Enviar pesquisa
Carregar
Ijarcet vol-2-issue-3-1128-1131
•
0 gostou
•
230 visualizações
E
Editor IJARCET
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
Laud Randy Amofah
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
Paper id 27201433
Paper id 27201433
IJRAT
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
Zuhair Haroon khan
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Recomendados
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
Laud Randy Amofah
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
Paper id 27201433
Paper id 27201433
IJRAT
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
Zuhair Haroon khan
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
H046053944
H046053944
IJERA Editor
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
Journal For Research
Cloud ready reference
Cloud ready reference
Helly Patel
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
Cloud Models
Cloud Models
Sweta Kumari Barnwal
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
Editor IJARCET
Security in Cloud Computing
Security in Cloud Computing
Ashish Patel
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
Secure Cloud Hosting.paper
Secure Cloud Hosting.paper
jagan339
Cloud versus cloud
Cloud versus cloud
Masoud Gholami
improve cloud security
improve cloud security
Balkees Shereek
Hyperlink dipa
Hyperlink dipa
Paarief Udin
Career path o & g industry
Career path o & g industry
raghunathan janarthanan
Anno delle stelle, 15 agosto 2013
Anno delle stelle, 15 agosto 2013
Manos Italia
Mais conteúdo relacionado
Mais procurados
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
H046053944
H046053944
IJERA Editor
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
Journal For Research
Cloud ready reference
Cloud ready reference
Helly Patel
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
Cloud Models
Cloud Models
Sweta Kumari Barnwal
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
Editor IJARCET
Security in Cloud Computing
Security in Cloud Computing
Ashish Patel
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
Secure Cloud Hosting.paper
Secure Cloud Hosting.paper
jagan339
Cloud versus cloud
Cloud versus cloud
Masoud Gholami
improve cloud security
improve cloud security
Balkees Shereek
Mais procurados
(19)
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Addressing the cloud computing security menace
Addressing the cloud computing security menace
H046053944
H046053944
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
Cloud ready reference
Cloud ready reference
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Cloud Models
Cloud Models
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
Security in Cloud Computing
Security in Cloud Computing
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Secure Cloud Hosting.paper
Secure Cloud Hosting.paper
Cloud versus cloud
Cloud versus cloud
improve cloud security
improve cloud security
Destaque
Hyperlink dipa
Hyperlink dipa
Paarief Udin
Career path o & g industry
Career path o & g industry
raghunathan janarthanan
Anno delle stelle, 15 agosto 2013
Anno delle stelle, 15 agosto 2013
Manos Italia
Anno delle stelle 24 agosto 2013
Anno delle stelle 24 agosto 2013
Manos Italia
1924 1929
1924 1929
Editor IJARCET
1663 1669
1663 1669
Editor IJARCET
1738 1742
1738 1742
Editor IJARCET
Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020
Editor IJARCET
Trust in God
Trust in God
ways2capitalcsr
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
1766 1770
1766 1770
Editor IJARCET
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
Editor IJARCET
Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291
Editor IJARCET
LKS Cerdas (y)
LKS Cerdas (y)
Dhelvy Ceethawwha
Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388
Editor IJARCET
Ratish Resume
Ratish Resume
Ratish Adakathabail
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
Editor IJARCET
1893 1896
1893 1896
Editor IJARCET
Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090
Editor IJARCET
Destaque
(20)
Hyperlink dipa
Hyperlink dipa
Career path o & g industry
Career path o & g industry
Anno delle stelle, 15 agosto 2013
Anno delle stelle, 15 agosto 2013
Anno delle stelle 24 agosto 2013
Anno delle stelle 24 agosto 2013
1924 1929
1924 1929
1663 1669
1663 1669
1738 1742
1738 1742
Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020
Trust in God
Trust in God
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
1766 1770
1766 1770
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291
LKS Cerdas (y)
LKS Cerdas (y)
Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388
Ratish Resume
Ratish Resume
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
1893 1896
1893 1896
Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090
Semelhante a Ijarcet vol-2-issue-3-1128-1131
G017324043
G017324043
IOSR Journals
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
Ant colony Optimization: A Solution of Load balancing in Cloud
Ant colony Optimization: A Solution of Load balancing in Cloud
dannyijwest
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
IOSR Journals
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
Basics of Cloud Computing
Basics of Cloud Computing
ijsrd.com
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
ijbuiiir1
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
ijtsrd
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Journals
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
ijujournal
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
ijujournal
Cloud computing
Cloud computing
Bijay Bhandari
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
Cloud Computing in Resource Management
Cloud Computing in Resource Management
Dr. Amarjeet Singh
