SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 364
REMINISCING CLOUD COMPUTING TECHNOLOGY
Brijesh Goyal1
, Pallavi Jain2
1,2
Student, Computer Science & Engineering, DCRUST, Haryana, India, vickyaggarwal28@gmail.com
Abstract
Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts
about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for
further empirical work in modeling cloud computing technologies
Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud Computing technology is On-demand network access
to a shared pool of computing resources. This access is
provided when online from a web-browser. The motive of
such access is to provide user a convenient work-place.
Cloud computing is a technology introduced to reduce
„Headache‟ on user-side.
Cloud computing is combination of two terms: Cloud &
Computing. Cloud is the Network. A network is a bulk of
thousands of users. These users may or may not be
connected. If they are connected, there will be one of model
formed, discussed further. The cloud also consists of Server
& a Database. Server is also known as Cloud-Provider;
while Database is a collection of user-details and
applications to be worked upon by users. Computing is the
term used for services of cloud.
Another main defining characteristic of cloud computing
technology is concluded in a phrase as
“User pays what he need”
2. OBJECTIVES
Our main objectives for the research are as follows:
 To understand the current state of knowledge in a
research area
o What is known/generally accepted
o What questions remain unanswered
o Where do conflicting results exist
 To show how the current research project is linked
to previous research (cumulative tradition).
 To summarize and synthesize previous research
 To critically analyze previous research: strengths
and weaknesses
 To learn from others and stimulate ideas
3. UNDERSTANDING ORIGIN OF CC
It is observed that Peer-to-peer computing cloud not be
introduced in Grid computing. So, Cluster computing was
collaborated with Client-Server computing, resulting into
emerging Cloud Computing.
Cloud computing components are infrastructure, softwares,
applications, business and humans (server/client). In other
words,
CC  Components + Services
Services provided are Easy-to-use, Fast-to-use and Ready-
to-use.
4. KEY FEATURES OF CC
A. No efforts from user side.
Installation, configuration, testing, running, securing,
updating are cloud provider headache not users‟.
B. Zero Maintenance for Client.
Web-store i.e. CC applications are maintained by cloud-
provider.
C. Open browser  login  customize application
 start using service
D. Least investment.
Enterprise pays for infrastructure and environment set up.
E. Reliable network.
F. Customizations preserved during upgrades
G. Flexibility in data manipulation
H. Fast application deployment.
I. Built-in security provided.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 365
5. BASIC PARAMETERS TO ESTABLISH CC
Before establishing cloud computing, some parameters are
decided to be covered. Above of all is empowering basic
customizations and integrations. Cloud computing should
also support Real-time reporting of failures. The technology
is categorized into sharing models.
As the cloud users exist globally, so multiple languages and
currency payments facility must also available.
Finally, comes the part of Security and Privacy. It is
managed by several strategies. It is the most basic property
of cloud computing technology, as success of large
Database storage establishment relies on security and
privacy rule-book only.
Ease-of-use decides level of cloud provided by any
enterprise.
6. CONCLUDING DEFINITIONS FOR CC
On-demand Self-service
It is stated that decisions for automated payments, resources
procured and disposed of by customer himself.
Resource Pooling
By using Virtualization technique, cloud provider pools
the computing resources. It is the best way to attract
clients towards particular cloud.
Broad network access
Some interfaces are standardized so as to make services
available over the network.
Calculated Services
Customer payment mode is available, which is based on
criteria of Pay-per-use.
7. MODELLING OF CLOUD COMPUTING
After years of debates, the resulted models categorized for
cloud technology are:
1) Delivery Models
a) Software-As-A-Service (SAAS)
b) Platform-As-A-Service (PAAS)
c) Interface-As-A-Service (IAAS)
 SAAS is a model where user can control some of
application configurations only.
 PAAS model is defined when user can control
deployment platform & some environment
configuration.
 IAAS model is where user can control Operating
System, storage and some networking components.
2) Development Models
d) Commercial cloud
e) Scientific cloud
f) Business cloud
 Commercial cloud is established where individual
use per cloud exists.
 Scientific cloud is based on Use of cloud for
particular field.
 Business cloud as per by name, relies only for
business strategies and development purposes.
There are more development models being categorized day
