SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 178
SOFTWARE AS A SERVICE FOR EFFICIENT CLOUD COMPUTING
K.V. K Mahesh Kumar
Research Scholar, Department of Computer Science and Engineering,Acharya Nagarjuna University, A.P, India
Abstract
This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its
implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of cloud computing
architecture in their IT services. SaaS applications are service centric cloud computing delivery model used as IT Infrastructure
which is multi-tenant architecture used to provide rich user experience with desired set of features requested by the cloud user. This
research paper also discusses the importance of SaaS application architecture, functionality, efficiency, advantages and
disadvantages.
Keywords: Cloud Computing, Service Delivery Models, Software as a Service, SaaS Architecture.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
The Word Cloud Computing is buzzing everywhere among
organization, enterprises, independent software vendors (ISV),
end users etc. Cloud computing is nothing but distributed
computing over the internet where user can access their data
from the database in the cloud. Cloud computing is different
from traditional grid computing it is more dynamic, flexible
and scalable offered by independent organizations where
deployment and maintenance of the services & data is
managed by the organizations themselves. Cloud computing
varies from one cloud provider to another, as some cloud
providers provide storage over network with small monthly
rentals for end users, whereas some other providers offer
applications for software companies which helps in reducing
costs in deployment or installations of applications. In this
paper we will be evaluating SaaS service delivery model, its
architedctural impact, characteristic features and providing
solutions for businesses with the integration Application
program interface (API) [1], [2], [9].
2.OVERVIEW OF CLOUD COMPUTING
Cloud computing is known for applications delivered as
services over the Internet and the hardware and systems
software in the datacenters that provide those services. There
are four basic cloud delivery models
2.1 Private Cloud
In this cloud services are provided solely for an organization
and are managed by the organization or a thirdparty. These
services may exist off-site [1], [8].
2.2 Public Cloud
Public cloud services are available to the public and owned by
an organization selling the cloud services. For example storage
over networks such as Drop box, Google drive etc [1], [8].
2.3 Community Cloud
In Community cloud services are shared by several
organizations for supporting a specific community that has
shared concerns such as common goal, security requirements,
policies, compliance considerations etc. And these services are
further managed by a third party organization which may exist
at an offshore location [1], [8].
2.4 Hybrid Cloud
Hybrid cloud is a composition of various cloud computing
infrastructures such as public, private or community. For
example hybrid cloud is the data stored in private cloud is
manipulated by a program running in the public cloud [1], [8].
The cloud computing architecture is further classified based
on service delivery models, well there are three service
delivery models namely Software As A Service (SaaS),
Platform As A Service (PaaS) and Infrastructure As A Service
(IaaS) [1], [8].
3. SOFTWARE-AS-A-SERVICE (SaaS)
Generally cloud providers use public cloud resources to create
their virtual private cloud to make of cloud computing access
the scalable computing resources and IT services. SaaS is one
of the service delivery models where of software as a service
will change the way people build, sell, buy and use software.
In this model Software is provided as a service where cloud
user can access the software from his web browser without the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 179
concerns of deployment or installation & maintenance. SaaS
applications are known as Web-based software, on-demand
software or hosted software. Cloud provider maintains the
application its security, availability and performance. SaaS
cloud computing delivers end user desired application through
the internet to thousands of customers using a multitenant
architecture. On the other side cloud user can run application
or software with no upfront costs or investment in database,
servers and software licensing. With the advent of Web 2.0 &
faster HTML 5 standards, graphically rich applications can be
run smoothly at 60 Frames per second just like running our
software on our own personal computers. This service model
depicts one to many function as single application running as a
service on the server side with many client end users can run it
from their web browser simultaneously as they are connected
as services [2], [4].
For example let us consider Google Play Store where
applications can be purchased on the go and can be run from
the web browser, any number of people can purchase and run
the application simultaneously but only one instance of the
application is running on the server side. This helps in
reducing costs on resources and on the customers point of
view it is hassle free process service on demand where Cloud
user can rent applications without the need of installation and
maintenance of the software [2], [4].
Fig-1:SaaS Structure [6]
3.1 SaaS Architecture
Software as a Service (SaaS) has a distinctive advantage of
Service Oriented Architecture where software applications
communicate with each other. An application running as a
service act as a service provider and exhibits its functionality
to other applications or services via public brokers and also
acts as a service requester when required for incorporating
data and functionality from other services. SaaS service
delivery model system architecture supports user demands
even at peak hours and has the ability to process large
numbers of transactions in a secure and reliable
environment[7], [10].
Fig-2:SaaS Architecture [6]
SaaS with the use of new technologies and application
frameworks helps in reducing time to market and cost savings
in converting on premises server into a SaaS based product.
Microsoft believes SaaS architecture can be classified based
on their maturity levels and they are as follows:
3.1.1 Ad-hoc/Custom
Ad-hoc or custom level is the first level of maturity where
unique or customized version of applications are hosted on the
servers. This level is useful when migrating from or
converting existing client server architecture. As it doesn’t
requires system administrator which indeed helps in reducing
maintenance costs [7], [10].
3.1.2 Configurability
This second level of maturity helps in providing flexibility in
identifying different users using the same application or
service. This is done by configuring unique metadata, which
indeed helps cloud provider in identifying different user and
their needs, So that cloud provider can maintain common core
code of the application regardless of end users and their needs.
Further it also helps cloud provider in allocating the resources
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 180
