SlideShare a Scribd company logo
ISSN: 2278 – 1323
                             International Journal of Advanced Research in Computer Engineering & Technology
                                                                                  Volume 1, Issue 5, July 2012



                         “Cloud Service Utilization”
                                            Journey to cloud...
                                                     1
                                                      Pranay Chauhan
                               Assistant Professor, Dept, Of Information Technology, SVCE, Indore
                                                1
                                                  pranaychauhan1985@gmail.com,




Abstract                                                             means the system is cloud system.       Know moving
As we know that cloud computing is an emerging area,                 towards the cloud we should know that cloud is vast
the services provided by the cloud is helpful to
overcome the limitation of Information Technology.                   there is no end so we call it as a journey to cloud. On
Such as Globalization, Security, Storage and the most                our journey to cloud there are mainly three phases [1.
important Cost. And as Cloud plays a vital role to
overcome these challenges of new age of Information                  EMC] First phase is Classic data center, and then
technology. The above paper would focus on various                   second phase is Virtual Data Center and at last cloud.
factors in which cloud mainly developed the suitable
environment for Communication and business aspects,                  Figure 1.2 shows the three different phases towards
new trends in the emerging arena and various issues                  cloud computing [1].
regarding the cloud computing. At various domains
and how these domain mainly get affected by the
cloud.
Keywords: - Virtualization, Storage, Compute,
Security.

Introduction
As when we talk about the cloud the first thing that
comes in our mind when we look upward at cloud is
the unlimited space [2]. According to NIST i.e.
National institute of standard technology the cloud
mainly contain the five characteristics
                                                                     Figure 1.2: Shows the different Phases in the cloud
                                                                     computing

                                                                     Know coming to the classic data center (CDC), it
                                                                     mainly consist of the several component such as
                                                                     Compute, Applications, DBMS, Storage, Networks.
                                                                     The compute mainly consists of the logical and
                                                                     physical components such as hard disk, floppy drive,
                                                                     RAM, ROM, Processors, Switches, NIC card etc.
                                                                     while the logical components consist of the various
                                                                     protocol [3]. Coming to second components the
Figure:1.1 Shows Charcterstics of Cloud computing
                                                                     Applications it mainly consist of various applications
                                                                     such as Email Application, Customer Retail Mgmt.,
                                                                     Enterprise Resource Planning etc. various applications
These are the main characteristics of the cloud
                                                                     while Third Components is about the Data Base
computing. If these characteristics were in the system
                                                                                                                       102
                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                               International Journal of Advanced Research in Computer Engineering & Technology
                                                                                    Volume 1, Issue 5, July 2012


Management system which mainly talks about the data            to maintain the recovery, while recovery can be on
base that how the data is important, which type of data        local and remote side recovery. If we talk about the
and purpose and classification of data. Consist of sql         recovery the various recovery tools are there which
and PLSQL. While the Fourth components mainly                  mainly provide the recovery of data. Moving ahead
about the Storage the storage of data is another main          towards CDC the last components is Network, which
complex problem how to store the data because as the           play again the vital role in the classic data center. The
Information technology is facing the biggest problem           fiber channel over Ethernet is used FCOE for
which is storage, that how to store the data and how to        transmission. Know second phase of journey towards
manage the data, the big data maintence is another big         cloud is Virtual data center, before that concept of
and emerging area of Information Technology, but in            virtualization is quite simple. I.e. it is logical structure
case of classic data center , Storage mainly uses the          which acts and behaves like physical structure. The
RAID: Redundant array of independent disk, in which            virtual machine is based on virtual file and it also acts
various levels are there RAID 0 , RAID 1, RAID                 and behaves like a physical machine. The virtual
NESTED, RAID 5, RAID 6 . While the RAID6 is                    machine consists of the applications and operating
been used by the Google and you tube [5].The RAID              system running over it. Above figure shows the
model mainly used the three different techniques such          position of the virtual machine in cloud system.
as




