SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
1128
All Rights Reserved © 2013 IJARCET
Cloud Computing: Migration from
Traditional Systems to the Cloud
Ganesh Olekar,Vikram Sreekumar
Department of Computer Engineering, VIIT, Pune University
Abstract- Over the past few decades Business
organizations have tried hard to keep up with the
changes encountered in the market. Various factors like
increased load, security, availability, fail safe
mechanisms etc. have to be taken care of by these
organizations and the traditional approaches are
turning out to be cumbersome as well as expensive.
Various computing paradigms have been employed for
this purpose and tested to meet these demands. In this
paper, we present how Cloud Computing fares in
meeting these requirements, how it can be used as a
solution for various systems and the various advantages
of migrating your system to the Cloud.
Keywords- Cloud Computing, High Performance
Computing, Hosting on the Cloud, Migration to the Cloud
1. INTRODUCTION
Cloud computing is a general term for anything that
involves delivering hosted services over the Internet.
It is evolving as a key computer platform for sharing
resources that include infrastructures, software,
applications, and business processes. Virtualization is
a core technology for enabling cloud resource sharing
[5].
Everyone has a different perception of Cloud
Computing. It can be the ability to rent a server or a
thousand servers and run a geophysical modelling
application on the most powerful systems available
anywhere [8].
Cloud computing [1][3] is an emerging trend to
deploy and maintain software and is being adopted
by the industry such as Google, IBM, Microsoft, and
Amazon.
In a cloud computing system, there's a significant
workload shift. Local computers no longer have to do
all the heavy lifting when it comes to running
applications. The network of computers that make up
the cloud handles them instead. Hardware and
software demands on the user's side decrease. The
only thing the user's computer needs to be able to run
is the cloud computing systems‘ interface software,
which can be as simple as a Web browser, and the
cloud's network takes care of the rest.
Cloud offerings can vary from virtual infrastructure,
computing platforms, centralized data centres to end-
user Web-Services and Web applications to
enormous other focused computing services. Cloud
Computing may be applied to solve problems in
many domains of Information Technology like GIS
(Geographical Information Systems), Scientific
Research [2], e-Governance Systems [4], Decision
Support Systems [9], ERP [3], Web Application
Development [6], Mobile Technology [7] etc.
This paper briefly discusses the application of Cloud
Computing and the several benefits of hosting a
system on the cloud. It also discusses the various
issues faced while migrating from a traditional
system to a system hosted on the cloud.
2. CLOUD COMPUTING: BRIEF
DESCRIPTION
According to NIST, National Institute of Standards
and Technology:
―Cloud Computing is a model for enabling
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with
minimal management effort or service provider
interaction.‖
A cloud service has three distinct characteristics that
differentiate it from traditional hosting.
 It is sold on demand, typically by the minute
or the hour;
 It is elastic -- a user can have as much or as
little of a service as they want at any given
time
 The service is fully managed by the provider
(the consumer needs nothing but a personal
computer and Internet access).
Cloud computing systems need at least twice the
number of storage devices it requires to keep all its
clients' information stored. That's because these
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
1129
All Rights Reserved © 2013 IJARCET
devices, like all computers, occasionally break down.
A cloud computing system must make a copy of all
its clients' information and store it on other devices.
The copies enable the central server to access backup
machines to retrieve data that otherwise would be
unreachable. Making copies of data as a backup is
called redundancy.
2.1 CLOUD COMPUTING: SERVICE MODEL
The services offered within Cloud Computing are
broadly divided into 3 major categories.
2.1.1 Software as a Service (SaaS)
Software as a Service (SaaS) is a software
distribution model in which applications are hosted
by a vendor or service provider and made available to
customers over a network, typically the Internet.
With SaaS, a provider licenses an application to
customers either as a service on demand, through a
subscription, in a "pay-as-you-go" model, or
(increasingly) at no charge. This approach to
application delivery is part of the utility computing
model where all of the technology is in the "cloud"
accessed over the Internet as a service. Benefits of
the SaaS model include easier administration,
automatic updates, compatibility as all users will
have the same version of the software, easier
collaboration for the same reason and global
accessibility.
The most commonly referenced examples of SaaS is
Salesforce.com‗s human-resource applications, which
provides a customer relationship management (CRM)
system accessible via the Internet Google Apps,
Microsoft Office Live, Cisco WebEx ,Oracle CRM
etc.
2.1.2 Platform as a Service (PaaS)
Platform as a Service (PaaS) is an outgrowth
of Software as a Service (SaaS), a software
distribution model in which hosted software
applications are made available to customers over the
Internet. It is a way to rent hardware, operating
systems, storage and network capacity over the
Internet. The service delivery model allows the
customer to rent virtualized servers and associated
services for running existing applications or
