SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 607
OVERVIEW OF CLOUD COMPUTING ARCHITECTURE: SERVICE
DELIVERY MODELS, SECURITY& PRIVACY ISSUES AND TRUST
K.V. K Mahesh Kumar
Research Scholar, Department of Computer Science and Engineering, Acharya Nagarjuna University, A.P, India,
maheshkondraju@gmail.com
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges.
Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-
service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been
discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with
constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust
between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the
help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data
security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also
focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security
standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in
organizations.
Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
Now a days Cloud Computing has been center of focus for
organizations and software companies for some time but there
seems to be no clarity on how effective cloud computing can
be due to the factors evolving around Cloud Providers due to
the use of their proprietary models and standards [1]. Cloud
providers are using different service delivery models which
can be differentiated based on the level of virtualization they
offer, there are mainly three service delivery models Plaform
as a Service (PaaS), Infrastructure as a Service (IaaS) and
Software as a Service SaaS). These three models together
constitute as SPI Model where S stands for Software, P stands
for Platform and I stands for Infrastructure [2], [3].
1.1 Software-as-a-Service (SaaS)
In this model Software is provided as a service where cloud
user can access the software from his web browser without the
concerns of deployment or installation & maintenance. With
the advent new & faster HTML 5 standards graphically rich
applications can be run smoothly at 60 Frames per second just
like running our software on our own personal computers.
This service model depicts one to many function as single
application running as a service on the server side with many
client end users can run it from their web browser
simultaneously as they are connected as services [2], [3].
For example let us consider Google Play Store where
applications can be purchased on the go and can be run from
the web browser, any number of people can purchase and run
the application simultaneously but only one instance of the
application is running on the server side. This helps in
reducing costs on resources and on the customers point of
view it is hassle free process service on demand where Cloud
user can rent applications without the need of installation and
maintenance of the software [2], [3].
1.2 Platform-as-a-Service (PaaS)
This delivery models allows the user to build & develop his
own applications using programming languages and tools
available on the the cloud provider infrastructure. This kind of
service delivery model is useful in situation where the cloud
user can deploy his applications on to the cloud with complete
control on the applications. But there are few challenges in
this service model, where cloud user cant have the control
over the machine where it is hosted or deployed, as cloud user
cant control or manage cloud infrastructure, operating
systems, data storage and network servers. Another challenge
in this Platform-as-a-service is where Cloud providers offer
pre-defined operating systems and servers to host or deploy
applications, So meeting the requirements of software
deployment is an issue [3], [7]. For example if an application
is compatible with only .Net 4.5 and the operating system
deployed by the cloud provider might only Supporting .Net
3.5, So there might be few restriction while deployment of
applications
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 608
1.3 Infrastructure-as-a-Service ( IaaS)
This model delivers basic cloud comuting capabilities such as
providing storage systems over the network for rentals or pay
as you go. Even this model supports deploying application and
software running arbitrary as well as has the control over the
operating systems deployed in the cloud by the provider,
socloud user here acts as an administrator. So changes to the
operating systems, failure & crashes in the operating system
and data securityis crucial in this service model [3], [7].
All these service deliverymodels are interconnected to each
other or in simple words Infrastructure-as-a-service( Iaas) is
the base or foundation of the cloud computing architecture
where as Platform-as-a-service (PaaS) is built up on
