Content deleted Content added
→top: Don't repeat 'cloud' in section headings |
Citation bot (talk | contribs) Alter: journal, title, last. Add: isbn, doi, volume, series, s2cid. Removed URL that duplicated unique identifier. | You can use this bot yourself. Report bugs here. | Activated by AManWithNoPlan | All pages linked from User:AManWithNoPlan/sandbox2 | via #UCB_webform_linked |
||
Line 6:
{{See also|Category:Cloud clients}}
Cloud computing architectures consist of front-end platforms called clients or cloud clients. These clients are servers, fat (or thick) clients, thin clients, zero clients, [[tablet computer|tablets]] and mobile devices that users directly interact with. These client platforms interact with the cloud data storage via an application (middleware), via a web browser, or through a virtual session. Virtual sessions in particular require secure encryption algorithm frameworking which spans the entire interface.<ref>{{cite journal |last1=Sudha |first1=M |title=Enhanced security framework to ensure data security in cloud computing using cryptography |journal=Advances in Computer Science and
===Zero client===
Line 15:
{{Main|Cloud storage}}
An online network storage where data is stored and accessible to multiple clients. Cloud storage is generally deployed in the following configurations: [[Cloud computing#Public cloud|public cloud]], [[Cloud computing#Private cloud|private cloud]], [[Cloud computing#Community cloud|community cloud]], or some combination of the three also known as [[Cloud computing#Hybrid cloud|hybrid cloud]].<ref name="bare_url">{{cite web|title = The NIST Definition of Cloud Computing.
In order to be effective, the cloud storage needs to be agile, flexible, scalable, [[multi-tenancy]], and secure.<ref>{{cite web|title = Virtualized Enterprise Storage for Flexible, Scalable Private Clouds.
==Delivery==
Line 40:
# flex tenancy
Of these, flex tenancy is considered the most user adaptive SaaS paradigm in designated multi-input four way manifold models.<ref name="Andrikopoulos">{{cite journal|last1=Andrikopoulos|first1=Vasilios|s2cid=15216208|title=Towards Modeling and Execution of Collective Adaptive Systems|journal=ICSOC 2013: Service-Oriented Computing – ICSOC 2013 Workshops|series=Lecture Notes in Computer Science|date=2013|volume=8377|pages=69–81|
===Development as a service (DaaS)===
Line 63:
:On-demand access to resources requires the ability to move quickly and efficiently between servers and possibly even clouds.
* Network security
:Security is always important, but when you are dealing with multi-tenancy, it becomes much more important because you're dealing with segregating multiple customers.<ref>{{cite web|url=https://www.youtube.com/watch?v=Db95UmMZWzc|last=Greaves, J. (of Carpathia Hosting) and Potti, S. (of Citrix).
==See also==
|