SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 5
Domain Specific (Performance Perspective) Considerations of
Cloud Computing
Prithvipal Singh*, Sunny Sharma*, Amritpal Singh*, Karandeep Kaur*
* Department of Computer Science, Guru Nanak Dev University, Amritsar, Punjab
----------------------------------------************************----------------------------------
Abstract:
Cloud computing is a progressive innovation that has achieved new extravagances in the field of
Information Technology. It gives a wellspring of information and application programming stockpiling as
colossal server farms called 'mists', which can be gotten to with the assistance of a system association.
These mists boost the capacities of undertakings with no additional set-up, faculty or permitting costs.
Mists are for the most part sent utilizing Public, Private or Hybrid models relying on the necessities of the
client. In this paper, we have explored the distributed computing engineering, concentrating on the
elements of the Public, Private and Hybrid cloud models. There is a dire need to examine the performance
of a cloud environment on several metrics and enhance its usability and capability. This paper aims at
highlighting important contributions of various researchers in domains like computational power,
performance provisioning, Load balancing and SLAs.
Keywords — CC Domain, Computational Power, Performance Provisioning, Load Balancing, SLAs.
----------------------------------------************************----------------------------------
I. INTRODUCTION
The advancement to arrange and computational
innovations has experienced a wonderful period of
development and improvement. The development
bend was in reality extremely soaked in real area of
use of these advances. The appearance of Cloud
processing, Big Data examination, Evolutionary
figuring, Internet of Things (IoT) and so on has
improved the usage streets of these advancements
in different application zones. Distributed
computing has risen as an uncommon territory of
enthusiasm for some analysts keeping in
perspective its tremendous application-space scope.
Exploration is being done on various parts of CC
for distinguishing zones of change and their
particular cures. Some vital issues in CC are that of
Security, Performance (computational power,
performance provisioning, Load balancing and
Service Level Agreements). [1][3]
Cloud-computing is an inventive engineering
which gives virtualized assets to the client over the
Internet while concealing the stage subtle elements.
The cloud administration suppliers offer stockpiling
and in addition processing assets at low expenses.
In this quickly evolving world, to adjust is to
survive, so the associations are moving over to
cloud plan of action. This move towards the cloud
time is being trailed by the worries over its
unwavering quality and trust, principally regarding
data security alongside the different difficulties
confronted by distributed computing. The point of
this paper is to survey the cloud structure,
distinguishing different attributes of concern and
looking at open, private and mixture cloud in light
of them. [1][2]
II. TYPES OF CLOUD ENVIRONMENT
The Business models clarified above are conveyed
on different sorts of mists, it relies on upon who
utilizes and possesses them. Along these lines, there
are fundamental four sending models in cloud gave
by CSPs.
The different cloud platforms are:
Private cloud: planned altogether for one
association and it might work by outsider or an
RESEARCH ARTICLE OPEN ACCESS
International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 6
association itself. It is likewise referred as inside
cloud
Public cloud: offers its assets and administrations
to open and it request significant venture with the
goal that it's claimed by presumed organizations
like Google, Microsoft, and Amazon.
Community cloud: setup for positive
determinations furthermore shares for supporting
examination by a few organizations. e.g. Open
Cirrus cloud that have its group cloud.
Hybrid cloud: is a mix of private/open mists. In
this cloud, private cloud runs framework benefit
part and open cloud runs rest of the part. It gives
security and control over cloud information, more
adaptability; backing on-interest constriction and
extension of administration than other clouds.
[1][2][5][6][7][8][9][14]
III. SECURITY ASPECT
The idea of Cloud computing in different
application ranges is achieving a progressive
change in the way the business is working. The
advantages of including innovation and Internet in
ordinary plans of action are expansive and
additionally compensating. The thought of security
dangers at every level of distributed computing and
its client viewpoint characterizes the security
necessities and can be further made particular to the
requirements of a business-space which can
upgrade the working of any business and its
administration suppliers. Additionally the right
recognizable proof of dangers and considering them
for configuration of efforts to establish safety make
the procedure more secure as well as includes a
component of cost viability to the whole procedure.
