SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 412
An Ample Analysis of Cloud Computing Assessment Issues and Challenges
Ms. S. Saranya1,Dr. S. Sasikala2, Ms. P. Deepika3, Dr. B. Rajdeepa4
1Assistant.Professor, Department of Computer Application, Hindusthan College of Arts and Science,
2Associate.Professor, Department of Computer Application, Hindusthan College of Arts and Science,
3Assistant.Professor, Department of Computer Science, Hindusthan College of Arts and Science,
4Associate.Professor, Department of Computer Science, PSG College of Arts and Science,
---------------------------------------------------------------------------***---------------------------------------------------------------------------
ABSTRACT: - Cloud computing is technologies to retrieve the information technology (IT) services from the internet with the
help of tools of web based and web application which resources are retrieved from the Internet through web-based tools and
applications. The various cloud computing advancements has been correlated in the virtualization. The cloud based Platform
as a service required to maintain the total lifecycle of building and it produce the web-based (cloud) applications with no cost
and without any complexity of retail and managing the fundamental hardware, software, provisioning, and hosting. This paper
has focused on cloud computing basics and an assortment of types of cloud and services. It was also investigate about the
features of cloud and deployment models. The study of analysis among numerous cloud computing explore security and
privacy issues
Keywords: cloud computing, features of cloud, cloud type services, protection and privacy issue
1. INTRODUCTION
Cloud computing has deliver the on-demand computer control and the database storage and the applications and the
IT resources over the internet and on a pay-as-you-go basis. In cloud platform will have a rapid access for low cost and easy
flexible in IT resources. The cloud will not spend huge amount and spending time in hardware.
A Cloud services platform are the Amazon Web Services owns and it has managing the connected network hardware
for the application services. Cloud computing is the finest solution to supervise the applications of the shared multi-tenant
platform that is supported. While using in the cloud it just simply connect it, and customize it and simply use it.
2. FEATURES OF CLOUD
Cloud options are attractive various industries crossways the board to know its importance individuality and
software contributions. The main features of cloud computing are:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 413
On-demand self-service:
In business the cloud computing can be easily obtain the configure and deploy apps without any IT serious lifting. It
computing capabilities, computer service such as network, email, application. It also provision server repair without requiring
human interaction with each service provider.
Broad network access
The Cloud service are widely accessible over the network and accessed with the standard mechanism that support the
various wide platforms as like mobile devices and workstations.
Resource pooling:
Resource pooling has allows the cloud providers to pool major IT property to give out the numerous cloud consumers.
Unlike physical and virtual IT resources are vigorously assigned and reassigned according to cloud consumer demand, and it
has been followed by the execution through statistical multiplexing. Resource pooling is commonly achieved through
multitenancy technology, and it has been encompassed by this multitenancy feature.
Rapid Elasticity
This is one of the main features of cloud server is the potency to give a flexible computing platform, which can
decrease in stripe with business order, and it will provide you the power otherwise it will produce the in-house
accomplishment without substantial investment in resources. The resources consist of others storage, processing, memory,
network bandwidth, virtual machines and email services. The pooling collectively of the resource builds economies of scale
Measured service:
The Cloud systems mechanically organize and optimize resource use by leveraging a metering ability at some level of
abstraction proper to the category of service (e.g., storage, processing, bandwidth, and active user accounts). In cloud
computing the resource practice can be monitored, controlled, and reported, providing transparency for both the provider and
consumer of the utilized service.
3. CLOUD COMPUTING DEPLOYMENT MODELS
Cloud computing can be demonstrate in two ways. Either it was based on the deployment model, or its service that the
cloud is offering.
The types are,
public
private
hybrid
Community cloud
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 414
Public:
Public clouds are readily accessible from Google, Amazon, Microsoft, and others. It will enable the customers to right
in use and share basic computer infrastructure, including hardware, storage and bandwidth. Public resources are shared by
hundreds or thousands of people. Global Dots offers worldwide Public Cloud service in top information centers. A public cloud
has several profits. It will deliver the services over the web and the customers only have to pay for the resources they use like
a utility bill. Since organizations have right of entry to the service provider’s cloud infrastructure, they don’t need to worry
about personally installing and maintaining it. Each organization’s data, applications, and infrastructure are divided and it can
be accessed by the authorized personnel.
Private:
Private cloud infrastructure has been organized by single management. Hosting the entire computing infrastructure
will not be shared and the infrastructure is provisioned on the organization basis but may be hosted in a third-party service
provider. The Private Cloud infrastructure has been implemented and hosted in an on-premise information center using a
virtualization layer. Private Cloud offers the maximum level of control and security, it require the organization purchase and
sustain the entire infrastructure and acquire and retain the skill. A drawback of a private cloud is, it will very expensive to
install.
Hybrid:
Hybrid cloud model provides multiple options from dissimilar service providers. It uses the both private and public
clouds, depending on their function. Hybrid Cloud can also consist of numerous Private and Public Clouds and it may also use
