SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 668
AN ASSESSMENT OF CLOUD COMPUTING: EVOLUTION
Manvi Mishra1
, Isha Arora2
, Pooja Singh3
, Sugandha Prabhakar4
1
Professor & Head, Department of Computer Science, SRMSWCET, U.P, India
2
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
3
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
4
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
Abstract
In this present work we have given a concise and systematic study of evolution of cloud computing from shared web hosting to public
cloud computing along with multi clouds based on a wide spectrum of factors which include scalability, availability and performance.
The proposed work studies hosting types and aims to promote the use of single and multi-clouds to reduce the risks. Cloud computing
is a multi-paradigm technology which has evolved as a cost effective, flexible, performance oriented infrastructure for agile
development of business operations. Cloud computing changes the way we think about computing by decoupling data processing, data
retention, and data presentation – in effect, divorcing components from location. Today due to the need of hour and security
constraints, single cloud computing is transforming to multi cloud computing. Focus has been done on Multi cloud which is also
known as “inter cloud” or “cloud of clouds” which reduces the security risks like failure of service availability, data loss and
confidentiality breaches that are drawbacks with single cloud.
Keywords: Cloud Computing, Evolution, Hosting Types, Multi cloud
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing enables a ubiquitous, easily accessible and
an on demand infrastructure for sharing a resource pool of
services. The characteristics of cloud computing includes: - on
demand self-service, broad network access, resource pooling,
rapid flexibility and measured performance. The consumers
and industry have an extensive dependence on cloud
computing in which security is a major issue. Cloud security is
multi paradigm and includes computer security, information
security and network security. Cloud computing in its real
sense came into existence in October 2007, when IBM and
Google collaborated and gave the concept of ―Blue Cloud‖.
The use of cloud computing has increased rapidly in many
organizations. Cloud computing provides many benefits in
terms of low cost and accessibility of data.[1] Ensuring the
security of cloud computing is a major factor in the cloud
computing environment, as users often store sensitive
information with cloud storage providers but these providers
may be untrusted. Dealing with ―single cloud‖ providers is
predicted to become less popular with customers due to risks
of service availability failure and the possibility of malicious
insiders in the single cloud. A movement towards ―multi-
clouds‖ or in other words, ―inter clouds‖or―cloud-of-clouds
has emerged recently. In the paper we have discussed the
evolution of cloud computing and laid emphasis on the
emergence of multi clouds. The following section highlights a
brief review of cloud computing. The remaining sections are
organized as follows. In Section III discussion about Evolution
of Cloud Computing is made. Section IV deliberates on
Benefits and Challenges of Cloud Computing. Section V
focuses on Evolution of Single to Multi cloud. Section VI
presents the Results and Section VII presents the Conclusion.
2. REVIEW OF LITERATURE
This review surveyed the existing literature using a principled
and systematic approach. The U.S. National Institutes of
Standards and Technology defines cloud as‖ Cloud
Computing is a model for enabling convenient, on demand
network access to a shared pool of configurable computing
resources(e.g. Networks, services, storage and applications)
that can be rapidly provisioned and released with a minimal
management effort or service provider interaction. This cloud
model promotes availability and is composed of five essential
characteristics, three delivery models and four deployment
models.‖ [1].Following are the factors which lead to the
evolution of cloud computing: [2]
1. Scalability: The number of resources that are needed
to be accessed by a wide range of users having varied
requests is increasing day by day. This lead to the
evolution of cloud computing.
2. Heterogeneity: Together with the number of devices,
the range of types of resources currently increases
significantly.
3. Economic Reasons: the business models around the
IT service and resource provisioning have changed
drastically over recent years, moving away from
onetime license fees and licensing models tied to
individual users or machines, to flat rates and free or
low cost online applications.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 669
4. Mobility: in the modern, globalized economy and
with modern smart phones and powerful mobile
devices, a growing demand for online availability,
accessibility to data, mobile office like working
environments etc. is notable.
Cloud services are usually divided in the three main types
which are:
1. Software as a Service (SaaS): SaaS clients rent
usage of applications running within the Cloud’s
provider infrastructure, for example Sales Force. The
applications are typically offered to the clients via the
Internet and are managed completely by the Cloud
provider.
2. Platform as a Service (PaaS): PaaS Cloud providers
offer an application platform as a service, for
example Google App Engine. This enables clients to
deploy custom software using the tools and
programming languages offered by the provider.
Clients have control over the deployed applications
and environment-related settings.
3. Infrastructure as a Service (IaaS): IaaS delivers
hardware resources such as CPU, disk space or
network components as a service. These resources are
usually delivered as a virtualization platform by the
Cloud provider and can be accessed across the
Internet by the client with the client having full
control of the virtualized platform. Deploying cloud
computing can differ depending on requirements in
four deployment models which have been identified
each with specific characteristics that supports the
needs of services and users of the clouds. These are:
public, private, community and hybrid clouds.
