SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Research and Reviews in Information Sciences (IJRRIS)
Vol. 1, No. 3, September 2011, ISSN: 2046-6439
© Science Academy Publisher, United Kingdom
www.sciacademypublisher.com

77

Exploring the Cloud Deployment and Service Delivery Models
Mervat Adib Bamiah and Sarfraz Nawaz Brohi
Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia
Email: mervatbamiah@yahoo.com, sarfraz_brohi@hotmail.com

Abstract – In the past when we used to search the word “cloud” on Google, it used to generate some results related to
atmosphere, nature or water droplets. Nowadays when the same search query is submitted, Google returns results related to
computing or internet, this is due to revolutionizing change in the era of technology. A new paradigm of computing is
discovered that is cloud computing where word cloud is used as a metaphor for the internet. With the advent of this
technology, organizations are rapidly shifting their IT systems from traditional client/server to cloud computing model where
everything is offered as a service whether it’s a software, hardware or storage capacity. In order to fulfill the heterogeneous
demands of users, cloud providers are offering variety of services (SaaS, PaaS, IaaS) and deployment models (Public, Private,
Hybrid) to the organizations as well as individuals. However, considering the future of cloud computing, there is a need to
provide more agile IT services as solutions to the organizations. In this research paper, we have described existing and
upcoming cloud deployment and service delivery models that may be provided to the cloud users in near future.
Keywords – Service Delivery Models, Deployment Models

1.

Introduction

Cloud computing is a model that enables convenient, ondemand network access to a shared pool of configurable
computing resources such as networks, servers, storage,
applications that can be rapidly provisioned and released with
minimal management effort or service provider’s interaction
[1]. In general cloud providers offer three types of services
i.e. Software as a Service (SaaS), Platform as a Service
(PaaS) and Infrastructure as a Service (IaaS). With the exploit
of this technology, users can access heavy applications via
lightweight portable devices such as mobile phones, PCs and
PDAs. Cloud computing moves computing and data away
from desktops and portable PCs into huge data centers which
saves cost and forms a new agile way of performing
businesses [2].There are various reasons for organizations to
move towards IT solutions that include cloud computing as
they are just required to pay for the resources on consumption
basis. In addition, organizations can easily meet the needs of
rapidly changing markets to ensure that they are always on
the leading edge for their consumers.

2.

Cloud Computing Deployment Models

National Institute of Standards and Technology (NIST)
summarized the cloud computing characteristics as ondemand self-service, ubiquitous network access, resource
pooling, rapid elasticity and pay per use. The rapid transition
towards cloud computing has increased the demands for more
deployment models. Selection of these models depends on
clients’ data sensitivity and management requirements [1].
2.1. Private Cloud
Private cloud (internal cloud) infrastructure is dedicated
to a single particular organization or group. It is not shared
with other organizations. Private cloud can be owned or
leased. It may be managed by the organization or a third

party and can exist at on-premises or off-premises. Private
cloud is more expensive and secure when compared to public
cloud [3]. Private cloud is hosted inside the organization’s
firewall. It can be accessed by users within the organization
via intranet as shown in figure 1 [5].

Figure 1. Private cloud.

Private clouds are flexible and service-based. Processes,
services and data are managed within the organization. In
private cloud there are no additional security regulations,
legal requirements or bandwidth limitations that can be
present in a public cloud environment, by using a private
cloud, the cloud service providers and the clients have
optimized control of the infrastructure and improved security,
since user’s access and the networks used are restricted [4].
2.2. Public Cloud
Public cloud (external cloud) infrastructure is offered via
web applications as well as web services over the internet to
the public or a large industry group and is owned by an
organization selling cloud services as shown in figure 2 [5].
Public cloud provides an elastic, cost-effective way to
deploy IT solutions. The term public doesn’t mean that users’
data is publicly visible. Public cloud involves applications
such as customer relationship management (CRM),
messaging and office productivity [6]. Public cloud providers
Mervat Adib Bamiah and Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 77-80, September 2011

such as Google or Amazon offer an access control to their
clients [4].

Figure 2. Public cloud.

2.3. Hybrid Cloud
This cloud deployment model exists due to mixed needs
of an organization. It is combination of two or more cloud
service deployment models (Private, Public, Community) as
shown in figure 3 [5]. Organizations may host critical
applications on private clouds and applications with
relatively less security concerns on the public cloud [4].

Figure 3. Hybrid cloud.

A combination of a public and a private cloud is joined
together for the purpose of keeping business-critical data and
services in their control on private cloud and outsourcing
less-critical processing to the public cloud.
2.4. Community Cloud
Community cloud is a shared infrastructure by several
organizations and supports a specific community that has
shared concerns e.g., mission, security requirements, policy,
and compliance considerations. It may be managed by the
organizations or a third party and may exist at on-premises or
off-premises [7]. Community cloud offers higher level of
privacy, security and policy compliances. Examples of
community clouds include Google’s “Gov Cloud”.

