Deployment of Private Cloud and Analysis of data for Business Case
DOI:
https://doi.org/10.26438/ijcse/v7i6.595598Keywords:
Cloud Computing, Private Cloud, Cloud Orchestration, Infrastructure as a Service, Platform as a Service, CloudStack, VMWARE hypervisor, XenServer, Compute Storage, Multisite DeploymentAbstract
Cloud computing technology has been emerging and spreading at a great pace due to its service oriented architecture, elasticity, cost-effectiveness, etc. Many organizations are using Infrastructure-as-a-Service (IaaS) public Clouds for data migration away from traditional IT Infrastructure but there are a few fields such as finance, hospitals, military and others that are reluctant to use public Clouds due to perceived security vulnerability. Enterprises in such fields feel more vulnerable to security breaches and feel secure using in-house IT infrastructure. The introduction of private Clouds is a solution for these businesses. This paper focuses on deployment of private Cloud with the help of apache cloud stack, Analysis of data for Building the Business case for Private Cloud. I have proposed a platform and evaluated a service oriented IaaS model of private Cloud which provides a platform to the business suite to sell it as a PaaS service to the customers. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid).
References
[1] CloudStack. https://cloudstack.apache.org/. Accessed: 2016-05-10.
[2] Xen Virtualization Architecture, Novell Doc., 2012. http://www.novell.com/documentation/sles11/book_xen/?page=/do cumentation/sles11/book_xen/data/sec_xen_basics_arch.html [4] Bao Rong Chang, et. al. 2012. Assessment of Hypervisor and Shared Storage for Cloud Computing Server. proceedings of Third International Conference on IBICA.
[3] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[4] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[5] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[6] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
[7] Phelim Boyle, Mark Broadie, and Paul Glasserman. Monte-carlo methods for security pricing. Journal of economic dynamics and control, 21(8):1267–1321, 1997.
[8] Phelim P Boyle. Options: A Monte-Carlo approach. Journal of financial economics, 4(3):323–338, 1977.
[9] Rajkumar Buyya, Christian Vecchiola, and S Thamarai Selvi. Mastering cloud computing: foundations and applications programming. Newnes, 2013.
[10] S.L. Mewada, “A Proposed New Approach for Cloud Environment using Cryptic Techniques”, In the Proceedings of the 2016 International Conference on Computer Science and Engineering, India, pp.542-545, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
