SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 40-43
www.iosrjournals.org
DOI: 10.9790/0661-17324043 www.iosrjournals.org 40 | Page
Cloud Computing: Overview & Utility
Ruchi P. Shirsat1
, Pallavi P. Deshpande2
1
(Electronics and Telecommunication, BabasahebGawde Institute of Technology/MSBTE, India)
2
(Electronics and Telecommunication, BabasahebGawde Institute of Technology/MSBTE, India)
Abstract: Cloud computing enables the process of storing documents, files photos online instead of using home
computer, or webmail or a social networking site. If in an organization, it is desired to use an online invoicing
service instead of updating the in-house one, which has been used since many years, then that online invoicing
service is a “cloud computing” service.
This paper briefs about Cloud computing that refers to the delivery of computing resources over the Internet.
Also instead of keeping data on one’s own hard drive or updating applications for one’s needs, it is suggested to
use a service over the Internet, at another location, to store the information or use its applications.
Keyword: cloud, online, internet, virtualization, data centre, business application
I. Introduction
Cloud computing is a new pattern of computing service, and it transforms the processor, storage device
and other physical resources on Internet to virtual resources which is expandable and can be shared. The
traditional computing mode puts the computing task on the local computer or the remote server, while the cloud
computing distributes the computing task on the massive distributed computers which constitute the enterprise's
data storage and processing centre (i.e. Data Centre). Cloud computing is a kind of pay-per-use service pattern,
which enables the enterprise to switch the needed resources for application and visit computing service and
memory system according to the demand. Computing and storage tasks are given to the cloud computing service
provider, which can reduce the computing and storage burden of the users computing device and enhance the
enterprise resources utility and computing efficiency.
The following definition of cloud computing has been developed by the U.S. National Institute of
Standards and Technology (NIST):
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or service provider interaction. This cloud
model promotes availability and is composed of five essential characteristics, three service models, and four
deployment models.
At present, this emerging service pattern of cloud computing develops rapidly, all kinds of
manufacturers are developing different cloud computing services, the security problem in cloud computing
gradually becomes a problem urgently waiting to research. While cloud computing reduces the enterprise and
user’s computing and storage burden, it also imports security problem into the cloud, how to guarantee the
security of important data and computing task in cloud computing by means of different kinds of security
mechanisms becomes important research content of cloud computing.
At the foundation it is broader concept of infrastructure storage and share services. This type of Data
centreenvironment allows enterprises to get applications up and running faster with easier manageability and
less maintenance and enables IT to more rapidly adjust IT resources such as servers, storage and networking to
meet fluctuating and unpredictable business demands. Most cloud computing infrastructure consists of services
delivered through shared data centres and appearing as single point of access for consumers computing needs.
Commercial offerings may be required to meet service-level agreements (SLA), but specific terms are less often
negotiatedby smaller companies.
Comparison: Cloud computing characteristics- [2]
Autonomic
Computing
Client – server
model
Grid computing Utility computing Mainframe
computer
Peer – to – peer
computer system
capable of self-
management
Client server
computer refers
broadly to any
distributed
application that
distinguish between
service providers
A form of
distributed and
parallel computing,
where by a super
and virtual
computers is
composed of a
The packaging of
computing
resources such as
computation and
storage as a metered
service similar to a
traditional public
Powerful computer
used mainly by
large organisations
for critical
applications
typically bulky data
processing such as
Distributed
architecture without
the need for central
coordination with
participants being at
the same time both
suppliers and
Cloud Computing: Overview & Utility
DOI: 10.9790/0661-17324043 www.iosrjournals.org 41 | Page
(servers) and service
requesters (clients)
cluster of
networked, loosely
coupled computers
acting in concert to
perform very large
tasks
utility such as
electricity.
census, industry and
consumer statistics,
policies and secret
intelligence
services, enterprise
resource planning
etc.
consumers of
resources.
Various Models Of Cloud Computing:-[2]
There are certain services and models working behind the scene making the cloud computing feasible and
accessible to end users. Following are the working models for cloud computing:
Service models:
Cloud computing offers both the software and hardware as a service over the internet. Some product
offer internet based services such as storage, middleware, collaborations and database capabilities directly to
users. These services are classified into three major categories.
Software as a service (SaaS) – It provides a complete turnkey application including complex program such as
those for CRM or enterprises resource management via internet. These software services are delivered through
web browsers to its user as a service on demand to use software as service through cloud computing, users just
request for the service of a particular software to its vendor and the vendor will provide the services of software
