2.1 CONCEPT OF CLOUD COMPUTING
Cloud computing is a recently developing paradigm of distributed computing. Though it is not a new idea that emerged just recently.According to AL Zain M. and Pardede E. (2000). Computer networks are still in their infancy. But as they grow up and become more sophisticated, we will probably see the spread of ‘computer utilities’ which, like present electric and telephone utilities, will service individual homes and Offices across the country.” His vision was the true indication of today’s utility based Computing paradigm. One of the giant steps towards this world was taken in mid 1990s when grid computing was first coined to allow consumers to obtain computingPower on demand. The origin of cloud computing can be seen as an evolution ofGrid computing technologies. The term Cloud computing was given prominence firstby Google’s CEO Eric Schmidt in late 2006, so the birth of cloud computing is very recent phenomena although its root belongs to some old ideas with new business, technical and social perspectives. From the architectural point of view cloud is naturally build on an existing grid based architecture and uses the grid services and adds some technologies like virtualization and some business models.
In brief cloud is essentially a bunch of commodity computers networked togetherin same or different geographical locations, operating together to serve a number of customers with different need and workload on demand basis with the help of virtualization. Cloud services are provided to the cloud users as utility services like water, electricity, telephone using pay-as-you-use business model.
2.1.2 RESEARCH WORK ON CLOUD COMPUTING
Researchers has done extensive literature review on various aspects of cloud computing and their services models. Few of them are as follows;
According to Daniel D. Sunil (2011).Cloud can be unsecure due to some issues like attack from unauthorized users. The attack can be of two types, targeting the whole cloud or targeting single service, in both the cases, the security issues are needed to be handled. This can be done with the help of Access Control List (ACL). ACL contains the set of access rules, which can be assigned to the authorized user. The ACL works along with the Security manager in order to avoid unauthorized access to the Cloud.
Leong L. etal (2009). This section includes survey conducted by international data corporation (IDC). It shows the strength of cloud computing to be implemented in IT industry and gives the potential inspiration to CSP. The section contains the survey related to the growth of cloud.
Growth of Cloud Computing