2012
DOI: 10.5120/6094-8281
|View full text |Cite
|
Sign up to set email alerts
|

Traffic Analysis and Shaping of the Cloud Services over Common Deployment Model using Cloud Analyst

Abstract: Cloud computing gives an enormous service to the customer in order to reduce the cost of investment on infrastructure development. The CSU (Cloud service User) can get all services from CSP (Cloud Service Provider) for satisfying their business needs. There are huge number of services are offered by the CSP for satisfying the customer's request. The performance of the cloud computing depends on various factors which provides the reliability over internet to the customer. One of the main factor need to be conce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Thus, a cloud CRM system can improve customer service (Chalmeta, 2006;Garrido-Moreno and Padilla-Meléndez, 2011). Academic research has now begun to focus on the architectural issues of cloud technology, such as computing methods (Foster et al, 2008), flow analysis (Saravanakumar and Arun, 2012), and system security and storage strategies (Subashini and Kavitha, 2011;Yuan et al, 2010). Moreover, Beloglazov et al (2012) proposed the allocation of energy-aware heuristics for data center resources.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Thus, a cloud CRM system can improve customer service (Chalmeta, 2006;Garrido-Moreno and Padilla-Meléndez, 2011). Academic research has now begun to focus on the architectural issues of cloud technology, such as computing methods (Foster et al, 2008), flow analysis (Saravanakumar and Arun, 2012), and system security and storage strategies (Subashini and Kavitha, 2011;Yuan et al, 2010). Moreover, Beloglazov et al (2012) proposed the allocation of energy-aware heuristics for data center resources.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To secure the data from losing its confidentiality, privileges are given to the files, so that only specific people can access the file. Privileges can be given both the types of cloud service (Saravanakumar, 2012). Authorization to the cloud is provided based on the credentials stored in the database during registration with the cloud.…”
Section: Introductionmentioning
confidence: 99%