Sie sind auf Seite 1von 5

International Journal of Advanced and Innovative Research (2278-7844) / Volume 6 Issue 12

Survey on Cloud Computing with Cloud Service


Model
#1
R.Suganya, *2V.Vidhya, #3E.Sumathira, *4S.Mabuniza
#1
Assistant Professor, *2 ,#3,*4 UG Scholar
Department of Computer Science and Engineering,
RAAK College of Engineering and Technology,
Puducherry, India.

Abstract— Nowadays as Computing technology plays an essential sellers however sharing of sales generated from customers.
function in internet of offerings. The lengthy-dreamed Cloud computing is predicated on sharing of sources to
imaginative and prescient of “computing as a software” has achieve coherence. By way of this cloud computing is the
sooner or later taken shape within the shape of cloud computing. wider concept of converged infrastructure and shared services.
The primary requirements of cloud are to fulfill the numerous
wishes of company agencies which include scalability,
adaptability, extensibility and manageability. . Computing at
such an incredible scale requires a framework that may help
extraordinarily huge datasets housed on clusters of commodity
hardware.
Its use organizations can save cash on operational charges and
they can attention on their center commercial enterprise instead
of being worried about exceptional IT obstacles. . Computing is
mentioned a maximum latest rising paradigm of computing
utilities. On this paper we provide an creation to cloud
computing, several cloud carrier models and deployment
fashions. It additionally explore about the characteristics,
challenges of cloud computing. Fig.1 CLOUD SERVICE MODEL

Keywords— Cloud Service models, Characteristics, Cloud II. CLOUD SERVICE MODEL
deployment models, Obstacle and Opportunities, security
1.Software as a Service (SAAS): In this model an utility is
hosted as a service to client who accesses it the net. So patron
I. INTRODUCTION remains unfastened from the headache of updation and
As cloud computing is the latest term for the long-dreamed protection of software program. Some of these applications
vision of computing utilities. In recent times Cloud computing encompass: customer dating control (supplied by means of
is swiftly converting the internet service permitting the small Salesforce.com), video conferencing, mail services and
business enterprise to build cell application for users. The information sharing, Google docs, Accounting, internet
journey to the cloud marks a momentous evolution in IT analytics, web content management. Aside from price
industry. It's miles changing the way all of us work and reducing the alternative benefits of SAAS encompass:
control our systems irrespective of enterprise or size. This  Less IT staffs are required
cloud version consists of five important characteristics, three  SAAS applications are easier to customise.
provider models and four deployment models.” So cloud  Advertising may be more green for a software
computing is a way for small employer to compete with an program issuer.
unpleasant lot larger ones, it is a manner to save a number of  Greater dependable on account that if one server fails
money and to make use of power efficiently. The users every other server will take off.
simplest have to fear about their bandwidth connection and  Secure Socket Layer (SSL) lets in purchaser to attain
the rest can be looked after by means of the cloud company their utility securely.
for which they'll pay a nominal amount consistent with their
 Because of boom in bandwidth employer can get
usage. The maximum popular packages are net offerings with
admission to their software with less latencies and
millions of customers. Websites like Google, Yahoo! and
high velocity.
facebook acquire tens of millions of clicks every day. The
operation models of cloud computing grasp unfastened
A number of the restrictions of SAAS are: an corporation
infrastructure services with price every other platform
might not locate very lots computational specific application
services, subscription-primarily based infrastructure offerings
three SAAS. Moreover if a client desires to circulate his
with supplemental software services, and free offerings for