to its users. End user is not concerned about the software licensing and other issues related to the genuineness of
the software that he is using.
Advantages – Pay per use, instant scalability, security, reliability, No need of specific hardware to run software.
Examples – financial planning, CRM, Human Resources, word processing, email cloud.
Platform as a service (PaaS) – It offers a full or partial development environment that users can access and
utilize online, even in collaboration with others. It dramatically changed the scenario of development,
deployment and run process of business applications. As the core element of cloud computing, PaaS eliminates
the costs and complexity of evaluating, buying, configuring and managing all the hardware and software needed
for enterprise applications.
Popular services – Storage, Database and scalability
Advantages - pay per use, reliability, instant scalability, no need to buy special hardware and software to
develop and deploy enterprises applications, security.
Infrastructure as a service (Iaas) – It delivers full computer infrastructure via internet. It is main service
model of cloud computing. Infrastructure as a service is sometimes referred to as Hardware as a service (HaaS).
It is a provision model in which organization outsources the equipment used to support operations, including
storage, hardware, servers and networking components. The service provider owns the equipment and is
responsible for housing, running and maintaining it. The client typically pays on per-use basis. Access to
infrastructure stack includes full OS access, firewalls, routers, load balancing etc services.
Advantages – Pay per use, instant scalability, security, reliability, APIs etc.
Examples- AWS:EC2, FLexiscale etc.
Deployment models
Cloud services are typically made available via a private cloud, community cloud, public cloud or
hybrid cloud.
Services provided by a public cloud are offered over the Internet and are owned and operated by a cloud
provider. Some examples include services aimed at the general public, such as online photo storage services, e-
mail services, or social networking sites. However, services for enterprises can also be offered in a public cloud.
In a private cloud, the cloud infrastructure is operated solely for a specific organization, and is managed by the
organization or a third party.
In a community cloud, the service is shared by several organizations and made available only to those
groups. The infrastructure may be owned and operated by the organizations or by a cloud service
provider.Ahybrid cloud is a combination of different methods of resource pooling (for example, combining
public and community clouds).
Characteristics-[1]
Cloud computing exhibits the following key characteristics:
Cloud Computing: Overview & Utility
DOI: 10.9790/0661-17324043 www.iosrjournals.org 42 | Page
1) Empowerment of end users of computing resources by putting the provisioning of those resources in their
own control, as opposed to the control of centralised IT service. Agility improves with users ability to re-
provision technological infrastructure resources.
2) Application programming interface (API) accessibility to software that enables machines to interface
facilitates interaction between humans and computers. Cloud computing systems typically use REST –
based APIs.
3) Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to
operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically provided
by a third party and does not need to be purchased for one-time or infrequent intensive computing tasks.
Pricing utility computing basis is fine-grained with usage – based options and fewer IT skills are required
for implementation (in-house).
4) Device and Location independence enables users to access systems using a web browser regardless of
their location or what device they are using. As infrastructure site (typically provided by a third party) and
accessed via the internet, users can connect from anywhere.
5) Mutli-tenancy enables sharing of resources and costs across a large pool of users thus allowing for
centralisation, peak –load capacity, utilisation and efficiency improvements.
6) Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing
suitable for business continuity and disaster recovery.
7) Scalability and Elasticity via dynamic provisioning of resources on a fine grained, self-service basis near
real time, without users having to engineer for peak loads.
8) Performance is monitored and consistent. Loosely coupled architecture are constructed using web service
as the system interface.
9) Security could improve due to centralisation of data, increased security focussed resources etc., but
concerns can persist of about loss of control over certain sensitive data and the lack of security for stored
kernels. The complexity of security is generally increased when data is distributed over a wider area or
greater number of devices and in multi-tenant systems that are being shared by unrelated users. Private
cloud installations are in part motivated by users desired to retain a control over the infrastructure and avoid
losing control of information security.
10) Maintenance of cloud computing applications is easier because they do need to be installed on each client
computer.
Advantages Of Cloud Computing -
Cloud computing has a lot of advantages over traditional computing. The benefits of deploying applications
using cloud computing include reducing run time and response time, minimising the risk of deploying physical
infrastructure, lowering the cost of entry and increasing pace of innovation. Some other advantages of cloud
computing are:
 Lower cost of ownership
 Reduce infrastructure management responsibility