                                                               Figure 1.4 shows the virtualization machine and its
     Figure 1.3: Shows the three techniques of RAID            position

These techniques mainly provide the better storage;            The virtual machines are actually logical file which is
the better techniques mainly maintain the business             mainly created on the physical machine. The main
continuity in the system. The business continuity can          concept is to provide the virtual environment in the
be achieve through these techniques and backup is also         system, the file which is created on the machine
an important part for these which can be maintain on           required more protection because these file contain the
disk and as well as on tape, coming towards backup             whole data of the virtual system. And the biggest
the back up of data is well categorized on client side         characteristics of these cloud computing is that they
and as well as on server side. Backup is mainly done           just maintain the resource pool (Virtualization).the
                                                               virtual machine also contain the various virtual
                                                                                                                      103
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                      Volume 1, Issue 5, July 2012


devices such as virtual switch, virtual NIC, virtual              Following existing system as shown in the figure 1.5
hard disks, virtual storage. The virtual machine and              the security can be maintained at its better level
physical machine mainly consist of hypervisor in                  because as said that no system can be said as perfect
between them. Hypervisor mainly allow the multiple                secure or 100% secure. We can only increase the level
operating systems to run simultaneously on the                    of security. The virtual system is the core concept of
physical machine. It mainly works on the physical                 cloud,   the    basic   characteristics   of   cloud    is
machine the used virtualization can be achieved by                virtualization so logical structure should be strong and
these. coming to the security purpose the virtual                 it should be safe. The various problems which mainly
machine can be bigger loophole they can be theft so               occur during the virtualization they can be solved by
the virtual machine theft prevention can be done the              maintain this proper aspect of principles.
first level , privacy at physical level should be                 The cloud will go to play a vital role in the next
maintain   by   the   physical     level   security.   The        emerging environment, so maintaining the trust is an
authentication should be maintained by the stronger               important challenge for the service provider. The
security mechanism such as Biometric devices. And                 cloud security is biggest issue which has to be kept in
the physical access privileged should be under the                mind and then services can be used. So the cloud is
secure services so that various problems regarding the            vast and big enough to resolve all the challenges of
virtualization security can be solved and hypervisor              information technology. Cost, security and the
and virtual machine should work under the secure                  problem of storage can be easily solved by maintain
environment. [7] The business continuity should be                the virtualization. The virtualization mainly provides
maintained the business should work regularly. The                bigger space to maintain the large amount of data.
privacy condition should be maintained properly                   Complexity of maintain the data can be easily be
                                                                  solved by virtualizations sphere and as when physical
                                                                  machine get converts into virtual machine by Vm
                                                                  sphere. [6] The physical machine will acts like a
                                                                  virtual machine conversion can be hot conversion or it
                                                                  can be cold conversion. If the machine is on then it is
                                                                  hot conversion and if the machine is off then it is cold
                                                                  conversion. Figure shows the physical to virtual
                                                                  machine conversions. [7]




Figure 1.5: Shows the working of antivirus between the
Physical machine and virtual machine

The basic aspects of security can be achieved by the                         Figure 1.6: PM to VM conversion

                                                                                                                         104
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                                        Volume 1, Issue 5, July 2012


So the bigger challenges to information technology
can be solved by the cloud.
                                                                      paper on IBM’s New
    Conclusion                                                          Enterprise Data
                                                                        Center:
As we know that the cloud is an emerging area most of
the services providers where moving towards the
                                                                       A websi
cloud services. So cloud issues should be kept in mind                
and the services of cloud can be used at broad level                  
and as discuss, above it can resolve the biggest
challenges to information technology and the problems
                                                                      
