SlideShare a Scribd company logo
1 of 8
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 892
EMERGING CLOUD COMPUTING PARADIGM: VISION, RESEARCH
CHALLENGES AND DEVELOPMENT TRENDS
Kunal Sharma1
, Susheel Thakur2
, Arvind Kalia3
, Jawahar Thakur4
, Sunil Kumar5
1
Student B.Tech (I.T), UIIT, Himachal Pradesh University, H.P, India
2
Student M.Tech (CS), Dept. of Computer Science, Himachal Pradesh University, H.P, India
3
Professor, Dept. of Computer Science, Himachal Pradesh University, H.P, India
4
Associate Professor, Dept. of Computer Science, Himachal Pradesh University, H.P, India
5
Programmer, UIIT, Himachal Pradesh University, H.P, India
Abstract
Cloud computing has recently emerged as a new paradigm for hosting and delivering utility-oriented IT services to users over the
Internet. Cloud computing is lucrative to enterprise owners as it eliminates the requirement for users to plan ahead for resource
provisioning, allows organization to initiate from the small and increase resources only when there is a hike in service demand.
Cloud computing has emerged as a new technology that will lead the next generation of Internet. It tries to provide optimal and
efficient computing through collaboration, agility, availability and scalability. In this paper, the cloud computing paradigm is
illustrated in a variety of aspects and certain open challenges of research and recent development trends are being discussed. The
aim of this research paper is to provide a comprehensive overview of the cloud computing paradigm, identify its major research
challenges and recent development trends taking place in this increasingly important field.
Keywords: Mobile Cloud Computing, Live migration, Utility Computing, Virtualization.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
In last few decades, there has been rapid development in
ICT (Information and Communication Technology)
especially in processing, storage, and Internet technologies.
The technologies such as parallel computing, distributed
computing, grid computing and now, the cloud computing,
have their main focus at allowing access to computational
engines or computing resources by dynamic resource
provisioning in fully virtualized manner. Basically these
technologies are aiming at offering computing as utility;
Utility Computing is on-demand delivery of computing
power (“pay-as-you-go-on”), likewise as traditional public
utility services.
Cloud Computing is offering utility-oriented IT services to
users worldwide. Based on a pay-as you-go model, it
enables hosting of numerous applications from consumer,
scientific and business domains. In 1969, Leonard Kleinrock
[12], one of the chief scientists of the original Advanced
Research Projects Agency Network (ARPANET) which
seeded the Internet, said: “As of now, computer networks
are still in their infancy, but as they grow up and become
sophisticated, we will probably see the spread of computer
utilities‟ which, like present electric and telephone utilities,
will service individual homes and offices across the
country.” This vision of computing utilities based on a
service provisioning model anticipated the massive
transformation of the entire computing industry in the 21st
century whereby computing services will be readily
available on demand, like other utility services available in
today‟s society [17]. The factors that led to the development
and occurring of cloud computing involves: development of
grid computing, the high quality storage technology, data
transportation, and Web 2.0, especially the development of
virtualization [5].
Cloud Computing is merging of distinct technologies like
resource pooling, virtualization, dynamic provisioning,
utility computing, on-demand deployment of resources,
Internet delivery of services to deploy and scale applications
for businesses and individuals. The remainder of this paper
is organized as follows. In section 2 an overview of the
cloud computing paradigm has been provided. Section 3
discusses the evolution of the cloud computing technology
over the period of time. Section 4 and 5 focuses on the cloud
computing service, deployment models and service level
agreements (SLA). Section 6 discusses the key design
challenges in the cloud computing paradigm. Section 7 and
8 provides the fundamental insights into the recent
development trends of Cloud computing and conclusion of
the paper.
2. CLOUD COMPUTING
With the rapid development in the processing, storage
technologies and the success of the internet, computing
resources have become reasonable, powerful and globally
available than ever before. Personnel in businesses are
trying to find out methods to cut costs while maintaining the
same performance standards. Their aspirations to grow have
led them to try new ideas and methods even under the peer
pressure of limiting computing resources. This realization
has enabled the actualization of a new model for computing
called cloud computing, in which the resources (e.g. cpu,
network, etc.) are provided through the internet to user as
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 893
general utilities in a pay-as-you-go and on-demand basis
[18]. According to the U.S. Government‟s National Institute
of Standards and Technology (NIST), Cloud Computing is
“a model for enabling convenient, on-demand network
access to shared pool of configurable computing resources
(e.g. network, servers, storage, applications, and services)
that can be rapidly provisioned and released with minimal
management effect or service provider‟s interaction [15].
The cloud computing model resources (e.g. networks,
storage, and services) as general utilities are provisioned so
that they can be leased or released by users over the Internet
in an on-demand manner.
Cloud computing can also be defined as „Cloud computing
is Internet-based computing, whereby shared resources,
software‟s, and information are provided to end users on
demand, like the electricity grid. Conceptually, it is a
paradigm shift where background details are abstracted from
users, who no longer need knowledge of, expertise in, or
control over the technology infrastructure “in the cloud” that
supports them. Cloud computing describes a new
supplement, consumption, and delivery model for IT
services based on Internet, and it typically involves the
provision of dynamically scalable and often virtualized
resources as a service over the Internet‟ [5]. The main
reason for the various views and perceptions of cloud
computing is that unlike other technological terms, this is
not a new technology, but rather a new technology model
that offers a new approach for running businesses.
3. EVOLUTION OF CLOUD COMPUTING
In the 1960s, John McCarthy envisioned that computing
facilities will be provided to the general public like a utility
[6].In 1990s, the term „cloud‟ was used to describe large
ATM networks. But „Cloud Computing‟, started gaining
popularity after Eric Emerson Schmidt, CEO Google used
this word to describe business model for providing services
across the Internet 2006.
The evolution process of cloud computing went through:
networking, network-sharing, information sharing, resource
sharing and service sharing.
It can be clearly stated that cloud computing has evolved in
stages from since last few years. Cloud computing leverages
the existing technologies to meet out the technological and
economic requirements of today‟s demand for information
technology. Cloud computing is often compared to
following technologies, each of which shares certain aspects
with cloud computing.
Fig -1: Cloud computing evolution since networks
Grid Computing: Grid computing is the collection of
computer resources from multiple locations to reach a
common goal. The grid can be thought of as a distributed
system with non-interactive workloads that involve a large
number of files”. Grids are a form of distributed computing
whereby a “super virtual computer” is composed of many
networked loosely coupled computers acting together to
perform large tasks. Cloud computing adds various other
technologies (e.g. Virtualization, Server Consolidation,
Security) to Grids to enhance the working environment [10].
Utility Computing: Utility computing offers various
computing resources, such as networks, storage, processing
to end users as metered services on the basis of „pay-as-you-
go‟ model. Cloud computing is a big picture of utility
computing as it adopts the features of utility computing with
„pay-as-you-go‟ model, automated resource provisioning at
maximum resource utilization and minimum operating cost.
Virtualization: Virtualization abstracts the low-level details
of the hardware and other physical resources to offer an easy
virtualized environment for the application levels.
Virtualization Technology enables the decoupling of the
application payload from the underlying physical hardware
and provides virtualized resources for higher level
applications [18]. For cloud computing, virtualization is the
main component as virtualized resources from the pool of
physical resources can be provisioned on-demand basis in a
real-time scenario.
Autonomic Computing: Autonomic computing refers to
the self-managing characteristics of distributed computing
resources, adapting to unpredictable changes while hiding
intrinsic complexity to operators and users. Started by IBM
in 2001, this initiative ultimately aims to develop computer
systems capable of self-management, to overcome the
rapidly growing complexity of computing systems
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 894
management, and to reduce the barrier that complexity poses
to further growth [2]. Cloud computing adopt the features of
autonomic computing too.
This is a clear indication that cloud has evolved over a
period of time with advancements in its neighboring
technology. Cloud computing leverages virtualization
technology to achieve the goal of providing computing
resources as a utility. Cloud computing paradigm shares
certain aspects with grid computing and autonomic
computing but differs from them on other aspects.
Therefore, it offers unique benefits and imposes distinctive
challenges to meet out its requirements. The features that
make cloud highly interesting to businesses are:
No initial investment on infrastructure or resources:
Pay-as-you-go pricing model offers the business owners a
freedom to start gaining benefits from cloud without making
an initial investment on infrastructure. Simply lease the
resources from cloud according to needs, pay for the usage
and release the resources when they are not required.
Low infrastructure operational cost: As resources are
allocated and de-allocated on-demand basis, thus a cloud
user no-longer need resources to be permanently installed in
order to meet peak load requirements. And this saves a huge
on operational costs.
Scalability: The need of resources of an Internet application
varies over time. And this varying need imposes a threat
over efficient utilization of resources. But with cloud,
applications can be scaled-up and scaled-down as per
requirements of the end user.
Ease in access: As cloud providers need to provide
infrastructure or platform as services to the end users, they
are supposed to offer a management console through which
cloud users can manage their services over Internet through
the use of web-browsers, phones, and PDAs. Cloud
computing paradigm offers such capabilities.
Reduced risks and expenses: The end users who are going
to use innovation and services shift their infrastructure risks
to the cloud providers, thus they are no longer responsible
for such risks managements and expenses where hardware
might fail.
4. CLOUD MODEL
According the definition given by NIST, the cloud model is
composed of five essential characteristics, three service
models, and four deployment models.
