SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 607
OVERVIEW OF CLOUD COMPUTING ARCHITECTURE: SERVICE
DELIVERY MODELS, SECURITY& PRIVACY ISSUES AND TRUST
K.V. K Mahesh Kumar
Research Scholar, Department of Computer Science and Engineering, Acharya Nagarjuna University, A.P, India,
maheshkondraju@gmail.com
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges.
Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-
service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been
discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with
constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust
between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the
help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data
security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also
focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security
standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in
organizations.
Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
Now a days Cloud Computing has been center of focus for
organizations and software companies for some time but there
seems to be no clarity on how effective cloud computing can
be due to the factors evolving around Cloud Providers due to
the use of their proprietary models and standards [1]. Cloud
providers are using different service delivery models which
can be differentiated based on the level of virtualization they
offer, there are mainly three service delivery models Plaform
as a Service (PaaS), Infrastructure as a Service (IaaS) and
Software as a Service SaaS). These three models together
constitute as SPI Model where S stands for Software, P stands
for Platform and I stands for Infrastructure [2], [3].
1.1 Software-as-a-Service (SaaS)
In this model Software is provided as a service where cloud
user can access the software from his web browser without the
concerns of deployment or installation & maintenance. With
the advent new & faster HTML 5 standards graphically rich
applications can be run smoothly at 60 Frames per second just
like running our software on our own personal computers.
This service model depicts one to many function as single
application running as a service on the server side with many
client end users can run it from their web browser
simultaneously as they are connected as services [2], [3].
For example let us consider Google Play Store where
applications can be purchased on the go and can be run from
the web browser, any number of people can purchase and run
the application simultaneously but only one instance of the
application is running on the server side. This helps in
reducing costs on resources and on the customers point of
view it is hassle free process service on demand where Cloud
user can rent applications without the need of installation and
maintenance of the software [2], [3].
1.2 Platform-as-a-Service (PaaS)
This delivery models allows the user to build & develop his
own applications using programming languages and tools
available on the the cloud provider infrastructure. This kind of
service delivery model is useful in situation where the cloud
user can deploy his applications on to the cloud with complete
control on the applications. But there are few challenges in
this service model, where cloud user cant have the control
over the machine where it is hosted or deployed, as cloud user
cant control or manage cloud infrastructure, operating
systems, data storage and network servers. Another challenge
in this Platform-as-a-service is where Cloud providers offer
pre-defined operating systems and servers to host or deploy
applications, So meeting the requirements of software
deployment is an issue [3], [7]. For example if an application
is compatible with only .Net 4.5 and the operating system
deployed by the cloud provider might only Supporting .Net
3.5, So there might be few restriction while deployment of
applications
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 608
1.3 Infrastructure-as-a-Service ( IaaS)
This model delivers basic cloud comuting capabilities such as
providing storage systems over the network for rentals or pay
as you go. Even this model supports deploying application and
software running arbitrary as well as has the control over the
operating systems deployed in the cloud by the provider,
socloud user here acts as an administrator. So changes to the
operating systems, failure & crashes in the operating system
and data securityis crucial in this service model [3], [7].
All these service deliverymodels are interconnected to each
other or in simple words Infrastructure-as-a-service( Iaas) is
the base or foundation of the cloud computing architecture
where as Platform-as-a-service (PaaS) is built up on
