Enviar pesquisa
Carregar
102 105
•
1 gostou
•
209 visualizações
E
Editor IJARCET
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
489 493
489 493
Editor IJARCET
176
176
vivatechijri
Fs2510501055
Fs2510501055
IJERA Editor
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
Kamal Jyoti
Cloud security cam ready
Cloud security cam ready
Hai Nguyen
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
Tr 85.4
Tr 85.4
Kanukuntla Ranjith
Recomendados
489 493
489 493
Editor IJARCET
176
176
vivatechijri
Fs2510501055
Fs2510501055
IJERA Editor
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
Kamal Jyoti
Cloud security cam ready
Cloud security cam ready
Hai Nguyen
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
Tr 85.4
Tr 85.4
Kanukuntla Ranjith
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
70 74
70 74
Editor IJARCET
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
IJORCS
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
Iw qo s09 (1)
Iw qo s09 (1)
shafyhaneef
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
Cloud Models
Cloud Models
Sweta Kumari Barnwal
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
Distributed virtual disk storage system
Distributed virtual disk storage system
Alexander Decker
11.distributed virtual disk storage system
11.distributed virtual disk storage system
Alexander Decker
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Edadc
Edadc
ragh6
8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
Fog doc
Fog doc
priyanka reddy
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
IJECEIAES
The new UK GAAP: FRS 102 explained
The new UK GAAP: FRS 102 explained
TCM infosys
John McCarthy - FRS 102
John McCarthy - FRS 102
DavinMcCormick
EY-FRS-102-illustrative-financial-statements
EY-FRS-102-illustrative-financial-statements
Hudson Grieve
UK GAAP - A Year of Change | Accountex 2015
UK GAAP - A Year of Change | Accountex 2015
Sageukofficial
Mais conteúdo relacionado
Mais procurados
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
70 74
70 74
Editor IJARCET
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
IJORCS
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
Iw qo s09 (1)
Iw qo s09 (1)
shafyhaneef
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
Cloud Models
Cloud Models
Sweta Kumari Barnwal
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
Distributed virtual disk storage system
Distributed virtual disk storage system
Alexander Decker
11.distributed virtual disk storage system
11.distributed virtual disk storage system
Alexander Decker
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Edadc
Edadc
ragh6
8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
Fog doc
Fog doc
priyanka reddy
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
IJECEIAES
Mais procurados
(18)
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
70 74
70 74
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
Iw qo s09 (1)
Iw qo s09 (1)
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
Cloud Models
Cloud Models
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Distributed virtual disk storage system
Distributed virtual disk storage system
11.distributed virtual disk storage system
11.distributed virtual disk storage system
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Edadc
Edadc
8. 9590 1-pb
8. 9590 1-pb
Fog doc
Fog doc
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
Destaque
The new UK GAAP: FRS 102 explained
The new UK GAAP: FRS 102 explained
TCM infosys
John McCarthy - FRS 102
John McCarthy - FRS 102
DavinMcCormick
EY-FRS-102-illustrative-financial-statements
EY-FRS-102-illustrative-financial-statements
Hudson Grieve
UK GAAP - A Year of Change | Accountex 2015
UK GAAP - A Year of Change | Accountex 2015
Sageukofficial
The New UK GAAP - Preparing for Change | Accountex 2015
The New UK GAAP - Preparing for Change | Accountex 2015
Sageukofficial
Getting ready for FRS 102
Getting ready for FRS 102
Sageukofficial
UK GAAP
UK GAAP
Shashwat Tulsian
Destaque
(7)
The new UK GAAP: FRS 102 explained
The new UK GAAP: FRS 102 explained
John McCarthy - FRS 102
John McCarthy - FRS 102
EY-FRS-102-illustrative-financial-statements
EY-FRS-102-illustrative-financial-statements
UK GAAP - A Year of Change | Accountex 2015
UK GAAP - A Year of Change | Accountex 2015
The New UK GAAP - Preparing for Change | Accountex 2015
The New UK GAAP - Preparing for Change | Accountex 2015
Getting ready for FRS 102
Getting ready for FRS 102
UK GAAP
UK GAAP
Semelhante a 102 105
Ant colony Optimization: A Solution of Load balancing in Cloud
Ant colony Optimization: A Solution of Load balancing in Cloud
dannyijwest
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
IOSR Journals
G017214849
G017214849
IOSR Journals
51 59
51 59
Editor IJARCET
51 59
51 59
Editor IJARCET
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
poojagupta010
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
484 488
484 488
Editor IJARCET
B1802041217
B1802041217
IOSR Journals
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
csandit
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
cscpconf
The improvement and performance
The improvement and performance
csandit
Cloud computing
Cloud computing
Upanya Singh
Cloud computing
Cloud computing
Jawhar Ali
Fog computing
Fog computing
Ayush Chaurasia
Aes based secured framework for cloud databases
Aes based secured framework for cloud databases
IJARIIT
A01260104
A01260104
IOSR Journals
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
IJwest
Semelhante a 102 105
(20)
