• No results found

A Systematic Approach to Exploration of Emerging Cloud Computing Technologies and Its On-Demand Access

N/A
N/A
Protected

Academic year: 2021

Share "A Systematic Approach to Exploration of Emerging Cloud Computing Technologies and Its On-Demand Access"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

____________________________________________________________________________________________________ ©2015, IRJIE-All Rights Reserved Page -18

A Systematic Approach to Exploration of Emerging Cloud

Computing Technologies and Its On-Demand Access

Dr. (Mrs.)Ananthi Sheshasaayee1, Swetha Margaret T.A.2 1

Research Supervisor, PG and Research Department Of Computer Science & Application, Quaid-E- Millath Government College for Women(Autonomous), Tamil Nadu, India.

2

Research Scholar, PG and Research Department Of Computer Science & Application, Quaid-E- Millath Government College for Women(Autonomous), Tamil Nadu, India.

Abstract

“Cloud” computing is the present challenge which is creating an evolution for On-Demand access to the information technology, services and products. To adequately describe what cloud computing offers, it’s necessary to discuss its infrastructure, service-oriented architectures, social networking, unique protocols, Standard Application Programming Interfaces (APIs), and dozens of other related fields. The appearance of cloud computing and its features to consume assets is making it imperative for organizations to examine whether cloud computing makes sense for them. To contrive through the fog around cloud computing, the fundamentals about the technology should be analyzed. This paper gives a solid grounding on essentials and emerging technologies in cloud computing.

Keywords

Cloud Computing; On-Demand; Application Programming Interfaces; service-oriented architectures.

1. Introduction

Cloud computing is the future of information technology. It is the convergence of technologies and trends that are making IT infrastructures and application more dynamic and modular. “Cloud computing” was coined for what happens when applications and services are moved into the internet “cloud”. Today’s perception of cloud computing is strongly influenced by marketing departments of IT companies. From an architectural perspective, there is much confusion surrounding how cloud is both similar to and different from existing models of computing, and how these similarities and differences impact the organizational, operational, and technological approaches to network and information security practices. There are many definitions today that attempt to address cloud from the perspective of academicians, architects, engineers, developers, managers, and consumers. This document focuses on a definition that is specifically tailored to the unique perspectives of IT network and security professionals.

According to U.S. National Institute of Standards and Technology (NIST) the term Cloud Computing is defined as A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. When “Internet as cloud” is drawn it represents one of its essential characteristics of cloud computing “Abstraction”. Cloud is a place where, resources are pooled and segregated as required. Its instructions are standard based and cloud works on the utility based paradigm (i.e.), computing is made possible with a pay-as-you-go. This is the prevalent reason for cloud computing being radical. In contrast, not all applications benefit from cloud. Issues like latency, transaction control, security and regulatory dispute still persists.

2. The Early Phase

2.1 The NIST Model

The concept of cloud computing has been introduced for several years, however, there are still various interpretations on what is cloud computing. Since the cloud computing specification of National Institute of Standards and Technology (NIST) has been proposed. NIST defines cloud computing by describing five essential characteristics, three cloud service models, and four cloud deployment models. This model eventually did not require a cloud to use virtualization to pool resources

.

2.2 The Cloud Cube Model

There are several “cloud formations” or forms of cloud computing. Each offers different characteristics, varying degrees of flexibility, different collaborative opportunities, and different risks. Thus one of the key challenges that businesses face when considering cloud computing as an option is to determine how to choose the cloud formation best suited to their various types of business operations.

(2)

____________________________________________________________________________________________________ ©2015, IRJIE-All Rights Reserved Page -19

The Jericho Forum’s objectives related to cloud computing are distinctive – enabling secure collaboration in the appropriate cloud formations best suited to the business needs. They are,

 Point out that not everything is best implemented in clouds; it may be best to operate some business functions using a traditional non-cloud approach.

 Explain the different cloud formations that the Jericho Forum has identified.  Describe key characteristics, benefits and risks of each cloud formation.

 Provide a framework for exploring in more detail the nature of different cloud formations and the issues that need answering to make them safe and secure places.

Fig 1: The Cloud Cube Model Source: www.jerichoforum.org 2.3 Cloud Deployment Model

The cloud isn’t a technology. It’s more of an approach to building IT services - an approach that harnesses the power of servers, as well as virtualization technologies that combine servers into large computing pools and divide single servers into multiple virtual machines. And there are several different deployment models for implementing cloud technology. With cloud computing technology, large pools of resources can be connected through private or public networks. This technology simplifies infrastructure planning and provides dynamically scalable infrastructure for cloud based applications, data, and file storage.

Businesses can choose to deploy applications on Public, Private, Hybrid clouds or the newer Community. What are the differences between these types of cloud computing, and how can you determine the right cloud path for your organization? Here are some fundamentals of each to help with the decision-making process.