Fig-1: Types of Cloud
3. EVOLUTION OF CLOUD COMPUTING
The trend toward cloud computing started in the late 1980s
with the concept of grid computing when, for the first time, a
large number of systems were applied to a single problem,
usually scientific in nature and requiring exceptionally high
levels of parallel computation. The objective of Cloud
computing is the newest name for what has been around since
the mid-90s as ―on-demand infrastructure.‖ In 1995, it was
known as ―Shared Web Hosting‖ and had limited features
such as multi-tenant, automated provisioning, easy-to-use
interface. In 1998 VPS Hosting became available – this web
host improved by having partial infrastructure demand and
resource size flexibility. 1997 brought Dedicated Hosting,
both managed and unmanaged. [3] This type of automated
computing had dedicated servers with promises of full
administrative access.[4] The 2000s was when automated
computing came in the form of Grid /utility computing and
had full infrastructure demand and multi-tenant, partial
resource size flexibility and automated provisioning came
closer to what is known as ―cloud today‖. From 2012’s
through today the cloud computing has gathered a wide
spectrum of audience making it more scalable, flexible and
performance oriented. [5]
1. Shared Web Hosting – Shared web hosting
service or virtual hosting service or derive host refers to
a web hosting service where many websites reside on
one web server connected to the Internet. Each site
"sits" on its own partition, or section/place on the server,
to keep it separate from other sites. This is generally the
most economical option for hosting, as many people
share the overall cost of server maintenance
2. VPS Hosting – A virtual private server (VPS) is
a virtual machine sold as a service by an Internet hosting
service. A VPS runs its own copy of an operating
system, and customers have super user-level access to
that operating system instance, so can install almost any
software that runs on that OS. For many purposes they
are functionally equivalent to a dedicated physical
server, and being software defined are able to be much
more easily created and configured. [6]
3. Dedicated Hosting– It is software installed on a
separate virtual server to manage the end user
connections with the virtualized desktops. A dedicated
hosting service, dedicated server, or managed hosting
service is a type of Internet hosting in which the client
leases an entire server not shared with anyone else. This
is more flexible than shared hosting, as organizations
have full control over the server(s), including choice of
operating system, hardware, etc. There is also another
level of dedicated or managed hosting commonly
referred to as complex managed hosting.[7]
4. Grid computing- Grid computing is the collection of
computer resources from multiple locations to reach a
common goal. What distinguishes grid computing from
conventional high performance computing systems such
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 670
as cluster computing is that grids tend to be more
loosely coupled, heterogeneous, and geographically
dispersed. Although a single grid can be dedicated to a
particular application, commonly a grid is used for a
variety of purposes. Grids are often constructed with
general purpose grid middleware software libraries.
5. Public Cloud Computing- In Public clouds the cloud
infrastructure is available to the public on a commercial
basis by a cloud service provider. This enables a
consumer to deploy and develop a service in the cloud
with a very little financial outlays compared to other
deployment models. Private cloud incorporates specific
services and is maintained and deployed for a specific
organization. In Community cloud the cloud
infrastructure is shared among a number of
organizations with similar interests and requirements.
The Hybrid cloud comprises of a number of clouds of
any type but the clouds have the ability through their
interfaces to allow data or applications to be moved
from one cloud to another. How to access data in single
cloud using one of these four deployment methods or a
combination is shown in fig 2.
6. Multi clouds- Multi cloud computing is a new
dimension in cloud computing which is the concurrent
use of two or more cloud services to minimize the risk
of widespread data loss or downtime due to localized
component failure in a cloud computing environment as
shown in fig 3. A multi cloud approach can offer not
only the hardware, software and infrastructure but
redundancy necessary to optimize fault tolerance.
Fig-2: Accessing data in single cloud
Fig-3: Accessing data in multi-cloud
4. BENEFITS AND CHALLENGES
Organizations pay for the usage of cloud which is carefully
monitored and measured — in past managed services models,
it was difficult to see actual results based on IT spending
centralized computing resources, within the cloud provider,
are managed by fewer personnel with heavy use of automation
and consistent processes resulting in lower cost to the
consumers. Consuming organizations do not need a
sophisticated IT staff which is expensive, hard to find
transition of work for a cloud provider. This improves quality,
maintainability, security, and reduces cost to the consumers of
cloud. [8] Numerous legacy IT integrators are claiming to
provide cloud solutions but are essentially still legacy
managed service providers. Organizations have significant
legacy computing resources (servers, data centers, and IT
personnel) that will need to be transitioned or eliminated in
order to achieve true cost savings and flexibility provided by
cloud providers/services. Mission critical applications that are
core to the business or the consuming organization must be
transitioned to the cloud. This is neither quick nor easy, and
will take some time. Businesses need to evaluate whether
their custom/legacy application is truly needed and worth the
re-investment budgeting for cloud services is a challenge to
some commercial and government organizations. Existing
procurement policies may need to be adapted. Following are
the major challenges to cloud computing which encompass
lack of ownership of data, Overdependence, Information
Security, Privacy, Availability, Performance, Data Migration
and Stability of Provider. [9]
5. EVOLUTION OF SINGLE TO MULTI-CLOUD
This section provides brief summary review of prior works on
cloud computing with respect to security. Cloud computing
security was explored in single cloud environment [10].
Service availability was focused in [11] in single cloud
environment. Multi-shares with secret sharing algorithm was
proposed in [12] for cloud security and data integrity. Cloud
security was explored using cryptographic methods [13]. The
security risks addressed include service availability, data
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 671
intrusion, and data integrity. The solution used cloud storage
and multi-clouds. In [14] a survey has been made to know
security issues and solutions with respect to single cloud.
RACS and RAID kind of techniques were used for cloud
security using multi-clouds [15]. Client centric distributed
protocols were explored for data integrity with multi-clouds
usage [16].Service availability problem was focused in single
cloud environment. [17] There was discussion about cloud
security issues [18]. Cryptography is used to protect cloud
data in single cloud environment [19]. A security mechanism
by name ―Depot‖ is used to single cloud environment [20]. A
security mechanism by name ―Venus‖ was proposed in [21]
which focused on data integrity issue in single cloud
environment. In [22] a survey is made on cloud security. In
[23] cloud data integrity is focused in single cloud
environment. In [24] a new security mechanism was proposed
by name ―HAIL‖ for improving service availability in multi-
cloud environment. In [25] a survey was done on cloud data
integrity in multi-cloud environment. Encrypted cloud VPN
technique is used in [26] for data integrity in multi-cloud
environment. Cloud security was discussed in [27] in single
cloud environment. TCCP techniques for cloud data integrity
issues and service availability were presented in [28] in single
cloud environment tokens and erasure codes were used in [29]
to ensure cloud data integrity in single cloud environment.
