K.S.R.
COLLEGE OF ENGINEERING
                 (AUTONOMOUS)
    DEPARTMENT OF CIVIL ENGINEERING
      PRINCIPLE OF CLOUD COMPUTING
                 20IT908
SEMINAR TOPIC :
           CLOUD SERIVICE PROVIDED
                   NAME : ASHWINKUMAR S
                   REG NO: 73152112003
Cloud Service
Provider
Cloud service providers offer computing resources and services over the
internet, enabling businesses to access and manage their data and
applications remotely.
What is Cloud Computing?
Cloud computing is a model of delivering computing services, such as
servers, storage, databases, networking, software, analytics, and
intelligence, over the Internet.
  On-Demand Self-                        Broad Network Access
  Service                                Cloud services are available via
  Users can access and provision         multiple devices and locations.
  cloud resources independently.
  Resource Pooling                       Rapid Elasticity
  Providers pool resources to            Cloud resources can be scaled
  serve multiple consumers,              up or down quickly to meet
  allowing for dynamic allocation        changing demands.
  and utilization.
Benefits of Cloud Services
Cloud services offer numerous benefits for businesses, including cost savings,
scalability, flexibility, and improved efficiency.
  1     Cost Savings                                 2   Scalability and
        Cloud services eliminate the need
                                                         Flexibility
        for upfront investments in                       Cloud resources can be easily
        hardware and infrastructure.                     scaled up or down to meet
                                                         changing demands, providing
                                                         flexibility and agility.
 3      Improved Efficiency                          4   Enhanced Security
        Cloud services streamline IT                     Cloud providers offer robust
        operations, freeing up IT                        security measures and
        resources to focus on strategic                  compliance certifications to
        initiatives.                                     protect data and applications.
Popular Cloud Service Models
There are three primary cloud service models: IaaS, PaaS, and SaaS, each offering different
levels of abstraction and control.
  Model                                        Description
  IaaS                                         Provides access to virtualized computing
                                               resources, such as servers, storage, and
                                               networking.
  PaaS                                         Offers a platform for developing and
                                               deploying applications, including
                                               development tools, runtime
                                               environments, and middleware.
  SaaS                                         Delivers software applications over the
                                               internet, allowing users to access and
                                               utilize them without installation or
                                               maintenance.
Infrastructure-as-a-Service (IaaS)
IaaS provides access to virtualized computing resources, such as servers, storage, and networking, on a pay-as -you-go basis.
Benefits                                        Examples                                   Use Cases
Cost-effectiveness, flexibility, scalability,   Amazon Web S ervices (AWS ),               Hosting websites, running databases,
and control over infrastructure.                Microsoft Azure, Google Cloud Platform     deploying applications, and developing
                                                (GCP).                                     cloud-based solutions.
Platform-as-a-Service (PaaS)
PaaS provides a platform for developing and deploying applications, including development tools,
runtime environments, and middleware.
               Development Tools
               Provide a suite of tools and services for building and testing applications.
               Runtime Environments
               Offer a platform for running applications and services.
               Middleware
               Facilitate communication and data exchange between different application components.
               Deployment and Management
               Enable seamless deployment and management of applications.
Software-as-a-Service (SaaS)
SaaS delivers software applications over the internet, allowing users to access and utilize them without installation or maintenance.
Accessibility                        Scalability                          Security                             Cost-Effectiveness
Users can access SaaS                SaaS providers manage the            SaaS providers handle security       SaaS applications are typically
applications from any device         infrastructure and scalability,      measures and compliance              subscription-based, eliminating
with an internet connection.         ensuring application availability.   certifications.                      upfront costs and reducing IT
                                                                                                               expenses.
Ensuring Data Security and
Compliance
Data security and compliance are paramount considerations when using cloud
services.
 1     Encryption                           2   Access Control
       Implement strong encryption              Establish granular access control
       mechanisms to protect data in            policies to restrict unauthorized
       transit and at rest.                     access to sensitive data.
 3     Compliance                           4   Auditing
       Ensure adherence to industry-            Regularly audit cloud security
       specific regulations and                 measures to identify and mitigate
       compliance certifications, such as       potential vulnerabilities.
       HIPAA, GDPR , and PCI DS S .
THANK YOU…