際際滷

際際滷Share a Scribd company logo
Cloud computing , Network
Access, Security
By
Dr.S.Sridhar, Ph.D.(JNUD),
RACI(Paris, NICE), RMR(USA),
RZFM(Germany)
Dean  Cognitive & Central Computing
Facility
R.V. COLLEGE OF ENGINEERING
BANGALORE
Why Cloud- As basic
Business Scenarios
 Fast Application Deployment
 Hassle Free Maintenance
 Better Resources Utilization
 Platform Independent, Security,
Scalability
What is Cloud?
 Infrastructure provided by the service provider to
build internet application.
 The service provided by cloud are categorize
> Software As a Service
> Infrastructure As a Service
> Platform As a Service
> Database As a Service
> Software plus Service
Cloud Architecture , NW
Access, Security
Cloud Computing, NW Access
Cloud Computing Cycle, NW
access, Security
Cloud Computing, NW Access
Growth Rate
Ad

Recommended

Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
I3E Technologies
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
IJNSA Journal
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
Association of Scientists, Developers and Faculties
Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...
IJNSA Journal
Data security in cloud environment
Data security in cloud environment
Shivam Singh
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
Cloud computing
Cloud computing
Shivam Singh
Ea33762765
Ea33762765
IJERA Editor
Security in cloud computing kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
NJVC, LLC
Cloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloud
Peter HJ van Eijk
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Project
CSA v4 Topology
CSA v4 Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
Ariel Litvin - CCSK
Ariel Litvin - CCSK
CSAIsrael
Cloud Computing Security
Cloud Computing Security
neicher
Cloud computing
Cloud computing
Vivekananda college
Demystifying Top 5 Cloud Migration Myths
Demystifying Top 5 Cloud Migration Myths
Vivek Mishra
Cloud with Cyber Security
Cloud with Cyber Security
Niki Upadhyay
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
CloudPassage
wap-IoT
wap-IoT
S Sridhar
ccna course 2
ccna course 2
S Sridhar
engg pedagogy30 june 2015
engg pedagogy30 june 2015
S Sridhar
foss-30oct-2012
foss-30oct-2012
S Sridhar
leadership
leadership
S Sridhar
Talk on Ramanujan
Talk on Ramanujan
S Sridhar

More Related Content

What's hot (13)

Cloud computing
Cloud computing
Shivam Singh
Ea33762765
Ea33762765
IJERA Editor
Security in cloud computing kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
NJVC, LLC
Cloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloud
Peter HJ van Eijk
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Project
CSA v4 Topology
CSA v4 Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
Ariel Litvin - CCSK
Ariel Litvin - CCSK
CSAIsrael
Cloud Computing Security
Cloud Computing Security
neicher
Cloud computing
Cloud computing
Vivekananda college
Demystifying Top 5 Cloud Migration Myths
Demystifying Top 5 Cloud Migration Myths
Vivek Mishra
Cloud with Cyber Security
Cloud with Cyber Security
Niki Upadhyay
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
CloudPassage
Cloud computing
Cloud computing
Shivam Singh
Security in cloud computing kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
NJVC, LLC
Cloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloud
Peter HJ van Eijk
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Project
Ariel Litvin - CCSK
Ariel Litvin - CCSK
CSAIsrael
Cloud Computing Security
Cloud Computing Security
neicher
Demystifying Top 5 Cloud Migration Myths
Demystifying Top 5 Cloud Migration Myths
Vivek Mishra
Cloud with Cyber Security
Cloud with Cyber Security
Niki Upadhyay
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
CloudPassage

More from S Sridhar (6)

wap-IoT
wap-IoT
S Sridhar
ccna course 2
ccna course 2
S Sridhar
engg pedagogy30 june 2015
engg pedagogy30 june 2015
S Sridhar
foss-30oct-2012
foss-30oct-2012
S Sridhar
leadership
leadership
S Sridhar
Talk on Ramanujan
Talk on Ramanujan
S Sridhar
ccna course 2
ccna course 2
S Sridhar
engg pedagogy30 june 2015
engg pedagogy30 june 2015
S Sridhar
foss-30oct-2012
foss-30oct-2012
S Sridhar
leadership
leadership
S Sridhar
Talk on Ramanujan
Talk on Ramanujan
S Sridhar
Ad

ccna course 1

  • 1. Cloud computing , Network Access, Security By Dr.S.Sridhar, Ph.D.(JNUD), RACI(Paris, NICE), RMR(USA), RZFM(Germany) Dean Cognitive & Central Computing Facility R.V. COLLEGE OF ENGINEERING BANGALORE
  • 2. Why Cloud- As basic Business Scenarios Fast Application Deployment Hassle Free Maintenance Better Resources Utilization Platform Independent, Security, Scalability
  • 3. What is Cloud? Infrastructure provided by the service provider to build internet application. The service provided by cloud are categorize > Software As a Service > Infrastructure As a Service > Platform As a Service > Database As a Service > Software plus Service
  • 4. Cloud Architecture , NW Access, Security
  • 6. Cloud Computing Cycle, NW access, Security
  • 7. Cloud Computing, NW Access Growth Rate