SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 364
REMINISCING CLOUD COMPUTING TECHNOLOGY
Brijesh Goyal1
, Pallavi Jain2
1,2
Student, Computer Science & Engineering, DCRUST, Haryana, India, vickyaggarwal28@gmail.com
Abstract
Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts
about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for
further empirical work in modeling cloud computing technologies
Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud Computing technology is On-demand network access
to a shared pool of computing resources. This access is
provided when online from a web-browser. The motive of
such access is to provide user a convenient work-place.
Cloud computing is a technology introduced to reduce
„Headache‟ on user-side.
Cloud computing is combination of two terms: Cloud &
Computing. Cloud is the Network. A network is a bulk of
thousands of users. These users may or may not be
connected. If they are connected, there will be one of model
formed, discussed further. The cloud also consists of Server
& a Database. Server is also known as Cloud-Provider;
while Database is a collection of user-details and
applications to be worked upon by users. Computing is the
term used for services of cloud.
Another main defining characteristic of cloud computing
technology is concluded in a phrase as
“User pays what he need”
2. OBJECTIVES
Our main objectives for the research are as follows:
 To understand the current state of knowledge in a
research area
o What is known/generally accepted
o What questions remain unanswered
o Where do conflicting results exist
 To show how the current research project is linked
to previous research (cumulative tradition).
 To summarize and synthesize previous research
 To critically analyze previous research: strengths
and weaknesses
 To learn from others and stimulate ideas
3. UNDERSTANDING ORIGIN OF CC
It is observed that Peer-to-peer computing cloud not be
introduced in Grid computing. So, Cluster computing was
collaborated with Client-Server computing, resulting into
emerging Cloud Computing.
Cloud computing components are infrastructure, softwares,
applications, business and humans (server/client). In other
words,
CC  Components + Services
Services provided are Easy-to-use, Fast-to-use and Ready-
to-use.
4. KEY FEATURES OF CC
A. No efforts from user side.
Installation, configuration, testing, running, securing,
updating are cloud provider headache not users‟.
B. Zero Maintenance for Client.
Web-store i.e. CC applications are maintained by cloud-
provider.
C. Open browser  login  customize application
 start using service
D. Least investment.
Enterprise pays for infrastructure and environment set up.
E. Reliable network.
F. Customizations preserved during upgrades
G. Flexibility in data manipulation
H. Fast application deployment.
I. Built-in security provided.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 365
5. BASIC PARAMETERS TO ESTABLISH CC
Before establishing cloud computing, some parameters are
decided to be covered. Above of all is empowering basic
customizations and integrations. Cloud computing should
also support Real-time reporting of failures. The technology
is categorized into sharing models.
As the cloud users exist globally, so multiple languages and
currency payments facility must also available.
Finally, comes the part of Security and Privacy. It is
managed by several strategies. It is the most basic property
of cloud computing technology, as success of large
Database storage establishment relies on security and
privacy rule-book only.
Ease-of-use decides level of cloud provided by any
enterprise.
6. CONCLUDING DEFINITIONS FOR CC
On-demand Self-service
It is stated that decisions for automated payments, resources
procured and disposed of by customer himself.
Resource Pooling
By using Virtualization technique, cloud provider pools
the computing resources. It is the best way to attract
clients towards particular cloud.
Broad network access
Some interfaces are standardized so as to make services
available over the network.
Calculated Services
Customer payment mode is available, which is based on
criteria of Pay-per-use.
7. MODELLING OF CLOUD COMPUTING
After years of debates, the resulted models categorized for
cloud technology are:
1) Delivery Models
a) Software-As-A-Service (SAAS)
b) Platform-As-A-Service (PAAS)
c) Interface-As-A-Service (IAAS)
 SAAS is a model where user can control some of
application configurations only.
 PAAS model is defined when user can control
deployment platform & some environment
configuration.
 IAAS model is where user can control Operating
System, storage and some networking components.
2) Development Models
d) Commercial cloud
e) Scientific cloud
f) Business cloud
 Commercial cloud is established where individual
use per cloud exists.
 Scientific cloud is based on Use of cloud for
particular field.
 Business cloud as per by name, relies only for
business strategies and development purposes.
There are more development models being categorized day