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
Dr. Amarjeet Singh
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
IJERA Editor
Semelhante a Ijarcet vol-2-issue-3-1128-1131
(20)
G017324043
G017324043
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Ant colony Optimization: A Solution of Load balancing in Cloud
Ant colony Optimization: A Solution of Load balancing in Cloud
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
Basics of Cloud Computing
Basics of Cloud Computing
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
Addressing the cloud computing security menace
Addressing the cloud computing security menace
Addressing the cloud computing security menace
Addressing the cloud computing security menace
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
Cloud computing
Cloud computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
Cloud Computing in Resource Management
Cloud Computing in Resource Management
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
Mais de Editor IJARCET
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
Editor IJARCET
Mais de Editor IJARCET
(20)
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
Último
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Último
(20)
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ijarcet vol-2-issue-3-1128-1131
1.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1128 All Rights Reserved © 2013 IJARCET Cloud Computing: Migration from Traditional Systems to the Cloud Ganesh Olekar,Vikram Sreekumar Department of Computer Engineering, VIIT, Pune University Abstract- Over the past few decades Business organizations have tried hard to keep up with the changes encountered in the market. Various factors like increased load, security, availability, fail safe mechanisms etc. have to be taken care of by these organizations and the traditional approaches are turning out to be cumbersome as well as expensive. Various computing paradigms have been employed for this purpose and tested to meet these demands. In this paper, we present how Cloud Computing fares in meeting these requirements, how it can be used as a solution for various systems and the various advantages of migrating your system to the Cloud. Keywords- Cloud Computing, High Performance Computing, Hosting on the Cloud, Migration to the Cloud 1. INTRODUCTION Cloud computing is a general term for anything that involves delivering hosted services over the Internet. It is evolving as a key computer platform for sharing resources that include infrastructures, software, applications, and business processes. Virtualization is a core technology for enabling cloud resource sharing [5]. Everyone has a different perception of Cloud Computing. It can be the ability to rent a server or a thousand servers and run a geophysical modelling application on the most powerful systems available anywhere [8]. Cloud computing [1][3] is an emerging trend to deploy and maintain software and is being adopted by the industry such as Google, IBM, Microsoft, and Amazon. In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems‘ interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest. Cloud offerings can vary from virtual infrastructure, computing platforms, centralized data centres to end- user Web-Services and Web applications to enormous other focused computing services. Cloud Computing may be applied to solve problems in many domains of Information Technology like GIS (Geographical Information Systems), Scientific Research [2], e-Governance Systems [4], Decision Support Systems [9], ERP [3], Web Application Development [6], Mobile Technology [7] etc. This paper briefly discusses the application of Cloud Computing and the several benefits of hosting a system on the cloud. It also discusses the various issues faced while migrating from a traditional system to a system hosted on the cloud. 2. CLOUD COMPUTING: BRIEF DESCRIPTION According to NIST, National Institute of Standards and Technology: ―Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.‖ A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; It is elastic -- a user can have as much or as little of a service as they want at any given time The service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access). Cloud computing systems need at least twice the number of storage devices it requires to keep all its clients' information stored. That's because these
2.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1129 All Rights Reserved © 2013 IJARCET devices, like all computers, occasionally break down. A cloud computing system must make a copy of all its clients' information and store it on other devices. The copies enable the central server to access backup machines to retrieve data that otherwise would be unreachable. Making copies of data as a backup is called redundancy. 2.1 CLOUD COMPUTING: SERVICE MODEL The services offered within Cloud Computing are broadly divided into 3 major categories. 