Cloud Deployment Architecture 

Cloud Deployment Architecture 

Source publication
Article
Full-text available
Cloud computing promises to increase the velocity with which application are deployed, increase innovation and lower costs, all while increasing business agility and hence envisioned as the next generation architecture of IT Enterprise. Nature of cloud computing builds an established trend for driving cost out of the delivery of services while incr...

Similar publications

Conference Paper
Full-text available
This paper describes an operational geographically distributed and heterogeneous cloud infrastructure with services and applications deployed in the Guifi community network. The presented cloud is a particular case of a community cloud, developed according to the specific needs and conditions of community networks. We describe the concept of this c...
Article
Full-text available
For enterprise application development, cloud computing is going to new-fangled paradigm that meets the needs of today's enterprises and helps them efficiently executing workflows in business and scientific applications. Workflow applications often require a very intricate runtime environment that is hard to create and maintain. Thus, cloud infrast...
Article
Full-text available
In order to satisfy end-user requirements, many scientific and commercial applications require access to dynamically adjustable infrastructure resources. Cloud computing has the potential to provide these dynamic capabilities. However, utilising these capabilities from application code is not trivial and requires application developers to understan...
Article
Full-text available
Delivering hosted services over the internet is what cloud computing entails. Cloud computing allows users to create and deploy user applications, including storage and databases, without having to worry about the underlying operating system. Furthermore, the Cloud provides vast storage for both data and databases. One of the most important aspects...
Article
Full-text available
Nowadays the cloud computing grows in high rate with the help of recent technological advancement. It provides the on demand and low cost services to the customer. Cloud computing distributes the services to various location based on the demand. The services can cross various layers and location which leads the security problem. The existing securi...