78

2.5. Combined Cloud
Combined cloud is formed of two clouds that have been
joined together. It consists of multiple internal and external
providers. By integrating multiple cloud services, users will
be able to ease the transition to public cloud services while
avoiding issues such as Payment Card Industry (PCI)
compliance [8].
2.6. Inter Cloud (Cloud of Clouds)
Inter cloud refers to a mesh of clouds that are
interconnected based on open standards to provide a
universal environment for cloud computing. It is a concept
based on the aggregation of deployed clouds similar to
internet, which is a network of networks. It refers to an interconnected global cloud of clouds that provides massive
collection of services to the users [9].

3.

Cloud Computing Service Delivery Models

Cloud computing consists of various types of services that
are delivered to the users as on-demand. The cloud service
delivery models are described as follows:
3.1. Software as a Service (SaaS)
In this model, provider facilitates the clients with licensed
applications running on a cloud infrastructure through a thin
client interface such as a web browser over the internet on
pay-per-use pricing pattern. Clients are not required to
manage or control the underlying cloud infrastructure
including network, servers, operating systems or storage [11].
Currently, SaaS is a perfect model to access the light
weight applications such as word processor, media player etc.
However when it comes to heavy weight applications such as
playing online 3D games, the performance of SaaS may go
down due to buffering time. SaaS is provided by several
vendors such as Zoho Suite, Apple’s MobileMe and Google
Docs [10]. Normally the provider resides and maintains client
hired applications on a specific virtual machine in a
virtualized cloud environment.
3.2. Platform as a Service (PaaS)
In this model, provider facilitates the clients with the
programming language platforms and software such as but
not limited to Java, Python or .Net, to deploy their created or
acquired applications on the cloud infrastructure over the
internet with Application Program Interfaces (APIs) or
website portals [11]. PaaS providers facilitate several services
for application developers such as virtual development
environment, application standards based on the developers’
requirements, configured toolkits for the virtual development
environment and ready-made distribution channel for public
application developers [3]. Clients have control over the
deployed applications and possibly application hosting
environment configurations. However, clients don’t have
control over the underlying cloud infrastructure including
network, servers, operating systems or storage [11]. In PaaS
model, it’s the cloud provider’s responsibility to secure the
computing platform and development environment, while the
clients must secure their applications themselves [12].
Example of PaaS providers are Google App Engine,
Force.com, and Microsoft Azure [3].
Mervat Adib Bamiah and Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 77-80, September 2011

3.3. Infrastructure as a Service (IaaS)
In this cloud service delivery model the provider
facilitates the capability to clients for provision processing,
storage, networks and other fundamental computing
resources where the clients are able to deploy and run
arbitrary software that includes operating systems and
applications. IaaS delivers a platform virtualization
environment as a service [15]. Clients have control over
memory, CPU, IP addresses, operating systems, storage,
deployed applications and possibly limited control of selected
networking components e.g., host firewalls. Clients do not
manage or control the underlying cloud infrastructure [11]. In
IaaS model, cloud providers must provide a trusted host and
Virtual Machine Monitoring (VMM) environment for the
clients. Example of IaaS providers are Amazon EC2 and S3,
Sun Microsystems and Dropbox [3].
3.4. Integration as a Service (IgaaS)
Integration as a Service is a delivery model that inputs the
functionality of system integration into cloud, providing data
transport between the organization wide systems and third
parties (suppliers and other trading partners) ondemand. Small and Medium Business (SMBs) use IgaaS
because it enables any type of B2B integration at low cost
with a light IT footprint which allows SMEs to focus their
resources on their core business instead of managing costly
IT infrastructure [18]. IaaS providers include Amazon SQS,
OpSource Connect, Boomi and Mule On-Demand.
3.5. Business Process as a Service (BPaaS)
Business Process as a Service (BPaaS) sometimes called
as Business Process Management as a Service (BPMaaS)
refers to any business process delivered within a cloud
service model (multitenant, self service provisioning, elastic
scaling and usage metering or pricing) through the internet
accessing via web-centric interfaces and exploiting weboriented cloud architecture [19]. BPaaS is an emerging cloud
service model whereby the clients can consume business
outcomes (payroll processing or human resource) by
accessing business services via web-centric interfaces on
multi-tenant and shared infrastructures.
3.6. Desktop as a Service (DaaS)
Desktop as a service, also referred as virtual desktop or
hosted desktop services, is a multi-tenant architecture that is
based on outsourcing of a virtual desktop infrastructure
(VDI) to a third party service provider. Clients can use the
services on subscription basis. In this delivery model, the
service provider manages the back-end responsibilities of
data storage, backup, security and upgrades. The client’s
personal data is copied to and from the virtual desktop during
logon/logoff. However, access to the desktop is device,
location and network independent [13].
3.7. Testing as a Service (TaaS)
The aim of this delivery model is to enable the
organizations to do a realistic proof-of-concept test before
they decide to transform their IT to the required cloud
computing model via an emulator such as iTrinegy. This
service will allow the clients to monitor how significant
factors can affect the network such as packet loss, bandwidth,