Ant colony Optimization: A Solution of Load balancing in Cloud
Ant colony Optimization: A Solution of Load balancing in Cloud
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
G017214849
G017214849
51 59
51 59
51 59
51 59
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
484 488
484 488
B1802041217
B1802041217
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
The improvement and performance
The improvement and performance
Cloud computing
Cloud computing
Cloud computing
Cloud computing
Fog computing
Fog computing
Aes based secured framework for cloud databases
Aes based secured framework for cloud databases
A01260104
A01260104
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
Mais de Editor IJARCET
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
Mais de Editor IJARCET
(20)
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Último
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Zilliz
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Último
(20)
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
102 105
1.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 “Cloud Service Utilization” Journey to cloud... 1 Pranay Chauhan Assistant Professor, Dept, Of Information Technology, SVCE, Indore 1 pranaychauhan1985@gmail.com, Abstract means the system is cloud system. Know moving As we know that cloud computing is an emerging area, towards the cloud we should know that cloud is vast the services provided by the cloud is helpful to overcome the limitation of Information Technology. there is no end so we call it as a journey to cloud. On Such as Globalization, Security, Storage and the most our journey to cloud there are mainly three phases [1. important Cost. And as Cloud plays a vital role to overcome these challenges of new age of Information EMC] First phase is Classic data center, and then technology. The above paper would focus on various second phase is Virtual Data Center and at last cloud. factors in which cloud mainly developed the suitable environment for Communication and business aspects, Figure 1.2 shows the three different phases towards new trends in the emerging arena and various issues cloud computing [1]. regarding the cloud computing. At various domains and how these domain mainly get affected by the cloud. Keywords: - Virtualization, Storage, Compute, Security. Introduction As when we talk about the cloud the first thing that comes in our mind when we look upward at cloud is the unlimited space [2]. According to NIST i.e. National institute of standard technology the cloud mainly contain the five characteristics Figure 1.2: Shows the different Phases in the cloud computing Know coming to the classic data center (CDC), it mainly consist of the several component such as Compute, Applications, DBMS, Storage, Networks. The compute mainly consists of the logical and physical components such as hard disk, floppy drive, RAM, ROM, Processors, Switches, NIC card etc. while the logical components consist of the various protocol [3]. Coming to second components the Figure:1.1 Shows Charcterstics of Cloud computing Applications it mainly consist of various applications such as Email Application, Customer Retail Mgmt., Enterprise Resource Planning etc. various applications These are the main characteristics of the cloud while Third Components is about the Data Base computing. If these characteristics were in the system 102 All Rights Reserved © 2012 IJARCET
2.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Management system which mainly talks about the data to maintain the recovery, while recovery can be on base that how the data is important, which type of data local and remote side recovery. If we talk about the and purpose and classification of data. Consist of sql recovery the various recovery tools are there which and PLSQL. While the Fourth components mainly mainly provide the recovery of data. Moving ahead about the Storage the storage of data is another main towards CDC the last components is Network, which complex problem how to store the data because as the play again the vital role in the classic data center. The Information technology is facing the biggest problem fiber channel over Ethernet is used FCOE for which is storage, that how to store the data and how to transmission. Know second phase of journey towards manage the data, the big data maintence is another big cloud is Virtual data center, before that concept of and emerging area of Information Technology, but in virtualization is quite simple. I.e. it is logical structure case of classic data center , Storage mainly uses the which acts and behaves like physical structure. The RAID: Redundant array of independent disk, in which virtual machine is based on virtual file and it also acts various levels are there RAID 0 , RAID 1, RAID and behaves like a physical machine. The virtual NESTED, RAID 5, RAID 6 . While the RAID6 is machine consists of the applications and operating been used by the Google and you tube [5].The RAID system running over it. Above figure shows the model mainly used the three different techniques such position of the virtual machine in cloud system. as Figure 1.4 shows the virtualization machine and its Figure 1.3: Shows the three techniques of RAID position These techniques mainly provide the better storage; The virtual machines are actually logical file which is the better techniques mainly maintain the business mainly created on the physical machine. The main continuity in the system. The business continuity can concept is to provide the virtual environment in the be achieve through these techniques and backup is also system, the file which is created on the machine an important part for these which can be maintain on required more protection because these file contain the disk and as well as on tape, coming towards backup whole data of the virtual system. And the biggest the back up of data is well categorized on client side characteristics of these cloud computing is that they and as well as on server side. Backup is mainly done just maintain the resource pool (Virtualization).the virtual machine also contain the various virtual 103 All Rights Reserved © 2012 IJARCET