by day.
3) Deployment Models
g) Public cloud
h) Private cloud
i) Community cloud
j) Hybrid cloud
This is better way to categorize development models, as
these are based on Client-categorization.
Characteristics describing deployment models are:
who manages, who owns, where located & who
accesses.Table 1 shows a summary for 4 primary cloud
deployment models. This summary is not a categorization, it
is for initial modeling purposes.
 Public clouds are defined over very large scale. As per by
name shows, it is for general public so such clouds are
considered to be Untrusted. The users are not meant to be
member of organization providing cloud.
 Private clouds are established for single enterprise. Here the
users are considered to be trusted as they are tied into some
contractual agreement done before being member. “The
physical infrastructure may be owned by and/or physically
located in the organization‟s datacenters (on-premise) or
that of a designated service provider (off-premise) with an
extension of management and security control planes
controlled by the organization or designated service
provider respectively” (Bardin, Callas, Chaput et al. 2009)
 Community clouds have deployment characteristics similar
to Private clouds. Its users are also considered to be trusted.
But the difference come where the clients are divided into
some Specific groups called Communities.
 Hybrid clouds are combinations of public, private
or/and community clouds. These are connected to each other
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 366
through gateway. The highlight feature of hybrid is that
untrusted access to resources is strictly prohibited.
8. EXPLORING CLOUD COMPUTING TOOLS
AND PRODUCTS
Although Cloud computing technology is provided by
almost all corporate enterprises, still some of them are listed
as below:
IBM Blue-cloud Platform
Microsoft Live Meeting
Microsoft Share Point Online
TPlatform (TFS
Hadoop, VMWare, Eucalyptus
GoogleFileSystem (GFS)
KosmosFS
...and many more.
The reputed companies which provide online facility of
cloud computing are:
Google, Yahoo, IBM, Oracle, HP, HCL, TCS, Hitachi,
Netmagic, Novell VMWare, Ramco, Cognizant, CRMOrbit,
ZOHO.
TrendMicro, CSS and ZScaler are famous industries to
provide Cloud Security environment.
Amazon is one of leading company in Cloud Computing
providers. Amazon offers Virtual Private Clouds, that use
public cloud infrastructure in a private manner, connecting
the public cloud resources to the organizations internal
network (Amazon 2009b).
CONCLUSIONS
This paper gives a conclusion of our Review work on Cloud
Computing. CC is the latest technology used to provide
reliable platform for customers. No need to invest huge
money in setting up infrastructure. Enterprise and
companies pay for services based on client Usage. It‟s kind
of „money-back-guarantees‟. User has no worry about
Resource Management. Flexibility in data manipulation is
available. Collaboratively working on common projects.
Privacy and security satisfaction
Cloud computing preserves all customizations even during
Upgrades. Cloud Computing technology has one primary
demerit, it is that the OFFLINE access for CC is still not
possible.
FUTURE WORK
The paper gave brief view about all sorts of Cloud Models.
In future, deployment models can be introduces on basis of
Enhancement in Security of Database or Networks.
A proposal for „Protected Cloud‟ is being introduced here.
Next publication will be on the Protected Cloud Framework
by the same concerned Authors.
ACKNOWLEDGEMENTS
This work is partially supported by Capgemini Thesis works
(Guido Kok) May 24, 2010. The conclusion is given after
reviewing referenced papers and journals.
REFERENCES:
A list of all references is given as below. No citation
number is provided throughout this paper because each line
is concluded from these references.
[1] Dr. W. Pieters and Dr. P. H. Hartel “Cloud comuting
and confidentiality” thesis in Capgemini, Guido Kok,
May 24, 2010.
[2] Workshop on Cloud computing at IIT Madras, Chennai,
India on August 18-20, 2010 by IEEE.
[3] Amazon. (2009b). Amazon Virtual Private Cloud
(Amazon VPC). Retrieved December 28, 2009.
[4] AIS. (2009b). Journal of the Association for
Information Systems. Retrieved July 27, 2009.
[5] Kesh, S. and Ratnasingam, P. (2007). A knowledge
architecture for IT security. Communications of the
ACM.
[6] The Benefits of Cloud Computing by IBM, July, 2009.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 367
[7] NIST. (2004a). FIPS 199: Standards for Security
Categorization of Federal Information and Information
Systems. Retrieved August 28, 2009.
[8] NIST. (2009). National Institute of Standards and
Technology, main website. From http://www.nist.gov.
BIOGRAPHIES:
Brijesh Goyal M.Tech (Final Yr.)
Computer Science & Engineering Dept.
DCRUST, Murthal (Sonipat) Haryana,
India. e-mail:
vickyaggarwal28@gmail.com
Pallavi Jain M.Tech (Final Yr.)
Computer Science & Engineering Dept.
DCRUST, Murthal (Sonipat), Haryana,
India e-mail: palkujain13@gmail.com

