SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computational Engineering Research||Vol, 03||Issue, 7||
www.ijceronline.com ||July ||2013|| Page 27
Research on Cloud Computing
1,
Done VinodKumar, 2,
Thudum Venkatesh, 3,
Kondabathula Durga charan,
4,
Chandrasekhar T
1,2,3,4,
M. Tech in Computational Engineering, RGUKT
I. INTRODUCTION
Cloud computing describes the approach, abstracted IT infrastructures (computing capacity, data
storage, network capacity, or even finished software) dynamically adapted to the needs of a network to provide.
From the user point of view, provided abstracted IT infrastructure seems distant and obscure, hidden in a
“cloud” to happen. Supply and utilization of these services take place exclusively via defined technical
interfaces and protocols. The range of cloud computing as part of services offered covers the complete spectrum
of information technology and includes, among other things, infrastructure (such as processing power, disk
space), platforms and software. In simplified terms one can follow the concept can be described as: A part of the
IT environment (in this context, such as hardware such as data center, data storage and software ) is on the user
side not operated or be provided locally, but with one or more providers hired as a service usually located
geographically far away. The applications and data are no longer on the local machine or in the corporate data
center, but in the (metaphorical) cloud. The design element of an abstract outline of clouds in network diagrams
often used to represent an unspecified part of the Internet.
The access to the remote systems of a network, such as that of the Internet is in use. But there are also
companies in the context of so-called private clouds, where provision of a corporate intranet is done. Most
providers of cloud solutions leverage the pooling effects that arise from the sharing of resources for their
business model.
II. ARCHITECTURE
Cloud reference architecture model, which portrays the architectural layers, connected via APIs and
repositories. If we study the framework more closely, the following aspects can be articulated. At the foundation
of this framework is the data center technology architecture, which consists of three salient blocks of network,
compute, and storage. This layer hosts all the services that are delivered to a cloud consumer or subscriber. This
layer will be discussed in more detail in later sections of this paper. The next important layer is the security
layer. The key takeaway in this layer is that security is blanketed as an end-to-end architecture across all aspects
of the framework. Security is considered as one of the key challenges to be solved in a cloud framework; hence,
it has to be accounted for in a comprehensive sense. This layer will be discussed in more detail in later sections
of this paper.
ABSTRACT
This paper is an introduction to the terms, characteristics, and services associated with
network-based computing, commonly referred to as cloud computing. Cloud Computing is a
technology that uses the network and central remote servers to maintain data and applications. Cloud
computing allows consumers and businesses to use applications without installation and access their
personal files at any computer with network access. This technology allows for much more efficient
computing by centralizing data storage, processing and bandwidth. The primary business service
models being deployed (such as software, platform, and infrastructure as a service) and common
deployment models employed by service providers and users to use and maintain the cloud services
(such as the private, public, community, and hybrid clouds) are discussed.
KEYWORDS: Architecture, Shared infrastructure, Network access, managed metering, Service
models, Deployment models, Software as a Service (SAAS), Platform as a Service (PAAS), and
Infrastructure as a Service (IAAS).
Research On Cloud Computing…
www.ijceronline.com ||July ||2013|| Page 28
Fig1. Cloud Reference Architecture Framework
Following the technology and security layer is the Service Orchestration layer, which is implemented
with configuration repository enablers. The configuration repository stores key information such as service
catalogue, asset inventory, and resource-to-service mappings. This layer is an important layer because it maps
the technology components to the service components and serves as a reference point during service
provisioning. The service orchestration layer is the “glue” that integrates the lower layers to create a service for
delivery.The next layer is also where infrastructure and service management function take place.The topmost
layer is the consumer-facing layer, usually exposed via a portal-like solution.This is the layer where service is
defined, requested, and managed by the consumer.
Let’s walk through a use case scenario where this framework is utilized.
1 Consumer logs on to a cloud portal and verifies/updates credentials and information.
2 Based on the consumer entitlement, a selected a set of services are identified and presented for
definition.
3 The end user selects the service for consumptions and triggers a service-provisioning request.
4 Resources are marked as reserved for service, and a new request is created for services provisioning.
5 The individual domains of compute, network, and storage are configured and provisioned, with
requested security and service-level agreements (SLAs), for service delivery.
III. CHARACTERISTICS
Cloud computing has a variety of characteristics, with the main ones being.
3.1 Shared Infrastructure
Shared infrastructure uses a virtualized software model, enabling the sharing of physical services,
storage, and networking capabilities. The cloud infrastructure, regardless of deployment model, seeks to make
the most of the available infrastructure across a number of users.
3.2 Dynamic Provisioning
Dynamic provisioning allows for the provision of services based on current demand requirements. This