such as application or software based on end user demands
[7], [10].
3.1.3 Multi-Tenant Efficient
Multi-tenancy is known for sharing of resources across
hundreds of tenants or end users but can still differentiate
individual users, their data and needs or demands [7], [10].
3.1.4 Scalability
In this level of maturity application resources are used
efficiently by conducting best practices of IT such as
optimizing locking duration, statelessness, sharing pooled
resources such as threads and network connections, caching
reference data and partitioning large databases [7], [10].
Fig-3:SaaS Various Types [6]
3.2 Characteristic Features of SaaS
Software as a Service has three prominent Characteristic
features they are
3.2.1 Network or Online Access
SaaS is an online application which can be accessed using a
web browser from anywhere in the world without any
software installation. All we need is internet access and a web
browser with which the cloud provider services and
applications can be accessed [3]
3.2.2 Centralized Management
SaaS service model major characteristic feature is centralized
management, which will help monitoring, controlling,
maintaining and updating applications at appropriate time
without any hiccups. The maintenance of the application is
done at the offshore location or at the cloud provider premise
where end user or cloud user does not need to worry about
updating the application [3].
3.2.3 Powerful Communication Features
SaaS not only known for its online services & application but
also has powerful communication features. SaaS is known for
its Instant Messaging chat service and Voice over IP (VOIP)
features [3].
3.3 Advantages of SaaS
Advantages of Software as a service (SaaS) are classified into
two categories Cloud user or end user advantages and Cloud
provider advantages.
3.3.1 Cloud User Advantages
• Offsite deployment
• Low overhead or low costs
• Decentralized
• Customizable
• On the fly pay as u go
3.3.2 Cloud Provider Advantages
• Application as a service
• Scalable applications
• High customization
• Highly stable & common base code
• Easy maintenance
• Maximum efficiency
• Flexible costs based on usage
3.4 Disadvantages of SaaS
3.4.1 Strong & Reliable Network Connectivity
SaaS is a service model where the cloud user can access the
application through web browser, this means we need a good
reliable & fast internet connection. But internet speeds and
connectivity differ from place to place, country to country. So
strong & reliable network connectivity can be a big
disadvantage [6].
3.4.2 Security Issues
SaaS has increased security issues and challenges as it
constantly interacts with different cloud users or end users,
data security and integrity is at stake. As one service is shared
by many cloud users [6].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 181
3.4.3 Load Balancing Feature
Load balancing is one of the challenges in cloud computing
which can be mitigated by businesses or cloud providers by
consistent monitoring of all SaaS applications. Currently only
major player like Apple, Microsoft, Google etc. are offering
load balancing [6].
4. EFFICIENT SAAS WITH API INTEGRATION
Software-as-a-service (SaaS) is a contemporary cloud
computing trend emerging in the IT industry which is getting
better day by day and a preferred choice of service delivery
model for cloud providers. Biggest advantage of SaaS cloud
computing service delivery model is the more meaningful,
powerful and efficient integration of Application
Programming Interface (API). Now a days Business needs or
demands are evolving day by day, in order to meet these
demands from their customers or end users, cloud providers
need to maintain & utilize their resources efficiently for
providing services they are confined with. In order to meet
these challenges businesses needs to update their applications
& services with the pace of the new technology. Coding
applications with new technologies available from time to
time is a costly assignment for cloud providers. This is where
API plays a major role in mitigation of additional costs
occurring in developing new apps. Instead of rewriting the app
completely businesses will just add new API’s in their existing
application. API integration is easy and efficient for adding
additional features from new technologies into their existing
services and applications [5].
CONCLUSION
Enterprises would do well to consider the flexibility and risk-
management implications of adding SaaS to their portfolios of
IT services. Integration and composition are critical
components in your architecture strategies to incorporate SaaS
successfully as a fully participating member of your service-
centric IT infrastructure. Today, SaaS applications are
expected to take advantage of the benefits of centralization
through a single-instance, multi-tenant architecture, and to
provide a feature-rich experience competitive with comparable
on-premise applications. A typical SaaS application is offered
either directly by the vendor or by an intermediary party called
an aggregator, which bundles SaaS offerings from different
vendors and offers them as part of a unified application
platform.
REFERENCES
[1]. Armbrust, M et.al 2010, “A View of Cloud
Computing”, Communications Of The ACM, Vol. 53,
No.4, pp. 50-58.
[2]. Bento, Al, 2011, “Cloud Computing: A New Phase in
Information Technology Management”, Journal Of
Information Technology Management, Vol. 22, No. 1,
pp. 39-46.
[3]. Chou, W 2008,“Web Services: Software-as-a-Service
(SaaS) Communicaton and Beyond”, IEEE Congress on
Services.
[4]. Godse, M &Mulik, S 2009,“An Approach for Selecting
Software-as-a-Service (SaaS)”, IEEE International
Conference, pp.155-158.
[5]. Javier, E, David, C &Arturo, M 2008,“Application
Development over Software-as-a-Service Platforms”.
IEEE international conference, pp.97-104.
[6]. Kulkarni, G, Gambhir, J &Palwe, R 2012, “Cloud
Computing-Software As Service”, International Journal
of Cloud Computing And Services Science, Vol. 1, No.
1, pp.11-16.
[7]. LIAO, H 2009, “Design of SaaS-based Software
Architecture”, IEEE Inyernational Conference, pp.277-
281.
[8]. National Institute of Standards and Technology, The
NIST Definition of Cloud Computing, Information
Technology Laboratory, 2009.
[9]. Rao, S, Rao, N &Kumari, K 2009, “Cloud Computing:
An Overview”, Journal OF Theoretical And Applied
Information Technology, Vol 9, No. 1, pp. 71-76.
[10]. Satyanarayana, S 2012, “CLOUD COMPUTING:
SAAS”, Journal of Computer Science and
Telecommunications, Vol. 4, No. 4, pp. 76-79.
BIOGRAPHY
K.V.K Mahesh Kumar holds a B.E.
(Bachelor of Engineering) in Computer
Science from Osmania University,
Graduate Diploma in Professional
Computing & Masters in ICT (Information
and Communication Technology
Management) from University of South Australia and is
currently pursuing Ph.D. in Cloud Computing from
Department of Computer Science and Engineering at Acharya
Nagarjuna University. He has been involved in many
diversified research projects and published several papers in
international journals in the research areas of HCI (Human
Computer Interaction), EHR (Electronic Health Record)
systems, E-Business & E-Commerce, Web 2.0 Social
Networking, Project Management and Knowledge
Management.