The five essential characteristics of cloud are: on-demand
self-service, broad network access, resource pooling, rapid
elasticity, measured service. The computing resources such
as servers, storage can be leased or released on-demand
without any human interaction with the cloud service
providers over the Internet using heterogeneous devices like
desktops, laptops and mobiles phones. However, the service
providers provisioned their resources which are shared by
multiple users by the concept of virtualization of physical
resources. The cloud consumers is charged according to
their rapid elastic demands and for the services as per their
resource usage using appropriate metrics such as storage
usage, CPU hours, and bandwidth usage.
4.1 Cloud Service Models
The three Cloud service models are: Software as a Service
(SaaS), Infrastructure as a Service (IaaS) and Platform as
Service (PaaS).
4.1.1 Software as a Service (SaaS)
SaaS allows consumers to use software or applications that
run on the cloud infrastructure, simply making the use of
web-browsers. Consumers don‟t have any control or the
access to the cloud infrastructure which hosts the respective
software or application. In this model, the provider takes
care of all software development, maintenance, and
upgrades. Saas is now becoming an accepted model of
delivery for application like accounting, CRM, ERP, HRM
etc..
Salesforce is the leader in SaaS computing and is best
known for its on-demand Customer Relationship
Management solution. The pricing model [19] in SaaS bills
its clients in the following three ways: Pay-per-user,
unlimited-usage-fixed-cost, and pay-as-you-go. In pay-per-
user strategy, a separate cost is incurred for each user of a
SaaS application, periodically (usually monthly), for the
number of registered users. This pricing model is further
extended to pay-per-multiple-user pricing model, in which
cost is incurred for a specified number of users.
Unlimited-usage-fixed-cost billing model is usually
accepted by the client organization because this pricing
model is easy to understand and with this model clients can
easily predict their ongoing software expenses, and their
monthly bills, since for unlimited number of users, their
monthly bills remains nearly same from one billing cycle to
the next. However, in pay-as-you-go model, the consumers
will be charged for the number of users and the amount of
resources consumed over a given period of time.
4.1.2 Infrastructure as a Service (IaaS)
Infrastructure as a service model of cloud computing is a
low level layer of abstraction that allows the consumers to
access cloud infrastructure. This model offers hardware,
software, and equipments through the use of virtual
machines with a resource usage based pricing model to
deliver software application development environments.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 895
Fig -2: Layers in IaaS cloud
A programmer should be able to consider IaaS as a flexible,
standard and virtualized operating environment that can
become foundation for PaaS and SaaS. Simply, it is the
responsibility of the provider to control and manage
configurations and operations of operating system, software,
and database being lended. The Amazon Elastic Compute
Cloud (EC2) and Simple Storage Service (S3) are popular
examples of IaaS.
The pricing model is again per-per-use. The pricing for EC2
is done as the basis of clock hours of service time (e.g. from
the time Amazon EC2 instances are launched until they are
terminated, or from the time elastic IPs are allocated until
they are de-allocated, i.e. charging for running resources
only), machine configuration (i.e. the physical capacity of
Amazon EC2 instance you choose, and the instance
characteristics may vary with OS, number of cores, memory,
and load storage), number of instances and machine
purchase type [1].
Table -1: Comparison between cloud service models
Type Cons
umer
Services
provided by
cloud
Service
level
coverage
Customiza
tion
SaaS End
User
Finished
Applications
 A
pplicatio
n Uptime
 A
pplicatio
n
coverage
 M
inimal to
customizati
on
 C
apabilities
dictated by
market or
provider
PaaS Appli
cation
owner
 Ru
ntime
environment
for
application
code
 Clo
ud storage
 Oth
er cloud
services
such as
integration
 E
nvironme
nt
availabili
ty
 E
nvironme
nt
performa
nce
 N
o
applicatio
n
coverage
 Hi
gh degree
of
application
level
customizati
on
available
within
constraints
of the
service
offered
 M
any
application
will need
to be
rewritten
IaaS Appli
cation
owner
or IT
provi
des
Os,
middl
eware
and
applic
ation
suppo
rt
 Virt
ual Server
 Clo
ud Storage
 V
irtual
server
availabili
ty
 T
ime to
provision
 N
o
platform
or
applicatio
n
coverage
 M
inimal
constraints
on
application
s installed
on
standardize
d virtual
OS builds
4.1.3 Platform as a Service (PaaS)
According to programmer‟s view, Cloud computing
paradigm enables them to design, build, test, deploy, and
update applications with a couple of his friends on
weekends, over a set of programming languages, tools and
application development platforms. With platform as a
service, the programmers or software engineers can develop
their applications and transfer them to servers and users over
the Internet.
Google App Engine and Microsoft Azure Cloud Services
are great examples of PaaS. Applications need middle ware
such as databases, operating systems, runtime
environments, web servers, application servers, and other
components to run; and with PaaS, software developers can
focus on development and functionality of their software as
opposed to manage middleware, and the dynamic demand of
infrastructure. PaaS is playing key role in SaaS.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 896
Fig -3: An abstract view of cloud service models
The two main pricing models in PaaS are: pay-per-hour and
pay-per-month. In case of Google App Engine, resources
like instances are billed by the use per instance hour ($0.05
per unit), outgoing network traffic is billed in GBs ($0.12
per GB), Datastore Storage is billed in GBs per month
($0.18 per GB) and so on [9].
4.2 CLOUD DEPLOYMENT MODELS
According to NIST, there are four deployment models in
cloud computing: Private Cloud, Public Cloud, Community
Cloud and Hybrid Cloud.
4.2.1 Private Cloud
Private Cloud is a cloud model in which all cloud
infrastructures is architected and controlled by a particular
or organization (on-premises and/or off-premises) within the
respective firewall. A private cloud is a scalable cloud
environment – providing the agility and efficiency of a
public cloud – built on infrastructure dedicated exclusively
for an organization. It can be hosted in an organization‟s
own data center, in a partner data center, or at Rackspace.
Private clouds are ideal when there is need to accelerate
innovation, have large compute and storage requirements, or
have very strict control, security and compliance needs [16].
A private cloud environment or infrastructure is ring fenced
for the use of an organization at higher levels of network
security. The resources are offered to private cloud from a
specific pool of physical computers. The main features and
benefits of private clouds are:
High security and privacy: a specific pool of physical
resources with restricted access to connections made from
behind one organization‟s firewall, on-site internal hosting
and/or dedicated.
More control: as architected and controlled by a single
organization.
High performance: as it is deployed inside the firewall on
an organization‟s Intranet.
Customizable: the organization can customize hardware,
network and storage performances, and
Cloud-Bursting: a service in which non-sensitive functions
of a private cloud owner are switched over to a public cloud
to free more space in a private cloud.
4.2.2 Public Cloud
This model is more recognizable to many consumers of
cloud, under which a shared pool of physical resources is
offered in a virtualized environment over the Internet.
The features offered by a public cloud model are: Ultimate
Scalability (as vast pool of physical resources is available),
cost-effectiveness, utility style costing (pay-as-you-go)
model, reliability, flexibility, and location independence.
4.2.3 Community Cloud
A community cloud in computing is a collaborative effort in
which infrastructure is shared between several organizations
from a specific community with common concerns
(security, compliance, jurisdiction, etc.), whether managed
internally or by a third party and hosted internally and
externally. The costs are spread over fewer users than a
public cloud (but more than a private cloud), so only some
of the cost savings potential of cloud computing are realized
[5], [15].
4.2.4 Hybrid Cloud
This type of cloud uses the mix of three deployment models
to meet the customer‟s requirements. For example, in
practice, an enterprise can host its e-commerce site in a
private cloud, and its brochure site in a public cloud. The
concept of „cloud bursting‟ comes into picture in the case of
hybrid clouds. The benefits and features offered by a hybrid
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 897
cloud configuration are: scalability, cost efficiency,
flexibility, and security.
5. SERVICE LEVEL AGREEMENT (SLA)
SLA is a contract or agreement between the cloud service
provider and consumer which commit and stipulate to
provide majorly to a specified service level, fee, customer
support and assistance, system performance levels, and
penalty and enforcement provisions for services not offered.
The QoS (Quality of Service), QoP (Quality of Protection),
and responsibilities to both seller and buyer are fundamental
grounds in SLA.
6. OPEN RESEARCH CHALLENGES
Despite of a great success and popularity of the cloud
computing paradigm, the providers, developers, and
consumers must consider issues, challenges or risks of cloud
paradigm which includes user data privacy and security,
service availability, performance, scalability, recovery,
energy efficiency and programmability to take advantage of
cloud computing. The research issues, challenges, or risks
majorly includes: Automated Resource Provisioning, Server
Consolidation, Virtualization and Virtual Machine
Migrations, Security, and Software Development
Frameworks.
6.1 Automated Resource Provisioning
How to feature cloud with on-demand lease and release of
physical resources? How to provision resources in flash
crowd effect? These questions addresses the challenges of
QoS. The two commonly used approaches are: prediction,
and reaction (reactive approach). In prediction approach, the
application performance model is predicted at each
particular level in terms of application instances; and based
on the prediction model, the resources are allocated.
However, in reaction or reactive approach of resource
provisioning, resources are allocated and de-allocated
immediately in accordance with demand fluctuations. And
both these approaches impose necessities on this dynamic
operating environment. The improvement in these
approaches is a great research challenge so as to provision
resources accurately as per needs.
6.2 Server Consolidation
How to maximize the resource utilization with minimum
energy consumption?
According to Tony Iams [8], Managing VP, Stamford, CT
USA, servers in many companies run at 15-20% of their
capacity. And to cut unnecessary costs, and maximize return
on investment (ROI), out of 518 respondents in a Gartner
Group Research study 6% had conducted a server
consolidation project, 61% were currently conducting one,
and 28% were planning to do so in nearby future.
Server sprawl is a situation in which multiple underused
servers take up more amount of computing, space and
power, and thus consume more resources than can be
justified by their workload. To prevent server sprawl, server