developing and testing new ones. PaaS offerings may
include facilities for application design, application
development, testing, deployment and hosting as well
as application services such as team collaboration,
web service integration and marshalling, database
integration, security, scalability, storage, persistence,
state management, application versioning, application
instrumentation and developer community
facilitation. It facilitates the deployment of customer-
created applications to the cloud using provider-
supported frameworks, including APIs based on Java,
Python, or .Net.
2.1.3 Infrastructure as a Service (IaaS)
Infrastructure as a Service is a provision model in
which an organization outsources the equipment used
to support operations, including storage, hardware,
servers and networking components. The service
provider owns the equipment and is responsible for
housing, running and maintaining it. The client
typically pays on a per-use basis. The client typically
pays on a per-use basis (Amazon Elastic Compute
Cloud or Amazon Simple Storage Service e.g.).
2.2 CLOUD COMPUTING: TYPES
In addition to service levels, cloud computing is also
classified into deployment models, each with its own
strengths and applications depending on customer
and corporate requirements.
2.2.1 Private Cloud
A private cloud is a proprietary network or a data
centre that supplies hosted services to a limited
number of people. The data and processes in the case
of Private Cloud are administered inside the
organization by an IT department within an
organization, without the limitations of network
bandwidth, security exposures and legal requirements
that using public cloud services might involve. One
major advantage of using the private cloud services is
that it presents the provider and the user greater
control of the cloud infrastructure, improving security
and adjustability because user access and the
networks used are constrained and selected. This
model gives organizations a high level of control
over the use of cloud resources while bringing in the
expertise needed to establish and operate the
environment [8].
2.2.2 Community Cloud
The cloud infrastructure is shared by several
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
1130
All Rights Reserved © 2013 IJARCET
organizations and supports a specific community that
has shared concerns (e.g., mission, security
requirements, policy, and compliance
considerations). It may be managed by the
organizations or a third party and may exist on-
premise or off-premise. Non-profit, social networking
and affiliated groups often use community cloud
infrastructures to leverage the one-size-fits-all
templates for security, storage allocations, and other
infrastructure components.
2.2.3 Public Cloud
The public cloud is merely any cloud computing
platform open for use to the public whether it is
individuals or large corporations. It sells services to
anyone on the Internet. (Currently, Amazon Web
Services is the largest public cloud provider.)Public
clouds, however, ensure that individual cloud users
are offered ample security and privacy. Public clouds
are most often hosted away from customer premises,
and they provide a way to reduce customer risk and
cost by providing a flexible, even temporary
extension to enterprise infrastructure [8].
2.2.4 Hybrid Cloud
The cloud infrastructure is a composition of two or
more clouds (private, community, or public) that
remain unique entities, but are bound together by
standardized or proprietary technology that enables
data and application portability (e.g., cloud bursting
for load-balancing between clouds). Corporations
often host their public-facing Website and
eCommerce front ends on public cloud
infrastructures, while they reserve private clouds for
data storage and internal and intranet computing
services. The public portion of the cloud
accommodates bursts in traffic, while the private side
of the cloud serves sustainable and stable applications
and business functions.
3. MIGRATING TO THE CLOUD
Once a company has decided to implement a Cloud
infrastructure, it has to make another major decision.
This decision is the path to be implemented for the
migration. For this decision to be made various
considerations have to be taken into account such as:
 Size and complexity of current applications
 Amount and number of applications
 Whether the current platform is due for
updates or replacements
The following methods are the most common
methods of migration used by organizations
worldwide.
3.1 Incremental Cloud Deployment
Most companies start out incrementally, choosing a
SaaS or IaaS application that would replace an in-
house application, such as CRM, Sales force
automation, or email. After this application is run
successfully then new components are then hosted on
the cloud. The company generally documents the
migration of each system and application in order to
determine the difference in the cost and the
performance and observe if the changes are fruitful
for the organization.
3.2 Legacy Migration
Migration to the Cloud isn‘t an easy task. Thus for a
large organization it is imperative that businesses
with a large base of legacy computing applications
have a competent and experienced cloud computing
provider to help them reengineer their systems for
optimum performance and reliability.
Productivity, customer satisfaction, and business
continuity cannot suffer during a migration.
Companies should create mirror systems of key
legacy applications — one on the new cloud
platform, another on the existing platform, and
compare performance, reliability, functionality before
cutting over to the cloud-based version. Also,
companies should consider moving the most critical
legacy applications last.
3.3 Avoiding Costly Upgrades
