SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 508
A Detailed Study and Analysis of Cloud Computing usage with Real-
Time Applications
VALARMATHI V1, KOWSALYA N2
1Assistant Professor, Department of Information Technology, Sri Krishna Arts and Science College,
Coimbatore, India
2Student, III Bsc (IT) A, Department of Information Technology, Sri Krishna Arts and Science College,
Coimbatore, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Cloud Computing has come of its age since
Amazon uses its first kind of cloud services in 2006. Cloud
computing is an excellent new platformforthedevelopment of
conceptual solution. It is helpful in sharing resources to
achieve economic of scale. It is typically a combination of
hardware and software that works together to deliver many
aspects of the end user .In this paper, we explode the
characteristics of cloud and the three levels of service models
that works effectively on cloud. This paper addresses the main
three types of cloud and in which way they work efficiently on
real time. And it also deals with the advantages and
limitations of cloud computing. This paper discuss about the
major useful technology that we deal in our day-to-day life
with some examples. However, the security and privacy plays
the major role for the users who tries to adapt to the cloud
computing. This paper investigates about the various kinds of
security control.
Key Words: cloud computing, characteristics,
architecture, deployment, limitations, security control.
1. INTRODUCTION
Cloud Computing depends on sharing of resources
to experience coherence and achievement. The unknown
cloud users enable organizations to focus on their core
businesses instead of expending resources on computer
infrastructure and maintenance. Cloud Computing is an
excellent platform for the development of conceptual
solution. Cloud Computing is helpful on sharing ofresources
to achieve economic of scale. Cloud Computing allows the
companies to avoid infrastructure costs. It is the usage of
hardware and software through a network. The cloud is
typically a combination of different types of hardware and
software that works collectively to deliver many aspects of
the end user.
Organization:
The remaining paper is organized as follows: In
Section 2, we define the characteristicsofa cloudcomputing.
In Section 3, we define the architectural component of a
cloud computing which includes Infrastructure as a Service
(IaaS), Software as a Service (SaaS), Platform as a Service
(PaaS). Section 4, explains the deployment model of Cloud
Computing. Section 5, explains the limitations and
advantages followed by some examples in section 6. We
future explain the some security control in section 7,
followed by the conclusion in the section 8.
2. CHARACTERISTICS
Cloud computing delivers the following key
characteristics:
Cloud computing increases the user’s flexibility. The Cost
reductions can be claimed by cloud providers. The Device
and location independence enable users to access systems
using a web browser irrespective of their location or what
device they use (e.g., PC, mobile phone).The Maintenance of
cloud computing applications will be easier. A Multiple
tenant enables sharing of resources and costs across a large
number of users.
It results in:
 Centralization of infrastructure with lower costs
(example: electricity, etc.)
 The peak-load capacity increases (As they need not
to be an engineer and buy the largest equipment).
 Utilization and efficiency improves the systems.
Performance is monitored by IT experts from the
amenity supplier. Productivity may be increased when
multiple users can work on the same data concurrently,
rather than waiting for it to be saved and emailed. Time may
be saved. Reliability and scalability may be improved.
Security has been improved due to thecentralizationofdata.
[2]
Fig -1: Cloud Computing characteristics
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 509
3. ARCHITECTURAL COMPONENT
The three most commonly used acronyms in the
cloud computing are: SaaS, PaaS, IaaS. These are
interdependent and it is also called as three tier model.
These three model distinguish between the primary cloud
computing. In other word SaaS, PaaS, IaaS are the main
criteria for cloud computing. The layers of the model are
portrayed in a stack. [4]
Fig -2: Architecture of an service model
3.1 Infrastructure as a Service
Infrastructure as a Service (IaaS) is the lowest level
cloud services and it is the most importantone.Iaasdoes not
include application or even an operating system, whereas
SaaS, PaaS includes application and operating system. Iaas
provide a large number of storage for corporate data
backups, network bandwidth for a company website server.
