SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 668
AN ASSESSMENT OF CLOUD COMPUTING: EVOLUTION
Manvi Mishra1
, Isha Arora2
, Pooja Singh3
, Sugandha Prabhakar4
1
Professor & Head, Department of Computer Science, SRMSWCET, U.P, India
2
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
3
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
4
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
Abstract
In this present work we have given a concise and systematic study of evolution of cloud computing from shared web hosting to public
cloud computing along with multi clouds based on a wide spectrum of factors which include scalability, availability and performance.
The proposed work studies hosting types and aims to promote the use of single and multi-clouds to reduce the risks. Cloud computing
is a multi-paradigm technology which has evolved as a cost effective, flexible, performance oriented infrastructure for agile
development of business operations. Cloud computing changes the way we think about computing by decoupling data processing, data
retention, and data presentation – in effect, divorcing components from location. Today due to the need of hour and security
constraints, single cloud computing is transforming to multi cloud computing. Focus has been done on Multi cloud which is also
known as “inter cloud” or “cloud of clouds” which reduces the security risks like failure of service availability, data loss and
confidentiality breaches that are drawbacks with single cloud.
Keywords: Cloud Computing, Evolution, Hosting Types, Multi cloud
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing enables a ubiquitous, easily accessible and
an on demand infrastructure for sharing a resource pool of
services. The characteristics of cloud computing includes: - on
demand self-service, broad network access, resource pooling,
rapid flexibility and measured performance. The consumers
and industry have an extensive dependence on cloud
computing in which security is a major issue. Cloud security is
multi paradigm and includes computer security, information
security and network security. Cloud computing in its real
sense came into existence in October 2007, when IBM and
Google collaborated and gave the concept of ―Blue Cloud‖.
The use of cloud computing has increased rapidly in many
organizations. Cloud computing provides many benefits in
terms of low cost and accessibility of data.[1] Ensuring the
security of cloud computing is a major factor in the cloud
computing environment, as users often store sensitive
information with cloud storage providers but these providers
may be untrusted. Dealing with ―single cloud‖ providers is
predicted to become less popular with customers due to risks
of service availability failure and the possibility of malicious
insiders in the single cloud. A movement towards ―multi-
clouds‖ or in other words, ―inter clouds‖or―cloud-of-clouds
has emerged recently. In the paper we have discussed the
evolution of cloud computing and laid emphasis on the
emergence of multi clouds. The following section highlights a
brief review of cloud computing. The remaining sections are
organized as follows. In Section III discussion about Evolution
of Cloud Computing is made. Section IV deliberates on
Benefits and Challenges of Cloud Computing. Section V
focuses on Evolution of Single to Multi cloud. Section VI
presents the Results and Section VII presents the Conclusion.
2. REVIEW OF LITERATURE
This review surveyed the existing literature using a principled
and systematic approach. The U.S. National Institutes of
Standards and Technology defines cloud as‖ Cloud
Computing is a model for enabling convenient, on demand
network access to a shared pool of configurable computing
resources(e.g. Networks, services, storage and applications)
that can be rapidly provisioned and released with a minimal
management effort or service provider interaction. This cloud
model promotes availability and is composed of five essential
characteristics, three delivery models and four deployment
models.‖ [1].Following are the factors which lead to the
evolution of cloud computing: [2]
1. Scalability: The number of resources that are needed
to be accessed by a wide range of users having varied
requests is increasing day by day. This lead to the
evolution of cloud computing.
2. Heterogeneity: Together with the number of devices,
the range of types of resources currently increases
significantly.
3. Economic Reasons: the business models around the
IT service and resource provisioning have changed
drastically over recent years, moving away from
onetime license fees and licensing models tied to
individual users or machines, to flat rates and free or
low cost online applications.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 669
4. Mobility: in the modern, globalized economy and
with modern smart phones and powerful mobile
devices, a growing demand for online availability,
accessibility to data, mobile office like working
environments etc. is notable.
Cloud services are usually divided in the three main types
which are:
1. Software as a Service (SaaS): SaaS clients rent
usage of applications running within the Cloud’s
provider infrastructure, for example Sales Force. The
applications are typically offered to the clients via the
Internet and are managed completely by the Cloud
provider.
2. Platform as a Service (PaaS): PaaS Cloud providers
offer an application platform as a service, for
example Google App Engine. This enables clients to
deploy custom software using the tools and
programming languages offered by the provider.
Clients have control over the deployed applications
and environment-related settings.
3. Infrastructure as a Service (IaaS): IaaS delivers
hardware resources such as CPU, disk space or
network components as a service. These resources are
usually delivered as a virtualization platform by the
Cloud provider and can be accessed across the
Internet by the client with the client having full
control of the virtualized platform. Deploying cloud
computing can differ depending on requirements in
four deployment models which have been identified
each with specific characteristics that supports the
needs of services and users of the clouds. These are:
public, private, community and hybrid clouds.
Fig-1: Types of Cloud
3. EVOLUTION OF CLOUD COMPUTING
The trend toward cloud computing started in the late 1980s
with the concept of grid computing when, for the first time, a
large number of systems were applied to a single problem,
usually scientific in nature and requiring exceptionally high
levels of parallel computation. The objective of Cloud
computing is the newest name for what has been around since
the mid-90s as ―on-demand infrastructure.‖ In 1995, it was
known as ―Shared Web Hosting‖ and had limited features
such as multi-tenant, automated provisioning, easy-to-use
interface. In 1998 VPS Hosting became available – this web
host improved by having partial infrastructure demand and
resource size flexibility. 1997 brought Dedicated Hosting,
both managed and unmanaged. [3] This type of automated
computing had dedicated servers with promises of full
administrative access.[4] The 2000s was when automated
computing came in the form of Grid /utility computing and
had full infrastructure demand and multi-tenant, partial
resource size flexibility and automated provisioning came
closer to what is known as ―cloud today‖. From 2012’s
through today the cloud computing has gathered a wide
spectrum of audience making it more scalable, flexible and
performance oriented. [5]
1. Shared Web Hosting – Shared web hosting
service or virtual hosting service or derive host refers to
a web hosting service where many websites reside on
one web server connected to the Internet. Each site
"sits" on its own partition, or section/place on the server,
to keep it separate from other sites. This is generally the
most economical option for hosting, as many people
