This document summarizes research on domain-specific considerations for cloud computing performance. It discusses key contributions in computational power, performance provisioning, load balancing, and service level agreements. It also analyzes the characteristics of public, private and hybrid cloud models in terms of scalability, security, reliability, cost, data integration, management and other factors. The study reveals that considering domain-specific factors is important for designing effective cloud-based applications and environments.
1. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 5
Domain Specific (Performance Perspective) Considerations of
Cloud Computing
Prithvipal Singh*, Sunny Sharma*, Amritpal Singh*, Karandeep Kaur*
* Department of Computer Science, Guru Nanak Dev University, Amritsar, Punjab
----------------------------------------************************----------------------------------
Abstract:
Cloud computing is a progressive innovation that has achieved new extravagances in the field of
Information Technology. It gives a wellspring of information and application programming stockpiling as
colossal server farms called 'mists', which can be gotten to with the assistance of a system association.
These mists boost the capacities of undertakings with no additional set-up, faculty or permitting costs.
Mists are for the most part sent utilizing Public, Private or Hybrid models relying on the necessities of the
client. In this paper, we have explored the distributed computing engineering, concentrating on the
elements of the Public, Private and Hybrid cloud models. There is a dire need to examine the performance
of a cloud environment on several metrics and enhance its usability and capability. This paper aims at
highlighting important contributions of various researchers in domains like computational power,
performance provisioning, Load balancing and SLAs.
Keywords — CC Domain, Computational Power, Performance Provisioning, Load Balancing, SLAs.
----------------------------------------************************----------------------------------
I. INTRODUCTION
The advancement to arrange and computational
innovations has experienced a wonderful period of
development and improvement. The development
bend was in reality extremely soaked in real area of
use of these advances. The appearance of Cloud
processing, Big Data examination, Evolutionary
figuring, Internet of Things (IoT) and so on has
improved the usage streets of these advancements
in different application zones. Distributed
computing has risen as an uncommon territory of
enthusiasm for some analysts keeping in
perspective its tremendous application-space scope.
Exploration is being done on various parts of CC
for distinguishing zones of change and their
particular cures. Some vital issues in CC are that of
Security, Performance (computational power,
performance provisioning, Load balancing and
Service Level Agreements). [1][3]
Cloud-computing is an inventive engineering
which gives virtualized assets to the client over the
Internet while concealing the stage subtle elements.
The cloud administration suppliers offer stockpiling
and in addition processing assets at low expenses.
In this quickly evolving world, to adjust is to
survive, so the associations are moving over to
cloud plan of action. This move towards the cloud
time is being trailed by the worries over its
unwavering quality and trust, principally regarding
data security alongside the different difficulties
confronted by distributed computing. The point of
this paper is to survey the cloud structure,
distinguishing different attributes of concern and
looking at open, private and mixture cloud in light
of them. [1][2]
II. TYPES OF CLOUD ENVIRONMENT
The Business models clarified above are conveyed
on different sorts of mists, it relies on upon who
utilizes and possesses them. Along these lines, there
are fundamental four sending models in cloud gave
by CSPs.
The different cloud platforms are:
Private cloud: planned altogether for one
association and it might work by outsider or an
RESEARCH ARTICLE OPEN ACCESS
2. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 6
association itself. It is likewise referred as inside
cloud
Public cloud: offers its assets and administrations
to open and it request significant venture with the
goal that it's claimed by presumed organizations
like Google, Microsoft, and Amazon.
Community cloud: setup for positive
determinations furthermore shares for supporting
examination by a few organizations. e.g. Open
Cirrus cloud that have its group cloud.
Hybrid cloud: is a mix of private/open mists. In
this cloud, private cloud runs framework benefit
part and open cloud runs rest of the part. It gives
security and control over cloud information, more
adaptability; backing on-interest constriction and
extension of administration than other clouds.
[1][2][5][6][7][8][9][14]
III. SECURITY ASPECT
The idea of Cloud computing in different
application ranges is achieving a progressive
change in the way the business is working. The
advantages of including innovation and Internet in
ordinary plans of action are expansive and
additionally compensating. The thought of security
dangers at every level of distributed computing and
its client viewpoint characterizes the security
necessities and can be further made particular to the
requirements of a business-space which can
upgrade the working of any business and its
administration suppliers. Additionally the right
recognizable proof of dangers and considering them
for configuration of efforts to establish safety make
the procedure more secure as well as includes a
component of cost viability to the whole procedure.
The contemplations are obvious as far as the client
experience upgrade in secure cloud utilization.
