Core of Cloud Computing
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 4
Abstract
Advancement in computing facilities marks back from 1960’s with introduction of mainframes. Each of the computing has one or the other issues, so keeping this in mind cloud computing was introduced. Cloud computing has its roots in older technologies such as hardware virtualization, distributed computing, internet technologies, and autonomic computing. Cloud computing can be described with two models, one is service model and second is deployment model. While providing several services, cloud management’s primary role is resource provisioning. While there are several such benefits of cloud computing, there are challenges in adopting public clouds because of dependency on infrastructure that is shared by many enterprises. In this paper, we present core knowledge of cloud computing, highlighting its key concepts, deployment models, service models, benefits as well as security issues related to cloud data. The aim of this paper is to provide a better understanding of the cloud computing and to identify important research directions in this field
Authors and Affiliations
Prof. C. P. Chandgude, Prof. G. B. Gadekar
Pyramidal Sum Labeling In Graphs
Let G = (V, E) be a graph with p vertices and q edges. A graph G is said to admit Pyramidal Sum labeling if its vertices can be labeled by nonnegative integers 0,1,2 … 𝑝𝑞 such that the induced edge labels obtained by the...
Distracted Driver Detection and Classification
The number of road accidents due to distracted driving has been on a rise in the recent years. As per the Union Road Transport and Highways Ministry Report 2016, 17 people were killed each hour in India due to road accid...
An Modified Enhanced Method of Reversible Data Hiding In Audio Encryption
Recently more & more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original data can be recovered after embedded data is extracted. It protects...
Financial Transactions in ATM Machines using Speech Signals
Speech is the natural and simplest way of communication and Speech Recognition is a fascinating application of Digital Signal Processing which has many real-world applications. In this paper, a speech recognition system...
A Novel Method of Encryption Using Variable Block Sizes in Different Rounds.
we know that the strength of any cipher depends on the degree of confusion and diffusion induced in it. Since most of the transformations used for this purpose are well known to every one, it gives scope for cryptanalysi...