Soumettre la recherche
Mettre en ligne
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications
•
0 j'aime
•
94 vues
IRJET Journal
Suivre
https://irjet.net/archives/V5/i12/IRJET-V5I1296.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 5
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET Journal
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
Vendor classification & rating
Vendor classification & rating
Amit Puri
Sem rep edited
Sem rep edited
Saksham Pahuja
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
Eswar Publications
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
cloudresearcher
Recommandé
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET Journal
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
Vendor classification & rating
Vendor classification & rating
Amit Puri
Sem rep edited
Sem rep edited
Saksham Pahuja
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
Eswar Publications
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
cloudresearcher
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET Journal
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
IRJET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Reminiscing cloud computing technology
Reminiscing cloud computing technology
eSAT Publishing House
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
Cloud computing
Cloud computing
Yogesh Singh
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Cloud computing it703 unit iii
Cloud computing it703 unit iii
Jitendra s Rathore
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
P singh
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
AIRCC Publishing Corporation
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
IJCNCJournal
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
Editor IJARCET
Cloud Computing
Cloud Computing
Abdul Aslam
A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud Computing
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Mervat Bamiah
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
Contenu connexe
Tendances
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET Journal
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
IRJET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Reminiscing cloud computing technology
Reminiscing cloud computing technology
eSAT Publishing House
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
Cloud computing
Cloud computing
Yogesh Singh
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Cloud computing it703 unit iii
Cloud computing it703 unit iii
Jitendra s Rathore
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
P singh
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
AIRCC Publishing Corporation
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
IJCNCJournal
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
Editor IJARCET
Cloud Computing
Cloud Computing
Abdul Aslam
Tendances
(17)
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud Computing
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Reminiscing cloud computing technology
Reminiscing cloud computing technology
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Cloud computing
Cloud computing
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
Cloud computing it703 unit iii
Cloud computing it703 unit iii
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
Cloud Computing
Cloud Computing
Similaire à IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications
A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud Computing
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Mervat Bamiah
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
ijasa
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
ijasa
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
G017324043
G017324043
IOSR Journals
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Journals
Similaire à IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications
(20)
A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud Computing
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
G017324043
G017324043
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Addressing the cloud computing security menace
Addressing the cloud computing security menace
Addressing the cloud computing security menace
Addressing the cloud computing security menace
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Call Girls Mumbai
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
selvakumar948
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Morshed Ahmed Rahath
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
NANDHAKUMARA10
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
maisarahman1
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Amil baba
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
sarkmank1
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
JIT KUMAR GUPTA
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
MairaAshraf6
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
RAJNEESHKUMAR341697
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
KOUSTAV SARKAR
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
Dernier
(20)