 Avoids capital expenditure (CapEx) on hardware, software and services when they pay a provider only for
what they use.
 Allow for unexpected resource loads.
 Faster Application rollout
 Immediate access to a broad range of applications.
In general, users can terminate the contract at any time (thereby avoiding return on investment risk and
uncertainty) and the services are often covered by service level agreements(SLA) with financial penalties.
II. Limitations
 Possible downtime. Cloud computing makes your small business dependent on the reliability of your
Internet connection. When it's offline, you're offline. If your internet service suffers from frequent outages
or slow speeds cloud computing may not be suitable for your business. And even the most reliable cloud
computing service providers suffer server outages now and again.
 Security issues. How safe is your data? Cloud computing means Internet computing. So you should not be
using cloud computing applications that involve using or storing data that you are not comfortable having
on the Internet. Established cloud computing vendors have gone to great lengths to promote the idea that
they have the latest, most sophisticated data security systems possible as they want your business and
realize that data security is a big concern; however, their credibility in this regard has suffered greatly in the
wake of the recent NSA snooping scandals. Keep in mind also that your cloud data is accessible from
anywhere on the internet, meaning that if a data breach occurs via hacking, a disgruntled employee, or
careless username/password security, your business data can be compromised.
Cloud Computing: Overview & Utility
DOI: 10.9790/0661-17324043 www.iosrjournals.org 43 | Page
 Cost. At first glance, a cloud computing application may appear to be a lot cheaper than a particular
software solution installed and run in-house, but you need to be sure you are doing a total cost comparison.
While many cloud computer vendors present themselves as utility-based providers, claiming that you're
only charged for what you use. In most cases, a company must commit to a predetermined contract
independent of actual use. To be sure you're saving money; you have to look closely at the pricing plans
and details for each application. The cost savings of cloud computing primarily occur when a business first
starts using it. Cloud computing costs are constantly changing, so current pricing needs to be checked now
and then.
 Inflexibility. Be careful when you're choosing a cloud computing vendor that you're not locking your
business into using their proprietary applications or formats. You can't insert a document created in another
application into a Google Docs spreadsheet, for instance. Also make sure that you can add and subtract
cloud computing users as necessary as your business grows or contracts.
 Lack of support. All too many cloud-based apps make it difficult to get customer service promptly – or at
all. Sending an email and hoping for a response within 48 hours is not an acceptable way for most of us to
run a business.
Examples Of Cloud Computing- [3]
 Email communications - Cloud computing enables webmail clients to use cloud storage and give you the
opportunity to check your emails from any place in the world. All big technology corporations use cloud
computing to make their email messaging service more reliable. Yahoo mail, Gmail, rediffmailetc
 No need to upgrade local storage - Data saved on your home or business computer is accessible only
when you use the particular device. With cloud computing users are able to store all the files they need to
access later on over the internet.The most popular among these are the Microsoft SkyDrive and Amazon
S3.
 Collaboration made Easy -Cloud computing collaboration is similar to instant messaging, but offers users
to complete particular work activities that are likely to take few months, in just few hours. Although, the
Google Wave is the most popular cloud collaboration solution out there, other great choices are Mikogo
and Vyew.
 The Virtual office - Probably the most popular use of the cloud computing is to enable business owners to
“rent” software instead of buying it. Google Docs is the most popular suite for running virtual office, but
there are lots of other solutions available such as ThinkFree and Microsoft Office Live.
III. Conclusion:
Cloud computing infrastructure is next generation platform that can provide tremendous value to
companies of any size. The cloud is reliable in sense that it enables access to applications and documents
anywhere in the world via the Internet. Cloud computing is often considered efficient because it allows
organizations to free up resources to focus on innovation and product development. Cloud computing may
improve efforts to build privacy protection into technology from the start and the use of better security
mechanisms. Cloud computing will enable more flexible IT acquisition and improvements, which may permit
adjustments to procedures based on the sensitivity of the data. Widespread use of the cloud may also encourage
open standards for cloud computing that will establish baseline data security features common across different
services and providers. Cloud computing may also allow for better audit trails. In addition, information in the
cloud is not as easily lost (when compared to the paper documents or hard drives, for example).
References:
[1]. Cloud Computing: Principles and Paradigms edited by RajkumarBuyya, James Broberg, Andrzej M. Goscinski.
[2]. Handbook of Cloud Computing edited by BorkoFurht, Armando Escalante
[3]. http://www.business2community.com/cloud-computing/top-5-examples-cloud-computing-0973287
[4]. http://sbinfocanada.about.com/od/itmanagement/a/Cloud-Computing-Disadvantages.htm
[5]. http://www.aia.org/aiaucmp/groups/aia/documents/pdf/aiab086678.pdf