Sometimes it enables access to high powercomputingwhich
has been previously accessed by the supercomputing. The
most popular IaaS offerings are: Amazon E2C,IBMsoftlayer,
Google’s Compute Engine (GCE). It refers to online services,
which is used to network infrastructure like physical
computing resources, data partitioning, security, etc.Itoften
includes additional resources like virtual machine, server
storage. As it is the lowest layer of abstract model, it must be
transparent to the consumer.
3.2 Platform as a Service
Platform as a Service (PaaS) is the intermediate
layer of the conceptual model. It provides the consumer
operating system, software development platforms,
programming language. This makes it even more simpler to
test, develop and integrate. Some integration and data
managementprovidersgiveussomespecializedapplications
of PaaS which includes iPaaS (Integration Platform as a
Service) and dPaaS (Data Platform as a Service).Application
designers will have an ability to develop and run their
software solutions on a cloud platform without the cost and
complexity. Similarly it reduces the buying and managing of
the hardware and software layers. PaaS offers some
platforms like Microsoft Azure, Oracle Cloud
Platform and Google App Engine.
3.3 Software as a Service
Software as a Service (SaaS) is the outer most layer
of the service model. It represents the set of application that
run in a cloud. It is accessible only through the use of
browser. It can be accessed from anywhere and on any
devices with the internet connection. It does not require the
purchase of software licenses, it reduces cost. The Cloud
provider has an ability to manage the infrastructure and
platforms that run the applications. In the SaaS model, cloud
providers connect and operate application software in the
cloud and the cloud users approach the software from cloud
clients. Cloud computing users do not accomplish the cloud
infrastructure and platform wherethesubmissionruns. This
eradicates the need to connectandruntheapplicationonthe
cloud user's individual computers, which in turn simplifies
maintenance and support. Cloud applications diverge from
other applications in their scalability and readability.
4. DEPLOYMENT
The deployment model has been classified into
many different types. They are private cloud, public cloud,
hybrid cloud. The private cloud infrastructure has been
implemented exclusively for a single organization. The
public cloud infrastructure is an open network forthepublic
users. The hybrid is a combination of bothpublicandprivate
cloud infrastructure. [4]
4.1 Private cloud
Private cloud is a cloud infrastructure functioned
exclusively for a single organization. It is either managed
internally or externally or using a third party host. It is
compressed of files and application, storage and services
that are implemented and protected only within a particular
firewall. The perfect example of private cloud will be a
company that has a Microsoft exchange, this why because
only an authorized user can only be accessed through VPN
connection. In this model, the cloud infrastructure is
privately owned and it has been used completely by the
respective concern that owns it. It results in highest cost of
creating and maintaining the cloud over the use of public
cloud. It has been noted that, it has the largest and the most
detailed control over cloud.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 510
4.2 Public cloud
A cloud is called a "public cloud" when the services
are concentrated over a network that is open for public
usage. Public cloud amenities might be free. But in case of
technical there may be little or no variance between the
public and private cloud architecture. However, security
attention may be significantly different for services like
applications, storage, and other resources. Usually, public
cloud service providers like Amazon Web
Services (AWS), Oracle, Microsoft and Google own and
operate their infrastructure via internet. It also consists of
files and application, storage and services available through
internet. In this model, the cloud appears a stored resource
for the set of organization that has a common interest. The
common interest would tend to security policy and
flexibility.
4.3 Hybrid cloud
Hybrid cloud is a compositionoftwoormoreclouds
which includes private, community or public cloud. Itallows
the user to extend either the capacity or the capability of a
cloud service, by combination, addition or customization
with another cloud service. Diverse usage of hybrid cloud
composition also exists. It is somewhat difficult to
implement as it is the combination oftwoclouds.Itperforms
the critical process and the other performs the secondary
process. Hybrid cloud acceptance depends on a number of
factors such as data security and submission requests, level
of control needed over data, and the applications an
organization uses. [4]
Fig - 3: Deployment model
5. LIMITATIONS AND ADVANTAGES
Cloud computing is much cheaper because of its
economic scale. In cloud computing, the control of the rear
end infrastructure is limited to the cloud merchants only.
