Open Access
Subscription Access
Experimental Cloud Computing as the 5th Utility:Its Vision and Importance
With the meaningful improvements in Information Technology, it is envisioned that computing facilities will be considered as a 5th utility of the life after the four main utilities i.e. Water, gas, electricity and telephony. This computing utility, will contribute the fundamental stages of computing jobs that is necessary to fulfill all the demands of the public. Various computing prototypes have been introduced and cloud plays an important role.With the passage of time there is an elevation in the computer science field from the half century ago, experts have predicted that one day cloud computing will be used as one of the utility which will be very beneficial for all. With the growing hands in the field of virtualization, it is trusted that this approach has modified the whole IT industry. The cloud computing used as a utility is very important as other four utilities are because cloud provides computing services up to the high end services like virtual space, virtual servers, etc., which are highly essential for satisfying the needs of the user without physically purchasing all the infrastructure. To present this scenario, various computing prototypes have been proposed. After many of the milestones achieved in this field, we are now at a stage where we have almost complete computer ERA, which did not exist in reality, but is accomplishing its task and it is known to us as “Cloud computing”. The author’s aim for purposing this paper is to get the finer understanding about the cloud’s overview and about its advantages and issues.
Keywords
Cloud Computing, Issues of Cloud, The Advantages of Cloud, Security Issues.
User
Font Size
Information
- Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I., 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), pp.599-616.
- Zhang, S., Chen, X., Zhang, S. and Huo, X., 2010, October. The comparison between cloud computing and grid computing. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (Vol. 11, pp. V11-72). IEEE.
- Ashwini, T. and SG, M.A., Fog Computing to protect real and sensitivity information in Cloud.
- Jain, A. and Kumar, R., 2014. A Taxonomy of Cloud Computing. International Journal of Scientific and Research Publications, 4(7), pp.1-5.
- Mishra, M., Arora, I., Singh, P. and Prabhakar, S., AN ASSESSMENT OF CLOUD COMPUTING: EVOLUTION.
- Buyya, R., Broberg, J. and Goscinski, A.M. eds., 2010. Cloud computing: Principles and paradigms (Vol. 87). John Wiley & Sons.
- Sareen, P., 2013. Cloud computing: types, architecture, applications, concerns, virtualization and role of it governance in cloud. International Journal of Advanced Research in Computer Science and Software Engineering, 3(3).
- Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L. and Leaf, D., 2011. NIST cloud computing reference architecture. NIST special publication, 500(2011), p.292.
- Apostu, A., Puican, F., Ularu, G., Suciu, G. and Todoran, G., 2013. Study on advantages and disadvantages of Cloud Computing–the advantages of Telemetry Applications in the Cloud. Recent Advances in Applied Computer Science and Digital Services. New York: Wseas, 200, pp.118-123.
- Khiyaita, A., El Bakkali, H., Zbakh, M. and El Kettani, D., 2012, April. Load balancing cloud computing: state of art. In Network Security and Systems (JNS2), 2012 National Days of (pp. 106-109). IEEE.
- Vecchiola, C., Pandey, S. and Buyya, R., 2009, December. High-performance cloud computing: A view of scientific applications. In 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (pp. 4-16). IEEE.
- Tianfield, H., 2011, October. Cloud computing architectures. In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on (pp. 1394-1399). IEEE.
- Point, T., 2011. Simply easy learning. Internet: http://www. tutorialspoint. com/uml,[January 2013].
- Muttoo, S.K., Gupta, R. and Pal, S.K., 2016. Analysing Security Checkpoints for an Integrated Utility-Based Information System. In Emerging Research in Computing, Information, Communication and Applications (pp. 569-587). Springer Singapore.
- Reese, G., 2009. Cloud application architectures: building applications and infrastructure in the cloud. " O'Reilly Media, Inc.".
- Harauz, J., Kaufman, L.M. and Potter, B., 2009. Data security in the world of cloud computing” published by the IEEE computer and reliability societies in July.
- Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.
- Brodkin, J., 2008. Gartner: Seven cloud-computing security risks. Infoworld, 2008, pp.1-3.
- Ertaul, L., Singhal, S. and Saldamli, G., 2010, July. Security Challenges in Cloud Computing. In Security and Management (pp. 36-42).
- Dillon, T., Wu, C. and Chang, E., 2010, April. Cloud computing: issues and challenges. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 27-33). Ieee.
- Ertaul, L., Singhal, S. and Saldamli, G., 2010, July. Security Challenges in Cloud Computing. In Security and Management (pp. 36-42).
- Zhang, Q., Cheng, L. and Boutaba, R., 2010. Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), pp.7-18.
- Furht, B., 2010. Cloud computing fundamentals. In Handbook of cloud computing (pp. 3-19). Springer US.
- Shen, Z. and Tong, Q., 2010, July. The security of cloud computing system enabled by trusted computing technology. In Signal Processing Systems (ICSPS), 2010 2nd International Conference on (Vol. 2, pp. V2-11). IEEE.
- Margolin, J., Haynes, E., Heppen, J., Ruedel, K., Meakin, J., Hauser, A., Blum, J., Chavez, S. and Hubbard, A., 2014. Evaluation of the Common Core Technology Project.
- Jain, A. and Kumar, R., 2016, March. Confidentiality Enhanced Security Model for Cloud Environment. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 139). ACM.
- Descher, M., Masser, P., Feilhauer, T., Huemer, D. and Tjoa, A.M., 2009. On Retaining Data Control to the Client in Infrastructure Clouds. Journal of Information System Security, 5(4).
- Ertaul, L., Singhal, S.and Saldamli, G., 2010, July. Security Challenges in Cloud Computing. In Security and Management (pp. 36-42).
Abstract Views: 230
PDF Views: 0