PDP schemes were used to protect data integrity in clouds.
Fig-4:Multi-Tenancy of Cloud Computing
For ensuring more security in cloud environment, we can use
data encryption. If the data is distributed in multi cloud.
Environment as well as it is encrypted, we can protect our data
in even better way. The data which is uploaded by the user can
be encrypted first and then we can store it on the cloud server
which is shown in fig: 5 and fig: 6. this will be helpful in
providing two-way security to the customer’s data. To store
the data in multi-cloud environment the symmetric key or
secret key algorithms are the best choice. Symmetric key
algorithm is also known as the secret key encryption. It is a
cryptographic technique in which both the sender and receiver
of data use the same key for the purpose of encryption and
decryption of data. Symmetric key algorithms are suitable for
storing data in cloud multi cloud, as user should be able to
access his data easily.
Fig-5: One way encryption in single cloud
Fig-6: Two way encryption in multi-cloud
6. RESULTS AND DISCUSSION
This work takes notes of the critical analysis of various
features provided by hosting types that includes Infrastructure
on Demand, Resource Size Flexibility, Multitenant, and
Application on demand, Network Flexibility, Automated
Provisioning, Scalability, Billing Type and Easy to use
Interfaces. Thus giving us the advantages of one type of
hosting over another and the advent of the concept of cloud.
In Traditional Hosting there are controlled environment and
power and forms parts of foundation of cloud computing. As
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 672
compared to shared web hosting on the cloud hosting our data
is hosted not on one but on several servers connected to work
as one. The VPS servers are less efficient since they allocate a
guaranteed amount of resources to each client that can never
be rerouted to others. In Dedicated hosting unlike cloud
computing the web hosting still owns the machines and has to
monitor the performance of the server ensuring uninterrupted
work flow of server .In Grid computing all machines process
different parts of a larger task.
The advantages of cloud computing over traditional hosting
are cloud computing is sold on demand typically as pay per
lease or leased service. Users are able to control and budget
costs more efficiently. Users determine how much of the
service they wish to use typically at the enrolment time or by
changing configuration dynamically through a web
administered interface. Users can typically access the service
from any location. User services are managed and provided by
cloud services. Table 1 depicts the various hosting types along
with their year of evolution and a comparison of the various
features and infrastructure provided by these hosting services.
Table-1: Evolution Of cloud Computing
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 673
7. CONCLUSIONS AND FUTURE SCOPE
Cloud hosting is reliable, easily scalable and affordable
hosting solution that differs from traditional hosting solutions
in many aspects. Cloud computing is promising paradigm for
IT services as computing utilities. This approach has several
advantages over the traditional web hosting services and grid
computing including higher security, lesser costs, better
efficiency, and simplified data storage. It is clear that although
the use of cloud computing has rapidly increased; cloud
computing security is still considered the major issue in the
cloud computing environment. Customers do not want to lose
their private information as a result of malicious intruders in
the cloud. Furthermore, data intrusion leads to many problems
for the users of cloud computing. The purpose of this work is
to survey the recent research on single clouds and multi-clouds
to address the security risks and solutions. We have found that
much research has been done to ensure the security of the
single cloud and cloud storage whereas multi clouds have
received less attention in the area of security. We support the
migration to multi-clouds due to its ability to decrease security
risks that affect the cloud computing user.
REFERENCES
[1]. H. Shacham, B. Waters (Dec 2008), "Compact proofs of
retrievability", in Proc. of Asia crypt 2008, vol. 5350, pp. 90–
107
[2]. M.A. Shah, R. Swaminathan, M. Baker (2008), "Privacy
preserving audit and extraction of digital contents"
[3]. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou (2009),
"Enabling public verifiability and data dynamics for storage
security in cloud computing", in Proc. of ESORICS’09.
[4]. Wang, K. Ren, W. Lou (2010), ―Achieving secure,
scalable, and fine-grained access control in cloud computing‖,
in Proc. of IEEE INFOCOM’10, San Diego.
[5]. Cloud Security Alliance, (2009) ―Security guidance for
critical areas of focus in cloud computing,‖
[6]. ― Design and Implementation of Virtual Private Services‖
Sotiris Ionnandis Steven M.Bellovin
[7]. ―Internet Infrastructure Technology‖ Structure Research,
September 2012.
[8]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and
Privacy Challenges in Cloud Computing Environments", IEEE
Security & Privacy, 8(6), 2010, pp. 24-31.
[9]. Amazon, Amazon Web Services. Web serviceslicensing
agreement, October3, 2006
[10]. S.L. Garfinkel, "An evaluation of amazon’s grid
computing services: EC2, S3, and QS", Technical Report TR-
08-07, Computer Science Group, Harvard University,
Citeseer, 2007, pp. 1-15
[11]. S. Subashini and V. Kavitha, "A survey on security
issues in service delivery models of cloud computing", Journal
of Network and ComputerApplications, 34(1), 2011, pp 1-11.
[12]. M.A. AlZain and E. Pardede, "Using Multi Sharesfor
Ensuring Privacy in Database-as-a-Service",44th Hawaii Intl.
Conf. on System Sciences(HICSS), 2011, pp. 1-9.
[13]. A. Bessani, M. Correia, B. Quaresma, F. André andP.
Sousa, "DepSky: dependable and secure storage in a cloud-of-
clouds", EuroSys'11:Proc. 6thConf. On Computer systems,
2011, pp. 31-46.
[14]. F. Rocha and M. Correia, "Lucy in the Sky without
Diamonds: Stealing Confidential Data in the Cloud", Proc.
1stIntl. Workshop of Dependability of Clouds, Data Centers
and Virtual Computing Environments, 2011, pp. 1-6.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 674
[15]. H. Abu-Libdeh, L. Princehouse and H.Weatherspoon,
"RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st
ACM symposium onCloud computing, 2010, pp. 229-240.