The Cloud providers frequently decide the management
policies. Cloud users were limited to the control and
management of their applications, data and services. This
includes data caps, which are placed on cloud users by the
cloud merchants distributing certain amount of bandwidth
for each customer and are often shared among other cloud
users. Privacy and confidentiality were big alarms in some
activities. The cloud computing has been proved to have
some limitations and disadvantages, particularlyforsmaller
business operations. Technical outages are unavoidableand
arise sometimes when cloud service providers become
overwhelmed in the process of serving their clients. This
results in temporary business interruption. Meanwhile this
technology's systems depend on the internet, an individual
cannot be able to access their applications, server or data
from the cloud during an outage. [5]
6. EXAMPLES
The top most real time application where cloud
computing works at its best are:
6.1 Scalable usage:
Cloud computing offers a scalable resourcethrough
different subscription models, whichinturn meansyouhave
to pay only for the computing resources you use.
Example: Netflix
Because of its streaming services, it faces a large
flow in server load at peak time. Since theyhaveuseda cloud
computing that allows the company to significantly expand
the customer without any investment and maintenance of
costly infrastructure.
6.2 Chatbot:
It provides the customized solution, messages and
products based on the behavior and preferences of users.
The extended computing power and capacity of the cloud
enables us to store information about the user.
Example: Google Assistant, Siri
6.3 Communication:
It is the most important and the major requirement
of everyone in day to day life. The cloud also allows us to
enjoy the network based access to the communication tools
like emails and calendar. In fact most of the messaging apps
like Skype, WhatsApp are also a cloud based application in
which we can share information are also stored on the
service provider rather than on the personal devices. It
allows us to access our information from anywhere through
the internet.
Example: WhatsApp, Skype
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 511
6.4 Productivity:
This allows us to share our documents through
cloud. In this we can work on our document, presentations,
spreadsheet from anywhere at any time. We need not to be
worried about the data loss, we can retrieve it throughcloud
at any time.
Example: MS OFFICE 365, Google Docs
6.5 Social networking:
Social networks are designed to find people you already
know or you would like to know. If we share information on
social media, we are not only sharing the photos and videos
with our friends and relatives butalsowiththemakersof the
platform. So to manage all these things cloud will be very
helpful.
Example: Facebook, LinkedIn, Twitter
7. SECURITY CONTROL
The well-organized cloud security architecture has
to identify the issues that will rise with security
management. The security management reportstheseissues
with security panels. The security panel is used to safeguard
any flaws in the system and diminishes the effect of an
attack. There are many types of controls behind the cloud
security architecture, they are: [14]
7.1 Deterrent control:
The deterrent control is proposed to reduce the
attacks on a cloud system. It gives a warning sign. The
deterrent control typically decreases the threat level by
informing the potential attackers that there will beopposing
consequences for them if they proceed.
7.2 Preventive control:
Preventive control reinforce the system against
events, generally by reducing if not actually eliminating
vulnerabilities. Strong authentication of cloud users, for
instance, makes it less likely that unapproved users can
access cloud systems, and more likely that cloud users are
positively acknowledged.
7.3 Detective control:
Detective controls are proposed to detect and react
aptly to any incidents that occur. In the event of an attack, a
detective control has to signal the preventativeorcorrective
controls to report an issue. System and network security are
typically employed to detect attacks on cloud systems and it
supports the communications infrastructure.
7.4 Corrective controls:
Corrective controls reduce the costs of an incident
that occurs, usually by limiting the damage. These controls
will work effectively during the incident or after an incident
occurs. We can restore the system backups in the corrective
control.
Fig - 4: Security control
8. CONCLUSION
Cloud computing is recently new technological
development that has the potential to havea greatimpact on
the world. It has many benefits that it provides to it users
and businesses. Users also worry about who can disclose
their data and have ownership of their data. Cloud
computing is changing its own way in IT departments.
Businesses and organization has a wide range ofpathsinthe
cloud, which includes infrastructure, platforms and
applications that are available from cloud providers as
online services. Cloud computing has sets its height in the
field of information and communication technology as it
brings out an evolution.
