Cloud computing architecture: Difference between revisions

Content deleted Content added
top: Don't repeat 'cloud' in section headings
Citation bot (talk | contribs)
Alter: journal, title, last. Add: isbn, doi, volume, series, s2cid. Removed URL that duplicated unique identifier. | You can use this bot yourself. Report bugs here. | Activated by AManWithNoPlan | All pages linked from User:AManWithNoPlan/sandbox2 | via #UCB_webform_linked
Line 6:
{{See also|Category:Cloud clients}}
 
Cloud computing architectures consist of front-end platforms called clients or cloud clients. These clients are servers, fat (or thick) clients, thin clients, zero clients, [[tablet computer|tablets]] and mobile devices that users directly interact with. These client platforms interact with the cloud data storage via an application (middleware), via a web browser, or through a virtual session. Virtual sessions in particular require secure encryption algorithm frameworking which spans the entire interface.<ref>{{cite journal |last1=Sudha |first1=M |title=Enhanced security framework to ensure data security in cloud computing using cryptography |journal=Advances in Computer Science and itsIts Applications |date=2012 |volume=1 |issue=1}}</ref>
 
===Zero client===
Line 15:
{{Main|Cloud storage}}
 
An online network storage where data is stored and accessible to multiple clients. Cloud storage is generally deployed in the following configurations: [[Cloud computing#Public cloud|public cloud]], [[Cloud computing#Private cloud|private cloud]], [[Cloud computing#Community cloud|community cloud]], or some combination of the three also known as [[Cloud computing#Hybrid cloud|hybrid cloud]].<ref name="bare_url">{{cite web|title = The NIST Definition of Cloud Computing. NIST Special Publication 800-145 (September 2011). National Institute of Standards and Technology, U.S. Department of Commerce |author1=Mell, P. |author2=Grance, T. |url=http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf |date=September 2011 |accessdate=2012-05-20}}</ref>
 
In order to be effective, the cloud storage needs to be agile, flexible, scalable, [[multi-tenancy]], and secure.<ref>{{cite web|title = Virtualized Enterprise Storage for Flexible, Scalable Private Clouds. Reprinted from Dell Power Solutions, 2012 Issue 1 |author1=Sherbak, T. |author2=Sweere, N. |author3=Belapurkar, V. |last-author-amp=yes |url=http://i.dell.com/sites/content/business/solutions/power/en/Documents/ps1q12-20120209-sherbak.pdf |accessdate=2012-05-27}}</ref>
 
==Delivery==
Line 40:
# flex tenancy
 
Of these, flex tenancy is considered the most user adaptive SaaS paradigm in designated multi-input four way manifold models.<ref name="Andrikopoulos">{{cite journal|last1=Andrikopoulos|first1=Vasilios|s2cid=15216208|title=Towards Modeling and Execution of Collective Adaptive Systems|journal=ICSOC 2013: Service-Oriented Computing – ICSOC 2013 Workshops|series=Lecture Notes in Computer Science|date=2013|volume=8377|pages=69–81|urldoi=https://pdfs10.semanticscholar.org1007/868d/7ced8e15aad63b0bbb7bf4f0a3269742d79f.pdf978-3-319-06859-6_7|isbn=978-3-319-06858-9}}</ref> Such systems are based on simplified encryption methods that target listed data sequences over multiple passes.<ref name="Li">{{cite journal|last1=Li|first1=Lin|title=Multi-tenant Data Authentication Model for SaaS|journal=The Open Cybernetics and Systematics Journal|date=2014|volume=8|issue=8|pages=322–329|doi=10.2174/1874110X01408010322|url=http://benthamopen.com/contents/pdf/TOCSJ/TOCSJ-8-322.pdf}}</ref> The simplicity of this concept makes flex tenancy SaaS popular among those without informatics processing experience, such as basic maintenance and custodial staff in franchise businesses.
 
===Development as a service (DaaS)===
Line 63:
:On-demand access to resources requires the ability to move quickly and efficiently between servers and possibly even clouds.
* Network security
:Security is always important, but when you are dealing with multi-tenancy, it becomes much more important because you're dealing with segregating multiple customers.<ref>{{cite web|url=https://www.youtube.com/watch?v=Db95UmMZWzc|last=Greaves, J. (of Carpathia Hosting) and Potti, S. (of Citrix). Uploaded by CarpathiaHosting on Feb 22, 2010| title = Flex-Tenancy: Secure Multi-Tenancy Network Environments|accessdate=2012-05-27}}</ref>
 
==See also==