consolidation focuses on the reduction of the number of
physical resources used in cloud infrastructure by
consolidating load using virtual technologies and enhancing
their utilization. The virtualization technique of physical
resources (e.g. Live VM migration) is often used to
consolidate VMs residing on multiple underutilized servers
on to a single server, so as to save energy. The server
consolidation problem is often formulated with the vector
bin-packing problem [3] which falls in the category of NP –
hard optimization problem.
Also the server consolidation (e.g. the communication
among virtual machine) should not affect the application
performance and servers must also be reactive to congestion.
6.3 Virtual Machine Migration
Virtualization technology enables the decoupling of the
application payload from the underlying physical hardware
and provides virtualized resources for higher level
applications [18]. The technology also provides the ability to
migrate virtual machines (VMs) between the physical
systems and improves the response time, and reduces the
number of physical systems.
Virtual Machine migration is the process of moving a virtual
machine from one host or storage location to another [20].
Generally, a virtual machine running on a virtual server
consists of a configuration file and one or more data files
(virtual hard disk files, and other media files) [14]. Virtual
machine migrations can be categorized to the following two
main categories:
Cold Migration: A powered-off or suspended virtual
machine is made to migrate from one host to another with or
without movement of storage or data.
Hot or live migration: It refers to the process of moving a
running virtual machine or application between different
physical machines without disconnecting the client or
application. Memory, storage, and network connectivity of
virtual machines are transferred from the original host
machines to the destination. When the down time of a VM
during live migration is not noticeable by the end users, it is
called as seamless live migration [13].
Xen and VMware have already implemented live migration
of virtual machines. Clark et. al. [4] discovered the benefits
of live migration of VM, migration of the entire OS and all
its applications as a single unit from the process level
migration approaches. The avoidance of hotspots is a major
advantage of VM migration. The main research areas in VM
migration are detection of migration and hotspots, so as to
respond to sudden workload changes.
6.4 Security
Security is one of the major challenges to the growth of the
cloud, and also the main reason for the slow acceptance of
cloud computing paradigm by various organizations.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 898
Fig -4: Results of IDC survey ranking security challenges,
2008 [7]
In accordance to Gartner 2008, the seven specific security
issues that customers must raise with vendors before
selecting a cloud vendor are: privileged user access,
regulatory compliance, data location, data segregation,
recovery, investigative support, and long term viability [11].
Ensuring secure data access and transfer, backup and
recovery, auditing and certification over the multi-tenancy
model and pooled resources are the great security challenges
that require novel techniques to tackle with. Broadly
speaking, storage security, middleware security, data
security, network security, and application security, are
major concerns for making cloud reliable via security.
6.5 Software Frameworks
The software programming techniques, languages, and
frameworks are also keynotes for cloud providers because it
is a layer where software application developers are going to
work; and the applications thus developed over cloud can be
of large scales and data intensive. Google App engine
currently supports 4 programming languages including
Python, Java, PHP, Go and a number of frameworks in each
of these languages. Therefore, offering a managed
environment for production of applications for several
developer‟s expertise of different domains is a great
challenge. MapReduce frameworks such as Hadoop for
scalable and fault tolerant data processing is required by
many organization nowadays, and tasks in Hadoop are either
I/O intensive or CPU intensive. Also, VMs with
heterogeneous characteristics might be allocated to Hadoop
nodes which further require operations to be optimized
either for energy or performance.
7. DEVELOPMENTS TRENDS
Cloud computing has grown up in recent years and its major
offerings include: IT infrastructure that can extend and
contract, application or software development frameworks,
application development and deployment techniques,
management software to observe, monitor and setup cloud
services, and networks that supports all of this. Cloud
computing has initiated and accelerated a trend and
environment in which individuals and organizations can
easily innovate and experiment without having time and
expense of setting, configuring, and deploying new physical
hardware. But this is still an emerging area and it will be too
soon to declare a victory. However, it is now a big business.
In a report in Washington post, by the end of 2013 cloud
computing market was estimated around $131 billion, and
expected to $ 207 billion by 2016.
Several key trends that can be identified in cloud computing
paradigm are:
7.1 Personal Cloud
A report from Gartner Inc says that by the year 2014 [11],
the personal cloud will replace the personal computer and in
the new era users will be offered higher flexibility with
devices they use for daily activities, to strengthen each
device and bringing new level of user satisfaction and
productivity.
In the current scenario, users that use smart phones, tablets,
and various other mobile devices can save, connect, stream,
and synchronize content over multiple platforms from
different locations over the Internet.
7.2 Cloud Service Management
From the existing usage of cloud services by various
companies, it is clear that most of companies have adopted a
hybrid cloud deployment model which include private
cloud, public cloud and traditional computing environment.
And they are focusing on their planning for cloud services
and management.
7.3 Cloud Security
In cloud computing paradigm, organizations shift their on-
premises assets (data, processes or functions or applications)
to cloud. And these assets are very important from the view
point of every organization. These assets can be made
public; cloud provider may access the assets; application or
function can be changed by an outsider; the application may
fail; the assets may be lost or unexpectedly change; and
hence there is threat to the cloud with its security.
Data Security, Access, Transfer, Integrity, Segregation,
Network Security, Authorization and Authentication,
Application security, availability and backup are the major
concerns in cloud security.
7.4 Cloud Big Data
For almost every company, data is growing at a fast rate and
to manage and analyze this huge amount of data,
technologies like Big Data are in demand. Cloud computing
paradigm is now required to provide such technologies and
frameworks to support this information and analytics which
too at a faster pace. But as data will keep growing on cloud,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 899
its security and integrity is major concern for the cloud
vendors. The security innovations are surely important for
cloud vendors.
7.5 Mobile Cloud Computing
In Mobile Cloud Computing, both mobile networks and
cloud computing have come together to bring benefits to
users, network operators, cloud vendors and companies
which offer their services through mobiles. Currently, a
large number of applications including social media, and e-
commerce is hosted over cloud and serviced for the mobiles
using mobile applications and for web using web browsers.
And this profits cloud vendors, network operators and also
the companies.
Cloud computing is an emerging and trending paradigm, and
many companies have moved to cloud, and many are
planning.
8. CONCLUSIONS
Cloud Computing has emerged as rapidly developing
paradigm for managing and delivering IT services over the
Internet. The rise of cloud computing has led to changes in
the landscape of information technology rapidly, and in turn
fulfil the long-held promise of utility computing into reality.
However, despite the major benefits offered by cloud
computing, the current technologies are not so fully
developed enough to realize its full potential. Many key
challenges exists, including automatic resource
provisioning, server consolidation and security management,
are only starting to receive attention from the research
community.
In this paper, we have surveyed the cloud computing
paradigm from various aspects, and provides fundamental
insights into the key technologies as well as research
directions. As the development of cloud computing
paradigm is still in infancy, for better understanding of the
design challenges and recent development trends in cloud
computing paradigm is being discussed, which will pave the
way for further research in this area.
REFERENCES
[1]. Amazon Web Services and their pricing, How AWS
pricing work, http://amazon.com/whitepapers/
[2]. Autonomic Computing, http://en.wikipedia.com/wiki/
Autonomic _computing
[3].Chandra Chekuri, Sanjeev Khanna, “On
multidimensional packing problems”,
http://repository.upenn.edu/cgi/viewcontent.cgi?article=108
0&context=cis_papers
[4]. Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E.,
Limpach, C., Pratt, I., Warfield, “A.: Live migration of
virtual machines”. in Proceedings of the 2nd Conference on
Symposium on Networked Systems Design &
Implementation, Berkeley, CA, USA, USENIX Association,
2005.
[5]. Cloud Computing, http://en.wikipedia.com/wiki/Cloud
_computing
[6]. D Parkhill, “The Challenges of Computer Utility”,
Addision-Wesley Reading, 1966
[7]. F. Gens., “New IDC IT Cloud Services Survey: Top
Benefits and Challenges”, IDC eXchange, Feb 2009,
http://blogs.idc.com/ie/?p=730
[8]. Gartner Inc., Tony Iams, Analyst Profile Gartner,
http://gartner.com/AnalystBiography?authorId=43654
[9]. Google App Engine Developers/Development and
Pricing, http://developers.google.com/appengine/pricing/
[10]. Grid Computing, http://en.wikipedia.com/wiki/Grid
_computing
[11]. Jon Brodkin, „Gartner: Seven cloud computing security
risks‟, http://www.infoworld.com/d/security-central/gartner-
seven-cloud-computing-security-risks-853
[12]. L. Kleinrock, “A Vision for the Internet”, ST Journal
of Research, vol 2, issue 1 pp: 4-5, Nov, 2005.
[13]. Live Migration, Wikipedia,
http://en.wikipedia.com/wiki/Live_migration
[14]. Microsoft and Virtual machine migration, Virtual
Machine Migration Guide, http://technet.microsoft.com/
[15]. P. Mell and T Grance, “The NIST Definition of Cloud
Computing”, http://csrc.nist.gov/publications/nistpubs/800-
145/SP800-145.pdf
[16]. Rackspace the open cloud company, Rackspace Private
Cloud, http://rackspace.com/cloud/private/
[17]. Susheel Thakur, Arvind Kalia, Jawahar Thakur,
“Performance Analysis of Server Consolidation Algorithms
in Virtualized Cloud Environment with Idle VMs”,
International Journal of Advance Research in Computer
Science and Management Studies, vol 2, issue 3, March
2014.
[18]. Susheel Thakur, Arvind Kalia, Jawahar Thakur,
“Performance Evaluation of Server Consolidation Algorithm
in Virtualized Cloud Environment with Constant Load”,
International Journal of Advanced Research in Computer
Science and Software Engineering, vol 4, issue 3, March
2014.
[19]. The Leader in Enterprise Platform as a Service (PaaS) |
Apprenda, http://apprenda.com/library/software-on-
demand/sas-billing-pricing-models/
[20]. VMware Publications, VMware vSphere 5.1
Documentation Center, http://pubs.vmware.com/vsphere-
51/index.jsp