which mainly big data center faces.                                   
                                                                      collaboration among
7. References                                                           universities in the
                                                                  First Author
[1].http://india.emc.com/microsites/cloud/cloud.htm?p
id=home-small-cloudtransformsit-230212                            Pranay Chauhan
                                                                  M.E. Information Technology
.                                                                 Indore, M. P., India,
 [2] Amazon Elastic Compute Cloud (EC2):                          Ph. +91 9754143398
http://www.amazon.com/gp/browse.html?
Node=201590011,.                                                  Biography: Pranay Chauhan has receivable. (Bachelor
                                                                  of Engineering)Degree in Information Technology
                                                                  Engineering from Rishiraj Institute of Technology,
[3].http://www.businessweek.com/technology/content/               Indore, M.P., India in2007. He has 4+.years of
aug2008/tc2008082_445669_page_3.htm                               teaching experience. His subjects of Interest include,
                                                                  Computer Networking, Biometric system, Security
    [4].http://en.wikipedia.org/wiki/Cloud computing              assessment, Securing E commerce Operating system,
                                                                  Network Management, Wireless network, cloud
                                                                  computing, security in cloud computing, Network
[5]...http://www.ibm.com/developerworks/websphere/t               security presently. He has published several researches
echjournal/0904_amrhein/0904_amrhein.html                         Papers and Journals in National/International
                                                                  Conferences. Currently working as Assistant Professor
                                                                  in SVCE Indore.
[6] http://india.emc.com/microsites/cloud/

[7].http://india.emc.com/index.htm?fromGlobalSiteSel
ect

[8] http://cloudcomputing.sys-con.com


[9].http://www.businessweek.com/technology/content/
aug2008/tc2008082_445669_page_3.htm

[10] http://en.wikipedia.org/wiki/Cloud_computing


    [11]. http://cloudsecurityalliance.org



                                                                                                                    105
                                             All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
70 74
70 7470 74
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
IJORCS
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
 
Iw qo s09 (1)
Iw qo s09 (1)Iw qo s09 (1)
Iw qo s09 (1)
shafyhaneef
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 
Cloud Models
Cloud ModelsCloud Models
Cloud Models
Sweta Kumari Barnwal
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage system
Alexander Decker
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage system
Alexander Decker
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Edadc
EdadcEdadc
Edadc
ragh6
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
IJECEIAES
 

What's hot (18)

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
70 74
70 7470 74
70 74
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
 
Iw qo s09 (1)
Iw qo s09 (1)Iw qo s09 (1)
Iw qo s09 (1)
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Cloud Models
Cloud ModelsCloud Models
Cloud Models
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage system
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage system
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Edadc
EdadcEdadc
Edadc
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
Fog doc
Fog doc Fog doc
Fog doc
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 

Viewers also liked

27 32
27 3227 32
42 46
42 4642 46
590 599
590 599590 599
666 670
666 670666 670
75 78
75 7875 78
75 78
75 7875 78
315 319
315 319315 319
1 7
1 71 7
24 26
24 2624 26

Viewers also liked (9)

27 32
27 3227 32
27 32
 
42 46
42 4642 46
42 46
 
590 599
590 599590 599
590 599
 
666 670
666 670666 670
666 670
 
75 78
75 7875 78
75 78
 
75 78
75 7875 78
75 78
 
315 319
315 319315 319
315 319
 
1 7
1 71 7
1 7
 
24 26
24 2624 26
24 26
 

Similar to 102 105

Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
dannyijwest
 
G017214849
G017214849G017214849
G017214849
IOSR Journals
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
IOSR Journals
 
51 59
51 5951 59
51 59
51 5951 59
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
poojagupta010
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
484 488
484 488484 488
B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
csandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
csandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
cscpconf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Upanya Singh
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Jawhar Ali
 
Fog computing
Fog computingFog computing
Fog computing
Ayush Chaurasia
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
IJARIIT
 
A01260104
A01260104A01260104
A01260104
IOSR Journals
 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
IJwest
 

Similar to 102 105 (20)

Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
G017214849
G017214849G017214849
G017214849
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
51 59
51 5951 59
51 59
 
51 59
51 5951 59
51 59
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
484 488
484 488484 488
484 488
 