several active servers, physical or virtualized, which are not a part of the Private Cloud. In Hybrid Cloud, organizations can
keep every business aspect in the most efficient cloud system possible. An example of a hybrid cloud solution is an
organization has to keep the confidential data secured on their private cloud, but make additional general, customer-facing
content on a public cloud.
Community cloud:
A community cloud is like to a public cloud apart from that it access is restricted to a specific community of cloud
consumers. The community cloud will mutually owned by the community members or by a third-party cloud source that
requirements a public cloud with partial access. Community clouds have different attractive option for companies in the base
of financial, health. It was well-matched organization of joint projects the advantage from distribution community specific
software applications.
4. CLOUD COMPUTING MODELS
Cloud Computing is a method of delivering/enabling scalable, expandable and has perfectly elastic software services
using internet technologies.
The three different types of service models:
 Software as a Service (SaaS)
 Platform as a Service (PaaS)
 Infrastructure as a service (IaaS)
Software as a Service (SaaS) model:
It provides the clients with the ability to use software applications on a remote basis via an internet web browser. The
people referring the Software as a Service as end-user applications. Software as a Service will helps to host and manage the
software application and core infrastructure and handle any protection. An example for Saas application is the web-based
email it can send and receive the email without controlling the feature additions to the email product or maintaining the
servers and operating systems, email program is administration on.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 415
Platform as a service (PaaS):
Platform as a service provides a cloud-based environment and it required to support the entire lifecycle of building
and delivering the web-based (cloud) applications without the charge and difficulty of buying and organization the underlying
hardware, software, provisioning, and hosting. It has been designed quickly to create a web or mobile apps, without
disturbing the setting up or running the underlying infrastructure of servers, storage, network and databases needed for
growth.
Infrastructure as a service (IaaS):
Infrastructure as a service provides the companies with computing property including servers, networking, storage,
and data center space on a pay-per-use basis. Infrastructure as a Service provides the maximum level of flexibility and running
control over your IT resources and is most similar to existing IT resources that numerous IT departments and developers are
recognizable at present.
5. CLOUD COMPUTING ISSUES:
Cloud computing has facing many confidentiality and integrity information in aiding data security. The solution for the
problems is encryption of data stored in the cloud. The encryption of data also gives up new problems. The following are the
main problems faced by cloud systems.
Security of data:
The data security clippings the list of concerns that hold companies back from cloud adoption. Cloud service providers
are a targets fact which makes it significant for companies to use risk mitigation strategies and tactics, such as encrypting or
tokenizing information before it ever goes to a cloud service.
Data Loss and Inadequate Data Backups:
Insufficient information backups and improper data syncing is what has made many businesses susceptible
to ransomware, a specific type of cloud security threat. Ransomware "locks" away a company's information in encrypted files,
only it allowing them to access the data once a ransom has been paid.
Shared Cloud Computing Services:
Numerous cloud solutions will not provide the security between clients, foremost to shared resources, applications,
and systems. In this condition, threats can originate from other clients with the cloud computing service, and threats targeting
one client could also have an crash on other clients.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 416
System Vulnerabilities:
Cloud computing systems are silent in system vulnerabilities, particularly in networks that have difficult
infrastructures and multiple third-party platforms. Once vulnerability becomes known with a popular third-party system, this
vulnerability has without any difficulty to be used against organizations
Cloud computing is the most recent technology that promises enormous benefits and there is lot of study has been
required in this area as many of the concerns related to security and privacy issues are not been answered by the experts and
remains open. This technology, developers has narrative ideas about the internet services will no longer need to expend huge
chunks of money in building their software and hardware infrastructural capabilities but somewhat they could focus on
effective provisioning of utility services.
REFERENCES
[1] Liang-Jie Zhang; Qun Zhou, "CCOA: Cloud Computing Open Architecture," in proceeding of IEEE International Conference
on Web
Services (ICWS), 2009, pp. 607-616, 6-10 July 2009.
[2] Shyam Patidar; Dheeraj Rane; Pritesh Jain “A Survey Paper on Cloud Computing” in proceeding of Second International
Conference on
Advanced Computing & Communication Technologies, 2012.
[3] Ms S Saranya, Ms P Deepika, Ms S Sasikala, S Jansi, Ms A Kiruthika: “Accelerating Unique Strategy for Centroid Priming in
KMeans Clustering” IJIRST (International Journal for Innovative Research in Science & Technology),volume3,pg:40-47
[5]. S.Saranya and Dr. Punithavalli:” An Efficient Centroid Selection Algorithm for K-means Clustering”, International Journal of
Multidisciplinary Research Academy, vol1, issue3, pg: 124-140
[6]. S. Saranya,” Evaluation and Efficient Initial Centroid Selection of New Algorithm for High Dimensional Data”, International
Journal of Computer Science and Mobile Computing, vol: 3, issue: 6, pg: 722-729
[7]Maneesha Sharma, Himani Bansal and Amit Kumar Sharma, “Cloud Computing: Different Approach & Security Challenge”,
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012
[4] Sanjoli Singla, Jasmeet Singh, “Cloud Data Security using Authentication and Encryption Technique”, “International Journal
of AdvanceResearch in Computer Engineering & Technology (IJARCET)”,Volume2, Issue 7, July 2013
6. CONCLUSION