More Related Content

What's hot

Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingijccsa
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing reportErManish5
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing reportANKIT KUMAR
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Seungyun Lee
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 
Iss 15
Iss 15Iss 15
Iss 15ijdms
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersBaden Hughes
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
Impactofcloudcomputing 141103103626-conversion-gate01
Impactofcloudcomputing 141103103626-conversion-gate01Impactofcloudcomputing 141103103626-conversion-gate01
Impactofcloudcomputing 141103103626-conversion-gate01Rabia Naushad
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation ReportAjit Yadav
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter9505567198
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentationshilpa bojji
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
 

What's hot (20)

Iot dan cc
Iot dan ccIot dan cc
Iot dan cc
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Iss 15
Iss 15Iss 15
Iss 15
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Impactofcloudcomputing 141103103626-conversion-gate01
Impactofcloudcomputing 141103103626-conversion-gate01Impactofcloudcomputing 141103103626-conversion-gate01
Impactofcloudcomputing 141103103626-conversion-gate01
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Cloud computing Report
Cloud computing ReportCloud computing Report
Cloud computing Report
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC)
 

Viewers also liked

Background study on empowering women through investment in livestock value ch...
Background study on empowering women through investment in livestock value ch...Background study on empowering women through investment in livestock value ch...
Background study on empowering women through investment in livestock value ch...ILRI
 
Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...
Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...
Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...James Paul Bernardo
 
Limnological studies related to physico chemical
Limnological studies related to physico chemicalLimnological studies related to physico chemical
Limnological studies related to physico chemicaleSAT Publishing House
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Eyeblink artefact removal from eeg using independent
Eyeblink artefact removal from eeg using independentEyeblink artefact removal from eeg using independent
Eyeblink artefact removal from eeg using independenteSAT Publishing House
 
Directly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband applicationDirectly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband applicationeSAT Publishing House
 
Influence of carbon sources on α amylase production by brevibacillus sp. unde...
Influence of carbon sources on α amylase production by brevibacillus sp. unde...Influence of carbon sources on α amylase production by brevibacillus sp. unde...
Influence of carbon sources on α amylase production by brevibacillus sp. unde...eSAT Publishing House
 
