International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March – April 2014 ISSN 2278-6856
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March – April 2014 ISSN 2278-6856
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March – April 2014 ISSN 2278-6856
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 75
Abstract: This paper present a review on cloud computing. Cloud computing is becoming the hottest issue in IT world. Cloud computing is the Internet based computing where essential shared servers provide software, infrastructure, platform, devices and other resources and offering to customers on a pay-as-you- use basis. It is often said that the cloud computing is a type of computing where scalable, flexible, and supple IT abilities are provided as a service to multiple customers. The overall objective of this work is to evaluate the gaps in earlier work in cloud computing and finding the suitable solution for the same.
Keywords: XaaS, Cloud computing, Pay as you use, On- demand.
1. INTRODUCTION Cloud computing is one of the fieriest, evolving technology in the IT world. The term cloud is parallel to the Internet. But in actual cloud computing model, this means having all the software and data held on a server or a group of servers, and accessing them through the internet. In some cases the client is simply a device furnished with a nominal OS and running a web browser. Users can use these services available on the cloud without knowing how the managing of the resources is done. Thus the users can only focus on their processing rather than wasting time and attaining knowledge on the resources needed to cope up their processes. To view cloud computing is to think of the email account. To access the account, open the browser, go to the email client and simply log-in and the important part is to have the Internet access. The email account is not housed i.e. the whole of the Yahoo or Gmail software is not installed on the computer instead it is accessed by the Internet connection.
Figure 1: Cloud computing
2. CLOUD COMPUTING CHARACTERISTICS 2.1 On-Demand A basic idea of the cloud computing is to deliver the resources whenever there is need. From the users point of view the available computing resources are nearly unlimited i.e., the customer does not care about the set of servers located at one site thus it is the duty of the cloud computing provider to have adequate resources to fulfil the requests of all their customers. Employing computing resources on-demand is one of the most preferred abilities for a large number of enterprises because it removes the need for planning forward, acquiring, and fixing the resources they may require at some point in the future. This allows the customer to prevent making a needless investment in servers.
2.2 Pay-per-use In case of cloud computing the customer pays only on the basis of the usage whereas in the case of the traditional computing there is a need to locate the resources physically on the customer side. The cloud computing provides the facility of paying the service provider depending only on the use of the customer.
Figure 2: Cloud computing working
2.3 Rapid elasticity The cloud provider scales up or down the resources depending upon the specific of a service level agreement that are provided for the changing customer needs. This service defines the time for the cloud provider to response back. Such an contract is required by the cloud provider, because the cloud provider does not in fact have countless resources, so depending upon the service level agreement the provider has to discover a set of distributions of resources that fulfil the demands of their users otherwise the service level agreement require a penalty that the provider has to pay to each customer for not meeting the agreement.
2.4 Maintenance and upgrading The provider maintains the computing resource rather than the user. Thus the provider preserves and updates Review of Cloud Computing Environment
Amandeep Kaur 1 , Jasjit Kaur 2
1&2 Dept. of Computer Science & Engineering, Guru Nanak Dev University Amritsar, Punjab, 143001, India
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 76
the resources. Thus all improvement of the resources are hidden from the users view, but this might be true in the ideal case. Sometimes due to some of the reasons the customer is shifted from one platform to the other, in that case the customer may be provided with any resource.
3. CLOUD COMPUTING V/S GRID COMPUTING Cloud computing and grid computing are often considered to be same but they are quite different. Cloud computing comes from grid computing and provides on- demand resource to the user on the usage basis. If the users are systems managers and integrators, they do care how things are maintained in the cloud. However if the users are consumers, they do not. They are only concerned about the usage but not of the management of the cloud. Grid computing requires the use of software that can split and allocate fragments of a program as one large system copy to several thousand computers. The grids are homogeneous. The Grid are characteristically dispersed by its nature over a LAN, MAN or WAN. Grid computing is applicable on the resources of the computer to solve a single problem. The example of grid computing is SETI i.e. Search for Extra- terrestrial Intelligence @ Home project. With the help of SETI the unused cycles of the computers are used to search the signs of intelligence in the specified time. Another example of Grid Computing is Berkeley Open Infrastructure for Network Computing (BOINC). In this project the idle cycles of the CPU are used to do protein finding experiments.
4. CLOUD COMPUTING TYPES The clouds are of mainly four types.
4.1 Private Cloud The cloud infrastructure has been arranged, and is preserved and functioned for a specific organization. They are used by that group. A pure private cloud is built for the private use of one customer, who keeps and fully controls this cloud. The distinguishing feature of any private cloud is that the fact that the cloud is used by a specific customer. A private cloud might be maintained by the client, but built, fixed, and accomplished by a third party rather than the client. The physical servers might be situated at the customers sites. The substitute to a private cloud is a virtual private cloud. In such a virtual private cloud a customer is assigned a private cloud within the physical setup of a public cloud. Due to the sharing of definite resources within the cloud the customer can be guaranteed that their data stored on and processing is done only on devoted servers.