is done automatically Using software automation, enabling the expansion and contraction of service capability,
as needed. This dynamic scaling needs to be done while maintaining high levels of reliability and security.
Research On Cloud Computing…
www.ijceronline.com ||July ||2013|| Page 29
3.3 Network Access
Network access needs to be accessed across the internet from a broad range of devices such as PCs,
laptops, and mobile devices, using standards-based APIs (for example, ones based on HTTP). Deployments of
services in the cloud include everything from using business applications to the latest application on the newest
smart phones.
3.4 Managed Metering
Managed metering uses metering for managing and optimizing the service and to provide reporting and
billing information. In this way, consumers are billed for services according to how much they have actually
used during the billing period. In short, cloud computing allows for the sharing and scalable deployment of
services, as needed, from almost any location, and for which the customer can be billed based on actual usage.
IV. SERVICE MODELS
Cloud computing refers to both the applications delivered as services over the Internet and the
hardware and systems software in the data centers that provide those services. The services themselves have
long been referred to as Software as a Service (SaaS). Some vendors use terms such as IaaS (Infrastructure as a
Service) and PaaS (Platform as a Service) to describe their products, but we eschew these because accepted
definitions for them still vary widely.
Fig2. The cloud computing stack
Once a cloud is established, how its cloud computing services are deployed in terms of business models
can differ depending on requirements. The primary service models being deployed (see Figure 2) are commonly
known as.
4.1 Software as a Service (SaaS)
Consumers purchase the ability to access and use an application or service that is hosted in the cloud. A
benchmark example of this is Salesforce.com, as discussed previously, where necessary information for the
interaction between the consumer and the service is hosted as part of the service in the cloud. Also, Microsoft is
expanding its involvement in this area, and as part of the cloud computing option for Microsoft Office 2010, its
Office Web Apps are available to Office volume licensing customers and Office Web App subscriptions through
its cloud-based on-line services.
4.2 Platform as a Service (PaaS)
Consumers purchase access to the platforms, enabling them to deploy their own software and
applications in the cloud. The operating systems and network access are not managed by the consumer, and
there might be constraints as to which applications can be deployed.
4.3 Infrastructure as a Service (IaaS)
Consumers control and manage the systems in terms of the operating systems, applications, storage,
and network connectivity, but they do not control the cloud infrastructure. Also known are the various subsets of
these models that may be related to a particular industry or market. Communications as a Service (CaaS) is one
Research On Cloud Computing…
www.ijceronline.com ||July ||2013|| Page 30
such subset model used to describe hosted IP telephony services. Along with the move to CaaS is a shift to more
IP-centric communications and more SIP trucking deployments. With IP and SIP in place, it can be as easy to
have the PBX in the cloud as it is to have it on the premise. In this context, CaaS could be seen as a subset of
SaaS.
V. DEPLOYMENT MODELS
Deploying cloud computing can differ depending on requirements, and the following four deployment
models have been identified, each with specific characteristics that support the needs of the services and users of
the clouds in particular ways. Although cloud computing has emerged mainly from the appearance of public
computing utilities, other deployment models, with variations in physical location and distribution, have been
adopted. In this sense, regardless of its service class, a cloud can be classified as public, private, community, or
hybrid based on model of deployment as shown in Figure
Fig3. Types of clouds based on deployment models.
5.1 Private Cloud
The cloud infrastructure has been deployed, and is maintained and operated for a specific organization.
The operation may be in-house or with a third party on the premises.
5.2 Public Cloud
The cloud infrastructure is available to the public on a commercial basis by a cloud service provider.
This enables a consumer to develop and deploy a service in the cloud with very little financial outlay compared
to the capital expenditure requirements normally associated with other deployment options.
5.3 Hybrid Cloud
The cloud infrastructure consists of a number of clouds of any type, but the clouds have the ability
through their interfaces to allow data and/or applications to be moved from one cloud to another. This can be a
combination of private and public clouds that support the requirement to retain some data in an organization,
and also the need to offer services in the cloud.
VI. UNDERLYING TECHNOLOGIES
Virtualization, Clustering and Grid computing are simply some types of underlying technologies for
implementing cloud computing.
6.1 Virtualization
Internet, it is a large collection of networks where resources are globally networked, In internet cloud
computing plays a major role In order to share the data and one of the important technology in the cloud
computing is virtualization. Mainly it is used to maintain the collection IT resources which are used by the cloud
Research On Cloud Computing…
www.ijceronline.com ||July ||2013|| Page 31
providers. The main aim of the virtualization is ability to run the multiple operating systems on a single machine
buy sharing all the resources that belong to the hard ware. In this paper our main goal is to provide the basic
knowledge about the virtualization technology in cloud computing and how it acts in the cloud computing