2.1.1 Software as a Service (SaaS) Software as a Service (SaaS) is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. With SaaS, a provider licenses an application to customers either as a service on demand, through a subscription, in a "pay-as-you-go" model, or (increasingly) at no charge. This approach to application delivery is part of the utility computing model where all of the technology is in the "cloud" accessed over the Internet as a service. Benefits of the SaaS model include easier administration, automatic updates, compatibility as all users will have the same version of the software, easier collaboration for the same reason and global accessibility. The most commonly referenced examples of SaaS is Salesforce.com‗s human-resource applications, which provides a customer relationship management (CRM) system accessible via the Internet Google Apps, Microsoft Office Live, Cisco WebEx ,Oracle CRM etc. 2.1.2 Platform as a Service (PaaS) Platform as a Service (PaaS) is an outgrowth of Software as a Service (SaaS), a software distribution model in which hosted software applications are made available to customers over the Internet. It is a way to rent hardware, operating systems, storage and network capacity over the Internet. The service delivery model allows the customer to rent virtualized servers and associated services for running existing applications or developing and testing new ones. PaaS offerings may include facilities for application design, application development, testing, deployment and hosting as well as application services such as team collaboration, web service integration and marshalling, database integration, security, scalability, storage, persistence, state management, application versioning, application instrumentation and developer community facilitation. It facilitates the deployment of customer- created applications to the cloud using provider- supported frameworks, including APIs based on Java, Python, or .Net. 2.1.3 Infrastructure as a Service (IaaS) Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis. The client typically pays on a per-use basis (Amazon Elastic Compute Cloud or Amazon Simple Storage Service e.g.). 2.2 CLOUD COMPUTING: TYPES In addition to service levels, cloud computing is also classified into deployment models, each with its own strengths and applications depending on customer and corporate requirements. 2.2.1 Private Cloud A private cloud is a proprietary network or a data centre that supplies hosted services to a limited number of people. The data and processes in the case of Private Cloud are administered inside the organization by an IT department within an organization, without the limitations of network bandwidth, security exposures and legal requirements that using public cloud services might involve. One major advantage of using the private cloud services is that it presents the provider and the user greater control of the cloud infrastructure, improving security and adjustability because user access and the networks used are constrained and selected. This model gives organizations a high level of control over the use of cloud resources while bringing in the expertise needed to establish and operate the environment [8]. 2.2.2 Community Cloud The cloud infrastructure is shared by several
3.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1130 All Rights Reserved © 2013 IJARCET organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on- premise or off-premise. Non-profit, social networking and affiliated groups often use community cloud infrastructures to leverage the one-size-fits-all templates for security, storage allocations, and other infrastructure components. 2.2.3 Public Cloud The public cloud is merely any cloud computing platform open for use to the public whether it is individuals or large corporations. It sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.)Public clouds, however, ensure that individual cloud users are offered ample security and privacy. Public clouds are most often hosted away from customer premises, and they provide a way to reduce customer risk and cost by providing a flexible, even temporary extension to enterprise infrastructure [8]. 2.2.4 Hybrid Cloud The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). Corporations often host their public-facing Website and eCommerce front ends on public cloud infrastructures, while they reserve private clouds for data storage and internal and intranet computing services. The public portion of the cloud accommodates bursts in traffic, while the private side of the cloud serves sustainable and stable applications and business functions. 3. MIGRATING TO THE CLOUD Once a company has decided to implement a Cloud infrastructure, it has to make another major decision. This decision is the path to be implemented for the migration. For this decision to be made various considerations have to be taken into account such as: Size and complexity of current applications Amount and number of applications Whether the current platform is due for updates or replacements The following methods are the most common methods of migration used by organizations worldwide. 3.1 Incremental Cloud Deployment Most companies start out incrementally, choosing a SaaS or IaaS application that would replace an in- house application, such as CRM, Sales force automation, or email. After this application is run successfully then new components are then hosted on the cloud. The company generally documents the migration of each system and application in order to determine the difference in the cost and the performance and observe if the changes are fruitful for the organization. 3.2 Legacy Migration Migration to the Cloud isn‘t an easy task. Thus for a large organization it is imperative that businesses with a large base of legacy computing applications have a competent and experienced cloud computing provider to help them reengineer their systems for optimum performance and reliability. Productivity, customer satisfaction, and business continuity cannot suffer during a migration. Companies should create mirror systems of key legacy applications — one on the new cloud platform, another on the existing platform, and compare performance, reliability, functionality before cutting over to the cloud-based version. Also, companies should consider moving the most critical legacy applications last. 3.3 Avoiding Costly Upgrades When businesses are faced with costly and complex upgrades to applications the Cloud computing alternatives should be considered. Instead of procuring new software as well as hardware for storage a company can upload existing data from their legacy applications on the cloud and test the applications on live data and retire the legacy application once the platform is fully tested. This is one of the most common reasons for migration these days. 3.4 Straight to the Cloud Customers with relatively simple legacy applications, such as business productivity software and a few custom applications are better off making a complete changeover. The cloud infrastructure and applications can be configured, tested, and rolled out in tandem with old systems, and cut over can occur fairly quickly. 