Infrastructure-as-a-service (IaaS) and finally Software-as-a-
service (SaaS) is built up on Platform-as-a-service (PaaS) [3],
[7].
Fig-1: Cloud Computing Stack
2. SECURITY ISSUES
Cloud computing due to its architectural design and
characteristics imposes a number of security benefits such as
centralization of security, data and process segmentation,
redundancy and high availability. Though many traditional
risks are mitigated effeciently, due to its infrastructures
singular characteristics many security challenges have arised.
Cloud computing has “unique attributes that require risk
assessment in areas such as data security, availability
reliability issues and data integrity” [7], [10], [11].
2.1 Data Security
In cloud computing securing data of the cloud user is at most
important than anything else and it needs to be secured in
various transition states between the virtual machines
equipped in the cloud to the physical machines used by the
end users. There are six key areas where data needs to be
secured
 Security of data at rest
 Providing security for the data in transition
 Authentication of Users, Applications and Services
 Data separation between users on the fly
 Legal and regulatory issues
 Generating incident response
Fig– 2: Areas of Security concerns in cloud computing
Data security and confidentiality can be achieved with the use
of cryptographic protocols and trusted platform modules
(TPM) used for migration of data between virtual machines
and physical machines. Technologies such encrypted storage
firewalls are useful in ensuring safe data access and storage
[13], [14], [15], [16].
2.2 Data Integrity
Data Integrity means protecting data from unauthorized
deletion, modification or fabrication. Protecting users
admittance and rights to specific enterprise resources ensures
that valuable data and services are not abused,
misappropriated or stolen. Data Integrity and system integrity
in organizations can be achievedby preventing unauthorized
access. Data integrity mechanism“offers the greater visibility
into determining who or what may have altered data or system
information, potentially affecting their integrity”[4], [12].
2.3 Availability
System readily available, accessible and useable to an
authorized user even at tough situations where there is a
possible chance security breach. This approach of cloud
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 609
computing where hardware, software and personal data made
available to authorized and loyal cloud users at tough times
but this results in congested network for data retrieval and
processing and burdens cloud provider with additional costs in
acquiring network servers [6], [10].
3. PRIVACY ISSUES
In cloud computing privacy plays a major role in protecting
users from their individual rights but in multi domain
environments and service oriented architecture it is important
to implement multi domain policy integration and secure
service composition. There are five key areas where privacy
for cloud users is at stake they are
 Authentication and identity management
 Access control and accounting
 Trust management and policy integration
 Secure service management
 Privacy data protection
 Organizational security management [4], [9], [12]
4. TRUST
Trust in cloud computing varies from platform to platform and
depends on deployed service delivery model [5].
For example in public cloud, control is reduced only to the
infrastructure owner to implement necessary security policy
such that appropriate security measures are being planned &
performed to mitigate therisk. This delivery model introduces
risks and threats, as security is based on trusting the cloud
provider[5] [12]. Whereas in private cloud infrastructure is
deployed within the premise of the organizations, therefore
management and control over the infrastructure is with the
organizations and thus it does not introduces any additional
security threats as trust remains within the organization but it
incurs costs in maintaining the infrastructure as infrastructure
owner remains the owner of data and process [5] [12].
Trust plays an important role in cloud computing, Trust in
other terms can be stated as reliability on the part of cloud
providers. Cloud provider should be reliable and should meet
the expectations of the user, So trust can be developed by
achieving credibility and being loyal to the user in
safeguarding the user data, effectively executing security
mechanisms, exhibiting expertise in reducing risk & threats
and should acknowledge the users certainty about the cloud
provider in providing required services accurately [3] [4][6].
Fig – 3: Trusted Third Party in cloud
Trusted third party (TTP) plays a major role multi-level
