International Journal of
Advances in Scientific Research and Engineering (ijasre)
DOI: http://dx.doi.org/10.7324/IJASRE.2018.32567
E-ISSN : 2454-8006
Volume 4, Issue 1
January-2018
Survey of Cloud Computing and its Application
G Likitha Reddy1 and B. S. S. Murali Krishna2
Department of Computer Science and Engineering
1
Assistant professor, ST.Martins Engineering College
Dhulapally, Secunderabad 500014 Telangana
2
Assistant professor MLR Institute of Technology
Dundigal, Hyderabad 500043
India.
ABSTRACT
Cloud Computing is a data innovation (IT) paradigm that empowers omnipresent access to shared pools of
configurable framework assets and more elevated amount benefits that can be quickly provisioned with insignificant
administration exertion, frequently finished the web. In spite of the fact that, distributed computing is encouraging the
Information Technology industry, the innovative work in this field is yet to be agreeable. This paper is a propelled
study concentrating on distributed computing idea and most exceptional research issues. This paper gives a superior
comprehension of the distributed computing and recognizes vital research issues in this expanding territory of
software engineering.
Keywords: Cloud Computing, Security Issue Virtualization, Data Center, Server Consolidation, Cloud Security.
1. INTRODUCTION
Distributed computing depends remote administrations with a client's information which is made of programming and calculation
.Due to unrivaled advance of web in most recent couple of decades, figuring assets is presently more inescapably accessible.
What's more, it gave another pathway to a registering idea called Cloud Computing. Distributed computing condition requires the
conventional specialist organizations to have two distinctive ways. These are framework and specialist co-ops. Foundation
suppliers oversee cloud stages and rent assets as per use [1]. Specialist co-ops lease assets from framework suppliers to serve the
end clients. Distributed computing has pulled in the goliath organizations like Google, Microsoft, and Amazon and considered as
an awesome impact in the present Information Technology industry. Business people are drawn towards distributed computing
idea as a result of the accompanying resources.
High Speed
Pay per utilize
On – Demand self administration
Location free
Device free
Broad Network Access
Security
Rapid Elasticity
www.ijasre.net
Page 23
G Likitha Reddy et al., Survey of Cloud Computing and its Application
Less Capital
Despite the fact that distributed computing has an entrance of giving modest bunch of chances to the present IT industry, still it
ought to precisely address various difficulties [2]. Here we centered our point of giving a superior comprehension on field of
distributed computing in our paper, by displaying a review of distributed computing and cutting edge look into challenges.
2.
CLOUD COMPUTING OVERVIEW
2.1 Cloud Computing
Distributed computing portrays another supplement utilization and conveyance display for IT administrations in light
of web, and it normally includes the arrangement of progressively versatile and regularly virtualized assets as an administration
over the internet [3]. It is an application that can be gotten to from anyplace on the world as long as you have a PC with an
internet. We can get to this cloud facilitated application with no extra equipment or software; - Gmail, Yahoo, Hotmail.
2.2. Cloud Computing Applications
Distributed computing, at its easiest, is a gathering of figuring programming and administrations accessible from a
decentralized system of servers. The expression "cloud" has for quite some time been utilized as a representation for the Internet,
and there are numerous well known administrations and Web locales which you may as of now be getting a charge out of, without
staying alert that they are cloud-based. Long range informal communication destinations [4], Web-based email customers like
Yahoo! furthermore, Gmail, Wikipedia and YouTube, and even distributed systems like Skype or Bit Torrent are for the most part
applications that keep running in the cloud. At the end of the day, there is nobody brought together area or association that
controls them, and nothing is required to use them other than a web program and an Internet association. Endeavor distributed
computing is distributed computing for the business world. Rather than buying and introducing the physical framework important
to run programming programs, a business rather devours assets on a product as-a-benefit premise [5].
Running individual applications, for example, Microsoft, SAP, or Oracle will require equipment and a broad framework to
help it: office space, control, systems, servers, stockpiling, cooling, and data transmission, also the specialists expected to
introduce and run them. Distributed computing offers a streamlined, disentangled answer for this intricacy and the capital use it
requires. A basic case of distributed computing is Yahoo email, Gmail, or Hotmail and so on. You needn't bother with
programming or a server to utilize them. Each of the a buyer would require is only a web association and you can begin sending
messages. The server and email administration programming is all on the cloud (web) and is completely overseen by the cloud
specialist organization [6] Yeah, Google and so forth. The buyer gets the chance to utilize the product alone and appreciate the
advantages. The relationship is, 'Whether you require drain, would you purchase a dairy animal?' All the clients or buyers require
is to get the advantages of utilizing the product or equipment of the PC like sending messages and so forth. Just to get this benefit
(drain) for what reason should a customer purchase a (cow) programming/equipment?