4. THE CLOUD ADVANTAGE Hosting a system on the Cloud has various advantages. Most of the Information Support Systems usually deal with large volume of data (structured and unstructured) that requires huge CPU power to produce results in reasonable time on which wide range of users are dependent which may be located
4.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1131 All Rights Reserved © 2013 IJARCET over a large geographical area. However, configuring and maintaining a cluster or a computational grid is usually a very cumbersome activity that requires specialists to support it. In addition, the high cost to acquire this computational apparatus can be considered a serious problem to the effective use of the ISS in terms of timeliness service and availability. Businesses can also save on power costs as they reduce the number of servers required. And with IT staff spending less time managing and monitoring the data centre, IT teams are well placed to further streamline their operations as staff complete more work on fewer machines. The major advantages of hosting a system on the cloud include: 4.1 On Demand Scalability The ability of Cloud Computing solutions to scale up and down is a major advantage. If a system has varied loads at different points of time the system will be able to cater those changes. Using the Cloud a threshold value can be set for putting up another server to balance the load on the system. This enables the efficient running of the application. 4.2 Streamlining the Data Centre With no more worries regarding storage, hosting on the cloud has saved a lot of resources for organizations. [10] 4.3 Cost Efficient Traditional desktop software cost companies a lot in terms of finance. Add to that the licensing fees for enabling the use of that software by multiple users can prove to be very expensive for the organization. The Cloud is available at cheaper rates and also includes various ‗pay as per usage‘ options for reducing the expenses by a great margin. 4.4 Backup and Recovery This is one of the biggest advantages of hosting on the cloud. Since most of the data is hosted on the Cloud, backup is made much easier as compared to storing the same on physical device. Moreover, cloud service providers are competent enough to handle recovery of information. 5. CONCLUSION In this paper we discussed Cloud Computing in general and how it helps in improving the running of an application. We also have discussed the strategies that could be implemented for the migration a traditional system that‘s currently hosted on physical servers within the organization or otherwise to a system hosted on the Cloud. The various advantages and challenges associated with the same have also been presented. Cloud Computing is still taking its baby steps but it promises to be the future of the IT sector. Although it has its numerous advantages, like anything in this world it does have its disadvantages too. But, as long as the pros overcome the cons for an organization this platform should be carefully considered while facing issues like those mentioned above. 6. ACKNOWLEDGMENT We would like to express our sincere gratitude towards our guide Prof. L.A. Deshpande who at every step in the study for this paper contributed by giving valuable input to help us in completing this paper successfully. 7. REFERENCES [1] Cloud Computing. Wikipedia. Available at http://en.wiki pedia.org/wiki/Cloud_computing [2] Daniel Oliveira, Eduardo Ogasawara. Article: ―Is Cloud Computing the solution for Brazilian Researchers?‖, International Journal of Computer Applications 6(8), September 2010. [3] I. Foster, Y. Zhao, I. Raicu, and S. Lu, 2008, Cloud Computing and Grid Computing 360-Degree Compared, In: ―Grid Computing Environments Workshop, 2008. GCE '08. [4] K.Mukherjee and G.Sahoo. Article: Cloud Computing: Future Framework for e-Governance. International Journal of Computer Applications 7(7):31–34, October. [5] Liang-Jie Zhang, Qun Zhou, "CCOA: Cloud Computing Open Architecture," icws, pp.607-616, 2009 IEEE International Conference on Web Services, 2009. [6] L.R. Rewatkar, U.A. Lanjewar. Article: ―Implementation of Cloud Computing on Web Application.‖ International Journal of Computer Applications 2(8), June 2010. [7] Sonal Anand, Sarvesh Gupta, Shweta Fatnani, Varsha Sharma and Deepti Jain. Article: Semantic Cloud for Mobile Technology. International Journal of Computer Applications 8(12):1–4, October 2010. [8] Sun Microsystems White Paper, ―Introduction to CloudComputing Architecture, June 2009. [9] W.K. Chan, Lijun Mei, and Zhenyu Zhang, "Modeling and testing of cloud applications", to appear in Proceedings of 2009 IEEE Asia-Pacific Services Computing Conference (APSCC 2009), (Singapore, December 7-11, 2009), IEEE Computer Society Press, Los Alamitos, CA, USA, 2009. [10] M.A. Bhat, R.M. Shah, B. Ahmad, I.R. Bhat, ―Cloud Computing: A Solution to Information Support Systems‖, to appear in International Journal Of Computer Applications 11(5), December 2010.
Baixar agora