environment. And we also discuss about, how to maintain the virtualized environment with the optimized
resources.
Fig4. Server Virtualization
In virtualization, cloud back end layer which holds the key access to physical resources are bind with hyper-
visor layer and the technique of virtualization is performed at that time, virtualization breaks the one physical
resource into the multiple virtual resources and controls the access limit and utilization to single physical
resource.These multiple virtual resources are then allowed to be shared across different consumers. This brings
the optimum resource utilization.
6.2 Clustering
On the other hand if demand increases by the consumer where he requires more the potential of
existing physical resource and does not really have the time to do the remodeling of resource sharing, cloud
comes with benefits of scalability, now to use this effectively engineers uses the concept of sharing called
clustering, this is grouping or binding the two or more physical resources in such a way that pool of availability
never dries out. On top it makes it look like a single virtual entity to design to satisfy the operational
requirement.
Fig5. Clustering
Research On Cloud Computing…
www.ijceronline.com ||July ||2013|| Page 32
6.3 Grid Computing
Grid computing is the federation of computer resources from multiple locations to reach a common
goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large
number of files. What distinguishes grid computing from conventional high performance computing systems
such as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically
dispersed. Although a single grid can be dedicated to a particular application, commonly a grid is used for a
variety of purposes. Grids are often constructed with general-purpose grid middleware software libraries.
Internet, it is a large collection of networks where resources are globally networked, In internet cloud computing
plays a major role In order to share the data and one of the important technology in the cloud computing is
virtualization. Mainly it is used to maintain the collection IT resources which are used by the cloud providers.
The mainaim of the virtualization is ability to run the multiple operating systems on a single machine buy
sharing all the resources that belong to the hard ware. In this paper our main goal is to provide the basic
knowledge about the virtualization technology in cloud computing and how it acts in the cloud computing
environment. And we also discuss about, how to maintain the virtualized environment with the optimized
resources.
VII. CONCLUSION
Among the most popular cloud services now are social networking sites (the 500 million people using
Face book are being social in the cloud), webmail services like Hotmail and Yahoo mail, micro blogging and
blogging services such as Twitter and Word Press, video-sharing sites like YouTube, picture-sharing sites such
as Flick, document and applications sites like Google Docs, social-bookmarking sites like Delicious, business
sites like eBay, and ranking, rating and commenting sites such as Yelp and Trip Advisor.A simple example of
cloud computing is Yahoo email, Gmail, or Hotmail etc. All you need is just an internet connection and you can
start sending emails. The server and email management software is all on the cloud (internet) and is totally
managed by the cloud service provider Yahoo, Google etc. The consumer gets to use the software alone and
enjoy the benefits.
REFERENCES
[1]. Wikipedia, “Cloud Computing” http://en.wikipedia.org/wiki/Cloud_computing, Oct 12, 2012
http://simple.wikipedia.org/wiki/Cloud_computing
[2]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud computingand emerging IT platforms: Vision, hype, and
reality for delivering computing asthe 5th utility, Future Generation Computer Systems, 25:599_616, 2009.
[3]. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, A break in theclouds: Towards a cloud definition, SIGCOMM
Computer CommunicationsReview, 39:50_55, 2009.
[4]. National Institute of Standards and Technology, “The NIST Definition of Cloud Computing”
[5]. How Stuff Works, “Cloud Computing Working”,
[6]. McKinsey & Co., Clearing the Air on Cloud Computing, Technical Report, 2009.On Cloud Computing, “Cloud computing
Technology/cloud computing architecture”, http://www.oncloudcomputing.com/en/2009/09/cloud-computing-architecture-cloud-
computing-technology/, Feb 26, 2012.
[7]. “Cloud computing-The New Frontier of Internet Computing”, Science Direct, the MITRE Corporation, George Pallis.
[8]. How does the cloud computing works and technologies behind it
http://www.diceitwise.com/how-does-cloud-computing-work-and-technology-behind-it/#.UcCpfPL_zxq
[9]. Advance in Cloud. Research in Future of Cloud Computing
[10]. The Future of Cloud Computing by Janna Quitney Anderson, Elon University and Lee Rainie, Pew Internet & American Life
Project June 11, 2010
[11]. International Business Machines Corp., An architectural blueprint for autonomiccomputing, White Paper Fourth Edition, 2006.
[12]. R. P. Goldberg, Survey of virtual machine research, IEEE Computer, 7(6):34_45, 1974.
[13]. IBM, “Cloud Computing”, http://www.ibm.com/cloud-computing/us/en/, March 30, 2012.
[14]. “Cloud computing for Beginners”, http://www.techno-pulse.com/
[15]. Cloud computing Web based Application that change the way you work and collaborative online
[16]. A brief guide to cloud computing by Christopher Barnett
[17]. Blau, D. Neumann, C. Weinhardt, and S. Lamparter, Planning and pricing ofservice mashups, in Proceedings of the 2008 10th
IEEE Conference on E-commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-
Services, Crystal City, Washington, DC, 2008, pp.19_26.
[18]. Sotomayor, R. S. Montero, I. M. Llorente, and I. Foster, Virtual infrastructure Management in private and hybrid clouds, IEEE
Internet Computing, 13(5):14_22, September/October, 2009.

More Related Content

What's hot

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 

What's hot (20)

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Sem rep edited
Sem rep editedSem rep edited
Sem rep edited
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 

Viewers also liked

Analysis on Cloud Computing Database
Analysis on Cloud Computing DatabaseAnalysis on Cloud Computing Database
Analysis on Cloud Computing DatabaseMayuree Srikulwong
 
Cloud Computing by Schipul, the Web Marketing Company
Cloud Computing by Schipul, the Web Marketing CompanyCloud Computing by Schipul, the Web Marketing Company
Cloud Computing by Schipul, the Web Marketing CompanyIABC Houston
 
Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...
Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...
Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...GigaScience, BGI Hong Kong
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectMohamed Shorbagy
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

Viewers also liked (8)

Analysis on Cloud Computing Database
Analysis on Cloud Computing DatabaseAnalysis on Cloud Computing Database
Analysis on Cloud Computing Database
 
Cloud Computing by Schipul, the Web Marketing Company
Cloud Computing by Schipul, the Web Marketing CompanyCloud Computing by Schipul, the Web Marketing Company
Cloud Computing by Schipul, the Web Marketing Company
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...
Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...
Mohamed Abouelhoda: Next Generation Workflow Systems on the Cloud: The Tavaxy...
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation Project
 
Oracle Database Cloud Service
Oracle Database Cloud ServiceOracle Database Cloud Service
Oracle Database Cloud Service
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similar to International Journal of Computational Engineering Research(IJCER)

Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingIOSR Journals
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computingAlexander Decker
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computingAlexander Decker
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewIOSR Journals
 
Cloud computing - Latest Trend
Cloud computing - Latest TrendCloud computing - Latest Trend
Cloud computing - Latest Trendpoojanov04
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 

Similar to International Journal of Computational Engineering Research(IJCER) (20)

Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
G017324043
G017324043G017324043
G017324043
 
G0314043
G0314043G0314043
G0314043
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
An Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud ComputingAn Analysis on Business Value of Cloud Computing
An Analysis on Business Value of Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
 
Cloud computing - Latest Trend
Cloud computing - Latest TrendCloud computing - Latest Trend
Cloud computing - Latest Trend
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

International Journal of Computational Engineering Research(IJCER)

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 7|| www.ijceronline.com ||July ||2013|| Page 27 Research on Cloud Computing 1, Done VinodKumar, 2, Thudum Venkatesh, 3, Kondabathula Durga charan, 4, Chandrasekhar T 1,2,3,4, M. Tech in Computational Engineering, RGUKT I. INTRODUCTION Cloud computing describes the approach, abstracted IT infrastructures (computing capacity, data storage, network capacity, or even finished software) dynamically adapted to the needs of a network to provide. From the user point of view, provided abstracted IT infrastructure seems distant and obscure, hidden in a “cloud” to happen. Supply and utilization of these services take place exclusively via defined technical interfaces and protocols. The range of cloud computing as part of services offered covers the complete spectrum of information technology and includes, among other things, infrastructure (such as processing power, disk space), platforms and software. In simplified terms one can follow the concept can be described as: A part of the IT environment (in this context, such as hardware such as data center, data storage and software ) is on the user side not operated or be provided locally, but with one or more providers hired as a service usually located geographically far away. The applications and data are no longer on the local machine or in the corporate data center, but in the (metaphorical) cloud. The design element of an abstract outline of clouds in network diagrams often used to represent an unspecified part of the Internet. The access to the remote systems of a network, such as that of the Internet is in use. But there are also companies in the context of so-called private clouds, where provision of a corporate intranet is done. Most providers of cloud solutions leverage the pooling effects that arise from the sharing of resources for their business model. II. ARCHITECTURE Cloud reference architecture model, which portrays the architectural layers, connected via APIs and repositories. If we study the framework more closely, the following aspects can be articulated. At the foundation of this framework is the data center technology architecture, which consists of three salient blocks of network, compute, and storage. This layer hosts all the services that are delivered to a cloud consumer or subscriber. This layer will be discussed in more detail in later sections of this paper. The next important layer is the security layer. The key takeaway in this layer is that security is blanketed as an end-to-end architecture across all aspects of the framework. Security is considered as one of the key challenges to be solved in a cloud framework; hence, it has to be accounted for in a comprehensive sense. This layer will be discussed in more detail in later sections of this paper. ABSTRACT This paper is an introduction to the terms, characteristics, and services associated with network-based computing, commonly referred to as cloud computing. Cloud Computing is a technology that uses the network and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with network access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth. The primary business service models being deployed (such as software, platform, and infrastructure as a service) and common deployment models employed by service providers and users to use and maintain the cloud services (such as the private, public, community, and hybrid clouds) are discussed. KEYWORDS: Architecture, Shared infrastructure, Network access, managed metering, Service models, Deployment models, Software as a Service (SAAS), Platform as a Service (PAAS), and Infrastructure as a Service (IAAS).
  • 2. Research On Cloud Computing… www.ijceronline.com ||July ||2013|| Page 28 Fig1. Cloud Reference Architecture Framework Following the technology and security layer is the Service Orchestration layer, which is implemented with configuration repository enablers. The configuration repository stores key information such as service catalogue, asset inventory, and resource-to-service mappings. This layer is an important layer because it maps the technology components to the service components and serves as a reference point during service provisioning. The service orchestration layer is the “glue” that integrates the lower layers to create a service for delivery.The next layer is also where infrastructure and service management function take place.The topmost layer is the consumer-facing layer, usually exposed via a portal-like solution.This is the layer where service is defined, requested, and managed by the consumer. Let’s walk through a use case scenario where this framework is utilized. 1 Consumer logs on to a cloud portal and verifies/updates credentials and information. 2 Based on the consumer entitlement, a selected a set of services are identified and presented for definition. 3 The end user selects the service for consumptions and triggers a service-provisioning request. 4 Resources are marked as reserved for service, and a new request is created for services provisioning. 5 The individual domains of compute, network, and storage are configured and provisioned, with requested security and service-level agreements (SLAs), for service delivery. III. CHARACTERISTICS Cloud computing has a variety of characteristics, with the main ones being. 3.1 Shared Infrastructure Shared infrastructure uses a virtualized software model, enabling the sharing of physical services, storage, and networking capabilities. The cloud infrastructure, regardless of deployment model, seeks to make the most of the available infrastructure across a number of users. 3.2 Dynamic Provisioning Dynamic provisioning allows for the provision of services based on current demand requirements. This is done automatically Using software automation, enabling the expansion and contraction of service capability, as needed. This dynamic scaling needs to be done while maintaining high levels of reliability and security.
  • 3. Research On Cloud Computing… www.ijceronline.com ||July ||2013|| Page 29 3.3 Network Access Network access needs to be accessed across the internet from a broad range of devices such as PCs, laptops, and mobile devices, using standards-based APIs (for example, ones based on HTTP). Deployments of services in the cloud include everything from using business applications to the latest application on the newest smart phones. 3.4 Managed Metering Managed metering uses metering for managing and optimizing the service and to provide reporting and billing information. In this way, consumers are billed for services according to how much they have actually used during the billing period. In short, cloud computing allows for the sharing and scalable deployment of services, as needed, from almost any location, and for which the customer can be billed based on actual usage. IV. SERVICE MODELS Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centers that provide those services. The services themselves have long been referred to as Software as a Service (SaaS). Some vendors use terms such as IaaS (Infrastructure as a Service) and PaaS (Platform as a Service) to describe their products, but we eschew these because accepted definitions for them still vary widely. Fig2. The cloud computing stack Once a cloud is established, how its cloud computing services are deployed in terms of business models can differ depending on requirements. The primary service models being deployed (see Figure 2) are commonly known as. 4.1 Software as a Service (SaaS) Consumers purchase the ability to access and use an application or service that is hosted in the cloud. A benchmark example of this is Salesforce.com, as discussed previously, where necessary information for the interaction between the consumer and the service is hosted as part of the service in the cloud. Also, Microsoft is expanding its involvement in this area, and as part of the cloud computing option for Microsoft Office 2010, its Office Web Apps are available to Office volume licensing customers and Office Web App subscriptions through its cloud-based on-line services. 4.2 Platform as a Service (PaaS) Consumers purchase access to the platforms, enabling them to deploy their own software and applications in the cloud. The operating systems and network access are not managed by the consumer, and there might be constraints as to which applications can be deployed. 4.3 Infrastructure as a Service (IaaS) Consumers control and manage the systems in terms of the operating systems, applications, storage, and network connectivity, but they do not control the cloud infrastructure. Also known are the various subsets of these models that may be related to a particular industry or market. Communications as a Service (CaaS) is one
  • 4. Research On Cloud Computing… www.ijceronline.com ||July ||2013|| Page 30 such subset model used to describe hosted IP telephony services. Along with the move to CaaS is a shift to more IP-centric communications and more SIP trucking deployments. With IP and SIP in place, it can be as easy to have the PBX in the cloud as it is to have it on the premise. In this context, CaaS could be seen as a subset of SaaS. V. DEPLOYMENT MODELS Deploying cloud computing can differ depending on requirements, and the following four deployment models have been identified, each with specific characteristics that support the needs of the services and users of the clouds in particular ways. Although cloud computing has emerged mainly from the appearance of public computing utilities, other deployment models, with variations in physical location and distribution, have been adopted. In this sense, regardless of its service class, a cloud can be classified as public, private, community, or hybrid based on model of deployment as shown in Figure Fig3. Types of clouds based on deployment models. 5.1 Private Cloud The cloud infrastructure has been deployed, and is maintained and operated for a specific organization. The operation may be in-house or with a third party on the premises. 5.2 Public Cloud The cloud infrastructure is available to the public on a commercial basis by a cloud service provider. This enables a consumer to develop and deploy a service in the cloud with very little financial outlay compared to the capital expenditure requirements normally associated with other deployment options. 5.3 Hybrid Cloud The cloud infrastructure consists of a number of clouds of any type, but the clouds have the ability through their interfaces to allow data and/or applications to be moved from one cloud to another. This can be a combination of private and public clouds that support the requirement to retain some data in an organization, and also the need to offer services in the cloud. VI. UNDERLYING TECHNOLOGIES Virtualization, Clustering and Grid computing are simply some types of underlying technologies for implementing cloud computing. 6.1 Virtualization Internet, it is a large collection of networks where resources are globally networked, In internet cloud computing plays a major role In order to share the data and one of the important technology in the cloud computing is virtualization. Mainly it is used to maintain the collection IT resources which are used by the cloud
  • 5. Research On Cloud Computing… www.ijceronline.com ||July ||2013|| Page 31 providers. The main aim of the virtualization is ability to run the multiple operating systems on a single machine buy sharing all the resources that belong to the hard ware. In this paper our main goal is to provide the basic knowledge about the virtualization technology in cloud computing and how it acts in the cloud computing environment. And we also discuss about, how to maintain the virtualized environment with the optimized resources. Fig4. Server Virtualization In virtualization, cloud back end layer which holds the key access to physical resources are bind with hyper- visor layer and the technique of virtualization is performed at that time, virtualization breaks the one physical resource into the multiple virtual resources and controls the access limit and utilization to single physical resource.These multiple virtual resources are then allowed to be shared across different consumers. This brings the optimum resource utilization. 6.2 Clustering On the other hand if demand increases by the consumer where he requires more the potential of existing physical resource and does not really have the time to do the remodeling of resource sharing, cloud comes with benefits of scalability, now to use this effectively engineers uses the concept of sharing called clustering, this is grouping or binding the two or more physical resources in such a way that pool of availability never dries out. On top it makes it look like a single virtual entity to design to satisfy the operational requirement. Fig5. Clustering
  • 6. Research On Cloud Computing… www.ijceronline.com ||July ||2013|| Page 32 6.3 Grid Computing Grid computing is the federation of computer resources from multiple locations to reach a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files. What distinguishes grid computing from conventional high performance computing systems such as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed. Although a single grid can be dedicated to a particular application, commonly a grid is used for a variety of purposes. Grids are often constructed with general-purpose grid middleware software libraries. Internet, it is a large collection of networks where resources are globally networked, In internet cloud computing plays a major role In order to share the data and one of the important technology in the cloud computing is virtualization. Mainly it is used to maintain the collection IT resources which are used by the cloud providers. The mainaim of the virtualization is ability to run the multiple operating systems on a single machine buy sharing all the resources that belong to the hard ware. In this paper our main goal is to provide the basic knowledge about the virtualization technology in cloud computing and how it acts in the cloud computing environment. And we also discuss about, how to maintain the virtualized environment with the optimized resources. VII. CONCLUSION Among the most popular cloud services now are social networking sites (the 500 million people using Face book are being social in the cloud), webmail services like Hotmail and Yahoo mail, micro blogging and blogging services such as Twitter and Word Press, video-sharing sites like YouTube, picture-sharing sites such as Flick, document and applications sites like Google Docs, social-bookmarking sites like Delicious, business sites like eBay, and ranking, rating and commenting sites such as Yelp and Trip Advisor.A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. All you need is just an internet connection and you can start sending emails. The server and email management software is all on the cloud (internet) and is totally managed by the cloud service provider Yahoo, Google etc. The consumer gets to use the software alone and enjoy the benefits. REFERENCES [1]. Wikipedia, “Cloud Computing” http://en.wikipedia.org/wiki/Cloud_computing, Oct 12, 2012 http://simple.wikipedia.org/wiki/Cloud_computing [2]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud computingand emerging IT platforms: Vision, hype, and reality for delivering computing asthe 5th utility, Future Generation Computer Systems, 25:599_616, 2009. [3]. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, A break in theclouds: Towards a cloud definition, SIGCOMM Computer CommunicationsReview, 39:50_55, 2009. [4]. National Institute of Standards and Technology, “The NIST Definition of Cloud Computing” [5]. How Stuff Works, “Cloud Computing Working”, [6]. McKinsey & Co., Clearing the Air on Cloud Computing, Technical Report, 2009.On Cloud Computing, “Cloud computing Technology/cloud computing architecture”, http://www.oncloudcomputing.com/en/2009/09/cloud-computing-architecture-cloud- computing-technology/, Feb 26, 2012. [7]. “Cloud computing-The New Frontier of Internet Computing”, Science Direct, the MITRE Corporation, George Pallis. [8]. How does the cloud computing works and technologies behind it http://www.diceitwise.com/how-does-cloud-computing-work-and-technology-behind-it/#.UcCpfPL_zxq [9]. Advance in Cloud. Research in Future of Cloud Computing [10]. The Future of Cloud Computing by Janna Quitney Anderson, Elon University and Lee Rainie, Pew Internet & American Life Project June 11, 2010 [11]. International Business Machines Corp., An architectural blueprint for autonomiccomputing, White Paper Fourth Edition, 2006. [12]. R. P. Goldberg, Survey of virtual machine research, IEEE Computer, 7(6):34_45, 1974. [13]. IBM, “Cloud Computing”, http://www.ibm.com/cloud-computing/us/en/, March 30, 2012. [14]. “Cloud computing for Beginners”, http://www.techno-pulse.com/ [15]. Cloud computing Web based Application that change the way you work and collaborative online [16]. A brief guide to cloud computing by Christopher Barnett [17]. Blau, D. Neumann, C. Weinhardt, and S. Lamparter, Planning and pricing ofservice mashups, in Proceedings of the 2008 10th IEEE Conference on E-commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E- Services, Crystal City, Washington, DC, 2008, pp.19_26. [18]. Sotomayor, R. S. Montero, I. M. Llorente, and I. Foster, Virtual infrastructure Management in private and hybrid clouds, IEEE Internet Computing, 13(5):14_22, September/October, 2009.