4.2 Public Cloud The cloud infrastructure is accessible to the public by a cloud service provider with the Internet connection. This allows a customer to use a service in the cloud with pay- as-you-go basis instead of purchasing the whole cloud. Community Cloud: The cloud infrastructure is shared between a large number of organizations with like interests and needs. This help in reducing the capital expenditure costs as the expenses are united among the organizations.
Figure 3: Deployment Models
4.3 Hybrid Cloud
Figure 4: Hybrid Cloud
The cloud infrastructure comprises of a number of clouds of any type, but the clouds have the capability through their interfaces to be transferred from one cloud to another. This can be a blend of private and public clouds that support the requirement to hold some data in an organization, and also the need to offer facilities in the cloud.
5. SERVICES Every service provider provides a specific function allowing user to have less or more control on the cloud depending on the type i.e. private, public, hybrid or community. The cloud need vary depending on how the cloud will be used i.e. the space and the resources related with the cloud. Cloud computing can be classified by the model of service it offers into many different groups. These are defined using the XaaS taxonomy, where X can be Software, Platform, or Infrastructure, and the final "S" is for Service.
In addition to above some professionals list the following building blocks of cloud computing: 1. Storage-as-a-Service 2. Database-as-a-Service International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
5.1 Software as a Service (SaaS) A SaaS provider gives subscribed or pay-as-you-use user access to both resources and services. SaaS makes it preventable to have a physical copy of software to install on the devices. SaaS makes easier to have the same software on all of your devices at once by accessing it on the cloud. In a SaaS agreement, one have the least control over the cloud. An example of SaaS is Google Docs. It is a group that is free for everyone to use. Creating accounts is free. By login-in access to the word processor, spreadsheet is given. These various online services provided by google are accomplished from the thin client i.e. web browser and requires no installation.
5.2 Platform as a Service (PaaS) A PaaS system is above the Software as a Service arrangement. A PaaS provider gives subscribers admission to the components that they require to grow and function applications over the internet. One of the common example of PaaS is Facebook. Designers and developers can generate any application for the Facebook platform using APIs and make that app available to the users.
5.3 Infrastructure as a Service An IaaS system deals mainly with computational infrastructure. It offers the subscriber to completely outsource the storage and resources that they want for computation. An example of IaaS is Amazon EC2. From the small to full-blown sites, it provided the cloud infrastructure facility to run them all.
Figure 5: Cloud Computing service Model
5.4 Software as a Service Software as a Service (SaaS) is the model in which an application is held as a service which is provided to customers who can have access to it via the Internet. When the software is presented off site, the customers dont have to uphold it or care for it. On the other hand, it is not in the customers hands when the hosting service decides to change it. The idea is to use the software as it is and it is not essential to make a lot of changes or require incorporation to other system. The provider does all the repairing and advancements as well as keeping the infrastructure running.
The cost for using the software is the on-going process i.e. the user pay for the service as much it is being used. Instead of paying it once, it is like the more the service is being used, the more it be billed. There are many types of software that offer themselves to the SaaS model. Customers who are not liable to perform software development but need applications, they use SaaS.
The most important benefit of SaaS is none other than costing less money rather than purchasing the whole application. Some of the benefits of SaaS are:
Figure 3: SaaS service provider
A. Familiarity with the World Wide Web: Almost everyone have access to the computer and knows how to use Internet. Thus helping the customers to use the services. Smaller Staff: IT systems generally requires small staff because of the overhead associated with the salaries and other benefits. The ability to host the applications reduces the need of such huge IT staff.
B. Customization: SaaS applications are easily customizable as compared to the older ones. Better Marketing: With the SaaS the applications are open to all the customers which was earlier difficult because the developer who has marketed the small application may have had a problem marketing the huge application.
C. Security: The Secure socket layer (SSL) is used. This allows the customers to reach their applications securely without having to hire complex back end configuration. More Bandwidth: As the bandwidth is increasing, this allows the users to access the applications with low latencies and good speeds.
D. Difficulties of SaaS: Like everything, SaaS also have some difficulties in its employment and use. It may be possible that an organization which has a specific need International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 78
may not available through SaaS. In that case they may have to buy the software as a whole and install on the specified machine. It may also be possible that the customer have paid for the application but later they are not able to port that application to the new vendor.