3.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 devices such as virtual switch, virtual NIC, virtual Following existing system as shown in the figure 1.5 hard disks, virtual storage. The virtual machine and the security can be maintained at its better level physical machine mainly consist of hypervisor in because as said that no system can be said as perfect between them. Hypervisor mainly allow the multiple secure or 100% secure. We can only increase the level operating systems to run simultaneously on the of security. The virtual system is the core concept of physical machine. It mainly works on the physical cloud, the basic characteristics of cloud is machine the used virtualization can be achieved by virtualization so logical structure should be strong and these. coming to the security purpose the virtual it should be safe. The various problems which mainly machine can be bigger loophole they can be theft so occur during the virtualization they can be solved by the virtual machine theft prevention can be done the maintain this proper aspect of principles. first level , privacy at physical level should be The cloud will go to play a vital role in the next maintain by the physical level security. The emerging environment, so maintaining the trust is an authentication should be maintained by the stronger important challenge for the service provider. The security mechanism such as Biometric devices. And cloud security is biggest issue which has to be kept in the physical access privileged should be under the mind and then services can be used. So the cloud is secure services so that various problems regarding the vast and big enough to resolve all the challenges of virtualization security can be solved and hypervisor information technology. Cost, security and the and virtual machine should work under the secure problem of storage can be easily solved by maintain environment. [7] The business continuity should be the virtualization. The virtualization mainly provides maintained the business should work regularly. The bigger space to maintain the large amount of data. privacy condition should be maintained properly Complexity of maintain the data can be easily be solved by virtualizations sphere and as when physical machine get converts into virtual machine by Vm sphere. [6] The physical machine will acts like a virtual machine conversion can be hot conversion or it can be cold conversion. If the machine is on then it is hot conversion and if the machine is off then it is cold conversion. Figure shows the physical to virtual machine conversions. [7] Figure 1.5: Shows the working of antivirus between the Physical machine and virtual machine The basic aspects of security can be achieved by the Figure 1.6: PM to VM conversion 104 All Rights Reserved © 2012 IJARCET
4.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 So the bigger challenges to information technology can be solved by the cloud. paper on IBM’s New Conclusion Enterprise Data Center: As we know that the cloud is an emerging area most of the services providers where moving towards the A websi cloud services. So cloud issues should be kept in mind and the services of cloud can be used at broad level and as discuss, above it can resolve the biggest challenges to information technology and the problems which mainly big data center faces. collaboration among 7. References universities in the First Author [1].http://india.emc.com/microsites/cloud/cloud.htm?p id=home-small-cloudtransformsit-230212 Pranay Chauhan M.E. Information Technology . Indore, M. P., India, [2] Amazon Elastic Compute Cloud (EC2): Ph. +91 9754143398 http://www.amazon.com/gp/browse.html? Node=201590011,. Biography: Pranay Chauhan has receivable. (Bachelor of Engineering)Degree in Information Technology Engineering from Rishiraj Institute of Technology, [3].http://www.businessweek.com/technology/content/ Indore, M.P., India in2007. He has 4+.years of aug2008/tc2008082_445669_page_3.htm teaching experience. His subjects of Interest include, Computer Networking, Biometric system, Security [4].http://en.wikipedia.org/wiki/Cloud computing assessment, Securing E commerce Operating system, Network Management, Wireless network, cloud computing, security in cloud computing, Network [5]...http://www.ibm.com/developerworks/websphere/t security presently. He has published several researches echjournal/0904_amrhein/0904_amrhein.html Papers and Journals in National/International Conferences. Currently working as Assistant Professor in SVCE Indore. [6] http://india.emc.com/microsites/cloud/ [7].http://india.emc.com/index.htm?fromGlobalSiteSel ect [8] http://cloudcomputing.sys-con.com [9].http://www.businessweek.com/technology/content/ aug2008/tc2008082_445669_page_3.htm [10] http://en.wikipedia.org/wiki/Cloud_computing [11]. http://cloudsecurityalliance.org 105 All Rights Reserved © 2012 IJARCET
Baixar agora