Figure 2 - uploaded by Nisha T N
Content may be subject to copyright.
Cloud Deployment Models

Cloud Deployment Models

Source publication
Article
Full-text available
Cloud computing is a budding web-based technology that tends to prevail in our environment, especially in the areas of computing and information technology that require large-scale network computing. Cloud computing is a shared set of services gaining popularity due to its profitability, availability, and high production. Just on the security groun...

Contexts in source publication

Context 1
... Hybrid Model: A combination of private and public Cloud on the same network is called a hybrid cloud, which can be done if the private Cloud needs various essential public cloud services, such as the private Cloud, which can store data in the private Cloud and we can access it in the public Cloud. Figure 2 depicts the Cloud Deployment Models. ...
Context 2
... Hybrid Model: A combination of private and public Cloud on the same network is called a hybrid cloud, which can be done if the private Cloud needs various essential public cloud services, such as the private Cloud, which can store data in the private Cloud and we can access it in the public Cloud. Figure 2 depicts the Cloud Deployment Models. ...

Similar publications

Chapter
Full-text available
Cloud-network integration business data flow security is mainly reflected in the business deployment stage and online service stage. First, this paper analyzes the trend of the digital platform technology of the cloud-network integration business system, puts forward an intelligent data flow security strategy model of cloud-network integration, inc...

Citations

Conference Paper
Cloud Computing is booming technology in the IT sector. It provides virtual resources, dynamic scalability, software processing, and data storing facilities. Ever since cloud computing came into existence its demand has been increasing day by day. Nowadays, as confidentiality and security of the data is the biggest concern; the rising demand of the cloud platforms has made its providers re-think about the security facilities they are providing to their consumers to assure the data security on their platform. This paper gives a glimpse of the security issues being faced while using the cloud computing platforms and the degree of damage that could be done to the customer’s data if not chosen carefully. The article discusses the important services provided by cloud platforms and various ways to avoid or tackle security concerns.