Cloud Computing: A Paradigm Shift in the Way of Computing

Full Text (PDF, 811KB), PP.38-48

Views: 0 Downloads: 0

Author(s)

Mohit Agarwal 1,* Gur Mauj Saran Srivastava 1

1. Department of Physics & Computer Science, Dayalbagh Educational Institute, Agra, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2017.12.05

Received: 16 Oct. 2017 / Revised: 1 Nov. 2017 / Accepted: 11 Nov. 2017 / Published: 8 Dec. 2017

Index Terms

Cloud computing, Grid computing, Distributed computing, Utility computing, Virtual machines (VM's)

Abstract

Cloud computing has been emerging out as a new and evolving paradigm with tremendous momentum. It is one of the most acceptable information technology based service which drew the attention of the people not only from the academia, industry but also registered its popularity among the general people. Features like scalability, elasticity, less entry cost, easy to access and subscription and pay per use etc. compel the businesses and end users to migrate themselves from the traditional platform to the cloud based platform. With the wide acceptability of cloud computing based services in the society, people have various myths like some think it as a new name of internet, as it shares many features of the internet while others feel it as another name of existing technology like distributed system, grid computing, and parallel computing etc.. This paper will help in making people aware of this technology by highlighting the points of difference with the existing technology and focusing on the various advantages and area of application which presents the evidence of its popularity and continual growth. The work in the paper will end with the discussion on the status of various issues and shortcomings from which it is suffering along with the present and future scope in this popular area.

Cite This Paper

Mohit Agarwal, Gur Mauj Saran Srivastava, "Cloud Computing: A Paradigm Shift in the Way of Computing", International Journal of Modern Education and Computer Science(IJMECS), Vol.9, No.12, pp. 38-48, 2017. DOI:10.5815/ijmecs.2017.12.05