share the overall cost of server maintenance
2. VPS Hosting – A virtual private server (VPS) is
a virtual machine sold as a service by an Internet hosting
service. A VPS runs its own copy of an operating
system, and customers have super user-level access to
that operating system instance, so can install almost any
software that runs on that OS. For many purposes they
are functionally equivalent to a dedicated physical
server, and being software defined are able to be much
more easily created and configured. [6]
3. Dedicated Hosting– It is software installed on a
separate virtual server to manage the end user
connections with the virtualized desktops. A dedicated
hosting service, dedicated server, or managed hosting
service is a type of Internet hosting in which the client
leases an entire server not shared with anyone else. This
is more flexible than shared hosting, as organizations
have full control over the server(s), including choice of
operating system, hardware, etc. There is also another
level of dedicated or managed hosting commonly
referred to as complex managed hosting.[7]
4. Grid computing- Grid computing is the collection of
computer resources from multiple locations to reach a
common goal. What distinguishes grid computing from
conventional high performance computing systems such
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 670
as cluster computing is that grids tend to be more
loosely coupled, heterogeneous, and geographically
dispersed. Although a single grid can be dedicated to a
particular application, commonly a grid is used for a
variety of purposes. Grids are often constructed with
general purpose grid middleware software libraries.
5. Public Cloud Computing- In Public clouds the cloud
infrastructure is available to the public on a commercial
basis by a cloud service provider. This enables a
consumer to deploy and develop a service in the cloud
with a very little financial outlays compared to other
deployment models. Private cloud incorporates specific
services and is maintained and deployed for a specific
organization. In Community cloud the cloud
infrastructure is shared among a number of
organizations with similar interests and requirements.
The Hybrid cloud comprises of a number of clouds of
any type but the clouds have the ability through their
interfaces to allow data or applications to be moved
from one cloud to another. How to access data in single
cloud using one of these four deployment methods or a
combination is shown in fig 2.
6. Multi clouds- Multi cloud computing is a new
dimension in cloud computing which is the concurrent
use of two or more cloud services to minimize the risk
of widespread data loss or downtime due to localized
component failure in a cloud computing environment as
shown in fig 3. A multi cloud approach can offer not
only the hardware, software and infrastructure but
redundancy necessary to optimize fault tolerance.
Fig-2: Accessing data in single cloud
Fig-3: Accessing data in multi-cloud
4. BENEFITS AND CHALLENGES
Organizations pay for the usage of cloud which is carefully
monitored and measured — in past managed services models,
it was difficult to see actual results based on IT spending
centralized computing resources, within the cloud provider,
are managed by fewer personnel with heavy use of automation
and consistent processes resulting in lower cost to the
consumers. Consuming organizations do not need a
sophisticated IT staff which is expensive, hard to find
transition of work for a cloud provider. This improves quality,
maintainability, security, and reduces cost to the consumers of
cloud. [8] Numerous legacy IT integrators are claiming to
provide cloud solutions but are essentially still legacy
managed service providers. Organizations have significant
legacy computing resources (servers, data centers, and IT
personnel) that will need to be transitioned or eliminated in
order to achieve true cost savings and flexibility provided by
cloud providers/services. Mission critical applications that are
core to the business or the consuming organization must be
transitioned to the cloud. This is neither quick nor easy, and
will take some time. Businesses need to evaluate whether
their custom/legacy application is truly needed and worth the
re-investment budgeting for cloud services is a challenge to
some commercial and government organizations. Existing
procurement policies may need to be adapted. Following are
the major challenges to cloud computing which encompass
lack of ownership of data, Overdependence, Information
Security, Privacy, Availability, Performance, Data Migration
and Stability of Provider. [9]
5. EVOLUTION OF SINGLE TO MULTI-CLOUD
This section provides brief summary review of prior works on
cloud computing with respect to security. Cloud computing
security was explored in single cloud environment [10].
Service availability was focused in [11] in single cloud
environment. Multi-shares with secret sharing algorithm was
proposed in [12] for cloud security and data integrity. Cloud
security was explored using cryptographic methods [13]. The
security risks addressed include service availability, data
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 671
intrusion, and data integrity. The solution used cloud storage
and multi-clouds. In [14] a survey has been made to know
security issues and solutions with respect to single cloud.
RACS and RAID kind of techniques were used for cloud
security using multi-clouds [15]. Client centric distributed
protocols were explored for data integrity with multi-clouds
usage [16].Service availability problem was focused in single
cloud environment. [17] There was discussion about cloud
security issues [18]. Cryptography is used to protect cloud
data in single cloud environment [19]. A security mechanism
by name ―Depot‖ is used to single cloud environment [20]. A
security mechanism by name ―Venus‖ was proposed in [21]
which focused on data integrity issue in single cloud
environment. In [22] a survey is made on cloud security. In
[23] cloud data integrity is focused in single cloud
environment. In [24] a new security mechanism was proposed
by name ―HAIL‖ for improving service availability in multi-
cloud environment. In [25] a survey was done on cloud data
integrity in multi-cloud environment. Encrypted cloud VPN
technique is used in [26] for data integrity in multi-cloud
environment. Cloud security was discussed in [27] in single
cloud environment. TCCP techniques for cloud data integrity
issues and service availability were presented in [28] in single
cloud environment tokens and erasure codes were used in [29]
to ensure cloud data integrity in single cloud environment.
PDP schemes were used to protect data integrity in clouds.
Fig-4:Multi-Tenancy of Cloud Computing
For ensuring more security in cloud environment, we can use
data encryption. If the data is distributed in multi cloud.
Environment as well as it is encrypted, we can protect our data
in even better way. The data which is uploaded by the user can
be encrypted first and then we can store it on the cloud server
which is shown in fig: 5 and fig: 6. this will be helpful in
providing two-way security to the customer’s data. To store
the data in multi-cloud environment the symmetric key or
secret key algorithms are the best choice. Symmetric key
algorithm is also known as the secret key encryption. It is a
cryptographic technique in which both the sender and receiver
of data use the same key for the purpose of encryption and
decryption of data. Symmetric key algorithms are suitable for
storing data in cloud multi cloud, as user should be able to
access his data easily.
Fig-5: One way encryption in single cloud
Fig-6: Two way encryption in multi-cloud
6. RESULTS AND DISCUSSION
This work takes notes of the critical analysis of various
features provided by hosting types that includes Infrastructure
on Demand, Resource Size Flexibility, Multitenant, and