When businesses are faced with costly and complex
upgrades to applications the Cloud computing
alternatives should be considered. Instead of
procuring new software as well as hardware for
storage a company can upload existing data from
their legacy applications on the cloud and test the
applications on live data and retire the legacy
application once the platform is fully tested. This is
one of the most common reasons for migration these
days.
3.4 Straight to the Cloud
Customers with relatively simple legacy applications,
such as business productivity software and a few
custom applications are better off making a complete
changeover. The cloud infrastructure and applications
can be configured, tested, and rolled out in tandem
with old systems, and cut over can occur fairly
quickly.
4. THE CLOUD ADVANTAGE
Hosting a system on the Cloud has various
advantages. Most of the Information Support Systems
usually deal with large volume of data (structured
and unstructured) that requires huge CPU power to
produce results in reasonable time on which wide
range of users are dependent which may be located
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
1131
All Rights Reserved © 2013 IJARCET
over a large geographical area. However, configuring
and maintaining a cluster or a computational grid is
usually a very cumbersome activity that requires
specialists to support it. In addition, the high cost to
acquire this computational apparatus can be
considered a serious problem to the effective use of
the ISS in terms of timeliness service and availability.
Businesses can also save on power costs as they
reduce the number of servers required. And with IT
staff spending less time managing and monitoring the
data centre, IT teams are well placed to further
streamline their operations as staff complete more
work on fewer machines.
The major advantages of hosting a system on the
cloud include:
4.1 On Demand Scalability
The ability of Cloud Computing solutions to scale up
and down is a major advantage. If a system has
varied loads at different points of time the system
will be able to cater those changes. Using the Cloud a
threshold value can be set for putting up another
server to balance the load on the system. This enables
the efficient running of the application.
4.2 Streamlining the Data Centre
With no more worries regarding storage, hosting on
the cloud has saved a lot of resources for
organizations. [10]
4.3 Cost Efficient
Traditional desktop software cost companies a lot in
terms of finance. Add to that the licensing fees for
enabling the use of that software by multiple users
can prove to be very expensive for the organization.
The Cloud is available at cheaper rates and also
includes various ‗pay as per usage‘ options for
reducing the expenses by a great margin.
4.4 Backup and Recovery
This is one of the biggest advantages of hosting on
the cloud. Since most of the data is hosted on the
Cloud, backup is made much easier as compared to
storing the same on physical device. Moreover, cloud
service providers are competent enough to handle
recovery of information.
5. CONCLUSION
In this paper we discussed Cloud Computing in
general and how it helps in improving the running of
an application. We also have discussed the strategies
that could be implemented for the migration a
traditional system that‘s currently hosted on physical
servers within the organization or otherwise to a
system hosted on the Cloud. The various advantages
and challenges associated with the same have also
been presented. Cloud Computing is still taking its
baby steps but it promises to be the future of the IT
sector. Although it has its numerous advantages, like
anything in this world it does have its disadvantages
too. But, as long as the pros overcome the cons for an
organization this platform should be carefully
considered while facing issues like those mentioned
above.
6. ACKNOWLEDGMENT
We would like to express our sincere gratitude
towards our guide Prof. L.A. Deshpande who at
every step in the study for this paper contributed by
giving valuable input to help us in completing this
paper successfully.
7. REFERENCES
[1] Cloud Computing. Wikipedia. Available at
http://en.wiki pedia.org/wiki/Cloud_computing
[2] Daniel Oliveira, Eduardo Ogasawara. Article: ―Is
Cloud Computing the solution for Brazilian
Researchers?‖, International Journal of Computer
Applications 6(8), September 2010.
[3] I. Foster, Y. Zhao, I. Raicu, and S. Lu, 2008, Cloud
Computing and Grid Computing 360-Degree
Compared, In: ―Grid Computing Environments
Workshop, 2008. GCE '08.
[4] K.Mukherjee and G.Sahoo. Article: Cloud Computing:
Future Framework for e-Governance. International
Journal of Computer Applications 7(7):31–34,
October.
[5] Liang-Jie Zhang, Qun Zhou, "CCOA: Cloud
Computing Open Architecture," icws, pp.607-616,
2009 IEEE International Conference on Web
Services, 2009.
[6] L.R. Rewatkar, U.A. Lanjewar. Article:
―Implementation of Cloud Computing on Web
Application.‖ International Journal of Computer
Applications 2(8), June 2010.
[7] Sonal Anand, Sarvesh Gupta, Shweta Fatnani, Varsha
Sharma and Deepti Jain. Article: Semantic Cloud for
Mobile Technology. International Journal of
Computer Applications 8(12):1–4, October 2010.
[8] Sun Microsystems White Paper, ―Introduction to
CloudComputing Architecture, June 2009.
[9] W.K. Chan, Lijun Mei, and Zhenyu Zhang, "Modeling
and testing of cloud applications", to appear in
Proceedings of 2009 IEEE Asia-Pacific Services
Computing Conference (APSCC 2009), (Singapore,
December 7-11, 2009), IEEE Computer Society Press,
Los Alamitos, CA, USA, 2009.
[10] M.A. Bhat, R.M. Shah, B. Ahmad, I.R. Bhat, ―Cloud
Computing: A Solution to Information Support
Systems‖, to appear in International Journal Of
Computer Applications 11(5), December 2010.

