AReviewonarchitectureandsecurityissues Cloud Computing Servicesoct 2020
AReviewonarchitectureandsecurityissues Cloud Computing Servicesoct 2020
net/publication/365712577
CITATIONS READS
0 125
1 author:
SEE PROFILE
All content following this page was uploaded by Vijay Reddy Madireddy on 24 November 2022.
Abstract:- Cloud computing is a computing model of giving IT assets, like application, foundation, and stage as administration by
utilizing Internet. Cloud Computing gives foundation to computing and handling of a wide range of information assets and embraced to
manage the lot of information. This Internet based current innovation has brought flexibility, capacity and power of processing. Have
had the option to push IT industry one stride ahead. These days, enormous and noticeable ventures have moved to cloud computing and
have migrated their handling and storage to it..
1
All rights reserved by www.jidps.com
Paper Title: A Review on architecture and security issues Cloud Computing Services
2
ISSN:-2581-6934 |Available at :www.jidps.com | pp (1-4)
Paper Title: A Review on architecture and security issues Cloud Computing Services
infrastructure, which is claimed and managed by entering the $80 billion global cloud computing market. We
suppliers[12]. Public clouds are made available to the anticipate that the cloud computing will rise, so engineers
general public by a service supplier who has the cloud ought to take it into account.
infrastructure. Examples of public clouds incorporate References
Amazon Elastic Register Cloud (EC2), IBM's Blue Cloud, [1]. Adithya Vuppula, “OPTIMIZATION OF DATA MINING
Sun Cloud, Google App Engine and Windows Azure AND THE ROLE OF BIG DATA ANALYTICS IN SDN
Services Platform. AND INTRADATA CENTER NETWORKS” International
Journal of Scientific Development and Research (IJSDR),
Volume 1 Issue 4, April 2016.
2. Private clouds [2]. Kola Vasista, “ROLE OF A STOCK EXCHANGE IN
BUYING AND SELLING SHARES”, International Journal of
Private clouds are data focus architectures possessed by a
Current Science (IJCSPUB), Volume 12, Issue 1, ISSN: 2250-
particular organization that gives flexibility, scalability,
1770.
provisioning, and automation and checking. The goal of a
[3]. I. Ahmad and K. Pothuganti, "Smart Field Monitoring using
private cloud isn't sell "as-a-service" contributions to
ToxTrac: A Cyber-Physical System Approach in Agriculture,"
external customers yet instead to gain the advantages of
International Conference on Smart Electronics and
cloud architecture without surrendering the control of
Communication (ICOSEC), pp. 723-727, doi:
maintaining you own data community. Private clouds are
10.1109/ICOSEC49089.2020.9215282.
more costly yet in addition safer when compared to public
[4]. Satya Nagendra Prasad Poloju, “An Overview on Cloud
clouds[13].
Computing Technologies”, International Journal of Advanced
3. Hybrid Clouds
Research in Electrical, Electronics and Instrumentation
Hybrid Clouds are a piece of at least two clouds (private,
Engineering, Vol. 4, Issue 10, October 2015.
local area or public) that remain remarkable substances yet
[5]. Ramana, solleti, “A Two-Level Authentication Protocol for
are bound together contribution the advantages of different
Secure M-Commerce Transactions using AMQP Protocol –
organization models. In a hybrid cloud, you can control
Design Engineering, Issue: 6, ISSN Number 0011-9342
outsider cloud suppliers in either a full or partial manner;
URL:http://www.thedesignengineering.com/index.php/DE/art
increasing the flexibility of computing. For instance
icle/view/2047
during peak periods individual applications, or bits of
applications can be migrated to the Public Cloud[14]. Here
[6]. Peddyreddy. Swathi. A Study On The Restrictions Of Deep
are situations where a hybrid environment is suitable
Learning. Journal of Artificial Intelligence,Machine Learning
and Neural Network (JAIMLNN) ISSN: 2799-1172, 2(02),
IV. Conclusion
57–61. Retrieved from
Today cloud computing is top of psyche with IT companies http://journal.hmjournals.com/index.php/JAIMLNN/article/vi
around the world. Cloud computing has the potential of ew/444
offering advantages for companies that utilization it for the [7]. Kola Vasista, “TYPES AND RISKS INVOLVED TOWARDS
sending and scaling of IT for business processes. More and INVESTING IN MUTUAL FUNDS”, International Journal of
more ventures, from accountancy firms to zoological social Current Science (IJCSPUB), Volume 12, Issue 1, ISSN: 2250-
orders, are adopting cloud computing services. Consistently, a 1770.
large number of customers are utilizing on the web cloud
services viz., Apple iCloud, Gmail and Dropbox across work [8]. Peddyreddy. Swathi. Industry Applications of Augmented
area and versatile gadgets. In any case, rivalry among cloud Reality and Virtual Reality. Journal of Environmental Impact
and rethinking suppliers is increasing as new start-ups keep on
3
ISSN:-2581-6934 |Available at :www.jidps.com | pp (1-4)
Paper Title: A Review on architecture and security issues Cloud Computing Services
and Management Policy(JEIMP) ISSN:2799-113X, 2(02), 7– Also Possible Effects on Financial Institutions”, International
11. Retrieved from Journal of Innovative Research in Computer and
http://journal.hmjournals.com/index.php/JEIMP/article/view/ Communication Engineering, Volume 9, Issue 6, June .