Application on demand, Network Flexibility, Automated
Provisioning, Scalability, Billing Type and Easy to use
Interfaces. Thus giving us the advantages of one type of
hosting over another and the advent of the concept of cloud.
In Traditional Hosting there are controlled environment and
power and forms parts of foundation of cloud computing. As
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 672
compared to shared web hosting on the cloud hosting our data
is hosted not on one but on several servers connected to work
as one. The VPS servers are less efficient since they allocate a
guaranteed amount of resources to each client that can never
be rerouted to others. In Dedicated hosting unlike cloud
computing the web hosting still owns the machines and has to
monitor the performance of the server ensuring uninterrupted
work flow of server .In Grid computing all machines process
different parts of a larger task.
The advantages of cloud computing over traditional hosting
are cloud computing is sold on demand typically as pay per
lease or leased service. Users are able to control and budget
costs more efficiently. Users determine how much of the
service they wish to use typically at the enrolment time or by
changing configuration dynamically through a web
administered interface. Users can typically access the service
from any location. User services are managed and provided by
cloud services. Table 1 depicts the various hosting types along
with their year of evolution and a comparison of the various
features and infrastructure provided by these hosting services.
Table-1: Evolution Of cloud Computing
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 673
7. CONCLUSIONS AND FUTURE SCOPE
Cloud hosting is reliable, easily scalable and affordable
hosting solution that differs from traditional hosting solutions
in many aspects. Cloud computing is promising paradigm for
IT services as computing utilities. This approach has several
advantages over the traditional web hosting services and grid
computing including higher security, lesser costs, better
efficiency, and simplified data storage. It is clear that although
the use of cloud computing has rapidly increased; cloud
computing security is still considered the major issue in the
cloud computing environment. Customers do not want to lose
their private information as a result of malicious intruders in
the cloud. Furthermore, data intrusion leads to many problems
for the users of cloud computing. The purpose of this work is
to survey the recent research on single clouds and multi-clouds
to address the security risks and solutions. We have found that
much research has been done to ensure the security of the
single cloud and cloud storage whereas multi clouds have
received less attention in the area of security. We support the
migration to multi-clouds due to its ability to decrease security
risks that affect the cloud computing user.
REFERENCES
[1]. H. Shacham, B. Waters (Dec 2008), "Compact proofs of
retrievability", in Proc. of Asia crypt 2008, vol. 5350, pp. 90–
107
[2]. M.A. Shah, R. Swaminathan, M. Baker (2008), "Privacy
preserving audit and extraction of digital contents"
[3]. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou (2009),
"Enabling public verifiability and data dynamics for storage
security in cloud computing", in Proc. of ESORICS’09.
[4]. Wang, K. Ren, W. Lou (2010), ―Achieving secure,
scalable, and fine-grained access control in cloud computing‖,
in Proc. of IEEE INFOCOM’10, San Diego.
[5]. Cloud Security Alliance, (2009) ―Security guidance for
critical areas of focus in cloud computing,‖
[6]. ― Design and Implementation of Virtual Private Services‖
Sotiris Ionnandis Steven M.Bellovin
[7]. ―Internet Infrastructure Technology‖ Structure Research,
September 2012.
[8]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and
Privacy Challenges in Cloud Computing Environments", IEEE
Security & Privacy, 8(6), 2010, pp. 24-31.
[9]. Amazon, Amazon Web Services. Web serviceslicensing
agreement, October3, 2006
[10]. S.L. Garfinkel, "An evaluation of amazon’s grid
computing services: EC2, S3, and QS", Technical Report TR-
08-07, Computer Science Group, Harvard University,
Citeseer, 2007, pp. 1-15
[11]. S. Subashini and V. Kavitha, "A survey on security
issues in service delivery models of cloud computing", Journal
of Network and ComputerApplications, 34(1), 2011, pp 1-11.
[12]. M.A. AlZain and E. Pardede, "Using Multi Sharesfor
Ensuring Privacy in Database-as-a-Service",44th Hawaii Intl.
Conf. on System Sciences(HICSS), 2011, pp. 1-9.
[13]. A. Bessani, M. Correia, B. Quaresma, F. André andP.
Sousa, "DepSky: dependable and secure storage in a cloud-of-
clouds", EuroSys'11:Proc. 6thConf. On Computer systems,
2011, pp. 31-46.
[14]. F. Rocha and M. Correia, "Lucy in the Sky without
Diamonds: Stealing Confidential Data in the Cloud", Proc.
1stIntl. Workshop of Dependability of Clouds, Data Centers
and Virtual Computing Environments, 2011, pp. 1-6.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 674
[15]. H. Abu-Libdeh, L. Princehouse and H.Weatherspoon,
"RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st
ACM symposium onCloud computing, 2010, pp. 229-240.
[16]. C. Cachin, R. Haas and M. Vukolic, "Dependable
storage in the Inter cloud", Research Report RZ,3783, 2010.
[17]. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W.
Felten, "SPORC: Group collaboration using untrusted cloud
resources", OSDI, October2010, pp. 1-14.
[18]. E. Grosse, J. Howie, J. Ransome, J. Reavis and S.
Schmidt, "Cloud computing roundtable", IEEE Security &
Privacy, 8(6), 2010, pp. 17-23.
[19]. S. Kamara and K. Lauter, "Cryptographic cloud storage",
FC'10: Proc. 14thIntl.Conf. on Financial cryptograpy and data
security,2010, pp. 136-149.
[20]. P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M.
Dahlin and M. Walfish, "Depot: Cloud storage with minimal
trust", OSDI'10: Proc. of the 9thUSENIX Conf. on Operating
systems design and implementation, 2010, pp. 1-16.
[21]. A. Shraer, C. Cachin, A. Cidon, I. Keidar,
Y.Michalevsky and D. Shaket, "Venus: Verification for
untrusted cloud storage", CCSW'10: Proc. ACM workshop on
Cloud computing security workshop, 2010, pp. 19-30.
[22]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and
Privacy Challenges in Cloud Computing Environments", IEEE
Security & Privacy, 8(6), 2010, pp. 24-31.
[23]. M. Van Dijk and A. Juels, "On the impossibility of
cryptography alone for privacy-preserving cloud computing",
HotSec'10: Proc. 5thUSENIX Conf. on Hot topics in security,
2010, pp.1-8.
[24]. K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahigh-
availability and integrity layer for cloud storage", CCS'09:
Proc. 16th ACM Conf. on Computer and communications
security, 2009, pp.187-198.
[25]. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud",
ACM SIGACT News, 40, 2009, pp. 81-86.
[26]. Clavister, "Security in the cloud", Clavister White Paper,
2008.
[27]. T. Ristenpart, E. Tromer, H. Shacham and S.Savage,
"Hey, you, get off of my cloud: exploring formation leakage in
third-party compute clouds", CCS'09: Proc. 16thACM Conf.
on Computer and communications security, 2009, pp.199-212.
[28]. N. Santos, K.P. Gummadi and R. Rodrigues ,"Towards
trusted cloud computing", USENIX Association, 2009, pp. 3-
9.
[29]. C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuringdata
Int. Conf. on Advances in Recent Technologies in.
Proc.Int. Conf. on Advances in Recent Technologies in
Communication and Computing, 2010, pp. 1-9.
BIOGRAPHIES
Manvi Mishra, Professor & Head,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India.
Isha Arora, Research Scholar, Department
of Computer Science, Shri Ram Murti
Smarak Women’s College Of Engineering
and Technology, Bareilly, Uttar Pradesh,
India
Pooja Singh, Research Scholar,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India
Sugandha Prabhakar, Research Scholar ,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India

