- Open Access
- Total Downloads : 0
- Authors : Karishma Vernekar, Divya Bandekar, Mamata Naik, Nagaveni V, Mrs. Deeksha M
- Paper ID : IJERTCONV6IS15110
- Volume & Issue : ICRTT – 2018 (Volume 06 – Issue 15)
- Published (First Online): 05-01-2019
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Review of Cloud Computing and its Application
Review of Cloud Computing and its Application
Karishma Vernekar, Divya Bandekar, Mamata Naik, Nagaveni V, Mrs. Deeksha M
Alvas Institute of Engineering and Technology, Shobhavana Campus, Mijar, Moodbidri
Abstract Cloud computing is one of the cutting-edge technologies used by most of the people. Cloud users are requested to submit the personal private information to the Cloud by the Internet. Cloud computing trend is increasing rapidly so to make cloud computing more popular the very first step for the organization is to identify exact area where the cloud related threats lie.When user do this, they hope that cloud service provider (CSPs), will provide the privacy for the data. Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. The development of the cloud service model provide business supporting technology in a more efficient way than ever before the shift from server to service based technology brought a drastic change in computing technology.Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility. This paper presents an overview and study of cloud computing, also illustrates the various application of cloud computing.
Keywords Cloud Service Provider, Internet, Cloud Computing, Information Technology.
-
INTRODUCTION
With the improvement of Cloud processing and Popularization of the portable Internet, Cloud administrations are ending up vital for people groups life. Individuals are pretty much asked for to submit or post some individual private data to the Cloud by the Internet. Cloud computing have characteristics such as: 1) Device and location independent: this enable user to access system using a web browser regardless of their location or what they use (e.g., PC mobile phone).and access via the internet, users can connect to it from anywhere. 2) Maintenance: on each users computer no need to install cloud computing application. These are access from different places. 3) Multitenancy: resources are share across large number of users. Towards the cloud computing, a typical service architecture such infrastructures as a services, platform as a services, software as a services, and others are applied for interconnections [1]. It is known that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand .Cloud computing is used in various aspects such as medical, transport, mobile etc. Details about this will be explained in the future chapters.
-
CLOUD COMPUTING TECHNOLOGY AS APPLICATION FRAMEWORK
Cloud computing technology architecture of the power system transient simulation is discussed below. According to service levels and a good user experience of cloud computing applications, it makes the following architecture level design [2].
-
Users layers
User layer is a user connection window between the cloud stage and genuine user, including two parts of the user cooperation and user correspondence. The user collaboration incorporates a thin customer, the remote terminals, cell phone/ iPad, Web perusing gadgets and others. The user correspondence contains remote web, GPRS, Ethernet, fiber optical system and so on.
-
Infrastructure Layer
Infrastructure layer is the IaaS, including three parts of the physical layer, information layer and infrastructure layer. The physical layer binds together administration of the physical gadgets in the cloud condition, utilizing virtualization innovation to standardize administrations, circle clusters, conventional PC machine, and utilizing virtual arrange innovation to oversee switches, switches, concentrators and others. The information layer understands the capacity of capacity, handling and examination of the information, utilizing Hadoop's GHFS to capacity for the organized and non-brought together organized information, preparing the enormous information through Map Reduce, and utilizing the propelled motor innovation to finish the investigation of the information. The infrastructure layer accomplishes stable task of IaaS, including load adjusting and asset planning administration, of which the heap adjusting accomplish registering assets to plan powerfully, and asset booking administration controls the inner assets and outer request reaction.
-
Platform Layer
The platform layer is the PaaS, which gives not just all the usefulness of the framework layer, yet in addition some recently included capacity, for example, the SDK advancement condition, the cross platform improvement condition and the altering instrument sharing. The SDK improvement condition is good with an assortment of programming dialect condition, for example, C, C +, Java,
PHP, Python et cetera. The cross-platform improvement condition is perfect with Windows, Linux, Mac and other working frameworks.
-
Application Layer
Application layer is the SaaS, including two parts of an outside interface layer and the business layer. The outer interface layer is primarily used to tackle the institutionalization of outside information, including outside information section, information arrange acknowledgment, organize standardization, topological examination, information approval and confirmation, and so forth. The business layer primarily works for the power framework.
-
Cloud Security
Cloud security is pertinent to all levels of the foundation, relating to an assortment of security methods, which incorporates rights client security, arrange correspondences security, hardware and programming firewalls, information encryption/unscrambling, various leveled booking specialist hub encryption, end to end encryption, application security, and so on.
-
-
CLOUD COMPUTING AS A CLIENT SERVER MODEL Cloud computing as client server demonstrate alludes to the
parts and subcomponents required for distributed computing. These segments regularly comprise of a front end stage (fat customer, thin customer, cell phone), back end stages (servers, stockpiling), a cloud based conveyance, and a system (Internet, Intranet, Inter-cloud). Joined, these segments make up distributed computing engineering. Distributed computing structures comprise of front-end stages called customers or cloud customers. These customers are servers, fat (or thick) customers, thin customers, zero customers, tablets and cell phones. These customer stages associate with the cloud information stockpiling by means of an application (middleware), through a web browser. The zero or ultra-thin customer introduces the system to assemble required design records that at that point reveal to it where its OS doubles are put away [7]. The whole zero customer gadget runs by means of the system. This makes a solitary purpose of disappointment, in that, if the system goes down, the gadget is rendered user less, or through a virtual. With the advancement of Cloud registering and Popularization of the portable Internet, Cloud administrations are winding up vital for people groups life. Individuals are pretty much asked for to submit or post some individual private data to the Cloud by the Internet session.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a hared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of three service models [8].
-
Software as a Service (SaaS).
