Unformatted text preview:

Above the Clouds: A Berkeley View of Cloud Computing&Outlook: Cloudy with a Chance of Security Challenges and ImprovementsImprovementsPresented byNikhil Tripathi1Introduction• Cloud provides resources necessary to execute user tasks.• No need for users to purchase and maintain resources.maintain resources.• Plug in to the cloud and pay as you use.2DefinitionEngineering definition : Use of Internet based technology for variety of services whereby dynamically scalable and often virtualized resources are provided as a service over the Internet.Internet.Business definition : A method to address scalability and availability concerns for large scale applications.3Pay as you use• Vendor provides resources on which customers can run one or more cloud instances concurrently.•Customers pay fee based on the cloud •Customers pay fee based on the cloud resources used to run their instances.• Pricing is based on computing resources used like compute time, memory or network bandwidth.4Views of AudienceDo you think if user of a cloud is over-dependent on the cloud then the provider would take advantage of this situation by increasing costs or other policies of increasing costs or other policies of service ?5Components involved in Cloud Computing6Saas UserWeb ApplicationsSaas Provider/ Cloud UserUtility Computing7Cloud ProviderUsers and Providers of Cloud ComputingCloud Computing in Health Care• Hospitals could share infrastructure with vast number of systems linked together for reducing cost and increasing efficiency.• Access patient information from any internet enabled device without installing any enabled device without installing any software.• Cloud computing would help hospitals to achieve more efficient use of their hardware and software investments and increase profitability by improving the utilization of resources to the maximum.8Cloud Computing in Health Care• Improving patient care by digitizing health records and streamlining their business operations using cloud-based software.• Accessing technology that handles various tasks --from electronic health records (EHRs) to on-line appointment scheduling --as a service through the Internet.appointment scheduling --as a service through the Internet.• By digitizing health records and other processes, the company can provide faster and more accurate billing to individuals and insurance companies, reducing the average time to create a bill from 7 days to less than 24 hours.9Views of Audience• If all the patient data is stored in the cloud and the instead of storing Name of patient and SSN of patient, a unique patient number is stored in cloud. Only the patient knows this unique patient number and can provide this number to hospitals and can provide this number to hospitals or health insurance company whenever required.• Does this help in creating a cloud which helps to hide information of patient from hackers?10Application Opportunities• Mobile interactive applications• Parallel batch processingBusiness Analysis•Business Analysis• Extension of compute-intensive desktop applications• Earthbound applications11Elasticity• Owning a resource may result in underprovisioning.• Else if provision for satisfying peak load is made possible then there is wastage of is made possible then there is wastage of resources.12Elasticity13Obstacles • Availability of service• Data Lock-InData Confidentiality and Auditability•Data Confidentiality and Auditability• Data Transfer Bottlenecks14Obstacles • Performance Unpredictability• Scalable StorageBugs in Large-Scale Distributed Systems•Bugs in Large-Scale Distributed Systems• Scaling Quickly15Obstacles • Reputation Fate Sharing• Software Licensing16Views of AudienceCan you list some questions that should be asked to cloud computing vendor before trusting the cloud ?trusting the cloud ?17Questions to be asked before trusting the cloud computing vendor• What is vendor’s approach to the security of their infrastructure?• What are the security procedures that are in place to protect the data center?• What are the encryption technologies used by the vendors to authenticate users to the services?18Questions to be asked before trusting the cloud computing vendor• What are their terms when it comes to ownership of data?• How easy it is to export the data from their service in order to move to a new service?in order to move to a new service?• Are there any extra charges for exporting the data out of a cloud vendor’s service?• What is their privacy policy? Do they use customer’s data to promote their business interests?19Summary: Key characteristics of Cloud Computing• Minimize capital expenditure• Device and location independence • Multi-Tenancy • On-demand allocation20Thank


View Full Document
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?