REFERENCES
[1] L. Albertson, "Openstack vs. Ganeti", Linux Fest
Northwest 2017
[2] https://en.wikipedia.org/wiki/Cloud_computing
[3] The NIST Definition of Cloud Computing. Retrieved
November 1, 2015, from National Institute of
Standards and Technology website:
http://csrc.nist.gov/publications/nistpubs/800-
145/SP800-145.pdf
[4] https://www.linkedin.com/pulse/3-service-4-
deployment-models-cloud-computing-sankar-
somepalle/
[5] https://www.levelcloud.net/why-levelcloud/cloud-
education-center/advantages-and-disadvantages-
of-cloud-computing/
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 512
[6] http://www.klientsolutech.com/powerful-uses-of-
cloud-computing/
[7] Hu, Tung-Hui (2015). A PrehistoryoftheCloud.MIT
Press.
[8] Mell, P. (2011, September 31). The NIST Definition
of Cloud Computing. Retrieved November 1, 2015,
from National Institute of Standards and
Technology website.
[9] Haghighat, M.; Zonouz, S.; Abdel-Mottaleb, M.
(2015). "CloudID: Trustworthy Cloud-based and
Cross-Enterprise Biometric Identification". Expert
Systems with Applications. .
[10] Winkler, Vic (2011). Securing the Cloud: Cloud
Computer Security Techniques and Tactics.
Elsevier.
[11] https://www.maropost.com/blog/5-real-world-
examples-of-cloud-computing/
[12] Haghighat, Mohammad (2015). "CloudID:
Trustworthy Cloud-based and Cross-Enterprise
Biometric Identification". Expert Systems with
Applications.
[13] Amazon Web Services. 2013-03-19.
Retrieved 2013-03-20 and Baburajan, Rajani
(2011-08-24). It.tmcnet.com. Retrieved 2011-12-
02.
[14] https://www.techopedia.com/definition/29367/cl
oud-security-control
[15] Bruneo, Dario; Distefano, Salvatore; Longo,
Francesco; Puliafito, Antonio; Scarpa, Marco
(2013). "Workload-BasedSoftwareRejuvenationin
Cloud Systems". IEEE Transactions on Computers.

Contenu connexe

Tendances

Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud ComputingIRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud ComputingIRJET Journal
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technologyeSAT Publishing House
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Cloud computing it703 unit iii
Cloud computing it703 unit iiiCloud computing it703 unit iii
Cloud computing it703 unit iiiJitendra s Rathore
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
 
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...AIRCC Publishing Corporation
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 

Tendances (17)

Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud ComputingIRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud Computing
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Cloud computing it703 unit iii
Cloud computing it703 unit iiiCloud computing it703 unit iii
Cloud computing it703 unit iii
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 

Similaire à IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications

A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingA Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingIRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET Journal
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.IRJET Journal
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing ReviewIRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 

Similaire à IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications (20)

A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingA Brief Introduction to Cloud Computing
A Brief Introduction to Cloud Computing
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
G017324043
G017324043G017324043
G017324043
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 

Dernier (20)

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 508 A Detailed Study and Analysis of Cloud Computing usage with Real- Time Applications VALARMATHI V1, KOWSALYA N2 1Assistant Professor, Department of Information Technology, Sri Krishna Arts and Science College, Coimbatore, India 2Student, III Bsc (IT) A, Department of Information Technology, Sri Krishna Arts and Science College, Coimbatore, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing has come of its age since Amazon uses its first kind of cloud services in 2006. Cloud computing is an excellent new platformforthedevelopment of conceptual solution. It is helpful in sharing resources to achieve economic of scale. It is typically a combination of hardware and software that works together to deliver many aspects of the end user .In this paper, we explode the characteristics of cloud and the three levels of service models that works effectively on cloud. This paper addresses the main three types of cloud and in which way they work efficiently on real time. And it also deals with the advantages and limitations of cloud computing. This paper discuss about the major useful technology that we deal in our day-to-day life with some examples. However, the security and privacy plays the major role for the users who tries to adapt to the cloud computing. This paper investigates about the various kinds of security control. Key Words: cloud computing, characteristics, architecture, deployment, limitations, security control. 