More Related Content

What's hot

Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paperjagan339
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...IJCSIS Research Publications
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challengesEditor Jacotech
 

What's hot (17)

Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cc unit 4 updated version
Cc unit 4 updated versionCc unit 4 updated version
Cc unit 4 updated version
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 

Viewers also liked

Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)eSAT Publishing House
 
Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...eSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...eSAT Publishing House
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packeteSAT Publishing House
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...eSAT Publishing House
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...eSAT Publishing House
 
Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmenteSAT Publishing House
 
Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...eSAT Publishing House
 
Numerical analysis of heat transfer in refrigerant flow through a condenser tube
Numerical analysis of heat transfer in refrigerant flow through a condenser tubeNumerical analysis of heat transfer in refrigerant flow through a condenser tube
Numerical analysis of heat transfer in refrigerant flow through a condenser tubeeSAT Publishing House
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
A over damped person identification system using emg signal
A over damped person identification system using emg signalA over damped person identification system using emg signal
A over damped person identification system using emg signaleSAT Publishing House
 
Automated water head controller for domestic application
Automated water head controller for domestic applicationAutomated water head controller for domestic application
Automated water head controller for domestic applicationeSAT Publishing House
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...eSAT Publishing House
 
Design and development of mechanical power amplifier
Design and development of mechanical power amplifierDesign and development of mechanical power amplifier
Design and development of mechanical power amplifiereSAT Publishing House
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyeSAT Publishing House
 
Open domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingOpen domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingeSAT Publishing House
 
A comparative study on road traffic management systems
A comparative study on road traffic management systemsA comparative study on road traffic management systems
A comparative study on road traffic management systemseSAT Publishing House
 
Effect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryEffect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryeSAT Publishing House
 

Viewers also liked (20)

Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)
 
Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packet
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...
 