Study on transmission energy losses and finding the hazards using what if ana...
Study on transmission energy losses and finding the hazards using what if ana...Study on transmission energy losses and finding the hazards using what if ana...
Study on transmission energy losses and finding the hazards using what if ana...eSAT Publishing House
 
Properties of fa l g hollow masonry blocks
Properties of fa l g hollow masonry blocksProperties of fa l g hollow masonry blocks
Properties of fa l g hollow masonry blockseSAT Publishing House
 
Effect of tip clearance on performance of a
Effect of tip clearance on performance of aEffect of tip clearance on performance of a
Effect of tip clearance on performance of aeSAT Publishing House
 
Occupational health and safety management system
Occupational health and safety management systemOccupational health and safety management system
Occupational health and safety management systemeSAT Publishing House
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelesseSAT Publishing House
 
Experimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acidExperimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acideSAT Publishing House
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...eSAT Publishing House
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...eSAT Publishing House
 
The growth of hsr networks around the world
The growth of hsr networks around the worldThe growth of hsr networks around the world
The growth of hsr networks around the worldeSAT Publishing House
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedeSAT Publishing House
 
Innovative strategies for energy optimization
Innovative strategies for energy optimizationInnovative strategies for energy optimization
Innovative strategies for energy optimizationeSAT Publishing House
 
Stabilizationsolidification of iron ore mine tailings
Stabilizationsolidification of iron ore mine tailingsStabilizationsolidification of iron ore mine tailings
Stabilizationsolidification of iron ore mine tailingseSAT Publishing House
 

Viewers also liked (20)

Background study on empowering women through investment in livestock value ch...
Background study on empowering women through investment in livestock value ch...Background study on empowering women through investment in livestock value ch...
Background study on empowering women through investment in livestock value ch...
 
Abortion.
Abortion.Abortion.
Abortion.
 
Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...
Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...
Automated Classroom Magnetic Door Lock with Attendance Monitoring System usin...
 
Limnological studies related to physico chemical
Limnological studies related to physico chemicalLimnological studies related to physico chemical
Limnological studies related to physico chemical
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Eyeblink artefact removal from eeg using independent
Eyeblink artefact removal from eeg using independentEyeblink artefact removal from eeg using independent
Eyeblink artefact removal from eeg using independent
 
Directly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband applicationDirectly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband application
 
Influence of carbon sources on α amylase production by brevibacillus sp. unde...
Influence of carbon sources on α amylase production by brevibacillus sp. unde...Influence of carbon sources on α amylase production by brevibacillus sp. unde...
Influence of carbon sources on α amylase production by brevibacillus sp. unde...
 
Study on transmission energy losses and finding the hazards using what if ana...
Study on transmission energy losses and finding the hazards using what if ana...Study on transmission energy losses and finding the hazards using what if ana...
Study on transmission energy losses and finding the hazards using what if ana...
 
Properties of fa l g hollow masonry blocks
Properties of fa l g hollow masonry blocksProperties of fa l g hollow masonry blocks
Properties of fa l g hollow masonry blocks
 
Effect of tip clearance on performance of a
Effect of tip clearance on performance of aEffect of tip clearance on performance of a
Effect of tip clearance on performance of a
 
Occupational health and safety management system
Occupational health and safety management systemOccupational health and safety management system
Occupational health and safety management system
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
Experimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acidExperimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acid
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
The growth of hsr networks around the world
The growth of hsr networks around the worldThe growth of hsr networks around the world
The growth of hsr networks around the world
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advanced
 
Innovative strategies for energy optimization
Innovative strategies for energy optimizationInnovative strategies for energy optimization
Innovative strategies for energy optimization
 
Stabilizationsolidification of iron ore mine tailings
Stabilizationsolidification of iron ore mine tailingsStabilizationsolidification of iron ore mine tailings
Stabilizationsolidification of iron ore mine tailings
 

Similar to Emerging Cloud Computing Paradigm: Vision, Research Challenges and Development Trends

A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingSteven Wallach
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud ComputingJIM MUKERJEE
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptxJohn Veigas
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfsuriyakalavinoth
 
J Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docx
J Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docxJ Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docx
J Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docxpriestmanmable
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant guptaPrashant Gupta
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2IAEME Publication
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 

Similar to Emerging Cloud Computing Paradigm: Vision, Research Challenges and Development Trends (20)

A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptx
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdf
 
cc notes one.pdf
cc notes one.pdfcc notes one.pdf
cc notes one.pdf
 
J Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docx
J Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docxJ Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docx
J Internet Serv Appl (2010) 1 7–18DOI 10.1007s13174-010-00.docx
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENTA REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Emerging Cloud Computing Paradigm: Vision, Research Challenges and Development Trends