1. INTRODUCTION Cloud Computing depends on sharing of resources to experience coherence and achievement. The unknown cloud users enable organizations to focus on their core businesses instead of expending resources on computer infrastructure and maintenance. Cloud Computing is an excellent platform for the development of conceptual solution. Cloud Computing is helpful on sharing ofresources to achieve economic of scale. Cloud Computing allows the companies to avoid infrastructure costs. It is the usage of hardware and software through a network. The cloud is typically a combination of different types of hardware and software that works collectively to deliver many aspects of the end user. Organization: The remaining paper is organized as follows: In Section 2, we define the characteristicsofa cloudcomputing. In Section 3, we define the architectural component of a cloud computing which includes Infrastructure as a Service (IaaS), Software as a Service (SaaS), Platform as a Service (PaaS). Section 4, explains the deployment model of Cloud Computing. Section 5, explains the limitations and advantages followed by some examples in section 6. We future explain the some security control in section 7, followed by the conclusion in the section 8. 2. CHARACTERISTICS Cloud computing delivers the following key characteristics: Cloud computing increases the user’s flexibility. The Cost reductions can be claimed by cloud providers. The Device and location independence enable users to access systems using a web browser irrespective of their location or what device they use (e.g., PC, mobile phone).The Maintenance of cloud computing applications will be easier. A Multiple tenant enables sharing of resources and costs across a large number of users. It results in:  Centralization of infrastructure with lower costs (example: electricity, etc.)  The peak-load capacity increases (As they need not to be an engineer and buy the largest equipment).  Utilization and efficiency improves the systems. Performance is monitored by IT experts from the amenity supplier. Productivity may be increased when multiple users can work on the same data concurrently, rather than waiting for it to be saved and emailed. Time may be saved. Reliability and scalability may be improved. Security has been improved due to thecentralizationofdata. [2] Fig -1: Cloud Computing characteristics
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 509 3. ARCHITECTURAL COMPONENT The three most commonly used acronyms in the cloud computing are: SaaS, PaaS, IaaS. These are interdependent and it is also called as three tier model. These three model distinguish between the primary cloud computing. In other word SaaS, PaaS, IaaS are the main criteria for cloud computing. The layers of the model are portrayed in a stack. [4] Fig -2: Architecture of an service model 3.1 Infrastructure as a Service Infrastructure as a Service (IaaS) is the lowest level cloud services and it is the most importantone.Iaasdoes not include application or even an operating system, whereas SaaS, PaaS includes application and operating system. Iaas provide a large number of storage for corporate data backups, network bandwidth for a company website server. Sometimes it enables access to high powercomputingwhich has been previously accessed by the supercomputing. The most popular IaaS offerings are: Amazon E2C,IBMsoftlayer, Google’s Compute Engine (GCE). It refers to online services, which is used to network infrastructure like physical computing resources, data partitioning, security, etc.Itoften includes additional resources like virtual machine, server storage. As it is the lowest layer of abstract model, it must be transparent to the consumer. 3.2 Platform as a Service Platform as a Service (PaaS) is the intermediate layer of the conceptual model. It provides the consumer operating system, software development platforms, programming language. This makes it even more simpler to test, develop and integrate. Some integration and data managementprovidersgiveussomespecializedapplications of PaaS which includes iPaaS (Integration Platform as a Service) and dPaaS (Data Platform as a Service).Application designers will have an ability to develop and run their software solutions on a cloud platform without the cost and complexity. Similarly it reduces the buying and managing of the hardware and software layers. PaaS offers some platforms like Microsoft Azure, Oracle Cloud Platform and Google App Engine. 3.3 Software as a Service Software as a Service (SaaS) is the outer most layer of the service model. It represents the set of application that run in a cloud. It is accessible only through the use of browser. It can be accessed from anywhere and on any devices with the internet connection. It does not require the purchase of software licenses, it reduces cost. The Cloud provider has an ability to manage the infrastructure and platforms that run the applications. In the SaaS model, cloud providers connect and operate application software in the cloud and the cloud users approach the software from cloud clients. Cloud computing users do not accomplish the cloud infrastructure and platform wherethesubmissionruns. This eradicates the need to connectandruntheapplicationonthe cloud user's individual computers, which in turn simplifies maintenance and support. Cloud applications diverge from other applications in their scalability and readability. 