distributed computing. Trusted third party provides end-to-end
security services which are ethical in standard and uses
cryptography to ensure confidentiality, integrity and
authenticity of data communicated. Trusted third party is an
independent ideal security facilitator in cloud computing
environment where it provides trusted securitydomains &
establishes secure connections and interactions between cloud
provider and users[3][6][8].
CONCLUSION
Cloud computing is currently one of the most happening area
where organizations are attracted towards it due to its
flexibility and cost effective architecture. Though cloud
computing is much anticipated there exists many challenges
with the architecture and service delivery models used by
various cloud providers. Actual problem lies with the lack of
global standard in cloud computing and each cloud service
providers using their own proprietary models in deploying
their infrastructure which indeed leads to Data Security and
Privacy issues. At the same time building Trust from cloud
users has been a big challenge.Cloud computing looks like a
potential contender in the future in areas outsourcing and
reducing cost of resources for software companies or
Independent software vendors but unless and until all existing
cloud provider organizations form into a single large global
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 610
group to introduce guidelines and standards for cloud
computing, it is tough on the part of software companies or
Independent software vendors to trust cloud providers for
reducing outsourcing and resource costs.
REFERENCES
[1]. A. Giddens, the Consequences of Modernity, Polity
Press, UK, 1991.
[2]. Chen, Y., Paxson, V., & Katz, R.H. (2010). What’s
New About Cloud Computing Security? Technical
Report UCB/EECS-2010-5, EECS Department,
University of California, Berkeley, 2010.
[3]. Cloud Security Alliance (CSA)’s Security Guidance
for Critical Areas of Focus in Cloud Computing
(2009). CSA, April 2009.
[4]. Cloud Security Alliance. Top threats to cloud
computing, Cloud SecurityAlliance, 2010.
[5]. D. Lekkas, Establishing and managing trust within
the public key infrastructure,Computer
Communications 26 (16) (2003).
[6]. Everett, C. (2009). Cloud Computing- A Question of
Trust.Computer Fraud & Security, Vol 2009, Issue
6, pp. 5-7 June 2010.
[7] Gartner. Assessing the security risks of cloud
computing, Gartner, 2008.
[8]. International Telecommunication Union, X-509 |
ISO/IEC 9594-8, Thedirectory: Public-key and
attribute certificate frameworks, ITU, X-Series, 2001.
[9]. Joshi, J.B.D., Bhatti, R., Bertino, E., &Ghafoor, A.
(2004). Access Control Language for Multi-domain
Environments.IEEE Internet Computing, Vol 8, No
6, pp. 40-50, November 2004.
[10]. National Institute of Standards and Technology, The
NIST Definition of Cloud Computing, Information
Technology Laboratory, 2009.
[11]. National Institute of Standards and Technology.
Guide for mapping types of information and
information systems to security categories, NIST
800-60,2008.
[12]. R. Sherman, Distributed systems security, Computers
& Security 11 (1) (1992).
[13]. Sen, J. (2010a). An Agent-Based Intrusion Detection
System for Local Area
Networks.InternationalJournal of Communication
Networks and Information Security (IJCNIS), Vol 2,
No 2, pp. 128-140,August 2010.
[14]. Sen, J. (2010b). An Intrusion Detection Architecture
for Clustered Wireless Ad Hoc Networks. In
Proceedings of the 2nd IEEE International
Conference on Intelligence in Communication
Systems andNetworks (CICSyN’10), pp. 202-207,
July, 2010, Liverpool, UK.
[15]. Sen, J. (2010c). A Robust and Fault-Tolerant
Distributed Intrusion Detection System.In
Proceedings of the 1st International Conference on
Parallel, Distributed and Grid Computing
(PDGC’10), pp. 123-128,October 2010, Waknaghat,
India.
[16]. Trusted Computing Group (TCG)’s White Paper
(2010). Cloud Computing and Security- A Natural
Match. Available online at:
http://www.trustedcomputinggroup.org (Accessed
on; January 2013).
BIOGRAPHY
K.V.K Mahesh Kumar holds a B.E.
(Bachelor of Engineering) in Computer
Science from Osmania University, Graduate
Diploma in Professional Computing &
Masters in ICT (Information and
Communication Technology Management) from University of
South Australia and is currently pursuing Ph.D. in Cloud
Computing from Department of Computer Science and
Engineering at Acharya Nagarjuna University. He has been
involved in many diversified research projects and published
several papers in international journals in the research areas of
HCI (Human Computer Interaction), EHR (Electronic Health
Record) systems, E-Business & E-Commerce, Web 2.0 Social
Networking, Project Management and Knowledge
Management.