Pounding problems in urban areas
Pounding problems in urban areasPounding problems in urban areas
Pounding problems in urban areas
 
Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managment
 
Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...
 
Numerical analysis of heat transfer in refrigerant flow through a condenser tube
Numerical analysis of heat transfer in refrigerant flow through a condenser tubeNumerical analysis of heat transfer in refrigerant flow through a condenser tube
Numerical analysis of heat transfer in refrigerant flow through a condenser tube
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
A over damped person identification system using emg signal
A over damped person identification system using emg signalA over damped person identification system using emg signal
A over damped person identification system using emg signal
 
Automated water head controller for domestic application
Automated water head controller for domestic applicationAutomated water head controller for domestic application
Automated water head controller for domestic application
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...
 
Design and development of mechanical power amplifier
Design and development of mechanical power amplifierDesign and development of mechanical power amplifier
Design and development of mechanical power amplifier
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case study
 
Open domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingOpen domain question answering system using semantic role labeling
Open domain question answering system using semantic role labeling
 
A comparative study on road traffic management systems
A comparative study on road traffic management systemsA comparative study on road traffic management systems
A comparative study on road traffic management systems
 
Effect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryEffect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonry
 

Similar to Software as a service for efficient cloud computing

Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.Minor33
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
CONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCYCONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCYijcseit
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingIOSR Journals
 

Similar to Software as a service for efficient cloud computing (20)