Infrastructure-as-a-service (IaaS) and finally Software-as-a-
service (SaaS) is built up on Platform-as-a-service (PaaS) [3],
[7].
Fig-1: Cloud Computing Stack
2. SECURITY ISSUES
Cloud computing due to its architectural design and
characteristics imposes a number of security benefits such as
centralization of security, data and process segmentation,
redundancy and high availability. Though many traditional
risks are mitigated effeciently, due to its infrastructures
singular characteristics many security challenges have arised.
Cloud computing has “unique attributes that require risk
assessment in areas such as data security, availability
reliability issues and data integrity” [7], [10], [11].
2.1 Data Security
In cloud computing securing data of the cloud user is at most
important than anything else and it needs to be secured in
various transition states between the virtual machines
equipped in the cloud to the physical machines used by the
end users. There are six key areas where data needs to be
secured
• Security of data at rest
• Providing security for the data in transition
• Authentication of Users, Applications and Services
• Data separation between users on the fly
• Legal and regulatory issues
• Generating incident response
Fig– 2: Areas of Security concerns in cloud computing
Data security and confidentiality can be achieved with the use
of cryptographic protocols and trusted platform modules
(TPM) used for migration of data between virtual machines
and physical machines. Technologies such encrypted storage
firewalls are useful in ensuring safe data access and storage
[13], [14], [15], [16].
2.2 Data Integrity
Data Integrity means protecting data from unauthorized
deletion, modification or fabrication. Protecting users
admittance and rights to specific enterprise resources ensures
that valuable data and services are not abused,
misappropriated or stolen. Data Integrity and system integrity
in organizations can be achievedby preventing unauthorized
access. Data integrity mechanism“offers the greater visibility
into determining who or what may have altered data or system
information, potentially affecting their integrity”[4], [12].
2.3 Availability
System readily available, accessible and useable to an
authorized user even at tough situations where there is a
possible chance security breach. This approach of cloud
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 609
computing where hardware, software and personal data made
available to authorized and loyal cloud users at tough times
but this results in congested network for data retrieval and
processing and burdens cloud provider with additional costs in
acquiring network servers [6], [10].
3. PRIVACY ISSUES
In cloud computing privacy plays a major role in protecting
users from their individual rights but in multi domain
environments and service oriented architecture it is important
to implement multi domain policy integration and secure
service composition. There are five key areas where privacy
for cloud users is at stake they are
• Authentication and identity management
• Access control and accounting
• Trust management and policy integration
• Secure service management
• Privacy data protection
• Organizational security management [4], [9], [12]
4. TRUST
Trust in cloud computing varies from platform to platform and
depends on deployed service delivery model [5].
For example in public cloud, control is reduced only to the
infrastructure owner to implement necessary security policy
such that appropriate security measures are being planned &
performed to mitigate therisk. This delivery model introduces
risks and threats, as security is based on trusting the cloud
provider[5] [12]. Whereas in private cloud infrastructure is
deployed within the premise of the organizations, therefore
management and control over the infrastructure is with the
organizations and thus it does not introduces any additional
security threats as trust remains within the organization but it
incurs costs in maintaining the infrastructure as infrastructure
owner remains the owner of data and process [5] [12].
Trust plays an important role in cloud computing, Trust in
other terms can be stated as reliability on the part of cloud
providers. Cloud provider should be reliable and should meet
the expectations of the user, So trust can be developed by
achieving credibility and being loyal to the user in
safeguarding the user data, effectively executing security
mechanisms, exhibiting expertise in reducing risk & threats
and should acknowledge the users certainty about the cloud
provider in providing required services accurately [3] [4][6].
Fig – 3: Trusted Third Party in cloud
Trusted third party (TTP) plays a major role multi-level