More Related Content

What's hot

Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
IJEACS
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
Souvik Pal
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
Vamsi Krishna Vanama
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
Dr. Amarjeet Singh
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
IJERA Editor
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
ANKIT KUMAR
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
 
D32035052
D32035052D32035052
D32035052
IJERA Editor
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
ErManish5
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
IJERA Editor
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 

What's hot (16)

Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
D32035052
D32035052D32035052
D32035052
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 

Viewers also liked

A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
eSAT Journals
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
eSAT Journals
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
eSAT Journals
 
Performance studies of microbial fuel cell
Performance studies of microbial fuel cellPerformance studies of microbial fuel cell
Performance studies of microbial fuel cell
eSAT Journals
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
eSAT Journals
 
Integration of a web portal and an erp through web service based implementati...
Integration of a web portal and an erp through web service based implementati...Integration of a web portal and an erp through web service based implementati...
Integration of a web portal and an erp through web service based implementati...
eSAT Journals
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
eSAT Journals
 
Optimization of cutting parameters on mild steel with hss & cemented carb...
Optimization of cutting parameters on mild steel with hss & cemented carb...Optimization of cutting parameters on mild steel with hss & cemented carb...
Optimization of cutting parameters on mild steel with hss & cemented carb...
eSAT Journals
 
Tool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imagingTool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imaging
eSAT Journals
 
Behaviour of fibre reinforce concrete beam in pure torsion
Behaviour of fibre reinforce concrete beam in pure torsionBehaviour of fibre reinforce concrete beam in pure torsion
Behaviour of fibre reinforce concrete beam in pure torsion
eSAT Journals
 
Application of finite element analysis in effective design of flight control ...
Application of finite element analysis in effective design of flight control ...Application of finite element analysis in effective design of flight control ...
Application of finite element analysis in effective design of flight control ...
eSAT Journals
 
Performance evaluation of larger matrices over cluster of four nodes using mpi
Performance evaluation of larger matrices over cluster of four nodes using mpiPerformance evaluation of larger matrices over cluster of four nodes using mpi
Performance evaluation of larger matrices over cluster of four nodes using mpi
eSAT Journals
 
An analytical study on test standards for assessment of jute geotextiles for ...
An analytical study on test standards for assessment of jute geotextiles for ...An analytical study on test standards for assessment of jute geotextiles for ...
An analytical study on test standards for assessment of jute geotextiles for ...
eSAT Journals
 
Experimental investigation of air flow characteristics in rectangular channel...
Experimental investigation of air flow characteristics in rectangular channel...Experimental investigation of air flow characteristics in rectangular channel...
Experimental investigation of air flow characteristics in rectangular channel...
eSAT Journals
 
Analysis of outrigger system for tall vertical irregularites structures subje...
Analysis of outrigger system for tall vertical irregularites structures subje...Analysis of outrigger system for tall vertical irregularites structures subje...
Analysis of outrigger system for tall vertical irregularites structures subje...
eSAT Journals
 
Analysis of photokeratitis related risk factors in welders of pt. pal indones...
Analysis of photokeratitis related risk factors in welders of pt. pal indones...Analysis of photokeratitis related risk factors in welders of pt. pal indones...
Analysis of photokeratitis related risk factors in welders of pt. pal indones...
eSAT Journals
 