79

latency and response time for better decision making [14].
3.8. Management as a Service (MaaS)
Management as a Service is on-demand service that
provides the ability to manage one or more cloud services
such topology, resource utilization, virtualization and uptime
management. Common Cloud Management Platform
(CCMP) contains a set of business and operational
management focused services for managing and delivering
instances of cloud services of any category to the clients and
allowing them to manage their cloud service instances in a
self-service mode [17].
3.9. Security as a Service (SecaaS)
Security as a Service refers to delivery of secure platform
and applications to the clients as per their request. If security
is fully under the management of provider, clients will feels
lack of control on their personal data. The security must be a
shared agreement between clients and provider. When the
clients are able to maintain their own personal security keys,
it will provide them a sense of confidence for storing their
confidential data on cloud. In order to ensure the safety of
client’s data, provider needs to offer anti-virus, anti-malware
and several other security related software to clients as
services.
4.

Conclusion

A survey was conducted from several organizations about
the deployment of cloud computing and its provided services.
The survey results are shown in figure 4 [20].

Figure 4. Survey on Cloud Service Model.

One-third of the companies involved in the survey are
already deploying cloud-based solutions. With SaaS ranking
among 70% of respondents as the number one cloud platform
implemented or planned for implementation. SaaS was
followed by IaaS with 34% and PaaS with 25%. This survey
shows the utilization of general cloud service models,
however there is need to implement and deploy new cloud
based service delivery models to fulfil the emerging
requirements of cloud users in the near future.

Acknowledgment
The glory of accomplishing this research paper goes to
our parents for their moral support. We are also thankful to
our supervisor for encouraging us to write this research
journal. Finally, we are thankful to science academy
Mervat Adib Bamiah and Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 77-80, September 2011

publishers for assisting us to review this journal and
providing us timely response. Miss Mervat Adib Bamiah is
thankful to Mr. Muhammad Imran Bamiah for his
encouraging support.

References
[1]

[2]

[3]

[4]

[5]
[6]

[7]

[8]
[9]

[10]

[11]

[12]

[13]

[14]

[15]

[16]

[17]

[18]

[19]

[20]

P., Mell, T., Grance .”The NIST definition of cloud computing”,
[Online], Available: http://csrc.nist.gov/groups/SNS/cloudcomputing/cloud-def-v15.doc , 2009. [Accessed: 15-July- 2011].
S., Brohi, M., Bamiah, “Challenges and Benefits for Adopting the
Paradigm of Cloud Computing” International Journal of Advanced
Engineering Sciences and Technologies, (IJAEST), vol. 8, pp.286-290,
2011.
L. Savu, “Cloud Computing: Deployment Models, Delivery Models,
Risks and Research Challenges,” in Computer and Management
(CAMAN), 2011 International Conference on, 2011, pp. 1-4.
P., Metri, G., Sarote. “Privacy Issues and Challenges in Cloud
Computing”. International Journal of Advanced Engineering Sciences
and Technologies (IJAEST), vol. 5, pp.1-6, 2011.
T., Klančnik, “NIL - In the Core of the Cloud.” [Online]. Available:
http://www.nil.si/ipcorner/CoreCloud/ . [Accessed: 15-Jul-2011].
“HPC in the Cloud: Frost & Sullivan: Australia Leads Asia Pacific
Adoption of Cloud Computing.” [Online]. Available:
http://www.hpcinthecloud.com/hpccloud/2011-05
30/frost_sullivan_australia_leads_asia_pacific_adoption_of_cloud_co
mputing.html [Accessed: 08-Jul-2011].
CSA, “Security Guidance for Critical Areas of Focus in Cloud
Computing V2.1” Cloud Security Alliance, 2009 [Online]. Available:
http://www.cloudsecurityalliance.org/guidance/csaguide.v1.0.pdf
[Accessed: 08-July-2011].
“Different Types of Cloud | Cloud Consultancy.” [Online]. Available:
http://www.cloudconsultancy.asia/?p=14 [Accessed: 15-Jul-2011].
“Cloud Services with Windows Azure : Cloud Computing 101 Windows Azure - allcomputers.us.” [Online]. Available:
http://allcomputers.us/windows_azure/cloud-services-with-windowsazure---cloud-computing-101.aspx [Accessed: 15-Jul-2011].
Cisco Systems, “Cisco Cloud Computing - Data Center Strategy,
Architecture, and Solutions” [Online].Available:
http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputing_
WP.pdf , 2009. [Accessed: 12-March -2011].
Kai Hwang, S. Kulkareni, and Yue Hu, “Cloud Security with
Virtualized Defense and Reputation-Based Trust Management,” in
Dependable, Autonomic and Secure Computing, 2009. DASC ’09.
Eighth IEEE International Conference on, 2009, pp. 717-722
Xiao-Yong Li, Li-Tao Zhou, Yong Shi, and Yu Guo, “A trusted
computing environment model in cloud architecture” in Machine
Learning and Cybernetics (ICMLC), 2010 International Conference
on, 2010, vol. 6, pp. 2843-2848.
“What is desktop as a service (DaaS)? - Definition from Whatis.com.”
[Online]. Available:
http://searchvirtualdesktop.techtarget.com/definition/desktop-as-aservice-DaaS. [Accessed: 14-Jul-2011].
“Latest Cloud Computing, iTrinegy Testing As A Service (TaaS) |
cloudingworld.com.” [Online]. Available:
http://cloudingworld.com/cloud-news/latest-cloud-computing-itrinegytesting-as-a-service-taas.html. [Accessed: 14-Jul-2011].
Jianfeng Yang and Zhibin Chen, “Cloud Computing Research and
Security Issues,” in Computational Intelligence and Software
Engineering (CiSE), 2010 International Conference on, 2010, pp. 1-3.
Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen, and Zhenghu
Gong, “The Characteristics of Cloud Computing,” in Parallel
Processing Workshops (ICPPW), 2010 39th International Conference
on, 2010, pp. 275-279.
“MaaS | What is Cloud Computing? | Cloud Consulting, Cloud
Services and Cloud Computing Technology.” [Online]. Available:
http://www.lizeversoll.com/2011/01/31/maas/. [Accessed: 15-Jul2011].
QLOGITEK, “Integration-as-a-Service (IaaS).” [Online]. Available:
http://www.qlogitek.com/en/services/Integration-as-a-Service.aspx.
[Accessed: 13-Jul-2011].
IBM, “Cloud Deployment and Delivery Models”, 2010, Available
from https://www.ibm.com/developerworks/mydeveloperworks/
c2028fdc.[ Accessed13- July -2011].
M., Dawson.“SaaS Solutions Lead the Pack in Cloud Implementations
– Hubspan.2010” [Online]. Available: http://www.hubspan.com/cloudcomputing/saas-solutions-lead-the-pack-in-cloud-implementations/.
[Accessed: 14-Jul-2011].