More Related Content

What's hot

Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Fundamental concepts and models
Fundamental concepts and modelsFundamental concepts and models
Fundamental concepts and modelsAsmaa Ibrahim
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingEditor IJCATR
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingShahzad
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 

What's hot (18)

Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Fundamental concepts and models
Fundamental concepts and modelsFundamental concepts and models
Fundamental concepts and models
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computing
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Ijetcas14 440
Ijetcas14 440Ijetcas14 440
Ijetcas14 440
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 

Viewers also liked

Enhanced technique for regression testing
Enhanced technique for regression testingEnhanced technique for regression testing
Enhanced technique for regression testingeSAT Journals
 
Effect of gradation of aggregates on marshall properties of sdbc mix design
Effect of gradation of aggregates on marshall properties of sdbc mix designEffect of gradation of aggregates on marshall properties of sdbc mix design
Effect of gradation of aggregates on marshall properties of sdbc mix designeSAT Journals
 
A vm scheduling algorithm for reducing power consumption of a virtual machine...
A vm scheduling algorithm for reducing power consumption of a virtual machine...A vm scheduling algorithm for reducing power consumption of a virtual machine...
A vm scheduling algorithm for reducing power consumption of a virtual machine...eSAT Journals
 
Characterizations and optimization study on influence of different parameters...
Characterizations and optimization study on influence of different parameters...Characterizations and optimization study on influence of different parameters...
Characterizations and optimization study on influence of different parameters...eSAT Journals
 
A review on fuel cell and its applications
A review on fuel cell and its applicationsA review on fuel cell and its applications
A review on fuel cell and its applicationseSAT Journals
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Journals
 
Analytical study on effects of water quality parameters using remote sensing ...
Analytical study on effects of water quality parameters using remote sensing ...Analytical study on effects of water quality parameters using remote sensing ...
Analytical study on effects of water quality parameters using remote sensing ...eSAT Journals
 
High dimensionality reduction on graphical data
High dimensionality reduction on graphical dataHigh dimensionality reduction on graphical data
High dimensionality reduction on graphical dataeSAT Journals
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manetseSAT Journals
 
Tungsten oxide nanostructures for energy storage and field emission applications
Tungsten oxide nanostructures for energy storage and field emission applicationsTungsten oxide nanostructures for energy storage and field emission applications
Tungsten oxide nanostructures for energy storage and field emission applicationseSAT Journals
 