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 508 A Detailed Study and Analysis of Cloud Computing usage with Real- Time Applications VALARMATHI V1, KOWSALYA N2 1Assistant Professor, Department of Information Technology, Sri Krishna Arts and Science College, Coimbatore, India 2Student, III Bsc (IT) A, Department of Information Technology, Sri Krishna Arts and Science College, Coimbatore, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing has come of its age since Amazon uses its first kind of cloud services in 2006. Cloud computing is an excellent new platformforthedevelopment of conceptual solution. It is helpful in sharing resources to achieve economic of scale. It is typically a combination of hardware and software that works together to deliver many aspects of the end user .In this paper, we explode the characteristics of cloud and the three levels of service models that works effectively on cloud. This paper addresses the main three types of cloud and in which way they work efficiently on real time. And it also deals with the advantages and limitations of cloud computing. This paper discuss about the major useful technology that we deal in our day-to-day life with some examples. However, the security and privacy plays the major role for the users who tries to adapt to the cloud computing. This paper investigates about the various kinds of security control. Key Words: cloud computing, characteristics, architecture, deployment, limitations, security control. 1. INTRODUCTION Cloud Computing depends on sharing of resources to experience coherence and achievement. The unknown cloud users enable organizations to focus on their core businesses instead of expending resources on computer infrastructure and maintenance. Cloud Computing is an excellent platform for the development of conceptual solution. Cloud Computing is helpful on sharing ofresources to achieve economic of scale. Cloud Computing allows the companies to avoid infrastructure costs. It is the usage of hardware and software through a network. The cloud is typically a combination of different types of hardware and software that works collectively to deliver many aspects of the end user. Organization: The remaining paper is organized as follows: In Section 2, we define the characteristicsofa cloudcomputing. In Section 3, we define the architectural component of a cloud computing which includes Infrastructure as a Service (IaaS), Software as a Service (SaaS), Platform as a Service (PaaS). Section 4, explains the deployment model of Cloud Computing. Section 5, explains the limitations and advantages followed by some examples in section 6. We future explain the some security control in section 7, followed by the conclusion in the section 8. 2. CHARACTERISTICS Cloud computing delivers the following key characteristics: Cloud computing increases the user’s flexibility. The Cost reductions can be claimed by cloud providers. The Device and location independence enable users to access systems using a web browser irrespective of their location or what device they use (e.g., PC, mobile phone).The Maintenance of cloud computing applications will be easier. A Multiple tenant enables sharing of resources and costs across a large number of users. It results in: Centralization of infrastructure with lower costs (example: electricity, etc.) The peak-load capacity increases (As they need not to be an engineer and buy the largest equipment). Utilization and efficiency improves the systems. Performance is monitored by IT experts from the amenity supplier. Productivity may be increased when multiple users can work on the same data concurrently, rather than waiting for it to be saved and emailed. Time may be saved. Reliability and scalability may be improved. Security has been improved due to thecentralizationofdata. [2] Fig -1: Cloud Computing characteristics
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 509 3. ARCHITECTURAL COMPONENT The three most commonly used acronyms in the cloud computing are: SaaS, PaaS, IaaS. These are interdependent and it is also called as three tier model. These three model distinguish between the primary cloud computing. In other word SaaS, PaaS, IaaS are the main criteria for cloud computing. The layers of the model are portrayed in a stack. [4] Fig -2: Architecture of an service model 3.1 Infrastructure as a Service Infrastructure as a Service (IaaS) is the lowest level cloud services and it is the most importantone.Iaasdoes not include application or even an operating system, whereas SaaS, PaaS includes application and operating system. Iaas provide a large number of storage for corporate data backups, network bandwidth for a company website server. Sometimes it enables access to high powercomputingwhich has been previously accessed by the supercomputing. The most popular IaaS offerings are: Amazon E2C,IBMsoftlayer, Google’s Compute Engine (GCE). It refers to online services, which is used to network infrastructure like physical computing resources, data partitioning, security, etc.Itoften includes additional resources like virtual machine, server storage. As it is the lowest layer of abstract model, it must be transparent to the consumer. 3.2 Platform as a Service Platform as a Service (PaaS) is the intermediate layer of the conceptual model. It provides the consumer operating system, software development platforms, programming language. This makes it even more simpler to test, develop and integrate. Some integration and data managementprovidersgiveussomespecializedapplications of PaaS which includes iPaaS (Integration Platform as a Service) and dPaaS (Data Platform as a Service).Application designers will have an ability to develop and run their software solutions on a cloud platform without the cost and complexity. Similarly it reduces the buying and managing of the hardware and software layers. PaaS offers some platforms like Microsoft Azure, Oracle Cloud Platform and Google App Engine. 