Cloud Computing Research| OMICS International | Journal Of Information Technology And Software Engineering

Our Group organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.


Cloud computing is a new business computing paradigm that is based on the concepts of virtualization, multi-tenancy, and shared infrastructure. It is an effort to nudge the business computing model towards a “Pay-as-you-go” approach from the traditional “Own-and-Use” model. The Holy Grail is to eventually establish all types of computing as the fifth utility. A cloud system can be deployed in multiple ways depending on the business needs of an enterprise, either as a public, private or a hybrid implementation. Recently, other derivative deployment models like Community clouds and private rental clouds where an enterprise can rent a modular data center can also be seen. Cloud services can be consumed in three ways viz. Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) with decreasing service abstraction levels respectively. The benefits of clouds are realized through resource sharing. The basic idea is to share large pools of resources like compute cycles or virtual CPUs (VCPUs), storage, software services etc. This very idea of resource sharing gives rise to significant security concerns for a user, especially with respect to his/her data and/or applications which are hosted in the cloud provider’s data centers. This security and privacy issue becomes grave in case of the IaaS deployment model which allows a user to set up their virtual infrastructure in clouds. IaaS has the lowest abstraction level and allows a user to create their virtual infrastructure by choosing the desirable configuration in terms of OS, storage space, number of VCPU’s, RAM size etc. A cloud provider is only responsible up to the hypervisor level, for security and maintenance of the infrastructure. (Establishing Trust in Public Clouds, Jogesh K Muppala)
  • Share this page
  • Facebook
  • Twitter
  • LinkedIn
  • Google+
  • Pinterest
  • Blogger

Last date updated on March, 2021