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 892 EMERGING CLOUD COMPUTING PARADIGM: VISION, RESEARCH CHALLENGES AND DEVELOPMENT TRENDS Kunal Sharma1 , Susheel Thakur2 , Arvind Kalia3 , Jawahar Thakur4 , Sunil Kumar5 1 Student B.Tech (I.T), UIIT, Himachal Pradesh University, H.P, India 2 Student M.Tech (CS), Dept. of Computer Science, Himachal Pradesh University, H.P, India 3 Professor, Dept. of Computer Science, Himachal Pradesh University, H.P, India 4 Associate Professor, Dept. of Computer Science, Himachal Pradesh University, H.P, India 5 Programmer, UIIT, Himachal Pradesh University, H.P, India Abstract Cloud computing has recently emerged as a new paradigm for hosting and delivering utility-oriented IT services to users over the Internet. Cloud computing is lucrative to enterprise owners as it eliminates the requirement for users to plan ahead for resource provisioning, allows organization to initiate from the small and increase resources only when there is a hike in service demand. Cloud computing has emerged as a new technology that will lead the next generation of Internet. It tries to provide optimal and efficient computing through collaboration, agility, availability and scalability. In this paper, the cloud computing paradigm is illustrated in a variety of aspects and certain open challenges of research and recent development trends are being discussed. The aim of this research paper is to provide a comprehensive overview of the cloud computing paradigm, identify its major research challenges and recent development trends taking place in this increasingly important field. Keywords: Mobile Cloud Computing, Live migration, Utility Computing, Virtualization. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION In last few decades, there has been rapid development in ICT (Information and Communication Technology) especially in processing, storage, and Internet technologies. The technologies such as parallel computing, distributed computing, grid computing and now, the cloud computing, have their main focus at allowing access to computational engines or computing resources by dynamic resource provisioning in fully virtualized manner. Basically these technologies are aiming at offering computing as utility; Utility Computing is on-demand delivery of computing power (“pay-as-you-go-on”), likewise as traditional public utility services. Cloud Computing is offering utility-oriented IT services to users worldwide. Based on a pay-as you-go model, it enables hosting of numerous applications from consumer, scientific and business domains. In 1969, Leonard Kleinrock [12], one of the chief scientists of the original Advanced Research Projects Agency Network (ARPANET) which seeded the Internet, said: “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of computer utilities‟ which, like present electric and telephone utilities, will service individual homes and offices across the country.” This vision of computing utilities based on a service provisioning model anticipated the massive transformation of the entire computing industry in the 21st century whereby computing services will be readily available on demand, like other utility services available in today‟s society [17]. The factors that led to the development and occurring of cloud computing involves: development of grid computing, the high quality storage technology, data transportation, and Web 2.0, especially the development of virtualization [5]. Cloud Computing is merging of distinct technologies like resource pooling, virtualization, dynamic provisioning, utility computing, on-demand deployment of resources, Internet delivery of services to deploy and scale applications for businesses and individuals. The remainder of this paper is organized as follows. In section 2 an overview of the cloud computing paradigm has been provided. Section 3 discusses the evolution of the cloud computing technology over the period of time. Section 4 and 5 focuses on the cloud computing service, deployment models and service level agreements (SLA). Section 6 discusses the key design challenges in the cloud computing paradigm. Section 7 and 8 provides the fundamental insights into the recent development trends of Cloud computing and conclusion of the paper. 2. CLOUD COMPUTING With the rapid development in the processing, storage technologies and the success of the internet, computing resources have become reasonable, powerful and globally available than ever before. Personnel in businesses are trying to find out methods to cut costs while maintaining the same performance standards. Their aspirations to grow have led them to try new ideas and methods even under the peer pressure of limiting computing resources. This realization has enabled the actualization of a new model for computing called cloud computing, in which the resources (e.g. cpu, network, etc.) are provided through the internet to user as
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 893 general utilities in a pay-as-you-go and on-demand basis [18]. According to the U.S. Government‟s National Institute of Standards and Technology (NIST), Cloud Computing is “a model for enabling convenient, on-demand network access to shared pool of configurable computing resources (e.g. network, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effect or service provider‟s interaction [15]. The cloud computing model resources (e.g. networks, storage, and services) as general utilities are provisioned so that they can be leased or released by users over the Internet in an on-demand manner. Cloud computing can also be defined as „Cloud computing is Internet-based computing, whereby shared resources, software‟s, and information are provided to end users on demand, like the electricity grid. Conceptually, it is a paradigm shift where background details are abstracted from users, who no longer need knowledge of, expertise in, or control over the technology infrastructure “in the cloud” that supports them. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on Internet, and it typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet‟ [5]. The main reason for the various views and perceptions of cloud computing is that unlike other technological terms, this is not a new technology, but rather a new technology model that offers a new approach for running businesses. 3. EVOLUTION OF CLOUD COMPUTING In the 1960s, John McCarthy envisioned that computing facilities will be provided to the general public like a utility [6].In 1990s, the term „cloud‟ was used to describe large ATM networks. But „Cloud Computing‟, started gaining popularity after Eric Emerson Schmidt, CEO Google used this word to describe business model for providing services across the Internet 2006. The evolution process of cloud computing went through: networking, network-sharing, information sharing, resource sharing and service sharing. It can be clearly stated that cloud computing has evolved in stages from since last few years. Cloud computing leverages the existing technologies to meet out the technological and economic requirements of today‟s demand for information technology. Cloud computing is often compared to following technologies, each of which shares certain aspects with cloud computing. Fig -1: Cloud computing evolution since networks Grid Computing: Grid computing is the collection of computer resources from multiple locations to reach a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files”. Grids are a form of distributed computing whereby a “super virtual computer” is composed of many networked loosely coupled computers acting together to perform large tasks. Cloud computing adds various other technologies (e.g. Virtualization, Server Consolidation, Security) to Grids to enhance the working environment [10]. Utility Computing: Utility computing offers various computing resources, such as networks, storage, processing to end users as metered services on the basis of „pay-as-you- go‟ model. Cloud computing is a big picture of utility computing as it adopts the features of utility computing with „pay-as-you-go‟ model, automated resource provisioning at maximum resource utilization and minimum operating cost. Virtualization: Virtualization abstracts the low-level details of the hardware and other physical resources to offer an easy virtualized environment for the application levels. Virtualization Technology enables the decoupling of the application payload from the underlying physical hardware and provides virtualized resources for higher level applications [18]. For cloud computing, virtualization is the main component as virtualized resources from the pool of physical resources can be provisioned on-demand basis in a real-time scenario. Autonomic Computing: Autonomic computing refers to the self-managing characteristics of distributed computing resources, adapting to unpredictable changes while hiding intrinsic complexity to operators and users. Started by IBM in 2001, this initiative ultimately aims to develop computer systems capable of self-management, to overcome the rapidly growing complexity of computing systems
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 894 management, and to reduce the barrier that complexity poses to further growth [2]. Cloud computing adopt the features of autonomic computing too. This is a clear indication that cloud has evolved over a period of time with advancements in its neighboring technology. Cloud computing leverages virtualization technology to achieve the goal of providing computing resources as a utility. Cloud computing paradigm shares certain aspects with grid computing and autonomic computing but differs from them on other aspects. Therefore, it offers unique benefits and imposes distinctive challenges to meet out its requirements. The features that make cloud highly interesting to businesses are: No initial investment on infrastructure or resources: Pay-as-you-go pricing model offers the business owners a freedom to start gaining benefits from cloud without making an initial investment on infrastructure. Simply lease the resources from cloud according to needs, pay for the usage and release the resources when they are not required. Low infrastructure operational cost: As resources are allocated and de-allocated on-demand basis, thus a cloud user no-longer need resources to be permanently installed in order to meet peak load requirements. And this saves a huge on operational costs. Scalability: The need of resources of an Internet application varies over time. And this varying need imposes a threat over efficient utilization of resources. But with cloud, applications can be scaled-up and scaled-down as per requirements of the end user. Ease in access: As cloud providers need to provide infrastructure or platform as services to the end users, they are supposed to offer a management console through which cloud users can manage their services over Internet through the use of web-browsers, phones, and PDAs. Cloud computing paradigm offers such capabilities. Reduced risks and expenses: The end users who are going to use innovation and services shift their infrastructure risks to the cloud providers, thus they are no longer responsible for such risks managements and expenses where hardware might fail. 4. CLOUD MODEL According the definition given by NIST, the cloud model is composed of five essential characteristics, three service models, and four deployment models. The five essential characteristics of cloud are: on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service. The computing resources such as servers, storage can be leased or released on-demand without any human interaction with the cloud service providers over the Internet using heterogeneous devices like desktops, laptops and mobiles phones. However, the service providers provisioned their resources which are shared by multiple users by the concept of virtualization of physical resources. The cloud consumers is charged according to their rapid elastic demands and for the services as per their resource usage using appropriate metrics such as storage usage, CPU hours, and bandwidth usage. 