The four primary types of cloud models are:  Public

 Private  Hybrid  Community

Fig 2: Types of Cloud Deployment Models

(3)

____________________________________________________________________________________________________ ©2015, IRJIE-All Rights Reserved Page -20 2.3.1 Public Cloud

The most recognizable model of cloud computing to many consumers is the public cloud model, under which cloud services are provided in a virtualized environment, constructed using pooled shared physical resources, and accessible over a public network such as the internet. To some extent they can be defined in contrast to private clouds which ring-fence the pool of underlying computing resources, creating a distinct cloud platform to which only a single organization has access. Public clouds, however, provide services to multiple clients using the same shared infrastructure [8] Public clouds are used extensively in offerings for private individuals who are less likely to need the level of infrastructure and security offered by private clouds. However, enterprise can still utilize public clouds to make their operations significantly more efficient, for example, with the storage of non-sensitive content, online document collaboration and webmail [8].

2.3.2 Private Cloud

A private cloud is a particular model of cloud computing that involves a distinct and secure cloud based environment in which only the specified client can operate. As with other cloud models, private clouds will provide computing power as a service within a virtualized environment using an underlying pool of physical computing resource. However, under the private cloud model, the cloud (the pool of resource) is only accessible by a single organization providing that organization with greater control and privacy. The private cloud model is closer to the more traditional model of individual local access networks (LANs) used in the past by enterprise but with the added advantages of virtualization [8].

2.3.3 Hybrid Cloud

A hybrid cloud is an integrated cloud service utilizing both private and public clouds to perform distinct functions within the same organization. All cloud computing services should offer certain efficiencies to differing degrees but public cloud services are likely to be more cost efficient and scalable than private clouds. Therefore, an organization can maximize their efficiencies by employing public cloud services for all non-sensitive operations, only relying on a private cloud where they require it and ensuring that all of their platforms are seamlessly integrated [8].

Hybrid cloud models can be implemented in a number of ways:

 Separate cloud providers team up to provide both private and public services as an integrated service  Individual cloud providers offer a complete hybrid package

 Organizations who manage their private clouds themselves sign up to a public cloud service which they then integrate into their infrastructure

2.3.4 Community Cloud

A community cloud is a is a multi-tenant cloud service model that is shared among several or organizations and that is governed, managed and secured commonly by all the participating organizations or a third party managed service provider [7]. Community clouds are a hybrid form of private clouds built and operated specifically for a targeted group. These communities have similar cloud requirements and their ultimate goal is to work together to achieve their business objectives. The goal of community clouds is to have participating organizations realize the benefits of a public cloud with the added level of privacy, security, and policy compliance usually associated with a private cloud. Community clouds can be either on-premise or off-on-premise [7]. Couple of situations where a community cloud environment is best:

 Government organizations within a state that need to share recourse  A private HIPAA compliant cloud for a group of hospitals or clinics  Telco community cloud for Telco DR to meet specific FCC regulations

HIPAA is the federal Health Insurance Portability and Accountability

FCC is the Federal Communications Commission

3. Cloud Platforms and Trends

Cloud computing is changing the technological world in countless ways. It wouldn't be wrong to say that it's actually transforming the way individuals and enterprises perceive data security, storage, and management process. Web

hosts around the world are giving a serious consideration to adoptingcloud hosting platform and offering it as a service to

their customers; of course, not every mid-size and small web hosting provider can do this today, but in the forthcoming years, it won’t be a surprise to see almost every web hosting company, be it small, mid-size or a big enterprise offering cloud products to its customers. Whether you already have cloud service in your portfolio or are currently in the process of including it in forthcoming days, it is almost a necessity to know about what potential cloud technology really holds for the market.

(4)

____________________________________________________________________________________________________ ©2015, IRJIE-All Rights Reserved Page -21

Let us take a look at 4 possible future trendsarena that we should anticipate in couple of years down the lane.

“Cloud Computing” May Become Identical to “Computing”

The term “cloud” has been around for quite some time in technological world, but with channel of time, it is expected to infiltrate deeper, and perhaps become the most widely used and adopted technology. For the next generation computing the term “Cloud Computing" will fade instead it might just become computing [9].

Centralized Data Will Become The Most Important Strategic Advantage

Slowly the experts around the world would become pros at creating massive databases that aggregate valuable information that can be accessed by anybody through any publicly accessible API. Some of the examples of such data can be stock market trends in last 10 years or clinical outcome data for improved patient care etc

Mobile Devices Are Bound To Become More Powerful

Now that’s certainly a no-brainer that everyone knows about. With continuous increase in the popularity of mobile computing and its dependence on clouds for supporting different mobile applications, mobile devices will certainly have

much more capabilities than today, but their data will be stored in cloud. One such example today is iCloud by Appleat the

moment, and you can expect to see similar stuff on other mobile platforms too.