4. DEPLOYMENT The deployment model has been classified into many different types. They are private cloud, public cloud, hybrid cloud. The private cloud infrastructure has been implemented exclusively for a single organization. The public cloud infrastructure is an open network forthepublic users. The hybrid is a combination of bothpublicandprivate cloud infrastructure. [4] 4.1 Private cloud Private cloud is a cloud infrastructure functioned exclusively for a single organization. It is either managed internally or externally or using a third party host. It is compressed of files and application, storage and services that are implemented and protected only within a particular firewall. The perfect example of private cloud will be a company that has a Microsoft exchange, this why because only an authorized user can only be accessed through VPN connection. In this model, the cloud infrastructure is privately owned and it has been used completely by the respective concern that owns it. It results in highest cost of creating and maintaining the cloud over the use of public cloud. It has been noted that, it has the largest and the most detailed control over cloud.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 510 4.2 Public cloud A cloud is called a "public cloud" when the services are concentrated over a network that is open for public usage. Public cloud amenities might be free. But in case of technical there may be little or no variance between the public and private cloud architecture. However, security attention may be significantly different for services like applications, storage, and other resources. Usually, public cloud service providers like Amazon Web Services (AWS), Oracle, Microsoft and Google own and operate their infrastructure via internet. It also consists of files and application, storage and services available through internet. In this model, the cloud appears a stored resource for the set of organization that has a common interest. The common interest would tend to security policy and flexibility. 4.3 Hybrid cloud Hybrid cloud is a compositionoftwoormoreclouds which includes private, community or public cloud. Itallows the user to extend either the capacity or the capability of a cloud service, by combination, addition or customization with another cloud service. Diverse usage of hybrid cloud composition also exists. It is somewhat difficult to implement as it is the combination oftwoclouds.Itperforms the critical process and the other performs the secondary process. Hybrid cloud acceptance depends on a number of factors such as data security and submission requests, level of control needed over data, and the applications an organization uses. [4] Fig - 3: Deployment model 5. LIMITATIONS AND ADVANTAGES Cloud computing is much cheaper because of its economic scale. In cloud computing, the control of the rear end infrastructure is limited to the cloud merchants only. The Cloud providers frequently decide the management policies. Cloud users were limited to the control and management of their applications, data and services. This includes data caps, which are placed on cloud users by the cloud merchants distributing certain amount of bandwidth for each customer and are often shared among other cloud users. Privacy and confidentiality were big alarms in some activities. The cloud computing has been proved to have some limitations and disadvantages, particularlyforsmaller business operations. Technical outages are unavoidableand arise sometimes when cloud service providers become overwhelmed in the process of serving their clients. This results in temporary business interruption. Meanwhile this technology's systems depend on the internet, an individual cannot be able to access their applications, server or data from the cloud during an outage. [5] 6. EXAMPLES The top most real time application where cloud computing works at its best are: 6.1 Scalable usage: Cloud computing offers a scalable resourcethrough different subscription models, whichinturn meansyouhave to pay only for the computing resources you use. Example: Netflix Because of its streaming services, it faces a large flow in server load at peak time. Since theyhaveuseda cloud computing that allows the company to significantly expand the customer without any investment and maintenance of costly infrastructure. 6.2 Chatbot: It provides the customized solution, messages and products based on the behavior and preferences of users. The extended computing power and capacity of the cloud enables us to store information about the user. Example: Google Assistant, Siri 6.3 Communication: It is the most important and the major requirement of everyone in day to day life. The cloud also allows us to enjoy the network based access to the communication tools like emails and calendar. In fact most of the messaging apps like Skype, WhatsApp are also a cloud based application in which we can share information are also stored on the service provider rather than on the personal devices. It allows us to access our information from anywhere through the internet. Example: WhatsApp, Skype