4.1 Cloud Service Models The three Cloud service models are: Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as Service (PaaS). 4.1.1 Software as a Service (SaaS) SaaS allows consumers to use software or applications that run on the cloud infrastructure, simply making the use of web-browsers. Consumers don‟t have any control or the access to the cloud infrastructure which hosts the respective software or application. In this model, the provider takes care of all software development, maintenance, and upgrades. Saas is now becoming an accepted model of delivery for application like accounting, CRM, ERP, HRM etc.. Salesforce is the leader in SaaS computing and is best known for its on-demand Customer Relationship Management solution. The pricing model [19] in SaaS bills its clients in the following three ways: Pay-per-user, unlimited-usage-fixed-cost, and pay-as-you-go. In pay-per- user strategy, a separate cost is incurred for each user of a SaaS application, periodically (usually monthly), for the number of registered users. This pricing model is further extended to pay-per-multiple-user pricing model, in which cost is incurred for a specified number of users. Unlimited-usage-fixed-cost billing model is usually accepted by the client organization because this pricing model is easy to understand and with this model clients can easily predict their ongoing software expenses, and their monthly bills, since for unlimited number of users, their monthly bills remains nearly same from one billing cycle to the next. However, in pay-as-you-go model, the consumers will be charged for the number of users and the amount of resources consumed over a given period of time. 4.1.2 Infrastructure as a Service (IaaS) Infrastructure as a service model of cloud computing is a low level layer of abstraction that allows the consumers to access cloud infrastructure. This model offers hardware, software, and equipments through the use of virtual machines with a resource usage based pricing model to deliver software application development environments.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 895 Fig -2: Layers in IaaS cloud A programmer should be able to consider IaaS as a flexible, standard and virtualized operating environment that can become foundation for PaaS and SaaS. Simply, it is the responsibility of the provider to control and manage configurations and operations of operating system, software, and database being lended. The Amazon Elastic Compute Cloud (EC2) and Simple Storage Service (S3) are popular examples of IaaS. The pricing model is again per-per-use. The pricing for EC2 is done as the basis of clock hours of service time (e.g. from the time Amazon EC2 instances are launched until they are terminated, or from the time elastic IPs are allocated until they are de-allocated, i.e. charging for running resources only), machine configuration (i.e. the physical capacity of Amazon EC2 instance you choose, and the instance characteristics may vary with OS, number of cores, memory, and load storage), number of instances and machine purchase type [1]. Table -1: Comparison between cloud service models Type Cons umer Services provided by cloud Service level coverage Customiza tion SaaS End User Finished Applications  A pplicatio n Uptime  A pplicatio n coverage  M inimal to customizati on  C apabilities dictated by market or provider PaaS Appli cation owner  Ru ntime environment for application code  Clo ud storage  Oth er cloud services such as integration  E nvironme nt availabili ty  E nvironme nt performa nce  N o applicatio n coverage  Hi gh degree of application level customizati on available within constraints of the service offered  M any application will need to be rewritten IaaS Appli cation owner or IT provi des Os, middl eware and applic ation suppo rt  Virt ual Server  Clo ud Storage  V irtual server availabili ty  T ime to provision  N o platform or applicatio n coverage  M inimal constraints on application s installed on standardize d virtual OS builds 4.1.3 Platform as a Service (PaaS) According to programmer‟s view, Cloud computing paradigm enables them to design, build, test, deploy, and update applications with a couple of his friends on weekends, over a set of programming languages, tools and application development platforms. With platform as a service, the programmers or software engineers can develop their applications and transfer them to servers and users over the Internet. Google App Engine and Microsoft Azure Cloud Services are great examples of PaaS. Applications need middle ware such as databases, operating systems, runtime environments, web servers, application servers, and other components to run; and with PaaS, software developers can focus on development and functionality of their software as opposed to manage middleware, and the dynamic demand of infrastructure. PaaS is playing key role in SaaS.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 896 Fig -3: An abstract view of cloud service models The two main pricing models in PaaS are: pay-per-hour and pay-per-month. In case of Google App Engine, resources like instances are billed by the use per instance hour ($0.05 per unit), outgoing network traffic is billed in GBs ($0.12 per GB), Datastore Storage is billed in GBs per month ($0.18 per GB) and so on [9]. 4.2 CLOUD DEPLOYMENT MODELS According to NIST, there are four deployment models in cloud computing: Private Cloud, Public Cloud, Community Cloud and Hybrid Cloud. 4.2.1 Private Cloud Private Cloud is a cloud model in which all cloud infrastructures is architected and controlled by a particular or organization (on-premises and/or off-premises) within the respective firewall. A private cloud is a scalable cloud environment – providing the agility and efficiency of a public cloud – built on infrastructure dedicated exclusively for an organization. It can be hosted in an organization‟s own data center, in a partner data center, or at Rackspace. Private clouds are ideal when there is need to accelerate innovation, have large compute and storage requirements, or have very strict control, security and compliance needs [16]. A private cloud environment or infrastructure is ring fenced for the use of an organization at higher levels of network security. The resources are offered to private cloud from a specific pool of physical computers. The main features and benefits of private clouds are: High security and privacy: a specific pool of physical resources with restricted access to connections made from behind one organization‟s firewall, on-site internal hosting and/or dedicated. More control: as architected and controlled by a single organization. High performance: as it is deployed inside the firewall on an organization‟s Intranet. Customizable: the organization can customize hardware, network and storage performances, and Cloud-Bursting: a service in which non-sensitive functions of a private cloud owner are switched over to a public cloud to free more space in a private cloud. 4.2.2 Public Cloud This model is more recognizable to many consumers of cloud, under which a shared pool of physical resources is offered in a virtualized environment over the Internet. The features offered by a public cloud model are: Ultimate Scalability (as vast pool of physical resources is available), cost-effectiveness, utility style costing (pay-as-you-go) model, reliability, flexibility, and location independence. 4.2.3 Community Cloud A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally and externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the cost savings potential of cloud computing are realized [5], [15]. 4.2.4 Hybrid Cloud This type of cloud uses the mix of three deployment models to meet the customer‟s requirements. For example, in practice, an enterprise can host its e-commerce site in a private cloud, and its brochure site in a public cloud. The concept of „cloud bursting‟ comes into picture in the case of hybrid clouds. The benefits and features offered by a hybrid
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 897 cloud configuration are: scalability, cost efficiency, flexibility, and security. 5. SERVICE LEVEL AGREEMENT (SLA) SLA is a contract or agreement between the cloud service provider and consumer which commit and stipulate to provide majorly to a specified service level, fee, customer support and assistance, system performance levels, and penalty and enforcement provisions for services not offered. The QoS (Quality of Service), QoP (Quality of Protection), and responsibilities to both seller and buyer are fundamental grounds in SLA. 6. OPEN RESEARCH CHALLENGES Despite of a great success and popularity of the cloud computing paradigm, the providers, developers, and consumers must consider issues, challenges or risks of cloud paradigm which includes user data privacy and security, service availability, performance, scalability, recovery, energy efficiency and programmability to take advantage of cloud computing. The research issues, challenges, or risks majorly includes: Automated Resource Provisioning, Server Consolidation, Virtualization and Virtual Machine Migrations, Security, and Software Development Frameworks. 6.1 Automated Resource Provisioning How to feature cloud with on-demand lease and release of physical resources? How to provision resources in flash crowd effect? These questions addresses the challenges of QoS. The two commonly used approaches are: prediction, and reaction (reactive approach). In prediction approach, the application performance model is predicted at each particular level in terms of application instances; and based on the prediction model, the resources are allocated. However, in reaction or reactive approach of resource provisioning, resources are allocated and de-allocated immediately in accordance with demand fluctuations. And both these approaches impose necessities on this dynamic operating environment. The improvement in these approaches is a great research challenge so as to provision resources accurately as per needs. 6.2 Server Consolidation How to maximize the resource utilization with minimum energy consumption? According to Tony Iams [8], Managing VP, Stamford, CT USA, servers in many companies run at 15-20% of their capacity. And to cut unnecessary costs, and maximize return on investment (ROI), out of 518 respondents in a Gartner Group Research study 6% had conducted a server consolidation project, 61% were currently conducting one, and 28% were planning to do so in nearby future. Server sprawl is a situation in which multiple underused servers take up more amount of computing, space and power, and thus consume more resources than can be justified by their workload. To prevent server sprawl, server consolidation focuses on the reduction of the number of physical resources used in cloud infrastructure by consolidating load using virtual technologies and enhancing their utilization. The virtualization technique of physical resources (e.g. Live VM migration) is often used to consolidate VMs residing on multiple underutilized servers on to a single server, so as to save energy. The server consolidation problem is often formulated with the vector bin-packing problem [3] which falls in the category of NP – hard optimization problem. Also the server consolidation (e.g. the communication among virtual machine) should not affect the application performance and servers must also be reactive to congestion. 