6. RELATED WORK Dong et al. (2013) [1] has studied that as with the progress of cloud computing, many applications have been reinforced to offer in the cloud computing, which in turn increase the availability. As the resources are generally dispersed, active and heterogeneous so first, a monitoring model of cloud computing resources availability is created and then, according to the dynamic process of the cloud computing service, the availability of cloud computing resources is investigated from QoS of a single cloud resource node which is defined by mutual attribution and special attribution to QoS of some cloud resources which are connected by series model, parallel model and mix model to provide service. According to the analysis of the each cloud service resource, the availability of cloud computing service is monitored.
Meng et al. (2013) [2] has analysed the cloud computing security in digital library. The cloud computing approach of library digital resources is defined, then a gatherings of databases and network resources is adopted to provide their service, then these resources and facilities are placed in the cloud. And then the cloud key distribution scheme to opt to library applications is done. The better traditional PKI, the PKI-based cloud computing communication and secrecy protection mechanisms for library are introduced.
Chalse et al. (2013) [3] has analysed the cloud security problem, the various issues in a cloud computing system and their effect upon the different cloud users. As the cloud computing environment is constructed based on open Architecture and interface so the various computing system and their outcome upon the system, upon organizations and also upon different cloud operators are analysed. A view of activities that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing are also presented.
Jaber et al. (2013) [4] has demonstrated that the cloud computing i.e. the cloud computing is gaining popularity in every field. Also the cloud computing initiated from a commercial enterprise notion, and established into a healthy IT creation. In fact the cloud computing is ahead but, customers remain hesitant to organise their commercial enterprise into the cloud which is due to the lack of protection. The main reason is the complexity which is involved in managing the information on the cloud. So the different cryptography aspects that cause a threat to the cloud computing environment should be known to the user.
Guan et al. (2013) [5] has discussed the gaining popularity of cloud computing and the various problems associated with the hardware and software faults and the various factors such as environmental. To identify strange cloud behaviours, the cloud execution is monitored and runtime performance data is collected. The collected data consists of performance metrics for different types of failures, which display different correlations with the performance metrics. This paper has proposed the mechanism that discovers the components of different failure types in cloud computing infrastructures. It also discussed the performance metric by examining the techniques to attain efficient identification.
Zhang et al. (2013) [6] has discussed that the Cloud computing as typical Internet-based applications is lacking in carrier-grade signalling control mechanism and cannot guarantee Quality of Service (QoS), which is in turn a barrier for telecom operator. On the other side, as the core signalling architecture of Next Generation Networking (NGN), IP Multimedia Subsystem (IMS) is facing the difficulty of the absence of innovative value- added services. This paper has proposed an architecture to provision cloud computing services over IMS. The cloud services are considered as the common IMS applications and then cloud customers are allowed to access cloud services under the control of Session Initiation Protocol (SIP) signalling and QoS mechanism of IMS.
Guan et al. (2012) [7] has discussed the gaining popularity of cloud computing and the various problems associated with the hardware and software faults and the various factors such as environmental. Dependability guarantee is critical for constructing justifiable cloud computing services. As the virtualization is an enabling technology for the cloud, it is important to explore the effect of virtualization on the cloud dependability. The cloud dependability analysis (CDA) framework with methods to describe failure behaviour in cloud computing infrastructures is proposed. The failure-metric DAGs (directed a cyclic graph) to examine the relationship of several performance metrics with failure actions in virtualized and non-virtualized systems is also proposed. The generated DAGs in the two environments are compared to examine the impact of virtualization on the cloud dependability.
Liu, W. (2012) [8] has studied the cloud computing. The cloud computing is related to the other computings such as grid computing, distributed computing, parallel computing and so on. As the cloud computing is related to the data storage, reliability and services so the security is the main concern of the cloud computing. The security can avert the speedy growth of cloud computing. This International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 79
paper discusses the few cloud computing systems and investigates cloud computing security issues and its policies according to the cloud computing concepts and characters. As the single security method cannot resolve the cloud computing security issue so many traditional and new technologies and strategies should be used in a collective manner for protecting the total cloud computing system.
Zhao, Wei, et al. (2012) [9] has discussed that the cloud computing delivers computing resources as a service over a web. As it is the emerging technology, it becomes essential to evaluate the performance and security issues that cloud computing meets. Currently, demonstrating and imitation technology has become an influential tool in cloud computing research group to handle these issues. This paper states that there are two types of cloud computing simulators, that is, simulators just based on software and simulators based on both software and hardware.
Xin et al. (2012) [10] has studied the concept of cloud computing and stated that it is considered to be the next generation of information technology framework. It can deliver dynamic resource pools, virtualization and high obtainability. The new development comes with lots of new challenges also.as a result a secure computing environment should be built. The method to make secure cloud computing is the multi-dimension architecture. It is a three layer model .at the first the user authentication is essential to confirm that user data cannot be tampered.
