0% found this document useful (0 votes)
32 views5 pages

AReviewonarchitectureandsecurityissues Cloud Computing Servicesoct 2020

The document is a review of cloud computing architecture and security issues, highlighting its significance in providing IT resources as services over the internet. It discusses various cloud service models such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), along with the types of clouds including public, private, and hybrid. The conclusion emphasizes the growing adoption of cloud computing by enterprises for its scalability and efficiency in managing IT processes.

Uploaded by

vee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views5 pages

AReviewonarchitectureandsecurityissues Cloud Computing Servicesoct 2020

The document is a review of cloud computing architecture and security issues, highlighting its significance in providing IT resources as services over the internet. It discusses various cloud service models such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), along with the types of clouds including public, private, and hybrid. The conclusion emphasizes the growing adoption of cloud computing by enterprises for its scalability and efficiency in managing IT processes.

Uploaded by

vee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/365712577

A Review on Architecture and Security Issues Cloud Computing Services

Article in International Journal of Innovative Research and Development · October 2020


DOI: 10.2139/ssrn.4289396

CITATIONS READS
0 125

1 author:

Vijay Reddy Madireddy


hindawi
20 PUBLICATIONS 11 CITATIONS

SEE PROFILE

All content following this page was uploaded by Vijay Reddy Madireddy on 24 November 2022.

The user has requested enhancement of the downloaded file.


Journal For Innovative Development in Pharmaceutical and Technical Science (JIDPTS) (J I D P T S)
Volume:3, Issue:10, Oct:2020 ISSN(O):2581-6934

A Review on architecture and security issues Cloud


Computing Services
________________________________________________________________________________________

Dr.Vijay Reddy Madireddy 1


1
Assistant Professor
Swami Ramananda Tirtha Institute of Science and Technology, Nalgonda,

Abstract:- Cloud computing is a computing model of giving IT assets, like application, foundation, and stage as administration by
utilizing Internet. Cloud Computing gives foundation to computing and handling of a wide range of information assets and embraced to
manage the lot of information. This Internet based current innovation has brought flexibility, capacity and power of processing. Have
had the option to push IT industry one stride ahead. These days, enormous and noticeable ventures have moved to cloud computing and
have migrated their handling and storage to it..

Keywords: Cloud computing, Software as a service (SaaS), Public Clouds.


_________________________________________________________________________________________________________
I. Introduction These days, cloud is the most magnificent answer for the
people who are searching for speedy execution techniques.
Cloud computing is on request network admittance to
Cloud computing is a sort of configurable, equal, circulated,
computing assets which are many times given by an external
virtual, and adaptable frameworks that alludes to arrangement
substance and require slight administration. Those assets
of uses, for example, equipment and programming in virtual
incorporate servers, storage space, network, applications and
server farms through internet .
services [1]. Various structures and valuable models are
available for cloud computing, and these can be utilized with
II. Services Of Cloud Computing
different innovations and configuration approaches [2].In
cloud computing, applications are given and overseen by the As a fresh out of the box new foundation to offer services,
cloud server and information is additionally put away Cloud Computing enjoys many benefits in contrasting with
somewhat in the cloud setup. Clients don't download and those current customary specialist co-ops, like gigantic
introduce applications on their own gadget or PC; all handling adaptation to internal failure capacity, high accessibility,
and storage is kept up with by the cloud server[3]. Cloud decreased venture, boundless versatility, plausible execution,
computing is on the highest point of the ten most troublesome etc and in this way followed by a large portion of the IT
innovations of the following coming years. It represent the organizations, like Google, Microsoft, Salesforce, Amazon[5].
long-held fantasy about imagining computing as an assistance Cloud computing services are utilized by government and
[4] where the economy of scale standards help to drive the organizations to manage an assortment of utilization and
expense of computing framework really down. Huge players, framework needs like information base, CRM, information
for example, Sun Microsystems, Google, IBM, Amazon and storage, and process.
Microsoft have started to lay out new server farms for
facilitating Cloud computing applications in various areas all
over the planet to give overt repetitiveness and ensure 1. Software as a service (SaaS): It is a finished
consistency because of site breakdown or disappointment. operating environment with provisioned