Software-as-a-Service is a product dissemination conspire which offers ideal to get to the product and its capacities remotely as an online administration. SaaS grants associations to get into business usefulness a minimal effort regularly not as much as paying for authorized applications in perspective of the way that SaaS charges are based on a month to month expense. As so the product is facilitated remotely clients don't require to pay for extra equipment. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. SaaS eliminates the all possibilities for organizations to handle the installation, set -up, daily preservation and maintenance [3].
-
Platform as a Service (PaaS).
The capability provided to the users to deploy onto the cloud infrastructure. With the PaaS model, we get a core hosting operating system and optional building block services that allow us to run our own applications or third-party applications. We need not be concerned about lower level elements of Infrastructure, Network Topology, Security and Load Balancers — all this is done by the Cloud Service Provider [4]. The Provider gives us a completely useful OS with significant stage programming. Microsoft Windows Azure as PaaS can be utilized as an improvement, benefit facilitating and benefit administration condition. SQL Azure can give information administrations, including a social database, detailing and information synchronization. The two Windows Azure and SQL Azure are the key segments of the Azure Cloud Platform. With this stage, we can centre around sending our custom applications and can without much of a stretch arrange our applications to scale up or down as requests change.
-
Infrastructure as a Service (IaaS).
The cloud infrastructure such as hardware, servers, routers, storage, and other networking modules all are granted by the IaaS supplier. The end user takes on these offered services based on their requirements and pay for what they have used [5]. To convey our applications to the Cloud, we need to introduce OS pictures and related application programming on the cloud framework. In this model, it's our obligation to fix/refresh/keep up the OS and any application programming you introduce. The Cloud supplier will ordinarily charge you on processing power by the hour and the measure of assets distributed and devoured (according to its administration level understanding (SLA).
-
-
CLOUD APPLICATION
-
Cloud Computing in e-healthcare
From the user point of view, the internal resources and application processes are transparent, and the users mainly concern the standardized healthcare records and the familiar
health information technology capabilities [6]. An e-Healthcare cloud incorporates the fundamental innovation, the operational procedure, and the new advertisement utility worldview. As the world is progressively moving far from improvement driven view to one that is centered on applications, data, and individuals in this manner more towards to the new worldview of distributed computing.
-
Cloud Computing in Intelligent Transportation
With the continuous development of electronic information technology and growing in the traffic engineering field, Cloud computing technology is widely used in intelligent transportation system has become the inevitable trend [10]. The premise of the city's activity data benefit framework development has been at first shaped, however by and large looked with the combination and utilizing of movement data to serve the activity administration and individuals issues. Step by step instructions to manage the colossal measures of movement information, traffic examination, activity mining and utilizing, will be the key issue without bounds activity data administration, and distributed computing innovation, with its mechanized IT asset booking and the upsides of the fast organization and superb expansibility, will turn into a vital specialized intends to take care of this issue[9].
-
Applications of Mobile Cloud Computing
Mobile cloud computing (MCC) is a new technology having lot of applications in monitoring of vehicles, mobile learning, biometry, digital forensic analysis etc. With the help of mobile cloud computing, data processing and storage are performed outside the mobile device and it performed inside the cloud [11]. Versatile distributed computing win a few negative marks, for example, restricted speed, low transfer speed, portable wellbeing observing, constrained capacity limit of customary portable learning, and portable gaming.
a.
-
-
CONCLUSION
At present, cloud computing is still in the application exploration period, which means that related technologies and tools are still constantly improving. Although cloud computing
can be seen as a new phenomenon which is set to revolutionize the way we use the internet, there is much to be careful about. There are many new technologies evolving at a faster rate, each with technological advancements and with the potential of making human lives easier. But, one must be very careful to understand the security risks and challenges posed in utilizing these technologies has many advantages.
REFERENCES
[1] Mrs Mahakalkar and Mrs. Sahare, " Implementation of Re-encryption Based Security Mechanism to Authenticate Shared Access in Cloud Computing" in proceedings of International Conference on Trends in Electronics and Informatics ICEI 2017. [2] Ge Leijiao, Wang Shouxiang, Ge Xianjun "Framework Design of Cloud Computing Technology Application in Power System Transient Simulation" [3] E. Clemons, and Y. Chen, Making the decision to contract for cloud services: Managing the risk of an extreme form of it outsourcing, Proceedings of 44th Hawaii International Conference on System Sciences, Hawaii, 2011, pp. 1-10. [4] T. Velte, A. Velte, and R. Elsenpeter, Cloud computing: A practical approach, International Journal of Scientific and Engineering Research, vol. 3, no. 8, 2010, pp. 1-6. [5] S. Bhardwaj, L. Jain, and S. Jain, Cloud computing: A study of infrastructure as a service (IaaS), International Journal of Engineering and Information Technology, vol. 2, no. 1, 2010, pp. 60-63. [6] Dr. W. Liu, Dr. E.K. Park " e-Healthcare Cloud Computing Application Solutions "International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium 2013 [7] Cloud Security Alliance, Top Threats to Cloud Computing v1.0,March 2010
[8] Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification. Expert Systems with Applications, 42(21), 79057916. [9] M. K. Srinavasin, K. Sarukesi, P. Rodrigues, M. S. Manoj, P. Revathy, "State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment" in Proceedings of the International Conference on Advances in Computing, Communications and Informatics, 2010. [10] Ling Pang, Song Ji, Tong Sun, "The application research of cloud computing in the intelligent transportation" Fifth International Conference on Communication Systems and Network Technologies 2015 [11] Mr. C.Arun , Dr. K.Prabu ,"Applications of Mobile Cloud Computing", International Conference on Intelligent Computing and Control Systems ICICCS 217