SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 364
REMINISCING CLOUD COMPUTING TECHNOLOGY
Brijesh Goyal1
, Pallavi Jain2
1,2
Student, Computer Science & Engineering, DCRUST, Haryana, India, vickyaggarwal28@gmail.com
Abstract
Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts
about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for
further empirical work in modeling cloud computing technologies
Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud Computing technology is On-demand network access
to a shared pool of computing resources. This access is
provided when online from a web-browser. The motive of
such access is to provide user a convenient work-place.
Cloud computing is a technology introduced to reduce
„Headache‟ on user-side.
Cloud computing is combination of two terms: Cloud &
Computing. Cloud is the Network. A network is a bulk of
thousands of users. These users may or may not be
connected. If they are connected, there will be one of model
formed, discussed further. The cloud also consists of Server
& a Database. Server is also known as Cloud-Provider;
while Database is a collection of user-details and
applications to be worked upon by users. Computing is the
term used for services of cloud.
Another main defining characteristic of cloud computing
technology is concluded in a phrase as
“User pays what he need”
2. OBJECTIVES
Our main objectives for the research are as follows:
 To understand the current state of knowledge in a
research area
o What is known/generally accepted
o What questions remain unanswered
o Where do conflicting results exist
 To show how the current research project is linked
to previous research (cumulative tradition).
 To summarize and synthesize previous research
 To critically analyze previous research: strengths
and weaknesses
 To learn from others and stimulate ideas
3. UNDERSTANDING ORIGIN OF CC
It is observed that Peer-to-peer computing cloud not be
introduced in Grid computing. So, Cluster computing was
collaborated with Client-Server computing, resulting into
emerging Cloud Computing.
Cloud computing components are infrastructure, softwares,
applications, business and humans (server/client). In other
words,
CC  Components + Services
Services provided are Easy-to-use, Fast-to-use and Ready-
to-use.
4. KEY FEATURES OF CC
A. No efforts from user side.
Installation, configuration, testing, running, securing,
updating are cloud provider headache not users‟.
B. Zero Maintenance for Client.
Web-store i.e. CC applications are maintained by cloud-
provider.
C. Open browser  login  customize application
 start using service
D. Least investment.
Enterprise pays for infrastructure and environment set up.
E. Reliable network.
F. Customizations preserved during upgrades
G. Flexibility in data manipulation
H. Fast application deployment.
I. Built-in security provided.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 365
5. BASIC PARAMETERS TO ESTABLISH CC
Before establishing cloud computing, some parameters are
decided to be covered. Above of all is empowering basic
customizations and integrations. Cloud computing should
also support Real-time reporting of failures. The technology
is categorized into sharing models.
As the cloud users exist globally, so multiple languages and
currency payments facility must also available.
Finally, comes the part of Security and Privacy. It is
managed by several strategies. It is the most basic property
of cloud computing technology, as success of large
Database storage establishment relies on security and
privacy rule-book only.
Ease-of-use decides level of cloud provided by any
enterprise.
6. CONCLUDING DEFINITIONS FOR CC
On-demand Self-service
It is stated that decisions for automated payments, resources
procured and disposed of by customer himself.
Resource Pooling
By using Virtualization technique, cloud provider pools
the computing resources. It is the best way to attract
clients towards particular cloud.
Broad network access
Some interfaces are standardized so as to make services
available over the network.
Calculated Services
Customer payment mode is available, which is based on
criteria of Pay-per-use.
7. MODELLING OF CLOUD COMPUTING
After years of debates, the resulted models categorized for
cloud technology are:
1) Delivery Models
a) Software-As-A-Service (SAAS)
b) Platform-As-A-Service (PAAS)
c) Interface-As-A-Service (IAAS)
 SAAS is a model where user can control some of
application configurations only.
 PAAS model is defined when user can control
deployment platform & some environment
configuration.
 IAAS model is where user can control Operating
System, storage and some networking components.
2) Development Models
d) Commercial cloud
e) Scientific cloud
f) Business cloud
 Commercial cloud is established where individual
use per cloud exists.
 Scientific cloud is based on Use of cloud for
particular field.
 Business cloud as per by name, relies only for
business strategies and development purposes.
There are more development models being categorized day