3.3 Software as a Service Software as a Service (SaaS) is the outer most layer of the service model. It represents the set of application that run in a cloud. It is accessible only through the use of browser. It can be accessed from anywhere and on any devices with the internet connection. It does not require the purchase of software licenses, it reduces cost. The Cloud provider has an ability to manage the infrastructure and platforms that run the applications. In the SaaS model, cloud providers connect and operate application software in the cloud and the cloud users approach the software from cloud clients. Cloud computing users do not accomplish the cloud infrastructure and platform wherethesubmissionruns. This eradicates the need to connectandruntheapplicationonthe cloud user's individual computers, which in turn simplifies maintenance and support. Cloud applications diverge from other applications in their scalability and readability. 4. DEPLOYMENT The deployment model has been classified into many different types. They are private cloud, public cloud, hybrid cloud. The private cloud infrastructure has been implemented exclusively for a single organization. The public cloud infrastructure is an open network forthepublic users. The hybrid is a combination of bothpublicandprivate cloud infrastructure. [4] 4.1 Private cloud Private cloud is a cloud infrastructure functioned exclusively for a single organization. It is either managed internally or externally or using a third party host. It is compressed of files and application, storage and services that are implemented and protected only within a particular firewall. The perfect example of private cloud will be a company that has a Microsoft exchange, this why because only an authorized user can only be accessed through VPN connection. In this model, the cloud infrastructure is privately owned and it has been used completely by the respective concern that owns it. It results in highest cost of creating and maintaining the cloud over the use of public cloud. It has been noted that, it has the largest and the most detailed control over cloud.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 510 4.2 Public cloud A cloud is called a "public cloud" when the services are concentrated over a network that is open for public usage. Public cloud amenities might be free. But in case of technical there may be little or no variance between the public and private cloud architecture. However, security attention may be significantly different for services like applications, storage, and other resources. Usually, public cloud service providers like Amazon Web Services (AWS), Oracle, Microsoft and Google own and operate their infrastructure via internet. It also consists of files and application, storage and services available through internet. In this model, the cloud appears a stored resource for the set of organization that has a common interest. The common interest would tend to security policy and flexibility. 4.3 Hybrid cloud Hybrid cloud is a compositionoftwoormoreclouds which includes private, community or public cloud. Itallows the user to extend either the capacity or the capability of a cloud service, by combination, addition or customization with another cloud service. Diverse usage of hybrid cloud composition also exists. It is somewhat difficult to implement as it is the combination oftwoclouds.Itperforms the critical process and the other performs the secondary process. Hybrid cloud acceptance depends on a number of factors such as data security and submission requests, level of control needed over data, and the applications an organization uses. [4] Fig - 3: Deployment model 5. LIMITATIONS AND ADVANTAGES Cloud computing is much cheaper because of its economic scale. In cloud computing, the control of the rear end infrastructure is limited to the cloud merchants only. The Cloud providers frequently decide the management policies. Cloud users were limited to the control and management of their applications, data and services. This includes data caps, which are placed on cloud users by the cloud merchants distributing certain amount of bandwidth for each customer and are often shared among other cloud users. Privacy and confidentiality were big alarms in some activities. The cloud computing has been proved to have some limitations and disadvantages, particularlyforsmaller business operations. Technical outages are unavoidableand arise sometimes when cloud service providers become overwhelmed in the process of serving their clients. This results in temporary business interruption. Meanwhile this technology's systems depend on the internet, an individual cannot be able to access their applications, server or data from the cloud during an outage. [5] 6. EXAMPLES The top most real time application where cloud computing works at its best are: 6.1 Scalable usage: Cloud computing offers a scalable resourcethrough different subscription models, whichinturn meansyouhave to pay only for the computing resources you use. Example: Netflix Because of its streaming services, it faces a large flow in server load at peak time. Since theyhaveuseda cloud computing that allows the company to significantly expand the customer without any investment and maintenance of costly infrastructure. 6.2 Chatbot: It provides the customized solution, messages and products based on the behavior and preferences of users. The extended computing power and capacity of the cloud enables us to store information about the user. Example: Google Assistant, Siri 6.3 Communication: It is the most important and the major requirement of everyone in day to day life. The cloud also allows us to enjoy the network based access to the communication tools like emails and calendar. In fact most of the messaging apps like Skype, WhatsApp are also a cloud based application in which we can share information are also stored on the service provider rather than on the personal devices. It allows us to access our information from anywhere through the internet. Example: WhatsApp, Skype