Contenu connexe

Tendances

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready referenceHelly Patel
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paperjagan339
 

Tendances (19)

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
H046053944
H046053944H046053944
H046053944
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Cloud Models
Cloud ModelsCloud Models
Cloud Models
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 

En vedette (20)

Hyperlink dipa
Hyperlink dipaHyperlink dipa
Hyperlink dipa
 
Career path o & g industry
Career path o & g  industryCareer path o & g  industry
Career path o & g industry
 
Anno delle stelle, 15 agosto 2013
Anno delle stelle, 15 agosto 2013Anno delle stelle, 15 agosto 2013
Anno delle stelle, 15 agosto 2013
 
Anno delle stelle 24 agosto 2013
Anno delle stelle 24 agosto 2013Anno delle stelle 24 agosto 2013
Anno delle stelle 24 agosto 2013
 
1924 1929
1924 19291924 1929
1924 1929
 
1663 1669
1663 16691663 1669
1663 1669
 
1738 1742
1738 17421738 1742
1738 1742
 
Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020
 
Trust in God
Trust in God Trust in God
Trust in God
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
1766 1770
1766 17701766 1770
1766 1770
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291Ijarcet vol-2-issue-7-2287-2291
Ijarcet vol-2-issue-7-2287-2291
 
LKS Cerdas (y)
LKS Cerdas (y)LKS Cerdas (y)
LKS Cerdas (y)
 
Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388Ijarcet vol-2-issue-7-2384-2388
Ijarcet vol-2-issue-7-2384-2388
 
Ratish Resume
Ratish ResumeRatish Resume
Ratish Resume
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
 
1893 1896
1893 18961893 1896
1893 1896
 
Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090
 

Similaire à Ijarcet vol-2-issue-3-1128-1131

Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewIOSR Journals
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 

Similaire à Ijarcet vol-2-issue-3-1128-1131 (20)

G017324043
G017324043G017324043
G017324043
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Dernier

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Ijarcet vol-2-issue-3-1128-1131