1
All rights reserved by www.jidps.com
Paper Title: A Review on architecture and security issues Cloud Computing Services

applications, management, and the UIs. Through 4. Data-as-a-Service (DaaS):


SaaS companies can access applications and large As SaaS keeps on winning the innovation world with
amounts of virtual computing power without innovative items and innovative software platforms, DaaS,
purchasing it.In SaaS, a supplier licenses an its identical twin sibling, implants quality data into
application to clients either as a service on demand, business and marketing campaigns. Innovation based
through a membership, charged according to their DaaS solutions give real time market information and
usage, or at no charge whenever there is a chance to customer data[10]. Disregarding the platform or location
make pay from streams other than the client, for DaaS separate data from its related applications to bring
example, from advertisement or client list sales. meaningful information to clients. DaaS unites the
This limits the help and maintenance cost actually advancements necessary to recover data from
[6]. heterogeneous sources, for example, transactional
2. Platform-as-a-Service (PaaS): databases, data warehouses, enterprise resource planning
(ERP) systems, and customer relationship management
PaaS gives virtual machines, operating systems,
(CRM) solutions.
applications, services, development frameworks,
transactions, and control structures. PaaS is comparable to
SaaS aside from that, rather than being software conveyed
over the web, it is a platform for the creation of software,
conveyed over the web [7]. Here the service given by the
company incorporates basic standards of development and
how you can disseminate them actually. Here the
environment would contain an operating system, a
database, an environment where programming language
can be executed and a web server.
3. Infrastructure as a service (IaaS):
Infrastructure as a Service is a arrangement model Figure 1:Cloud computing Services
in which an organization re-appropriates the gear
used to help operations, including storage,
III. Types Of Clouds
hardware, servers and networking parts [8]. The
Cloud computing comes in three structures: public clouds,
service provider claims the gear and is answerable
private clouds, and hybrids clouds. A new report directed
for housing, running and maintaining it.Instead of
by KPMG saw that as 81% of organizations were either
purchasing servers, software, datacenter space or
evaluating cloud services, planned a cloud implementation
network gear, clients instead purchase those assets
or had already carried out a cloud strategy. Organizations
as a completely re-appropriated service on demand.
can decide to convey applications on Public, Private,
Internet Designing Task – Force (IETF) has
Hybrid clouds [11].
characterized the IaaS model to be the most basic
1. Public Clouds
service model [9]. This model is related with a
virtual motor and clients can access to Public clouds are possessed and operated by companies
infrastructures with virtual machine. that utilization them to offer rapid access to affordable
computing resources to different organizations or
individuals. With public cloud services, clients don't have
to purchase hardware, software or supporting

2
ISSN:-2581-6934 |Available at :www.jidps.com | pp (1-4)
Paper Title: A Review on architecture and security issues Cloud Computing Services