76
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / Volume 6 Issue 12
application to a new dealer then the contemporary issuer
might not permit it or might also price a large sum of money. III. ESSENTIAL CHARACTERISTICS OF CLOUD
This problem is nicely known as lock-in problem. COMPUTING
2. Platform as a Service (PAAS) : It supplies all the assets
required to build packages. There is no want to download or A cloud computing generation is pretty often used in recent
set up software program. It is also known as cloud ware. times as it's far an emerging term of computing utilities. While
Services provided via PAAS are application design, a complete debate of virtualization is substantially outside the
improvement, trying out, deployment and web hosting. scope of this paper, in phrases of cloud computing. The main
Google AppEngine and Microsoft Azure are two examples qualities that cloud computing offers these days are:
on this class. a few blessings of PAAS consist of: the
capability of geographically remoted development teams to i)Broad network access: Cloud capabilities are presented in
paintings together, to merge web offerings from a couple of the network. These properties are also accessible from a wide
resources, to comprehend cost savings from using integrated range of locations that offer online access.eg: mobile phones,
infrastructure services for security, scalability, and failover, as laptop, office computers and PDAs. . It's a debated topic
opposed to having to achieve and check them one after the because it touches at the soul of the difference between private
other, to comprehend cost financial savings from the use of and public cloud computing.
higher-degree programming abstractions. The main reason of
downfall of PAAS is that structures supplied with the aid of ii) Measured service: cloud computing resource utilization
different carriers are typically not well matched. Lack of can be measured, managed, and stated offering transparency.
interoperability and portability among carriers prevent Cloud systems robotically manage and optimize resource use.
customers to transport from one dealer to some other. This implies that much like air time, energy or municipality
water IT offerings are charged in line with utilization metrics
3.Infrastructure as a Services (IaaS):Is the following step –– pay per use.This is vital for billing, get admission to
down from Platform as a Service (PaaS) and steps down from control, resource optimization, capacity planning and different
software as a Services (SaaS) within the Cloud Computing tasks.
Stack. This version is used to get entry to critical IT resources.
Rather than equipped-made applications or services, iii) Resource pooling: It allows a cloud provider to serve its
developement tools, databases, and so on., IaaS provides the consumers through a multi-tenant model. . Physical and
underlying working structures, safety, networking, and servers virtual resources are allocated and reallocated according to
for growing such programs, services, and for deploying consumer demand Those services may be adjusted to suit
improvement tools, databases, and so on. Those vital IT assets every consumer's desires with none modifications being
include offerings that are linked to resources of computing, obvious to the customer or cease person. The patron normally
facts garage and the communications channel. It's miles a has no manipulate or understanding over the precise
delivery version where CSP provide the vital hardware and place of the provided assets however may be capable of
software program upon which a purchaser can build a custom specify location at a higher degree of abstraction (e.g., country,
designed computing environment. This service version, nation, or information center).
manages an packages, information operating gadget,
middleware and runtime. The service issue manages the iv) On demand self -service: It way that a customer can use
virtualization, servers, networking and storage. cloud offerings as wanted with non-human interplay with the
cloud provider. Cloud facility imparting on request self-
services contain Amazon web services (AWS), Microsoft,
Google, IBM and Salesforce.com.

iv) Rapid elasticity: The cloud is versatile and ascendable to


submit desires. The capability and may be shrined terribly
quickly. The self-service and resource pooling create speedy
physical property attainable. The service supplier will
mechanically allot a lot of or less resources from the
accessible pool.

IV. CLOUD COMPUTING DEPLOYMENT MODELS

There are four models of cloud computing depending on


Fig.2 Cloud Model infrastructure ownership. Each model has its personal
blessings and drawbacks. That is where the security issues
begins.