The contemplations are obvious as far as the client
experience upgrade in secure cloud utilization.
Appropriate measures taken to address the security
concerns will imbue trust in the clients at different
levels and will be extremely useful in the
development of cloud group.
[11][12][13][14][15][16]
IV. CLOUD CONSIDERATIONS
Scalability
A standout amongst the most imperative
component of thought in distributed computing is
the versatility. It has been one of the main thrusts
behind the advancement of mists. Little and
medium estimated associations can't bear to include
new assets if the interest emerges, as they have
taken a toll contemplations. Such associations can
profit by open mists as they can utilize the assets
and pay for them as per the utilization. Open mists
give this point of preference over private mists. The
private mists offer constrained versatility as it is
claimed by the association itself and again is
confined by the value it can pay for the foundation.
Half breed mists can give high adaptability as they
can move to open mists when the interest emerges.
Security
Information security is a noteworthy worry in
distributed computing. Secret and touchy
information can't be shared on an open stage.
Consequently, such information is best continued
private servers in a private or half and half cloud.
Open cloud security is dependably an ambiguous
picture. It relies on upon the encryption and other
validation strategies utilized by general society
cloud administration suppliers.
Reliability
Any cloud administration supplier confronts a
noteworthy issue as unwavering quality of the
administrations. Private mists are constantly more
solid as all the administration giving types of gear,
set-up and information is inside the association.
Open mists, in any case, don't offer that level of
dependability as they rely on upon the accessibility
of the administration supplier and in addition the
web association. Half breed mists give a medium
level of unwavering quality as they consolidate the
components of both open and private mists as the
most got to information is kept inside the
association.
International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 7
Cost of use
The greatest advantage of open mists, as is
publicized by all their administration suppliers, is
the minimal effort of operation. It deals with pay-
as-you-use equation, so the buyer pays for the
administrations it employments. There is no
expense of set-up included, no capital speculation;
just a web association is required to begin utilizing
a wide range of cloud administrations. It is rising as
a shelter to the SMEs (little and medium estimated
endeavors) as it has extensively diminished their
working expenses. Then again, on the off chance
that we discuss the private cloud possessed by an
undertaking itself, there is extra cost of set-up
which the venture needs to manage. The expense is
high for this situation. The half and half cloud
offers a medium level of expense, as we can simply
have the more costly administrations being utilized
from general society cloud stage and the rest can be
conveyed as a private cloud in the venture.
Data And Application Integration
Information and application joining is less
demanding out in the open and private mists as both
utilize one and only sort of stage, though half and
half cloud confronts troubles in this matter as it
consolidates both open and private stage highlights.
Moving information from private to open cloud,
remembering the distinctions in conventions and
interfaces of both the stages, is a lumbering errand.
System Management
All the framework administration errands like
arrangement administration, observing, execution
check and so forth are mind boggling in half and
half mists when contrasted with open or private
mists. The information and administrations are
conveyed crosswise over different situations/mists;
there is uniqueness in the conventions and
interfaces so a solitary framework administration
apparatus does not suffice.
Portability
Because of the similarity issues among the
distinctive cloud situations, the half and half cloud
framework is said to be less versatile than the others.
To move the information and arrangements
between situations is a hard employment.
Tooling And Skills
At whatever point another innovation comes up,
it brings along a major interest for talented
individuals to work in that innovation. The same is
the situation with cloud administrations. There is a
requirement for specialists, framework fashioners
and administrators, particularly in cross breed mists
as it is the most recent among all cloud models.
Open and private mists have been in the business
sector for a more extended time and there is more
number of specialists in these fields contrasted with
half and half cloud specialists.
Data Handling
In cloud engineering, there are an expanded
number of access purposes of information in light
of the fact that there are an expanded number of
gatherings, gadgets and applications included
henceforth it can prompt information trade off. In
private mists, every one of the information is put
away on organization's private servers. Out in the