80

More Related Content

What's hot

A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesIJCSIS Research Publications
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESTushar Dhoot
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingIOSR Journals
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paperjagan339
 
Cloud Computing: Business Trends and the Challenges
Cloud Computing: Business Trends and the ChallengesCloud Computing: Business Trends and the Challenges
Cloud Computing: Business Trends and the Challengesidescitation
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Cloud computing
Cloud computingCloud computing
Cloud computingJawhar Ali
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 

What's hot (18)

A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and Techniques
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud Computing
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
Cloud Computing: Business Trends and the Challenges
Cloud Computing: Business Trends and the ChallengesCloud Computing: Business Trends and the Challenges
Cloud Computing: Business Trends and the Challenges
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 

Viewers also liked

Project Potential - Mission One Lakh Fellowship
Project Potential - Mission One Lakh FellowshipProject Potential - Mission One Lakh Fellowship
Project Potential - Mission One Lakh FellowshipZubin Sharma
 
Caperucita Roja
Caperucita RojaCaperucita Roja
Caperucita Rojasofia2409
 
第2期中期目標期間終了時の国立大学法人評価の概要
第2期中期目標期間終了時の国立大学法人評価の概要第2期中期目標期間終了時の国立大学法人評価の概要
第2期中期目標期間終了時の国立大学法人評価の概要Tomoya Uchida
 
사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토
사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토 사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토
사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토 thnashja
 
VOLPE_Paolo_Pegasus_certificate
VOLPE_Paolo_Pegasus_certificateVOLPE_Paolo_Pegasus_certificate
VOLPE_Paolo_Pegasus_certificatePaolo Volpe
 
Sermão Santo António aos Peixes Exórdio
Sermão Santo António aos Peixes ExórdioSermão Santo António aos Peixes Exórdio
Sermão Santo António aos Peixes ExórdioAlexandra Madail
 
사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토
 사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토  사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토
사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토 thnashja
 
Higiene y seguridad industrial tercer corte, jose matoma
Higiene y seguridad industrial  tercer corte, jose matomaHigiene y seguridad industrial  tercer corte, jose matoma
Higiene y seguridad industrial tercer corte, jose matomaJose Diego
 
사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토
사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토 사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토
사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토 thnashja
 
사설토토《\DAdo55.COM\》 사설토토 사설토토
 사설토토《\DAdo55.COM\》 사설토토 사설토토  사설토토《\DAdo55.COM\》 사설토토 사설토토
사설토토《\DAdo55.COM\》 사설토토 사설토토 thnashja
 
Planning colour scheme
Planning colour schemePlanning colour scheme
Planning colour schemeGeorgiaLeaper
 
La plaza 25 de Mayo y sus plantas medicinales
La plaza 25 de Mayo y sus plantas medicinales La plaza 25 de Mayo y sus plantas medicinales
La plaza 25 de Mayo y sus plantas medicinales Belén Astegiano
 
Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...
Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...
Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...Behn Wyetzner, Chartered
 
What people think: explaining urban cycling
What people think: explaining urban cyclingWhat people think: explaining urban cycling
What people think: explaining urban cyclingRobin Lovelace
 
Get into game programming
Get into game programmingGet into game programming
Get into game programmingAndrew Fray
 

Viewers also liked (20)

Semana de mayo
Semana de mayoSemana de mayo
Semana de mayo
 
Project Potential - Mission One Lakh Fellowship
Project Potential - Mission One Lakh FellowshipProject Potential - Mission One Lakh Fellowship
Project Potential - Mission One Lakh Fellowship
 
Caperucita Roja
Caperucita RojaCaperucita Roja
Caperucita Roja
 
第2期中期目標期間終了時の国立大学法人評価の概要
第2期中期目標期間終了時の国立大学法人評価の概要第2期中期目標期間終了時の国立大学法人評価の概要
第2期中期目標期間終了時の国立大学法人評価の概要
 
사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토
사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토 사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토
사설토토 사설토토 \\\DAdo55쩜 COM /// 사설토토 사설토토
 
VOLPE_Paolo_Pegasus_certificate
VOLPE_Paolo_Pegasus_certificateVOLPE_Paolo_Pegasus_certificate
VOLPE_Paolo_Pegasus_certificate
 
Sermão Santo António aos Peixes Exórdio
Sermão Santo António aos Peixes ExórdioSermão Santo António aos Peixes Exórdio
Sermão Santo António aos Peixes Exórdio
 
사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토
 사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토  사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토
사설토토\\\DAdo55쩜 COM /// 사설토토 사설토토
 
29
2929
29
 
28
2828
28
 
Higiene y seguridad industrial tercer corte, jose matoma
Higiene y seguridad industrial  tercer corte, jose matomaHigiene y seguridad industrial  tercer corte, jose matoma
Higiene y seguridad industrial tercer corte, jose matoma
 
사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토
사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토 사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토
사설토토 사설토토 ジジジDaDo55쩜 COM ジジジ 사설토토 사설토토
 
Demo Close Out SOP
Demo Close Out SOPDemo Close Out SOP
Demo Close Out SOP
 
사설토토《\DAdo55.COM\》 사설토토 사설토토
 사설토토《\DAdo55.COM\》 사설토토 사설토토  사설토토《\DAdo55.COM\》 사설토토 사설토토
사설토토《\DAdo55.COM\》 사설토토 사설토토
 
Planning colour scheme
Planning colour schemePlanning colour scheme
Planning colour scheme
 
La plaza 25 de Mayo y sus plantas medicinales
La plaza 25 de Mayo y sus plantas medicinales La plaza 25 de Mayo y sus plantas medicinales
La plaza 25 de Mayo y sus plantas medicinales
 
2015 Summer Saratogan
2015 Summer Saratogan2015 Summer Saratogan
2015 Summer Saratogan
 
Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...
Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...
Qui Tam Action Legal Papers Brought by Bernard Lisitza Against Pharmacy Compa...
 
What people think: explaining urban cycling
What people think: explaining urban cyclingWhat people think: explaining urban cycling
What people think: explaining urban cycling
 
Get into game programming
Get into game programmingGet into game programming
Get into game programming
 

Similar to Exploring the cloud deployment and service delivery models (2)

Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Cloud computing - Latest Trend
Cloud computing - Latest TrendCloud computing - Latest Trend
Cloud computing - Latest Trendpoojanov04
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 

Similar to Exploring the cloud deployment and service delivery models (2) (20)

Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
cloud computing
cloud computing cloud computing
cloud computing
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Cloud computing - Latest Trend
Cloud computing - Latest TrendCloud computing - Latest Trend
Cloud computing - Latest Trend
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
G0314043
G0314043G0314043
G0314043
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
G017324043
G017324043G017324043
G017324043
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Exploring the cloud deployment and service delivery models (2)