More Related Content

What's hot

IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
 
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud ComputingIRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET Journal
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
484 488
484 488484 488
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
Prashant Gupta
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Mark Skilton
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
inventionjournals
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
IJSRED
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Supriya Pase
 

What's hot (16)

IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
IRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud ComputingIRJET- Legacy and Privacy Issues in Cloud Computing
IRJET- Legacy and Privacy Issues in Cloud Computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
484 488
484 488484 488
484 488
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 

Similar to IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges

IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Journals
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
G017324043
G017324043G017324043
G017324043
IOSR Journals
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
IRJET Journal
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
Editor Jacotech
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
eSAT Publishing House
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
P singh
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCINGCLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
IAEME Publication
 

Similar to IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges (20)

IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
G017324043
G017324043G017324043
G017324043
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCINGCLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
itssurajthakur06
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
IJAEMSJORNAL
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Sinan KOZAK
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
bookhotbebes1
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
santoshpatilrao33
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
Celine George
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
Jim Mimlitz, P.E.
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
PriyankaKarn3
 
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
PradeepKumarSK3
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
naseki5964
 
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-IDUNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
GOWSIKRAJA PALANISAMY
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
Md.Shohel Rana ( M.Sc in CSE Khulna University of Engineering & Technology (KUET))
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
surekha1287
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
Tool and Die Tech
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
binna singh$A17
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
ProexportColombia1
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 

Recently uploaded (20)

PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
 
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
 
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-IDUNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 

IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 412 An Ample Analysis of Cloud Computing Assessment Issues and Challenges Ms. S. Saranya1,Dr. S. Sasikala2, Ms. P. Deepika3, Dr. B. Rajdeepa4 1Assistant.Professor, Department of Computer Application, Hindusthan College of Arts and Science, 2Associate.Professor, Department of Computer Application, Hindusthan College of Arts and Science, 3Assistant.Professor, Department of Computer Science, Hindusthan College of Arts and Science, 4Associate.Professor, Department of Computer Science, PSG College of Arts and Science, ---------------------------------------------------------------------------***--------------------------------------------------------------------------- ABSTRACT: - Cloud computing is technologies to retrieve the information technology (IT) services from the internet with the help of tools of web based and web application which resources are retrieved from the Internet through web-based tools and applications. The various cloud computing advancements has been correlated in the virtualization. The cloud based Platform as a service required to maintain the total lifecycle of building and it produce the web-based (cloud) applications with no cost and without any complexity of retail and managing the fundamental hardware, software, provisioning, and hosting. This paper has focused on cloud computing basics and an assortment of types of cloud and services. It was also investigate about the features of cloud and deployment models. The study of analysis among numerous cloud computing explore security and privacy issues Keywords: cloud computing, features of cloud, cloud type services, protection and privacy issue 1. INTRODUCTION Cloud computing has deliver the on-demand computer control and the database storage and the applications and the IT resources over the internet and on a pay-as-you-go basis. In cloud platform will have a rapid access for low cost and easy flexible in IT resources. The cloud will not spend huge amount and spending time in hardware. A Cloud services platform are the Amazon Web Services owns and it has managing the connected network hardware for the application services. Cloud computing is the finest solution to supervise the applications of the shared multi-tenant platform that is supported. While using in the cloud it just simply connect it, and customize it and simply use it. 2. FEATURES OF CLOUD Cloud options are attractive various industries crossways the board to know its importance individuality and software contributions. The main features of cloud computing are:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 413 On-demand self-service: In business the cloud computing can be easily obtain the configure and deploy apps without any IT serious lifting. It computing capabilities, computer service such as network, email, application. It also provision server repair without requiring human interaction with each service provider. Broad network access The Cloud service are widely accessible over the network and accessed with the standard mechanism that support the various wide platforms as like mobile devices and workstations. Resource pooling: Resource pooling has allows the cloud providers to pool major IT property to give out the numerous cloud consumers. Unlike physical and virtual IT resources are vigorously assigned and reassigned according to cloud consumer demand, and it has been followed by the execution through statistical multiplexing. Resource pooling is commonly achieved through multitenancy technology, and it has been encompassed by this multitenancy feature. Rapid Elasticity This is one of the main features of cloud server is the potency to give a flexible computing platform, which can decrease in stripe with business order, and it will provide you the power otherwise it will produce the in-house accomplishment without substantial investment in resources. The resources consist of others storage, processing, memory, network bandwidth, virtual machines and email services. The pooling collectively of the resource builds economies of scale Measured service: The Cloud systems mechanically organize and optimize resource use by leveraging a metering ability at some level of abstraction proper to the category of service (e.g., storage, processing, bandwidth, and active user accounts). In cloud computing the resource practice can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. 3. CLOUD COMPUTING DEPLOYMENT MODELS Cloud computing can be demonstrate in two ways. Either it was based on the deployment model, or its service that the cloud is offering. The types are, public private hybrid Community cloud
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 414 Public: Public clouds are readily accessible from Google, Amazon, Microsoft, and others. It will enable the customers to right in use and share basic computer infrastructure, including hardware, storage and bandwidth. Public resources are shared by hundreds or thousands of people. Global Dots offers worldwide Public Cloud service in top information centers. A public cloud has several profits. It will deliver the services over the web and the customers only have to pay for the resources they use like a utility bill. Since organizations have right of entry to the service provider’s cloud infrastructure, they don’t need to worry about personally installing and maintaining it. Each organization’s data, applications, and infrastructure are divided and it can be accessed by the authorized personnel. Private: Private cloud infrastructure has been organized by single management. Hosting the entire computing infrastructure will not be shared and the infrastructure is provisioned on the organization basis but may be hosted in a third-party service provider. The Private Cloud infrastructure has been implemented and hosted in an on-premise information center using a virtualization layer. Private Cloud offers the maximum level of control and security, it require the organization purchase and sustain the entire infrastructure and acquire and retain the skill. A drawback of a private cloud is, it will very expensive to install. Hybrid: Hybrid cloud model provides multiple options from dissimilar service providers. It uses the both private and public clouds, depending on their function. Hybrid Cloud can also consist of numerous Private and Public Clouds and it may also use several active servers, physical or virtualized, which are not a part of the Private Cloud. In Hybrid Cloud, organizations can keep every business aspect in the most efficient cloud system possible. An example of a hybrid cloud solution is an organization has to keep the confidential data secured on their private cloud, but make additional general, customer-facing content on a public cloud. Community cloud: A community cloud is like to a public cloud apart from that it access is restricted to a specific community of cloud consumers. The community cloud will mutually owned by the community members or by a third-party cloud source that requirements a public cloud with partial access. Community clouds have different attractive option for companies in the base of financial, health. It was well-matched organization of joint projects the advantage from distribution community specific software applications. 