by day.
3) Deployment Models
g) Public cloud
h) Private cloud
i) Community cloud
j) Hybrid cloud
This is better way to categorize development models, as
these are based on Client-categorization.
Characteristics describing deployment models are:
who manages, who owns, where located & who
accesses.Table 1 shows a summary for 4 primary cloud
deployment models. This summary is not a categorization, it
is for initial modeling purposes.
 Public clouds are defined over very large scale. As per by
name shows, it is for general public so such clouds are
considered to be Untrusted. The users are not meant to be
member of organization providing cloud.
 Private clouds are established for single enterprise. Here the
users are considered to be trusted as they are tied into some
contractual agreement done before being member. “The
physical infrastructure may be owned by and/or physically
located in the organization‟s datacenters (on-premise) or
that of a designated service provider (off-premise) with an
extension of management and security control planes
controlled by the organization or designated service
provider respectively” (Bardin, Callas, Chaput et al. 2009)
 Community clouds have deployment characteristics similar
to Private clouds. Its users are also considered to be trusted.
But the difference come where the clients are divided into
some Specific groups called Communities.
 Hybrid clouds are combinations of public, private
or/and community clouds. These are connected to each other
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 366
through gateway. The highlight feature of hybrid is that
untrusted access to resources is strictly prohibited.
8. EXPLORING CLOUD COMPUTING TOOLS
AND PRODUCTS
Although Cloud computing technology is provided by
almost all corporate enterprises, still some of them are listed
as below:
IBM Blue-cloud Platform
Microsoft Live Meeting
Microsoft Share Point Online
TPlatform (TFS
Hadoop, VMWare, Eucalyptus
GoogleFileSystem (GFS)
KosmosFS
...and many more.
The reputed companies which provide online facility of
cloud computing are:
Google, Yahoo, IBM, Oracle, HP, HCL, TCS, Hitachi,
Netmagic, Novell VMWare, Ramco, Cognizant, CRMOrbit,
ZOHO.
TrendMicro, CSS and ZScaler are famous industries to
provide Cloud Security environment.
Amazon is one of leading company in Cloud Computing
providers. Amazon offers Virtual Private Clouds, that use
public cloud infrastructure in a private manner, connecting
the public cloud resources to the organizations internal
network (Amazon 2009b).
CONCLUSIONS
This paper gives a conclusion of our Review work on Cloud
Computing. CC is the latest technology used to provide
reliable platform for customers. No need to invest huge
money in setting up infrastructure. Enterprise and
companies pay for services based on client Usage. It‟s kind
of „money-back-guarantees‟. User has no worry about
Resource Management. Flexibility in data manipulation is
available. Collaboratively working on common projects.
Privacy and security satisfaction
Cloud computing preserves all customizations even during
Upgrades. Cloud Computing technology has one primary
demerit, it is that the OFFLINE access for CC is still not
possible.
FUTURE WORK
The paper gave brief view about all sorts of Cloud Models.
In future, deployment models can be introduces on basis of
Enhancement in Security of Database or Networks.
A proposal for „Protected Cloud‟ is being introduced here.
Next publication will be on the Protected Cloud Framework
by the same concerned Authors.
ACKNOWLEDGEMENTS
This work is partially supported by Capgemini Thesis works
(Guido Kok) May 24, 2010. The conclusion is given after
reviewing referenced papers and journals.
REFERENCES:
A list of all references is given as below. No citation
number is provided throughout this paper because each line
is concluded from these references.
[1] Dr. W. Pieters and Dr. P. H. Hartel “Cloud comuting
and confidentiality” thesis in Capgemini, Guido Kok,
May 24, 2010.
[2] Workshop on Cloud computing at IIT Madras, Chennai,
India on August 18-20, 2010 by IEEE.
[3] Amazon. (2009b). Amazon Virtual Private Cloud
(Amazon VPC). Retrieved December 28, 2009.
[4] AIS. (2009b). Journal of the Association for
Information Systems. Retrieved July 27, 2009.
[5] Kesh, S. and Ratnasingam, P. (2007). A knowledge
architecture for IT security. Communications of the
ACM.
[6] The Benefits of Cloud Computing by IBM, July, 2009.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 367
[7] NIST. (2004a). FIPS 199: Standards for Security
Categorization of Federal Information and Information
Systems. Retrieved August 28, 2009.
[8] NIST. (2009). National Institute of Standards and
Technology, main website. From http://www.nist.gov.
BIOGRAPHIES:
Brijesh Goyal M.Tech (Final Yr.)
Computer Science & Engineering Dept.
DCRUST, Murthal (Sonipat) Haryana,
India. e-mail:
vickyaggarwal28@gmail.com
Pallavi Jain M.Tech (Final Yr.)
Computer Science & Engineering Dept.
DCRUST, Murthal (Sonipat), Haryana,
India e-mail: palkujain13@gmail.com