  • 1. International Journal of Research and Reviews in Information Sciences (IJRRIS) Vol. 1, No. 3, September 2011, ISSN: 2046-6439 © Science Academy Publisher, United Kingdom www.sciacademypublisher.com 77 Exploring the Cloud Deployment and Service Delivery Models Mervat Adib Bamiah and Sarfraz Nawaz Brohi Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia Email: mervatbamiah@yahoo.com, sarfraz_brohi@hotmail.com Abstract – In the past when we used to search the word “cloud” on Google, it used to generate some results related to atmosphere, nature or water droplets. Nowadays when the same search query is submitted, Google returns results related to computing or internet, this is due to revolutionizing change in the era of technology. A new paradigm of computing is discovered that is cloud computing where word cloud is used as a metaphor for the internet. With the advent of this technology, organizations are rapidly shifting their IT systems from traditional client/server to cloud computing model where everything is offered as a service whether it’s a software, hardware or storage capacity. In order to fulfill the heterogeneous demands of users, cloud providers are offering variety of services (SaaS, PaaS, IaaS) and deployment models (Public, Private, Hybrid) to the organizations as well as individuals. However, considering the future of cloud computing, there is a need to provide more agile IT services as solutions to the organizations. In this research paper, we have described existing and upcoming cloud deployment and service delivery models that may be provided to the cloud users in near future. Keywords – Service Delivery Models, Deployment Models 1. Introduction Cloud computing is a model that enables convenient, ondemand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications that can be rapidly provisioned and released with minimal management effort or service provider’s interaction [1]. In general cloud providers offer three types of services i.e. Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). With the exploit of this technology, users can access heavy applications via lightweight portable devices such as mobile phones, PCs and PDAs. Cloud computing moves computing and data away from desktops and portable PCs into huge data centers which saves cost and forms a new agile way of performing businesses [2].There are various reasons for organizations to move towards IT solutions that include cloud computing as they are just required to pay for the resources on consumption basis. In addition, organizations can easily meet the needs of rapidly changing markets to ensure that they are always on the leading edge for their consumers. 2. Cloud Computing Deployment Models National Institute of Standards and Technology (NIST) summarized the cloud computing characteristics as ondemand self-service, ubiquitous network access, resource pooling, rapid elasticity and pay per use. The rapid transition towards cloud computing has increased the demands for more deployment models. Selection of these models depends on clients’ data sensitivity and management requirements [1]. 2.1. Private Cloud Private cloud (internal cloud) infrastructure is dedicated to a single particular organization or group. It is not shared with other organizations. Private cloud can be owned or leased. It may be managed by the organization or a third party and can exist at on-premises or off-premises. Private cloud is more expensive and secure when compared to public cloud [3]. Private cloud is hosted inside the organization’s firewall. It can be accessed by users within the organization via intranet as shown in figure 1 [5]. Figure 1. Private cloud. Private clouds are flexible and service-based. Processes, services and data are managed within the organization. In private cloud there are no additional security regulations, legal requirements or bandwidth limitations that can be present in a public cloud environment, by using a private cloud, the cloud service providers and the clients have optimized control of the infrastructure and improved security, since user’s access and the networks used are restricted [4]. 2.2. Public Cloud Public cloud (external cloud) infrastructure is offered via web applications as well as web services over the internet to the public or a large industry group and is owned by an organization selling cloud services as shown in figure 2 [5]. Public cloud provides an elastic, cost-effective way to deploy IT solutions. The term public doesn’t mean that users’ data is publicly visible. Public cloud involves applications such as customer relationship management (CRM), messaging and office productivity [6]. Public cloud providers
  • 2. Mervat Adib Bamiah and Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 77-80, September 2011 such as Google or Amazon offer an access control to their clients [4]. Figure 2. Public cloud. 2.3. Hybrid Cloud This cloud deployment model exists due to mixed needs of an organization. It is combination of two or more cloud service deployment models (Private, Public, Community) as shown in figure 3 [5]. Organizations may host critical applications on private clouds and applications with relatively less security concerns on the public cloud [4]. Figure 3. Hybrid cloud. A combination of a public and a private cloud is joined together for the purpose of keeping business-critical data and services in their control on private cloud and outsourcing less-critical processing to the public cloud. 2.4. Community Cloud Community cloud is a shared infrastructure by several organizations and supports a specific community that has shared concerns e.g., mission, security requirements, policy, and compliance considerations. It may be managed by the organizations or a third party and may exist at on-premises or off-premises [7]. Community cloud offers higher level of privacy, security and policy compliances. Examples of community clouds include Google’s “Gov Cloud”. 78 2.5. Combined Cloud Combined cloud is formed of two clouds that have been joined together. It consists of multiple internal and external providers. By integrating multiple cloud services, users will be able to ease the transition to public cloud services while avoiding issues such as Payment Card Industry (PCI) compliance [8]. 