Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

[1]  Geoffrey C. Fox,et al.  High Performance Parallel Computing with Clouds and Cloud Technologies , 2009, CloudComp.

[2]  Yongzhao Zhan,et al.  A hash-based secure interface on plain connection , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).

[3]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[4]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[5]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[6]  T. Grance,et al.  SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .

[7]  Xiaojiang Du,et al.  Prometheus: Privacy-aware data retrieval on hybrid cloud , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[9]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[10]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[11]  Jayant Baliga,et al.  Energy Consumption in Access Networks , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.

[12]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.

[13]  Anthony Sulistio,et al.  Private cloud for collaboration and e-Learning services: from IaaS to SaaS , 2010, Computing.

[14]  S. O. Kuyoro,et al.  Cloud computing security issues and challenges , 2011 .

[15]  Pushpendra Kumar Pateriya,et al.  A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment , 2013 .

[16]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[17]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[18]  S. Goyal Perils of Cloud Based Enterprise Resource Planning , 2013 .

[19]  Gerard Briscoe,et al.  Community Cloud Computing , 2009, CloudCom.

[20]  Rajkumar Buyya,et al.  Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities , 2009, 2009 International Conference on High Performance Computing & Simulation.

[21]  Andrew Charlesworth,et al.  Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.

[22]  S. Srinivasan,et al.  Data property analyzer for information storage in cloud , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[23]  Dengguo Feng,et al.  Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .

[24]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[25]  Alexandru Iosup,et al.  A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing , 2009, CloudComp.

[26]  Michael Anthony Bauer,et al.  A Data Management in a Private Cloud Storage Environment Utilizing High Performance Distributed File Systems , 2013, 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[27]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[28]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[29]  Rajkumar Buyya,et al.  Managing Peak Loads by Leasing Cloud Infrastructure Services from a Spot Market , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).

[30]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[31]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[32]  Judith Hurwitz,et al.  Cloud Computing for Dummies , 2009 .

[33]  Michael Missbach,et al.  Private Cloud Infrastructures for SAP , 2016 .

[34]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[35]  Lizhe Wang,et al.  Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[36]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[37]  Rajkumar Buyya,et al.  Cloudbus Toolkit for Market-Oriented Cloud Computing , 2009, CloudCom.

[38]  Shamim Hossain Infrastructure as a Service , 2013 .

[39]  George Reese,et al.  Cloud application architectures , 2009 .

[40]  Won Kim,et al.  Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..

[41]  Gurudatt Kulkarni,et al.  A NEW APPROACH TO HYBRID CLOUD , 2012 .

[42]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[43]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[44]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[45]  Franck Cappello,et al.  Cost-benefit analysis of Cloud Computing versus desktop grids , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[46]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[47]  Mark Ryan,et al.  Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.

[48]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[49]  Christoph Meinel,et al.  Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[50]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[51]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[52]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[53]  Rich Kaestner,et al.  The Basics of Cloud Computing. , 2012 .

[54]  Robert L. Grossman,et al.  The Case for Cloud Computing , 2009, IT Professional.

[55]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[56]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[57]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[58]  Dave Durkee,et al.  Why Cloud Computing Will Never Be Free , 2010, ACM Queue.

[59]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[60]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[61]  Oskar Hamrén,et al.  Mobile phones and cloud computing : A quantitative research paper on mobile phone application offloading by cloud computing utilization , 2012 .

[62]  F. A. Alshuwaier,et al.  Applications of cloud computing in education , 2012, 2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC).

[63]  Singh Ghuman,et al.  Cloud Computing-A Study of Infrastructure as a Service , 2015 .

[64]  Muli Ben-Yehuda,et al.  The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..

[65]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[66]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[67]  Anton Beloglazov,et al.  Energy-efficient management of virtual machines in data centers for cloud computing , 2013 .

[68]  Albert Mo Kim Cheng,et al.  Autonomic computing architecture for real-time medical application running on virtual private cloud infrastructures , 2013, SIGBED.

[69]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[70]  Marin Litoiu,et al.  Feedback-based optimization of a private cloud , 2012, Future Gener. Comput. Syst..

[71]  Radu Prodan,et al.  A survey and taxonomy of infrastructure as a service and web hosting cloud providers , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.

[72]  Min Liu,et al.  Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms , 2013, J. Networks.

[73]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[74]  David E. Y. Sarna,et al.  Implementing and Developing Cloud Computing Applications , 2010 .

[75]  Bofeng Zhang,et al.  Comparison of Several Cloud Computing Platforms , 2009, 2009 Second International Symposium on Information Science and Engineering.

[76]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[77]  Neal Leavitt,et al.  Is Cloud Computing Really Ready for Prime Time? , 2009, Computer.

[78]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[79]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[80]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[81]  Danny Garber,et al.  Windows Azure Hybrid Cloud , 2013 .

[82]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .