SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                             International Journal of Advanced Research in Computer Engineering & Technology
                                                                                  Volume 1, Issue 5, July 2012



                         “Cloud Service Utilization”
                                            Journey to cloud...
                                                     1
                                                      Pranay Chauhan
                               Assistant Professor, Dept, Of Information Technology, SVCE, Indore
                                                1
                                                  pranaychauhan1985@gmail.com,




Abstract                                                             means the system is cloud system.       Know moving
As we know that cloud computing is an emerging area,                 towards the cloud we should know that cloud is vast
the services provided by the cloud is helpful to
overcome the limitation of Information Technology.                   there is no end so we call it as a journey to cloud. On
Such as Globalization, Security, Storage and the most                our journey to cloud there are mainly three phases [1.
important Cost. And as Cloud plays a vital role to
overcome these challenges of new age of Information                  EMC] First phase is Classic data center, and then
technology. The above paper would focus on various                   second phase is Virtual Data Center and at last cloud.
factors in which cloud mainly developed the suitable
environment for Communication and business aspects,                  Figure 1.2 shows the three different phases towards
new trends in the emerging arena and various issues                  cloud computing [1].
regarding the cloud computing. At various domains
and how these domain mainly get affected by the
cloud.
Keywords: - Virtualization, Storage, Compute,
Security.

Introduction
As when we talk about the cloud the first thing that
comes in our mind when we look upward at cloud is
the unlimited space [2]. According to NIST i.e.
National institute of standard technology the cloud
mainly contain the five characteristics
                                                                     Figure 1.2: Shows the different Phases in the cloud
                                                                     computing

                                                                     Know coming to the classic data center (CDC), it
                                                                     mainly consist of the several component such as
                                                                     Compute, Applications, DBMS, Storage, Networks.
                                                                     The compute mainly consists of the logical and
                                                                     physical components such as hard disk, floppy drive,
                                                                     RAM, ROM, Processors, Switches, NIC card etc.
                                                                     while the logical components consist of the various
                                                                     protocol [3]. Coming to second components the
Figure:1.1 Shows Charcterstics of Cloud computing
                                                                     Applications it mainly consist of various applications
                                                                     such as Email Application, Customer Retail Mgmt.,
                                                                     Enterprise Resource Planning etc. various applications
These are the main characteristics of the cloud
                                                                     while Third Components is about the Data Base
computing. If these characteristics were in the system
                                                                                                                       102
                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                               International Journal of Advanced Research in Computer Engineering & Technology
                                                                                    Volume 1, Issue 5, July 2012


Management system which mainly talks about the data            to maintain the recovery, while recovery can be on
base that how the data is important, which type of data        local and remote side recovery. If we talk about the
and purpose and classification of data. Consist of sql         recovery the various recovery tools are there which
and PLSQL. While the Fourth components mainly                  mainly provide the recovery of data. Moving ahead
about the Storage the storage of data is another main          towards CDC the last components is Network, which
complex problem how to store the data because as the           play again the vital role in the classic data center. The
Information technology is facing the biggest problem           fiber channel over Ethernet is used FCOE for
which is storage, that how to store the data and how to        transmission. Know second phase of journey towards
manage the data, the big data maintence is another big         cloud is Virtual data center, before that concept of
and emerging area of Information Technology, but in            virtualization is quite simple. I.e. it is logical structure
case of classic data center , Storage mainly uses the          which acts and behaves like physical structure. The
RAID: Redundant array of independent disk, in which            virtual machine is based on virtual file and it also acts
various levels are there RAID 0 , RAID 1, RAID                 and behaves like a physical machine. The virtual
NESTED, RAID 5, RAID 6 . While the RAID6 is                    machine consists of the applications and operating
been used by the Google and you tube [5].The RAID              system running over it. Above figure shows the
model mainly used the three different techniques such          position of the virtual machine in cloud system.
as




                                                               Figure 1.4 shows the virtualization machine and its
     Figure 1.3: Shows the three techniques of RAID            position

These techniques mainly provide the better storage;            The virtual machines are actually logical file which is
the better techniques mainly maintain the business             mainly created on the physical machine. The main
continuity in the system. The business continuity can          concept is to provide the virtual environment in the
be achieve through these techniques and backup is also         system, the file which is created on the machine
an important part for these which can be maintain on           required more protection because these file contain the
disk and as well as on tape, coming towards backup             whole data of the virtual system. And the biggest
the back up of data is well categorized on client side         characteristics of these cloud computing is that they
and as well as on server side. Backup is mainly done           just maintain the resource pool (Virtualization).the
                                                               virtual machine also contain the various virtual
                                                                                                                      103
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                      Volume 1, Issue 5, July 2012


devices such as virtual switch, virtual NIC, virtual              Following existing system as shown in the figure 1.5
hard disks, virtual storage. The virtual machine and              the security can be maintained at its better level
physical machine mainly consist of hypervisor in                  because as said that no system can be said as perfect
between them. Hypervisor mainly allow the multiple                secure or 100% secure. We can only increase the level
operating systems to run simultaneously on the                    of security. The virtual system is the core concept of
physical machine. It mainly works on the physical                 cloud,   the    basic   characteristics   of   cloud    is
machine the used virtualization can be achieved by                virtualization so logical structure should be strong and
these. coming to the security purpose the virtual                 it should be safe. The various problems which mainly
machine can be bigger loophole they can be theft so               occur during the virtualization they can be solved by
the virtual machine theft prevention can be done the              maintain this proper aspect of principles.
first level , privacy at physical level should be                 The cloud will go to play a vital role in the next
maintain   by   the   physical     level   security.   The        emerging environment, so maintaining the trust is an
authentication should be maintained by the stronger               important challenge for the service provider. The
security mechanism such as Biometric devices. And                 cloud security is biggest issue which has to be kept in
the physical access privileged should be under the                mind and then services can be used. So the cloud is
secure services so that various problems regarding the            vast and big enough to resolve all the challenges of
virtualization security can be solved and hypervisor              information technology. Cost, security and the
and virtual machine should work under the secure                  problem of storage can be easily solved by maintain
environment. [7] The business continuity should be                the virtualization. The virtualization mainly provides
maintained the business should work regularly. The                bigger space to maintain the large amount of data.
privacy condition should be maintained properly                   Complexity of maintain the data can be easily be
                                                                  solved by virtualizations sphere and as when physical
                                                                  machine get converts into virtual machine by Vm
                                                                  sphere. [6] The physical machine will acts like a
                                                                  virtual machine conversion can be hot conversion or it
                                                                  can be cold conversion. If the machine is on then it is
                                                                  hot conversion and if the machine is off then it is cold
                                                                  conversion. Figure shows the physical to virtual
                                                                  machine conversions. [7]




Figure 1.5: Shows the working of antivirus between the
Physical machine and virtual machine

The basic aspects of security can be achieved by the                         Figure 1.6: PM to VM conversion

                                                                                                                         104
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                                        Volume 1, Issue 5, July 2012


So the bigger challenges to information technology
can be solved by the cloud.
                                                                      paper on IBM’s New
    Conclusion                                                          Enterprise Data
                                                                        Center:
As we know that the cloud is an emerging area most of
the services providers where moving towards the
                                                                       A websi
cloud services. So cloud issues should be kept in mind                
and the services of cloud can be used at broad level                  
and as discuss, above it can resolve the biggest
challenges to information technology and the problems
                                                                      
which mainly big data center faces.                                   
                                                                      collaboration among
7. References                                                           universities in the
                                                                  First Author
[1].http://india.emc.com/microsites/cloud/cloud.htm?p
id=home-small-cloudtransformsit-230212                            Pranay Chauhan
                                                                  M.E. Information Technology
.                                                                 Indore, M. P., India,
 [2] Amazon Elastic Compute Cloud (EC2):                          Ph. +91 9754143398
http://www.amazon.com/gp/browse.html?
Node=201590011,.                                                  Biography: Pranay Chauhan has receivable. (Bachelor
                                                                  of Engineering)Degree in Information Technology
                                                                  Engineering from Rishiraj Institute of Technology,
[3].http://www.businessweek.com/technology/content/               Indore, M.P., India in2007. He has 4+.years of
aug2008/tc2008082_445669_page_3.htm                               teaching experience. His subjects of Interest include,
                                                                  Computer Networking, Biometric system, Security
    [4].http://en.wikipedia.org/wiki/Cloud computing              assessment, Securing E commerce Operating system,
                                                                  Network Management, Wireless network, cloud
                                                                  computing, security in cloud computing, Network
[5]...http://www.ibm.com/developerworks/websphere/t               security presently. He has published several researches
echjournal/0904_amrhein/0904_amrhein.html                         Papers and Journals in National/International
                                                                  Conferences. Currently working as Assistant Professor
                                                                  in SVCE Indore.
[6] http://india.emc.com/microsites/cloud/

[7].http://india.emc.com/index.htm?fromGlobalSiteSel
ect

[8] http://cloudcomputing.sys-con.com


[9].http://www.businessweek.com/technology/content/
aug2008/tc2008082_445669_page_3.htm

[10] http://en.wikipedia.org/wiki/Cloud_computing


    [11]. http://cloudsecurityalliance.org



                                                                                                                    105
                                             All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...IJORCS
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...IRJET Journal
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage systemAlexander Decker
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage systemAlexander Decker
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Edadc
EdadcEdadc
Edadcragh6
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
 

Tendances (18)

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
70 74
70 7470 74
70 74
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
 
Iw qo s09 (1)
Iw qo s09 (1)Iw qo s09 (1)
Iw qo s09 (1)
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Cloud Models
Cloud ModelsCloud Models
Cloud Models
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage system
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage system
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Edadc
EdadcEdadc
Edadc
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
Fog doc
Fog doc Fog doc
Fog doc
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 

En vedette

The new UK GAAP: FRS 102 explained
The new UK GAAP: FRS 102 explainedThe new UK GAAP: FRS 102 explained
The new UK GAAP: FRS 102 explainedTCM infosys
 
John McCarthy - FRS 102
John McCarthy - FRS 102John McCarthy - FRS 102
John McCarthy - FRS 102DavinMcCormick
 
EY-FRS-102-illustrative-financial-statements
EY-FRS-102-illustrative-financial-statementsEY-FRS-102-illustrative-financial-statements
EY-FRS-102-illustrative-financial-statementsHudson Grieve
 
UK GAAP - A Year of Change | Accountex 2015
UK GAAP - A Year of Change | Accountex 2015UK GAAP - A Year of Change | Accountex 2015
UK GAAP - A Year of Change | Accountex 2015Sageukofficial
 
The New UK GAAP - Preparing for Change | Accountex 2015
The New UK GAAP - Preparing for Change | Accountex 2015The New UK GAAP - Preparing for Change | Accountex 2015
The New UK GAAP - Preparing for Change | Accountex 2015Sageukofficial
 
Getting ready for FRS 102
Getting ready for FRS 102Getting ready for FRS 102
Getting ready for FRS 102Sageukofficial
 

En vedette (7)

The new UK GAAP: FRS 102 explained
The new UK GAAP: FRS 102 explainedThe new UK GAAP: FRS 102 explained
The new UK GAAP: FRS 102 explained
 
John McCarthy - FRS 102
John McCarthy - FRS 102John McCarthy - FRS 102
John McCarthy - FRS 102
 
EY-FRS-102-illustrative-financial-statements
EY-FRS-102-illustrative-financial-statementsEY-FRS-102-illustrative-financial-statements
EY-FRS-102-illustrative-financial-statements
 
UK GAAP - A Year of Change | Accountex 2015
UK GAAP - A Year of Change | Accountex 2015UK GAAP - A Year of Change | Accountex 2015
UK GAAP - A Year of Change | Accountex 2015
 
The New UK GAAP - Preparing for Change | Accountex 2015
The New UK GAAP - Preparing for Change | Accountex 2015The New UK GAAP - Preparing for Change | Accountex 2015
The New UK GAAP - Preparing for Change | Accountex 2015
 
Getting ready for FRS 102
Getting ready for FRS 102Getting ready for FRS 102
Getting ready for FRS 102
 
UK GAAP
UK GAAPUK GAAP
UK GAAP
 

Similaire à 102 105

Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingIOSR Journals
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions IJECEIAES
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationspoojagupta010
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...csandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...cscpconf
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performancecsandit
 
Cloud computing
Cloud computingCloud computing
Cloud computingJawhar Ali
 
Essay On Green Computing
Essay On Green ComputingEssay On Green Computing
Essay On Green ComputingAmber Moore
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 

Similaire à 102 105 (20)

Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
G017214849
G017214849G017214849
G017214849
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
51 59
51 5951 59
51 59
 
51 59
51 5951 59
51 59
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
484 488
484 488484 488
484 488
 
B1802041217
B1802041217B1802041217
B1802041217
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Essay On Green Computing
Essay On Green ComputingEssay On Green Computing
Essay On Green Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
A01260104
A01260104A01260104
A01260104
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 

Dernier (20)

GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 

102 105

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 “Cloud Service Utilization” Journey to cloud... 1 Pranay Chauhan Assistant Professor, Dept, Of Information Technology, SVCE, Indore 1 pranaychauhan1985@gmail.com, Abstract means the system is cloud system. Know moving As we know that cloud computing is an emerging area, towards the cloud we should know that cloud is vast the services provided by the cloud is helpful to overcome the limitation of Information Technology. there is no end so we call it as a journey to cloud. On Such as Globalization, Security, Storage and the most our journey to cloud there are mainly three phases [1. important Cost. And as Cloud plays a vital role to overcome these challenges of new age of Information EMC] First phase is Classic data center, and then technology. The above paper would focus on various second phase is Virtual Data Center and at last cloud. factors in which cloud mainly developed the suitable environment for Communication and business aspects, Figure 1.2 shows the three different phases towards new trends in the emerging arena and various issues cloud computing [1]. regarding the cloud computing. At various domains and how these domain mainly get affected by the cloud. Keywords: - Virtualization, Storage, Compute, Security. Introduction As when we talk about the cloud the first thing that comes in our mind when we look upward at cloud is the unlimited space [2]. According to NIST i.e. National institute of standard technology the cloud mainly contain the five characteristics Figure 1.2: Shows the different Phases in the cloud computing Know coming to the classic data center (CDC), it mainly consist of the several component such as Compute, Applications, DBMS, Storage, Networks. The compute mainly consists of the logical and physical components such as hard disk, floppy drive, RAM, ROM, Processors, Switches, NIC card etc. while the logical components consist of the various protocol [3]. Coming to second components the Figure:1.1 Shows Charcterstics of Cloud computing Applications it mainly consist of various applications such as Email Application, Customer Retail Mgmt., Enterprise Resource Planning etc. various applications These are the main characteristics of the cloud while Third Components is about the Data Base computing. If these characteristics were in the system 102 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Management system which mainly talks about the data to maintain the recovery, while recovery can be on base that how the data is important, which type of data local and remote side recovery. If we talk about the and purpose and classification of data. Consist of sql recovery the various recovery tools are there which and PLSQL. While the Fourth components mainly mainly provide the recovery of data. Moving ahead about the Storage the storage of data is another main towards CDC the last components is Network, which complex problem how to store the data because as the play again the vital role in the classic data center. The Information technology is facing the biggest problem fiber channel over Ethernet is used FCOE for which is storage, that how to store the data and how to transmission. Know second phase of journey towards manage the data, the big data maintence is another big cloud is Virtual data center, before that concept of and emerging area of Information Technology, but in virtualization is quite simple. I.e. it is logical structure case of classic data center , Storage mainly uses the which acts and behaves like physical structure. The RAID: Redundant array of independent disk, in which virtual machine is based on virtual file and it also acts various levels are there RAID 0 , RAID 1, RAID and behaves like a physical machine. The virtual NESTED, RAID 5, RAID 6 . While the RAID6 is machine consists of the applications and operating been used by the Google and you tube [5].The RAID system running over it. Above figure shows the model mainly used the three different techniques such position of the virtual machine in cloud system. as Figure 1.4 shows the virtualization machine and its Figure 1.3: Shows the three techniques of RAID position These techniques mainly provide the better storage; The virtual machines are actually logical file which is the better techniques mainly maintain the business mainly created on the physical machine. The main continuity in the system. The business continuity can concept is to provide the virtual environment in the be achieve through these techniques and backup is also system, the file which is created on the machine an important part for these which can be maintain on required more protection because these file contain the disk and as well as on tape, coming towards backup whole data of the virtual system. And the biggest the back up of data is well categorized on client side characteristics of these cloud computing is that they and as well as on server side. Backup is mainly done just maintain the resource pool (Virtualization).the virtual machine also contain the various virtual 103 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 devices such as virtual switch, virtual NIC, virtual Following existing system as shown in the figure 1.5 hard disks, virtual storage. The virtual machine and the security can be maintained at its better level physical machine mainly consist of hypervisor in because as said that no system can be said as perfect between them. Hypervisor mainly allow the multiple secure or 100% secure. We can only increase the level operating systems to run simultaneously on the of security. The virtual system is the core concept of physical machine. It mainly works on the physical cloud, the basic characteristics of cloud is machine the used virtualization can be achieved by virtualization so logical structure should be strong and these. coming to the security purpose the virtual it should be safe. The various problems which mainly machine can be bigger loophole they can be theft so occur during the virtualization they can be solved by the virtual machine theft prevention can be done the maintain this proper aspect of principles. first level , privacy at physical level should be The cloud will go to play a vital role in the next maintain by the physical level security. The emerging environment, so maintaining the trust is an authentication should be maintained by the stronger important challenge for the service provider. The security mechanism such as Biometric devices. And cloud security is biggest issue which has to be kept in the physical access privileged should be under the mind and then services can be used. So the cloud is secure services so that various problems regarding the vast and big enough to resolve all the challenges of virtualization security can be solved and hypervisor information technology. Cost, security and the and virtual machine should work under the secure problem of storage can be easily solved by maintain environment. [7] The business continuity should be the virtualization. The virtualization mainly provides maintained the business should work regularly. The bigger space to maintain the large amount of data. privacy condition should be maintained properly Complexity of maintain the data can be easily be solved by virtualizations sphere and as when physical machine get converts into virtual machine by Vm sphere. [6] The physical machine will acts like a virtual machine conversion can be hot conversion or it can be cold conversion. If the machine is on then it is hot conversion and if the machine is off then it is cold conversion. Figure shows the physical to virtual machine conversions. [7] Figure 1.5: Shows the working of antivirus between the Physical machine and virtual machine The basic aspects of security can be achieved by the Figure 1.6: PM to VM conversion 104 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 So the bigger challenges to information technology can be solved by the cloud. paper on IBM’s New Conclusion Enterprise Data Center: As we know that the cloud is an emerging area most of the services providers where moving towards the  A websi cloud services. So cloud issues should be kept in mind  and the services of cloud can be used at broad level  and as discuss, above it can resolve the biggest challenges to information technology and the problems  which mainly big data center faces.  collaboration among 7. References universities in the First Author [1].http://india.emc.com/microsites/cloud/cloud.htm?p id=home-small-cloudtransformsit-230212 Pranay Chauhan M.E. Information Technology . Indore, M. P., India, [2] Amazon Elastic Compute Cloud (EC2): Ph. +91 9754143398 http://www.amazon.com/gp/browse.html? Node=201590011,. Biography: Pranay Chauhan has receivable. (Bachelor of Engineering)Degree in Information Technology Engineering from Rishiraj Institute of Technology, [3].http://www.businessweek.com/technology/content/ Indore, M.P., India in2007. He has 4+.years of aug2008/tc2008082_445669_page_3.htm teaching experience. His subjects of Interest include, Computer Networking, Biometric system, Security [4].http://en.wikipedia.org/wiki/Cloud computing assessment, Securing E commerce Operating system, Network Management, Wireless network, cloud computing, security in cloud computing, Network [5]...http://www.ibm.com/developerworks/websphere/t security presently. He has published several researches echjournal/0904_amrhein/0904_amrhein.html Papers and Journals in National/International Conferences. Currently working as Assistant Professor in SVCE Indore. [6] http://india.emc.com/microsites/cloud/ [7].http://india.emc.com/index.htm?fromGlobalSiteSel ect [8] http://cloudcomputing.sys-con.com [9].http://www.businessweek.com/technology/content/ aug2008/tc2008082_445669_page_3.htm [10] http://en.wikipedia.org/wiki/Cloud_computing [11]. http://cloudsecurityalliance.org 105 All Rights Reserved © 2012 IJARCET