SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 508
A Detailed Study and Analysis of Cloud Computing usage with Real-
Time Applications
VALARMATHI V1, KOWSALYA N2
1Assistant Professor, Department of Information Technology, Sri Krishna Arts and Science College,
Coimbatore, India
2Student, III Bsc (IT) A, Department of Information Technology, Sri Krishna Arts and Science College,
Coimbatore, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Cloud Computing has come of its age since
Amazon uses its first kind of cloud services in 2006. Cloud
computing is an excellent new platformforthedevelopment of
conceptual solution. It is helpful in sharing resources to
achieve economic of scale. It is typically a combination of
hardware and software that works together to deliver many
aspects of the end user .In this paper, we explode the
characteristics of cloud and the three levels of service models
that works effectively on cloud. This paper addresses the main
three types of cloud and in which way they work efficiently on
real time. And it also deals with the advantages and
limitations of cloud computing. This paper discuss about the
major useful technology that we deal in our day-to-day life
with some examples. However, the security and privacy plays
the major role for the users who tries to adapt to the cloud
computing. This paper investigates about the various kinds of
security control.
Key Words: cloud computing, characteristics,
architecture, deployment, limitations, security control.
1. INTRODUCTION
Cloud Computing depends on sharing of resources
to experience coherence and achievement. The unknown
cloud users enable organizations to focus on their core
businesses instead of expending resources on computer
infrastructure and maintenance. Cloud Computing is an
excellent platform for the development of conceptual
solution. Cloud Computing is helpful on sharing ofresources
to achieve economic of scale. Cloud Computing allows the
companies to avoid infrastructure costs. It is the usage of
hardware and software through a network. The cloud is
typically a combination of different types of hardware and
software that works collectively to deliver many aspects of
the end user.
Organization:
The remaining paper is organized as follows: In
Section 2, we define the characteristicsofa cloudcomputing.
In Section 3, we define the architectural component of a
cloud computing which includes Infrastructure as a Service
(IaaS), Software as a Service (SaaS), Platform as a Service
(PaaS). Section 4, explains the deployment model of Cloud
Computing. Section 5, explains the limitations and
advantages followed by some examples in section 6. We
future explain the some security control in section 7,
followed by the conclusion in the section 8.
2. CHARACTERISTICS
Cloud computing delivers the following key
characteristics:
Cloud computing increases the user’s flexibility. The Cost
reductions can be claimed by cloud providers. The Device
and location independence enable users to access systems
using a web browser irrespective of their location or what
device they use (e.g., PC, mobile phone).The Maintenance of
cloud computing applications will be easier. A Multiple
tenant enables sharing of resources and costs across a large
number of users.
It results in:
 Centralization of infrastructure with lower costs
(example: electricity, etc.)
 The peak-load capacity increases (As they need not
to be an engineer and buy the largest equipment).
 Utilization and efficiency improves the systems.
Performance is monitored by IT experts from the
amenity supplier. Productivity may be increased when
multiple users can work on the same data concurrently,
rather than waiting for it to be saved and emailed. Time may
be saved. Reliability and scalability may be improved.
Security has been improved due to thecentralizationofdata.
[2]
Fig -1: Cloud Computing characteristics
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 509
3. ARCHITECTURAL COMPONENT
The three most commonly used acronyms in the
cloud computing are: SaaS, PaaS, IaaS. These are
interdependent and it is also called as three tier model.
These three model distinguish between the primary cloud
computing. In other word SaaS, PaaS, IaaS are the main
criteria for cloud computing. The layers of the model are
portrayed in a stack. [4]
Fig -2: Architecture of an service model
3.1 Infrastructure as a Service
Infrastructure as a Service (IaaS) is the lowest level
cloud services and it is the most importantone.Iaasdoes not
include application or even an operating system, whereas
SaaS, PaaS includes application and operating system. Iaas
provide a large number of storage for corporate data
backups, network bandwidth for a company website server.
Sometimes it enables access to high powercomputingwhich
has been previously accessed by the supercomputing. The
most popular IaaS offerings are: Amazon E2C,IBMsoftlayer,
Google’s Compute Engine (GCE). It refers to online services,
which is used to network infrastructure like physical
computing resources, data partitioning, security, etc.Itoften
includes additional resources like virtual machine, server
storage. As it is the lowest layer of abstract model, it must be
transparent to the consumer.
3.2 Platform as a Service
Platform as a Service (PaaS) is the intermediate
layer of the conceptual model. It provides the consumer
operating system, software development platforms,
programming language. This makes it even more simpler to
test, develop and integrate. Some integration and data
managementprovidersgiveussomespecializedapplications
of PaaS which includes iPaaS (Integration Platform as a