453 [17]. K. Pothuganti, B. Sridevi and P. Seshabattar, "IoT and
[9]. Satya Nagendra Prasad Poloju, “DATA MINING AS A Deep Learning based Smart Greenhouse Disease Prediction,"
SUPPORT FOR BUSINESS INTELLIGENCE International Conference on Recent Trends on Electronics,
APPLICATIONS TO BIG DATA” , International Journal of Information, Communication & Technology (RTEICT), pp.
Creative Research Thoughts (IJCRT), Volume 7, Issue 2. 793-799, doi: 10.1109/RTEICT52294.2021.9573794.
[10]. S. Ramana, S. C. Ramu, N. Bhaskar, M. V. R. Murthy [18]. Adithya Vuppula, “EFFICIENCY AND
and C. R. K. Reddy, "A Three-Level Gateway protocol for SCALABILITY OF DATA MINING ALGORITHMS”,
secure M-Commerce Transactions using Encrypted OTP," International Journal of Scientific Development and Research
International Conference on Applied Artificial Intelligence and (IJSDR), Volume 4 Issue 9, September 201.
Computing (ICAAIC), pp. 1408-1416, doi: [19]. Kola Vasista, “Scope for the Usage of Ai and Machine
10.1109/ICAAIC53929.2022.9792908. Learning in Portfolio Management and Possible Effects on
[11]. K. Pothuganti, B. Sridevi and P. Seshabattar, "IoT and Consumers and Investors”, International Journal of Innovative
Deep Learning based Smart Greenhouse Disease Prediction," Research in Science, Engineering and Technology, Vol. 5,
International Conference on Recent Trends on Electronics, Issue 2, February 2016
Information, Communication & Technology (RTEICT), pp. [20]. Ramana, solleti, A Two-Level Protocol for Secure
793-799, doi: 10.1109/RTEICT52294.2021.9573794. Transmission of Image using IOT Enabled devices Webology,
Volume 18, Issue 5, ISSN Number: 1735-188X
[12]. Peddyreddy. Swathi. Implications For Research In URL: https://www.webology.org/abstract.php?id=2194
Artificial Intelligence. Journal of Electronics,Computer [21]. Satya Nagendra Prasad Poloju, “Privacy-Preserving
Networking and Applied Mathematics(JECNAM) ISSN : Classification of Big Data”, International Journal of Advanced
2799-1156, 2(02), 25–28. Retrieved from Research in Electrical, Electronics and Instrumentation
http://journal.hmjournals.com/index.php/JECNAM/article/vie Engineering, Vol. 2, Issue 4, April 2013.
w/447 [22]. Adithya Vuppula, “Integrating Data Mining with
Cloud using Four Levels of Data Mining Services”
[13]. Adithya Vuppula, “A Study on Minnesota Intrusion International Journal Of Multidisciplinary Research In
Detection System (Minds)” International Journal Of Science, Engineering and Technology (IJMRSET), ISSN:
Multidisciplinary Research In Science, Engineering and 2582-7219, Volume 4, Issue 5, May 202.
Technology (IJMRSET), Volume 1, Issue 1, November. [23]. Satya Nagendra Prasad Poloju. “Relevant
[14]. Kola Vasista, “A REVIEW ON THE VARIOUS Technologies of Cloud Computing System”. International
OPTIONS AVAILABLE FOR INVESTMENT”, International Journal of Engineering Research and Applications, ISSN:
Journal of Creative Research Thoughts (IJCRT), Volume 7, 2248-9622, Vol. 4, Issue 4, (Version-3) April 2014, pp. 74-78
Issue 2, ISSN: 2320-2882. [24]. Ramana, solleti, “A Two-Level Authentication
[15]. Satya Nagendra Prasad Poloju, “BIG DATA Protocol for Secure M-Commerce Transactions using
ANALYTICS: DATA PRE-PROCESSING, Encrypted OTP– International Journal of Mechanical
TRANSFORMATION AND CURATION”, International Engineering, Volume 7, Issue: 3, ISSN Number 0974-5823
Journal of Creative Research Thoughts (IJCRT), Volume 5,
Issue 2 ,2017
[16]. Kola Vasista, “Regulatory Compliance and
Supervision of Artificial Intelligence, Machine Learning and
4
View publication stats ISSN:-2581-6934 |Available at :www.jidps.com | pp (1-4)