Response sensitivity of the structure using vibration based damage detection ...
Response sensitivity of the structure using vibration based damage detection ...Response sensitivity of the structure using vibration based damage detection ...
Response sensitivity of the structure using vibration based damage detection ...
eSAT Journals
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filters
eSAT Journals
 
Explicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic systemExplicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic system
eSAT Journals
 

Viewers also liked (19)

A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
 
Performance studies of microbial fuel cell
Performance studies of microbial fuel cellPerformance studies of microbial fuel cell
Performance studies of microbial fuel cell
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
 
Integration of a web portal and an erp through web service based implementati...
Integration of a web portal and an erp through web service based implementati...Integration of a web portal and an erp through web service based implementati...
Integration of a web portal and an erp through web service based implementati...
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Optimization of cutting parameters on mild steel with hss & cemented carb...
Optimization of cutting parameters on mild steel with hss & cemented carb...Optimization of cutting parameters on mild steel with hss & cemented carb...
Optimization of cutting parameters on mild steel with hss & cemented carb...
 
Tool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imagingTool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imaging
 
Behaviour of fibre reinforce concrete beam in pure torsion
Behaviour of fibre reinforce concrete beam in pure torsionBehaviour of fibre reinforce concrete beam in pure torsion
Behaviour of fibre reinforce concrete beam in pure torsion
 
Application of finite element analysis in effective design of flight control ...
Application of finite element analysis in effective design of flight control ...Application of finite element analysis in effective design of flight control ...
Application of finite element analysis in effective design of flight control ...
 
Performance evaluation of larger matrices over cluster of four nodes using mpi
Performance evaluation of larger matrices over cluster of four nodes using mpiPerformance evaluation of larger matrices over cluster of four nodes using mpi
Performance evaluation of larger matrices over cluster of four nodes using mpi
 
An analytical study on test standards for assessment of jute geotextiles for ...
An analytical study on test standards for assessment of jute geotextiles for ...An analytical study on test standards for assessment of jute geotextiles for ...
An analytical study on test standards for assessment of jute geotextiles for ...
 
Experimental investigation of air flow characteristics in rectangular channel...
Experimental investigation of air flow characteristics in rectangular channel...Experimental investigation of air flow characteristics in rectangular channel...
Experimental investigation of air flow characteristics in rectangular channel...
 
Analysis of outrigger system for tall vertical irregularites structures subje...
Analysis of outrigger system for tall vertical irregularites structures subje...Analysis of outrigger system for tall vertical irregularites structures subje...
Analysis of outrigger system for tall vertical irregularites structures subje...
 
Analysis of photokeratitis related risk factors in welders of pt. pal indones...
Analysis of photokeratitis related risk factors in welders of pt. pal indones...Analysis of photokeratitis related risk factors in welders of pt. pal indones...
Analysis of photokeratitis related risk factors in welders of pt. pal indones...
 
Response sensitivity of the structure using vibration based damage detection ...
Response sensitivity of the structure using vibration based damage detection ...Response sensitivity of the structure using vibration based damage detection ...
Response sensitivity of the structure using vibration based damage detection ...
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filters
 
Explicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic systemExplicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic system
 

Similar to Reminiscing cloud computing technology

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Journals
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
ijsrd.com
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
G0314043
G0314043G0314043
G0314043
iosrjournals
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
Caner KAYA
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
taramandal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Sammer Qader
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
Dr. Amarjeet Singh
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
Jagan Mohan Bishoyi
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
cloudresearcher
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Mervat Bamiah
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
 
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Eswar Publications
 

Similar to Reminiscing cloud computing technology (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 