Supervision of Identities Will Soon Become the Need of the Hour

As we move towards centralized trust, we’ll have to learn managing identities within different enterprises, not to mention within clouds as well. From there, places would be created on Internet where validating identities would be possible. There will be a radical increase in the number of clouds, and there will arise a need for one single sign-on, and thus security based on identity will become a mandatory requirement.

These trends should play out in next three years or so, and 2014 will certainly mark the introduction of the transformation. Hence, we have a need in moving to a cloud-powered world in the New Year in case you're still living in the Dark Age. Remember that customers will always run behind the latest technological advancements, and you'd be able to lure them only when you stay up-to-date with the latest trends.

4. Emerging Cloud Technologies

The cloud is an ever-changing infrastructure that is continuously being applied to different facets of life in order to provide benefits to human kind. There is a lot we can learn from hard data and many of the traditional limits of computing such as power, space and cost have been eliminated due to the elastic nature of cloud computing. The cloud has embodied a new era of emerging markets that has caused many big name vendors to change their strategy in order to survive. These emerging cloud technologies have the capacity to be the next big thing in terms of consumer technology. Cloud computing is seen by many as the next gesticulate of information technology in all means of source. The copious supply of technology capabilities at a low cost offers many tantalizing opportunities. In addition to reduce equipped costs, cloud technologies have become the basis for radical business modernization and new business models. Like any innovative technology advancement, cloud computing also creates disruptive possibilities and impending risks. The fact that cloud computing involves the aggregation of computing supremacy, and more importantly, information, has become a source of increasing apprehension. Cloud users and Regime policy-makers are speckled with massive questions about the current use and future evolutionary path of cloud computing.

According to Gartner, Inc.2014 [18] tinted the top ten technologies and trends that will be strategic for most organizations in 2014 and upcoming years. Analysts presented their findings during Gartner Symposium, being held here through October 10. Gartner defines a strategic technology as one with the impending for significant impact on the enterprise in the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt.

A strategic technology may be an existing technology that has matured and/or become suitable for a wider range of uses. It may also be an emerging technology that offers an opportunity for strategic business advantage for early adopters or with potential for significant market disruption in the next five years. These technologies impact the organization's long-term plans, programs and initiatives. The apex ten strategic technology trends for 2014 include:

(5)

____________________________________________________________________________________________________ ©2015, IRJIE-All Rights Reserved Page -22

 Mobile Device Diversity and Management  Mobile Appsand Applications

 The Internet of Everything

 Hybrid Cloud and IT as Service Broker  Cloud/Client Architecture

 The Era of Personal Cloud  Software Defined Anything  Web-Scale IT

 Smart Machines  3-D Printing

Cloud computing will continue to be the way of the future– not only domestically, but for international emerging markets, as well. Studies project that more than 50 percent of all information technology will be in the cloud within the next five to ten years; not surprising, as international markets believe in cloud virtualization, and it’s an ideal environment for many of their use cases. Growth of the cloud-platform engineering will be exponential, as cloud virtualization is increasingly appreciated worldwide and is more readily available in more regions. Particularly in Asia, where we’ve seen a strong desire for greater capacity in the region. Despite these positive gains, however, security in the cloud remains a valid concern [21]. There are a few key reasons why cloud adoption is happening even faster there than other emerging markets. First, there’s what Microsoft’s chair of emerging markets Orlando Ayala calls the “mobile revolution,” which is a response to the demand for access to corporate services and applications from anywhere at any time. Another factor is price point [21].

5. Conclusion

This paper discusses the emerging cloud computing trends and practices that pursues the advance scientific features of cloud computing with layer wise classification of the cloud services, and highlighted the subsequent guidelines of research facing the both industry and academic community. Cloud computing is an IT innovation that is changing on how individuals and organizations should acquire and utilize IT resources. These innovations focus on moving IT resources from a capital expenditure (CAPEX) to an operational expenditure (OPEX). It implies that an organization’s IT needs is provided by a third party on a pay-as-you-need basis or on-demand access methods. While the shift to cloud computing has incredible benefits to business organizations, its adoption is presenting organizations with challenges. The main challenge is that of reliability, arising from the fact that cloud computing platform is a complex network involving different players [1]. The future of cloud computing is not definite but by analyzing the trends it seems that cloud technology will play a large part in our day to day lives. In the future business and consumers will benefit from higher interoperability between clouds and maybe even a cloud network which will improve sharing of resources and information. There are many uses

for this technology and it is surely going to change the way in which we handle our data, services and access/store our digital content but for its full potential to be unlocked a broader understanding, appreciation and investment in cloud computing technologies is required [8].