Service) and dPaaS (Data Platform as a Service).Application
designers will have an ability to develop and run their
software solutions on a cloud platform without the cost and
complexity. Similarly it reduces the buying and managing of
the hardware and software layers. PaaS offers some
platforms like Microsoft Azure, Oracle Cloud
Platform and Google App Engine.
3.3 Software as a Service
Software as a Service (SaaS) is the outer most layer
of the service model. It represents the set of application that
run in a cloud. It is accessible only through the use of
browser. It can be accessed from anywhere and on any
devices with the internet connection. It does not require the
purchase of software licenses, it reduces cost. The Cloud
provider has an ability to manage the infrastructure and
platforms that run the applications. In the SaaS model, cloud
providers connect and operate application software in the
cloud and the cloud users approach the software from cloud
clients. Cloud computing users do not accomplish the cloud
infrastructure and platform wherethesubmissionruns. This
eradicates the need to connectandruntheapplicationonthe
cloud user's individual computers, which in turn simplifies
maintenance and support. Cloud applications diverge from
other applications in their scalability and readability.
4. DEPLOYMENT
The deployment model has been classified into
many different types. They are private cloud, public cloud,
hybrid cloud. The private cloud infrastructure has been
implemented exclusively for a single organization. The
public cloud infrastructure is an open network forthepublic
users. The hybrid is a combination of bothpublicandprivate
cloud infrastructure. [4]
4.1 Private cloud
Private cloud is a cloud infrastructure functioned
exclusively for a single organization. It is either managed
internally or externally or using a third party host. It is
compressed of files and application, storage and services
that are implemented and protected only within a particular
firewall. The perfect example of private cloud will be a
company that has a Microsoft exchange, this why because
only an authorized user can only be accessed through VPN
connection. In this model, the cloud infrastructure is
privately owned and it has been used completely by the
respective concern that owns it. It results in highest cost of
creating and maintaining the cloud over the use of public
cloud. It has been noted that, it has the largest and the most
detailed control over cloud.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 510
4.2 Public cloud
A cloud is called a "public cloud" when the services
are concentrated over a network that is open for public
usage. Public cloud amenities might be free. But in case of
technical there may be little or no variance between the
public and private cloud architecture. However, security
attention may be significantly different for services like
applications, storage, and other resources. Usually, public
cloud service providers like Amazon Web
Services (AWS), Oracle, Microsoft and Google own and
operate their infrastructure via internet. It also consists of
files and application, storage and services available through
internet. In this model, the cloud appears a stored resource
for the set of organization that has a common interest. The
common interest would tend to security policy and
flexibility.
4.3 Hybrid cloud
Hybrid cloud is a compositionoftwoormoreclouds
which includes private, community or public cloud. Itallows
the user to extend either the capacity or the capability of a
cloud service, by combination, addition or customization
with another cloud service. Diverse usage of hybrid cloud
composition also exists. It is somewhat difficult to
implement as it is the combination oftwoclouds.Itperforms
the critical process and the other performs the secondary
process. Hybrid cloud acceptance depends on a number of
factors such as data security and submission requests, level
of control needed over data, and the applications an
organization uses. [4]
Fig - 3: Deployment model
5. LIMITATIONS AND ADVANTAGES
Cloud computing is much cheaper because of its
economic scale. In cloud computing, the control of the rear
end infrastructure is limited to the cloud merchants only.
The Cloud providers frequently decide the management
policies. Cloud users were limited to the control and
management of their applications, data and services. This
includes data caps, which are placed on cloud users by the
cloud merchants distributing certain amount of bandwidth
for each customer and are often shared among other cloud
users. Privacy and confidentiality were big alarms in some
activities. The cloud computing has been proved to have
some limitations and disadvantages, particularlyforsmaller
business operations. Technical outages are unavoidableand
arise sometimes when cloud service providers become
overwhelmed in the process of serving their clients. This
results in temporary business interruption. Meanwhile this
technology's systems depend on the internet, an individual
cannot be able to access their applications, server or data
from the cloud during an outage. [5]
6. EXAMPLES
The top most real time application where cloud
computing works at its best are:
6.1 Scalable usage:
Cloud computing offers a scalable resourcethrough
different subscription models, whichinturn meansyouhave
to pay only for the computing resources you use.
Example: Netflix
Because of its streaming services, it faces a large
flow in server load at peak time. Since theyhaveuseda cloud
computing that allows the company to significantly expand
the customer without any investment and maintenance of