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
Editor Jacotech
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
Conference Papers
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
ijtsrd
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
Conference Papers
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
Editor IJARCET
 

Was ist angesagt? (17)

Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Ju3617981704
Ju3617981704Ju3617981704
Ju3617981704
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 

Andere mochten auch

Andere mochten auch (20)

M017358794
M017358794M017358794
M017358794
 
B1304021217
B1304021217B1304021217
B1304021217
 
D1803041822
D1803041822D1803041822
D1803041822
 
C017521927
C017521927C017521927
C017521927
 
A010210109
A010210109A010210109
A010210109
 
G1303034650
G1303034650G1303034650
G1303034650
 
D013122127
D013122127D013122127
D013122127
 
Design and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAsDesign and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAs
 
J1302024854
J1302024854J1302024854
J1302024854
 
N013148591
N013148591N013148591
N013148591
 
K1303016770
K1303016770K1303016770
K1303016770
 
H013116878
H013116878H013116878
H013116878
 
O0101194102
O0101194102O0101194102
O0101194102
 
I012116164
I012116164I012116164
I012116164
 
J012265658
J012265658J012265658
J012265658
 
A1103010108
A1103010108A1103010108
A1103010108
 
Application of Big Data in Intelligent Traffic System
Application of Big Data in Intelligent Traffic SystemApplication of Big Data in Intelligent Traffic System
Application of Big Data in Intelligent Traffic System
 
K017346572
K017346572K017346572
K017346572
 
F017264143
F017264143F017264143
F017264143
 
W01761157162
W01761157162W01761157162
W01761157162
 

Ähnlich wie G017324043

The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
International Journal of Economics and Financial Research
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
Dr. Amarjeet Singh
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
Alexander Decker
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
shilpa bojji
 

Ähnlich wie G017324043 (20)

Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
A017620123
A017620123A017620123
A017620123
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
The Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing EssayThe Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing Essay
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
 