open mists, rather than information being put away
on organization's servers, information is put away
on open administration supplier's servers which can
be found anyplace on the planet. Half breed mists
require an alternate information taking care of
arrangement, secret information is put away on
private servers, open information can be put away
anyplace yet a few information annihilation strategy
is characterized and land area of information is
likewise characterized.
Table 1 Domain specific important Research contributions (Performance Perspective) [1][2][8][9][11][13]
International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 8
Workload
Open mists clearly appeared to meet the transient
spikes in the interest of assets at a moderate cost.
The ventures need not put resources into any costly
hardware; they can get the required assets over the
web from general society cloud administration
suppliers and pay as per the season of utilization.
Private mists then again, put resources into the
supplies and different assets as a result of their main
goal basic needs like security concerns and so on.
They can't depend on open cloud stage for their
touchy information needs. Half and half mists are
for the most part conveyed by undertakings with
element requests for assets. Because of the dynamic
nature, they may need to blast into people in
general mists from their protected private mists.
Cloud Bursting
International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 9
Cloud blasting is a marvel which is utilized
synonymously with cross breed mists. The
undertaking can meet its fundamental needs by
utilizing the as a part of house assets, however can
also scale up amid crest periods by utilizing the
assets from a cloud supplier. So the neighbourhood
and cloud assets can be successfully utilized
alongside the adaptability it offers to the
undertaking. [3]
V. CONCLUSIONS
The study of domain specific research
contribution in CC reveals major contributions
which have changed the very face of Cloud
Environment. This revelation indicates various
avenues to look at whenever designing any cloud
centric application as the key contributors cannot be
ignored or worked in solitude. The very idea of
cloud computing is about collaboration and
harmony among resources so all domain specific
matrices needs important consideration and need to
be worked on in unison for achieving best possible
outcomes for its implementation and usage.
REFERENCES
[1] Ilango Sriram, Ali Khajeh-Hosseini, “Research
Agenda in Cloud Technologies” submitted to the 1st
ACM Symposium on Cloud Computing, SOCC 2010,
arXiv:1001.3259
[2] Kaur, Manpreet, and Hardeep Singh. "A Review of
Cloud Computing Security Issues." International
Journal of Grid and Distributed Computing IJGDC 8.5
(2015): 215-22. Web.
[3] Kaur, Karandeep. "A Review of Cloud Computing
Service Models." International Journal of Computer
Applications IJCA 140.7 (2016): 15-18. Web.
[4] Rao, T.Venkat, Kamsali Naveena, & Reena David.
"A New Computing Envornment Using Hybrid Cloud."
Journal of Information Sciences and Computing
Technologies [Online], 3.1 (1): 180-185. Web. 5
Mar.2016
[5] PLUMMER, D.C., BITTMAN , T.J., AUSTIN, T.,
CEARLEY, D.W., and SMITH D.M., Cloud
Computing:Defining and Describing an Emerging
Phenomenon , 2008
[6] STATEN, J., Is Cloud Computing Ready For The
Enterprise?, 2008.
[7] MELL, P. and GRANCE, T. 2009. Draft NIST
Working Definition of Cloud Computing. ERDOGMUS,
H. 2009. Cloud Computing: Does Nirvana Hide behind
the Nebula? Software, IEEE 26, 2, 4-6.
[8] Zissis, Dimitrios, and Dimitrios Lekkas.
"Addressing Cloud Computing Security Issues." Future
Generation Computer Systems 28.3 (2012): 583-92.
Web.
[9] R. Sherman, Distributed systems security,
Computers & Security 11 (1) (1992).
[10] National Institute of Standards and Technology.
Guide for mapping types of information and information
systems to security categories, NIST 800-60,2008
[11] LEMOS, R. 2009. Inside One Firm's Private Cloud
Journey. Retrieved December 1, 2009, from
http://www.cio.com/article/506114/Inside_One_Firm_s_
Private_Cloud_Journey
[12] Open CirrusTM
: the HP/Intel/Yahoo! Open Cloud
Computing Research Testbed. Retrieved December
1,2009, from https://opencirrus.org/
[13] BUYYA, R., RANJAN, R. and CALHEIROS, R. N.
2009.Modeling and simulation of scalable Cloud
computing environments and the CloudSim toolkit:
Challenges and opportunities. In High Performance
Computing & Simulation, 2009. HPCS '09. International
Conference on, 1-11.
[14] VAQUERO, L., MERINO, L., CACERES, J. And
LINDNER, M. 2009. A break in the clouds: towards a
cloud definition. SIGCOMM Comput. Commun. Rev. 39,
1, 50-55. YOUSEFF, L., BUTRICO, M. and DA SILVA,
D. 2008.
[15] Toward a Unified Ontology of Cloud Computing.
In Grid Computing Environments Workshop, 2008. GCE
'08, 1-10.
[16] Ostermann, Simon, Alexandria Iosup, Nezih
Yigitbasi, Radu Prodan, Thomas Fahringer, and Dick
Epema. "A Performance Analysis of EC2 Cloud
Computing Services for Scientific Computing." Cloud
Computing Lecture Notes of the Institute for Computer
Sciences, Social-Informatics and Telecommunications
Engineering (2010): 115-31. Web.