costly infrastructure.
6.2 Chatbot:
It provides the customized solution, messages and
products based on the behavior and preferences of users.
The extended computing power and capacity of the cloud
enables us to store information about the user.
Example: Google Assistant, Siri
6.3 Communication:
It is the most important and the major requirement
of everyone in day to day life. The cloud also allows us to
enjoy the network based access to the communication tools
like emails and calendar. In fact most of the messaging apps
like Skype, WhatsApp are also a cloud based application in
which we can share information are also stored on the
service provider rather than on the personal devices. It
allows us to access our information from anywhere through
the internet.
Example: WhatsApp, Skype
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 511
6.4 Productivity:
This allows us to share our documents through
cloud. In this we can work on our document, presentations,
spreadsheet from anywhere at any time. We need not to be
worried about the data loss, we can retrieve it throughcloud
at any time.
Example: MS OFFICE 365, Google Docs
6.5 Social networking:
Social networks are designed to find people you already
know or you would like to know. If we share information on
social media, we are not only sharing the photos and videos
with our friends and relatives butalsowiththemakersof the
platform. So to manage all these things cloud will be very
helpful.
Example: Facebook, LinkedIn, Twitter
7. SECURITY CONTROL
The well-organized cloud security architecture has
to identify the issues that will rise with security
management. The security management reportstheseissues
with security panels. The security panel is used to safeguard
any flaws in the system and diminishes the effect of an
attack. There are many types of controls behind the cloud
security architecture, they are: [14]
7.1 Deterrent control:
The deterrent control is proposed to reduce the
attacks on a cloud system. It gives a warning sign. The
deterrent control typically decreases the threat level by
informing the potential attackers that there will beopposing
consequences for them if they proceed.
7.2 Preventive control:
Preventive control reinforce the system against
events, generally by reducing if not actually eliminating
vulnerabilities. Strong authentication of cloud users, for
instance, makes it less likely that unapproved users can
access cloud systems, and more likely that cloud users are
positively acknowledged.
7.3 Detective control:
Detective controls are proposed to detect and react
aptly to any incidents that occur. In the event of an attack, a
detective control has to signal the preventativeorcorrective
controls to report an issue. System and network security are
typically employed to detect attacks on cloud systems and it
supports the communications infrastructure.
7.4 Corrective controls:
Corrective controls reduce the costs of an incident
that occurs, usually by limiting the damage. These controls
will work effectively during the incident or after an incident
occurs. We can restore the system backups in the corrective
control.
Fig - 4: Security control
8. CONCLUSION
Cloud computing is recently new technological
development that has the potential to havea greatimpact on
the world. It has many benefits that it provides to it users
and businesses. Users also worry about who can disclose
their data and have ownership of their data. Cloud
computing is changing its own way in IT departments.
Businesses and organization has a wide range ofpathsinthe
cloud, which includes infrastructure, platforms and
applications that are available from cloud providers as
online services. Cloud computing has sets its height in the
field of information and communication technology as it
brings out an evolution.
REFERENCES
[1] L. Albertson, "Openstack vs. Ganeti", Linux Fest
Northwest 2017
[2] https://en.wikipedia.org/wiki/Cloud_computing
[3] The NIST Definition of Cloud Computing. Retrieved
November 1, 2015, from National Institute of
Standards and Technology website:
http://csrc.nist.gov/publications/nistpubs/800-
145/SP800-145.pdf
[4] https://www.linkedin.com/pulse/3-service-4-
deployment-models-cloud-computing-sankar-
somepalle/
[5] https://www.levelcloud.net/why-levelcloud/cloud-
education-center/advantages-and-disadvantages-
of-cloud-computing/
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 512
[6] http://www.klientsolutech.com/powerful-uses-of-
cloud-computing/
[7] Hu, Tung-Hui (2015). A PrehistoryoftheCloud.MIT
Press.
[8] Mell, P. (2011, September 31). The NIST Definition
of Cloud Computing. Retrieved November 1, 2015,
from National Institute of Standards and
Technology website.
[9] Haghighat, M.; Zonouz, S.; Abdel-Mottaleb, M.
(2015). "CloudID: Trustworthy Cloud-based and
Cross-Enterprise Biometric Identification". Expert
Systems with Applications. .
[10] Winkler, Vic (2011). Securing the Cloud: Cloud
Computer Security Techniques and Tactics.
Elsevier.
[11] https://www.maropost.com/blog/5-real-world-
examples-of-cloud-computing/
[12] Haghighat, Mohammad (2015). "CloudID:
Trustworthy Cloud-based and Cross-Enterprise
Biometric Identification". Expert Systems with
Applications.
[13] Amazon Web Services. 2013-03-19.
Retrieved 2013-03-20 and Baburajan, Rajani
(2011-08-24). It.tmcnet.com. Retrieved 2011-12-
02.
[14] https://www.techopedia.com/definition/29367/cl
oud-security-control
[15] Bruneo, Dario; Distefano, Salvatore; Longo,
Francesco; Puliafito, Antonio; Scarpa, Marco
(2013). "Workload-BasedSoftwareRejuvenationin
Cloud Systems". IEEE Transactions on Computers.