Mehr von IOSR Journals

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

G017324043

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 40-43 www.iosrjournals.org DOI: 10.9790/0661-17324043 www.iosrjournals.org 40 | Page Cloud Computing: Overview & Utility Ruchi P. Shirsat1 , Pallavi P. Deshpande2 1 (Electronics and Telecommunication, BabasahebGawde Institute of Technology/MSBTE, India) 2 (Electronics and Telecommunication, BabasahebGawde Institute of Technology/MSBTE, India) Abstract: Cloud computing enables the process of storing documents, files photos online instead of using home computer, or webmail or a social networking site. If in an organization, it is desired to use an online invoicing service instead of updating the in-house one, which has been used since many years, then that online invoicing service is a “cloud computing” service. This paper briefs about Cloud computing that refers to the delivery of computing resources over the Internet. Also instead of keeping data on one’s own hard drive or updating applications for one’s needs, it is suggested to use a service over the Internet, at another location, to store the information or use its applications. Keyword: cloud, online, internet, virtualization, data centre, business application I. Introduction Cloud computing is a new pattern of computing service, and it transforms the processor, storage device and other physical resources on Internet to virtual resources which is expandable and can be shared. The traditional computing mode puts the computing task on the local computer or the remote server, while the cloud computing distributes the computing task on the massive distributed computers which constitute the enterprise's data storage and processing centre (i.e. Data Centre). Cloud computing is a kind of pay-per-use service pattern, which enables the enterprise to switch the needed resources for application and visit computing service and memory system according to the demand. Computing and storage tasks are given to the cloud computing service provider, which can reduce the computing and storage burden of the users computing device and enhance the enterprise resources utility and computing efficiency. The following definition of cloud computing has been developed by the U.S. National Institute of Standards and Technology (NIST): Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. At present, this emerging service pattern of cloud computing develops rapidly, all kinds of manufacturers are developing different cloud computing services, the security problem in cloud computing gradually becomes a problem urgently waiting to research. While cloud computing reduces the enterprise and user’s computing and storage burden, it also imports security problem into the cloud, how to guarantee the security of important data and computing task in cloud computing by means of different kinds of security mechanisms becomes important research content of cloud computing. At the foundation it is broader concept of infrastructure storage and share services. This type of Data centreenvironment allows enterprises to get applications up and running faster with easier manageability and less maintenance and enables IT to more rapidly adjust IT resources such as servers, storage and networking to meet fluctuating and unpredictable business demands. Most cloud computing infrastructure consists of services delivered through shared data centres and appearing as single point of access for consumers computing needs. Commercial offerings may be required to meet service-level agreements (SLA), but specific terms are less often negotiatedby smaller companies. Comparison: Cloud computing characteristics- [2] Autonomic Computing Client – server model Grid computing Utility computing Mainframe computer Peer – to – peer computer system capable of self- management Client server computer refers broadly to any distributed application that distinguish between service providers A form of distributed and parallel computing, where by a super and virtual computers is composed of a The packaging of computing resources such as computation and storage as a metered service similar to a traditional public Powerful computer used mainly by large organisations for critical applications typically bulky data processing such as Distributed architecture without the need for central coordination with participants being at the same time both suppliers and
  • 2. Cloud Computing: Overview & Utility DOI: 10.9790/0661-17324043 www.iosrjournals.org 41 | Page (servers) and service requesters (clients) cluster of networked, loosely coupled computers acting in concert to perform very large tasks utility such as electricity. census, industry and consumer statistics, policies and secret intelligence services, enterprise resource planning etc. consumers of resources. Various Models Of Cloud Computing:-[2] There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing: Service models: Cloud computing offers both the software and hardware as a service over the internet. Some product offer internet based services such as storage, middleware, collaborations and database capabilities directly to users. These services are classified into three major categories. Software as a service (SaaS) – It provides a complete turnkey application including complex program such as those for CRM or enterprises resource management via internet. These software services are delivered through web browsers to its user as a service on demand to use software as service through cloud computing, users just request for the service of a particular software to its