More Related Content

What's hot

Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing reportANKIT KUMAR
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing reportErManish5
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 

What's hot (16)

Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
D32035052
D32035052D32035052
D32035052
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 

Viewers also liked

Matlab based comparative studies on selected mppt
Matlab based comparative studies on selected mpptMatlab based comparative studies on selected mppt
Matlab based comparative studies on selected mppteSAT Publishing House
 
Analysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims inAnalysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims ineSAT Publishing House
 
Analysis of methane diffusion flames
Analysis of methane diffusion flamesAnalysis of methane diffusion flames
Analysis of methane diffusion flameseSAT Publishing House
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...eSAT Publishing House
 
Resource potential appraisal assessment and to
Resource potential appraisal  assessment and toResource potential appraisal  assessment and to
Resource potential appraisal assessment and toeSAT Publishing House
 
Design of fuzzy logic controller for starch
Design of fuzzy logic controller for starchDesign of fuzzy logic controller for starch
Design of fuzzy logic controller for starcheSAT Publishing House
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding processeSAT Publishing House
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...eSAT Publishing House
 
Response sensitivity of the structure using vibration
Response sensitivity of the structure using vibrationResponse sensitivity of the structure using vibration
Response sensitivity of the structure using vibrationeSAT Publishing House
 
Performance comparison of row per slave and rows set
Performance comparison of row per slave and rows setPerformance comparison of row per slave and rows set
Performance comparison of row per slave and rows seteSAT Publishing House
 
Analysis of physical characteristics of bamboo
Analysis of physical characteristics of bambooAnalysis of physical characteristics of bamboo
Analysis of physical characteristics of bambooeSAT Publishing House
 
Effects of non ionized electromagnetic radiation on satellites
Effects of non ionized electromagnetic radiation on satellitesEffects of non ionized electromagnetic radiation on satellites
Effects of non ionized electromagnetic radiation on satelliteseSAT Publishing House
 
Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...eSAT Publishing House
 
A novel approach for efficient skull stripping using
A novel approach for efficient skull stripping usingA novel approach for efficient skull stripping using
A novel approach for efficient skull stripping usingeSAT Publishing House
 
Estimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikereEstimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikereeSAT Publishing House
 
Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...eSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
Biosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionsBiosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionseSAT Publishing House
 

Viewers also liked (20)

Matlab based comparative studies on selected mppt
Matlab based comparative studies on selected mpptMatlab based comparative studies on selected mppt
Matlab based comparative studies on selected mppt
 
Analysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims inAnalysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims in
 
Analysis of methane diffusion flames
Analysis of methane diffusion flamesAnalysis of methane diffusion flames
Analysis of methane diffusion flames
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...
 
Resource potential appraisal assessment and to
Resource potential appraisal  assessment and toResource potential appraisal  assessment and to
Resource potential appraisal assessment and to
 
Design of fuzzy logic controller for starch
Design of fuzzy logic controller for starchDesign of fuzzy logic controller for starch
Design of fuzzy logic controller for starch
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding process
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...
 
Response sensitivity of the structure using vibration
Response sensitivity of the structure using vibrationResponse sensitivity of the structure using vibration
Response sensitivity of the structure using vibration
 
Performance comparison of row per slave and rows set
Performance comparison of row per slave and rows setPerformance comparison of row per slave and rows set
Performance comparison of row per slave and rows set
 
Analysis of physical characteristics of bamboo
Analysis of physical characteristics of bambooAnalysis of physical characteristics of bamboo
Analysis of physical characteristics of bamboo
 
Effects of non ionized electromagnetic radiation on satellites
Effects of non ionized electromagnetic radiation on satellitesEffects of non ionized electromagnetic radiation on satellites
Effects of non ionized electromagnetic radiation on satellites
 
Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...
 