[16]. C. Cachin, R. Haas and M. Vukolic, "Dependable
storage in the Inter cloud", Research Report RZ,3783, 2010.
[17]. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W.
Felten, "SPORC: Group collaboration using untrusted cloud
resources", OSDI, October2010, pp. 1-14.
[18]. E. Grosse, J. Howie, J. Ransome, J. Reavis and S.
Schmidt, "Cloud computing roundtable", IEEE Security &
Privacy, 8(6), 2010, pp. 17-23.
[19]. S. Kamara and K. Lauter, "Cryptographic cloud storage",
FC'10: Proc. 14thIntl.Conf. on Financial cryptograpy and data
security,2010, pp. 136-149.
[20]. P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M.
Dahlin and M. Walfish, "Depot: Cloud storage with minimal
trust", OSDI'10: Proc. of the 9thUSENIX Conf. on Operating
systems design and implementation, 2010, pp. 1-16.
[21]. A. Shraer, C. Cachin, A. Cidon, I. Keidar,
Y.Michalevsky and D. Shaket, "Venus: Verification for
untrusted cloud storage", CCSW'10: Proc. ACM workshop on
Cloud computing security workshop, 2010, pp. 19-30.
[22]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and
Privacy Challenges in Cloud Computing Environments", IEEE
Security & Privacy, 8(6), 2010, pp. 24-31.
[23]. M. Van Dijk and A. Juels, "On the impossibility of
cryptography alone for privacy-preserving cloud computing",
HotSec'10: Proc. 5thUSENIX Conf. on Hot topics in security,
2010, pp.1-8.
[24]. K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahigh-
availability and integrity layer for cloud storage", CCS'09:
Proc. 16th ACM Conf. on Computer and communications
security, 2009, pp.187-198.
[25]. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud",
ACM SIGACT News, 40, 2009, pp. 81-86.
[26]. Clavister, "Security in the cloud", Clavister White Paper,
2008.
[27]. T. Ristenpart, E. Tromer, H. Shacham and S.Savage,
"Hey, you, get off of my cloud: exploring formation leakage in
third-party compute clouds", CCS'09: Proc. 16thACM Conf.
on Computer and communications security, 2009, pp.199-212.
[28]. N. Santos, K.P. Gummadi and R. Rodrigues ,"Towards
trusted cloud computing", USENIX Association, 2009, pp. 3-
9.
[29]. C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuringdata
Int. Conf. on Advances in Recent Technologies in.
Proc.Int. Conf. on Advances in Recent Technologies in
Communication and Computing, 2010, pp. 1-9.
BIOGRAPHIES
Manvi Mishra, Professor & Head,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India.
Isha Arora, Research Scholar, Department
of Computer Science, Shri Ram Murti
Smarak Women’s College Of Engineering
and Technology, Bareilly, Uttar Pradesh,
India
Pooja Singh, Research Scholar,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India
Sugandha Prabhakar, Research Scholar ,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India

More Related Content

PDF
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
PPTX
Cloud computing
PDF
CLOUD STEGANOGRAPHY- A REVIEW
PDF
Total interpretive structural modelling on enablers of cloud computing
PDF
Cloud Computing Basics Features and Services
PDF
H046053944
PDF
Literature Review: Cloud Computing Security Issues and Techniques
PDF
Aj04602248254
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Cloud computing
CLOUD STEGANOGRAPHY- A REVIEW
Total interpretive structural modelling on enablers of cloud computing
Cloud Computing Basics Features and Services
H046053944
Literature Review: Cloud Computing Security Issues and Techniques
Aj04602248254

What's hot (18)

PDF
Solutions of cloud computing security issues
PPTX
Fundamental concepts and models
PDF
call for papers, research paper publishing, where to publish research paper, ...
PDF
Review on Security Techniques using Cloud Computing
PDF
A survey on data security in cloud computing issues and mitigation techniques
PDF
Addressing the cloud computing security menace
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
DOC
A cross referenced whitepaper on cloud computing
PDF
Security & privacy issues of cloud & grid computing networks
PDF
A challenge for security and service level agreement in cloud computinge
PDF
A challenge for security and service level agreement in cloud computinge
PDF
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
PDF
Ijarcet vol-2-issue-3-884-890
PDF
Paper id 27201433
PDF
An Overview To Cloud Computing
PDF
Ijetcas14 440
PPTX
Understanding Cloud Computing
PDF
Exploring the cloud deployment and service delivery models
Solutions of cloud computing security issues
Fundamental concepts and models
call for papers, research paper publishing, where to publish research paper, ...
Review on Security Techniques using Cloud Computing
A survey on data security in cloud computing issues and mitigation techniques
Addressing the cloud computing security menace
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
A cross referenced whitepaper on cloud computing
Security & privacy issues of cloud & grid computing networks
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Ijarcet vol-2-issue-3-884-890
Paper id 27201433
An Overview To Cloud Computing
Ijetcas14 440
Understanding Cloud Computing
Exploring the cloud deployment and service delivery models
Ad

Viewers also liked (18)

PDF
Enhanced technique for regression testing
PDF
Effect of gradation of aggregates on marshall properties of sdbc mix design
PDF
A vm scheduling algorithm for reducing power consumption of a virtual machine...
PDF
Characterizations and optimization study on influence of different parameters...
PDF
A review on fuel cell and its applications
PDF
An approach for ids by combining svm and ant colony algorithm
PDF
Analytical study on effects of water quality parameters using remote sensing ...
PDF
High dimensionality reduction on graphical data
PDF
Stability routing in fso manets
PDF
Tungsten oxide nanostructures for energy storage and field emission applications
PDF
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...