vendor and the vendor will provide the services of software to its users. End user is not concerned about the software licensing and other issues related to the genuineness of the software that he is using. Advantages – Pay per use, instant scalability, security, reliability, No need of specific hardware to run software. Examples – financial planning, CRM, Human Resources, word processing, email cloud. Platform as a service (PaaS) – It offers a full or partial development environment that users can access and utilize online, even in collaboration with others. It dramatically changed the scenario of development, deployment and run process of business applications. As the core element of cloud computing, PaaS eliminates the costs and complexity of evaluating, buying, configuring and managing all the hardware and software needed for enterprise applications. Popular services – Storage, Database and scalability Advantages - pay per use, reliability, instant scalability, no need to buy special hardware and software to develop and deploy enterprises applications, security. Infrastructure as a service (Iaas) – It delivers full computer infrastructure via internet. It is main service model of cloud computing. Infrastructure as a service is sometimes referred to as Hardware as a service (HaaS). It is a provision model in which organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on per-use basis. Access to infrastructure stack includes full OS access, firewalls, routers, load balancing etc services. Advantages – Pay per use, instant scalability, security, reliability, APIs etc. Examples- AWS:EC2, FLexiscale etc. Deployment models Cloud services are typically made available via a private cloud, community cloud, public cloud or hybrid cloud. Services provided by a public cloud are offered over the Internet and are owned and operated by a cloud provider. Some examples include services aimed at the general public, such as online photo storage services, e- mail services, or social networking sites. However, services for enterprises can also be offered in a public cloud. In a private cloud, the cloud infrastructure is operated solely for a specific organization, and is managed by the organization or a third party. In a community cloud, the service is shared by several organizations and made available only to those groups. The infrastructure may be owned and operated by the organizations or by a cloud service provider.Ahybrid cloud is a combination of different methods of resource pooling (for example, combining public and community clouds). Characteristics-[1] Cloud computing exhibits the following key characteristics:
  • 3. Cloud Computing: Overview & Utility DOI: 10.9790/0661-17324043 www.iosrjournals.org 42 | Page 1) Empowerment of end users of computing resources by putting the provisioning of those resources in their own control, as opposed to the control of centralised IT service. Agility improves with users ability to re- provision technological infrastructure resources. 2) Application programming interface (API) accessibility to software that enables machines to interface facilitates interaction between humans and computers. Cloud computing systems typically use REST – based APIs. 3) Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically provided by a third party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing utility computing basis is fine-grained with usage – based options and fewer IT skills are required for implementation (in-house). 4) Device and Location independence enables users to access systems using a web browser regardless of their location or what device they are using. As infrastructure site (typically provided by a third party) and accessed via the internet, users can connect from anywhere. 5) Mutli-tenancy enables sharing of resources and costs across a large pool of users thus allowing for centralisation, peak –load capacity, utilisation and efficiency improvements. 6) Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery. 7) Scalability and Elasticity via dynamic provisioning of resources on a fine grained, self-service basis near real time, without users having to engineer for peak loads. 8) Performance is monitored and consistent. Loosely coupled architecture are constructed using web service as the system interface. 9) Security could improve due to centralisation of data, increased security focussed resources etc., but concerns can persist of about loss of control over certain sensitive data and the lack of security for stored kernels. The complexity of security is generally increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. Private cloud installations are in part motivated by users desired to retain a control over the infrastructure and avoid losing control of information security. 10) Maintenance of cloud computing applications is easier because they do need to be installed on each client computer. Advantages Of Cloud Computing - Cloud computing has a lot of advantages over traditional computing. The benefits of deploying applications using cloud computing include reducing run time and response time, minimising the risk of deploying physical infrastructure, lowering the cost of entry and increasing pace of innovation. Some other advantages of cloud computing are:  Lower cost of ownership  Reduce infrastructure management responsibility  Avoids capital expenditure (CapEx) on hardware, software and services when they pay a provider only for what they use.  Allow for unexpected resource loads.  