Appropriate measures taken to address the security
concerns will imbue trust in the clients at different
levels and will be extremely useful in the
development of cloud group.
[11][12][13][14][15][16]
IV. CLOUD CONSIDERATIONS
Scalability
A standout amongst the most imperative
component of thought in distributed computing is
the versatility. It has been one of the main thrusts
behind the advancement of mists. Little and
medium estimated associations can't bear to include
new assets if the interest emerges, as they have
taken a toll contemplations. Such associations can
profit by open mists as they can utilize the assets
and pay for them as per the utilization. Open mists
give this point of preference over private mists. The
private mists offer constrained versatility as it is
claimed by the association itself and again is
confined by the value it can pay for the foundation.
Half breed mists can give high adaptability as they
can move to open mists when the interest emerges.
Security
Information security is a noteworthy worry in
distributed computing. Secret and touchy
information can't be shared on an open stage.
Consequently, such information is best continued
private servers in a private or half and half cloud.
Open cloud security is dependably an ambiguous
picture. It relies on upon the encryption and other
validation strategies utilized by general society
cloud administration suppliers.
Reliability
Any cloud administration supplier confronts a
noteworthy issue as unwavering quality of the
administrations. Private mists are constantly more
solid as all the administration giving types of gear,
set-up and information is inside the association.
Open mists, in any case, don't offer that level of
dependability as they rely on upon the accessibility
of the administration supplier and in addition the
web association. Half breed mists give a medium
level of unwavering quality as they consolidate the
components of both open and private mists as the
most got to information is kept inside the
association.
3. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 7
Cost of use
The greatest advantage of open mists, as is
publicized by all their administration suppliers, is
the minimal effort of operation. It deals with pay-
as-you-use equation, so the buyer pays for the
administrations it employments. There is no
expense of set-up included, no capital speculation;
just a web association is required to begin utilizing
a wide range of cloud administrations. It is rising as
a shelter to the SMEs (little and medium estimated
endeavors) as it has extensively diminished their
working expenses. Then again, on the off chance
that we discuss the private cloud possessed by an
undertaking itself, there is extra cost of set-up
which the venture needs to manage. The expense is
high for this situation. The half and half cloud
offers a medium level of expense, as we can simply
have the more costly administrations being utilized
from general society cloud stage and the rest can be
conveyed as a private cloud in the venture.
Data And Application Integration
Information and application joining is less
demanding out in the open and private mists as both
utilize one and only sort of stage, though half and
half cloud confronts troubles in this matter as it
consolidates both open and private stage highlights.
Moving information from private to open cloud,
remembering the distinctions in conventions and
interfaces of both the stages, is a lumbering errand.
System Management
All the framework administration errands like
arrangement administration, observing, execution
check and so forth are mind boggling in half and
half mists when contrasted with open or private
mists. The information and administrations are
conveyed crosswise over different situations/mists;
there is uniqueness in the conventions and
interfaces so a solitary framework administration
apparatus does not suffice.
Portability
Because of the similarity issues among the
distinctive cloud situations, the half and half cloud
framework is said to be less versatile than the others.
To move the information and arrangements
between situations is a hard employment.
Tooling And Skills
At whatever point another innovation comes up,
it brings along a major interest for talented
individuals to work in that innovation. The same is
the situation with cloud administrations. There is a
requirement for specialists, framework fashioners
and administrators, particularly in cross breed mists
as it is the most recent among all cloud models.
Open and private mists have been in the business
sector for a more extended time and there is more
number of specialists in these fields contrasted with
half and half cloud specialists.
Data Handling
In cloud engineering, there are an expanded
number of access purposes of information in light
of the fact that there are an expanded number of
gatherings, gadgets and applications included
henceforth it can prompt information trade off. In
private mists, every one of the information is put
away on organization's private servers. Out in the
open mists, rather than information being put away
on organization's servers, information is put away
on open administration supplier's servers which can
be found anyplace on the planet. Half breed mists
require an alternate information taking care of
arrangement, secret information is put away on
private servers, open information can be put away
anyplace yet a few information annihilation strategy
is characterized and land area of information is
likewise characterized.
Table 1 Domain specific important Research contributions (Performance Perspective) [1][2][8][9][11][13]
4. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 8
Workload
Open mists clearly appeared to meet the transient
spikes in the interest of assets at a moderate cost.
The ventures need not put resources into any costly
hardware; they can get the required assets over the
web from general society cloud administration
suppliers and pay as per the season of utilization.