More Related Content

What's hot (17)

PDF
Security of Data in Cloud Environment Using DPaaS
IJMER
 
PDF
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
 
PDF
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
PDF
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET Journal
 
PDF
Salesforce.com – A Cloud Provider
IRJET Journal
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Reminiscing cloud computing technology
eSAT Publishing House
 
PDF
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
 
DOC
Cloud computing
Yogesh Singh
 
PDF
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
PPTX
Cloud computing it703 unit iii
Jitendra s Rathore
 
PDF
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
P singh
 
PDF
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
AIRCC Publishing Corporation
 
PDF
Cloud computing challenges with emphasis on amazon ec2 and windows azure
IJCNCJournal
 
PDF
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
PDF
Ijarcet vol-2-issue-3-1128-1131
Editor IJARCET
 
DOCX
Cloud Computing
Abdul Aslam
 
Security of Data in Cloud Environment Using DPaaS
IJMER
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET Journal
 
Salesforce.com – A Cloud Provider
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Reminiscing cloud computing technology
eSAT Publishing House
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
 
Cloud computing
Yogesh Singh
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Cloud computing it703 unit iii
Jitendra s Rathore
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
P singh
 
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
AIRCC Publishing Corporation
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
IJCNCJournal
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
Ijarcet vol-2-issue-3-1128-1131
Editor IJARCET
 
Cloud Computing
Abdul Aslam
 

Similar to IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications (20)