A novel approach for efficient skull stripping using
A novel approach for efficient skull stripping usingA novel approach for efficient skull stripping using
A novel approach for efficient skull stripping using
 
Estimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikereEstimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikere
 
Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...Technical engineering in industrial ippc as a key tool for ambient air qualit...
Technical engineering in industrial ippc as a key tool for ambient air qualit...
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
Biosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionsBiosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutions
 

Similar to Reminiscing cloud computing technology

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingCaner KAYA
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.IRJET Journal
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noidataramandal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computingJagan Mohan Bishoyi
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingcloudresearcher
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
 

Similar to Reminiscing cloud computing technology (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdfKamal Acharya
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptxfaamieahmd
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edgePaco Orozco
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdfKamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf884710SadaqatAli
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...Amil baba
 

Recently uploaded (20)

Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptx
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
 

Reminiscing cloud computing technology

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 364 REMINISCING CLOUD COMPUTING TECHNOLOGY Brijesh Goyal1 , Pallavi Jain2 1,2 Student, Computer Science & Engineering, DCRUST, Haryana, India, vickyaggarwal28@gmail.com Abstract Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for further empirical work in modeling cloud computing technologies Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud Computing technology is On-demand network access to a shared pool of computing resources. This access is provided when online from a web-browser. The motive of such access is to provide user a convenient work-place. Cloud computing is a technology introduced to reduce „Headache‟ on user-side. Cloud computing is combination of two terms: Cloud & Computing. Cloud is the Network. A network is a bulk of thousands of users. These users may or may not be connected. If they are connected, there will be one of model formed, discussed further. The cloud also consists of Server & a Database. Server is also known as Cloud-Provider; while Database is a collection of user-details and applications to be worked upon by users. Computing is the term used for services of cloud. Another main defining characteristic of cloud computing technology is concluded in a phrase as “User pays what he need” 2. OBJECTIVES Our main objectives for the research are as follows:  To understand the current state of knowledge in a research area o What is known/generally accepted o What questions remain unanswered o Where do conflicting results exist  To show how the current research project is linked to previous research (cumulative tradition).  To summarize and synthesize previous research  To critically analyze previous research: strengths and weaknesses  To learn from others and stimulate ideas 3. UNDERSTANDING ORIGIN OF CC It is observed that Peer-to-peer computing cloud not be introduced in Grid computing. So, Cluster computing was collaborated with Client-Server computing, resulting into emerging Cloud Computing. Cloud computing components are infrastructure, softwares, applications, business and humans (server/client). In other words, CC  Components + Services Services provided are Easy-to-use, Fast-to-use and Ready- to-use. 4. KEY FEATURES OF CC A. No efforts from user side. Installation, configuration, testing, running, securing, updating are cloud provider headache not users‟. B. Zero Maintenance for Client. Web-store i.e. CC applications are maintained by cloud- provider. C. Open browser  login  customize application  start using service D. Least investment. Enterprise pays for infrastructure and environment set up. E. Reliable network. F. Customizations preserved during upgrades G. Flexibility in data manipulation H. Fast application deployment. I. Built-in security provided.
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 365 5. BASIC PARAMETERS TO ESTABLISH CC Before establishing cloud computing, some parameters are decided to be covered. Above of all is empowering basic customizations and integrations. Cloud computing should also support Real-time reporting of failures. The technology is categorized into sharing models. As the cloud users exist globally, so multiple languages and currency payments facility must also available. Finally, comes the part of Security and Privacy. It is managed by several strategies. It is the most basic property of cloud computing technology, as success of large Database storage establishment relies on security and privacy rule-book only. Ease-of-use decides level of cloud provided by any enterprise. 6. CONCLUDING DEFINITIONS FOR CC On-demand Self-service It is stated that decisions for automated payments, resources procured and disposed of by customer himself. Resource Pooling By using Virtualization technique, cloud provider pools the computing resources. It is the best way to attract clients towards particular cloud. Broad network access Some interfaces are standardized so as to make services available over the network. Calculated Services Customer payment mode is available, which is based on criteria of Pay-per-use. 7. MODELLING OF CLOUD COMPUTING After years of debates, the resulted models categorized for cloud technology are: 1) Delivery Models a) Software-As-A-Service (SAAS) b) Platform-As-A-Service (PAAS) c) Interface-As-A-Service (IAAS)  SAAS is a model where user can control some of application configurations only.  