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...eSAT Journals
 
Influence of curing process interrupt on ilss of thin carbon epoxy laminates
Influence of curing process interrupt on ilss of thin carbon epoxy laminatesInfluence of curing process interrupt on ilss of thin carbon epoxy laminates
Influence of curing process interrupt on ilss of thin carbon epoxy laminateseSAT Journals
 
Environmental sciences
Environmental sciencesEnvironmental sciences
Environmental scienceseSAT Journals
 
Breast cancer diagnosis and recurrence prediction using machine learning tech...
Breast cancer diagnosis and recurrence prediction using machine learning tech...Breast cancer diagnosis and recurrence prediction using machine learning tech...
Breast cancer diagnosis and recurrence prediction using machine learning tech...eSAT Journals
 
Effect of a diffuser tower on the power output of a solar chimney power plant
Effect of a diffuser tower on the power output of a solar chimney power plantEffect of a diffuser tower on the power output of a solar chimney power plant
Effect of a diffuser tower on the power output of a solar chimney power planteSAT Journals
 
Design of transformer less power supply for low power application
Design of transformer less power supply for low power applicationDesign of transformer less power supply for low power application
Design of transformer less power supply for low power applicationeSAT Journals
 
Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...eSAT Journals
 
Performance evaluation of 1 tbps qpsk dwdm system over isowc
Performance evaluation of 1 tbps qpsk dwdm system over isowcPerformance evaluation of 1 tbps qpsk dwdm system over isowc
Performance evaluation of 1 tbps qpsk dwdm system over isowceSAT Journals
 

Viewers also liked (18)

Enhanced technique for regression testing
Enhanced technique for regression testingEnhanced technique for regression testing
Enhanced technique for regression testing
 
Effect of gradation of aggregates on marshall properties of sdbc mix design
Effect of gradation of aggregates on marshall properties of sdbc mix designEffect of gradation of aggregates on marshall properties of sdbc mix design
Effect of gradation of aggregates on marshall properties of sdbc mix design
 
A vm scheduling algorithm for reducing power consumption of a virtual machine...
A vm scheduling algorithm for reducing power consumption of a virtual machine...A vm scheduling algorithm for reducing power consumption of a virtual machine...
A vm scheduling algorithm for reducing power consumption of a virtual machine...
 
Characterizations and optimization study on influence of different parameters...
Characterizations and optimization study on influence of different parameters...Characterizations and optimization study on influence of different parameters...
Characterizations and optimization study on influence of different parameters...
 
A review on fuel cell and its applications
A review on fuel cell and its applicationsA review on fuel cell and its applications
A review on fuel cell and its applications
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
Analytical study on effects of water quality parameters using remote sensing ...
Analytical study on effects of water quality parameters using remote sensing ...Analytical study on effects of water quality parameters using remote sensing ...
Analytical study on effects of water quality parameters using remote sensing ...
 
High dimensionality reduction on graphical data
High dimensionality reduction on graphical dataHigh dimensionality reduction on graphical data
High dimensionality reduction on graphical data
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
 
Tungsten oxide nanostructures for energy storage and field emission applications
Tungsten oxide nanostructures for energy storage and field emission applicationsTungsten oxide nanostructures for energy storage and field emission applications
Tungsten oxide nanostructures for energy storage and field emission applications
 
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...
 
Influence of curing process interrupt on ilss of thin carbon epoxy laminates
Influence of curing process interrupt on ilss of thin carbon epoxy laminatesInfluence of curing process interrupt on ilss of thin carbon epoxy laminates
Influence of curing process interrupt on ilss of thin carbon epoxy laminates
 
Environmental sciences
Environmental sciencesEnvironmental sciences
Environmental sciences
 
Breast cancer diagnosis and recurrence prediction using machine learning tech...
Breast cancer diagnosis and recurrence prediction using machine learning tech...Breast cancer diagnosis and recurrence prediction using machine learning tech...
Breast cancer diagnosis and recurrence prediction using machine learning tech...
 
Effect of a diffuser tower on the power output of a solar chimney power plant
Effect of a diffuser tower on the power output of a solar chimney power plantEffect of a diffuser tower on the power output of a solar chimney power plant
Effect of a diffuser tower on the power output of a solar chimney power plant
 
Design of transformer less power supply for low power application
Design of transformer less power supply for low power applicationDesign of transformer less power supply for low power application
Design of transformer less power supply for low power application
 
Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...
 
Performance evaluation of 1 tbps qpsk dwdm system over isowc
Performance evaluation of 1 tbps qpsk dwdm system over isowcPerformance evaluation of 1 tbps qpsk dwdm system over isowc
Performance evaluation of 1 tbps qpsk dwdm system over isowc
 

Similar to An assessment of cloud computing

A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingSteven Wallach
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachIRJET Journal
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Publishing House
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Journals
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptxtaruian
 

Similar to An assessment of cloud computing (20)

A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
Availability in Cloud Computing
Availability in Cloud ComputingAvailability in Cloud Computing
Availability in Cloud Computing
 
D045031724
D045031724D045031724
D045031724
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptx
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxRashidFaridChishti
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Nitin Sonavane
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Low Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookLow Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookPeterJack13
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfssuser5c9d4b1
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2T.D. Shashikala
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfmahaffeycheryld
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...IJECEIAES
 

Recently uploaded (20)

Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Low Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookLow Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s Handbook
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 