77
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / Volume 6 Issue 12
Public Cloud: The general public cloud deployment version information in a public cloud like salesforce.com but have
represents actual cloud website hosting. The Cloud exclusive information of their personal personal cloud. Hybrid
infrastructure is made to be had to the majority or a massive cloud provide the value and scale advantages of public clouds,
industry institution and is owned by an corporation selling whilst additionally offering the safety and manipulate of
cloud services. . In this model cloud infrastructure is to be had personal clouds.
to the majority and is owned by a third party cloud service Advantages:
provider (CSP). A Public cloud is hosted at the internet and · More scalable in terms that it contains both Private and
designed to be used by any person with a web connection to Public clod.
provider a similar range of skills and services . In this model · Offers both secure resources and scalable Public resources.
offerings are rendered over a system this is open for public · Provides always a highest level of security as it has
use. Here service can be provided by a seller free from rate or designated Private cloud.
on the basis of a pay-per-user. This model is exceptional · Reduce and manage the cost based on the requirement.
applicable for business requirements, make use of interim Disadvantages:
infrastructure for developing and trying out applications. · Infrastructure dependency
Advantages: · Security compliance
Data availability and continuous uptime · Networking
· 24/7 technical expertise
· On demand scalability Community Cloud:
· Easy and inexpensive setup A community cloud falls between public and private clouds
· No wasted resources with admire to the target set of clients. it's miles truly similar
Disadvantages: to a private cloud, however the infrastructure and
· Data security computational resources are exceptional to two or more
· Privacy agencies that have common privacy, security, and regulatory
· Reliability issues, in place of a single organisation . the network cloud
aspires to mix distributed useful resource provision from grid
Private Cloud: A Private cloud is also known as as an computing, dispensed manipulate from
“internal cloud” or “company cloud”, is living in the virtual ecosystems and sustainability from inexperienced
organization environment. A personal cloud deployment computing, with the use cases of cloud computing, even as
version is owned through a organization. In this model cloud making extra use of self-management advances from
infrastructure operated entirely for a only business enterprise, autonomic computing. changing supplier clouds by means of
controlled internally or via a third party, and is hosted either shaping the under applied resources of user machines to form
internally or externally. . The cloud infrastructure is accessed a community cloud, with nodes probably pleasurable all roles,
handiest with the aid of the individuals of the organization patron, manufacturer, and most significantly coordinator.
and/or by way of granted Third parties. Private cloud uses Advantages:
virtualization answers and focus on consolidating distributed · Value of setting up a communal cloud as opposed to
IT services regularly inside statistics centers belonging to the character private cloud can be inexpensive because of the
agency. But, below the private cloud version, the cloud (the division of costs among all members.
pool of resources) is simplest available via a single employer · Control of the network cloud can be outsourced to a cloud
offering that company with greater manipulate and privateness. issuer.
Advantages: Disadvantages:
· Improved security and privacy · Costs higher than public cloud.
· Greater control over the server · Fixed amount of bandwidth and data storage is shared
· Flexibility in the form of Cloud Bursting among all community members.
· Cost and energy efficiency
· Improved reliability V.OBSTACLES AND OPPORTUNITIES
Disadvantages:
· Higher cost As we've already referred to the blessings related to cloud
When comparisons are made with Public cloud; the cost of computing now we are going to talk about obstacles in its
buying system, software program and staffing often boom. Each impediment is paired with an possibility –our
consequences in higher costs to an company having their very notion on how to triumph over the obstacle.
own personal cloud.
Hybrid Cloud: Hybrid clouds are more complex than the Availability of Service: Most of the organizations worry
opposite deployment fashions, considering that it is a about whether cloud computing offerings will have adequate
aggregate of or greater clouds (private, community or public). availability or no longer. To gain this there need to be no
Every member incorporates a completely unique entity, and single point of failure. Although the carrier company has more
on the same time they're sure together by means of than one data facilities unfold everywhere in the world, it
standardized era that permits utility and statistics portability could have commonplace software program infrastructure and
amongst them as an example, groups that have their human accounting systems or the company might also even exit of
resources (HM) and customer relationship management (CRM) business. So big organizations are reluctant emigrate to cloud

