Cloud Computing an Emerging Technology

ISSN-2349-1841(Online)
Volume 1, Issue 2, March 2015
International Journal of Research Development
& Innovation (IJRDI)
Research paper
Available online at: www.ijrdi.com
Cloud Computing an Emerging Technology
Er.Sunita Rani
A.P & COD in CSE Department
Universal Institute of Engineering & Technology, Lalru
Abstract: Cloud computing is a latest technology that
delivers services to the users remotely over the internet. It
eliminates the need of installation of expensive hardware
devices or software's on the local computer as it provides
services to the customers like platform as a service,
infrastructure as a service and software as a service,. So it
provides a very convenient and efficient methodology to
customers to obtain and access resources from this
disruptive technology. It is capable to enhance the
servicers that are used by the users agility, availability of
services, scaling etc.
This paper represents the review over the cloud
computing that is being used in various fields in order to
enhance the productivity, capability of the services over
internet along with the technical aspects of cloud
computing and their research efforts.
Keywords: SaaS,PaaS,IaaS, Cloud platform, Cloud
Computing.
1.Introduction: Cloud Computing uses the internet and
central remote servers to maintain all the data and
application programs as without the need of installing the
applications or hardware on the local computer users can
access their personal files at any computer over the internet.
This emerging technology provides more capable
computing by centralizing data storage, processing,
managing of services, bandwidth etc. [1].
In 1997, Professor Ramnath Chellapa from Emory
University and from South California university defined
cloud computing as the new “computing paradigm where
the boundaries of computing will be determined by
economic foundation only rather than technical restrictions
individually”. And later on that concept has considered as
the concept of cloud platform that we are using now a
days. [1].
2005 was also a noteworthy year for cloud computing in the
hedge fund industry as Eze Castle Integration built and
deployed the first hosted cloud platform at a large
All Rights Reserved
circumvent fund, Eze Castle opened its hedge circumvent
hotel in New York City that combined a cloud computing
environment with fully managed office suites. The cloud
environment supported 200+ users and was the early
foundation for what today is the Eze Private Cloud.In 2009,
Eze Castle productized its cloud infrastructure and officially
launched the Eze Private Cloud that has been delivering a
complete hosted IT platform for all circumvent funds. In the
year of 2010 more than 30 applications were successively
operating in the Eze Private Cloud. Presently more than 60
applications run in the Eze Private Cloud [1]. In the Present
days, cloud reaching nearly a exabyte of data, escalating to
data centers in different countries such as London and San
Francisco and supporting over 130 circumvent funds.In
2013, Cloud user reaches more than 2,500.[2]
So cloud computing is an advanced emerging technology
that provides the following benefits:
 It has the capability to enhance the accessibility of
services anytime, anywhere over the internet.
 Hardware/Software cost is reduced as there is no
need to install hardware or software personally in
order to use services. you can use pay on demand
as per requirement.
 Less manpower is required as more work is
possible less number of people.
 Productivity of the services as well as work is
increased.
 Projects are more effectively monitored by staying
within the budget.

Scalability is dynamic in nature so ultimately uses
of services over the internet is improved.
2. General structure of Cloud computing: Basically cloud
computing includes three type of services to the users that
are given below:
a) Iaas (Infrastructure as a service)
b) Paas (Platform as a service)
c) Saas (Service as a service)
P a g e | 58
Sunita Rani
www.ijrdi.com
International Journal of Research Development & Innovation (IJRDI)
Volume 1, Issue 2, March 2015, Pg. 58-62
There are four kinds of deployment models in cloud
computing that are given below:[5]
a) Public Cloud: where services of the cloud
computing is accessible for general public usage.
b) Private Cloud: In this type of cloud, services are
permitted only for a particular organization by
providing security to the organization also.
c) Community Cloud: Where cloud services are
shared by several organizations by setting up
requirements.
d) Hybrid Cloud: It is a mixture of above three
clouds that means general services of the cloud
computing are publically accessible to users and
sensitive information is accessible only within a
particular organization.
Iaas(Infrastructure as a service)
Paas (Platform as a service)
Saas (Service as a service)
Public
Cloud
Private
Cloud
Hybrid Cloud
Community
Cloud
Figure 1: Cloud Services and Deployment Services
Cloud clients can efficiently use services provided by cloud
computing without permanently installing hardware
/Software on their personal systems by using pay on
demand feature of the cloud computing.
General structure for cloud computing is given below:
All Rights Reserved
Figure 2: Structure of Cloud computing [2]
1) Iaas (Infrastructure as a service): Infrastructure
as a Service is a provision model in which an
organization outsources the equipment used to
sustain operations, including storage capacity,
networking components, hardware components,
servers and networking components. But on the
other hand, in traditional data storage infrastructure
where files accesses happens remotely over a
network that is built on an object-based storage
platform. Access to object-based storage is
provided through a Web services application
programming interface that is based on the Simple
Object Access Protocol.[2]
For example: Amazon's EC2.