More Related Content

What's hot

Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingIAEME Publication
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmijcncs
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paperjagan339
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 

What's hot (20)

Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
Fog doc
Fog doc Fog doc
Fog doc
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 

Viewers also liked

Viewers also liked (18)

[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
 
[IJET-V1I4P13] Authors :Ravindra Gajanan Hatwa
[IJET-V1I4P13] Authors :Ravindra Gajanan Hatwa[IJET-V1I4P13] Authors :Ravindra Gajanan Hatwa
[IJET-V1I4P13] Authors :Ravindra Gajanan Hatwa
 
[IJET-V1I1P2] Author :S. Mondal, S. Parvin, S. F. Ahmmed
[IJET-V1I1P2] Author :S. Mondal, S. Parvin, S. F. Ahmmed[IJET-V1I1P2] Author :S. Mondal, S. Parvin, S. F. Ahmmed
[IJET-V1I1P2] Author :S. Mondal, S. Parvin, S. F. Ahmmed
 
[IJET-V1I2P5] Authors : Ms.Pallavi Dhok, Mr.Aditya Dhanvijay
[IJET-V1I2P5] Authors : Ms.Pallavi Dhok, Mr.Aditya Dhanvijay[IJET-V1I2P5] Authors : Ms.Pallavi Dhok, Mr.Aditya Dhanvijay
[IJET-V1I2P5] Authors : Ms.Pallavi Dhok, Mr.Aditya Dhanvijay
 
[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C
[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C
[IJET V2I2P27] Authors: Shruti Kamatekar, Prof. Balachandra G.C
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
[IJET-V1I5P2] Authors :Hind HazzaAlsharif , Razan Hamza Bawareth
[IJET-V1I5P2] Authors :Hind HazzaAlsharif , Razan Hamza Bawareth[IJET-V1I5P2] Authors :Hind HazzaAlsharif , Razan Hamza Bawareth
[IJET-V1I5P2] Authors :Hind HazzaAlsharif , Razan Hamza Bawareth
 
[IJET-V1I3P4] Authors : Prof. V.V. Dakhode, Gaurav Bagde , Sheshbhushan Sonar...
[IJET-V1I3P4] Authors : Prof. V.V. Dakhode, Gaurav Bagde , Sheshbhushan Sonar...[IJET-V1I3P4] Authors : Prof. V.V. Dakhode, Gaurav Bagde , Sheshbhushan Sonar...
[IJET-V1I3P4] Authors : Prof. V.V. Dakhode, Gaurav Bagde , Sheshbhushan Sonar...
 
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
 
[IJET-V1I4P8] Authors :T.Vignesh,V.Dileepan, P.Kannappar, R.Manoj Babu , P.E...
[IJET-V1I4P8]  Authors :T.Vignesh,V.Dileepan, P.Kannappar, R.Manoj Babu , P.E...[IJET-V1I4P8]  Authors :T.Vignesh,V.Dileepan, P.Kannappar, R.Manoj Babu , P.E...
[IJET-V1I4P8] Authors :T.Vignesh,V.Dileepan, P.Kannappar, R.Manoj Babu , P.E...
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
 
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
 
[IJET-V1I2P8]
[IJET-V1I2P8] [IJET-V1I2P8]
[IJET-V1I2P8]
 
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
 
[IJET-V1I4P4] Authors :Pradeep S P, Vinay A
[IJET-V1I4P4] Authors :Pradeep S P, Vinay A[IJET-V1I4P4] Authors :Pradeep S P, Vinay A
[IJET-V1I4P4] Authors :Pradeep S P, Vinay A
 
[IJET-V1I5P4] Authors :Murugan, Avudaiappan, Balasubramanian
[IJET-V1I5P4] Authors :Murugan, Avudaiappan, Balasubramanian [IJET-V1I5P4] Authors :Murugan, Avudaiappan, Balasubramanian
[IJET-V1I5P4] Authors :Murugan, Avudaiappan, Balasubramanian
 