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1128 All Rights Reserved © 2013 IJARCET Cloud Computing: Migration from Traditional Systems to the Cloud Ganesh Olekar,Vikram Sreekumar Department of Computer Engineering, VIIT, Pune University Abstract- Over the past few decades Business organizations have tried hard to keep up with the changes encountered in the market. Various factors like increased load, security, availability, fail safe mechanisms etc. have to be taken care of by these organizations and the traditional approaches are turning out to be cumbersome as well as expensive. Various computing paradigms have been employed for this purpose and tested to meet these demands. In this paper, we present how Cloud Computing fares in meeting these requirements, how it can be used as a solution for various systems and the various advantages of migrating your system to the Cloud. Keywords- Cloud Computing, High Performance Computing, Hosting on the Cloud, Migration to the Cloud 1. INTRODUCTION Cloud computing is a general term for anything that involves delivering hosted services over the Internet. It is evolving as a key computer platform for sharing resources that include infrastructures, software, applications, and business processes. Virtualization is a core technology for enabling cloud resource sharing [5]. Everyone has a different perception of Cloud Computing. It can be the ability to rent a server or a thousand servers and run a geophysical modelling application on the most powerful systems available anywhere [8]. Cloud computing [1][3] is an emerging trend to deploy and maintain software and is being adopted by the industry such as Google, IBM, Microsoft, and Amazon. In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems‘ interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest. Cloud offerings can vary from virtual infrastructure, computing platforms, centralized data centres to end- user Web-Services and Web applications to enormous other focused computing services. Cloud Computing may be applied to solve problems in many domains of Information Technology like GIS (Geographical Information Systems), Scientific Research [2], e-Governance Systems [4], Decision Support Systems [9], ERP [3], Web Application Development [6], Mobile Technology [7] etc. This paper briefly discusses the application of Cloud Computing and the several benefits of hosting a system on the cloud. It also discusses the various issues faced while migrating from a traditional system to a system hosted on the cloud. 2. CLOUD COMPUTING: BRIEF DESCRIPTION According to NIST, National Institute of Standards and Technology: ―Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.‖ A cloud service has three distinct characteristics that differentiate it from traditional hosting.  It is sold on demand, typically by the minute or the hour;  It is elastic -- a user can have as much or as little of a service as they want at any given time  The service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access). Cloud computing systems need at least twice the number of storage devices it requires to keep all its clients' information stored. That's because these
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1129 All Rights Reserved © 2013 IJARCET devices, like all computers, occasionally break down. A cloud computing system must make a copy of all its clients' information and store it on other devices. The copies enable the central server to access backup machines to retrieve data that otherwise would be unreachable. Making copies of data as a backup is called redundancy. 2.1 CLOUD COMPUTING: SERVICE MODEL The services offered within Cloud Computing are broadly divided into 3 major categories. 2.1.1 Software as a Service (SaaS) Software as a Service (SaaS) is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. With SaaS, a provider licenses an application to customers either as a service on demand, through a subscription, in a "pay-as-you-go" model, or (increasingly) at no charge. This approach to application delivery is part of the utility computing model where all of the technology is in the "cloud" accessed over the Internet as a service. Benefits of the SaaS model include easier administration, automatic updates, compatibility as all users will have the same version of the software, easier collaboration for the same reason and global accessibility. The most commonly referenced examples of SaaS is Salesforce.com‗s human-resource applications, which provides a customer relationship management (CRM) system accessible via the Internet Google Apps, Microsoft Office Live, Cisco WebEx ,Oracle CRM etc. 2.1.2 Platform as a Service (PaaS) Platform as a Service (PaaS) is an outgrowth of Software as a Service (SaaS), a software distribution model in which hosted software applications are made available to customers over the Internet. It is a way to rent hardware, operating systems, storage and network capacity over the Internet. The service delivery model allows the customer to rent virtualized servers and associated services for running existing applications or developing and testing new ones. PaaS offerings may include facilities for application design, application development, testing, deployment and hosting as well as application services such as team collaboration, web service integration and marshalling, database integration, security, scalability, storage, persistence, state management, application versioning, application instrumentation and developer community facilitation. It facilitates the deployment of customer- created applications to the cloud using provider- supported frameworks, including APIs based on Java, Python, or .Net. 2.1.3 Infrastructure as a Service (IaaS) Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis. The client typically pays on a per-use basis (Amazon Elastic Compute Cloud or Amazon Simple Storage Service e.g.). 