2.6. Inter Cloud (Cloud of Clouds) Inter cloud refers to a mesh of clouds that are interconnected based on open standards to provide a universal environment for cloud computing. It is a concept based on the aggregation of deployed clouds similar to internet, which is a network of networks. It refers to an interconnected global cloud of clouds that provides massive collection of services to the users [9]. 3. Cloud Computing Service Delivery Models Cloud computing consists of various types of services that are delivered to the users as on-demand. The cloud service delivery models are described as follows: 3.1. Software as a Service (SaaS) In this model, provider facilitates the clients with licensed applications running on a cloud infrastructure through a thin client interface such as a web browser over the internet on pay-per-use pricing pattern. Clients are not required to manage or control the underlying cloud infrastructure including network, servers, operating systems or storage [11]. Currently, SaaS is a perfect model to access the light weight applications such as word processor, media player etc. However when it comes to heavy weight applications such as playing online 3D games, the performance of SaaS may go down due to buffering time. SaaS is provided by several vendors such as Zoho Suite, Apple’s MobileMe and Google Docs [10]. Normally the provider resides and maintains client hired applications on a specific virtual machine in a virtualized cloud environment. 3.2. Platform as a Service (PaaS) In this model, provider facilitates the clients with the programming language platforms and software such as but not limited to Java, Python or .Net, to deploy their created or acquired applications on the cloud infrastructure over the internet with Application Program Interfaces (APIs) or website portals [11]. PaaS providers facilitate several services for application developers such as virtual development environment, application standards based on the developers’ requirements, configured toolkits for the virtual development environment and ready-made distribution channel for public application developers [3]. Clients have control over the deployed applications and possibly application hosting environment configurations. However, clients don’t have control over the underlying cloud infrastructure including network, servers, operating systems or storage [11]. In PaaS model, it’s the cloud provider’s responsibility to secure the computing platform and development environment, while the clients must secure their applications themselves [12]. Example of PaaS providers are Google App Engine, Force.com, and Microsoft Azure [3].
  • 3. Mervat Adib Bamiah and Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 77-80, September 2011 3.3. Infrastructure as a Service (IaaS) In this cloud service delivery model the provider facilitates the capability to clients for provision processing, storage, networks and other fundamental computing resources where the clients are able to deploy and run arbitrary software that includes operating systems and applications. IaaS delivers a platform virtualization environment as a service [15]. Clients have control over memory, CPU, IP addresses, operating systems, storage, deployed applications and possibly limited control of selected networking components e.g., host firewalls. Clients do not manage or control the underlying cloud infrastructure [11]. In IaaS model, cloud providers must provide a trusted host and Virtual Machine Monitoring (VMM) environment for the clients. Example of IaaS providers are Amazon EC2 and S3, Sun Microsystems and Dropbox [3]. 3.4. Integration as a Service (IgaaS) Integration as a Service is a delivery model that inputs the functionality of system integration into cloud, providing data transport between the organization wide systems and third parties (suppliers and other trading partners) ondemand. Small and Medium Business (SMBs) use IgaaS because it enables any type of B2B integration at low cost with a light IT footprint which allows SMEs to focus their resources on their core business instead of managing costly IT infrastructure [18]. IaaS providers include Amazon SQS, OpSource Connect, Boomi and Mule On-Demand. 3.5. Business Process as a Service (BPaaS) Business Process as a Service (BPaaS) sometimes called as Business Process Management as a Service (BPMaaS) refers to any business process delivered within a cloud service model (multitenant, self service provisioning, elastic scaling and usage metering or pricing) through the internet accessing via web-centric interfaces and exploiting weboriented cloud architecture [19]. BPaaS is an emerging cloud service model whereby the clients can consume business outcomes (payroll processing or human resource) by accessing business services via web-centric interfaces on multi-tenant and shared infrastructures. 3.6. Desktop as a Service (DaaS) Desktop as a service, also referred as virtual desktop or hosted desktop services, is a multi-tenant architecture that is based on outsourcing of a virtual desktop infrastructure (VDI) to a third party service provider. Clients can use the services on subscription basis. In this delivery model, the service provider manages the back-end responsibilities of data storage, backup, security and upgrades. The client’s personal data is copied to and from the virtual desktop during logon/logoff. However, access to the desktop is device, location and network independent [13]. 3.7. Testing as a Service (TaaS) The aim of this delivery model is to enable the organizations to do a realistic proof-of-concept test before they decide to transform their IT to the required cloud computing model via an emulator such as iTrinegy. This service will allow the clients to monitor how significant factors can affect the network such as packet loss, bandwidth, 79 latency and response time for better decision making [14]. 