ISSN-2349-1841(Online) Volume 1, Issue 2, March 2015 International Journal of Research Development & Innovation (IJRDI) Research paper Available online at: www.ijrdi.com Cloud Computing an Emerging Technology Er.Sunita Rani A.P & COD in CSE Department Universal Institute of Engineering & Technology, Lalru Abstract: Cloud computing is a latest technology that delivers services to the users remotely over the internet. It eliminates the need of installation of expensive hardware devices or software's on the local computer as it provides services to the customers like platform as a service, infrastructure as a service and software as a service,. So it provides a very convenient and efficient methodology to customers to obtain and access resources from this disruptive technology. It is capable to enhance the servicers that are used by the users agility, availability of services, scaling etc. This paper represents the review over the cloud computing that is being used in various fields in order to enhance the productivity, capability of the services over internet along with the technical aspects of cloud computing and their research efforts. Keywords: SaaS,PaaS,IaaS, Cloud platform, Cloud Computing. 1.Introduction: Cloud Computing uses the internet and central remote servers to maintain all the data and application programs as without the need of installing the applications or hardware on the local computer users can access their personal files at any computer over the internet. This emerging technology provides more capable computing by centralizing data storage, processing, managing of services, bandwidth etc. [1]. In 1997, Professor Ramnath Chellapa from Emory University and from South California university defined cloud computing as the new “computing paradigm where the boundaries of computing will be determined by economic foundation only rather than technical restrictions individually”. And later on that concept has considered as the concept of cloud platform that we are using now a days. [1]. 2005 was also a noteworthy year for cloud computing in the hedge fund industry as Eze Castle Integration built and deployed the first hosted cloud platform at a large All Rights Reserved circumvent fund, Eze Castle opened its hedge circumvent hotel in New York City that combined a cloud computing environment with fully managed office suites. The cloud environment supported 200+ users and was the early foundation for what today is the Eze Private Cloud.In 2009, Eze Castle productized its cloud infrastructure and officially launched the Eze Private Cloud that has been delivering a complete hosted IT platform for all circumvent funds. In the year of 2010 more than 30 applications were successively operating in the Eze Private Cloud. Presently more than 60 applications run in the Eze Private Cloud [1]. In the Present days, cloud reaching nearly a exabyte of data, escalating to data centers in different countries such as London and San Francisco and supporting over 130 circumvent funds.In 2013, Cloud user reaches more than 2,500.[2] So cloud computing is an advanced emerging technology that provides the following benefits: It has the capability to enhance the accessibility of services anytime, anywhere over the internet. Hardware/Software cost is reduced as there is no need to install hardware or software personally in order to use services. you can use pay on demand as per requirement. Less manpower is required as more work is possible less number of people. Productivity of the services as well as work is increased. Projects are more effectively monitored by staying within the budget. Scalability is dynamic in nature so ultimately uses of services over the internet is improved. 2. General structure of Cloud computing: Basically cloud computing includes three type of services to the users that are given below: a) Iaas (Infrastructure as a service) b) Paas (Platform as a service) c) Saas (Service as a service) P a g e | 58 Sunita Rani www.ijrdi.com International Journal of Research Development & Innovation (IJRDI) Volume 1, Issue 2, March 2015, Pg. 58-62 There are four kinds of deployment models in cloud computing that are given below:[5] a) Public Cloud: where services of the cloud computing is accessible for general public usage. b) Private Cloud: In this type of cloud, services are permitted only for a particular organization by providing security to the organization also. c) Community Cloud: Where cloud services are shared by several organizations by setting up requirements. d) Hybrid Cloud: It is a mixture of above three clouds that means general services of the cloud computing are publically accessible to users and sensitive information is accessible only within a particular organization. Iaas(Infrastructure as a service) Paas (Platform as a service) Saas (Service as a service) Public Cloud Private Cloud Hybrid Cloud Community Cloud Figure 1: Cloud Services and Deployment Services Cloud clients can efficiently use services provided by cloud computing without permanently installing hardware /Software on their personal systems by using pay on demand feature of the cloud computing. General structure for cloud computing is given below: All Rights Reserved Figure 2: Structure of Cloud computing [2] 1) Iaas (Infrastructure as a service): Infrastructure as a Service is a provision model in which an organization outsources the equipment used to sustain operations, including storage capacity, networking components, hardware components, servers and networking components. But on the other hand, in traditional data storage infrastructure where files accesses happens remotely over a network that is built on an object-based storage platform. Access to object-based storage is provided through a Web services application programming interface that is based on the Simple Object Access Protocol.