๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is cloud computing?
  • What are the types of cloud computing?
  • Public clouds
  • Private clouds
  • Hybrid clouds
  • What is Infrastructure as a Service (IaaS)?
  • What is Platform as a Service (PaaS?)
  • What is Software as a Service? (SaaS?)
  • What is a Virtual Machine image?
  • What is Database-as-a-service (DaaS)?
  • What is a Managed Database?

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 1 : How Computers Work?

Cloud Computing

PreviousInternet of Things (IoT)NextChapter 2 : How the internet works?

Last updated 2 years ago

Was this helpful?

What is cloud computing?

In the far reaches of the galaxy, there exists a technology known as virtualization, or as the natives call it, 'cloud computing'.

Cloud computing is a technology that allows users to access computing resources, such as servers, storage, databases, software, and other services, over the internet or a network.

It enables users to use these resources as a utility, paying only for what they use, rather than investing in and maintaining their own physical infrastructure.

It also provides a high degree of security, as cloud service providers typically have advanced security measures in place to protect users' data and systems.

Privacy, however, is a different topic considering the convenience of letting companies safe-keep all our digital lives comes back with many privacy risks and scandals.

What are the types of cloud computing?

There are various types of cloud computing, including public, private, and hybrid clouds.

Public clouds

are owned and operated by third-party providers and offer computing resources to the general public over the internet.

Private clouds

on the other hand, are owned and operated by a single organization and are used exclusively by that organization.

Hybrid clouds

combine the benefits of both public and private clouds, allowing organizations to use both types of resources as needed.

This ingenious system provides a plethora of services, including computation, software, data access, and storage, all without the need for end-users to comprehend the physical location and configuration of their computers.

What is Infrastructure as a Service (IaaS)?

Infrastructure as a Service (IaaS) is like a cosmic blacksmith, forging powerful tools and equipment for users to wield as they see fit. IaaS provides users with access to computing resources such as servers, storage, and networking over the internet, allowing them to build their own IT infrastructure in the cloud.

It is highly customizable and flexible, enabling users to configure and manage their own virtual machines and storage solutions.

What is Platform as a Service (PaaS?)

Platform as a Service (PaaS), on the other hand, is like a planetary gardener, cultivating a fertile soil for users to sow their digital seeds. PaaS provides users with a platform for developing, testing, and deploying software applications in the cloud, without the need for them to manage the underlying infrastructure.

PaaS enables users to focus on developing and delivering their applications, rather than worrying about the underlying IT infrastructure.

What is Software as a Service? (SaaS?)

Software as a Service (SaaS) is like a cosmic librarian, providing users with access to a vast library of software applications, all from the comfort of their own devices. SaaS provides users with access to software applications over the internet, typically on a subscription basis.

It allows users to use software applications without the need to install or maintain the software themselves, as the provider takes care of everything from updates to security.

What is a Virtual Machine image?

It enables users to purchase virtual machine instances for a limited time, running databases seamlessly.

What is Database-as-a-service (DaaS)?

It allows users to access databases without physically launching a virtual machine instance for the database.

This configuration liberates application owners from the hassles of installing and maintaining the database on their own, with the database service provider taking on the mantle of installation and maintenance, with payments according to usage.

What is a Managed Database?

Here, the database is not offered as a service; instead, the cloud provider hosts and manages the database on the application owner's behalf, freeing them from the burdens of database management.

๐ŸŽ“
โšก
Page cover image