cloud computing. • Architecture comparison. • security and privacy. • energy management. • Application issues. • Solutions of the issues. • Azure Cloud.
  • 25. FUTURE WORK Researchers still have to work a lot to make this technology mature enough to adopt easily: • Complexity of the system. • Strong check by enhancement in encryption/decryption process. • Reduce the cost of the system. • Auditing shell algorithm. • Quad security layer. It is an emerging technology so a lot of threats are there and organizations should have to work together to make a big change in the IT world.

Editor's Notes

  • #26: Secure Transmission of Data Encrypted Data and Encrypted Data Processing Database Secure Shell Internal and external Auditing