2) Paas (Platform as a service):It is that type of
service by which a user can buy hardware device,
storage capacity as per their requirement over the
internet.
For example: Window Azure , Google's apps
Engine.
3) Saas(Software as a service): Users can also use
application software without installing on their
personal systems as per the demand over the
internet.
For example: Gmail, Google Docs etc.
This condition has led to the emergence of a mobile cloud
computing paradigm. Mobile cloud facilities allow users to
outsource tasks to external service providers. For example,
data can be processed and stored outside of a mobile device
[3].
P a g e | 59
Sunita Rani
www.ijrdi.com
International Journal of Research Development & Innovation (IJRDI)
Volume 1, Issue 2, March 2015, Pg. 58-62
4) Application: Cloud computing also acts as an
application program that functions in the cloud
along with some features of a pure desktop app that
resides entirely on a single device at the location of
a user and some features of a pure Web app that is
stored entirely on a remote server and is delivered
over the Internet through a browser interface.[2]
5) Cloud Clients :Cloud computing services has
accessed by the users using networking over the
client devices, such as personal computers,
notepads, notebooks, tablets, smart phones etc.
Some of these devices – cloud clients – rely on
cloud computing for all or a majority of their
applications so as to be essentially useless without
it. Many cloud applications do not require specific
software on the client side rather these applications
use a web browser to interact with the cloud
application. However, Some cloud applications,
support some specific client software dedicated to
these applications.[2]
3. Measurement Area for the Quality of cloud services:
Quality evaluation measurement tools for existing IT
infrastructure system have already been developed and
being operated for the internet services such as in the area of
software quality to consider common issues such as lack of
compatibility between different types of computers and
models, lack of portability to other systems, familiarity of
emphasizing user expediency, issues of users learning about
the software and software product trouble and in the area of
network, objective and fair information on internet quality is
being provided to users through internet speed test, internet
phone test, path tracking test and web surfing connection
test.
If we talk about the quality services of cloud computing,
however, international cloud services such as CloudHamony
and CloudSleuth are providing performance measurement &
monitoring results for certain areas of cloud providing
services, and quality evaluation system may be established
through monitoring & quality requirements deduction that is
automated in the virtualization layer that is the most unique
feature of cloud based services. [4].
Figure 3 shows the areas that consist of cloud system which
allows quality measurement & monitoring and quality
requirements deduction in areas such as specialized network
performance, overall system performance including
security. It also includes service performance and SLA
compliance of cloud service infrastructure system
differentiated from non-cloud service infrastructure system
[4]. So it clearly monitors approximately all the areas of
performance issues which focus on the use of cloud services
and quality of the services .Figure following this concept is
given below:
All Rights Reserved
Figure 3: Area for Measuring the Quality of cloud services
[4]
4. MAIN ISSUES IN CLOUD COMPUTING
1.Less Human Efforts: The provision of computing
capabilities to the customers without requiring any human
interaction.
2. Broader Network Access: Broad network access from
heterogeneous client platforms that makes cloud computing
services more effective.
3. Pay on Demand: A measured service allowing for a payper-use business model.
Although cloud computing provides many benefits to the
clients but still many shortcomings are there while using
cloud computing services some of those issues are given
below:
• Security, privacy and confidence: Since the data can be
distributed on different
servers, and ‘out of the control’ of the customer but still
there is a need of managing
hardware services for computing with encoded data by
using accurate, robust and efficient methods.
Also, in order to increase the assurance of the user, different
types of audits and certifications of the security should be
performed.[7]
P a g e | 60
Sunita Rani
www.ijrdi.com
International Journal of Research Development & Innovation (IJRDI)
Volume 1, Issue 2, March 2015, Pg. 58-62
• Availability, fault tolerance and recovery: Cloud
computing guarantees the availability of the services any
time (24 × 7)
with the use of redundant systems and to avoid net traffic
overflow.[7]
• Scalability: In order to become accustomed with the
necessary resources to the changing demands of the user by
providing an intelligent resource management, an effective
monitoring must be used to identify a priori the usage
patterns and to predict the load in order to optimize the
scheduling.[7]
• Electronic efficiency: It is also required to reduce the
electric charge by using microprocessors with a lower
energy consumption and adaptable in their use.[7]
Security infrastructure of cloud computing is given below:
Network
Security
Physical
Security
Resource
Security
Preliminary
Security
Monitoring
Security
Figure 4: Cloud Security Infrastructure [2]
Malicious insiders: The threat of malicious insiders is
increased for users of cloud services due to convergence of
IT services and users under a single management provider.