Reference

[1]K. Alhamazani, R. Ranjan, K. Mitra, F. Rabhi, P. P. Jayaraman, S. U. Khan, A. Guabtni, and V. Bhatnagar, “An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art,” Computing, vol. 97, no. 4, pp. 357–377, Apr. 2014. https://doi.org/10.1007/s00607-014-0398-5
[2]K. Bilal, S. U. R. Malik, S. U. Khan, and A. Y. Zomaya, “Trends and challenges in cloud datacenters,” IEEE Cloud Computing, vol. 1, no. 1, pp. 10–20, May 2014. https://doi.org/10.1109/mcc.2014.26
[3]A. S. Prasad and S. Rao, “A Mechanism Design Approach to Resource Procurement in Cloud Computing,” IEEE Transactions on Computers, vol. 63, no. 1, pp. 17–30, Jan. 2014. https://doi.org/10.1109/tc.2013.106
[4]Gartner (2016)[online] http://www.gartner.com/events/emea/itfinancialprocurementassetmanagement. (Accessed 08 February 2017).
[5]P. M. Mell and T. Grance, “The NIST definition of cloud computing,” 2011. https://doi.org/10.6028/nist.sp.800-145
[6]M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view of cloud computing, in Tech. Rep. UCB/EECS-2009-28, EECS Department, U.C. Berkeley, February 2009.
[7]M. Hori, E. Kawashima, T. Yamazaki, "Application of Cloud Computing to Agriculture and Prospects in Other Fields", FUJITSU Sci. Tech, vol. 46, no. 4, pp. 446-454, October 2010.
[8]RightScale (2016) state-of-the-cloud [online] https://www.rightscale.com/lp/state-of-the-cloud ( Accessed 08 February 2017)
[9]V. Sharma and G. M. S. Srivastava, “Evolution and present status of cloud computing: a comprehensive analysis,” International Journal of Business Information Systems, vol. 22, no. 2, p. 123, 2016. https://doi.org/10.1504/ijbis.2016.076243
[10]Gartner, “Forecast Overview: Public Cloud Services, Worldwide,” 2011–2016, 4Q12 Update, 2013
[11]R. Buyya, K. Sukumar, "Platforms for Building and Deploying Applications for Cloud Computing", CoRR'11, pp. 6-11, 2011.
[12]Forbes (2017) Analytics, DataStorage Will Lead Cloud Adoption In 2017 [online]http://www.forbes.com/sites/louiscolumbus/2016/11/20/analyticsdatastoragewillleadcloudadoptionin2017/#5206bfb41497. (Accessed 08 February 2017).
[13]M. Klems, J. Nimis, and S. Tai, “Do Clouds Compute? A Framework for Estimating the Value of Cloud Computing,” Lecture Notes in Business Information Processing, pp. 110–123, 2009. https://doi.org/10.1007/978-3-642-01256-3_10
[14]A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, “Security in multi-tenancy cloud,” 44th Annual 2010 IEEE International Carnahan Conference on Security Technology, Oct. 2010. https://doi.org/10.1109/ccst.2010.5678682
[15]L. Wang, J. Tao, M. Kunze, A. C. Castellanos, D. Kramer, and W. Karl, “Scientific Cloud Computing: Early Definition and Experience,” 2008 10th IEEE International Conference on High Performance Computing and Communications, Sep. 2008. https://doi.org/10.1109/hpcc.2008.38
[16]I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared,” 2008 Grid Computing Environments Workshop, Nov. 2008. https://doi.org/10.1109/gce.2008.4738445
[17]D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, “Security issues in cloud environments: a survey,” International Journal of Information Security, vol. 13, no. 2, pp. 113–170, Sep. 2013. https://doi.org/10.1007/s10207-013-0208-7
[18]L. A. Barroso and U. Hölzle, “The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines,” Synthesis Lectures on Computer Architecture, vol. 4, no. 1, pp. 1–108, Jan. 2009. https://doi.org/10.2200/s00193ed1v01y200905cac006
[19]J. Hamilton, "Cooperative expendable micro-slice servers (CEMS): Low cost low power servers for internet-scale services", Proc. 4th Biennial CIDR, 2009.
[20]B. Li, J. Li, J. Huai, T. Wo, Q. Li, and L. Zhong, “EnaCloud: An Energy-Saving Application Live Placement Approach for Cloud Computing Environments,” 2009 IEEE International Conference on Cloud Computing, 2009. https://doi.org/10.1109/cloud.2009.72
[21]A. N. Khan, M. L. M. Kiah, M. Ali, S. A. Madani, A. ur R. Khan, and S. Shamshirband, “BSS: block-based sharing scheme for secure data storage services in mobile cloud environment,” The Journal of Supercomputing, vol. 70, no. 2, pp. 946–976, Aug. 2014. https://doi.org/10.1007/s11227-014-1269-8
[22]S. Srikantaiah, A. Kansal, F. Zhao, "Energy aware consolidation for cloud computing", Proc. HotPowerWorkshop Power Aware Comput. Syst., 2008-Dec.