[2] For example: Amazon's EC2. 2) Paas (Platform as a service):It is that type of service by which a user can buy hardware device, storage capacity as per their requirement over the internet. For example: Window Azure , Google's apps Engine. 3) Saas(Software as a service): Users can also use application software without installing on their personal systems as per the demand over the internet. For example: Gmail, Google Docs etc. This condition has led to the emergence of a mobile cloud computing paradigm. Mobile cloud facilities allow users to outsource tasks to external service providers. For example, data can be processed and stored outside of a mobile device [3]. P a g e | 59 Sunita Rani www.ijrdi.com International Journal of Research Development & Innovation (IJRDI) Volume 1, Issue 2, March 2015, Pg. 58-62 4) Application: Cloud computing also acts as an application program that functions in the cloud along with some features of a pure desktop app that resides entirely on a single device at the location of a user and some features of a pure Web app that is stored entirely on a remote server and is delivered over the Internet through a browser interface.[2] 5) Cloud Clients :Cloud computing services has accessed by the users using networking over the client devices, such as personal computers, notepads, notebooks, tablets, smart phones etc. Some of these devices – cloud clients – rely on cloud computing for all or a majority of their applications so as to be essentially useless without it. Many cloud applications do not require specific software on the client side rather these applications use a web browser to interact with the cloud application. However, Some cloud applications, support some specific client software dedicated to these applications.[2] 3. Measurement Area for the Quality of cloud services: Quality evaluation measurement tools for existing IT infrastructure system have already been developed and being operated for the internet services such as in the area of software quality to consider common issues such as lack of compatibility between different types of computers and models, lack of portability to other systems, familiarity of emphasizing user expediency, issues of users learning about the software and software product trouble and in the area of network, objective and fair information on internet quality is being provided to users through internet speed test, internet phone test, path tracking test and web surfing connection test. If we talk about the quality services of cloud computing, however, international cloud services such as CloudHamony and CloudSleuth are providing performance measurement & monitoring results for certain areas of cloud providing services, and quality evaluation system may be established through monitoring & quality requirements deduction that is automated in the virtualization layer that is the most unique feature of cloud based services. [4]. Figure 3 shows the areas that consist of cloud system which allows quality measurement & monitoring and quality requirements deduction in areas such as specialized network performance, overall system performance including security. It also includes service performance and SLA compliance of cloud service infrastructure system differentiated from non-cloud service infrastructure system [4]. So it clearly monitors approximately all the areas of performance issues which focus on the use of cloud services and quality of the services .Figure following this concept is given below: All Rights Reserved Figure 3: Area for Measuring the Quality of cloud services [4] 4. MAIN ISSUES IN CLOUD COMPUTING 1.Less Human Efforts: The provision of computing capabilities to the customers without requiring any human interaction. 2. Broader Network Access: Broad network access from heterogeneous client platforms that makes cloud computing services more effective. 3. Pay on Demand: A measured service allowing for a payper-use business model. Although cloud computing provides many benefits to the clients but still many shortcomings are there while using cloud computing services some of those issues are given below: • Security, privacy and confidence: Since the data can be distributed on different servers, and ‘out of the control’ of the customer but still there is a need of managing hardware services for computing with encoded data by using accurate, robust and efficient methods. Also, in order to increase the assurance of the user, different types of audits and certifications of the security should be performed.[7] P a g e | 60 Sunita Rani www.ijrdi.com International Journal of Research Development & Innovation (IJRDI) Volume 1, Issue 2, March 2015, Pg. 58-62 • Availability, fault tolerance and recovery: Cloud computing guarantees the availability of the services any time (24 × 7) with the use of redundant systems and to avoid net traffic overflow.