by day.
3) Deployment Models
g) Public cloud
h) Private cloud
i) Community cloud
j) Hybrid cloud
This is better way to categorize development models, as
these are based on Client-categorization.
Characteristics describing deployment models are:
who manages, who owns, where located & who
accesses.Table 1 shows a summary for 4 primary cloud
deployment models. This summary is not a categorization, it
is for initial modeling purposes.
 Public clouds are defined over very large scale. As per by
name shows, it is for general public so such clouds are
considered to be Untrusted. The users are not meant to be
member of organization providing cloud.
 Private clouds are established for single enterprise. Here the
users are considered to be trusted as they are tied into some
contractual agreement done before being member. “The
physical infrastructure may be owned by and/or physically
located in the organization‟s datacenters (on-premise) or
that of a designated service provider (off-premise) with an
extension of management and security control planes
controlled by the organization or designated service
provider respectively” (Bardin, Callas, Chaput et al. 2009)
 Community clouds have deployment characteristics similar
to Private clouds. Its users are also considered to be trusted.
But the difference come where the clients are divided into
some Specific groups called Communities.
 Hybrid clouds are combinations of public, private
or/and community clouds. These are connected to each other
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 366
through gateway. The highlight feature of hybrid is that
untrusted access to resources is strictly prohibited.
8. EXPLORING CLOUD COMPUTING TOOLS
AND PRODUCTS
Although Cloud computing technology is provided by
almost all corporate enterprises, still some of them are listed
as below:
IBM Blue-cloud Platform
Microsoft Live Meeting
Microsoft Share Point Online
TPlatform (TFS
Hadoop, VMWare, Eucalyptus
GoogleFileSystem (GFS)
KosmosFS
...and many more.
The reputed companies which provide online facility of
cloud computing are:
Google, Yahoo, IBM, Oracle, HP, HCL, TCS, Hitachi,
Netmagic, Novell VMWare, Ramco, Cognizant, CRMOrbit,
ZOHO.
TrendMicro, CSS and ZScaler are famous industries to
provide Cloud Security environment.
Amazon is one of leading company in Cloud Computing
providers. Amazon offers Virtual Private Clouds, that use
public cloud infrastructure in a private manner, connecting
the public cloud resources to the organizations internal
network (Amazon 2009b).
CONCLUSIONS
This paper gives a conclusion of our Review work on Cloud
Computing. CC is the latest technology used to provide
reliable platform for customers. No need to invest huge
money in setting up infrastructure. Enterprise and
companies pay for services based on client Usage. It‟s kind
of „money-back-guarantees‟. User has no worry about
Resource Management. Flexibility in data manipulation is
available. Collaboratively working on common projects.
Privacy and security satisfaction
Cloud computing preserves all customizations even during
Upgrades. Cloud Computing technology has one primary
demerit, it is that the OFFLINE access for CC is still not
possible.
FUTURE WORK
The paper gave brief view about all sorts of Cloud Models.
In future, deployment models can be introduces on basis of
Enhancement in Security of Database or Networks.
A proposal for „Protected Cloud‟ is being introduced here.
Next publication will be on the Protected Cloud Framework
by the same concerned Authors.
ACKNOWLEDGEMENTS
This work is partially supported by Capgemini Thesis works
(Guido Kok) May 24, 2010. The conclusion is given after
reviewing referenced papers and journals.
REFERENCES:
A list of all references is given as below. No citation
number is provided throughout this paper because each line
is concluded from these references.
[1] Dr. W. Pieters and Dr. P. H. Hartel “Cloud comuting
and confidentiality” thesis in Capgemini, Guido Kok,
May 24, 2010.
[2] Workshop on Cloud computing at IIT Madras, Chennai,
India on August 18-20, 2010 by IEEE.
[3] Amazon. (2009b). Amazon Virtual Private Cloud
(Amazon VPC). Retrieved December 28, 2009.
[4] AIS. (2009b). Journal of the Association for
Information Systems. Retrieved July 27, 2009.
[5] Kesh, S. and Ratnasingam, P. (2007). A knowledge
architecture for IT security. Communications of the
ACM.
[6] The Benefits of Cloud Computing by IBM, July, 2009.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 367
[7] NIST. (2004a). FIPS 199: Standards for Security
Categorization of Federal Information and Information
Systems. Retrieved August 28, 2009.
[8] NIST. (2009). National Institute of Standards and
Technology, main website. From http://www.nist.gov.
BIOGRAPHIES:
Brijesh Goyal M.Tech (Final Yr.)
Computer Science & Engineering Dept.
DCRUST, Murthal (Sonipat) Haryana,
India. e-mail:
vickyaggarwal28@gmail.com
Pallavi Jain M.Tech (Final Yr.)
Computer Science & Engineering Dept.
DCRUST, Murthal (Sonipat), Haryana,
India e-mail: palkujain13@gmail.com