distributed computing. Trusted third party provides end-to-end
security services which are ethical in standard and uses
cryptography to ensure confidentiality, integrity and
authenticity of data communicated. Trusted third party is an
independent ideal security facilitator in cloud computing
environment where it provides trusted securitydomains &
establishes secure connections and interactions between cloud
provider and users[3][6][8].
CONCLUSION
Cloud computing is currently one of the most happening area
where organizations are attracted towards it due to its
flexibility and cost effective architecture. Though cloud
computing is much anticipated there exists many challenges
with the architecture and service delivery models used by
various cloud providers. Actual problem lies with the lack of
global standard in cloud computing and each cloud service
providers using their own proprietary models in deploying
their infrastructure which indeed leads to Data Security and
Privacy issues. At the same time building Trust from cloud
users has been a big challenge.Cloud computing looks like a
potential contender in the future in areas outsourcing and
reducing cost of resources for software companies or
Independent software vendors but unless and until all existing
cloud provider organizations form into a single large global
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 610
group to introduce guidelines and standards for cloud
computing, it is tough on the part of software companies or
Independent software vendors to trust cloud providers for
reducing outsourcing and resource costs.
REFERENCES
[1]. A. Giddens, the Consequences of Modernity, Polity
Press, UK, 1991.
[2]. Chen, Y., Paxson, V., & Katz, R.H. (2010). What’s
New About Cloud Computing Security? Technical
Report UCB/EECS-2010-5, EECS Department,
University of California, Berkeley, 2010.
[3]. Cloud Security Alliance (CSA)’s Security Guidance
for Critical Areas of Focus in Cloud Computing
(2009). CSA, April 2009.
[4]. Cloud Security Alliance. Top threats to cloud
computing, Cloud SecurityAlliance, 2010.
[5]. D. Lekkas, Establishing and managing trust within
the public key infrastructure,Computer
Communications 26 (16) (2003).
[6]. Everett, C. (2009). Cloud Computing- A Question of
Trust.Computer Fraud & Security, Vol 2009, Issue
6, pp. 5-7 June 2010.
[7] Gartner. Assessing the security risks of cloud
computing, Gartner, 2008.
[8]. International Telecommunication Union, X-509 |
ISO/IEC 9594-8, Thedirectory: Public-key and
attribute certificate frameworks, ITU, X-Series, 2001.
[9]. Joshi, J.B.D., Bhatti, R., Bertino, E., &Ghafoor, A.
(2004). Access Control Language for Multi-domain
Environments.IEEE Internet Computing, Vol 8, No
6, pp. 40-50, November 2004.
[10]. National Institute of Standards and Technology, The
NIST Definition of Cloud Computing, Information
Technology Laboratory, 2009.
[11]. National Institute of Standards and Technology.
Guide for mapping types of information and
information systems to security categories, NIST
800-60,2008.
[12]. R. Sherman, Distributed systems security, Computers
& Security 11 (1) (1992).
[13]. Sen, J. (2010a). An Agent-Based Intrusion Detection
System for Local Area
Networks.InternationalJournal of Communication
Networks and Information Security (IJCNIS), Vol 2,
No 2, pp. 128-140,August 2010.
[14]. Sen, J. (2010b). An Intrusion Detection Architecture
for Clustered Wireless Ad Hoc Networks. In
Proceedings of the 2nd IEEE International
Conference on Intelligence in Communication
Systems andNetworks (CICSyN’10), pp. 202-207,
July, 2010, Liverpool, UK.
[15]. Sen, J. (2010c). A Robust and Fault-Tolerant
Distributed Intrusion Detection System.In
Proceedings of the 1st International Conference on
Parallel, Distributed and Grid Computing
(PDGC’10), pp. 123-128,October 2010, Waknaghat,
India.
[16]. Trusted Computing Group (TCG)’s White Paper
(2010). Cloud Computing and Security- A Natural
Match. Available online at:
http://www.trustedcomputinggroup.org (Accessed
on; January 2013).
BIOGRAPHY
K.V.K Mahesh Kumar holds a B.E.
(Bachelor of Engineering) in Computer
Science from Osmania University, Graduate
Diploma in Professional Computing &
Masters in ICT (Information and
Communication Technology Management) from University of
South Australia and is currently pursuing Ph.D. in Cloud
Computing from Department of Computer Science and
Engineering at Acharya Nagarjuna University. He has been
involved in many diversified research projects and published
several papers in international journals in the research areas of
HCI (Human Computer Interaction), EHR (Electronic Health
Record) systems, E-Business & E-Commerce, Web 2.0 Social
Networking, Project Management and Knowledge
Management.

