Deployment of Private Cloud and Analysis of data for Business Case

Authors

  • Arora P CSE, RITM, YMCA University of Science & Technology, Palwal, India
  • Kumar R CSE, RITM, YMCA University of Science & Technology, Palwal, India

DOI:

https://doi.org/10.26438/ijcse/v7i6.595598

Keywords:

Cloud Computing, Private Cloud, Cloud Orchestration, Infrastructure as a Service, Platform as a Service, CloudStack, VMWARE hypervisor, XenServer, Compute Storage, Multisite Deployment

Abstract

Cloud computing technology has been emerging and spreading at a great pace due to its service oriented architecture, elasticity, cost-effectiveness, etc. Many organizations are using Infrastructure-as-a-Service (IaaS) public Clouds for data migration away from traditional IT Infrastructure but there are a few fields such as finance, hospitals, military and others that are reluctant to use public Clouds due to perceived security vulnerability. Enterprises in such fields feel more vulnerable to security breaches and feel secure using in-house IT infrastructure. The introduction of private Clouds is a solution for these businesses. This paper focuses on deployment of private Cloud with the help of apache cloud stack, Analysis of data for Building the Business case for Private Cloud. I have proposed a platform and evaluated a service oriented IaaS model of private Cloud which provides a platform to the business suite to sell it as a PaaS service to the customers. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid).

References

[1] CloudStack. https://cloudstack.apache.org/. Accessed: 2016-05-10.

[2] Xen Virtualization Architecture, Novell Doc., 2012. http://www.novell.com/documentation/sles11/book_xen/?page=/do cumentation/sles11/book_xen/data/sec_xen_basics_arch.html [4] Bao Rong Chang, et. al. 2012. Assessment of Hypervisor and Shared Storage for Cloud Computing Server. proceedings of Third International Conference on IBICA.

[3] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.

[4] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24

[5] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.

[6] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.

[7] Phelim Boyle, Mark Broadie, and Paul Glasserman. Monte-carlo methods for security pricing. Journal of economic dynamics and control, 21(8):1267–1321, 1997.

[8] Phelim P Boyle. Options: A Monte-Carlo approach. Journal of financial economics, 4(3):323–338, 1977.

[9] Rajkumar Buyya, Christian Vecchiola, and S Thamarai Selvi. Mastering cloud computing: foundations and applications programming. Newnes, 2013.

[10] S.L. Mewada, “A Proposed New Approach for Cloud Environment using Cryptic Techniques”, In the Proceedings of the 2016 International Conference on Computer Science and Engineering, India, pp.542-545, 2016.

Downloads

Published

2019-06-30
CITATION
DOI: 10.26438/ijcse/v7i6.595598
Published: 2019-06-30

How to Cite

[1]
P. Arora and R. Kumar, “Deployment of Private Cloud and Analysis of data for Business Case”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 595–598, Jun. 2019.

Issue

Section

Research Article