[IJET-V1I1P6] Author : P.Mallikarjuna1 ,Dr. B.Uma Maheswar Gowd
  [IJET-V1I1P6] Author : P.Mallikarjuna1  ,Dr. B.Uma Maheswar Gowd   [IJET-V1I1P6] Author : P.Mallikarjuna1  ,Dr. B.Uma Maheswar Gowd
[IJET-V1I1P6] Author : P.Mallikarjuna1 ,Dr. B.Uma Maheswar Gowd
 

Similar to [IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karandeep Kaur

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewshraddhaudage
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewjaimehra05
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewsri_kanth0526
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingcloudresearcher
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noidataramandal
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 

Similar to [IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karandeep Kaur (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karandeep Kaur

  • 1. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 5 Domain Specific (Performance Perspective) Considerations of Cloud Computing Prithvipal Singh*, Sunny Sharma*, Amritpal Singh*, Karandeep Kaur* * Department of Computer Science, Guru Nanak Dev University, Amritsar, Punjab ----------------------------------------************************---------------------------------- Abstract: Cloud computing is a progressive innovation that has achieved new extravagances in the field of Information Technology. It gives a wellspring of information and application programming stockpiling as colossal server farms called 'mists', which can be gotten to with the assistance of a system association. These mists boost the capacities of undertakings with no additional set-up, faculty or permitting costs. Mists are for the most part sent utilizing Public, Private or Hybrid models relying on the necessities of the client. In this paper, we have explored the distributed computing engineering, concentrating on the elements of the Public, Private and Hybrid cloud models. There is a dire need to examine the performance of a cloud environment on several metrics and enhance its usability and capability. This paper aims at highlighting important contributions of various researchers in domains like computational power, performance provisioning, Load balancing and SLAs. Keywords — CC Domain, Computational Power, Performance Provisioning, Load Balancing, SLAs. ----------------------------------------************************---------------------------------- I. INTRODUCTION The advancement to arrange and computational innovations has experienced a wonderful period of development and improvement. The development bend was in reality extremely soaked in real area of use of these advances. The appearance of Cloud processing, Big Data examination, Evolutionary figuring, Internet of Things (IoT) and so on has improved the usage streets of these advancements in different application zones. Distributed computing has risen as an uncommon territory of enthusiasm for some analysts keeping in perspective its tremendous application-space scope. Exploration is being done on various parts of CC for distinguishing zones of change and their particular cures. Some vital issues in CC are that of Security, Performance (computational power, performance provisioning, Load balancing and Service Level Agreements). [1][3] Cloud-computing is an inventive engineering which gives virtualized assets to the client over the Internet while concealing the stage subtle elements. The cloud administration suppliers offer stockpiling and in addition processing assets at low expenses. In this quickly evolving world, to adjust is to survive, so the associations are moving over to cloud plan of action. This move towards the cloud time is being trailed by the worries over its unwavering quality and trust, principally regarding data security alongside the different difficulties confronted by distributed computing. The point of this paper is to survey the cloud structure, distinguishing different attributes of concern and looking at open, private and mixture cloud in light of them. [1][2] II. TYPES OF CLOUD ENVIRONMENT The Business models clarified above are conveyed on different sorts of mists, it relies on upon who utilizes and possesses them. Along these lines, there are fundamental four sending models in cloud gave by CSPs. The different cloud platforms are: Private cloud: planned altogether for one association and it might work by outsider or an RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 6 association itself. It is likewise referred as inside cloud Public cloud: offers its assets and administrations to open and it request significant venture with the goal that it's claimed by presumed organizations like Google, Microsoft, and Amazon. Community cloud: setup for positive determinations furthermore shares for supporting examination by a few organizations. e.g. Open Cirrus cloud that have its group cloud. Hybrid cloud: is a mix of private/open mists. In this cloud, private cloud runs framework benefit part and open cloud runs rest of the part. It gives security and control over cloud information, more adaptability; backing on-interest constriction and extension of administration than other clouds. [1][2][5][6][7][8][9][14] III. SECURITY ASPECT The idea of Cloud computing in different application ranges is achieving a progressive change in the way the business is working. The advantages of including innovation