An assessment of cloud computing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 668 AN ASSESSMENT OF CLOUD COMPUTING: EVOLUTION Manvi Mishra1 , Isha Arora2 , Pooja Singh3 , Sugandha Prabhakar4 1 Professor & Head, Department of Computer Science, SRMSWCET, U.P, India 2 Research Scholar, Department of Computer Science, SRMSWCET, U.P, India 3 Research Scholar, Department of Computer Science, SRMSWCET, U.P, India 4 Research Scholar, Department of Computer Science, SRMSWCET, U.P, India Abstract In this present work we have given a concise and systematic study of evolution of cloud computing from shared web hosting to public cloud computing along with multi clouds based on a wide spectrum of factors which include scalability, availability and performance. The proposed work studies hosting types and aims to promote the use of single and multi-clouds to reduce the risks. Cloud computing is a multi-paradigm technology which has evolved as a cost effective, flexible, performance oriented infrastructure for agile development of business operations. Cloud computing changes the way we think about computing by decoupling data processing, data retention, and data presentation – in effect, divorcing components from location. Today due to the need of hour and security constraints, single cloud computing is transforming to multi cloud computing. Focus has been done on Multi cloud which is also known as “inter cloud” or “cloud of clouds” which reduces the security risks like failure of service availability, data loss and confidentiality breaches that are drawbacks with single cloud. Keywords: Cloud Computing, Evolution, Hosting Types, Multi cloud -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud computing enables a ubiquitous, easily accessible and an on demand infrastructure for sharing a resource pool of services. The characteristics of cloud computing includes: - on demand self-service, broad network access, resource pooling, rapid flexibility and measured performance. The consumers and industry have an extensive dependence on cloud computing in which security is a major issue. Cloud security is multi paradigm and includes computer security, information security and network security. Cloud computing in its real sense came into existence in October 2007, when IBM and Google collaborated and gave the concept of ―Blue Cloud‖. The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data.[1] Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with ―single cloud‖ providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards ―multi- clouds‖ or in other words, ―inter clouds‖or―cloud-of-clouds has emerged recently. In the paper we have discussed the evolution of cloud computing and laid emphasis on the emergence of multi clouds. The following section highlights a brief review of cloud computing. The remaining sections are organized as follows. In Section III discussion about Evolution of Cloud Computing is made. Section IV deliberates on Benefits and Challenges of Cloud Computing. Section V focuses on Evolution of Single to Multi cloud. Section VI presents the Results and Section VII presents the Conclusion. 2. REVIEW OF LITERATURE This review surveyed the existing literature using a principled and systematic approach. The U.S. National Institutes of Standards and Technology defines cloud as‖ Cloud Computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources(e.g. Networks, services, storage and applications) that can be rapidly provisioned and released with a minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three delivery models and four deployment models.‖ [1].Following are the factors which lead to the evolution of cloud computing: [2] 1. Scalability: The number of resources that are needed to be accessed by a wide range of users having varied requests is increasing day by day. This lead to the evolution of cloud computing. 2. Heterogeneity: Together with the number of devices, the range of types of resources currently increases significantly. 3. Economic Reasons: the business models around the IT service and resource provisioning have changed drastically over recent years, moving away from onetime license fees and licensing models tied to individual users or machines, to flat rates and free or low cost online applications.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 669 4. Mobility: in the modern, globalized economy and with modern smart phones and powerful mobile devices, a growing demand for online availability, accessibility to data, mobile office like working environments etc. is notable. Cloud services are usually divided in the three main types which are: 1. Software as a Service (SaaS): SaaS clients rent usage of applications running within the Cloud’s provider infrastructure, for example Sales Force. The applications are typically offered to the clients via the Internet and are managed completely by the Cloud provider. 2. Platform as a Service (PaaS): PaaS Cloud providers offer an application platform as a service, for example Google App Engine. This enables clients to deploy custom software using the tools and programming languages offered by the provider. Clients have control over the deployed applications and environment-related settings. 3. Infrastructure as a Service (IaaS): IaaS delivers hardware resources such as CPU, disk space or network components as a service. These resources are usually delivered as a virtualization platform by the Cloud provider and can be accessed across the Internet by the client with the client having full control of the virtualized platform. Deploying cloud computing can differ depending on requirements in four deployment models which have been identified each with specific characteristics that supports the needs of services and users of the clouds. These are: public, private, community and hybrid clouds. Fig-1: Types of Cloud 3. EVOLUTION OF CLOUD COMPUTING The trend toward cloud computing started in the late 1980s with the concept of grid computing when, for the first time, a large number of systems were applied to a single problem, usually scientific in nature and requiring exceptionally high levels of parallel computation. The objective of Cloud computing is the newest name for what has been around since the mid-90s as ―on-demand infrastructure.‖ In 1995, it was known as ―Shared Web Hosting‖ and had limited features such as multi-tenant, automated provisioning, easy-to-use interface. In 1998 VPS Hosting became available – this web host improved by having partial infrastructure demand and resource size flexibility. 1997 brought Dedicated Hosting, both managed and unmanaged. [3] This type of automated computing had dedicated servers with promises of full administrative access.[4] The 2000s was when automated computing came in the form of Grid /utility computing and had full infrastructure demand and multi-tenant, partial resource size flexibility and automated provisioning came closer to what is known as ―cloud today‖. From 2012’s through today the cloud computing has gathered a wide spectrum of audience making it more scalable, flexible and performance oriented. [5] 1. Shared Web Hosting – Shared web hosting service or virtual hosting service or derive host refers to a web hosting service where many websites reside on one web server connected to the Internet. Each site "sits" on its own partition, or section/place on the server, to keep it separate from other sites. This is generally the most economical option for hosting, as many people share the overall cost of server maintenance 2. VPS Hosting – A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting service. A VPS runs its own copy of an operating system, and customers have super user-level access to that operating system instance, so can install almost any software that runs on that OS. For many purposes they are functionally equivalent to a dedicated physical server, and being software defined are able to be much more easily created and configured. [6] 3. Dedicated Hosting– It is software installed on a separate virtual server to manage the end user connections with the virtualized desktops. A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. There is also another level of dedicated or managed hosting commonly referred to as complex managed hosting.[7] 4. Grid computing- Grid computing is the collection of computer resources from multiple locations to reach a common goal. What distinguishes grid computing from conventional high performance computing systems such