infrastructure, which is claimed and managed by entering the $80 billion global cloud computing market. We
suppliers[12]. Public clouds are made available to the anticipate that the cloud computing will rise, so engineers
general public by a service supplier who has the cloud ought to take it into account.
infrastructure. Examples of public clouds incorporate References
Amazon Elastic Register Cloud (EC2), IBM's Blue Cloud, [1]. Adithya Vuppula, “OPTIMIZATION OF DATA MINING
Sun Cloud, Google App Engine and Windows Azure AND THE ROLE OF BIG DATA ANALYTICS IN SDN
Services Platform. AND INTRADATA CENTER NETWORKS” International
Journal of Scientific Development and Research (IJSDR),
Volume 1 Issue 4, April 2016.
2. Private clouds [2]. Kola Vasista, “ROLE OF A STOCK EXCHANGE IN
BUYING AND SELLING SHARES”, International Journal of
Private clouds are data focus architectures possessed by a
Current Science (IJCSPUB), Volume 12, Issue 1, ISSN: 2250-
particular organization that gives flexibility, scalability,
1770.
provisioning, and automation and checking. The goal of a
[3]. I. Ahmad and K. Pothuganti, "Smart Field Monitoring using
private cloud isn't sell "as-a-service" contributions to
ToxTrac: A Cyber-Physical System Approach in Agriculture,"
external customers yet instead to gain the advantages of
International Conference on Smart Electronics and
cloud architecture without surrendering the control of
Communication (ICOSEC), pp. 723-727, doi:
maintaining you own data community. Private clouds are
10.1109/ICOSEC49089.2020.9215282.
more costly yet in addition safer when compared to public
[4]. Satya Nagendra Prasad Poloju, “An Overview on Cloud
clouds[13].
Computing Technologies”, International Journal of Advanced
3. Hybrid Clouds
Research in Electrical, Electronics and Instrumentation
Hybrid Clouds are a piece of at least two clouds (private,
Engineering, Vol. 4, Issue 10, October 2015.
local area or public) that remain remarkable substances yet
[5]. Ramana, solleti, “A Two-Level Authentication Protocol for
are bound together contribution the advantages of different
Secure M-Commerce Transactions using AMQP Protocol –
organization models. In a hybrid cloud, you can control
Design Engineering, Issue: 6, ISSN Number 0011-9342
outsider cloud suppliers in either a full or partial manner;
URL:http://www.thedesignengineering.com/index.php/DE/art
increasing the flexibility of computing. For instance
icle/view/2047
during peak periods individual applications, or bits of
applications can be migrated to the Public Cloud[14]. Here
[6]. Peddyreddy. Swathi. A Study On The Restrictions Of Deep
are situations where a hybrid environment is suitable
Learning. Journal of Artificial Intelligence,Machine Learning
and Neural Network (JAIMLNN) ISSN: 2799-1172, 2(02),
IV. Conclusion
57–61. Retrieved from
Today cloud computing is top of psyche with IT companies http://journal.hmjournals.com/index.php/JAIMLNN/article/vi
around the world. Cloud computing has the potential of ew/444
offering advantages for companies that utilization it for the [7]. Kola Vasista, “TYPES AND RISKS INVOLVED TOWARDS
sending and scaling of IT for business processes. More and INVESTING IN MUTUAL FUNDS”, International Journal of
more ventures, from accountancy firms to zoological social Current Science (IJCSPUB), Volume 12, Issue 1, ISSN: 2250-
orders, are adopting cloud computing services. Consistently, a 1770.
large number of customers are utilizing on the web cloud
services viz., Apple iCloud, Gmail and Dropbox across work [8]. Peddyreddy. Swathi. Industry Applications of Augmented
area and versatile gadgets. In any case, rivalry among cloud Reality and Virtual Reality. Journal of Environmental Impact
and rethinking suppliers is increasing as new start-ups keep on

3
ISSN:-2581-6934 |Available at :www.jidps.com | pp (1-4)
Paper Title: A Review on architecture and security issues Cloud Computing Services