3.
CLOUD COMPUTING SECURITY ARCHITECTURE
Cloud application developers have been successfully developing applications for Iaas (Amazon, Rackspace)
and PaaS (Azure, Google App Engine) platforms. These platforms provide basic security features including supporting for
authentication, Firewall policy management, logging, basic user and profile management but security concerns continue to be the
number one barrier for enterprise cloud adoption [7]. Cloud security responsibilities in a public cloud are shared between the
cloud customer and the cloud service provider whereas in a private cloud, the customer is managing all aspects of the cloud
platform .Cloud service providers are responsible for securing the shared infrastructure including routers, switches, load balancers,
firewalls, storage networks, management consoles [8].
Journal Impact Factor: 3.598
Page 24
International Journal of Advances in Scientific Research and Engineering (ijasre), Vol 4 (1), January-2018
Figure 3.1. Architecture of Cloud Computing
4.
SECURITY ISSUES IN CLOUD COMPUTING
Cloud computing consists of applications, platforms and infrastructure segments. The
computing environment are given below.
Access to Servers & Applications
Network Security
Data Security
Data Privacy
Data Integrity
Data Location
Data Availability
Data Segregation
Security Compliance and policy
Management of patch
5.
various security concerns in a cloud
RESEARCH CHALLENGES IN CLOUD COMPUTING
Distributed computing research tends to the difficulties of meeting the necessities of cutting edge private, open and cross breed
distributed computing designs, additionally the difficulties of enabling applications and advancement stages to exploit the
advantages of distributed computing [9]. The distributed computing research is still at a growing stage. While new difficulties
continue rising up out of industry applications still many existing issues have not yet been completely illustrated. A portion of the
testing research issues in distributed computing are given underneath.
www.ijasre.net
o
Service Level Agreements (SLA's)
o
Cloud Data Management and Security
o
Data Encryption
o
Migration of virtual Machines
o
Interoperability
o
Access Controls
o
Energy Management
o
Multitendancy
o
Server Consolidation
Page 25
G Likitha Reddy et al., Survey of Cloud Computing and its Application
o
Reliability and Availability of Service
o
Common Cloud Standards
o
Platform Management
6. CONCLUSION
Sharing of the assets is one of the greatest security stresses with the distributed computing model. The advance of distributed
computing is radically modifying its skyline and transforms the figuring utility into genuine. In any case, it gives much utilization,
yet many difficulties here, including programmed asset situating, vitality administration, data security are just pulled in the
examination group. Investigation of many issues yet to be finished. Some momentous commitment and get huge advancement the
business are there in light of enough open doors in this space.
We trust that our paper will give a superior comprehension of the distributed computing and distinctive issues in look into, in this
manner reinforcing further research in this field.
REFERENCES
1. A.M.S.Zunaitha Sulthana*, L.Clara Mary*, A.Sangeetha “Swot Analysis of Mobile Cloud Computing”, Department of
computer Science, MIET Institution, Trichy
2. Cloud Confusion Amongst IT Professionals. Version One (June 6,2011).
3. R. Ruhina, “Identity – Based Secure and Flexible Data Sharing in Cloud Based Smart Grid” International Journal of Advanced
Research in Computer Science and Software Engineering Department of Computer Science and Engineering, JNTUA College of
Engineering, Anantapuramu, Andhra Pradesh, India
4. Mr. Jiten Prithiani and Mrs. Dhanamma Jagli, “DATA SECURITY IN THE CLOUD” V.E.S. Institute of Technology, Mumbai,
India,Mrs. Dhanamma Jagli, Department of MCA, V.E.S.Institute of Technology ,Mumbai, India
5. De g, M., Petkovi , M., Nali , M., a d Baro i, I.,” A ho e health are syste
halle ges”, IEEE I ter atio al Co fere e o Cloud Co puti g CLOUD , pp:
6. Doukas, C., a d Maglogia
i the loud – addressing security and privacy
9-556, 2011.
is, I.,” Ma agi g Weara le Se sor Data through Cloud Co puti g”, Third IEEE I ter atio al
Conference on Cloud Computing Technology and Science (CloudCom), pp: 440-445, 2011
7. Dean J, Ghemawat S(2004) Map Reduce :simplified data Processing on large clusters. In: Proceedings of OSDI
8. Ibnualim, I., and Supangkat, S, H.,”Design of Health Social Media to Improve the Quality of Patient’s Recovery”, International
conference on Cloud Computing and Social Networking (ICCCSN), pp: 1-4, 2012.
9. R. Gellman, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing,” The World Privacy Forum,
2009. http://www.worldprivacyforum.org/pdf/WPF_Clou Privacy_Report.pdf.
Journal Impact Factor: 3.598
Page 26