PDF
Influence of curing process interrupt on ilss of thin carbon epoxy laminates
PDF
Environmental sciences
PDF
Breast cancer diagnosis and recurrence prediction using machine learning tech...
PDF
Effect of a diffuser tower on the power output of a solar chimney power plant
PDF
Design of transformer less power supply for low power application
PDF
Implementation of flex sensor for hand gesture based wireless automation of j...
PDF
Performance evaluation of 1 tbps qpsk dwdm system over isowc
Enhanced technique for regression testing
Effect of gradation of aggregates on marshall properties of sdbc mix design
A vm scheduling algorithm for reducing power consumption of a virtual machine...
Characterizations and optimization study on influence of different parameters...
A review on fuel cell and its applications
An approach for ids by combining svm and ant colony algorithm
Analytical study on effects of water quality parameters using remote sensing ...
High dimensionality reduction on graphical data
Stability routing in fso manets
Tungsten oxide nanostructures for energy storage and field emission applications
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...
Influence of curing process interrupt on ilss of thin carbon epoxy laminates
Environmental sciences
Breast cancer diagnosis and recurrence prediction using machine learning tech...
Effect of a diffuser tower on the power output of a solar chimney power plant
Design of transformer less power supply for low power application
Implementation of flex sensor for hand gesture based wireless automation of j...
Performance evaluation of 1 tbps qpsk dwdm system over isowc
Ad

Similar to An assessment of cloud computing (20)

PDF
A Comprehensive Study On Cloud Computing
PDF
.Net compiler using cloud computing
PDF
Addressing the cloud computing security menace
PDF
Addressing the cloud computing security menace
PDF
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
PDF
Load Balancing Tactics in Cloud Computing: A Systematic Study
PDF
An study of security issues & challenges in cloud computing
PDF
Availability in Cloud Computing
PDF
D045031724
PDF
Introduction to aneka cloud
PDF
Improving Cloud Performance through Performance Based Load Balancing Approach
PDF
Software as a service for efficient cloud computing
PDF
Software as a service for efficient cloud computing
PPTX
Cloud-Computing-32-40[1].pptx...,..........
PDF
Data Security Model Enhancement In Cloud Environment
PDF
Latest development of cloud computing technology, characteristics, challenge,...
PDF
Cloud computing and its security aspects
PDF
Cloud computing security
PDF
Ijetcas14 424
PDF
Cloud computing Review over various scheduling algorithms
A Comprehensive Study On Cloud Computing
.Net compiler using cloud computing
Addressing the cloud computing security menace
Addressing the cloud computing security menace
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
Load Balancing Tactics in Cloud Computing: A Systematic Study
An study of security issues & challenges in cloud computing
Availability in Cloud Computing
D045031724
Introduction to aneka cloud
Improving Cloud Performance through Performance Based Load Balancing Approach
Software as a service for efficient cloud computing
Software as a service for efficient cloud computing
Cloud-Computing-32-40[1].pptx...,..........
Data Security Model Enhancement In Cloud Environment
Latest development of cloud computing technology, characteristics, challenge,...
Cloud computing and its security aspects
Cloud computing security
Ijetcas14 424
Cloud computing Review over various scheduling algorithms

More from eSAT Journals (20)

PDF
Mechanical properties of hybrid fiber reinforced concrete for pavements
PDF
Material management in construction – a case study
PDF
Managing drought short term strategies in semi arid regions a case study
PDF
Life cycle cost analysis of overlay for an urban road in bangalore
PDF
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
PDF
Laboratory investigation of expansive soil stabilized with natural inorganic ...
PDF
Influence of reinforcement on the behavior of hollow concrete block masonry p...
PDF
Influence of compaction energy on soil stabilized with chemical stabilizer
PDF
Geographical information system (gis) for water resources management
PDF
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
PDF
Factors influencing compressive strength of geopolymer concrete
PDF
Experimental investigation on circular hollow steel columns in filled with li...
PDF
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
PDF
Evaluation of punching shear in flat slabs
PDF
Evaluation of performance of intake tower dam for recent earthquake in india
PDF
Evaluation of operational efficiency of urban road network using travel time ...
PDF
Estimation of surface runoff in nallur amanikere watershed using scs cn method
PDF
Estimation of morphometric parameters and runoff using rs & gis techniques
PDF
Effect of variation of plastic hinge length on the results of non linear anal...
PDF
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Mechanical properties of hybrid fiber reinforced concrete for pavements
Material management in construction – a case study
Managing drought short term strategies in semi arid regions a case study
Life cycle cost analysis of overlay for an urban road in bangalore
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of compaction energy on soil stabilized with chemical stabilizer
Geographical information system (gis) for water resources management
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Factors influencing compressive strength of geopolymer concrete
Experimental investigation on circular hollow steel columns in filled with li...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Evaluation of punching shear in flat slabs
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of operational efficiency of urban road network using travel time ...
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of morphometric parameters and runoff using rs & gis techniques
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of use of recycled materials on indirect tensile strength of asphalt c...

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Welding lecture in detail for understanding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
Project quality management in manufacturing
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Geodesy 1.pptx...............................................