Private mists then again, put resources into the
supplies and different assets as a result of their main
goal basic needs like security concerns and so on.
They can't depend on open cloud stage for their
touchy information needs. Half and half mists are
for the most part conveyed by undertakings with
element requests for assets. Because of the dynamic
nature, they may need to blast into people in
general mists from their protected private mists.
Cloud Bursting
5. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 9
Cloud blasting is a marvel which is utilized
synonymously with cross breed mists. The
undertaking can meet its fundamental needs by
utilizing the as a part of house assets, however can
also scale up amid crest periods by utilizing the
assets from a cloud supplier. So the neighbourhood
and cloud assets can be successfully utilized
alongside the adaptability it offers to the
undertaking. [3]
V. CONCLUSIONS
The study of domain specific research
contribution in CC reveals major contributions
which have changed the very face of Cloud
Environment. This revelation indicates various
avenues to look at whenever designing any cloud
centric application as the key contributors cannot be
ignored or worked in solitude. The very idea of
cloud computing is about collaboration and
harmony among resources so all domain specific
matrices needs important consideration and need to
be worked on in unison for achieving best possible
outcomes for its implementation and usage.
REFERENCES
[1] Ilango Sriram, Ali Khajeh-Hosseini, “Research
Agenda in Cloud Technologies” submitted to the 1st
ACM Symposium on Cloud Computing, SOCC 2010,
arXiv:1001.3259
[2] Kaur, Manpreet, and Hardeep Singh. "A Review of
Cloud Computing Security Issues." International
Journal of Grid and Distributed Computing IJGDC 8.5
(2015): 215-22. Web.
[3] Kaur, Karandeep. "A Review of Cloud Computing
Service Models." International Journal of Computer
Applications IJCA 140.7 (2016): 15-18. Web.
[4] Rao, T.Venkat, Kamsali Naveena, & Reena David.
"A New Computing Envornment Using Hybrid Cloud."
Journal of Information Sciences and Computing
Technologies [Online], 3.1 (1): 180-185. Web. 5
Mar.2016
[5] PLUMMER, D.C., BITTMAN , T.J., AUSTIN, T.,
CEARLEY, D.W., and SMITH D.M., Cloud
Computing:Defining and Describing an Emerging
Phenomenon , 2008
[6] STATEN, J., Is Cloud Computing Ready For The
Enterprise?, 2008.
[7] MELL, P. and GRANCE, T. 2009. Draft NIST
Working Definition of Cloud Computing. ERDOGMUS,
H. 2009. Cloud Computing: Does Nirvana Hide behind
the Nebula? Software, IEEE 26, 2, 4-6.
[8] Zissis, Dimitrios, and Dimitrios Lekkas.
"Addressing Cloud Computing Security Issues." Future
Generation Computer Systems 28.3 (2012): 583-92.
Web.
[9] R. Sherman, Distributed systems security,
Computers & Security 11 (1) (1992).
[10] National Institute of Standards and Technology.
Guide for mapping types of information and information
systems to security categories, NIST 800-60,2008
[11] LEMOS, R. 2009. Inside One Firm's Private Cloud
Journey. Retrieved December 1, 2009, from
http://www.cio.com/article/506114/Inside_One_Firm_s_
Private_Cloud_Journey
[12] Open CirrusTM
: the HP/Intel/Yahoo! Open Cloud
Computing Research Testbed. Retrieved December
1,2009, from https://opencirrus.org/
[13] BUYYA, R., RANJAN, R. and CALHEIROS, R. N.
2009.Modeling and simulation of scalable Cloud
computing environments and the CloudSim toolkit:
Challenges and opportunities. In High Performance
Computing & Simulation, 2009. HPCS '09. International
Conference on, 1-11.
[14] VAQUERO, L., MERINO, L., CACERES, J. And
LINDNER, M. 2009. A break in the clouds: towards a
cloud definition. SIGCOMM Comput. Commun. Rev. 39,
1, 50-55. YOUSEFF, L., BUTRICO, M. and DA SILVA,
D. 2008.
[15] Toward a Unified Ontology of Cloud Computing.
In Grid Computing Environments Workshop, 2008. GCE
'08, 1-10.
[16] Ostermann, Simon, Alexandria Iosup, Nezih
Yigitbasi, Radu Prodan, Thomas Fahringer, and Dick
Epema. "A Performance Analysis of EC2 Cloud
Computing Services for Scientific Computing." Cloud
Computing Lecture Notes of the Institute for Computer
Sciences, Social-Informatics and Telecommunications
Engineering (2010): 115-31. Web.