CLOUD COMPUTING MODELS: A STRATEGY FOR THE DEVELOPMENT OF NEW MARKETS FOR CLOUD SERVICES AND DEVELOPMENT MODELS

Authors

  • Amanze, B.C. Department of Computer Science, Imo State University, Owerri Nigeria.
  • Chilaka. U.L. Department of Computer Science, Imo State University, Owerri Nigeria.

Keywords:

Cloud Computing, Models, Cloud Services, Delivery Models

Abstract

This work will look into the available cloud models being offered in the market and classify the various forms of cloud. We shall also look at the security of the cloud, its challenges and probable solutions to these challenges. The capabilities of the cloud providers would be used to expatiate on what these service providers do and what they do not offer. It should be known that cloud computing utilizes various technologies that have been in existence since ages. This has led to the renewal of building an IT infrastructure from various approaches. Also we shall prove that cloud computing relies on sharing of various IT infrastructures like: network (internet), server’s storage, applications, services and what have you.

References

Kim, J. and Hony S. (2012). A consolidated Authentication Model in Cloud Computing Environment. International Journal of Multimedia and Ubiquitous Engineering.

Monjur, A. and Mohammad, A. (2014). Cloud Computing and Security Issues in the Cloud “International Journal of Network Security and its application.

Emman, A.H.M. (2013). Additional Authentication and Authorization using Registered E-mail – ID for Cloud Computing. International Journal of Soft Computing and Engineering, 3(2), 110-113.

Han, J., Susilo, W. and Mu, Y. (2013). Identify – based data Storage in Cloud Computing. Future Generation Computer Systems, 29, 673-681.

Yassin, A.A., Jin, H., Ibrahim A., Qiang, W. and Zou, D. (2012). Efficient Password – based two factors Authentication in Cloud Computing. International Journal of Security and its Application 6(2), 143-148.

Kumar, A. (2012). World of Cloud Computing and Security. International Journal of Cloud Computing and Services Sciences, 1(2), 53-58.

Dukaric, R. and Juric, M.B. (2013). Towards a Unified Taxonomy and Architecture of Cloud Frameworks. Future Generation Computer Sytems; 29, 1196-1210.

Casola, V; Euomo, A; Rak, M. and Villiano, U. (2013). The Cloud Grid Approach: Security Analysis and performance evaluation. Future Generation Computer Systems, 28, 85-93.

Florin, O.N. (2012). Cloud Computing Security Issues: Journal of Defense Resources Management Vol. 3, Issues 2(5) 2012.

www.cloud.standard.org

Reese, George (2009). Cloud Application Architectures: Building Application and Infrastructure in the cloud, O’Relty Media.

http://aws.amazon.com/documentation/getstarted

http://www.gogride.com

http://www.rackspace.com

Lewis, Grace (2009). Cloud Computing: Funding the Silver Lining, not the Silver Bullet, http://www.SEI.cmu.edu/library/abstract/white-papers/cloudcomoutingbasics.cfm

Jasen Wagne and Grace Timothy (2011). Guidelines on Security and Privacy on the Cloud Computing. National Institute of Standards and Technology.

Strowd, Harrison and Lewis, Grace; T-check in system-of systems technologies: cloud computing. (cmu/SEI-2010-TN-009). Software Engineering Institute Carnegie Mellon University. http://www.SEI.cmu.edu/library/abstract/reprots.

Eugine, Gorelik (2013). Cloud Computing Models, Masters Thesis, MIT Sloans School of Management and MIT Engineering Systems Division Boston Massachusetts U.S.A.

Parklick D. (1966). The Challenge of the Computer Utility. Addition Wesley Educational Publish

Additional Files

Published

28-02-2019

How to Cite

Amanze, B.C., & Chilaka. U.L. (2019). CLOUD COMPUTING MODELS: A STRATEGY FOR THE DEVELOPMENT OF NEW MARKETS FOR CLOUD SERVICES AND DEVELOPMENT MODELS. International Educational Journal of Science and Engineering, 2(1). Retrieved from https://iejse.com/journals/index.php/iejse/article/view/24