Mollah et al. (2012) [11] has studied the cloud computing which is one of the evolving topic in the field of information technology. It focus on all computation resources and manage mechanically through the software without interference. As there are different layers present in the cloud computing architecture, service types etc. as a result the architecture, advantages, platforms, issues and challenges, etc. are studied. The four generations of computing such as mainframe based computing, personal computing, client server based computing and web server based computing respectively has its own pros and cons. Thus the cloud computing is the next generation of the computing services.
Sim and Mong (2012) [12] examined the Agent-based cloud computing which is related with the design and development of software agents for enhancing cloud service discovery, service etc. An agent-based model for constructing software tools and test beds for cloud resource management. Agent-based cloud computing introduces the developing of Cloudle: an agent-based search engine for cloud service detection, showing that agent-based co-operation mechanisms can be efficiently accepted for boosting cloud service co-operation and cloud business, and presenting that agent-based cooperative problem-solving techniques can be effectively adopted for automating cloud service composition. For the cloud business, this developed a multifaceted cloud negotiation mechanism that supports parallel negotiation activities in interrelated markets: a cloud service market between consumer agents and dealer agents, and multiple cloud resource markets between broker agents and provider agents.
7. GAPS IN EARLIER WORK The survey has shown that the most of the existing researchers has neglected at least one of the followings:- a. The use of scalability in software has been neglected by many researchers. b. The scalability of the number of cloud user has also been neglected. c. The effect of the response time has also been neglected.
8. CONCLUSION AND FUTURE WORK The survey has shown that the most of the existing researchers has neglected the scalability of cloud users in cloud computing environment. The response time of the users has also found to be a critical issue in cloud computing. So in near future we will extend this work to overcome the scalability issue of cloud computing either in SaaS or in the number of users.
References [1] Dong, Wang En, Wu Nan, and Li Xu. "QoS-Oriented Monitoring Model of Cloud Computing Resources Availability." Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on. IEEE, 2013. [2] Meng, Qingjie, and Changqing Gong. "Research of cloud computing security in digital library." Information Management, Innovation Management and Industrial Engineering (ICIII), 2013 6th International Conference on. Vol. 2. IEEE, 2013. [3] Chalse, Rajkumar, Ashwin Selokar, and Arun Katara. "A New Technique of Data Integrity for Analysis of the Cloud Computing Security." Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on. IEEE, 2013. [4] Jaber, Aws Naser, and Mohamad Fadli Bin Zolkipli. "Use of cryptography in cloud computing." Control System, Computing and Engineering (ICCSCE), 2013 IEEE International Conference on. IEEE, 2013. [5] Guan, Qiang, and Song Fu. "Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures." Reliable Distributed Systems (SRDS), 2013 IEEE 32nd International Symposium on. IEEE, 2013. [6] Zhang, W., Lei, W., Chen, X., & Liu, S. (2013, June). Architecture and Key Issues of IMS-Based Cloud Computing. In Cloud Computing (CLOUD), International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 80
2013 IEEE Sixth International Conference on (pp. 629-635). IEEE. [7] Guan, Qiang, Chi-Chen Chiu, and Song Fu. "CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures." Dependable Computing (PRDC), 2012 IEEE 18th Pacific Rim International Symposium on. IEEE, 2012. [8] Liu, Wentao. "Research on cloud computing security problem and strategy."Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on. IEEE, 2012. [9] Zhao, Wei, et al. "Modeling and simulation of cloud computing: A review." Cloud Computing Congress (APCloudCC), 2012 IEEE Asia Pacific. IEEE, 2012. [10] Xin, Zhang, Lai Song-qing, and Liu Nai-wen. "Research on cloud computing data security model based on multi-dimension." Information Technology in Medicine and Education (ITME), 2012 International Symposium on. Vol. 2. IEEE, 2012. [11] Mollah, Muhammad Baqer, Kazi Reazul Islam, and Sikder Sunbeam Islam. "Next generation of computing through cloud computing technology." Electrical & Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference on. IEEE, 2012. [12] Sim, Kwang Mong. "Agent-based cloud computing." Services Computing, IEEE Transactions on 5.4 (2012): 564-577.
AUTHORS
Amandeep Kaur is an assistant professor in the Department of Computer Science and Engineering, Guru Nanak Dev University, Amritsar Punjab India. She has done B.Tech from Beant College of engineering and technology and M.Tech from Guru Nanak Dev University, Amritsar in 2011. Her research interests include Cloud Computing.
Jasjit Kaur is a student of Department in Computer Science and Engineering, Guru Nanak Dev University, Amritsar Punjab India. She completed her B.Tech in Information Technology in 2012 from Global Institutes of Management and Emerging Technologies. Now she is M.Tech student. Her research interests include Cloud Computing.