and Management Policy(JEIMP) ISSN:2799-113X, 2(02), 7– Also Possible Effects on Financial Institutions”, International
11. Retrieved from Journal of Innovative Research in Computer and
http://journal.hmjournals.com/index.php/JEIMP/article/view/ Communication Engineering, Volume 9, Issue 6, June .
453 [17]. K. Pothuganti, B. Sridevi and P. Seshabattar, "IoT and
[9]. Satya Nagendra Prasad Poloju, “DATA MINING AS A Deep Learning based Smart Greenhouse Disease Prediction,"
SUPPORT FOR BUSINESS INTELLIGENCE International Conference on Recent Trends on Electronics,
APPLICATIONS TO BIG DATA” , International Journal of Information, Communication & Technology (RTEICT), pp.
Creative Research Thoughts (IJCRT), Volume 7, Issue 2. 793-799, doi: 10.1109/RTEICT52294.2021.9573794.
[10]. S. Ramana, S. C. Ramu, N. Bhaskar, M. V. R. Murthy [18]. Adithya Vuppula, “EFFICIENCY AND
and C. R. K. Reddy, "A Three-Level Gateway protocol for SCALABILITY OF DATA MINING ALGORITHMS”,
secure M-Commerce Transactions using Encrypted OTP," International Journal of Scientific Development and Research
International Conference on Applied Artificial Intelligence and (IJSDR), Volume 4 Issue 9, September 201.
Computing (ICAAIC), pp. 1408-1416, doi: [19]. Kola Vasista, “Scope for the Usage of Ai and Machine
10.1109/ICAAIC53929.2022.9792908. Learning in Portfolio Management and Possible Effects on
[11]. K. Pothuganti, B. Sridevi and P. Seshabattar, "IoT and Consumers and Investors”, International Journal of Innovative
Deep Learning based Smart Greenhouse Disease Prediction," Research in Science, Engineering and Technology, Vol. 5,
International Conference on Recent Trends on Electronics, Issue 2, February 2016
Information, Communication & Technology (RTEICT), pp. [20]. Ramana, solleti, A Two-Level Protocol for Secure
793-799, doi: 10.1109/RTEICT52294.2021.9573794. Transmission of Image using IOT Enabled devices Webology,
Volume 18, Issue 5, ISSN Number: 1735-188X
[12]. Peddyreddy. Swathi. Implications For Research In URL: https://www.webology.org/abstract.php?id=2194
Artificial Intelligence. Journal of Electronics,Computer [21]. Satya Nagendra Prasad Poloju, “Privacy-Preserving
Networking and Applied Mathematics(JECNAM) ISSN : Classification of Big Data”, International Journal of Advanced
2799-1156, 2(02), 25–28. Retrieved from Research in Electrical, Electronics and Instrumentation
http://journal.hmjournals.com/index.php/JECNAM/article/vie Engineering, Vol. 2, Issue 4, April 2013.
w/447 [22]. Adithya Vuppula, “Integrating Data Mining with
Cloud using Four Levels of Data Mining Services”
[13]. Adithya Vuppula, “A Study on Minnesota Intrusion International Journal Of Multidisciplinary Research In
Detection System (Minds)” International Journal Of Science, Engineering and Technology (IJMRSET), ISSN:
Multidisciplinary Research In Science, Engineering and 2582-7219, Volume 4, Issue 5, May 202.
Technology (IJMRSET), Volume 1, Issue 1, November. [23]. Satya Nagendra Prasad Poloju. “Relevant
[14]. Kola Vasista, “A REVIEW ON THE VARIOUS Technologies of Cloud Computing System”. International
OPTIONS AVAILABLE FOR INVESTMENT”, International Journal of Engineering Research and Applications, ISSN:
Journal of Creative Research Thoughts (IJCRT), Volume 7, 2248-9622, Vol. 4, Issue 4, (Version-3) April 2014, pp. 74-78
Issue 2, ISSN: 2320-2882. [24]. Ramana, solleti, “A Two-Level Authentication
[15]. Satya Nagendra Prasad Poloju, “BIG DATA Protocol for Secure M-Commerce Transactions using
ANALYTICS: DATA PRE-PROCESSING, Encrypted OTP– International Journal of Mechanical
TRANSFORMATION AND CURATION”, International Engineering, Volume 7, Issue: 3, ISSN Number 0974-5823
Journal of Creative Research Thoughts (IJCRT), Volume 5,
Issue 2 ,2017
[16]. Kola Vasista, “Regulatory Compliance and
Supervision of Artificial Intelligence, Machine Learning and

4
View publication stats ISSN:-2581-6934 |Available at :www.jidps.com | pp (1-4)

You might also like