More Related Content

DOCX
Cloud computing seminar report
PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
Group seminar report on cloud computing
PDF
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
PDF
A Survey on Cloud Computing Security – Challenges and Trust Issues
PDF
Requirements and Challenges for Securing Cloud Applications and Services
PDF
D045031724
PDF
Cloud Computing- Proposal (Autosaved)
Cloud computing seminar report
International Journal of Engineering Research and Development (IJERD)
Group seminar report on cloud computing
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
A Survey on Cloud Computing Security – Challenges and Trust Issues
Requirements and Challenges for Securing Cloud Applications and Services
D045031724
Cloud Computing- Proposal (Autosaved)

What's hot (16)

PDF
Understanding the Cloud Computing: A Review
PDF
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
PDF
A Virtualization Model for Cloud Computing
DOCX
Cloud computing report
PDF
Cloud Computing in Resource Management
PDF
A proposal for implementing cloud computing in newspaper company
PDF
Cloud Computing and Security Issues
RTF
seminar on cloud computing report
PDF
Addressing the cloud computing security menace
PDF
D32035052
PDF
Cloud computing security through symmetric cipher model
DOC
Cloud computing report
PDF
Cloud Computing: Overview & Utility
PDF
Security of Data in Cloud Environment Using DPaaS
PDF
Enhancing Data Integrity in Multi Cloud Storage
PDF
Ijarcet vol-2-issue-3-1128-1131
Understanding the Cloud Computing: A Review
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
A Virtualization Model for Cloud Computing
Cloud computing report
Cloud Computing in Resource Management
A proposal for implementing cloud computing in newspaper company
Cloud Computing and Security Issues
seminar on cloud computing report
Addressing the cloud computing security menace
D32035052
Cloud computing security through symmetric cipher model
Cloud computing report
Cloud Computing: Overview & Utility
Security of Data in Cloud Environment Using DPaaS
Enhancing Data Integrity in Multi Cloud Storage
Ijarcet vol-2-issue-3-1128-1131
Ad

Viewers also liked (20)