Faster Application rollout  Immediate access to a broad range of applications. In general, users can terminate the contract at any time (thereby avoiding return on investment risk and uncertainty) and the services are often covered by service level agreements(SLA) with financial penalties. II. Limitations  Possible downtime. Cloud computing makes your small business dependent on the reliability of your Internet connection. When it's offline, you're offline. If your internet service suffers from frequent outages or slow speeds cloud computing may not be suitable for your business. And even the most reliable cloud computing service providers suffer server outages now and again.  Security issues. How safe is your data? Cloud computing means Internet computing. So you should not be using cloud computing applications that involve using or storing data that you are not comfortable having on the Internet. Established cloud computing vendors have gone to great lengths to promote the idea that they have the latest, most sophisticated data security systems possible as they want your business and realize that data security is a big concern; however, their credibility in this regard has suffered greatly in the wake of the recent NSA snooping scandals. Keep in mind also that your cloud data is accessible from anywhere on the internet, meaning that if a data breach occurs via hacking, a disgruntled employee, or careless username/password security, your business data can be compromised.
  • 4. Cloud Computing: Overview & Utility DOI: 10.9790/0661-17324043 www.iosrjournals.org 43 | Page  Cost. At first glance, a cloud computing application may appear to be a lot cheaper than a particular software solution installed and run in-house, but you need to be sure you are doing a total cost comparison. While many cloud computer vendors present themselves as utility-based providers, claiming that you're only charged for what you use. In most cases, a company must commit to a predetermined contract independent of actual use. To be sure you're saving money; you have to look closely at the pricing plans and details for each application. The cost savings of cloud computing primarily occur when a business first starts using it. Cloud computing costs are constantly changing, so current pricing needs to be checked now and then.  Inflexibility. Be careful when you're choosing a cloud computing vendor that you're not locking your business into using their proprietary applications or formats. You can't insert a document created in another application into a Google Docs spreadsheet, for instance. Also make sure that you can add and subtract cloud computing users as necessary as your business grows or contracts.  Lack of support. All too many cloud-based apps make it difficult to get customer service promptly – or at all. Sending an email and hoping for a response within 48 hours is not an acceptable way for most of us to run a business. Examples Of Cloud Computing- [3]  Email communications - Cloud computing enables webmail clients to use cloud storage and give you the opportunity to check your emails from any place in the world. All big technology corporations use cloud computing to make their email messaging service more reliable. Yahoo mail, Gmail, rediffmailetc  No need to upgrade local storage - Data saved on your home or business computer is accessible only when you use the particular device. With cloud computing users are able to store all the files they need to access later on over the internet.The most popular among these are the Microsoft SkyDrive and Amazon S3.  Collaboration made Easy -Cloud computing collaboration is similar to instant messaging, but offers users to complete particular work activities that are likely to take few months, in just few hours. Although, the Google Wave is the most popular cloud collaboration solution out there, other great choices are Mikogo and Vyew.  The Virtual office - Probably the most popular use of the cloud computing is to enable business owners to “rent” software instead of buying it. Google Docs is the most popular suite for running virtual office, but there are lots of other solutions available such as ThinkFree and Microsoft Office Live. III. Conclusion: Cloud computing infrastructure is next generation platform that can provide tremendous value to companies of any size. The cloud is reliable in sense that it enables access to applications and documents anywhere in the world via the Internet. Cloud computing is often considered efficient because it allows organizations to free up resources to focus on innovation and product development. Cloud computing may improve efforts to build privacy protection into technology from the start and the use of better security mechanisms. Cloud computing will enable more flexible IT acquisition and improvements, which may permit adjustments to procedures based on the sensitivity of the data. Widespread use of the cloud may also encourage open standards for cloud computing that will establish baseline data security features common across different services and providers. Cloud computing may also allow for better audit trails. In addition, information in the cloud is not as easily lost (when compared to the paper documents or hard drives, for example). References: [1]. Cloud Computing: Principles and Paradigms edited by RajkumarBuyya, James Broberg, Andrzej M. Goscinski. [2]. Handbook of Cloud Computing edited by BorkoFurht, Armando Escalante [3]. http://www.business2community.com/cloud-computing/top-5-examples-cloud-computing-0973287 [4]. http://sbinfocanada.about.com/od/itmanagement/a/Cloud-Computing-Disadvantages.htm [5]. http://www.aia.org/aiaucmp/groups/aia/documents/pdf/aiab086678.pdf