[23]J. Li, B. Li, T. Wo, C. Hu, J. Huai, L. Liu, and K. P. Lam, “CyberGuarder: A virtualization security assurance architecture for green cloud computing,” Future Generation Computer Systems, vol. 28, no. 2, pp. 379–390, Feb. 2012. https://doi.org/10.1016/j.future.2011.04.012
[24]B. R. Kandukuri, R. P. V., and A. Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Services Computing, 2009. https://doi.org/10.1109/scc.2009.84
[25]A. Abbas and S. U. Khan, “A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds,” IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 4, pp. 1431–1441, Jul. 2014. https://doi.org/10.1109/jbhi.2014.2300846
[26]Y. Ghanam, J. Ferreira, and F. Maurer, “Emerging Issues & Challenges in Cloud Computing—A Hybrid Approach,” Journal of Software Engineering and Applications, vol. 05, no. 11, pp. 923–937, 2012. https://doi.org/10.4236/jsea.2012.531107
[27]R. Latif, H. Abbas, S. Assar, and Q. Ali, “Cloud Computing Risk Assessment: A Systematic Literature Review,” Future Information Technology, pp. 285–295, 2014. https://doi.org/10.1007/978-3-642-40861-8_42
[28]T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010. https://doi.org/10.1109/aina.2010.187
[29]K. Boloor, R. Chirkova, Y. Viniotis, and T. Salo, “Dynamic Request Allocation and Scheduling for Context Aware Applications Subject to a Percentile Response Time SLA in a Distributed Cloud,” 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Nov. 2010. https://doi.org/10.1109/cloudcom.2010.96
[30]Z. Xiao, Y. Xiao, "Security and Privacy in Cloud Computing", IEEE Commun. Surveys & Tutorials, vol. 15, no. 2, pp. 843-859, 2013. https://doi.org/10.1109/surv.2012.060912.00182
[31]V. Nae, R. Prodan, A. Iosup, and T. Fahringer, “A new business model for massively multiplayer online games,” Proceeding of the second joint WOSP/SIPEW international conference on Performance engineering - ICPE ’11, 2011. https://doi.org/10.1145/1958746.1958785
[32]S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, Jan. 2011. https://doi.org/10.1016/j.jnca.2010.07.006
[33]Voorsluys, J. Broberg, S. Venugopal, and R. Buyya, “Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation,” Cloud Computing, pp. 254–265, 2009. https://doi.org/10.1007/978-3-642-10665-1_23
[34]Lepakshi Goud, "Achieving Availability Elasticity and Reliability of the Data Access in Cloud Computing", Int'l J. Advanced Eng. Sciences and Technologies, vol. 5, no. 2, pp. 150-155, 2011.
[35]J. Che, Y. Duan, T. Zhang, and J. Fan, “Study on the Security Models and Strategies of Cloud Computing,” Procedia Engineering, vol. 23, pp. 586–593, 2011. https://doi.org/10.1016/j.proeng.2011.11.2551
[36]T. Diaby and B. B. Rad, “Cloud Computing: A review of the Concepts and Deployment Models,” International Journal of Information Technology and Computer Science, vol. 9, no. 6, pp. 50–58, Jun. 2017. https://doi.org/10.5815/ijitcs.2017.06.07
[37]Q. Tao, H. Chang, Y. Yi, and C. Gu, “A trustworthy management approach for cloud services QoS data,” 2010 International Conference on Machine Learning and Cybernetics, Jul. 2010. https://doi.org/10.1109/icmlc.2010.5580998
[38]A. K. Bardsiri and S. M. Hashemi, “QoS Metrics for Cloud Computing Services Evaluation,” International Journal of Intelligent Systems and Applications, vol. 6, no. 12, pp. 27–33, Nov. 2014. https://doi.org/10.5815/ijisa.2014.12.04
[39]F. Lombardi and R. Di Pietro, “Secure virtualization for cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1113–1122, Jul. 2011 https://doi.org/10.1016/j.jnca.2010.06.008
[40]A. Berl, E. Gelenbe, M. Di Girolamo, G. Giuliani, H. De Meer, M. Q. Dang, and K. Pentikousis, “Energy-Efficient Cloud Computing,” The Computer Journal, vol. 53, no. 7, pp. 1045–1051, Aug. 2009. https://doi.org/10.1093/comjnl/bxp080
[41]M. Agarwal and G. M. S. Srivastava, “A genetic algorithm inspired task scheduling in cloud computing,” 2016 International Conference on Computing, Communication and Automation (ICCCA), Apr. 2016. https://doi.org/10.1109/ccaa.2016.7813746
[42]M. Agarwal and G. M. S. Srivastava, “A Cuckoo Search Algorithm-Based Task Scheduling in Cloud Computing,” Advances in Intelligent Systems and Computing, pp. 293–299, Sep. 2017. https://doi.org/10.1007/978-981-10-3773-3_29
[43]P. S. Suryateja, “A Comparative Analysis of Cloud Simulators,” International Journal of Modern Education and Computer Science, vol. 8, no. 4, pp. 64–71, Apr. 2016. https://doi.org/10.5815/ijmecs.2016.04.08