PDF
Matlab based comparative studies on selected mppt
PDF
Analysis of factors contributing delays and claims in
PDF
Analysis of methane diffusion flames
PDF
No sql databases new millennium database for big data, big users, cloud compu...
PDF
Resource potential appraisal assessment and to
PDF
Design of fuzzy logic controller for starch
PDF
Optimization of friction stir welding process
PDF
Power balancing optimal selective forwarding
PDF
A review on managed aquifer recharge by check dams a case study near chennai,...
PDF
Response sensitivity of the structure using vibration
PDF
Performance comparison of row per slave and rows set
PDF
Analysis of physical characteristics of bamboo
PDF
Effects of non ionized electromagnetic radiation on satellites
PDF
Static analysis of c s short cylindrical shell under internal liquid pressure...
PDF
A novel approach for efficient skull stripping using
PDF
Estimation of surface runoff in nallur amanikere
PDF
Technical engineering in industrial ippc as a key tool for ambient air qualit...
PDF
A novel hybrid communication technique involving power line communication and...
PDF
Dynamic interaction of mobile device and database for
PDF
Biosorption of hg (ii) from aqueous solutions
Matlab based comparative studies on selected mppt
Analysis of factors contributing delays and claims in
Analysis of methane diffusion flames
No sql databases new millennium database for big data, big users, cloud compu...
Resource potential appraisal assessment and to
Design of fuzzy logic controller for starch
Optimization of friction stir welding process
Power balancing optimal selective forwarding
A review on managed aquifer recharge by check dams a case study near chennai,...
Response sensitivity of the structure using vibration
Performance comparison of row per slave and rows set
Analysis of physical characteristics of bamboo
Effects of non ionized electromagnetic radiation on satellites
Static analysis of c s short cylindrical shell under internal liquid pressure...
A novel approach for efficient skull stripping using
Estimation of surface runoff in nallur amanikere
Technical engineering in industrial ippc as a key tool for ambient air qualit...
A novel hybrid communication technique involving power line communication and...
Dynamic interaction of mobile device and database for
Biosorption of hg (ii) from aqueous solutions
Ad

Similar to Reminiscing cloud computing technology (20)

PPTX
cloud computing module 1 for seventh semester
PDF
Cloud computing and its security aspects
PDF
Addressing the cloud computing security menace
PDF
Addressing the cloud computing security menace
PDF
Cloud Computing: Overview and its Deployment Model
PPT
Cloud Computing MODULE 1 basics of cloud computing .ppt
DOCX
Cloud notes 1
PDF
IRJET - Cloud Computing Application
PDF
Cloud Computing
PPTX
Cloud Computing power point presentation.pptx
PDF
International Journal of Computational Engineering Research(IJCER)
PPTX
Cloud computing
PPT
Cloud computing
PDF
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
PDF
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
PDF
Challenges and benefits for adopting the paradigm of cloud computing
PDF
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
PDF
Latest development of cloud computing technology, characteristics, challenge,...
PPTX
Cloud is not an option, but is security?
PPTX
Introduction on Cloud Computing
cloud computing module 1 for seventh semester
Cloud computing and its security aspects
Addressing the cloud computing security menace
Addressing the cloud computing security menace
Cloud Computing: Overview and its Deployment Model
Cloud Computing MODULE 1 basics of cloud computing .ppt
Cloud notes 1
IRJET - Cloud Computing Application
Cloud Computing
Cloud Computing power point presentation.pptx
International Journal of Computational Engineering Research(IJCER)
Cloud computing
Cloud computing
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges and benefits for adopting the paradigm of cloud computing
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Latest development of cloud computing technology, characteristics, challenge,...
Cloud is not an option, but is security?
Introduction on Cloud Computing

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
composite construction of structures.pdf
PPTX
Geodesy 1.pptx...............................................
PPT
Project quality management in manufacturing
PPTX
web development for engineering and engineering
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Welding lecture in detail for understanding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
UNIT 4 Total Quality Management .pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
additive manufacturing of ss316l using mig welding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
composite construction of structures.pdf
Geodesy 1.pptx...............................................
Project quality management in manufacturing
web development for engineering and engineering
Operating System & Kernel Study Guide-1 - converted.pdf
Digital Logic Computer Design lecture notes
Welding lecture in detail for understanding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
UNIT 4 Total Quality Management .pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx

Reminiscing cloud computing technology

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 364 REMINISCING CLOUD COMPUTING TECHNOLOGY Brijesh Goyal1 , Pallavi Jain2 1,2 Student, Computer Science & Engineering, DCRUST, Haryana, India, vickyaggarwal28@gmail.com Abstract Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for further empirical work in modeling cloud computing technologies Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud Computing technology is On-demand network access to a shared pool of computing resources. This access is provided when online from a web-browser. The motive of such access is to provide user a convenient work-place. Cloud computing is a technology introduced to reduce „Headache‟ on user-side. Cloud computing is combination of two terms: Cloud & Computing. Cloud is the Network. A network is a bulk of thousands of users. These users may or may not be connected. If they are connected, there will be one of model formed, discussed further. The cloud also consists of Server & a Database. Server is also known as Cloud-Provider; while Database is a collection of user-details and applications to be worked upon by users. Computing is the term used for services of cloud. Another main defining characteristic of cloud computing technology is concluded in a phrase as “User pays what he need” 2. OBJECTIVES Our main objectives for the research are as follows:  To understand the current state of knowledge in a research area o What is known/generally accepted o What questions remain unanswered o Where do conflicting results exist  To show how the current research project is linked to previous research (cumulative tradition).  To summarize and synthesize previous research  To critically analyze previous research: strengths and weaknesses  To learn from others and stimulate ideas 3. UNDERSTANDING ORIGIN OF CC It is observed that Peer-to-peer computing cloud not be introduced in Grid computing. So, Cluster computing was collaborated with Client-Server computing, resulting into emerging Cloud Computing. Cloud computing components are infrastructure, softwares, applications, business and humans (server/client). In other words, CC  Components + Services Services provided are Easy-to-use, Fast-to-use and Ready- to-use. 4. KEY FEATURES OF CC A. No efforts from user side. Installation, configuration, testing, running, securing, updating are cloud provider headache not users‟. B. Zero Maintenance for Client. Web-store i.e. CC applications are maintained by cloud- provider. C. Open browser  login  customize application  start using service D. Least investment. Enterprise pays for infrastructure and environment set up. E. Reliable network. F. Customizations preserved during upgrades G. Flexibility in data manipulation H. Fast application deployment. I. Built-in security provided.
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 365 5. BASIC PARAMETERS TO ESTABLISH CC Before establishing cloud computing, some parameters are decided to be covered. Above of all is empowering basic customizations and integrations. Cloud computing should also support Real-time reporting of failures. The technology is categorized into sharing models. As the cloud users exist globally, so multiple languages and currency payments facility must also available. Finally, comes the part of Security and Privacy. It is managed by several strategies. It is the most basic property of cloud computing technology, as success of large Database storage establishment relies on security and privacy rule-book only. Ease-of-use decides level of cloud provided by any enterprise. 6. CONCLUDING DEFINITIONS FOR CC On-demand Self-service It is stated that decisions for automated payments, resources procured and disposed of by customer himself. Resource Pooling By using Virtualization technique, cloud provider pools the computing resources. It is the best way to attract clients towards particular cloud. Broad network access Some interfaces are standardized so as to make services available over the network. Calculated Services Customer payment mode is available, which is based on criteria of Pay-per-use. 7. MODELLING OF CLOUD COMPUTING After years of debates, the resulted models categorized for cloud technology are: 1) Delivery Models a) Software-As-A-Service (SAAS) b) Platform-As-A-Service (PAAS) c) Interface-As-A-Service (IAAS)  SAAS is a model where user can control some of application configurations only.  PAAS model is defined when user can control deployment platform & some environment configuration.  IAAS model is where user can control Operating System, storage and some networking components. 2) Development Models d) Commercial cloud e) Scientific cloud f) Business cloud  Commercial cloud is established where individual use per cloud exists.  Scientific cloud is based on Use of cloud for particular field.  