CLOUD COMPUTING MODELS: A STRATEGY FOR THE DEVELOPMENT OF NEW MARKETS FOR CLOUD SERVICES AND DEVELOPMENT MODELS
Keywords:
Cloud Computing, Models, Cloud Services, Delivery ModelsAbstract
This work will look into the available cloud models being offered in the market and classify the various forms of cloud. We shall also look at the security of the cloud, its challenges and probable solutions to these challenges. The capabilities of the cloud providers would be used to expatiate on what these service providers do and what they do not offer. It should be known that cloud computing utilizes various technologies that have been in existence since ages. This has led to the renewal of building an IT infrastructure from various approaches. Also we shall prove that cloud computing relies on sharing of various IT infrastructures like: network (internet), server’s storage, applications, services and what have you.
References
Kim, J. and Hony S. (2012). A consolidated Authentication Model in Cloud Computing Environment. International Journal of Multimedia and Ubiquitous Engineering.
Monjur, A. and Mohammad, A. (2014). Cloud Computing and Security Issues in the Cloud “International Journal of Network Security and its application.
Emman, A.H.M. (2013). Additional Authentication and Authorization using Registered E-mail – ID for Cloud Computing. International Journal of Soft Computing and Engineering, 3(2), 110-113.
Han, J., Susilo, W. and Mu, Y. (2013). Identify – based data Storage in Cloud Computing. Future Generation Computer Systems, 29, 673-681.
Yassin, A.A., Jin, H., Ibrahim A., Qiang, W. and Zou, D. (2012). Efficient Password – based two factors Authentication in Cloud Computing. International Journal of Security and its Application 6(2), 143-148.
Kumar, A. (2012). World of Cloud Computing and Security. International Journal of Cloud Computing and Services Sciences, 1(2), 53-58.
Dukaric, R. and Juric, M.B. (2013). Towards a Unified Taxonomy and Architecture of Cloud Frameworks. Future Generation Computer Sytems; 29, 1196-1210.
Casola, V; Euomo, A; Rak, M. and Villiano, U. (2013). The Cloud Grid Approach: Security Analysis and performance evaluation. Future Generation Computer Systems, 28, 85-93.
Florin, O.N. (2012). Cloud Computing Security Issues: Journal of Defense Resources Management Vol. 3, Issues 2(5) 2012.
www.cloud.standard.org
Reese, George (2009). Cloud Application Architectures: Building Application and Infrastructure in the cloud, O’Relty Media.
http://aws.amazon.com/documentation/getstarted
Lewis, Grace (2009). Cloud Computing: Funding the Silver Lining, not the Silver Bullet, http://www.SEI.cmu.edu/library/abstract/white-papers/cloudcomoutingbasics.cfm
Jasen Wagne and Grace Timothy (2011). Guidelines on Security and Privacy on the Cloud Computing. National Institute of Standards and Technology.
Strowd, Harrison and Lewis, Grace; T-check in system-of systems technologies: cloud computing. (cmu/SEI-2010-TN-009). Software Engineering Institute Carnegie Mellon University. http://www.SEI.cmu.edu/library/abstract/reprots.
Eugine, Gorelik (2013). Cloud Computing Models, Masters Thesis, MIT Sloans School of Management and MIT Engineering Systems Division Boston Massachusetts U.S.A.
Parklick D. (1966). The Challenge of the Computer Utility. Addition Wesley Educational Publish
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 International Educational Journal of Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.