PDF
Cloud Computing: Overview and its Deployment Model
IJERA Editor
 
PDF
Addressing the cloud computing security menace
eSAT Journals
 
PDF
Addressing the cloud computing security menace
eSAT Publishing House
 
PDF
Addressing the cloud computing security menace
eSAT Publishing House
 
PPTX
Chapter I Introduction to Cloud Computing.pptx
atakiltibrhanu1
 
PDF
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
 
PDF
Introduction to Cloud computing
mehanasshahul
 
PPT
Cloud Architecture units of me introduction
mathiyazhagan23
 
PDF
Analysis of Cloud Services
IRJET Journal
 
DOCX
Cloud notes 1
Prateek Soni
 
PPTX
CLOUD COMPUTING SERVICES - Cloud Reference Modal
SwarnaSLcse
 
PDF
An Insight into Cloud Computing Paradigm and Services
ijtsrd
 
PPTX
IT4.pptx
ssuser18673c1
 
PDF
Cloud Computing Overview | Torry Harris Whitepaper
Torry Harris Business Solutions
 
PDF
Cloud computing-overview
shraddhaudage
 
PDF
1.Introduction to cloud computing converted
DrRajapraveen
 
PPT
Cloud Computing education need for every beginner
harishshinhan
 
PPT
Cloud computing computer
Sanath Surawar
 
PPTX
Cloud Computing Course in Chandigarh.pptx
asmeerana605
 
PDF
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 
Cloud Computing: Overview and its Deployment Model
IJERA Editor
 
Addressing the cloud computing security menace
eSAT Journals
 
Addressing the cloud computing security menace
eSAT Publishing House
 
Addressing the cloud computing security menace
eSAT Publishing House
 
Chapter I Introduction to Cloud Computing.pptx
atakiltibrhanu1
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
 
Introduction to Cloud computing
mehanasshahul
 
Cloud Architecture units of me introduction
mathiyazhagan23
 
Analysis of Cloud Services
IRJET Journal
 
Cloud notes 1
Prateek Soni
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
SwarnaSLcse
 
An Insight into Cloud Computing Paradigm and Services
ijtsrd
 
IT4.pptx
ssuser18673c1
 
Cloud Computing Overview | Torry Harris Whitepaper
Torry Harris Business Solutions
 
Cloud computing-overview
shraddhaudage
 
1.Introduction to cloud computing converted
DrRajapraveen
 
Cloud Computing education need for every beginner
harishshinhan
 
Cloud computing computer
Sanath Surawar
 
Cloud Computing Course in Chandigarh.pptx
asmeerana605
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PPTX
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PDF
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PPTX
Introduction to Basic Renewable Energy.pptx
examcoordinatormesu
 
PPT
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Thermal runway and thermal stability.pptx
godow93766
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
Introduction to Basic Renewable Energy.pptx
examcoordinatormesu
 