Business cloud as per by name, relies only for business strategies and development purposes. There are more development models being categorized day by day. 3) Deployment Models g) Public cloud h) Private cloud i) Community cloud j) Hybrid cloud This is better way to categorize development models, as these are based on Client-categorization. Characteristics describing deployment models are: who manages, who owns, where located & who accesses.Table 1 shows a summary for 4 primary cloud deployment models. This summary is not a categorization, it is for initial modeling purposes.  Public clouds are defined over very large scale. As per by name shows, it is for general public so such clouds are considered to be Untrusted. The users are not meant to be member of organization providing cloud.  Private clouds are established for single enterprise. Here the users are considered to be trusted as they are tied into some contractual agreement done before being member. “The physical infrastructure may be owned by and/or physically located in the organization‟s datacenters (on-premise) or that of a designated service provider (off-premise) with an extension of management and security control planes controlled by the organization or designated service provider respectively” (Bardin, Callas, Chaput et al. 2009)  Community clouds have deployment characteristics similar to Private clouds. Its users are also considered to be trusted. But the difference come where the clients are divided into some Specific groups called Communities.  Hybrid clouds are combinations of public, private or/and community clouds. These are connected to each other
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 366 through gateway. The highlight feature of hybrid is that untrusted access to resources is strictly prohibited. 8. EXPLORING CLOUD COMPUTING TOOLS AND PRODUCTS Although Cloud computing technology is provided by almost all corporate enterprises, still some of them are listed as below: IBM Blue-cloud Platform Microsoft Live Meeting Microsoft Share Point Online TPlatform (TFS Hadoop, VMWare, Eucalyptus GoogleFileSystem (GFS) KosmosFS ...and many more. The reputed companies which provide online facility of cloud computing are: Google, Yahoo, IBM, Oracle, HP, HCL, TCS, Hitachi, Netmagic, Novell VMWare, Ramco, Cognizant, CRMOrbit, ZOHO. TrendMicro, CSS and ZScaler are famous industries to provide Cloud Security environment. Amazon is one of leading company in Cloud Computing providers. Amazon offers Virtual Private Clouds, that use public cloud infrastructure in a private manner, connecting the public cloud resources to the organizations internal network (Amazon 2009b). CONCLUSIONS This paper gives a conclusion of our Review work on Cloud Computing. CC is the latest technology used to provide reliable platform for customers. No need to invest huge money in setting up infrastructure. Enterprise and companies pay for services based on client Usage. It‟s kind of „money-back-guarantees‟. User has no worry about Resource Management. Flexibility in data manipulation is available. Collaboratively working on common projects. Privacy and security satisfaction Cloud computing preserves all customizations even during Upgrades. Cloud Computing technology has one primary demerit, it is that the OFFLINE access for CC is still not possible. FUTURE WORK The paper gave brief view about all sorts of Cloud Models. In future, deployment models can be introduces on basis of Enhancement in Security of Database or Networks. A proposal for „Protected Cloud‟ is being introduced here. Next publication will be on the Protected Cloud Framework by the same concerned Authors. ACKNOWLEDGEMENTS This work is partially supported by Capgemini Thesis works (Guido Kok) May 24, 2010. The conclusion is given after reviewing referenced papers and journals. REFERENCES: A list of all references is given as below. No citation number is provided throughout this paper because each line is concluded from these references. [1] Dr. W. Pieters and Dr. P. H. Hartel “Cloud comuting and confidentiality” thesis in Capgemini, Guido Kok, May 24, 2010. [2] Workshop on Cloud computing at IIT Madras, Chennai, India on August 18-20, 2010 by IEEE. [3] Amazon. (2009b). Amazon Virtual Private Cloud (Amazon VPC). Retrieved December 28, 2009. [4] AIS. (2009b). Journal of the Association for Information Systems. Retrieved July 27, 2009. [5] Kesh, S. and Ratnasingam, P. (2007). A knowledge architecture for IT security. Communications of the ACM. [6] The Benefits of Cloud Computing by IBM, July, 2009.
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 03 | Nov-2012, Available @ http://www.ijret.org 367 [7] NIST. (2004a). FIPS 199: Standards for Security Categorization of Federal Information and Information Systems. Retrieved August 28, 2009. [8] NIST. (2009). National Institute of Standards and Technology, main website. From http://www.nist.gov. BIOGRAPHIES: Brijesh Goyal M.Tech (Final Yr.) Computer Science & Engineering Dept. DCRUST, Murthal (Sonipat) Haryana, India. e-mail: vickyaggarwal28@gmail.com Pallavi Jain M.Tech (Final Yr.) Computer Science & Engineering Dept. DCRUST, Murthal (Sonipat), Haryana, India e-mail: palkujain13@gmail.com