References

[1] Oredo, John Otieno, and James Muranga Njihia. "Mindfulness and Quality of Innovation in Cloud Computing Adoption." International Journal of Business and Management 10.1 (2014): p144.

[2] Antonescu, Alexandru-Florian, Philip Robinson, and Torsten Braun. "Dynamic SLA management with forecasting using

multi-objective optimization."Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. IEEE, 2013.

[3] Rebollo, Oscar, Daniel Mellado, and Eduardo Fernández-Medina. "A Systematic Review of Information Security

Governance Frameworks in the Cloud Computing Environment." J. UCS 18.6 (2012): 798-815.

[4] Venters, Will, and Edgar A. Whitley. "A critical review of cloud computing: researching desires and realities." Journal of Information Technology 27.3 (2012): 179-197.

[5] Garrison, Gary, Sanghyun Kim, and Robin L. Wakefield. "Success factors for deploying cloud computing."

Communications of the ACM 55.9 (2012): 62-68.

[6] Rimal, Bhaskar Prasad, and Eunmi Choi. "A service oriented taxonomical spectrum, cloudy challenges and

opportunities of cloud computing."International Journal of Communication Systems 25.6 (2012): 796-819.

[7] Hu, Guoqiang, Wee Peng Tay, and Yonggang Wen. "Cloud robotics: architecture, challenges and applications." Network, IEEE 26.3 (2012): 21-28.

(6)

____________________________________________________________________________________________________ ©2015, IRJIE-All Rights Reserved Page -23

[8] Carlin, Sean, and Kevin Curran. "Cloud computing technologies." International Journal of Cloud Computing and Services Science (IJ-CLOSER) 1.2 (2012): 59-65.

[9] Saripalli, Prasad, and Ben Walters. "Quirc: A quantitative impact and risk assessment framework for cloud security." Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010.

[10] Zhang, Qi, Lu Cheng, and Raouf Boutaba. "Cloud computing: state-of-the-art and research challenges." Journal of internet services and applications 1.1 (2010): 7-18.

[11] Zhang, Shuai, et al. "Cloud computing research and development trend."Future Networks, 2010. ICFN'10. Second International Conference on. IEEE, 2010.

[12] Buyya, Rajkumar, Rajiv Ranjan, and Rodrigo N. Calheiros. "Modeling and simulation of scalable Cloud computing

environments and the CloudSim toolkit: Challenges and opportunities." High Performance Computing & Simulation, 2009. HPCS'09. International Conference on. IEEE, 2009.

[13] Birman, Ken, Gregory Chockler, and Robbert van Renesse. "Toward a cloud computing research agenda." ACM SIGACT News 40.2 (2009): 68-80.

[14] Dikaiakos, Marios D., et al. "Cloud computing: distributed internet computing for IT and scientific research." Internet

Computing, IEEE 13.5 (2009): 10-13.

[15] Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal. "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities." High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on. Ieee, 2008.

[16] Lewis, Grace. "Basics about cloud computing." Software Engineering Institute Carniege Mellon University, Pittsburgh (2010).

[17] Wang, Lizhe, et al., eds. Cloud computing: methodology, systems, and applications. CRC Press, 2011.

[18] Fehling, Christoph, et al. Cloud Computing Patterns: Fundamentals to Design, Build, and Manage Cloud Applications. Springer Publishing Company, Incorporated, 2014.

[19] http://smartdatacollective.com/cloudwedge/192286/emerging-cloud-technologies

[20] http://www.gartner.com/newsroom/id/2603623

[21] http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-expert-group/roadmap-dec2012

Figure

Fig 2: Types of Cloud Deployment Models  Source: http://www.edureka.co/blog

References

Related documents

Based upon the existing data on functional and numerical responses of the major aquatic protist taxa, we have iden- tified two key avenues for future studies: (A) The

Odink (2013) points out that Dutch juvenile judges are o ft en critical of requests for prolongation of authorizations for placement in a closed institution

Patients with severe chronic obstructive pulmonary disease (COPD) develop dynamic lung hyperinflation (DH) during symptom-lim- ited incremental and constant work exercise with

Integrated cattle and dryland farming systems in Indonesia use a range of crop residues and by products to feed cattle through intensive and extensive

Keyboard/mouse, dual Ethernet, video, COM2, and optional PIM module knockout On-board Headers: COM1, USB0, USB1, secondary EIDE,. floppy, PIM site, floppy, parallel, and CompactFlash

For the case of source signals that were coupled via a threshold func- tion TE in combination with the time-shift test correctly identified effective connectivty and did not result

The assigned loads for fIXtures with both hot and cold water supplies are given for separate hot and cold water loads and for total load. The separate hot and cold water loads

“if, before they start, the apprentice does not have the level 1 in English or maths (or both) that meets the minimum requirement of the apprenticeship framework: > they must