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 670 as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed. Although a single grid can be dedicated to a particular application, commonly a grid is used for a variety of purposes. Grids are often constructed with general purpose grid middleware software libraries. 5. Public Cloud Computing- In Public clouds the cloud infrastructure is available to the public on a commercial basis by a cloud service provider. This enables a consumer to deploy and develop a service in the cloud with a very little financial outlays compared to other deployment models. Private cloud incorporates specific services and is maintained and deployed for a specific organization. In Community cloud the cloud infrastructure is shared among a number of organizations with similar interests and requirements. The Hybrid cloud comprises of a number of clouds of any type but the clouds have the ability through their interfaces to allow data or applications to be moved from one cloud to another. How to access data in single cloud using one of these four deployment methods or a combination is shown in fig 2. 6. Multi clouds- Multi cloud computing is a new dimension in cloud computing which is the concurrent use of two or more cloud services to minimize the risk of widespread data loss or downtime due to localized component failure in a cloud computing environment as shown in fig 3. A multi cloud approach can offer not only the hardware, software and infrastructure but redundancy necessary to optimize fault tolerance. Fig-2: Accessing data in single cloud Fig-3: Accessing data in multi-cloud 4. BENEFITS AND CHALLENGES Organizations pay for the usage of cloud which is carefully monitored and measured — in past managed services models, it was difficult to see actual results based on IT spending centralized computing resources, within the cloud provider, are managed by fewer personnel with heavy use of automation and consistent processes resulting in lower cost to the consumers. Consuming organizations do not need a sophisticated IT staff which is expensive, hard to find transition of work for a cloud provider. This improves quality, maintainability, security, and reduces cost to the consumers of cloud. [8] Numerous legacy IT integrators are claiming to provide cloud solutions but are essentially still legacy managed service providers. Organizations have significant legacy computing resources (servers, data centers, and IT personnel) that will need to be transitioned or eliminated in order to achieve true cost savings and flexibility provided by cloud providers/services. Mission critical applications that are core to the business or the consuming organization must be transitioned to the cloud. This is neither quick nor easy, and will take some time. Businesses need to evaluate whether their custom/legacy application is truly needed and worth the re-investment budgeting for cloud services is a challenge to some commercial and government organizations. Existing procurement policies may need to be adapted. Following are the major challenges to cloud computing which encompass lack of ownership of data, Overdependence, Information Security, Privacy, Availability, Performance, Data Migration and Stability of Provider. [9] 5. EVOLUTION OF SINGLE TO MULTI-CLOUD This section provides brief summary review of prior works on cloud computing with respect to security. Cloud computing security was explored in single cloud environment [10]. Service availability was focused in [11] in single cloud environment. Multi-shares with secret sharing algorithm was proposed in [12] for cloud security and data integrity. Cloud security was explored using cryptographic methods [13]. The security risks addressed include service availability, data
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 671 intrusion, and data integrity. The solution used cloud storage and multi-clouds. In [14] a survey has been made to know security issues and solutions with respect to single cloud. RACS and RAID kind of techniques were used for cloud security using multi-clouds [15]. Client centric distributed protocols were explored for data integrity with multi-clouds usage [16].Service availability problem was focused in single cloud environment. [17] There was discussion about cloud security issues [18]. Cryptography is used to protect cloud data in single cloud environment [19]. A security mechanism by name ―Depot‖ is used to single cloud environment [20]. A security mechanism by name ―Venus‖ was proposed in [21] which focused on data integrity issue in single cloud environment. In [22] a survey is made on cloud security. In [23] cloud data integrity is focused in single cloud environment. In [24] a new security mechanism was proposed by name ―HAIL‖ for improving service availability in multi- cloud environment. In [25] a survey was done on cloud data integrity in multi-cloud environment. Encrypted cloud VPN technique is used in [26] for data integrity in multi-cloud environment. Cloud security was discussed in [27] in single cloud environment. TCCP techniques for cloud data integrity issues and service availability were presented in [28] in single cloud environment tokens and erasure codes were used in [29] to ensure cloud data integrity in single cloud environment. PDP schemes were used to protect data integrity in clouds. Fig-4:Multi-Tenancy of Cloud Computing For ensuring more security in cloud environment, we can use data encryption. If the data is distributed in multi cloud. Environment as well as it is encrypted, we can protect our data in even better way. The data which is uploaded by the user can be encrypted first and then we can store it on the cloud server which is shown in fig: 5 and fig: 6. this will be helpful in providing two-way security to the customer’s data. To store the data in multi-cloud environment the symmetric key or secret key algorithms are the best choice. Symmetric key algorithm is also known as the secret key encryption. It is a cryptographic technique in which both the sender and receiver of data use the same key for the purpose of encryption and decryption of data. Symmetric key algorithms are suitable for storing data in cloud multi cloud, as user should be able to access his data easily. Fig-5: One way encryption in single cloud Fig-6: Two way encryption in multi-cloud 6. RESULTS AND DISCUSSION This work takes notes of the critical analysis of various features provided by hosting types that includes Infrastructure on Demand, Resource Size Flexibility, Multitenant, and Application on demand, Network Flexibility, Automated Provisioning, Scalability, Billing Type and Easy to use Interfaces. Thus giving us the advantages of one type of hosting over another and the advent of the concept of cloud. In Traditional Hosting there are controlled environment and power and forms parts of foundation of cloud computing. As
