Evolution of Cloud Storage as Cloud Computing Infrastructure Service
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 1
Abstract
Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage model. Out of the three common types of cloud computing service models, Infrastructure as a Service (IaaS) is a service model that provides servers, computing power, network bandwidth and Storage capacity, as a service to their subscribers. Cloud can relate to many things but without the fundamental storage pieces, which is provided as a service namely Cloud Storage, none of the other applications is possible. This paper introduces Cloud Storage, which covers the key technologies in cloud computing and Cloud Storage, management insights about cloud computing, different types of cloud services, driving forces of cloud computing and cloud storage, advantages and challenges of cloud storage and concludes by pinpointing few challenges to be addressed by the cloud storage providers.
Authors and Affiliations
R. Arokia Paul Rajan
Enhanced cAntMinerPB Algorithm for Induction of Classification Rules using Ant Colony Approach
Abstract : Mining classification rules from data is a key mission of data mining and is getting great attention in recent years. Rule induction is a method used in data mining where the desired output is a set of R...
A Novel Approach for Semi Supervised Document Clustering with Constraint Score based Feature Supervision
Abstract: Text document clustering provides an effective technique to manage a huge amount of retrieval outcome by grouping documents in a small number of meaningful classes. In unsupervised clustering method the unlabel...
Data Usage Monitor for a Shared Wireless NetworkConnection
Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wirelessconnection. The main objective of this technique is to balance and restrict the shared network data. It faci...
An Improved Hashing Method for the Detection of Image Forgery
Abstract: Detection of image forgery is always a crucial factor in image forensic and security applications. Usually this detection is possible with the help of local or global features of an image. We can ensure...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Genetic Algorithm (GA)
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. MANET can be defined using unstable ne...