Best Practices in Implementation of Cloud
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. The hype around Cloud Computing is undeniable, especially regarding how it can result in huge savings in terms of I.T. costs for an enterprise. This has persuaded many enterprises to shift to cloud based software services. Cloud based software is the most widely demanded feature and most of the Information Technology providers are suggesting the cloud based solutions to their clients. But having many advantages for IT organizations cloud has some issues that must be considered during its deployment. The main concern is security privacy and trust. These issues are arises during the deployment of mostly public cloud because in public cloud infrastructure customer is not aware where the data store & how over the internet. Apart from these issues, there are many other challenges which should be dealt with. Aim of this paper is to device certain best practices for implementing cloud computing which would result in more stable performance when facing any kind of threat.
Authors and Affiliations
Navjot Kaur
Improved Intrusion Detection System Using Discriminative learning Approach (A Review)
Abstract: With the advent of anomaly-based intrusion detection systems, many approaches and techniques have been developed to track novel attacks on the systems. High detection rate of 98% at alow alarm rate of 1% can be...
SGEDSS: Semantic Gene Expression Model for Communication Decision Supportsystem
Abstract: An effective decision support system needs to deal with several heterogeneous data sources. Sometimes, the knowledge was explored without integration data sources are wrong. Also, Decision support system is wea...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Networks
While routing Wireless Sensor nodes in the Multi-hop network ,nodes may undergo some attacks such as sink hole attack, worm hole attack, Sybil attack etc., by the attackers through identity deception. So, to &n...
Comparative Analysis of Smart Card Authentication Schemes
Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a var...
Energy Efficient Geographic Adaptive Fidelity in Wireless Sensor Networks
Abstract: Wireless sensor network (WSN) is a quickly developing and existing research that has pulled in impressive exploration consideration in the later past. Routing is to figure out the way to send the detected infor...