Contenu connexe

Tendances

Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Journals
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Publishing House
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceEditor Jacotech
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458IJRAT
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 

Tendances (16)

Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
Unit 5
Unit 5Unit 5
Unit 5
 

En vedette

New design approach for drains coverings
New design approach for drains coveringsNew design approach for drains coverings
New design approach for drains coveringseSAT Publishing House
 
Ev-ent-anglement 3: dublin
Ev-ent-anglement 3: dublinEv-ent-anglement 3: dublin
Ev-ent-anglement 3: dublinEveEntanglement
 
Evaluation Question 3
Evaluation Question 3Evaluation Question 3
Evaluation Question 3miloomahoney
 
Why people arere luct antto repor t work placebullying
Why people arere luct antto repor t work placebullyingWhy people arere luct antto repor t work placebullying
Why people arere luct antto repor t work placebullyingNguyễn Thái
 
Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecsBucephalos Business
 
SNSasikumar-Present R&R
SNSasikumar-Present R&RSNSasikumar-Present R&R
SNSasikumar-Present R&RSASIKUMAR SN
 
Construction Industry Snapshot Package-October 2014
Construction Industry Snapshot Package-October 2014Construction Industry Snapshot Package-October 2014
Construction Industry Snapshot Package-October 2014-PAUL CODLING
 
Optimization of crosspiece of washing machine
Optimization of crosspiece of washing machineOptimization of crosspiece of washing machine
Optimization of crosspiece of washing machineeSAT Publishing House
 
Mobile applications development by goigi
Mobile applications development by goigiMobile applications development by goigi
Mobile applications development by goigigoiginivedita
 

En vedette (20)

Canada
CanadaCanada
Canada
 
New design approach for drains coverings
New design approach for drains coveringsNew design approach for drains coverings
New design approach for drains coverings
 
Ev-ent-anglement 3: dublin
Ev-ent-anglement 3: dublinEv-ent-anglement 3: dublin
Ev-ent-anglement 3: dublin
 
management
management management
management
 
Konfigurasi elektron
Konfigurasi elektronKonfigurasi elektron
Konfigurasi elektron
 
Evaluation Question 3
Evaluation Question 3Evaluation Question 3
Evaluation Question 3
 
God acts on those who wait
God acts on those who waitGod acts on those who wait
God acts on those who wait
 
What is Quality in Blended Learning?
What is Quality in Blended Learning?What is Quality in Blended Learning?
What is Quality in Blended Learning?
 
Why people arere luct antto repor t work placebullying
Why people arere luct antto repor t work placebullyingWhy people arere luct antto repor t work placebullying
Why people arere luct antto repor t work placebullying
 
Kehidupanku di sekolah
Kehidupanku di sekolahKehidupanku di sekolah
Kehidupanku di sekolah
 
CV_Chanchalerm
CV_ChanchalermCV_Chanchalerm
CV_Chanchalerm
 
Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecs
 
Suy nghi va lam giau
Suy nghi va lam giauSuy nghi va lam giau
Suy nghi va lam giau
 
SNSasikumar-Present R&R
SNSasikumar-Present R&RSNSasikumar-Present R&R
SNSasikumar-Present R&R
 
Struktur atom-dan-spu
Struktur atom-dan-spuStruktur atom-dan-spu
Struktur atom-dan-spu
 
Construction Industry Snapshot Package-October 2014
Construction Industry Snapshot Package-October 2014Construction Industry Snapshot Package-October 2014
Construction Industry Snapshot Package-October 2014
 
Motif , tindakan, prinsip, dan politik ekonomi
Motif , tindakan, prinsip, dan politik ekonomiMotif , tindakan, prinsip, dan politik ekonomi
Motif , tindakan, prinsip, dan politik ekonomi
 
Web cam sensing using sdk tool
Web cam sensing using sdk toolWeb cam sensing using sdk tool
Web cam sensing using sdk tool
 
Optimization of crosspiece of washing machine
Optimization of crosspiece of washing machineOptimization of crosspiece of washing machine
Optimization of crosspiece of washing machine
 
Mobile applications development by goigi
Mobile applications development by goigiMobile applications development by goigi
Mobile applications development by goigi
 

Similaire à Overview of cloud computing architecture service

Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachIRJET Journal
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 

Similaire à Overview of cloud computing architecture service (20)

Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Am36234239
Am36234239Am36234239
Am36234239
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide LaboratoryBahzad5
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Apollo Techno Industries Pvt Ltd
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingMarian Marinov
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Bahzad5
 
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxSUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxNaveenVerma126
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxYogeshKumarKJMIT
 
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchrohitcse52
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxrealme6igamerr
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...soginsider
 
Test of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptxTest of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptxHome
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderjuancarlos286641
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid BodyAhmadHajasad2
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Sean Meyn
 
Basic Principle of Electrochemical Sensor
Basic Principle of  Electrochemical SensorBasic Principle of  Electrochemical Sensor
Basic Principle of Electrochemical SensorTanvir Moin
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptxSaiGouthamSunkara
 
How to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfHow to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfRedhwan Qasem Shaddad
 
me3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Ame3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Akarthi keyan
 

Dernier (20)

دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)
 
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxSUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptx
 
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
 
Test of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptxTest of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptx
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entender
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
 
Basic Principle of Electrochemical Sensor
Basic Principle of  Electrochemical SensorBasic Principle of  Electrochemical Sensor
Basic Principle of Electrochemical Sensor
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptx
 
How to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfHow to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdf
 
me3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Ame3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part A
 
Lecture 2 .pptx
Lecture 2                            .pptxLecture 2                            .pptx
Lecture 2 .pptx
 

