Deployment of Private Cloud and Analysis of data for Business Case
Paras Arora1 , Raj Kumar2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-6 , Page no. 595-598, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.595598
Online published on Jun 30, 2019
Copyright © Paras Arora, Raj Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Paras Arora, Raj Kumar, “Deployment of Private Cloud and Analysis of data for Business Case,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.595-598, 2019.
MLA Style Citation: Paras Arora, Raj Kumar "Deployment of Private Cloud and Analysis of data for Business Case." International Journal of Computer Sciences and Engineering 7.6 (2019): 595-598.
APA Style Citation: Paras Arora, Raj Kumar, (2019). Deployment of Private Cloud and Analysis of data for Business Case. International Journal of Computer Sciences and Engineering, 7(6), 595-598.
BibTex Style Citation:
@article{Arora_2019,
author = {Paras Arora, Raj Kumar},
title = {Deployment of Private Cloud and Analysis of data for Business Case},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {595-598},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4598},
doi = {https://doi.org/10.26438/ijcse/v7i6.595598}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.595598}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4598
TI - Deployment of Private Cloud and Analysis of data for Business Case
T2 - International Journal of Computer Sciences and Engineering
AU - Paras Arora, Raj Kumar
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 595-598
IS - 6
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
222 | 218 downloads | 114 downloads |
Abstract
Cloud computing technology has been emerging and spreading at a great pace due to its service oriented architecture, elasticity, cost-effectiveness, etc. Many organizations are using Infrastructure-as-a-Service (IaaS) public Clouds for data migration away from traditional IT Infrastructure but there are a few fields such as finance, hospitals, military and others that are reluctant to use public Clouds due to perceived security vulnerability. Enterprises in such fields feel more vulnerable to security breaches and feel secure using in-house IT infrastructure. The introduction of private Clouds is a solution for these businesses. This paper focuses on deployment of private Cloud with the help of apache cloud stack, Analysis of data for Building the Business case for Private Cloud. I have proposed a platform and evaluated a service oriented IaaS model of private Cloud which provides a platform to the business suite to sell it as a PaaS service to the customers. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid).
Key-Words / Index Term
Cloud Computing, Private Cloud, Cloud Orchestration, Infrastructure as a Service, Platform as a Service, CloudStack, VMWARE hypervisor, XenServer, Compute Storage, Multisite Deployment
References
[1] CloudStack. https://cloudstack.apache.org/. Accessed: 2016-05-10.
[2] Xen Virtualization Architecture, Novell Doc., 2012. http://www.novell.com/documentation/sles11/book_xen/?page=/do cumentation/sles11/book_xen/data/sec_xen_basics_arch.html [4] Bao Rong Chang, et. al. 2012. Assessment of Hypervisor and Shared Storage for Cloud Computing Server. proceedings of Third International Conference on IBICA.
[3] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[4] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[5] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[6] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
[7] Phelim Boyle, Mark Broadie, and Paul Glasserman. Monte-carlo methods for security pricing. Journal of economic dynamics and control, 21(8):1267–1321, 1997.
[8] Phelim P Boyle. Options: A Monte-Carlo approach. Journal of financial economics, 4(3):323–338, 1977.
[9] Rajkumar Buyya, Christian Vecchiola, and S Thamarai Selvi. Mastering cloud computing: foundations and applications programming. Newnes, 2013.
[10] S.L. Mewada, “A Proposed New Approach for Cloud Environment using Cryptic Techniques”, In the Proceedings of the 2016 International Conference on Computer Science and Engineering, India, pp.542-545, 2016