6.3 Virtual Machine Migration Virtualization technology enables the decoupling of the application payload from the underlying physical hardware and provides virtualized resources for higher level applications [18]. The technology also provides the ability to migrate virtual machines (VMs) between the physical systems and improves the response time, and reduces the number of physical systems. Virtual Machine migration is the process of moving a virtual machine from one host or storage location to another [20]. Generally, a virtual machine running on a virtual server consists of a configuration file and one or more data files (virtual hard disk files, and other media files) [14]. Virtual machine migrations can be categorized to the following two main categories: Cold Migration: A powered-off or suspended virtual machine is made to migrate from one host to another with or without movement of storage or data. Hot or live migration: It refers to the process of moving a running virtual machine or application between different physical machines without disconnecting the client or application. Memory, storage, and network connectivity of virtual machines are transferred from the original host machines to the destination. When the down time of a VM during live migration is not noticeable by the end users, it is called as seamless live migration [13]. Xen and VMware have already implemented live migration of virtual machines. Clark et. al. [4] discovered the benefits of live migration of VM, migration of the entire OS and all its applications as a single unit from the process level migration approaches. The avoidance of hotspots is a major advantage of VM migration. The main research areas in VM migration are detection of migration and hotspots, so as to respond to sudden workload changes. 6.4 Security Security is one of the major challenges to the growth of the cloud, and also the main reason for the slow acceptance of cloud computing paradigm by various organizations.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 898 Fig -4: Results of IDC survey ranking security challenges, 2008 [7] In accordance to Gartner 2008, the seven specific security issues that customers must raise with vendors before selecting a cloud vendor are: privileged user access, regulatory compliance, data location, data segregation, recovery, investigative support, and long term viability [11]. Ensuring secure data access and transfer, backup and recovery, auditing and certification over the multi-tenancy model and pooled resources are the great security challenges that require novel techniques to tackle with. Broadly speaking, storage security, middleware security, data security, network security, and application security, are major concerns for making cloud reliable via security. 6.5 Software Frameworks The software programming techniques, languages, and frameworks are also keynotes for cloud providers because it is a layer where software application developers are going to work; and the applications thus developed over cloud can be of large scales and data intensive. Google App engine currently supports 4 programming languages including Python, Java, PHP, Go and a number of frameworks in each of these languages. Therefore, offering a managed environment for production of applications for several developer‟s expertise of different domains is a great challenge. MapReduce frameworks such as Hadoop for scalable and fault tolerant data processing is required by many organization nowadays, and tasks in Hadoop are either I/O intensive or CPU intensive. Also, VMs with heterogeneous characteristics might be allocated to Hadoop nodes which further require operations to be optimized either for energy or performance. 7. DEVELOPMENTS TRENDS Cloud computing has grown up in recent years and its major offerings include: IT infrastructure that can extend and contract, application or software development frameworks, application development and deployment techniques, management software to observe, monitor and setup cloud services, and networks that supports all of this. Cloud computing has initiated and accelerated a trend and environment in which individuals and organizations can easily innovate and experiment without having time and expense of setting, configuring, and deploying new physical hardware. But this is still an emerging area and it will be too soon to declare a victory. However, it is now a big business. In a report in Washington post, by the end of 2013 cloud computing market was estimated around $131 billion, and expected to $ 207 billion by 2016. Several key trends that can be identified in cloud computing paradigm are: 7.1 Personal Cloud A report from Gartner Inc says that by the year 2014 [11], the personal cloud will replace the personal computer and in the new era users will be offered higher flexibility with devices they use for daily activities, to strengthen each device and bringing new level of user satisfaction and productivity. In the current scenario, users that use smart phones, tablets, and various other mobile devices can save, connect, stream, and synchronize content over multiple platforms from different locations over the Internet. 7.2 Cloud Service Management From the existing usage of cloud services by various companies, it is clear that most of companies have adopted a hybrid cloud deployment model which include private cloud, public cloud and traditional computing environment. And they are focusing on their planning for cloud services and management. 7.3 Cloud Security In cloud computing paradigm, organizations shift their on- premises assets (data, processes or functions or applications) to cloud. And these assets are very important from the view point of every organization. These assets can be made public; cloud provider may access the assets; application or function can be changed by an outsider; the application may fail; the assets may be lost or unexpectedly change; and hence there is threat to the cloud with its security. Data Security, Access, Transfer, Integrity, Segregation, Network Security, Authorization and Authentication, Application security, availability and backup are the major concerns in cloud security. 7.4 Cloud Big Data For almost every company, data is growing at a fast rate and to manage and analyze this huge amount of data, technologies like Big Data are in demand. Cloud computing paradigm is now required to provide such technologies and frameworks to support this information and analytics which too at a faster pace. But as data will keep growing on cloud,
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 899 its security and integrity is major concern for the cloud vendors. The security innovations are surely important for cloud vendors. 7.5 Mobile Cloud Computing In Mobile Cloud Computing, both mobile networks and cloud computing have come together to bring benefits to users, network operators, cloud vendors and companies which offer their services through mobiles. Currently, a large number of applications including social media, and e- commerce is hosted over cloud and serviced for the mobiles using mobile applications and for web using web browsers. And this profits cloud vendors, network operators and also the companies. Cloud computing is an emerging and trending paradigm, and many companies have moved to cloud, and many are planning. 8. CONCLUSIONS Cloud Computing has emerged as rapidly developing paradigm for managing and delivering IT services over the Internet. The rise of cloud computing has led to changes in the landscape of information technology rapidly, and in turn fulfil the long-held promise of utility computing into reality. However, despite the major benefits offered by cloud computing, the current technologies are not so fully developed enough to realize its full potential. Many key challenges exists, including automatic resource provisioning, server consolidation and security management, are only starting to receive attention from the research community. In this paper, we have surveyed the cloud computing paradigm from various aspects, and provides fundamental insights into the key technologies as well as research directions. As the development of cloud computing paradigm is still in infancy, for better understanding of the design challenges and recent development trends in cloud computing paradigm is being discussed, which will pave the way for further research in this area. REFERENCES [1]. Amazon Web Services and their pricing, How AWS pricing work, http://amazon.com/whitepapers/ [2]. Autonomic Computing, http://en.wikipedia.com/wiki/ Autonomic _computing [3].Chandra Chekuri, Sanjeev Khanna, “On multidimensional packing problems”, http://repository.upenn.edu/cgi/viewcontent.cgi?article=108 0&context=cis_papers [4]. Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, “A.: Live migration of virtual machines”. in Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, Berkeley, CA, USA, USENIX Association, 2005. [5]. Cloud Computing, http://en.wikipedia.com/wiki/Cloud _computing [6]. D Parkhill, “The Challenges of Computer Utility”, Addision-Wesley Reading, 1966 [7]. F. Gens., “New IDC IT Cloud Services Survey: Top Benefits and Challenges”, IDC eXchange, Feb 2009, http://blogs.idc.com/ie/?p=730 [8]. Gartner Inc., Tony Iams, Analyst Profile Gartner, http://gartner.com/AnalystBiography?authorId=43654 [9]. Google App Engine Developers/Development and Pricing, http://developers.google.com/appengine/pricing/ [10]. Grid Computing, http://en.wikipedia.com/wiki/Grid _computing [11]. Jon Brodkin, „Gartner: Seven cloud computing security risks‟, http://www.infoworld.com/d/security-central/gartner- seven-cloud-computing-security-risks-853 [12]. L. Kleinrock, “A Vision for the Internet”, ST Journal of Research, vol 2, issue 1 pp: 4-5, Nov, 2005. [13]. Live Migration, Wikipedia, http://en.wikipedia.com/wiki/Live_migration [14]. Microsoft and Virtual machine migration, Virtual Machine Migration Guide, http://technet.microsoft.com/ [15]. P. Mell and T Grance, “The NIST Definition of Cloud Computing”, http://csrc.nist.gov/publications/nistpubs/800- 145/SP800-145.pdf [16]. Rackspace the open cloud company, Rackspace Private Cloud, http://rackspace.com/cloud/private/ [17]. Susheel Thakur, Arvind Kalia, Jawahar Thakur, “Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud Environment with Idle VMs”, International Journal of Advance Research in Computer Science and Management Studies, vol 2, issue 3, March 2014. [18]. Susheel Thakur, Arvind Kalia, Jawahar Thakur, “Performance Evaluation of Server Consolidation Algorithm in Virtualized Cloud Environment with Constant Load”, International Journal of Advanced Research in Computer Science and Software Engineering, vol 4, issue 3, March 2014. [19]. The Leader in Enterprise Platform as a Service (PaaS) | Apprenda, http://apprenda.com/library/software-on- demand/sas-billing-pricing-models/ [20]. VMware Publications, VMware vSphere 5.1 Documentation Center, http://pubs.vmware.com/vsphere- 51/index.jsp