B1802041217
B1802041217B1802041217
B1802041217
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
A01260104
A01260104A01260104
A01260104
 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

102 105

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 “Cloud Service Utilization” Journey to cloud... 1 Pranay Chauhan Assistant Professor, Dept, Of Information Technology, SVCE, Indore 1 pranaychauhan1985@gmail.com, Abstract means the system is cloud system. Know moving As we know that cloud computing is an emerging area, towards the cloud we should know that cloud is vast the services provided by the cloud is helpful to overcome the limitation of Information Technology. there is no end so we call it as a journey to cloud. On Such as Globalization, Security, Storage and the most our journey to cloud there are mainly three phases [1. important Cost. And as Cloud plays a vital role to overcome these challenges of new age of Information EMC] First phase is Classic data center, and then technology. The above paper would focus on various second phase is Virtual Data Center and at last cloud. factors in which cloud mainly developed the suitable environment for Communication and business aspects, Figure 1.2 shows the three different phases towards new trends in the emerging arena and various issues cloud computing [1]. regarding the cloud computing. At various domains and how these domain mainly get affected by the cloud. Keywords: - Virtualization, Storage, Compute, Security. Introduction As when we talk about the cloud the first thing that comes in our mind when we look upward at cloud is the unlimited space [2]. According to NIST i.e. National institute of standard technology the cloud mainly contain the five characteristics Figure 1.2: Shows the different Phases in the cloud computing Know coming to the classic data center (CDC), it mainly consist of the several component such as Compute, Applications, DBMS, Storage, Networks. The compute mainly consists of the logical and physical components such as hard disk, floppy drive, RAM, ROM, Processors, Switches, NIC card etc. while the logical components consist of the various protocol [3]. Coming to second components the Figure:1.1 Shows Charcterstics of Cloud computing Applications it mainly consist of various applications such as Email Application, Customer Retail Mgmt., Enterprise Resource Planning etc. various applications These are the main characteristics of the cloud while Third Components is about the Data Base computing. If these characteristics were in the system 102 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Management system which mainly talks about the data to maintain the recovery, while recovery can be on base that how the data is important, which type of data local and remote side recovery. If we talk about the and purpose and classification of data. Consist of sql recovery the various recovery tools are there which and PLSQL. While the Fourth components mainly mainly provide the recovery of data. Moving ahead about the Storage the storage of data is another main towards CDC the last components is Network, which complex problem how to store the data because as the play again the vital role in the classic data center. The Information technology is facing the biggest problem fiber channel over Ethernet is used FCOE for which is storage, that how to store the data and how to transmission. Know second phase of journey towards manage the data, the big data maintence is another big cloud is Virtual data center, before that concept of and emerging area of Information Technology, but in virtualization is quite simple. I.e. it is logical structure case of classic data center , Storage mainly uses the which acts and behaves like physical structure. The RAID: Redundant array of independent disk, in which virtual machine is based on virtual file and it also acts various levels are there RAID 0 , RAID 1, RAID and behaves like a physical machine. The virtual NESTED, RAID 5, RAID 6 . While the RAID6 is machine consists of the applications and operating been used by the Google and you tube [5].The RAID system running over it. Above figure shows the model mainly used the three different techniques such position of the virtual machine in cloud system. as Figure 1.4 shows the virtualization machine and its Figure 1.3: Shows the three techniques of RAID position These techniques mainly provide the better storage; The virtual machines are actually logical file which is the better techniques mainly maintain the business mainly created on the physical machine. The main continuity in the system. The business continuity can concept is to provide the virtual environment in the be achieve through these techniques and backup is also system, the file which is created on the machine an important part for these which can be maintain on required more protection because these file contain the disk and as well as on tape, coming towards backup whole data of the virtual system. And the biggest the back up of data is well categorized on client side