Reminiscing cloud computing technology

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 364 REMINISCING CLOUD COMPUTING TECHNOLOGY Brijesh Goyal1 , Pallavi Jain2 1,2 Student, Computer Science & Engineering, DCRUST, Haryana, India, vickyaggarwal28@gmail.com Abstract Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for further empirical work in modeling cloud computing technologies Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud Computing technology is On-demand network access to a shared pool of computing resources. This access is provided when online from a web-browser. The motive of such access is to provide user a convenient work-place. Cloud computing is a technology introduced to reduce „Headache‟ on user-side. Cloud computing is combination of two terms: Cloud & Computing. Cloud is the Network. A network is a bulk of thousands of users. These users may or may not be connected. If they are connected, there will be one of model formed, discussed further. The cloud also consists of Server & a Database. Server is also known as Cloud-Provider; while Database is a collection of user-details and applications to be worked upon by users. Computing is the term used for services of cloud. Another main defining characteristic of cloud computing technology is concluded in a phrase as “User pays what he need” 2. OBJECTIVES Our main objectives for the research are as follows:  To understand the current state of knowledge in a research area o What is known/generally accepted o What questions remain unanswered o Where do conflicting results exist  To show how the current research project is linked to previous research (cumulative tradition).  To summarize and synthesize previous research  To critically analyze previous research: strengths and weaknesses  To learn from others and stimulate ideas 3. UNDERSTANDING ORIGIN OF CC It is observed that Peer-to-peer computing cloud not be introduced in Grid computing. So, Cluster computing was collaborated with Client-Server computing, resulting into emerging Cloud Computing. Cloud computing components are infrastructure, softwares, applications, business and humans (server/client). In other words, CC  Components + Services Services provided are Easy-to-use, Fast-to-use and Ready- to-use. 4. KEY FEATURES OF CC A. No efforts from user side. Installation, configuration, testing, running, securing, updating are cloud provider headache not users‟. B. Zero Maintenance for Client. Web-store i.e. CC applications are maintained by cloud- provider. C. Open browser  login  customize application  start using service D. Least investment. Enterprise pays for infrastructure and environment set up. E. Reliable network. F. Customizations preserved during upgrades G. Flexibility in data manipulation H. Fast application deployment. I. Built-in security provided.
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 365 5. BASIC PARAMETERS TO ESTABLISH CC Before establishing cloud computing, some parameters are decided to be covered. Above of all is empowering basic customizations and integrations. Cloud computing should also support Real-time reporting of failures. The technology is categorized into sharing models. As the cloud users exist globally, so multiple languages and currency payments facility must also available. Finally, comes the part of Security and Privacy. It is managed by several strategies. It is the most basic property of cloud computing technology, as success of large Database storage establishment relies on security and privacy rule-book only. Ease-of-use decides level of cloud provided by any enterprise. 6. CONCLUDING DEFINITIONS FOR CC On-demand Self-service It is stated that decisions for automated payments, resources procured and disposed of by customer himself. Resource Pooling By using Virtualization technique, cloud provider pools the computing resources. It is the best way to attract clients towards particular cloud. Broad network access Some interfaces are standardized so as to make services available over the network. Calculated Services Customer payment mode is available, which is based on criteria of Pay-per-use. 7. MODELLING OF CLOUD COMPUTING After years of debates, the resulted models categorized for cloud technology are: 1) Delivery Models a) Software-As-A-Service (SAAS) b) Platform-As-A-Service (PAAS) c) Interface-As-A-Service (IAAS)  SAAS is a model where user can control some of application configurations only.  PAAS model is defined when user can control deployment platform & some environment configuration.  IAAS model is where user can control Operating System, storage and some networking components. 2) Development Models d) Commercial cloud e) Scientific cloud f) Business cloud  Commercial cloud is established where individual use per cloud exists.  Scientific cloud is based on Use of cloud for particular field.  