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 511 6.4 Productivity: This allows us to share our documents through cloud. In this we can work on our document, presentations, spreadsheet from anywhere at any time. We need not to be worried about the data loss, we can retrieve it throughcloud at any time. Example: MS OFFICE 365, Google Docs 6.5 Social networking: Social networks are designed to find people you already know or you would like to know. If we share information on social media, we are not only sharing the photos and videos with our friends and relatives butalsowiththemakersof the platform. So to manage all these things cloud will be very helpful. Example: Facebook, LinkedIn, Twitter 7. SECURITY CONTROL The well-organized cloud security architecture has to identify the issues that will rise with security management. The security management reportstheseissues with security panels. The security panel is used to safeguard any flaws in the system and diminishes the effect of an attack. There are many types of controls behind the cloud security architecture, they are: [14] 7.1 Deterrent control: The deterrent control is proposed to reduce the attacks on a cloud system. It gives a warning sign. The deterrent control typically decreases the threat level by informing the potential attackers that there will beopposing consequences for them if they proceed. 7.2 Preventive control: Preventive control reinforce the system against events, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unapproved users can access cloud systems, and more likely that cloud users are positively acknowledged. 7.3 Detective control: Detective controls are proposed to detect and react aptly to any incidents that occur. In the event of an attack, a detective control has to signal the preventativeorcorrective controls to report an issue. System and network security are typically employed to detect attacks on cloud systems and it supports the communications infrastructure. 7.4 Corrective controls: Corrective controls reduce the costs of an incident that occurs, usually by limiting the damage. These controls will work effectively during the incident or after an incident occurs. We can restore the system backups in the corrective control. Fig - 4: Security control 8. CONCLUSION Cloud computing is recently new technological development that has the potential to havea greatimpact on the world. It has many benefits that it provides to it users and businesses. Users also worry about who can disclose their data and have ownership of their data. Cloud computing is changing its own way in IT departments. Businesses and organization has a wide range ofpathsinthe cloud, which includes infrastructure, platforms and applications that are available from cloud providers as online services. Cloud computing has sets its height in the field of information and communication technology as it brings out an evolution. REFERENCES [1] L. Albertson, "Openstack vs. Ganeti", Linux Fest Northwest 2017 [2] https://en.wikipedia.org/wiki/Cloud_computing [3] The NIST Definition of Cloud Computing. Retrieved November 1, 2015, from National Institute of Standards and Technology website: http://csrc.nist.gov/publications/nistpubs/800- 145/SP800-145.pdf [4] https://www.linkedin.com/pulse/3-service-4- deployment-models-cloud-computing-sankar- somepalle/ [5] https://www.levelcloud.net/why-levelcloud/cloud- education-center/advantages-and-disadvantages- of-cloud-computing/
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 512 [6] http://www.klientsolutech.com/powerful-uses-of- cloud-computing/ [7] Hu, Tung-Hui (2015). A PrehistoryoftheCloud.MIT Press. [8] Mell, P. (2011, September 31). The NIST Definition of Cloud Computing. Retrieved November 1, 2015, from National Institute of Standards and Technology website. [9] Haghighat, M.; Zonouz, S.; Abdel-Mottaleb, M. (2015). "CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification". Expert Systems with Applications. . [10] Winkler, Vic (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics. Elsevier. [11] https://www.maropost.com/blog/5-real-world- examples-of-cloud-computing/ [12] Haghighat, Mohammad (2015). "CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification". Expert Systems with Applications. [13] Amazon Web Services. 2013-03-19. Retrieved 2013-03-20 and Baburajan, Rajani (2011-08-24). It.tmcnet.com. Retrieved 2011-12- 02. [14] https://www.techopedia.com/definition/29367/cl oud-security-control [15] Bruneo, Dario; Distefano, Salvatore; Longo, Francesco; Puliafito, Antonio; Scarpa, Marco (2013). "Workload-BasedSoftwareRejuvenationin Cloud Systems". IEEE Transactions on Computers.
Télécharger maintenant