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 

IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time Applications

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 508 A Detailed Study and Analysis of Cloud Computing usage with Real- Time Applications VALARMATHI V1, KOWSALYA N2 1Assistant Professor, Department of Information Technology, Sri Krishna Arts and Science College, Coimbatore, India 2Student, III Bsc (IT) A, Department of Information Technology, Sri Krishna Arts and Science College, Coimbatore, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing has come of its age since Amazon uses its first kind of cloud services in 2006. Cloud computing is an excellent new platformforthedevelopment of conceptual solution. It is helpful in sharing resources to achieve economic of scale. It is typically a combination of hardware and software that works together to deliver many aspects of the end user .In this paper, we explode the characteristics of cloud and the three levels of service models that works effectively on cloud. This paper addresses the main three types of cloud and in which way they work efficiently on real time. And it also deals with the advantages and limitations of cloud computing. This paper discuss about the major useful technology that we deal in our day-to-day life with some examples. However, the security and privacy plays the major role for the users who tries to adapt to the cloud computing. This paper investigates about the various kinds of security control. Key Words: cloud computing, characteristics, architecture, deployment, limitations, security control. 1. INTRODUCTION Cloud Computing depends on sharing of resources to experience coherence and achievement. The unknown cloud users enable organizations to focus on their core businesses instead of expending resources on computer infrastructure and maintenance. Cloud Computing is an excellent platform for the development of conceptual solution. Cloud Computing is helpful on sharing ofresources to achieve economic of scale. Cloud Computing allows the companies to avoid infrastructure costs. It is the usage of hardware and software through a network. The cloud is typically a combination of different types of hardware and software that works collectively to deliver many aspects of the end user. Organization: The remaining paper is organized as follows: In Section 2, we define the characteristicsofa cloudcomputing. In Section 3, we define the architectural component of a cloud computing which includes Infrastructure as a Service (IaaS), Software as a Service (SaaS), Platform as a Service (PaaS). Section 4, explains the deployment model of Cloud Computing. Section 5, explains the limitations and advantages followed by some examples in section 6. We future explain the some security control in section 7, followed by the conclusion in the section 8. 2. CHARACTERISTICS Cloud computing delivers the following key characteristics: Cloud computing increases the user’s flexibility. The Cost reductions can be claimed by cloud providers. The Device and location independence enable users to access systems using a web browser irrespective of their location or what device they use (e.g., PC, mobile phone).The Maintenance of cloud computing applications will be easier. A Multiple tenant enables sharing of resources and costs across a large number of users. It results in:  Centralization of infrastructure with lower costs (example: electricity, etc.)  The peak-load capacity increases (As they need not to be an engineer and buy the largest equipment).  Utilization and efficiency improves the systems. Performance is monitored by IT experts from the amenity supplier. Productivity may be increased when multiple users can work on the same data concurrently, rather than waiting for it to be saved and emailed. Time may be saved. Reliability and scalability may be improved. Security has been improved due to thecentralizationofdata. [2] Fig -1: Cloud Computing characteristics
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 509 3. ARCHITECTURAL COMPONENT The three most commonly used acronyms in the cloud computing are: SaaS, PaaS, IaaS. These are interdependent and it is also called as three tier model. These three model distinguish between the primary cloud computing. In other word SaaS, PaaS, IaaS are the main criteria for cloud computing. The layers of the model are portrayed in a stack. [4] Fig -2: Architecture of an service model 3.1 Infrastructure as a Service Infrastructure as a Service (IaaS) is the lowest level cloud services and it is the most importantone.Iaasdoes not include application or even an operating system, whereas SaaS, PaaS includes application and operating system. Iaas provide a large number of storage for corporate data backups, network bandwidth for a company website server. Sometimes it enables access to high powercomputingwhich has been previously accessed by the supercomputing. The most popular IaaS offerings are: Amazon E2C,IBMsoftlayer, Google’s Compute Engine (GCE). It refers to online services, which is used to network infrastructure like physical computing resources, data partitioning, security, etc.Itoften includes additional resources like virtual machine, server storage. As it is the lowest layer of abstract model, it must be transparent to the consumer. 