Comparative Study of Various Cloud Architectures
نویسندگان
چکیده
Computing needs number of equipment and programming assets which are changing or getting updated in this way requiring clients to reliably pump in speculations to overhaul their infrastructure. This obliged specialists to land at an answer where clients would have entry to most recent renditions of equipment and programming without requiring new speculations. This prompted the very idea of Cloud computing where a client pays just for the administration as opposed for the item. In this paper we are exhibiting cloud testing measures and near examination between the three structures to be specific private, public and p2p on the premise of security, protection, accessibility and respectability.
منابع مشابه
Comparative Study and Analysis of Cloud Intrusion Detection System
Cloud computing provides a framework for supporting end users easily attaching powerful services and applications through Internet. Denial ofService (DoS) attack or Distributed Denial-of-Service (DDoS) are major security issues in cloud environment. The best solution to protect the cloud from these attacks is use of IDS. IDS have become popular cloud security technology to detect cyber attacks ...
متن کاملEnergy Aware Resource Management of Cloud Data Centers
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...
متن کاملA Comparative Study of Association Rule Mining Algorithms on Grid and Cloud Platform
Association rule mining is a time consuming process due to involving both data intensive and computation intensive nature. In order to mine large volume of data and to enhance the scalability and performance of existing sequential association rule mining algorithms, parallel and distributed algorithms are developed. These traditional parallel and distributed algorithms are based on homogeneous ...
متن کاملA Comparative Study of Authentication Methods in Mobile Cloud Computing
Mobile Cloud Computing (MCC) is an emerging technology which attempts to combine the storage and processing resources of cloud environment with the dynamicity and accessibility of mobile devices. Security, particularly authentication, is fast evolving as a focal area in mobile cloud computing research. This paper comprehensively surveys the various authentication mechanisms proposed so far for ...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016