4. CLOUD COMPUTING MODELS Cloud Computing is a method of delivering/enabling scalable, expandable and has perfectly elastic software services using internet technologies. The three different types of service models:  Software as a Service (SaaS)  Platform as a Service (PaaS)  Infrastructure as a service (IaaS) Software as a Service (SaaS) model: It provides the clients with the ability to use software applications on a remote basis via an internet web browser. The people referring the Software as a Service as end-user applications. Software as a Service will helps to host and manage the software application and core infrastructure and handle any protection. An example for Saas application is the web-based email it can send and receive the email without controlling the feature additions to the email product or maintaining the servers and operating systems, email program is administration on.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 415 Platform as a service (PaaS): Platform as a service provides a cloud-based environment and it required to support the entire lifecycle of building and delivering the web-based (cloud) applications without the charge and difficulty of buying and organization the underlying hardware, software, provisioning, and hosting. It has been designed quickly to create a web or mobile apps, without disturbing the setting up or running the underlying infrastructure of servers, storage, network and databases needed for growth. Infrastructure as a service (IaaS): Infrastructure as a service provides the companies with computing property including servers, networking, storage, and data center space on a pay-per-use basis. Infrastructure as a Service provides the maximum level of flexibility and running control over your IT resources and is most similar to existing IT resources that numerous IT departments and developers are recognizable at present. 5. CLOUD COMPUTING ISSUES: Cloud computing has facing many confidentiality and integrity information in aiding data security. The solution for the problems is encryption of data stored in the cloud. The encryption of data also gives up new problems. The following are the main problems faced by cloud systems. Security of data: The data security clippings the list of concerns that hold companies back from cloud adoption. Cloud service providers are a targets fact which makes it significant for companies to use risk mitigation strategies and tactics, such as encrypting or tokenizing information before it ever goes to a cloud service. Data Loss and Inadequate Data Backups: Insufficient information backups and improper data syncing is what has made many businesses susceptible to ransomware, a specific type of cloud security threat. Ransomware "locks" away a company's information in encrypted files, only it allowing them to access the data once a ransom has been paid. Shared Cloud Computing Services: Numerous cloud solutions will not provide the security between clients, foremost to shared resources, applications, and systems. In this condition, threats can originate from other clients with the cloud computing service, and threats targeting one client could also have an crash on other clients.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 416 System Vulnerabilities: Cloud computing systems are silent in system vulnerabilities, particularly in networks that have difficult infrastructures and multiple third-party platforms. Once vulnerability becomes known with a popular third-party system, this vulnerability has without any difficulty to be used against organizations Cloud computing is the most recent technology that promises enormous benefits and there is lot of study has been required in this area as many of the concerns related to security and privacy issues are not been answered by the experts and remains open. This technology, developers has narrative ideas about the internet services will no longer need to expend huge chunks of money in building their software and hardware infrastructural capabilities but somewhat they could focus on effective provisioning of utility services. REFERENCES [1] Liang-Jie Zhang; Qun Zhou, "CCOA: Cloud Computing Open Architecture," in proceeding of IEEE International Conference on Web Services (ICWS), 2009, pp. 607-616, 6-10 July 2009. [2] Shyam Patidar; Dheeraj Rane; Pritesh Jain “A Survey Paper on Cloud Computing” in proceeding of Second International Conference on Advanced Computing & Communication Technologies, 2012. [3] Ms S Saranya, Ms P Deepika, Ms S Sasikala, S Jansi, Ms A Kiruthika: “Accelerating Unique Strategy for Centroid Priming in KMeans Clustering” IJIRST (International Journal for Innovative Research in Science & Technology),volume3,pg:40-47 [5]. S.Saranya and Dr. Punithavalli:” An Efficient Centroid Selection Algorithm for K-means Clustering”, International Journal of Multidisciplinary Research Academy, vol1, issue3, pg: 124-140 [6]. S. Saranya,” Evaluation and Efficient Initial Centroid Selection of New Algorithm for High Dimensional Data”, International Journal of Computer Science and Mobile Computing, vol: 3, issue: 6, pg: 722-729 [7]Maneesha Sharma, Himani Bansal and Amit Kumar Sharma, “Cloud Computing: Different Approach & Security Challenge”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012 [4] Sanjoli Singla, Jasmeet Singh, “Cloud Data Security using Authentication and Encryption Technique”, “International Journal of AdvanceResearch in Computer Engineering & Technology (IJARCET)”,Volume2, Issue 7, July 2013 6. CONCLUSION