3.2 Platform as a Service Platform as a Service (PaaS) is the intermediate layer of the conceptual model. It provides the consumer operating system, software development platforms, programming language. This makes it even more simpler to test, develop and integrate. Some integration and data managementprovidersgiveussomespecializedapplications of PaaS which includes iPaaS (Integration Platform as a Service) and dPaaS (Data Platform as a Service).Application designers will have an ability to develop and run their software solutions on a cloud platform without the cost and complexity. Similarly it reduces the buying and managing of the hardware and software layers. PaaS offers some platforms like Microsoft Azure, Oracle Cloud Platform and Google App Engine. 3.3 Software as a Service Software as a Service (SaaS) is the outer most layer of the service model. It represents the set of application that run in a cloud. It is accessible only through the use of browser. It can be accessed from anywhere and on any devices with the internet connection. It does not require the purchase of software licenses, it reduces cost. The Cloud provider has an ability to manage the infrastructure and platforms that run the applications. In the SaaS model, cloud providers connect and operate application software in the cloud and the cloud users approach the software from cloud clients. Cloud computing users do not accomplish the cloud infrastructure and platform wherethesubmissionruns. This eradicates the need to connectandruntheapplicationonthe cloud user's individual computers, which in turn simplifies maintenance and support. Cloud applications diverge from other applications in their scalability and readability. 4. DEPLOYMENT The deployment model has been classified into many different types. They are private cloud, public cloud, hybrid cloud. The private cloud infrastructure has been implemented exclusively for a single organization. The public cloud infrastructure is an open network forthepublic users. The hybrid is a combination of bothpublicandprivate cloud infrastructure. [4] 4.1 Private cloud Private cloud is a cloud infrastructure functioned exclusively for a single organization. It is either managed internally or externally or using a third party host. It is compressed of files and application, storage and services that are implemented and protected only within a particular firewall. The perfect example of private cloud will be a company that has a Microsoft exchange, this why because only an authorized user can only be accessed through VPN connection. In this model, the cloud infrastructure is privately owned and it has been used completely by the respective concern that owns it. It results in highest cost of creating and maintaining the cloud over the use of public cloud. It has been noted that, it has the largest and the most detailed control over cloud.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 510 4.2 Public cloud A cloud is called a "public cloud" when the services are concentrated over a network that is open for public usage. Public cloud amenities might be free. But in case of technical there may be little or no variance between the public and private cloud architecture. However, security attention may be significantly different for services like applications, storage, and other resources. Usually, public cloud service providers like Amazon Web Services (AWS), Oracle, Microsoft and Google own and operate their infrastructure via internet. It also consists of files and application, storage and services available through internet. In this model, the cloud appears a stored resource for the set of organization that has a common interest. The common interest would tend to security policy and flexibility. 4.3 Hybrid cloud Hybrid cloud is a compositionoftwoormoreclouds which includes private, community or public cloud. Itallows the user to extend either the capacity or the capability of a cloud service, by combination, addition or customization with another cloud service. Diverse usage of hybrid cloud composition also exists. It is somewhat difficult to implement as it is the combination oftwoclouds.Itperforms the critical process and the other performs the secondary process. Hybrid cloud acceptance depends on a number of factors such as data security and submission requests, level of control needed over data, and the applications an organization uses. [4] Fig - 3: Deployment model 5. LIMITATIONS AND ADVANTAGES Cloud computing is much cheaper because of its economic scale. In cloud computing, the control of the rear end infrastructure is limited to the cloud merchants only. The Cloud providers frequently decide the management policies. Cloud users were limited to the control and management of their applications, data and services. This includes data caps, which are placed on cloud users by the cloud merchants distributing certain amount of bandwidth for each customer and are often shared among other cloud users. Privacy and confidentiality were big alarms in some activities. The cloud computing has been proved to have some limitations and disadvantages, particularlyforsmaller business operations. Technical outages are unavoidableand arise sometimes when cloud service providers become overwhelmed in the process of serving their clients. This results in temporary business interruption. Meanwhile this technology's systems depend on the internet, an individual cannot be able to access their applications, server or data from the cloud during an outage. [5] 6. EXAMPLES The top most real time application where cloud computing works at its best are: 6.1 Scalable usage: Cloud computing offers a scalable resourcethrough different subscription models, whichinturn meansyouhave to pay only for the computing resources you use. Example: Netflix Because of its streaming services, it faces a large flow in server load at peak time. Since theyhaveuseda cloud computing that allows the company to significantly expand the customer without any investment and maintenance of costly infrastructure. 