More Related Content

What's hot

Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Publishing House
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Journals
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceEditor Jacotech
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458IJRAT
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 

What's hot (16)

Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
Unit 5
Unit 5Unit 5
Unit 5
 

Similar to Overview of cloud computing architecture

Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachIRJET Journal
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 

Similar to Overview of cloud computing architecture (20)

Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Am36234239
Am36234239Am36234239
Am36234239
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 

Recently uploaded (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 

Overview of cloud computing architecture

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 607 OVERVIEW OF CLOUD COMPUTING ARCHITECTURE: SERVICE DELIVERY MODELS, SECURITY& PRIVACY ISSUES AND TRUST K.V. K Mahesh Kumar Research Scholar, Department of Computer Science and Engineering, Acharya Nagarjuna University, A.P, India, maheshkondraju@gmail.com Abstract This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a- service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION Now a days Cloud Computing has been center of focus for organizations and software companies for some time but there seems to be no clarity on how effective cloud computing can be due to the factors evolving around Cloud Providers due to the use of their proprietary models and standards [1]. Cloud providers are using different service delivery models which can be differentiated based on the level of virtualization they offer, there are mainly three service delivery models Plaform as a Service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service SaaS). These three models together constitute as SPI Model where S stands for Software, P stands for Platform and I stands for Infrastructure [2], [3]. 1.1 Software-as-a-Service (SaaS) In this model Software is provided as a service where cloud user can access the software from his web browser without the concerns of deployment or installation & maintenance. With the advent new & faster HTML 5 standards graphically rich applications can be run smoothly at 60 Frames per second just like running our software on our own personal computers. This service model depicts one to many function as single application running as a service on the server side with many client end users can run it from their web browser simultaneously as they are connected as services [2], [3]. For example let us consider Google Play Store where applications can be purchased on the go and can be run from the web browser, any number of people can purchase and run the application simultaneously but only one instance of the application is running on the server side. This helps in reducing costs on resources and on the customers point of view it is hassle free process service on demand where Cloud user can rent applications without the need of installation and maintenance of the software [2], [3]. 1.2 Platform-as-a-Service (PaaS) This delivery models allows the user to build & develop his own applications using programming languages and tools available on the the cloud provider infrastructure. This kind of service delivery model is useful in situation where the cloud user can deploy his applications on to the cloud with complete control on the applications. But there are few challenges in this service model, where cloud user cant have the control over the machine where it is hosted or deployed, as cloud user cant control or manage cloud infrastructure, operating systems, data storage and network servers. Another challenge in this Platform-as-a-service is where Cloud providers offer pre-defined operating systems and servers to host or deploy applications, So meeting the requirements of software deployment is an issue [3], [7]. For example if an application is compatible with only .Net 4.5 and the operating system deployed by the cloud provider might only Supporting .Net 3.5, So there might be few restriction while deployment of applications
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 608 1.3 Infrastructure-as-a-Service ( IaaS) This model delivers basic cloud comuting capabilities such as providing storage systems over the network for rentals or pay as you go. Even this model supports deploying application and software running arbitrary as well as has the control over the operating systems deployed in the cloud by the provider, socloud user here acts as an administrator. So changes to the operating systems, failure & crashes in the operating system and data securityis crucial in this service model [3], [7]. All these service deliverymodels are interconnected to each other or in simple words Infrastructure-as-a-service( Iaas) is the base or foundation of the cloud computing architecture where as Platform-as-a-service (PaaS) is built up on Infrastructure-as-a-service (IaaS) and finally Software-as-a- service (SaaS) is built up on Platform-as-a-service (PaaS) [3], [7]. Fig-1: Cloud Computing Stack 2. SECURITY ISSUES Cloud computing due to its architectural design and characteristics imposes a number of security benefits such as centralization of security, data and process segmentation, redundancy and high availability. Though many traditional risks are mitigated effeciently, due to its infrastructures singular characteristics many security challenges have arised. Cloud computing has “unique attributes that require risk assessment in areas such as data security, availability reliability issues and data integrity” [7], [10], [11]. 2.1 Data Security In cloud computing securing data of the cloud user is at most important than anything else and it needs to be secured in various transition states between the virtual machines equipped in the cloud to the physical machines used by the end users. There are six key areas where data needs to be secured  Security of data at rest  Providing security for the data in transition  Authentication of Users, Applications and Services  Data separation between users on the fly  Legal and regulatory issues  Generating incident response Fig– 2: Areas of Security concerns in cloud computing Data security and confidentiality can be achieved with the use of cryptographic protocols and trusted platform modules (TPM) used for migration of data between virtual machines and physical machines. Technologies such encrypted storage firewalls are useful in ensuring safe data access and storage [13], [14], [15], [16]. 2.2 Data Integrity Data Integrity means protecting data from unauthorized deletion, modification or fabrication. Protecting users admittance and rights to specific enterprise resources ensures that valuable data and services are not abused, misappropriated or stolen. Data Integrity and system integrity in organizations can be achievedby preventing unauthorized access. Data integrity mechanism“offers the greater visibility into determining who or what may have altered data or system information, potentially affecting their integrity”[4], [12]. 2.3 Availability System readily available, accessible and useable to an authorized user even at tough situations where there is a possible chance security breach. This approach of cloud