[7] • Scalability: In order to become accustomed with the necessary resources to the changing demands of the user by providing an intelligent resource management, an effective monitoring must be used to identify a priori the usage patterns and to predict the load in order to optimize the scheduling.[7] • Electronic efficiency: It is also required to reduce the electric charge by using microprocessors with a lower energy consumption and adaptable in their use.[7] Security infrastructure of cloud computing is given below: Network Security Physical Security Resource Security Preliminary Security Monitoring Security Figure 4: Cloud Security Infrastructure [2] Malicious insiders: The threat of malicious insiders is increased for users of cloud services due to convergence of IT services and users under a single management provider. Clients that are using cloud services often do not have visibility into how a service provider permits employees access to various resources such as virtual or physical resources, how to provide services by hiring and monitoring employees and how it is able to handle policy compliance. Sharing issues: If we talk about sharing, it is very important aspect of cloud computing is to premise of sharing all the fundamental infrastructure components. And if it does not work properly i.e. security requirements and protocols are not integrated into the shared infrastructure at multiple levels (i.e. computing resources, hardware, storage All Rights Reserved capacity and networking) then in that case vulnerabilities could exist. This is particularly crucial aspect to keep this matter in mind when evaluating public cloud services, through which there can be limited segregation. Data loss or leakage: It is very importantto the data safe as any organization will not accept to leakage of their sensitive information or data and the impact is comprehensive. If we consider traditional on-premise environments, threats in the cloud system may include accidental deletion or updation of data, unauthorized access or database corruption. It is mandatory to have strong methodology to secure the sensitive information, as well as data encryption and data protection processes. Unknown risks: Another type of risk, which may lead to an organization to accept unknown risks, is lack of knowledge of a cloud service provider’s security protocols and policies. It is very important to take care about a cloud service provider’s security policies, softwares, update and patch procedures, intrusion detection and indicating the overall security design.[2] 5. Summary: So cloud computing is an emerging technology that provides services to the cloud clients very efficiently at any time over the internet. Data size on the cloud servers is too much huge and increasing day by day. We have discussed in this paper the general structure of cloud computing, cloud deployment models, types of services provided by cloud computing, issues in cloud computing, security infrastructure in the cloud computing, measurement areas of quality services and basic agenda in present services over the internet. This provides a guideline to the researchers for insisting to take decisions on present practical issues over the internet. REFERENCES [1]. John Rhoton, “Cloud Computing Explained: Implementation Handbook for Enterprises”,2013. [2]. Prakash Kuppuswamy* Saeed Q Y AlKhalidi,"ANALYSIS OF SECURITY THREATS AND PREVENTION IN CLOUD STORAGE:REVIEW REPORT",International Journal of Advanced Research in Engineering and Applied Sciences,2014,ISSN:2278-6252 P a g e | 61 Sunita Rani www.ijrdi.com International Journal of Research Development & Innovation (IJRDI) Volume 1, Issue 2, March 2015, Pg. 58-62 [3].N.Fernando,S.W.Loke,W.Rahayu,"Mobile cloud computing :a survey,Futu.Gener.Comput.syst.29,2013,84106. [4]. Byung Do Chung1, Hangoo Jeon2 and Kwang-Kyu Seo," A Framework of Cloud service Quality Evaluation System – Focusing on Security Quality Evaluation",(2014),pp-41-46. [5]. Ilango Sriram, Ali Khajeh-Hosseini,"Research Agenda in Cloud Technologies". [6]. Md. Imran Alam,Manjusha Pandey, Siddharth S Rautaray,"Comprehensive Survey on Cloud Computing",2015,02,68-79. [7]. Alberto Fernández, Daniel Peralta, José Manuel Benítez and Francisco Herrera, "E-learning and educational data mining in cloud computing: an overview",2014. [8]. Richard Branch, Heather Tjeerdsma, Cody Wilson, Richard Hurley, Sabine McConnell," Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives", Journal of Software Engineering and Applications, 2014, 7, 686-693. [9]. Shucheng Yu, Cong Wang†, Kui Ren† , and Wenjing Lou," Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,IEEE,2010. [10]. Dillon, T., Wu, C. and Chang, E. (2010) Cloud Computing: Issues and Challenges. Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), Perth, 20-23 April 2010, 27-33. [11]. Ronak Patel, Sanjay Patel. Survey on Resource Allocation Strategies in Cloud Computing. IJERT Vol. 2 Issue 2 Feb 2013, ISSN: 2278-0181. [12]. Rodrigo N. Calheiros_, Rajiv Ranjany, and Rajkumar Buyya," Virtual Machine Provisioning Based on Analytical Performance and QoS in Cloud Computing Environments",IEEE,2010. All Rights Reserved P a g e | 62
© Copyright 2024