Cloud Computing-New Vision to the World.
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 6
Abstract
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. A cloud is a large pool of resources, unified through virtualization or job scheduling techniques, these resources can be managed to dynamically scale up to match the load, using a pay-per-resources business model. The resources include hardware and systems software on remote data centres, as well as services based upon these that are accessed through the Internet. Key features advertised are elasticity, multi-tenancy, maximal resource utilization and pay-peruse. These new features provides the means to leverage large infrastructures like data centres, through virtualization or job management and resource management , but these large pools of resources are not necessarily located in the same country nor even on the same continent. Cloud provides Platform as a Service (PaaS), Software as a Service (SaaS) and Infrastructure as a Service (IaaS). Basically cloud architecture contains three layers service provider, cloud provider and organization or end user. In market different cloud provider present today. We focus on cloud architecture, security issues in cloud and to solve them.
Authors and Affiliations
Pravin Gurjar, Viki T. Patil, Prashant Gosavi and Dr. B. B. Meshram
VLSI IMPLEMENTATION OF SYSTOLIC ARRAY FOR DISCRETE WAVEELET TRANSFORM
This paper presents a VLSI implementation of Systolic architecture for discrete wavelet transform (DWT).This architecture consist of Input delay unit, filter, register bank and control unit. This performs the calculati...
An Integrated Cryptographic Algorithm based on Biometric Features
Biometric cryptography is a technique using biometric features to encrypt the data which can improve the security of the encrypted data and can overcome the shortcomings of the traditional cryptography. Biometric featu...
An Efficient Centroid Selection Algorithm for K-means Clustering
This paper, we proposes an algorithm for performing data partitioning along the data axis with the highest variance to improve the accuracy. The data partitioning tries to divide data space into small cells or clusters...
Sec.AODV for MANETs using MD5 with Cryptography
Mobile Ad hoc Networks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of at...
An Analysis of Reactive Routing Protocols in Manets with some current issues related with it
This paper describes the concepts and issues related with Manets and reactive routing protocols. In 1970s, wireless networks have become increasingly popular in the computing industry. This is particularly true within...