Clients that are using cloud services often do not have
visibility into how a service provider permits employees
access to various resources such as virtual or physical
resources, how to provide services by hiring and monitoring
employees and how it is able to handle policy compliance.
Sharing issues: If we talk about sharing, it is very
important aspect of cloud computing is to premise of
sharing all the fundamental infrastructure components. And
if it does not work properly i.e. security requirements and
protocols are not integrated into the shared infrastructure at
multiple levels (i.e. computing resources, hardware, storage
All Rights Reserved
capacity and networking) then in that case vulnerabilities
could exist. This is particularly crucial aspect to keep this
matter in mind when evaluating public cloud services,
through which there can be limited segregation.
Data loss or leakage: It is very importantto the data safe as
any organization will not accept to leakage of their sensitive
information or data and the impact is comprehensive. If we
consider traditional on-premise environments, threats in the
cloud system may include accidental deletion or updation of
data, unauthorized access or database corruption. It is
mandatory to have strong methodology to secure the
sensitive information, as well as data encryption and data
protection processes.
Unknown risks: Another type of risk, which may lead to an
organization to accept unknown risks, is lack of knowledge
of a cloud service provider’s security protocols and policies.
It is very important to take care about a cloud service
provider’s security policies, softwares, update and patch
procedures, intrusion detection and indicating the overall
security design.[2]
5. Summary:
So cloud computing is an emerging technology that
provides services to the cloud clients very efficiently at any
time over the internet. Data size on the cloud servers is too
much huge and increasing day by day. We have discussed in
this paper the general structure of cloud computing, cloud
deployment models, types of services provided by cloud
computing,
issues in cloud computing, security
infrastructure in the cloud computing, measurement areas of
quality services and basic agenda in present services over
the internet. This provides a guideline to the researchers for
insisting to take decisions on present practical issues over
the internet.
REFERENCES
[1]. John Rhoton, “Cloud Computing Explained:
Implementation Handbook for Enterprises”,2013.
[2]. Prakash Kuppuswamy* Saeed Q Y AlKhalidi,"ANALYSIS OF SECURITY THREATS AND
PREVENTION
IN
CLOUD
STORAGE:REVIEW
REPORT",International Journal of Advanced Research in
Engineering and Applied Sciences,2014,ISSN:2278-6252
P a g e | 61
Sunita Rani
www.ijrdi.com
International Journal of Research Development & Innovation (IJRDI)
Volume 1, Issue 2, March 2015, Pg. 58-62
[3].N.Fernando,S.W.Loke,W.Rahayu,"Mobile
cloud
computing :a survey,Futu.Gener.Comput.syst.29,2013,84106.
[4]. Byung Do Chung1, Hangoo Jeon2 and Kwang-Kyu
Seo," A Framework of Cloud service Quality Evaluation
System
–
Focusing
on
Security
Quality
Evaluation",(2014),pp-41-46.
[5]. Ilango Sriram, Ali Khajeh-Hosseini,"Research Agenda
in Cloud Technologies".
[6]. Md. Imran Alam,Manjusha Pandey, Siddharth S
Rautaray,"Comprehensive
Survey
on
Cloud
Computing",2015,02,68-79.
[7]. Alberto Fernández, Daniel Peralta, José Manuel
Benítez and Francisco Herrera, "E-learning and educational
data mining in cloud computing: an overview",2014.
[8]. Richard Branch, Heather Tjeerdsma, Cody Wilson,
Richard Hurley, Sabine McConnell," Cloud Computing and
Big Data: A Review of Current Service Models and
Hardware Perspectives", Journal of Software Engineering
and Applications, 2014, 7, 686-693.
[9]. Shucheng Yu, Cong Wang†, Kui Ren† , and Wenjing
Lou," Achieving Secure, Scalable, and Fine-grained Data
Access Control in Cloud Computing,IEEE,2010.
[10]. Dillon, T., Wu, C. and Chang, E. (2010) Cloud
Computing: Issues and Challenges. Proceedings of the 24th
IEEE International Conference on Advanced Information
Networking and Applications (AINA), Perth, 20-23 April
2010, 27-33.
[11]. Ronak Patel, Sanjay Patel. Survey on Resource
Allocation Strategies in Cloud Computing. IJERT Vol. 2
Issue 2 Feb 2013, ISSN: 2278-0181.
[12]. Rodrigo N. Calheiros_, Rajiv Ranjany, and Rajkumar
Buyya," Virtual Machine Provisioning Based on Analytical
Performance and QoS in Cloud Computing
Environments",IEEE,2010.
All Rights Reserved
P a g e | 62