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Construction Project Organization Group 2.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
OOP with Java - Java Introduction (Basics)
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Welding lecture in detail for understanding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Project quality management in manufacturing
Lecture Notes Electrical Wiring System Components
Geodesy 1.pptx...............................................
bas. eng. economics group 4 presentation 1.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Internet of Things (IOT) - A guide to understanding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

An assessment of cloud computing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 668 AN ASSESSMENT OF CLOUD COMPUTING: EVOLUTION Manvi Mishra1 , Isha Arora2 , Pooja Singh3 , Sugandha Prabhakar4 1 Professor & Head, Department of Computer Science, SRMSWCET, U.P, India 2 Research Scholar, Department of Computer Science, SRMSWCET, U.P, India 3 Research Scholar, Department of Computer Science, SRMSWCET, U.P, India 4 Research Scholar, Department of Computer Science, SRMSWCET, U.P, India Abstract In this present work we have given a concise and systematic study of evolution of cloud computing from shared web hosting to public cloud computing along with multi clouds based on a wide spectrum of factors which include scalability, availability and performance. The proposed work studies hosting types and aims to promote the use of single and multi-clouds to reduce the risks. Cloud computing is a multi-paradigm technology which has evolved as a cost effective, flexible, performance oriented infrastructure for agile development of business operations. Cloud computing changes the way we think about computing by decoupling data processing, data retention, and data presentation – in effect, divorcing components from location. Today due to the need of hour and security constraints, single cloud computing is transforming to multi cloud computing. Focus has been done on Multi cloud which is also known as “inter cloud” or “cloud of clouds” which reduces the security risks like failure of service availability, data loss and confidentiality breaches that are drawbacks with single cloud. Keywords: Cloud Computing, Evolution, Hosting Types, Multi cloud -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud computing enables a ubiquitous, easily accessible and an on demand infrastructure for sharing a resource pool of services. The characteristics of cloud computing includes: - on demand self-service, broad network access, resource pooling, rapid flexibility and measured performance. The consumers and industry have an extensive dependence on cloud computing in which security is a major issue. Cloud security is multi paradigm and includes computer security, information security and network security. Cloud computing in its real sense came into existence in October 2007, when IBM and Google collaborated and gave the concept of ―Blue Cloud‖. The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data.[1] Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with ―single cloud‖ providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards ―multi- clouds‖ or in other words, ―inter clouds‖or―cloud-of-clouds has emerged recently. In the paper we have discussed the evolution of cloud computing and laid emphasis on the emergence of multi clouds. The following section highlights a brief review of cloud computing. The remaining sections are organized as follows. In Section III discussion about Evolution of Cloud Computing is made. Section IV deliberates on Benefits and Challenges of Cloud Computing. Section V focuses on Evolution of Single to Multi cloud. Section VI presents the Results and Section VII presents the Conclusion. 2. REVIEW OF LITERATURE This review surveyed the existing literature using a principled and systematic approach. The U.S. National Institutes of Standards and Technology defines cloud as‖ Cloud Computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources(e.g. Networks, services, storage and applications) that can be rapidly provisioned and released with a minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three delivery models and four deployment models.‖ [1].Following are the factors which lead to the evolution of cloud computing: [2] 1. Scalability: The number of resources that are needed to be accessed by a wide range of users having varied requests is increasing day by day. This lead to the evolution of cloud computing. 2. Heterogeneity: Together with the number of devices, the range of types of resources currently increases significantly. 3. Economic Reasons: the business models around the IT service and resource provisioning have changed drastically over recent years, moving away from onetime license fees and licensing models tied to individual users or machines, to flat rates and free or low cost online applications.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 669 4. Mobility: in the modern, globalized economy and with modern smart phones and powerful mobile devices, a growing demand for online availability, accessibility to data, mobile office like working environments etc. is notable. Cloud services are usually divided in the three main types which are: 1. Software as a Service (SaaS): SaaS clients rent usage of applications running within the Cloud’s provider infrastructure, for example Sales Force. The applications are typically offered to the clients via the Internet and are managed completely by the Cloud provider. 2. Platform as a Service (PaaS): PaaS Cloud providers offer an application platform as a service, for example Google App Engine. This enables clients to deploy custom software using the tools and programming languages offered by the provider. Clients have control over the deployed applications and environment-related settings. 3. Infrastructure as a Service (IaaS): IaaS delivers hardware resources such as CPU, disk space or network components as a service. These resources are usually delivered as a virtualization platform by the Cloud provider and can be accessed across the Internet by the client with the client having full control of the virtualized platform. Deploying cloud computing can differ depending on requirements in four deployment models which have been identified each with specific characteristics that supports the needs of services and users of the clouds. These are: public, private, community and hybrid clouds. Fig-1: Types of Cloud 3. EVOLUTION OF CLOUD COMPUTING The trend toward cloud computing started in the late 1980s with the concept of grid computing when, for the first time, a large number of systems were applied to a single problem, usually scientific in nature and requiring exceptionally high levels of parallel computation. The objective of Cloud computing is the newest name for what has been around since the mid-90s as ―on-demand infrastructure.‖ In 1995, it was known as ―Shared Web Hosting‖ and had limited features such as multi-tenant, automated provisioning, easy-to-use interface. In 1998 VPS Hosting became available – this web host improved by having partial infrastructure demand and resource size flexibility. 1997 brought Dedicated Hosting, both managed and unmanaged. [3] This type of automated computing had dedicated servers with promises of full administrative access.