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 511 6.4 Productivity: This allows us to share our documents through cloud. In this we can work on our document, presentations, spreadsheet from anywhere at any time. We need not to be worried about the data loss, we can retrieve it throughcloud at any time. Example: MS OFFICE 365, Google Docs 6.5 Social networking: Social networks are designed to find people you already know or you would like to know. If we share information on social media, we are not only sharing the photos and videos with our friends and relatives butalsowiththemakersof the platform. So to manage all these things cloud will be very helpful. Example: Facebook, LinkedIn, Twitter 7. SECURITY CONTROL The well-organized cloud security architecture has to identify the issues that will rise with security management. The security management reportstheseissues with security panels. The security panel is used to safeguard any flaws in the system and diminishes the effect of an attack. There are many types of controls behind the cloud security architecture, they are: [14] 7.1 Deterrent control: The deterrent control is proposed to reduce the attacks on a cloud system. It gives a warning sign. The deterrent control typically decreases the threat level by informing the potential attackers that there will beopposing consequences for them if they proceed. 7.2 Preventive control: Preventive control reinforce the system against events, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unapproved users can access cloud systems, and more likely that cloud users are positively acknowledged. 7.3 Detective control: Detective controls are proposed to detect and react aptly to any incidents that occur. In the event of an attack, a detective control has to signal the preventativeorcorrective controls to report an issue. System and network security are typically employed to detect attacks on cloud systems and it supports the communications infrastructure. 7.4 Corrective controls: Corrective controls reduce the costs of an incident that occurs, usually by limiting the damage. These controls will work effectively during the incident or after an incident occurs. We can restore the system backups in the corrective control. Fig - 4: Security control 8. CONCLUSION Cloud computing is recently new technological development that has the potential to havea greatimpact on the world. It has many benefits that it provides to it users and businesses. Users also worry about who can disclose their data and have ownership of their data. Cloud computing is changing its own way in IT departments. Businesses and organization has a wide range ofpathsinthe cloud, which includes infrastructure, platforms and applications that are available from cloud providers as online services. Cloud computing has sets its height in the field of information and communication technology as it brings out an evolution. REFERENCES [1] L. Albertson, "Openstack vs. Ganeti", Linux Fest Northwest 2017 [2] https://en.wikipedia.org/wiki/Cloud_computing [3] The NIST Definition of Cloud Computing. Retrieved November 1, 2015, from National Institute of Standards and Technology website: http://csrc.nist.gov/publications/nistpubs/800- 145/SP800-145.pdf [4] https://www.linkedin.com/pulse/3-service-4- deployment-models-cloud-computing-sankar- somepalle/ [5] https://www.levelcloud.net/why-levelcloud/cloud- education-center/advantages-and-disadvantages- of-cloud-computing/
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 512 [6] http://www.klientsolutech.com/powerful-uses-of- cloud-computing/ [7] Hu, Tung-Hui (2015). A PrehistoryoftheCloud.MIT Press. [8] Mell, P. (2011, September 31). The NIST Definition of Cloud Computing. Retrieved November 1, 2015, from National Institute of Standards and Technology website. [9] Haghighat, M.; Zonouz, S.; Abdel-Mottaleb, M. (2015). "CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification". Expert Systems with Applications. . [10] Winkler, Vic (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics. Elsevier. [11] https://www.maropost.com/blog/5-real-world- examples-of-cloud-computing/ [12] Haghighat, Mohammad (2015). "CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification". Expert Systems with Applications. [13] Amazon Web Services. 2013-03-19. Retrieved 2013-03-20 and Baburajan, Rajani (2011-08-24). It.tmcnet.com. Retrieved 2011-12- 02. [14] https://www.techopedia.com/definition/29367/cl oud-security-control [15] Bruneo, Dario; Distefano, Salvatore; Longo, Francesco; Puliafito, Antonio; Scarpa, Marco (2013). "Workload-BasedSoftwareRejuvenationin Cloud Systems". IEEE Transactions on Computers.