3.8. Management as a Service (MaaS) Management as a Service is on-demand service that provides the ability to manage one or more cloud services such topology, resource utilization, virtualization and uptime management. Common Cloud Management Platform (CCMP) contains a set of business and operational management focused services for managing and delivering instances of cloud services of any category to the clients and allowing them to manage their cloud service instances in a self-service mode [17]. 3.9. Security as a Service (SecaaS) Security as a Service refers to delivery of secure platform and applications to the clients as per their request. If security is fully under the management of provider, clients will feels lack of control on their personal data. The security must be a shared agreement between clients and provider. When the clients are able to maintain their own personal security keys, it will provide them a sense of confidence for storing their confidential data on cloud. In order to ensure the safety of client’s data, provider needs to offer anti-virus, anti-malware and several other security related software to clients as services. 4. Conclusion A survey was conducted from several organizations about the deployment of cloud computing and its provided services. The survey results are shown in figure 4 [20]. Figure 4. Survey on Cloud Service Model. One-third of the companies involved in the survey are already deploying cloud-based solutions. With SaaS ranking among 70% of respondents as the number one cloud platform implemented or planned for implementation. SaaS was followed by IaaS with 34% and PaaS with 25%. This survey shows the utilization of general cloud service models, however there is need to implement and deploy new cloud based service delivery models to fulfil the emerging requirements of cloud users in the near future. Acknowledgment The glory of accomplishing this research paper goes to our parents for their moral support. We are also thankful to our supervisor for encouraging us to write this research journal. Finally, we are thankful to science academy
  • 4. Mervat Adib Bamiah and Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 77-80, September 2011 publishers for assisting us to review this journal and providing us timely response. Miss Mervat Adib Bamiah is thankful to Mr. Muhammad Imran Bamiah for his encouraging support. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] P., Mell, T., Grance .”The NIST definition of cloud computing”, [Online], Available: http://csrc.nist.gov/groups/SNS/cloudcomputing/cloud-def-v15.doc , 2009. [Accessed: 15-July- 2011]. S., Brohi, M., Bamiah, “Challenges and Benefits for Adopting the Paradigm of Cloud Computing” International Journal of Advanced Engineering Sciences and Technologies, (IJAEST), vol. 8, pp.286-290, 2011. L. Savu, “Cloud Computing: Deployment Models, Delivery Models, Risks and Research Challenges,” in Computer and Management (CAMAN), 2011 International Conference on, 2011, pp. 1-4. P., Metri, G., Sarote. “Privacy Issues and Challenges in Cloud Computing”. International Journal of Advanced Engineering Sciences and Technologies (IJAEST), vol. 5, pp.1-6, 2011. T., Klančnik, “NIL - In the Core of the Cloud.” [Online]. Available: http://www.nil.si/ipcorner/CoreCloud/ . [Accessed: 15-Jul-2011]. “HPC in the Cloud: Frost & Sullivan: Australia Leads Asia Pacific Adoption of Cloud Computing.” [Online]. Available: http://www.hpcinthecloud.com/hpccloud/2011-05 30/frost_sullivan_australia_leads_asia_pacific_adoption_of_cloud_co mputing.html [Accessed: 08-Jul-2011]. CSA, “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1” Cloud Security Alliance, 2009 [Online]. Available: http://www.cloudsecurityalliance.org/guidance/csaguide.v1.0.pdf [Accessed: 08-July-2011]. “Different Types of Cloud | Cloud Consultancy.” [Online]. Available: http://www.cloudconsultancy.asia/?p=14 [Accessed: 15-Jul-2011]. “Cloud Services with Windows Azure : Cloud Computing 101 Windows Azure - allcomputers.us.” [Online]. Available: http://allcomputers.us/windows_azure/cloud-services-with-windowsazure---cloud-computing-101.aspx [Accessed: 15-Jul-2011]. Cisco Systems, “Cisco Cloud Computing - Data Center Strategy, Architecture, and Solutions” [Online].Available: http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputing_ WP.pdf , 2009. [Accessed: 12-March -2011]. Kai Hwang, S. Kulkareni, and Yue Hu, “Cloud Security with Virtualized Defense and Reputation-Based Trust Management,” in Dependable, Autonomic and Secure Computing, 2009. DASC ’09. Eighth IEEE International Conference on, 2009, pp. 717-722 Xiao-Yong Li, Li-Tao Zhou, Yong Shi, and Yu Guo, “A trusted computing environment model in cloud architecture” in Machine Learning and Cybernetics (ICMLC), 2010 International Conference on, 2010, vol. 6, pp. 2843-2848. “What is desktop as a service (DaaS)? - Definition from Whatis.com.” [Online]. Available: http://searchvirtualdesktop.techtarget.com/definition/desktop-as-aservice-DaaS. [Accessed: 14-Jul-2011]. “Latest Cloud Computing, iTrinegy Testing As A Service (TaaS) | cloudingworld.com.” [Online]. Available: http://cloudingworld.com/cloud-news/latest-cloud-computing-itrinegytesting-as-a-service-taas.html. [Accessed: 14-Jul-2011]. Jianfeng Yang and Zhibin Chen, “Cloud Computing Research and Security Issues,” in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, 2010, pp. 1-3. Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen, and Zhenghu Gong, “The Characteristics of Cloud Computing,” in Parallel Processing Workshops (ICPPW), 2010 39th International Conference on, 2010, pp. 275-279. “MaaS | What is Cloud Computing? | Cloud Consulting, Cloud Services and Cloud Computing Technology.” [Online]. Available: http://www.lizeversoll.com/2011/01/31/maas/. [Accessed: 15-Jul2011]. QLOGITEK, “Integration-as-a-Service (IaaS).” [Online]. Available: http://www.qlogitek.com/en/services/Integration-as-a-Service.aspx. [Accessed: 13-Jul-2011]. IBM, “Cloud Deployment and Delivery Models”, 2010, Available from https://www.ibm.com/developerworks/mydeveloperworks/ c2028fdc.[ Accessed13- July -2011]. M., Dawson.“SaaS Solutions Lead the Pack in Cloud Implementations – Hubspan.2010” [Online]. Available: http://www.hubspan.com/cloudcomputing/saas-solutions-lead-the-pack-in-cloud-implementations/. [Accessed: 14-Jul-2011]. 80