[4] The 2000s was when automated computing came in the form of Grid /utility computing and had full infrastructure demand and multi-tenant, partial resource size flexibility and automated provisioning came closer to what is known as ―cloud today‖. From 2012’s through today the cloud computing has gathered a wide spectrum of audience making it more scalable, flexible and performance oriented. [5] 1. Shared Web Hosting – Shared web hosting service or virtual hosting service or derive host refers to a web hosting service where many websites reside on one web server connected to the Internet. Each site "sits" on its own partition, or section/place on the server, to keep it separate from other sites. This is generally the most economical option for hosting, as many people share the overall cost of server maintenance 2. VPS Hosting – A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting service. A VPS runs its own copy of an operating system, and customers have super user-level access to that operating system instance, so can install almost any software that runs on that OS. For many purposes they are functionally equivalent to a dedicated physical server, and being software defined are able to be much more easily created and configured. [6] 3. Dedicated Hosting– It is software installed on a separate virtual server to manage the end user connections with the virtualized desktops. A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. There is also another level of dedicated or managed hosting commonly referred to as complex managed hosting.[7] 4. Grid computing- Grid computing is the collection of computer resources from multiple locations to reach a common goal. What distinguishes grid computing from conventional high performance computing systems such
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 670 as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed. Although a single grid can be dedicated to a particular application, commonly a grid is used for a variety of purposes. Grids are often constructed with general purpose grid middleware software libraries. 5. Public Cloud Computing- In Public clouds the cloud infrastructure is available to the public on a commercial basis by a cloud service provider. This enables a consumer to deploy and develop a service in the cloud with a very little financial outlays compared to other deployment models. Private cloud incorporates specific services and is maintained and deployed for a specific organization. In Community cloud the cloud infrastructure is shared among a number of organizations with similar interests and requirements. The Hybrid cloud comprises of a number of clouds of any type but the clouds have the ability through their interfaces to allow data or applications to be moved from one cloud to another. How to access data in single cloud using one of these four deployment methods or a combination is shown in fig 2. 6. Multi clouds- Multi cloud computing is a new dimension in cloud computing which is the concurrent use of two or more cloud services to minimize the risk of widespread data loss or downtime due to localized component failure in a cloud computing environment as shown in fig 3. A multi cloud approach can offer not only the hardware, software and infrastructure but redundancy necessary to optimize fault tolerance. Fig-2: Accessing data in single cloud Fig-3: Accessing data in multi-cloud 4. BENEFITS AND CHALLENGES Organizations pay for the usage of cloud which is carefully monitored and measured — in past managed services models, it was difficult to see actual results based on IT spending centralized computing resources, within the cloud provider, are managed by fewer personnel with heavy use of automation and consistent processes resulting in lower cost to the consumers. Consuming organizations do not need a sophisticated IT staff which is expensive, hard to find transition of work for a cloud provider. This improves quality, maintainability, security, and reduces cost to the consumers of cloud. [8] Numerous legacy IT integrators are claiming to provide cloud solutions but are essentially still legacy managed service providers. Organizations have significant legacy computing resources (servers, data centers, and IT personnel) that will need to be transitioned or eliminated in order to achieve true cost savings and flexibility provided by cloud providers/services. Mission critical applications that are core to the business or the consuming organization must be transitioned to the cloud. This is neither quick nor easy, and will take some time. Businesses need to evaluate whether their custom/legacy application is truly needed and worth the re-investment budgeting for cloud services is a challenge to some commercial and government organizations. Existing procurement policies may need to be adapted. Following are the major challenges to cloud computing which encompass lack of ownership of data, Overdependence, Information Security, Privacy, Availability, Performance, Data Migration and Stability of Provider. [9] 5. EVOLUTION OF SINGLE TO MULTI-CLOUD This section provides brief summary review of prior works on cloud computing with respect to security. Cloud computing security was explored in single cloud environment [10]. Service availability was focused in [11] in single cloud environment. Multi-shares with secret sharing algorithm was proposed in [12] for cloud security and data integrity. Cloud security was explored using cryptographic methods [13]. The security risks addressed include service availability, data
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 671 intrusion, and data integrity. The solution used cloud storage and multi-clouds. In [14] a survey has been made to know security issues and solutions with respect to single cloud. RACS and RAID kind of techniques were used for cloud security using multi-clouds [15]. Client centric distributed protocols were explored for data integrity with multi-clouds usage [16].Service availability problem was focused in single cloud environment. [17] There was discussion about cloud security issues [18]. Cryptography is used to protect cloud data in single cloud environment [19]. A security mechanism by name ―Depot‖ is used to single cloud environment [20]. A security mechanism by name ―Venus‖ was proposed in [21] which focused on data integrity issue in single cloud environment. In [22] a survey is made on cloud security. In [23] cloud data integrity is focused in single cloud environment. In [24] a new security mechanism was proposed by name ―HAIL‖ for improving service availability in multi- cloud environment. In [25] a survey was done on cloud data integrity in multi-cloud environment. Encrypted cloud VPN technique is used in [26] for data integrity in multi-cloud environment. Cloud security was discussed in [27] in single cloud environment. TCCP techniques for cloud data integrity issues and service availability were presented in [28] in single cloud environment tokens and erasure codes were used in [29] to ensure cloud data integrity in single cloud environment. PDP schemes were used to protect data integrity in clouds. Fig-4:Multi-Tenancy of Cloud Computing For ensuring more security in cloud environment, we can use data encryption. If the data is distributed in multi cloud. Environment as well as it is encrypted, we can protect our data in even better way. The data which is uploaded by the user can be encrypted first and then we can store it on the cloud server which is shown in fig: 5 and fig: 6. this will be helpful in providing two-way security to the customer’s data. To store the data in multi-cloud environment the symmetric key or secret key algorithms are the best choice. Symmetric key algorithm is also known as the secret key encryption. It is a cryptographic technique in which both the sender and receiver of data use the same key for the purpose of encryption and decryption of data. Symmetric key algorithms are suitable for storing data in cloud multi cloud, as user should be able to access his data easily. Fig-5: One way encryption in single cloud Fig-6: Two way encryption in multi-cloud 6. RESULTS AND DISCUSSION This work takes notes of the critical analysis of various features provided by hosting types that includes Infrastructure on Demand, Resource Size Flexibility, Multitenant, and Application on demand, Network Flexibility, Automated Provisioning, Scalability, Billing Type and Easy to use Interfaces. Thus giving us the advantages of one type of hosting over another and the advent of the concept of cloud. In Traditional Hosting there are controlled environment and power and forms parts of foundation of cloud computing. As