78
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / Volume 6 Issue 12
computing. Any other availability obstacle is shipped Denial integrity and availability let us have the few instance of ways
of service (DOS) assaults which prevent the clients from they can be supposected by using both technical and non-
getting the specified carrier in time. technical mechanism.
1.Confidentiality: Refers to preserving records private,
Data Lock-in : Cloud computing does not allow portability of confidentiality its supported by way of technical tools
software from one cloud provider to any other or it is able to including encryption and get entry to manipulate, as well as
be very luxurious to find the money for purchaser lock-in may legal protection.
be very attractive to cloud companies but users are liable to 2.Intergrity: Is a degree self-belief within the cloud is what is
fee increment and reliability trouble. Despite the fact that the meant to be there and is covered in opposition to accidental or
provider goes out of enterprise then the customer can also loss intential alteration with out authorization integrity supported
all or some of its critical information. So the standardization by as well audited code, nicely designed disbursed scheme,
of cloud computing is important so as to make different cloud and sturdy get right of entry to manage mechanism.
structures interoperable and cast off the concern of clients 3.Availability: Manner being table to use the machine as
associated with records lock-in. Cloud Computing anticipated availability is supported through potential
Interoperability discussion board (CCIF) changed into constructing and true architecture as well as properly
fashioned to outline an corporation that might permit described constructs and phrases of settlement.
interoperable company-elegance cloud computing platforms 4.Accountability: Maps in the gadget to accountable events
via utility integration and stakeholder cooperation. accountability is supported by way of robust identification,
authentication these logs.
Security: That is one of the main difficulty because of which 5.Accurance : Refers to need for the machine to behave as
customers are still reluctant to deploy their enterprise within expected guarantee is supported by a relied on computing
the cloud regardless of its blessings. considering that clients' architecture within the commercial enterprise case to technical
records is stored out of doors their premises and they are info to legal agreement.
ignorant of its place, so they are not able to guard it from
unauthorized get right of entry to. It's miles the duty of the VII. CONCLUSIONS
cloud provider to make certain information safety and Cloud computing is a brand new paradigm of computing
integrity. It involves using sturdy encryption strategies for utilities that promises to offer extra flexibility, less fee, and
statistics security and pleasant-grained authorization to control greater performance in IT services to quit users. Further,
get entry to facts. specialists involved with cloud computing need to make sure
that cloud computing does no longer turns into a carrier in
Load Balancing: The cloud computing platform needs to which only a few customers can use it. It conjointly self-
dynamically stability the weight a number of the servers so as addressed challenges and problems with cloud
to avoid hotspot and enhance aid utility. Consequently, how to computing intimately. In spite of the many limitations and
dynamically and correctly manipulate sources and to meet the therefore the want for higher methodologies processes, cloud
wishes of subscribers is a task for the researchers . computing into a massively enticing paradigm, particularly for
Virtualization time presents an effective method to control the giant enterprises. Cloud Computing initiatives may have an
dynamic sources on cloud computing platform. All of the effect on the enterprises at intervals two to a
requests are regular by the virtual machines and are mapped to few years because it has the potential
the appropriate physical servers through the cloudlet scheduler. to considerably amendment IT.
For correct load balancing and resource utilization VMs need
to be migrated from one bodily server to some other. So
which VM to move, where to transport and whilst to move are
all important studies issues. REFERENCES
[1] Bhushan Lal Sahu Rajesh Tiwari, “ A Comprehensive Study on Cloud
Scalable Storage: As mentioned earlier the most attractive Computing”, International Journal of Advanced Research in Computer
property of cloud are brief time period utilization, no in Science and Software Engineering, Volume 2, Issue 9, September 2012 ISSN:
advance fee and infinite storage and processing potential on- 2277 128X.
[2] Zhifeng Xiao and Yang Xiao, “Security and Privacy in Cloud Computing”,
demand. The possibility for researchers is to create a storage IEEE communications surveys & tutorials, vol. 15, no. 2, second quarter 2013.
system that would not most effective meet those wishes but [3] Vijay Varadharajan, and Udaya Tupakula, “Security as a Service Model
also combine them with the cloud blessings of scaling for Cloud Environment”, IEEE transactions on network and service
arbitrarily up and down as in keeping with call for. management, vol. 11, no. 1, march 2014.
[4] Mladen A. Vouk, “Cloud Computing Issues, Research and
Implementations”, Journal of Computing and Information Technology - CIT
VI.SECURITY IN CLOUD COMPUTING 16, 2008, 4, 235–246.
[5] Rafael Moreno-Vozmediano, Rubén S. Montero, and Ignacio M. Llorente,
If we define to enable cloud driven boom and innovation via “Key Challenges in Cloud Computing” Enabling the Future Internet of
Services. IEEE, Volume: 17 , Issue: 4
security, we must have a clear framing on what is meant by [6] Irena Bojanova, Jia Zhang and Jeffrey Voas, “Cloud Computing”.
safety. [7] SATW, “White Paper Cloud Computing”.
Protection has been hard to define inside to preferred the [8] Harjit Singh, “Current Trends in Cloud Computing A Survey of Cloud
canonical dreams of statics security are confidentially Computing Systems”, International Journal of Electronics and Computer
Science Engineering, ISSN- 2277-1956.

79
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / Volume 6 Issue 12
[9] Maneesha Sharma, Himani Bansal and Amit Kumar Sharma, “Cloud
Computing: Different Approach & Security Challenge”, International Journal
of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2,
Issue-1, March 2012.
[10] Gerard Conway and Edward Curry, “Managing Cloud Computing: A
Life Cycle Approach”.

80
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com/

Das könnte Ihnen auch gefallen