PAAS model is defined when user can control deployment platform & some environment configuration.  IAAS model is where user can control Operating System, storage and some networking components. 2) Development Models d) Commercial cloud e) Scientific cloud f) Business cloud  Commercial cloud is established where individual use per cloud exists.  Scientific cloud is based on Use of cloud for particular field.  Business cloud as per by name, relies only for business strategies and development purposes. There are more development models being categorized day by day. 3) Deployment Models g) Public cloud h) Private cloud i) Community cloud j) Hybrid cloud This is better way to categorize development models, as these are based on Client-categorization. Characteristics describing deployment models are: who manages, who owns, where located & who accesses.Table 1 shows a summary for 4 primary cloud deployment models. This summary is not a categorization, it is for initial modeling purposes.  Public clouds are defined over very large scale. As per by name shows, it is for general public so such clouds are considered to be Untrusted. The users are not meant to be member of organization providing cloud.  Private clouds are established for single enterprise. Here the users are considered to be trusted as they are tied into some contractual agreement done before being member. “The physical infrastructure may be owned by and/or physically located in the organization‟s datacenters (on-premise) or that of a designated service provider (off-premise) with an extension of management and security control planes controlled by the organization or designated service provider respectively” (Bardin, Callas, Chaput et al. 2009)  Community clouds have deployment characteristics similar to Private clouds. Its users are also considered to be trusted. But the difference come where the clients are divided into some Specific groups called Communities.  Hybrid clouds are combinations of public, private or/and community clouds. These are connected to each other
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 366 through gateway. The highlight feature of hybrid is that untrusted access to resources is strictly prohibited. 8. EXPLORING CLOUD COMPUTING TOOLS AND PRODUCTS Although Cloud computing technology is provided by almost all corporate enterprises, still some of them are listed as below: IBM Blue-cloud Platform Microsoft Live Meeting Microsoft Share Point Online TPlatform (TFS Hadoop, VMWare, Eucalyptus GoogleFileSystem (GFS) KosmosFS ...and many more. The reputed companies which provide online facility of cloud computing are: Google, Yahoo, IBM, Oracle, HP, HCL, TCS, Hitachi, Netmagic, Novell VMWare, Ramco, Cognizant, CRMOrbit, ZOHO. TrendMicro, CSS and ZScaler are famous industries to provide Cloud Security environment. Amazon is one of leading company in Cloud Computing providers. Amazon offers Virtual Private Clouds, that use public cloud infrastructure in a private manner, connecting the public cloud resources to the organizations internal network (Amazon 2009b). CONCLUSIONS This paper gives a conclusion of our Review work on Cloud Computing. CC is the latest technology used to provide reliable platform for customers. No need to invest huge money in setting up infrastructure. Enterprise and companies pay for services based on client Usage. It‟s kind of „money-back-guarantees‟. User has no worry about Resource Management. Flexibility in data manipulation is available. Collaboratively working on common projects. Privacy and security satisfaction Cloud computing preserves all customizations even during Upgrades. Cloud Computing technology has one primary demerit, it is that the OFFLINE access for CC is still not possible. FUTURE WORK The paper gave brief view about all sorts of Cloud Models. In future, deployment models can be introduces on basis of Enhancement in Security of Database or Networks. A proposal for „Protected Cloud‟ is being introduced here. Next publication will be on the Protected Cloud Framework by the same concerned Authors. ACKNOWLEDGEMENTS This work is partially supported by Capgemini Thesis works (Guido Kok) May 24, 2010. The conclusion is given after reviewing referenced papers and journals. REFERENCES: A list of all references is given as below. No citation number is provided throughout this paper because each line is concluded from these references. [1] Dr. W. Pieters and Dr. P. H. Hartel “Cloud comuting and confidentiality” thesis in Capgemini, Guido Kok, May 24, 2010. [2] Workshop on Cloud computing at IIT Madras, Chennai, India on August 18-20, 2010 by IEEE. [3] Amazon. (2009b). Amazon Virtual Private Cloud (Amazon VPC). Retrieved December 28, 2009. [4] AIS. (2009b). Journal of the Association for Information Systems. Retrieved July 27, 2009. [5] Kesh, S. and Ratnasingam, P. (2007). A knowledge architecture for IT security. Communications of the ACM. [6] The Benefits of Cloud Computing by IBM, July, 2009.
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 367 [7] NIST. (2004a). FIPS 199: Standards for Security Categorization of Federal Information and Information Systems. Retrieved August 28, 2009. [8] NIST. (2009). National Institute of Standards and Technology, main website. From http://www.nist.gov. BIOGRAPHIES: Brijesh Goyal M.Tech (Final Yr.) Computer Science & Engineering Dept. DCRUST, Murthal (Sonipat) Haryana, India. e-mail: vickyaggarwal28@gmail.com Pallavi Jain M.Tech (Final Yr.) Computer Science & Engineering Dept. DCRUST, Murthal (Sonipat), Haryana, India e-mail: palkujain13@gmail.com