6.2 Chatbot: It provides the customized solution, messages and products based on the behavior and preferences of users. The extended computing power and capacity of the cloud enables us to store information about the user. Example: Google Assistant, Siri 6.3 Communication: It is the most important and the major requirement of everyone in day to day life. The cloud also allows us to enjoy the network based access to the communication tools like emails and calendar. In fact most of the messaging apps like Skype, WhatsApp are also a cloud based application in which we can share information are also stored on the service provider rather than on the personal devices. It allows us to access our information from anywhere through the internet. Example: WhatsApp, Skype
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 511 6.4 Productivity: This allows us to share our documents through cloud. In this we can work on our document, presentations, spreadsheet from anywhere at any time. We need not to be worried about the data loss, we can retrieve it throughcloud at any time. Example: MS OFFICE 365, Google Docs 6.5 Social networking: Social networks are designed to find people you already know or you would like to know. If we share information on social media, we are not only sharing the photos and videos with our friends and relatives butalsowiththemakersof the platform. So to manage all these things cloud will be very helpful. Example: Facebook, LinkedIn, Twitter 7. SECURITY CONTROL The well-organized cloud security architecture has to identify the issues that will rise with security management. The security management reportstheseissues with security panels. The security panel is used to safeguard any flaws in the system and diminishes the effect of an attack. There are many types of controls behind the cloud security architecture, they are: [14] 7.1 Deterrent control: The deterrent control is proposed to reduce the attacks on a cloud system. It gives a warning sign. The deterrent control typically decreases the threat level by informing the potential attackers that there will beopposing consequences for them if they proceed. 7.2 Preventive control: Preventive control reinforce the system against events, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unapproved users can access cloud systems, and more likely that cloud users are positively acknowledged. 7.3 Detective control: Detective controls are proposed to detect and react aptly to any incidents that occur. In the event of an attack, a detective control has to signal the preventativeorcorrective controls to report an issue. System and network security are typically employed to detect attacks on cloud systems and it supports the communications infrastructure. 7.4 Corrective controls: Corrective controls reduce the costs of an incident that occurs, usually by limiting the damage. These controls will work effectively during the incident or after an incident occurs. We can restore the system backups in the corrective control. Fig - 4: Security control 8. CONCLUSION Cloud computing is recently new technological development that has the potential to havea greatimpact on the world. It has many benefits that it provides to it users and businesses. Users also worry about who can disclose their data and have ownership of their data. Cloud computing is changing its own way in IT departments. Businesses and organization has a wide range ofpathsinthe cloud, which includes infrastructure, platforms and applications that are available from cloud providers as online services. Cloud computing has sets its height in the field of information and communication technology as it brings out an evolution. REFERENCES [1] L. Albertson, "Openstack vs. Ganeti", Linux Fest Northwest 2017 [2] https://en.wikipedia.org/wiki/Cloud_computing [3] The NIST Definition of Cloud Computing. Retrieved November 1, 2015, from National Institute of Standards and Technology website: http://csrc.nist.gov/publications/nistpubs/800- 145/SP800-145.pdf [4] https://www.linkedin.com/pulse/3-service-4- deployment-models-cloud-computing-sankar- somepalle/ [5] https://www.levelcloud.net/why-levelcloud/cloud- education-center/advantages-and-disadvantages- of-cloud-computing/
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 512 [6] http://www.klientsolutech.com/powerful-uses-of- cloud-computing/ [7] Hu, Tung-Hui (2015). A PrehistoryoftheCloud.MIT Press. [8] Mell, P. (2011, September 31). The NIST Definition of Cloud Computing. Retrieved November 1, 2015, from National Institute of Standards and Technology website. [9] Haghighat, M.; Zonouz, S.; Abdel-Mottaleb, M. (2015). "CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification". Expert Systems with Applications. . [10] Winkler, Vic (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics. Elsevier. [11] https://www.maropost.com/blog/5-real-world- examples-of-cloud-computing/ [12] Haghighat, Mohammad (2015). "CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification". Expert Systems with Applications. [13] Amazon Web Services. 2013-03-19. Retrieved 2013-03-20 and Baburajan, Rajani (2011-08-24). It.tmcnet.com. Retrieved 2011-12- 02. [14] https://www.techopedia.com/definition/29367/cl oud-security-control [15] Bruneo, Dario; Distefano, Salvatore; Longo, Francesco; Puliafito, Antonio; Scarpa, Marco (2013). "Workload-BasedSoftwareRejuvenationin Cloud Systems". IEEE Transactions on Computers.