Business cloud as per by name, relies only for business strategies and development purposes. There are more development models being categorized day by day. 3) Deployment Models g) Public cloud h) Private cloud i) Community cloud j) Hybrid cloud This is better way to categorize development models, as these are based on Client-categorization. Characteristics describing deployment models are: who manages, who owns, where located & who accesses.Table 1 shows a summary for 4 primary cloud deployment models. This summary is not a categorization, it is for initial modeling purposes.  Public clouds are defined over very large scale. As per by name shows, it is for general public so such clouds are considered to be Untrusted. The users are not meant to be member of organization providing cloud.  Private clouds are established for single enterprise. Here the users are considered to be trusted as they are tied into some contractual agreement done before being member. “The physical infrastructure may be owned by and/or physically located in the organization‟s datacenters (on-premise) or that of a designated service provider (off-premise) with an extension of management and security control planes controlled by the organization or designated service provider respectively” (Bardin, Callas, Chaput et al. 2009)  Community clouds have deployment characteristics similar to Private clouds. Its users are also considered to be trusted. But the difference come where the clients are divided into some Specific groups called Communities.  Hybrid clouds are combinations of public, private or/and community clouds. These are connected to each other
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 366 through gateway. The highlight feature of hybrid is that untrusted access to resources is strictly prohibited. 8. EXPLORING CLOUD COMPUTING TOOLS AND PRODUCTS Although Cloud computing technology is provided by almost all corporate enterprises, still some of them are listed as below: IBM Blue-cloud Platform Microsoft Live Meeting Microsoft Share Point Online TPlatform (TFS Hadoop, VMWare, Eucalyptus GoogleFileSystem (GFS) KosmosFS ...and many more. The reputed companies which provide online facility of cloud computing are: Google, Yahoo, IBM, Oracle, HP, HCL, TCS, Hitachi, Netmagic, Novell VMWare, Ramco, Cognizant, CRMOrbit, ZOHO. TrendMicro, CSS and ZScaler are famous industries to provide Cloud Security environment. Amazon is one of leading company in Cloud Computing providers. Amazon offers Virtual Private Clouds, that use public cloud infrastructure in a private manner, connecting the public cloud resources to the organizations internal network (Amazon 2009b). CONCLUSIONS This paper gives a conclusion of our Review work on Cloud Computing. CC is the latest technology used to provide reliable platform for customers. No need to invest huge money in setting up infrastructure. Enterprise and companies pay for services based on client Usage. It‟s kind of „money-back-guarantees‟. User has no worry about Resource Management. Flexibility in data manipulation is available. Collaboratively working on common projects. Privacy and security satisfaction Cloud computing preserves all customizations even during Upgrades. Cloud Computing technology has one primary demerit, it is that the OFFLINE access for CC is still not possible. FUTURE WORK The paper gave brief view about all sorts of Cloud Models. In future, deployment models can be introduces on basis of Enhancement in Security of Database or Networks. A proposal for „Protected Cloud‟ is being introduced here. Next publication will be on the Protected Cloud Framework by the same concerned Authors. ACKNOWLEDGEMENTS This work is partially supported by Capgemini Thesis works (Guido Kok) May 24, 2010. The conclusion is given after reviewing referenced papers and journals. REFERENCES: A list of all references is given as below. No citation number is provided throughout this paper because each line is concluded from these references. [1] Dr. W. Pieters and Dr. P. H. Hartel “Cloud comuting and confidentiality” thesis in Capgemini, Guido Kok, May 24, 2010. [2] Workshop on Cloud computing at IIT Madras, Chennai, India on August 18-20, 2010 by IEEE. [3] Amazon. (2009b). Amazon Virtual Private Cloud (Amazon VPC). Retrieved December 28, 2009. [4] AIS. (2009b). Journal of the Association for Information Systems. Retrieved July 27, 2009. [5] Kesh, S. and Ratnasingam, P. (2007). A knowledge architecture for IT security. Communications of the ACM. [6] The Benefits of Cloud Computing by IBM, July, 2009.
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 367 [7] NIST. (2004a). FIPS 199: Standards for Security Categorization of Federal Information and Information Systems. Retrieved August 28, 2009. [8] NIST. (2009). National Institute of Standards and Technology, main website. From http://www.nist.gov. BIOGRAPHIES: Brijesh Goyal M.Tech (Final Yr.) Computer Science & Engineering Dept. DCRUST, Murthal (Sonipat) Haryana, India. e-mail: vickyaggarwal28@gmail.com Pallavi Jain M.Tech (Final Yr.) Computer Science & Engineering Dept. DCRUST, Murthal (Sonipat), Haryana, India e-mail: palkujain13@gmail.com