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 609 computing where hardware, software and personal data made available to authorized and loyal cloud users at tough times but this results in congested network for data retrieval and processing and burdens cloud provider with additional costs in acquiring network servers [6], [10]. 3. PRIVACY ISSUES In cloud computing privacy plays a major role in protecting users from their individual rights but in multi domain environments and service oriented architecture it is important to implement multi domain policy integration and secure service composition. There are five key areas where privacy for cloud users is at stake they are  Authentication and identity management  Access control and accounting  Trust management and policy integration  Secure service management  Privacy data protection  Organizational security management [4], [9], [12] 4. TRUST Trust in cloud computing varies from platform to platform and depends on deployed service delivery model [5]. For example in public cloud, control is reduced only to the infrastructure owner to implement necessary security policy such that appropriate security measures are being planned & performed to mitigate therisk. This delivery model introduces risks and threats, as security is based on trusting the cloud provider[5] [12]. Whereas in private cloud infrastructure is deployed within the premise of the organizations, therefore management and control over the infrastructure is with the organizations and thus it does not introduces any additional security threats as trust remains within the organization but it incurs costs in maintaining the infrastructure as infrastructure owner remains the owner of data and process [5] [12]. Trust plays an important role in cloud computing, Trust in other terms can be stated as reliability on the part of cloud providers. Cloud provider should be reliable and should meet the expectations of the user, So trust can be developed by achieving credibility and being loyal to the user in safeguarding the user data, effectively executing security mechanisms, exhibiting expertise in reducing risk & threats and should acknowledge the users certainty about the cloud provider in providing required services accurately [3] [4][6]. Fig – 3: Trusted Third Party in cloud Trusted third party (TTP) plays a major role multi-level distributed computing. Trusted third party provides end-to-end security services which are ethical in standard and uses cryptography to ensure confidentiality, integrity and authenticity of data communicated. Trusted third party is an independent ideal security facilitator in cloud computing environment where it provides trusted securitydomains & establishes secure connections and interactions between cloud provider and users[3][6][8]. CONCLUSION Cloud computing is currently one of the most happening area where organizations are attracted towards it due to its flexibility and cost effective architecture. Though cloud computing is much anticipated there exists many challenges with the architecture and service delivery models used by various cloud providers. Actual problem lies with the lack of global standard in cloud computing and each cloud service providers using their own proprietary models in deploying their infrastructure which indeed leads to Data Security and Privacy issues. At the same time building Trust from cloud users has been a big challenge.Cloud computing looks like a potential contender in the future in areas outsourcing and reducing cost of resources for software companies or Independent software vendors but unless and until all existing cloud provider organizations form into a single large global
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 610 group to introduce guidelines and standards for cloud computing, it is tough on the part of software companies or Independent software vendors to trust cloud providers for reducing outsourcing and resource costs. REFERENCES [1]. A. Giddens, the Consequences of Modernity, Polity Press, UK, 1991. [2]. Chen, Y., Paxson, V., & Katz, R.H. (2010). What’s New About Cloud Computing Security? Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, 2010. [3]. Cloud Security Alliance (CSA)’s Security Guidance for Critical Areas of Focus in Cloud Computing (2009). CSA, April 2009. [4]. Cloud Security Alliance. Top threats to cloud computing, Cloud SecurityAlliance, 2010. [5]. D. Lekkas, Establishing and managing trust within the public key infrastructure,Computer Communications 26 (16) (2003). [6]. Everett, C. (2009). Cloud Computing- A Question of Trust.Computer Fraud & Security, Vol 2009, Issue 6, pp. 5-7 June 2010. [7] Gartner. Assessing the security risks of cloud computing, Gartner, 2008. [8]. International Telecommunication Union, X-509 | ISO/IEC 9594-8, Thedirectory: Public-key and attribute certificate frameworks, ITU, X-Series, 2001. [9]. Joshi, J.B.D., Bhatti, R., Bertino, E., &Ghafoor, A. (2004). Access Control Language for Multi-domain Environments.IEEE Internet Computing, Vol 8, No 6, pp. 40-50, November 2004. [10]. National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009. [11]. National Institute of Standards and Technology. Guide for mapping types of information and information systems to security categories, NIST 800-60,2008. [12]. R. Sherman, Distributed systems security, Computers & Security 11 (1) (1992). [13]. Sen, J. (2010a). An Agent-Based Intrusion Detection System for Local Area Networks.InternationalJournal of Communication Networks and Information Security (IJCNIS), Vol 2, No 2, pp. 128-140,August 2010. [14]. Sen, J. (2010b). An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. In Proceedings of the 2nd IEEE International Conference on Intelligence in Communication Systems andNetworks (CICSyN’10), pp. 202-207, July, 2010, Liverpool, UK. [15]. Sen, J. (2010c). A Robust and Fault-Tolerant Distributed Intrusion Detection System.In Proceedings of the 1st International Conference on Parallel, Distributed and Grid Computing (PDGC’10), pp. 123-128,October 2010, Waknaghat, India. [16]. Trusted Computing Group (TCG)’s White Paper (2010). Cloud Computing and Security- A Natural Match. Available online at: http://www.trustedcomputinggroup.org (Accessed on; January 2013). BIOGRAPHY K.V.K Mahesh Kumar holds a B.E. (Bachelor of Engineering) in Computer Science from Osmania University, Graduate Diploma in Professional Computing & Masters in ICT (Information and Communication Technology Management) from University of South Australia and is currently pursuing Ph.D. in Cloud Computing from Department of Computer Science and Engineering at Acharya Nagarjuna University. He has been involved in many diversified research projects and published several papers in international journals in the research areas of HCI (Human Computer Interaction), EHR (Electronic Health Record) systems, E-Business & E-Commerce, Web 2.0 Social Networking, Project Management and Knowledge Management.