Overview of cloud computing architecture service

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 607 OVERVIEW OF CLOUD COMPUTING ARCHITECTURE: SERVICE DELIVERY MODELS, SECURITY& PRIVACY ISSUES AND TRUST K.V. K Mahesh Kumar Research Scholar, Department of Computer Science and Engineering, Acharya Nagarjuna University, A.P, India, maheshkondraju@gmail.com Abstract This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a- service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION Now a days Cloud Computing has been center of focus for organizations and software companies for some time but there seems to be no clarity on how effective cloud computing can be due to the factors evolving around Cloud Providers due to the use of their proprietary models and standards [1]. Cloud providers are using different service delivery models which can be differentiated based on the level of virtualization they offer, there are mainly three service delivery models Plaform as a Service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service SaaS). These three models together constitute as SPI Model where S stands for Software, P stands for Platform and I stands for Infrastructure [2], [3]. 1.1 Software-as-a-Service (SaaS) In this model Software is provided as a service where cloud user can access the software from his web browser without the concerns of deployment or installation & maintenance. With the advent new & faster HTML 5 standards graphically rich applications can be run smoothly at 60 Frames per second just like running our software on our own personal computers. This service model depicts one to many function as single application running as a service on the server side with many client end users can run it from their web browser simultaneously as they are connected as services [2], [3]. For example let us consider Google Play Store where applications can be purchased on the go and can be run from the web browser, any number of people can purchase and run the application simultaneously but only one instance of the application is running on the server side. This helps in reducing costs on resources and on the customers point of view it is hassle free process service on demand where Cloud user can rent applications without the need of installation and maintenance of the software [2], [3]. 1.2 Platform-as-a-Service (PaaS) This delivery models allows the user to build & develop his own applications using programming languages and tools available on the the cloud provider infrastructure. This kind of service delivery model is useful in situation where the cloud user can deploy his applications on to the cloud with complete control on the applications. But there are few challenges in this service model, where cloud user cant have the control over the machine where it is hosted or deployed, as cloud user cant control or manage cloud infrastructure, operating systems, data storage and network servers. Another challenge in this Platform-as-a-service is where Cloud providers offer pre-defined operating systems and servers to host or deploy applications, So meeting the requirements of software deployment is an issue [3], [7]. For example if an application is compatible with only .Net 4.5 and the operating system deployed by the cloud provider might only Supporting .Net 3.5, So there might be few restriction while deployment of applications
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 608 1.3 Infrastructure-as-a-Service ( IaaS) This model delivers basic cloud comuting capabilities such as providing storage systems over the network for rentals or pay as you go. Even this model supports deploying application and software running arbitrary as well as has the control over the operating systems deployed in the cloud by the provider, socloud user here acts as an administrator. So changes to the operating systems, failure & crashes in the operating system and data securityis crucial in this service model [3], [7]. All these service deliverymodels are interconnected to each other or in simple words Infrastructure-as-a-service( Iaas) is the base or foundation of the cloud computing architecture where as Platform-as-a-service (PaaS) is built up on Infrastructure-as-a-service (IaaS) and finally Software-as-a- service (SaaS) is built up on Platform-as-a-service (PaaS) [3], [7]. Fig-1: Cloud Computing Stack 2. SECURITY ISSUES Cloud computing due to its architectural design and characteristics imposes a number of security benefits such as centralization of security, data and process segmentation, redundancy and high availability. Though many traditional risks are mitigated effeciently, due to its infrastructures singular characteristics many security challenges have arised. Cloud computing has “unique attributes that require risk assessment in areas such as data security, availability reliability issues and data integrity” [7], [10], [11]. 2.1 Data Security In cloud computing securing data of the cloud user is at most important than anything else and it needs to be secured in various transition states between the virtual machines equipped in the cloud to the physical machines used by the end users. There are six key areas where data needs to be secured • Security of data at rest • Providing security for the data in transition • Authentication of Users, Applications and Services • Data separation between users on the fly • Legal and regulatory issues • Generating incident response Fig– 2: Areas of Security concerns in cloud computing Data security and confidentiality can be achieved with the use of cryptographic protocols and trusted platform modules (TPM) used for migration of data between virtual machines and physical machines. Technologies such encrypted storage firewalls are useful in ensuring safe data access and storage [13], [14], [15], [16]. 2.2 Data Integrity Data Integrity means protecting data from unauthorized deletion, modification or fabrication. Protecting users admittance and rights to specific enterprise resources ensures that valuable data and services are not abused, misappropriated or stolen. Data Integrity and system integrity in organizations can be achievedby preventing unauthorized access. Data integrity mechanism“offers the greater visibility into determining who or what may have altered data or system information, potentially affecting their integrity”[4], [12]. 2.3 Availability System readily available, accessible and useable to an authorized user even at tough situations where there is a possible chance security breach. This approach of cloud