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 672 compared to shared web hosting on the cloud hosting our data is hosted not on one but on several servers connected to work as one. The VPS servers are less efficient since they allocate a guaranteed amount of resources to each client that can never be rerouted to others. In Dedicated hosting unlike cloud computing the web hosting still owns the machines and has to monitor the performance of the server ensuring uninterrupted work flow of server .In Grid computing all machines process different parts of a larger task. The advantages of cloud computing over traditional hosting are cloud computing is sold on demand typically as pay per lease or leased service. Users are able to control and budget costs more efficiently. Users determine how much of the service they wish to use typically at the enrolment time or by changing configuration dynamically through a web administered interface. Users can typically access the service from any location. User services are managed and provided by cloud services. Table 1 depicts the various hosting types along with their year of evolution and a comparison of the various features and infrastructure provided by these hosting services. Table-1: Evolution Of cloud Computing
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 673 7. CONCLUSIONS AND FUTURE SCOPE Cloud hosting is reliable, easily scalable and affordable hosting solution that differs from traditional hosting solutions in many aspects. Cloud computing is promising paradigm for IT services as computing utilities. This approach has several advantages over the traditional web hosting services and grid computing including higher security, lesser costs, better efficiency, and simplified data storage. It is clear that although the use of cloud computing has rapidly increased; cloud computing security is still considered the major issue in the cloud computing environment. Customers do not want to lose their private information as a result of malicious intruders in the cloud. Furthermore, data intrusion leads to many problems for the users of cloud computing. The purpose of this work is to survey the recent research on single clouds and multi-clouds to address the security risks and solutions. We have found that much research has been done to ensure the security of the single cloud and cloud storage whereas multi clouds have received less attention in the area of security. We support the migration to multi-clouds due to its ability to decrease security risks that affect the cloud computing user. REFERENCES [1]. H. Shacham, B. Waters (Dec 2008), "Compact proofs of retrievability", in Proc. of Asia crypt 2008, vol. 5350, pp. 90– 107 [2]. M.A. Shah, R. Swaminathan, M. Baker (2008), "Privacy preserving audit and extraction of digital contents" [3]. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou (2009), "Enabling public verifiability and data dynamics for storage security in cloud computing", in Proc. of ESORICS’09. [4]. Wang, K. Ren, W. Lou (2010), ―Achieving secure, scalable, and fine-grained access control in cloud computing‖, in Proc. of IEEE INFOCOM’10, San Diego. [5]. Cloud Security Alliance, (2009) ―Security guidance for critical areas of focus in cloud computing,‖ [6]. ― Design and Implementation of Virtual Private Services‖ Sotiris Ionnandis Steven M.Bellovin [7]. ―Internet Infrastructure Technology‖ Structure Research, September 2012. [8]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31. [9]. Amazon, Amazon Web Services. Web serviceslicensing agreement, October3, 2006 [10]. S.L. Garfinkel, "An evaluation of amazon’s grid computing services: EC2, S3, and QS", Technical Report TR- 08-07, Computer Science Group, Harvard University, Citeseer, 2007, pp. 1-15 [11]. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and ComputerApplications, 34(1), 2011, pp 1-11. [12]. M.A. AlZain and E. Pardede, "Using Multi Sharesfor Ensuring Privacy in Database-as-a-Service",44th Hawaii Intl. Conf. on System Sciences(HICSS), 2011, pp. 1-9. [13]. A. Bessani, M. Correia, B. Quaresma, F. André andP. Sousa, "DepSky: dependable and secure storage in a cloud-of- clouds", EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46. [14]. F. Rocha and M. Correia, "Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud", Proc. 1stIntl. Workshop of Dependability of Clouds, Data Centers and Virtual Computing Environments, 2011, pp. 1-6.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 674 [15]. H. Abu-Libdeh, L. Princehouse and H.Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium onCloud computing, 2010, pp. 229-240. [16]. C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Inter cloud", Research Report RZ,3783, 2010. [17]. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October2010, pp. 1-14. [18]. E. Grosse, J. Howie, J. Ransome, J. Reavis and S. Schmidt, "Cloud computing roundtable", IEEE Security & Privacy, 8(6), 2010, pp. 17-23. [19]. S. Kamara and K. Lauter, "Cryptographic cloud storage", FC'10: Proc. 14thIntl.Conf. on Financial cryptograpy and data security,2010, pp. 136-149. [20]. P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M. Dahlin and M. Walfish, "Depot: Cloud storage with minimal trust", OSDI'10: Proc. of the 9thUSENIX Conf. on Operating systems design and implementation, 2010, pp. 1-16. [21]. A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.Michalevsky and D. Shaket, "Venus: Verification for untrusted cloud storage", CCSW'10: Proc. ACM workshop on Cloud computing security workshop, 2010, pp. 19-30. [22]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31. [23]. M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", HotSec'10: Proc. 5thUSENIX Conf. on Hot topics in security, 2010, pp.1-8. [24]. K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahigh- availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp.187-198. [25]. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86. [26]. Clavister, "Security in the cloud", Clavister White Paper, 2008. [27]. T. Ristenpart, E. Tromer, H. Shacham and S.Savage, "Hey, you, get off of my cloud: exploring formation leakage in third-party compute clouds", CCS'09: Proc. 16thACM Conf. on Computer and communications security, 2009, pp.199-212. [28]. N. Santos, K.P. Gummadi and R. Rodrigues ,"Towards trusted cloud computing", USENIX Association, 2009, pp. 3- 9. [29]. C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuringdata Int. Conf. on Advances in Recent Technologies in. Proc.Int. Conf. on Advances in Recent Technologies in Communication and Computing, 2010, pp. 1-9. BIOGRAPHIES Manvi Mishra, Professor & Head, Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India. Isha Arora, Research Scholar, Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India Pooja Singh, Research Scholar, Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India Sugandha Prabhakar, Research Scholar , Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India