2.2 CLOUD COMPUTING: TYPES In addition to service levels, cloud computing is also classified into deployment models, each with its own strengths and applications depending on customer and corporate requirements. 2.2.1 Private Cloud A private cloud is a proprietary network or a data centre that supplies hosted services to a limited number of people. The data and processes in the case of Private Cloud are administered inside the organization by an IT department within an organization, without the limitations of network bandwidth, security exposures and legal requirements that using public cloud services might involve. One major advantage of using the private cloud services is that it presents the provider and the user greater control of the cloud infrastructure, improving security and adjustability because user access and the networks used are constrained and selected. This model gives organizations a high level of control over the use of cloud resources while bringing in the expertise needed to establish and operate the environment [8]. 2.2.2 Community Cloud The cloud infrastructure is shared by several
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1130 All Rights Reserved © 2013 IJARCET organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on- premise or off-premise. Non-profit, social networking and affiliated groups often use community cloud infrastructures to leverage the one-size-fits-all templates for security, storage allocations, and other infrastructure components. 2.2.3 Public Cloud The public cloud is merely any cloud computing platform open for use to the public whether it is individuals or large corporations. It sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.)Public clouds, however, ensure that individual cloud users are offered ample security and privacy. Public clouds are most often hosted away from customer premises, and they provide a way to reduce customer risk and cost by providing a flexible, even temporary extension to enterprise infrastructure [8]. 2.2.4 Hybrid Cloud The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). Corporations often host their public-facing Website and eCommerce front ends on public cloud infrastructures, while they reserve private clouds for data storage and internal and intranet computing services. The public portion of the cloud accommodates bursts in traffic, while the private side of the cloud serves sustainable and stable applications and business functions. 3. MIGRATING TO THE CLOUD Once a company has decided to implement a Cloud infrastructure, it has to make another major decision. This decision is the path to be implemented for the migration. For this decision to be made various considerations have to be taken into account such as:  Size and complexity of current applications  Amount and number of applications  Whether the current platform is due for updates or replacements The following methods are the most common methods of migration used by organizations worldwide. 3.1 Incremental Cloud Deployment Most companies start out incrementally, choosing a SaaS or IaaS application that would replace an in- house application, such as CRM, Sales force automation, or email. After this application is run successfully then new components are then hosted on the cloud. The company generally documents the migration of each system and application in order to determine the difference in the cost and the performance and observe if the changes are fruitful for the organization. 3.2 Legacy Migration Migration to the Cloud isn‘t an easy task. Thus for a large organization it is imperative that businesses with a large base of legacy computing applications have a competent and experienced cloud computing provider to help them reengineer their systems for optimum performance and reliability. Productivity, customer satisfaction, and business continuity cannot suffer during a migration. Companies should create mirror systems of key legacy applications — one on the new cloud platform, another on the existing platform, and compare performance, reliability, functionality before cutting over to the cloud-based version. Also, companies should consider moving the most critical legacy applications last. 3.3 Avoiding Costly Upgrades When businesses are faced with costly and complex upgrades to applications the Cloud computing alternatives should be considered. Instead of procuring new software as well as hardware for storage a company can upload existing data from their legacy applications on the cloud and test the applications on live data and retire the legacy application once the platform is fully tested. This is one of the most common reasons for migration these days. 3.4 Straight to the Cloud Customers with relatively simple legacy applications, such as business productivity software and a few custom applications are better off making a complete changeover. The cloud infrastructure and applications can be configured, tested, and rolled out in tandem with old systems, and cut over can occur fairly quickly. 4. THE CLOUD ADVANTAGE Hosting a system on the Cloud has various advantages. Most of the Information Support Systems usually deal with large volume of data (structured and unstructured) that requires huge CPU power to produce results in reasonable time on which wide range of users are dependent which may be located