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 609 computing where hardware, software and personal data made available to authorized and loyal cloud users at tough times but this results in congested network for data retrieval and processing and burdens cloud provider with additional costs in acquiring network servers [6], [10]. 3. PRIVACY ISSUES In cloud computing privacy plays a major role in protecting users from their individual rights but in multi domain environments and service oriented architecture it is important to implement multi domain policy integration and secure service composition. There are five key areas where privacy for cloud users is at stake they are • Authentication and identity management • Access control and accounting • Trust management and policy integration • Secure service management • Privacy data protection • Organizational security management [4], [9], [12] 4. TRUST Trust in cloud computing varies from platform to platform and depends on deployed service delivery model [5]. For example in public cloud, control is reduced only to the infrastructure owner to implement necessary security policy such that appropriate security measures are being planned & performed to mitigate therisk. This delivery model introduces risks and threats, as security is based on trusting the cloud provider[5] [12]. Whereas in private cloud infrastructure is deployed within the premise of the organizations, therefore management and control over the infrastructure is with the organizations and thus it does not introduces any additional security threats as trust remains within the organization but it incurs costs in maintaining the infrastructure as infrastructure owner remains the owner of data and process [5] [12]. Trust plays an important role in cloud computing, Trust in other terms can be stated as reliability on the part of cloud providers. Cloud provider should be reliable and should meet the expectations of the user, So trust can be developed by achieving credibility and being loyal to the user in safeguarding the user data, effectively executing security mechanisms, exhibiting expertise in reducing risk & threats and should acknowledge the users certainty about the cloud provider in providing required services accurately [3] [4][6]. Fig – 3: Trusted Third Party in cloud Trusted third party (TTP) plays a major role multi-level distributed computing. Trusted third party provides end-to-end security services which are ethical in standard and uses cryptography to ensure confidentiality, integrity and authenticity of data communicated. Trusted third party is an independent ideal security facilitator in cloud computing environment where it provides trusted securitydomains & establishes secure connections and interactions between cloud provider and users[3][6][8]. CONCLUSION Cloud computing is currently one of the most happening area where organizations are attracted towards it due to its flexibility and cost effective architecture. Though cloud computing is much anticipated there exists many challenges with the architecture and service delivery models used by various cloud providers. Actual problem lies with the lack of global standard in cloud computing and each cloud service providers using their own proprietary models in deploying their infrastructure which indeed leads to Data Security and Privacy issues. At the same time building Trust from cloud users has been a big challenge.Cloud computing looks like a potential contender in the future in areas outsourcing and reducing cost of resources for software companies or Independent software vendors but unless and until all existing cloud provider organizations form into a single large global
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 610 group to introduce guidelines and standards for cloud computing, it is tough on the part of software companies or Independent software vendors to trust cloud providers for reducing outsourcing and resource costs. REFERENCES [1]. A. Giddens, the Consequences of Modernity, Polity Press, UK, 1991. [2]. Chen, Y., Paxson, V., & Katz, R.H. (2010). What’s New About Cloud Computing Security? Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, 2010. [3]. Cloud Security Alliance (CSA)’s Security Guidance for Critical Areas of Focus in Cloud Computing (2009). CSA, April 2009. [4]. Cloud Security Alliance. Top threats to cloud computing, Cloud SecurityAlliance, 2010. [5]. D. Lekkas, Establishing and managing trust within the public key infrastructure,Computer Communications 26 (16) (2003). [6]. Everett, C. (2009). Cloud Computing- A Question of Trust.Computer Fraud & Security, Vol 2009, Issue 6, pp. 5-7 June 2010. [7] Gartner. Assessing the security risks of cloud computing, Gartner, 2008. [8]. International Telecommunication Union, X-509 | ISO/IEC 9594-8, Thedirectory: Public-key and attribute certificate frameworks, ITU, X-Series, 2001. [9]. Joshi, J.B.D., Bhatti, R., Bertino, E., &Ghafoor, A. (2004). Access Control Language for Multi-domain Environments.IEEE Internet Computing, Vol 8, No 6, pp. 40-50, November 2004. [10]. National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009. [11]. National Institute of Standards and Technology. Guide for mapping types of information and information systems to security categories, NIST 800-60,2008. [12]. R. Sherman, Distributed systems security, Computers & Security 11 (1) (1992). [13]. Sen, J. (2010a). An Agent-Based Intrusion Detection System for Local Area Networks.InternationalJournal of Communication Networks and Information Security (IJCNIS), Vol 2, No 2, pp. 128-140,August 2010. [14]. Sen, J. (2010b). An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. In Proceedings of the 2nd IEEE International Conference on Intelligence in Communication Systems andNetworks (CICSyN’10), pp. 202-207, July, 2010, Liverpool, UK. [15]. Sen, J. (2010c). A Robust and Fault-Tolerant Distributed Intrusion Detection System.In Proceedings of the 1st International Conference on Parallel, Distributed and Grid Computing (PDGC’10), pp. 123-128,October 2010, Waknaghat, India. [16]. Trusted Computing Group (TCG)’s White Paper (2010). Cloud Computing and Security- A Natural Match. Available online at: http://www.trustedcomputinggroup.org (Accessed on; January 2013). BIOGRAPHY K.V.K Mahesh Kumar holds a B.E. (Bachelor of Engineering) in Computer Science from Osmania University, Graduate Diploma in Professional Computing & Masters in ICT (Information and Communication Technology Management) from University of South Australia and is currently pursuing Ph.D. in Cloud Computing from Department of Computer Science and Engineering at Acharya Nagarjuna University. He has been involved in many diversified research projects and published several papers in international journals in the research areas of HCI (Human Computer Interaction), EHR (Electronic Health Record) systems, E-Business & E-Commerce, Web 2.0 Social Networking, Project Management and Knowledge Management.