Citations

... Rani and Marimuthu (2012) outlined four major types of cloud computing deployment models as; Private cloud, Public cloud, Hybrid cloud, and Community cloud (see figure 1 below). (Kumar, 2012) ...
... The user has no idea or say on the location of the infrastructure, and any organization can utilise and share the infrastructure. Public cloud is cost effective because management cost are shared and distributed between organizations or businesses and large number of individual users (Kumar, 2012). ...
... Nevertheless, two encryption methods (Identity-based encryption and Homomorphic encryption) were proposed so as to mitigate or even stop the threats. The confidentiality, integrity, and privacy of data would be protected by applying these encryption methods, yet meaningful and reasonable computation can be performed on the data although it is encrypted (Kumar, 2012). ...
... As recently examined, in CC, available infrastructures incorporate an assortment of several computers, VMs, and storage assets to store important information, for example, confidential information and data reports. On this layer, the engineer has better command over the Security because there is no security opening in the virtualization manager [12]. Besides, sharing the physical assets of a host among virtual machines through a hypervisor abstraction layer is enabled by virtualization. ...
Article
Full-text available
Inside the ongoing decade, significant developments in technology have arisen that possibly add more accommodation to everyday life rehearses on an enterprise-level as well as on a singular level also. Cloud Computing technology has seen huge advances in its execution and becomes broadly received by one or the other private or public areas. It was clear as of late that many associations and enterprises are moving their outstanding tasks at hand to the cloud. In any case, Security is a significant worry for the cloud computing administrations, which depends on the Internet association that makes it powerless against numerous kinds of attacks. Despite the fact that that the security estimates executed over cloud computing are building up each spending year, Security still a test. In this paper, we led a review concentrate on cloud computing and tended to various kinds of attacks and potential dangers to this arising technology, just as assurance strategies and existing answers for such attacks.
... accessible to a category of the users who satisfies the policy for authorization. 4) Hybrid cloud: It integrates the features of public, private, community cloud [3,4]. Cloud computing provides the pay-as-per-use service. ...
Article
Full-text available
p>Cloud computing provides many services to access them dynamically over the internet as per the user's demand. The data is growing in tremendous amount and it should be managed correctly where storage service proves efficient. The Data stored online can be hacked by the third party so to secure this data verifying integrity is essential. Because of the human error or natural disaster, the data may get deleted from the cloud servers. Therefore, there is a requirement of improving the existing algorithm to recover data efficiently. Many algorithms are proposed, but they lack in efficiency, computational cost, and reliability. The proposed system in this paper is having the feature of verifying data integrity using Identity Based Remote Data Integrity Checking and recovery using the XOR operation. When the data is unavailable to the user, the proposed system provides flexibility for the user to regain data from the remote server.</p
... Ensure that cloud service provider should guarantee safe operation of the cloud data center to grant a secure physical location for customers' data • Verify that the cloud service provider should store and process data in specific jurisdictions and respect the privacy regulations of those jurisdictions [37][41] [42]. ...
Conference Paper
Full-text available
Cloud Computing is a new technology, widely used in different areas, allowing easy and on-demand access through the internet to a shared set of configurable computing resources. The adoption of this new technology within companies is restricted by security constraints. In this paper, we present the most significant risks that could affect organizations intending to deploy Cloud technology and security measures to be in place to reduce the impact of risks based on a literature review.
... Because of these benefits of cloud computing, it requires an effective and flexible dynamic security scheme to ensure the correctness of users' data in the cloud. Quality of service is an important aspect and hence, extensive cloud data security and performance is required [17]. ...
Article
Full-text available
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation of a particular computer system. In cloud computing, virtual machine migration is a useful tool for migrating operating system instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. Virtual machine (VM) migration is a powerful management technique that gives data center operators the ability to adapt the placement of VMs in order to better satisfy performance objectives, improve resource utilization and communication locality, achieve fault tolerance, reduce energy consumption, and facilitate system maintenance activities. In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels. On the bases of survivability analysis of VMs and Discrete Time Markov Chain (DTMC) analysis, we design an algorithm that generates a secure placement arrangement that the guest VMs can moves before succeeds the attack.
... In any case, no trial investigation included for contrasting the execution of this plan and ordinary marks plans. By considering every one of these elements in different plans, the fuzzy set based security safeguarding access control strategies are proposed to give the answer for gathering the clients and validation based on group signature [16] and further give the answer for backing effective use of storage room and backing for element client expansion [17]. ...
Article
Full-text available
The word “Cloud” refers to network or internet. It is present at.remote location. Cloud computing is a latest mechanism used now-a-days for accessing, manipulating and configuring applications online via internet. It allows users for online data storage, various applications and infrastructure. There are few downsides of cloud computing like in public cloud sharing of data, selected data shared with users of various level without confidentiality and privacy of data. Different methods were used to fix this problem like encryption of attribute; encryption of access control but they have their own problems related to big computation for accquiring access structure, invoking and behavior management. So for removing these weakness, the combination of fuzzy-set theory and RSA algorithm has been introduced. Fuzzy-set is used for clustering the data based on their points. Further for privacy, I have included RSA for encryption and decryption of data which is used to store in cloud database. The analysis of my experiment shows the system is efficient, flexible and provides confidentiality of the data.
... Verification of eligible users' credentials and protecting such credentials are part of main security issues in the cloud (Ahmed and Hossain 2014). Violation in these areas could lead to undetected security breach (Kumar 2012). The proposed Secured Trust model uses third party to authenticate the client. ...
Conference Paper
Full-text available
This is the era of Cloud Computing which shares on-demand computing resources and disposes off efficiently. It has a wide range of benefits for business and consumers. In spite of several benefits, there embeds numerous challenges such as data integrity, authenticity, data security, data locking, access control, data confidentiality, auditability, trust on cloud service provider, well management of service level agreement (SLA). Trust – is a key differentiator in defining the success or failure of many business companies. Service Level Agreement builds trust between cloud providers and cloud consumers. This research proposes a secured trust SLA model that builds trust on cloud service provider and helps in providing data security, confidentiality and integrity for cloud user.
... Interface and infrastructure together forms a cloud environment [1]. The resources are provided by the cloud service provider and user can access them as a service by using the service models (PaaS, IaaS, SaaS). ...
Article
Full-text available
In cloud computing resources are considered as services hence utilization of the resources in an efficient way is done by using task scheduling and load balancing. Quality of service is an important factor to measure the trustiness of the cloud. Using quality of service in task scheduling will address the problems of security in cloud computing. This paper studied quality of service based task scheduling algorithms and the parameters used for scheduling. By comparing the results the efficiency of the algorithm is measured and limitations are given. We can improve the efficiency of the quality of service based task scheduling algorithms by considering these factors arriving time of the task, time taken by the task to execute on the resource and the cost in use for the communication. Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.
... Having lack of security and certainty of in-house applications, Hybrid clouds are still flexible and scalable. For example, the organization can host critical applications with highly sensitive information on private clouds and less security concerned applications with less sensitive data on public clouds [4]. As a result of these advantages, hybrid cloud is becoming popular among modern businesses that have various requirements. ...
Article
This study discusses major security issues and concerns related to cloud computing environment in regard to knowledge management system processes such as knowledge creation, refining, storing, sharing, and utilization. This study uses the exploratory approach to address major security concerns and whether they need consideration for each knowledge management process. The result of this study reveals main cloud computing security concerns such as data security and confidentiality issues, access controls, data loss or leakage prevention, cyber-attacks, availability and reliability issues, and browser security and analyzes these security concerns from knowledge management systems' point of view. Also, solutions and recommendations for security concerns are discussed to provide guidance for the organization initiating cloud-based knowledge management systems.
... So, this paper is focused on the major security issues based on Public cloud Computing. By public cloud we mean a service which is available to the public openly and with proper benefit [3]. When any service is available publically then the security of the service and data both are affected. ...
Article
Cloud Computing is most emerging Technology that is used by Information Technology Industry Now a days. It is easily used by the peoples who are having internet facilities in their Computers. The service availing is either pay or free services. Generally used deployment models of Cloud Computing are Public based, Private based, and Community based and most important is Hybrid based. The major problems of information assurance and system security is arising with public based cloud computing. The major security issues facing while working with public based cloud computing is confidentiality of the data, quality assurance of the availability of data online detection of faults attached with data and online recovery of available data. Thus, it's upon the people how to use cloud computing, when to use cloud computing and various circumstances for using cloud computing. This paper provides an overview of various facilities of Cloud Computing and their major challenges based on public based cloud computing. It also discusses major challenges facing by various cloud providers and their users. The paper enhances some security measures and solutions based on public based cloud computing.