and Internet in ordinary plans of action are expansive and additionally compensating. The thought of security dangers at every level of distributed computing and its client viewpoint characterizes the security necessities and can be further made particular to the requirements of a business-space which can upgrade the working of any business and its administration suppliers. Additionally the right recognizable proof of dangers and considering them for configuration of efforts to establish safety make the procedure more secure as well as includes a component of cost viability to the whole procedure. The contemplations are obvious as far as the client experience upgrade in secure cloud utilization. Appropriate measures taken to address the security concerns will imbue trust in the clients at different levels and will be extremely useful in the development of cloud group. [11][12][13][14][15][16] IV. CLOUD CONSIDERATIONS Scalability A standout amongst the most imperative component of thought in distributed computing is the versatility. It has been one of the main thrusts behind the advancement of mists. Little and medium estimated associations can't bear to include new assets if the interest emerges, as they have taken a toll contemplations. Such associations can profit by open mists as they can utilize the assets and pay for them as per the utilization. Open mists give this point of preference over private mists. The private mists offer constrained versatility as it is claimed by the association itself and again is confined by the value it can pay for the foundation. Half breed mists can give high adaptability as they can move to open mists when the interest emerges. Security Information security is a noteworthy worry in distributed computing. Secret and touchy information can't be shared on an open stage. Consequently, such information is best continued private servers in a private or half and half cloud. Open cloud security is dependably an ambiguous picture. It relies on upon the encryption and other validation strategies utilized by general society cloud administration suppliers. Reliability Any cloud administration supplier confronts a noteworthy issue as unwavering quality of the administrations. Private mists are constantly more solid as all the administration giving types of gear, set-up and information is inside the association. Open mists, in any case, don't offer that level of dependability as they rely on upon the accessibility of the administration supplier and in addition the web association. Half breed mists give a medium level of unwavering quality as they consolidate the components of both open and private mists as the most got to information is kept inside the association.
  • 3. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 7 Cost of use The greatest advantage of open mists, as is publicized by all their administration suppliers, is the minimal effort of operation. It deals with pay- as-you-use equation, so the buyer pays for the administrations it employments. There is no expense of set-up included, no capital speculation; just a web association is required to begin utilizing a wide range of cloud administrations. It is rising as a shelter to the SMEs (little and medium estimated endeavors) as it has extensively diminished their working expenses. Then again, on the off chance that we discuss the private cloud possessed by an undertaking itself, there is extra cost of set-up which the venture needs to manage. The expense is high for this situation. The half and half cloud offers a medium level of expense, as we can simply have the more costly administrations being utilized from general society cloud stage and the rest can be conveyed as a private cloud in the venture. Data And Application Integration Information and application joining is less demanding out in the open and private mists as both utilize one and only sort of stage, though half and half cloud confronts troubles in this matter as it consolidates both open and private stage highlights. Moving information from private to open cloud, remembering the distinctions in conventions and interfaces of both the stages, is a lumbering errand. System Management All the framework administration errands like arrangement administration, observing, execution check and so forth are mind boggling in half and half mists when contrasted with open or private mists. The information and administrations are conveyed crosswise over different situations/mists; there is uniqueness in the conventions and interfaces so a solitary framework administration apparatus does not suffice. Portability Because of the similarity issues among the distinctive cloud situations, the half and half cloud framework is said to be less versatile than the others. To move the information and arrangements between situations is a hard employment. Tooling And Skills At whatever point another innovation comes up, it brings along a major interest for talented individuals to work in that innovation. The same is the situation with cloud administrations. There is a requirement for specialists, framework fashioners and administrators, particularly in cross breed mists as it is the most recent among all cloud models. Open and private mists have been in the business sector for a more extended time and there is more number of specialists in these fields contrasted with half and half cloud specialists. Data Handling