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 1131 All Rights Reserved © 2013 IJARCET over a large geographical area. However, configuring and maintaining a cluster or a computational grid is usually a very cumbersome activity that requires specialists to support it. In addition, the high cost to acquire this computational apparatus can be considered a serious problem to the effective use of the ISS in terms of timeliness service and availability. Businesses can also save on power costs as they reduce the number of servers required. And with IT staff spending less time managing and monitoring the data centre, IT teams are well placed to further streamline their operations as staff complete more work on fewer machines. The major advantages of hosting a system on the cloud include: 4.1 On Demand Scalability The ability of Cloud Computing solutions to scale up and down is a major advantage. If a system has varied loads at different points of time the system will be able to cater those changes. Using the Cloud a threshold value can be set for putting up another server to balance the load on the system. This enables the efficient running of the application. 4.2 Streamlining the Data Centre With no more worries regarding storage, hosting on the cloud has saved a lot of resources for organizations. [10] 4.3 Cost Efficient Traditional desktop software cost companies a lot in terms of finance. Add to that the licensing fees for enabling the use of that software by multiple users can prove to be very expensive for the organization. The Cloud is available at cheaper rates and also includes various ‗pay as per usage‘ options for reducing the expenses by a great margin. 4.4 Backup and Recovery This is one of the biggest advantages of hosting on the cloud. Since most of the data is hosted on the Cloud, backup is made much easier as compared to storing the same on physical device. Moreover, cloud service providers are competent enough to handle recovery of information. 5. CONCLUSION In this paper we discussed Cloud Computing in general and how it helps in improving the running of an application. We also have discussed the strategies that could be implemented for the migration a traditional system that‘s currently hosted on physical servers within the organization or otherwise to a system hosted on the Cloud. The various advantages and challenges associated with the same have also been presented. Cloud Computing is still taking its baby steps but it promises to be the future of the IT sector. Although it has its numerous advantages, like anything in this world it does have its disadvantages too. But, as long as the pros overcome the cons for an organization this platform should be carefully considered while facing issues like those mentioned above. 6. ACKNOWLEDGMENT We would like to express our sincere gratitude towards our guide Prof. L.A. Deshpande who at every step in the study for this paper contributed by giving valuable input to help us in completing this paper successfully. 7. REFERENCES [1] Cloud Computing. Wikipedia. Available at http://en.wiki pedia.org/wiki/Cloud_computing [2] Daniel Oliveira, Eduardo Ogasawara. Article: ―Is Cloud Computing the solution for Brazilian Researchers?‖, International Journal of Computer Applications 6(8), September 2010. [3] I. Foster, Y. Zhao, I. Raicu, and S. Lu, 2008, Cloud Computing and Grid Computing 360-Degree Compared, In: ―Grid Computing Environments Workshop, 2008. GCE '08. [4] K.Mukherjee and G.Sahoo. Article: Cloud Computing: Future Framework for e-Governance. International Journal of Computer Applications 7(7):31–34, October. [5] Liang-Jie Zhang, Qun Zhou, "CCOA: Cloud Computing Open Architecture," icws, pp.607-616, 2009 IEEE International Conference on Web Services, 2009. [6] L.R. Rewatkar, U.A. Lanjewar. Article: ―Implementation of Cloud Computing on Web Application.‖ International Journal of Computer Applications 2(8), June 2010. [7] Sonal Anand, Sarvesh Gupta, Shweta Fatnani, Varsha Sharma and Deepti Jain. Article: Semantic Cloud for Mobile Technology. International Journal of Computer Applications 8(12):1–4, October 2010. [8] Sun Microsystems White Paper, ―Introduction to CloudComputing Architecture, June 2009. [9] W.K. Chan, Lijun Mei, and Zhenyu Zhang, "Modeling and testing of cloud applications", to appear in Proceedings of 2009 IEEE Asia-Pacific Services Computing Conference (APSCC 2009), (Singapore, December 7-11, 2009), IEEE Computer Society Press, Los Alamitos, CA, USA, 2009. [10] M.A. Bhat, R.M. Shah, B. Ahmad, I.R. Bhat, ―Cloud Computing: A Solution to Information Support Systems‖, to appear in International Journal Of Computer Applications 11(5), December 2010.