.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
A017620123
A017620123A017620123
A017620123
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
G017324043
G017324043G017324043
G017324043
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
CONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCYCONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCY
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud Computing
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Software as a service for efficient cloud computing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 178 SOFTWARE AS A SERVICE FOR EFFICIENT CLOUD COMPUTING K.V. K Mahesh Kumar Research Scholar, Department of Computer Science and Engineering,Acharya Nagarjuna University, A.P, India Abstract This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of cloud computing architecture in their IT services. SaaS applications are service centric cloud computing delivery model used as IT Infrastructure which is multi-tenant architecture used to provide rich user experience with desired set of features requested by the cloud user. This research paper also discusses the importance of SaaS application architecture, functionality, efficiency, advantages and disadvantages. Keywords: Cloud Computing, Service Delivery Models, Software as a Service, SaaS Architecture. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION The Word Cloud Computing is buzzing everywhere among organization, enterprises, independent software vendors (ISV), end users etc. Cloud computing is nothing but distributed computing over the internet where user can access their data from the database in the cloud. Cloud computing is different from traditional grid computing it is more dynamic, flexible and scalable offered by independent organizations where deployment and maintenance of the services & data is managed by the organizations themselves. Cloud computing varies from one cloud provider to another, as some cloud providers provide storage over network with small monthly rentals for end users, whereas some other providers offer applications for software companies which helps in reducing costs in deployment or installations of applications. In this paper we will be evaluating SaaS service delivery model, its architedctural impact, characteristic features and providing solutions for businesses with the integration Application program interface (API) [1], [2], [9]. 2.OVERVIEW OF CLOUD COMPUTING Cloud computing is known for applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. There are four basic cloud delivery models 2.1 Private Cloud In this cloud services are provided solely for an organization and are managed by the organization or a thirdparty. These services may exist off-site [1], [8]. 2.2 Public Cloud Public cloud services are available to the public and owned by an organization selling the cloud services. For example storage over networks such as Drop box, Google drive etc [1], [8]. 2.3 Community Cloud In Community cloud services are shared by several organizations for supporting a specific community that has shared concerns such as common goal, security requirements, policies, compliance considerations etc. And these services are further managed by a third party organization which may exist at an offshore location [1], [8]. 2.4 Hybrid Cloud Hybrid cloud is a composition of various cloud computing infrastructures such as public, private or community. For example hybrid cloud is the data stored in private cloud is manipulated by a program running in the public cloud [1], [8]. The cloud computing architecture is further classified based on service delivery models, well there are three service delivery models namely Software As A Service (SaaS), Platform As A Service (PaaS) and Infrastructure As A Service (IaaS) [1], [8]. 3. SOFTWARE-AS-A-SERVICE (SaaS) Generally cloud providers use public cloud resources to create their virtual private cloud to make of cloud computing access the scalable computing resources and IT services. SaaS is one of the service delivery models where of software as a service will change the way people build, sell, buy and use software. In this model Software is provided as a service where cloud user can access the software from his web browser without the
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 179 concerns of deployment or installation & maintenance. SaaS applications are known as Web-based software, on-demand software or hosted software. Cloud provider maintains the application its security, availability and performance. SaaS cloud computing delivers end user desired application through the internet to thousands of customers using a multitenant architecture. On the other side cloud user can run application or software with no upfront costs or investment in database, servers and software licensing. With the advent of Web 2.0 & faster HTML 5 standards, graphically rich applications can be run smoothly at 60 Frames per second just like running our software on our own personal computers. This service model depicts one to many function as single application running as a service on the server side with many client end users can run it from their web browser simultaneously as they are connected as services [2], [4]. For example let us consider Google Play Store where applications can be purchased on the go and can be run from the web browser, any number of people can purchase and run the application simultaneously but only one instance of the application is running on the server side. This helps in reducing costs on resources and on the customers point of view it is hassle free process service on demand where Cloud user can rent applications without the need of installation and maintenance of the software [2], [4]. Fig-1:SaaS Structure [6] 3.1 SaaS Architecture Software as a Service (SaaS) has a distinctive advantage of Service Oriented Architecture where software applications communicate with each other. An application running as a service act as a service provider and exhibits its functionality to other applications or services via public brokers and also acts as a service requester when required for incorporating data and functionality from other services. SaaS service delivery model system architecture supports user demands even at peak hours and has the ability to process large numbers of transactions in a secure and reliable environment[7], [10]. Fig-2:SaaS Architecture [6] SaaS with the use of new technologies and application frameworks helps in reducing time to market and cost savings in converting on premises server into a SaaS based product. Microsoft believes SaaS architecture can be classified based on their maturity levels and they are as follows: 3.1.1 Ad-hoc/Custom Ad-hoc or custom level is the first level of maturity where unique or customized version of applications are hosted on the servers. This level is useful when migrating from or converting existing client server architecture. As it doesn’t requires system administrator which indeed helps in reducing maintenance costs [7], [10]. 3.1.2 Configurability This second level of maturity helps in providing flexibility in identifying different users using the same application or service. This is done by configuring unique metadata, which indeed helps cloud provider in identifying different user and their needs, So that cloud provider can maintain common core code of the application regardless of end users and their needs. Further it also helps cloud provider in allocating the resources