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 672 compared to shared web hosting on the cloud hosting our data is hosted not on one but on several servers connected to work as one. The VPS servers are less efficient since they allocate a guaranteed amount of resources to each client that can never be rerouted to others. In Dedicated hosting unlike cloud computing the web hosting still owns the machines and has to monitor the performance of the server ensuring uninterrupted work flow of server .In Grid computing all machines process different parts of a larger task. The advantages of cloud computing over traditional hosting are cloud computing is sold on demand typically as pay per lease or leased service. Users are able to control and budget costs more efficiently. Users determine how much of the service they wish to use typically at the enrolment time or by changing configuration dynamically through a web administered interface. Users can typically access the service from any location. User services are managed and provided by cloud services. Table 1 depicts the various hosting types along with their year of evolution and a comparison of the various features and infrastructure provided by these hosting services. Table-1: Evolution Of cloud Computing
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 673 7. CONCLUSIONS AND FUTURE SCOPE Cloud hosting is reliable, easily scalable and affordable hosting solution that differs from traditional hosting solutions in many aspects. Cloud computing is promising paradigm for IT services as computing utilities. This approach has several advantages over the traditional web hosting services and grid computing including higher security, lesser costs, better efficiency, and simplified data storage. It is clear that although the use of cloud computing has rapidly increased; cloud computing security is still considered the major issue in the cloud computing environment. Customers do not want to lose their private information as a result of malicious intruders in the cloud. Furthermore, data intrusion leads to many problems for the users of cloud computing. The purpose of this work is to survey the recent research on single clouds and multi-clouds to address the security risks and solutions. We have found that much research has been done to ensure the security of the single cloud and cloud storage whereas multi clouds have received less attention in the area of security. We support the migration to multi-clouds due to its ability to decrease security risks that affect the cloud computing user. REFERENCES [1]. H. Shacham, B. Waters (Dec 2008), "Compact proofs of retrievability", in Proc. of Asia crypt 2008, vol. 5350, pp. 90– 107 [2]. M.A. Shah, R. Swaminathan, M. Baker (2008), "Privacy preserving audit and extraction of digital contents" [3]. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou (2009), "Enabling public verifiability and data dynamics for storage security in cloud computing", in Proc. of ESORICS’09. [4]. Wang, K. Ren, W. Lou (2010), ―Achieving secure, scalable, and fine-grained access control in cloud computing‖, in Proc. of IEEE INFOCOM’10, San Diego. [5]. Cloud Security Alliance, (2009) ―Security guidance for critical areas of focus in cloud computing,‖ [6]. ― Design and Implementation of Virtual Private Services‖ Sotiris Ionnandis Steven M.Bellovin [7]. ―Internet Infrastructure Technology‖ Structure Research, September 2012. [8]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31. [9]. Amazon, Amazon Web Services. Web serviceslicensing agreement, October3, 2006 [10]. S.L. Garfinkel, "An evaluation of amazon’s grid computing services: EC2, S3, and QS", Technical Report TR- 08-07, Computer Science Group, Harvard University, Citeseer, 2007, pp. 1-15 [11]. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and ComputerApplications, 34(1), 2011, pp 1-11. [12]. M.A. AlZain and E. Pardede, "Using Multi Sharesfor Ensuring Privacy in Database-as-a-Service",44th Hawaii Intl. Conf. on System Sciences(HICSS), 2011, pp. 1-9. [13]. A. Bessani, M. Correia, B. Quaresma, F. André andP. Sousa, "DepSky: dependable and secure storage in a cloud-of- clouds", EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46. [14]. F. Rocha and M. Correia, "Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud", Proc. 1stIntl. Workshop of Dependability of Clouds, Data Centers and Virtual Computing Environments, 2011, pp. 1-6.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 674 [15]. H. Abu-Libdeh, L. Princehouse and H.Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium onCloud computing, 2010, pp. 229-240. [16]. C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Inter cloud", Research Report RZ,3783, 2010. [17]. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October2010, pp. 1-14. [18]. E. Grosse, J. Howie, J. Ransome, J. Reavis and S. Schmidt, "Cloud computing roundtable", IEEE Security & Privacy, 8(6), 2010, pp. 17-23. [19]. S. Kamara and K. Lauter, "Cryptographic cloud storage", FC'10: Proc. 14thIntl.Conf. on Financial cryptograpy and data security,2010, pp. 136-149. [20]. P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M. Dahlin and M. Walfish, "Depot: Cloud storage with minimal trust", OSDI'10: Proc. of the 9thUSENIX Conf. on Operating systems design and implementation, 2010, pp. 1-16. [21]. A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.Michalevsky and D. Shaket, "Venus: Verification for untrusted cloud storage", CCSW'10: Proc. ACM workshop on Cloud computing security workshop, 2010, pp. 19-30. [22]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31. [23]. M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", HotSec'10: Proc. 5thUSENIX Conf. on Hot topics in security, 2010, pp.1-8. [24]. K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahigh- availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp.187-198. [25]. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86. [26]. Clavister, "Security in the cloud", Clavister White Paper, 2008. [27]. T. Ristenpart, E. Tromer, H. Shacham and S.Savage, "Hey, you, get off of my cloud: exploring formation leakage in third-party compute clouds", CCS'09: Proc. 16thACM Conf. on Computer and communications security, 2009, pp.199-212. [28]. N. Santos, K.P. Gummadi and R. Rodrigues ,"Towards trusted cloud computing", USENIX Association, 2009, pp. 3- 9. [29]. C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuringdata Int. Conf. on Advances in Recent Technologies in. Proc.Int. Conf. on Advances in Recent Technologies in Communication and Computing, 2010, pp. 1-9. BIOGRAPHIES Manvi Mishra, Professor & Head, Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India. Isha Arora, Research Scholar, Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India Pooja Singh, Research Scholar, Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India Sugandha Prabhakar, Research Scholar , Department of Computer Science, Shri Ram Murti Smarak Women’s College Of Engineering and Technology, Bareilly, Uttar Pradesh, India