characteristics of these cloud computing is that they and as well as on server side. Backup is mainly done just maintain the resource pool (Virtualization).the virtual machine also contain the various virtual 103 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 devices such as virtual switch, virtual NIC, virtual Following existing system as shown in the figure 1.5 hard disks, virtual storage. The virtual machine and the security can be maintained at its better level physical machine mainly consist of hypervisor in because as said that no system can be said as perfect between them. Hypervisor mainly allow the multiple secure or 100% secure. We can only increase the level operating systems to run simultaneously on the of security. The virtual system is the core concept of physical machine. It mainly works on the physical cloud, the basic characteristics of cloud is machine the used virtualization can be achieved by virtualization so logical structure should be strong and these. coming to the security purpose the virtual it should be safe. The various problems which mainly machine can be bigger loophole they can be theft so occur during the virtualization they can be solved by the virtual machine theft prevention can be done the maintain this proper aspect of principles. first level , privacy at physical level should be The cloud will go to play a vital role in the next maintain by the physical level security. The emerging environment, so maintaining the trust is an authentication should be maintained by the stronger important challenge for the service provider. The security mechanism such as Biometric devices. And cloud security is biggest issue which has to be kept in the physical access privileged should be under the mind and then services can be used. So the cloud is secure services so that various problems regarding the vast and big enough to resolve all the challenges of virtualization security can be solved and hypervisor information technology. Cost, security and the and virtual machine should work under the secure problem of storage can be easily solved by maintain environment. [7] The business continuity should be the virtualization. The virtualization mainly provides maintained the business should work regularly. The bigger space to maintain the large amount of data. privacy condition should be maintained properly Complexity of maintain the data can be easily be solved by virtualizations sphere and as when physical machine get converts into virtual machine by Vm sphere. [6] The physical machine will acts like a virtual machine conversion can be hot conversion or it can be cold conversion. If the machine is on then it is hot conversion and if the machine is off then it is cold conversion. Figure shows the physical to virtual machine conversions. [7] Figure 1.5: Shows the working of antivirus between the Physical machine and virtual machine The basic aspects of security can be achieved by the Figure 1.6: PM to VM conversion 104 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 So the bigger challenges to information technology can be solved by the cloud. paper on IBM’s New Conclusion Enterprise Data Center: As we know that the cloud is an emerging area most of the services providers where moving towards the  A websi cloud services. So cloud issues should be kept in mind  and the services of cloud can be used at broad level  and as discuss, above it can resolve the biggest challenges to information technology and the problems  which mainly big data center faces.  collaboration among 7. References universities in the First Author [1].http://india.emc.com/microsites/cloud/cloud.htm?p id=home-small-cloudtransformsit-230212 Pranay Chauhan M.E. Information Technology . Indore, M. P., India, [2] Amazon Elastic Compute Cloud (EC2): Ph. +91 9754143398 http://www.amazon.com/gp/browse.html? Node=201590011,. Biography: Pranay Chauhan has receivable. (Bachelor of Engineering)Degree in Information Technology Engineering from Rishiraj Institute of Technology, [3].http://www.businessweek.com/technology/content/ Indore, M.P., India in2007. He has 4+.years of aug2008/tc2008082_445669_page_3.htm teaching experience. His subjects of Interest include, Computer Networking, Biometric system, Security [4].http://en.wikipedia.org/wiki/Cloud computing assessment, Securing E commerce Operating system, Network Management, Wireless network, cloud computing, security in cloud computing, Network [5]...http://www.ibm.com/developerworks/websphere/t security presently. He has published several researches echjournal/0904_amrhein/0904_amrhein.html Papers and Journals in National/International Conferences. Currently working as Assistant Professor in SVCE Indore. [6] http://india.emc.com/microsites/cloud/ [7].http://india.emc.com/index.htm?fromGlobalSiteSel ect [8] http://cloudcomputing.sys-con.com [9].http://www.businessweek.com/technology/content/ aug2008/tc2008082_445669_page_3.htm [10] http://en.wikipedia.org/wiki/Cloud_computing [11]. http://cloudsecurityalliance.org 105 All Rights Reserved © 2012 IJARCET