In cloud engineering, there are an expanded number of access purposes of information in light of the fact that there are an expanded number of gatherings, gadgets and applications included henceforth it can prompt information trade off. In private mists, every one of the information is put away on organization's private servers. Out in the open mists, rather than information being put away on organization's servers, information is put away on open administration supplier's servers which can be found anyplace on the planet. Half breed mists require an alternate information taking care of arrangement, secret information is put away on private servers, open information can be put away anyplace yet a few information annihilation strategy is characterized and land area of information is likewise characterized. Table 1 Domain specific important Research contributions (Performance Perspective) [1][2][8][9][11][13]
  • 4. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 8 Workload Open mists clearly appeared to meet the transient spikes in the interest of assets at a moderate cost. The ventures need not put resources into any costly hardware; they can get the required assets over the web from general society cloud administration suppliers and pay as per the season of utilization. Private mists then again, put resources into the supplies and different assets as a result of their main goal basic needs like security concerns and so on. They can't depend on open cloud stage for their touchy information needs. Half and half mists are for the most part conveyed by undertakings with element requests for assets. Because of the dynamic nature, they may need to blast into people in general mists from their protected private mists. Cloud Bursting
  • 5. International Journal of Computer Techniques -– Volume 3 Issue 3, May – June 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 9 Cloud blasting is a marvel which is utilized synonymously with cross breed mists. The undertaking can meet its fundamental needs by utilizing the as a part of house assets, however can also scale up amid crest periods by utilizing the assets from a cloud supplier. So the neighbourhood and cloud assets can be successfully utilized alongside the adaptability it offers to the undertaking. [3] V. CONCLUSIONS The study of domain specific research contribution in CC reveals major contributions which have changed the very face of Cloud Environment. This revelation indicates various avenues to look at whenever designing any cloud centric application as the key contributors cannot be ignored or worked in solitude. The very idea of cloud computing is about collaboration and harmony among resources so all domain specific matrices needs important consideration and need to be worked on in unison for achieving best possible outcomes for its implementation and usage. REFERENCES [1] Ilango Sriram, Ali Khajeh-Hosseini, “Research Agenda in Cloud Technologies” submitted to the 1st ACM Symposium on Cloud Computing, SOCC 2010, arXiv:1001.3259 [2] Kaur, Manpreet, and Hardeep Singh. "A Review of Cloud Computing Security Issues." International Journal of Grid and Distributed Computing IJGDC 8.5 (2015): 215-22. Web. [3] Kaur, Karandeep. "A Review of Cloud Computing Service Models." International Journal of Computer Applications IJCA 140.7 (2016): 15-18. Web. [4] Rao, T.Venkat, Kamsali Naveena, & Reena David. "A New Computing Envornment Using Hybrid Cloud." Journal of Information Sciences and Computing Technologies [Online], 3.1 (1): 180-185. Web. 5 Mar.2016 [5] PLUMMER, D.C., BITTMAN , T.J., AUSTIN, T., CEARLEY, D.W., and SMITH D.M., Cloud Computing:Defining and Describing an Emerging Phenomenon , 2008 [6] STATEN, J., Is Cloud Computing Ready For The Enterprise?, 2008. [7] MELL, P. and GRANCE, T. 2009. Draft NIST Working Definition of Cloud Computing. ERDOGMUS, H. 2009. Cloud Computing: Does Nirvana Hide behind the Nebula? Software, IEEE 26, 2, 4-6. [8] Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing Cloud Computing Security Issues." Future Generation Computer Systems 28.3 (2012): 583-92. Web. [9] R. Sherman, Distributed systems security, Computers & Security 11 (1) (1992). [10] National Institute of Standards and Technology. Guide for mapping types of information and information systems to security categories, NIST 800-60,2008 [11] LEMOS, R. 2009. Inside One Firm's Private Cloud Journey. Retrieved December 1, 2009, from http://www.cio.com/article/506114/Inside_One_Firm_s_ Private_Cloud_Journey [12] Open CirrusTM : the HP/Intel/Yahoo! Open Cloud Computing Research Testbed. Retrieved December 1,2009, from https://opencirrus.org/ [13] BUYYA, R., RANJAN, R. and CALHEIROS, R. N. 2009.Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In High Performance Computing & Simulation, 2009. HPCS '09. International Conference on, 1-11. [14] VAQUERO, L., MERINO, L., CACERES, J. And LINDNER, M. 2009. A break in the clouds: towards a cloud definition. SIGCOMM Comput. Commun. Rev. 39, 1, 50-55. YOUSEFF, L., BUTRICO, M. and DA SILVA, D. 2008. [15] Toward a Unified Ontology of Cloud Computing. In Grid Computing Environments Workshop, 2008. GCE '08, 1-10. [16] Ostermann, Simon, Alexandria Iosup, Nezih Yigitbasi, Radu Prodan, Thomas Fahringer, and Dick Epema. "A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing." Cloud Computing Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (2010): 115-31. Web.