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 180 such as application or software based on end user demands [7], [10]. 3.1.3 Multi-Tenant Efficient Multi-tenancy is known for sharing of resources across hundreds of tenants or end users but can still differentiate individual users, their data and needs or demands [7], [10]. 3.1.4 Scalability In this level of maturity application resources are used efficiently by conducting best practices of IT such as optimizing locking duration, statelessness, sharing pooled resources such as threads and network connections, caching reference data and partitioning large databases [7], [10]. Fig-3:SaaS Various Types [6] 3.2 Characteristic Features of SaaS Software as a Service has three prominent Characteristic features they are 3.2.1 Network or Online Access SaaS is an online application which can be accessed using a web browser from anywhere in the world without any software installation. All we need is internet access and a web browser with which the cloud provider services and applications can be accessed [3] 3.2.2 Centralized Management SaaS service model major characteristic feature is centralized management, which will help monitoring, controlling, maintaining and updating applications at appropriate time without any hiccups. The maintenance of the application is done at the offshore location or at the cloud provider premise where end user or cloud user does not need to worry about updating the application [3]. 3.2.3 Powerful Communication Features SaaS not only known for its online services & application but also has powerful communication features. SaaS is known for its Instant Messaging chat service and Voice over IP (VOIP) features [3]. 3.3 Advantages of SaaS Advantages of Software as a service (SaaS) are classified into two categories Cloud user or end user advantages and Cloud provider advantages. 3.3.1 Cloud User Advantages • Offsite deployment • Low overhead or low costs • Decentralized • Customizable • On the fly pay as u go 3.3.2 Cloud Provider Advantages • Application as a service • Scalable applications • High customization • Highly stable & common base code • Easy maintenance • Maximum efficiency • Flexible costs based on usage 3.4 Disadvantages of SaaS 3.4.1 Strong & Reliable Network Connectivity SaaS is a service model where the cloud user can access the application through web browser, this means we need a good reliable & fast internet connection. But internet speeds and connectivity differ from place to place, country to country. So strong & reliable network connectivity can be a big disadvantage [6]. 3.4.2 Security Issues SaaS has increased security issues and challenges as it constantly interacts with different cloud users or end users, data security and integrity is at stake. As one service is shared by many cloud users [6].
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 181 3.4.3 Load Balancing Feature Load balancing is one of the challenges in cloud computing which can be mitigated by businesses or cloud providers by consistent monitoring of all SaaS applications. Currently only major player like Apple, Microsoft, Google etc. are offering load balancing [6]. 4. EFFICIENT SAAS WITH API INTEGRATION Software-as-a-service (SaaS) is a contemporary cloud computing trend emerging in the IT industry which is getting better day by day and a preferred choice of service delivery model for cloud providers. Biggest advantage of SaaS cloud computing service delivery model is the more meaningful, powerful and efficient integration of Application Programming Interface (API). Now a days Business needs or demands are evolving day by day, in order to meet these demands from their customers or end users, cloud providers need to maintain & utilize their resources efficiently for providing services they are confined with. In order to meet these challenges businesses needs to update their applications & services with the pace of the new technology. Coding applications with new technologies available from time to time is a costly assignment for cloud providers. This is where API plays a major role in mitigation of additional costs occurring in developing new apps. Instead of rewriting the app completely businesses will just add new API’s in their existing application. API integration is easy and efficient for adding additional features from new technologies into their existing services and applications [5]. CONCLUSION Enterprises would do well to consider the flexibility and risk- management implications of adding SaaS to their portfolios of IT services. Integration and composition are critical components in your architecture strategies to incorporate SaaS successfully as a fully participating member of your service- centric IT infrastructure. Today, SaaS applications are expected to take advantage of the benefits of centralization through a single-instance, multi-tenant architecture, and to provide a feature-rich experience competitive with comparable on-premise applications. A typical SaaS application is offered either directly by the vendor or by an intermediary party called an aggregator, which bundles SaaS offerings from different vendors and offers them as part of a unified application platform. REFERENCES [1]. Armbrust, M et.al 2010, “A View of Cloud Computing”, Communications Of The ACM, Vol. 53, No.4, pp. 50-58. [2]. Bento, Al, 2011, “Cloud Computing: A New Phase in Information Technology Management”, Journal Of Information Technology Management, Vol. 22, No. 1, pp. 39-46. [3]. Chou, W 2008,“Web Services: Software-as-a-Service (SaaS) Communicaton and Beyond”, IEEE Congress on Services. [4]. Godse, M &Mulik, S 2009,“An Approach for Selecting Software-as-a-Service (SaaS)”, IEEE International Conference, pp.155-158. [5]. Javier, E, David, C &Arturo, M 2008,“Application Development over Software-as-a-Service Platforms”. IEEE international conference, pp.97-104. [6]. Kulkarni, G, Gambhir, J &Palwe, R 2012, “Cloud Computing-Software As Service”, International Journal of Cloud Computing And Services Science, Vol. 1, No. 1, pp.11-16. [7]. LIAO, H 2009, “Design of SaaS-based Software Architecture”, IEEE Inyernational Conference, pp.277- 281. [8]. National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009. [9]. Rao, S, Rao, N &Kumari, K 2009, “Cloud Computing: An Overview”, Journal OF Theoretical And Applied Information Technology, Vol 9, No. 1, pp. 71-76. [10]. Satyanarayana, S 2012, “CLOUD COMPUTING: SAAS”, Journal of Computer Science and Telecommunications, Vol. 4, No. 4, pp. 76-79. BIOGRAPHY K.V.K Mahesh Kumar holds a B.E. (Bachelor of Engineering) in Computer Science from Osmania University, Graduate Diploma in Professional Computing & Masters in ICT (Information and Communication Technology Management) from University of South Australia and is currently pursuing Ph.D. in Cloud Computing from Department of Computer Science and Engineering at Acharya Nagarjuna University. He has been involved in many diversified research projects and published several papers in international journals in the research areas of HCI (Human Computer Interaction), EHR (Electronic Health Record) systems, E-Business & E-Commerce, Web 2.0 Social Networking, Project Management and Knowledge Management.