International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2 (2019) pp. 429-434 Research India Publications. http://www.ripublication.comA Survey on Cloud Computing and Hybrid CloudM.P.Vaishnnave1, K.Suganya Devi*, P.Srinivasan21Department of Computer Science and Engineering, University College of Engineering, Panruti, Tamilnadu, India.*Assistant Professor, Grade-I, Dept. of Computer Science and Engg., National Institute of Technology,Cachar, Assam, India.2Assistant Professor, Grade-I,Department of physics, National Institute of Technology,Cachar, Assam, India.advantages and disadvantages of cloud computing aredescribed in Fig.1.The cloud model is made out of six ofcloud computing fundamental qualities, three service modelsand four deployment models. Cloud gives different servicemodels as, IaaS, PaaS, and SaaS. It can be sent at variousdeployment models, i.e. at public, private, hybrid andcommunity cloud.AbstractCloud computing is the recently developing innovation. Everyassociation needs to interface with the cloud computingcondition.A survey on distinctive hybrid cloud organizationmodels and cloud benefit models accessible in the field ofcloud computing is discussed. An industry pattern has beennoted where the utilization of hybrid cloud design can beutilized which supports, the upcoming industry challenges bygiving the effective method for putting away their informationin the cloud condition by utilizing the mix of both public andprivate cloud, so that it gives the office to store delicateinformation on private cloud and less basic information on topublic cloud where large storing can be made. Hybrid cloud isparticularly profitable for dynamic or extremely adjustableworkloads. This paper portrays the overview, servicemodel,traits,supplier storage and issues of cloud computing.Keywords: Cloud Computing, Private Cloud, Public Cloud,Hybrid Cloud, SaaS, PaaS, IaaS, Cloud Security1. INTRODUCTIONIn Today’s world, innovation is developing at a quick paceand offers the client with various services which are paperlessand accessible online, for example, e-charging, email, emessage, e-transaction and so forth. All these accessibleadministrations require an online information exchange. AttaurRehman Khan[1] has discussed on these informationthat might be any private or delicate data like business secretinformation, MasterCard detail, managing an accountexchange and so on, which require more assurance asdisclosure of these secret information of any unapprovedclient may be unsafe.The greatest advancement in the field ofcomputing is capacity and access of information in the cloud,be that as it may, there are numerous things that need to takethink about as well. Many creators disclose that cloudcomputing has a few advantages when contrasted with theirdrawbacks. Yet, this found that as association of informationbuilds, security of information becomes into a huge issue inspite of the fact that we have to discover a way all you requirewith a specific administration.Cloud computing has beenrising up out of the latest advances in innovation, for example,hardware Virtualization and distributed computing. Therefinement with cloud computing is that the processingmethodology may continue running on one or many relatedPCs meanwhile, utilizing the possibility of virtualization. TheFig.1. Cloud Computing pros&cons2. SERVICE OF CLOUD2.1 Software-as-a-Service (SaaS)Software-as-a-Service (SaaS) displays permits for utilizingsoftware applications as a support of end-clients. PriyadarshiS et. al[3] have discussed the SaaS as the most well knowntype of cloud computing, which is additionally the leastdemanding to comprehend and utilize. These cloudapplication services, fundamentally utilize the utilization ofthe Web to deliver applications. These services are given tothe concerned customer by an outside vendor Haolong[2]. Since the greater part of these applications can bederived specifically from a Web program, customers’no needto install or download anything onto their very own PCs orservers.For this situation, the cloud provider manageseverything viz.,applications, information, runtime, servers,storage, virtualization and systems administration. Utilizing429

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2 (2019) pp. 429-434 Research India Publications. http://www.ripublication.comSaaS makes it simple for enterprise to keep up theirframeworks, as a large portion of the information is overseenby the outside vendor.resources are found or who claims them, expanding thetrouble of protecting them from attack. Sahandi[11]has stated a public cloud computing as when a serviceprovider makes a service or an application available to beused to people around the world over the world wide web andproviding service to multiple organizations at a time bymaking use of the pay per usage system for payment of theservice provided .2.2 Platform-as-a-Service (PaaS)Patil BhagyashriD [4]; S.Priyadarshi[3] has statedthat a Platform-as-a-Service (PaaS) gives the runtimecondition to applications, development and arrangement tools,and so forth. This service model is the hardest to oversee fromamong the three. As the name proposes, the resource, here areoffered through a platform. Developers then utilize thisplatform to make and customize applications based on theframework made accessible to them. Provided that theenterprise has an efficient development group, PaaS makes itsimpler for development, testing and organization ofapplications on a basic server, storage, runtime, middlewareand networking, however, it is up to the customer to manageapplications and information .3.2 Private CloudCloud computing works and manages inside the data center ofan association are known as a private cloud. Numerous buyersof cloud infrastructure (e.g., business units) are includingarrangement for elite use by a single association. Cearley[10]has stated that a Private cloud is like a general publiccloud, however, they are scalable and self-servicing throughan appropriate structure and it delivers the service of a singleassociation. In a private cloud, it is significantly lessdemanding to recognize the client and provider relationshipon the grounds that the foundation possessed and worked witha similar association. In this way, security dangers are lessdemanding to recognize.2.3 Infrastructure-as–a-Service (IaaS)The Infrastructure-as-a-Service (IaaS) is the most essentiallevel of service.The most basic level of service.Thefundamental distinction amongst SaaS and PaaS,subsequently, lies in the certainity that the responsibility ofdealing with the framework is shared by the client or customerand the provider also S.Priyadarshi[3]; Younis AYounis[6]. For this situation, providers still oversee IaaS as itgives access to key resource, for example, physical machines,virtual machines, virtual capacity, and so on. This serviceessentially provides computing infrastructure, for example,virtualization, storage and networking. Customers can buycompletely outsourced service, which are then charged as perthe resource they go through. The provider in this casecharges a rent to install the clients’ virtual server on their ownIT infrastructure. While the merchant is in charge ofoverseeing virtualization, servers, storage and networking, thecustomer needs to deal with information, applications, runtimeand middleware. Customers can introduce any platform asrequired, in light of the kind of framework they select.Likewise ,they will need to oversee updating of more up- todate forms as the necessity for accessibility arises.3.3 Community CloudChirag Modi [9]has discussed about community cloud .Acloud that is deployed and shared among a group of people forsharing common interest, such as mission, security policy,application and services is known as community cloud.It isowned, and managed by community organizations, anoutsider, or some mix of them driven by one or many, and thatmight be available on or off campus Saurabh Singh[5]. Insimple words, a community cloud is being shared andcontrolled by various organizations. It additionally reduces thesecurity chance in the public cloud and reduces the cost ofprivate clouds.3.4 Virtual Private CloudRahul Khurana1 [7] has stated a virtual private cloud as asemi-private cloud, which uses fewer resources, and itconsists of Virtual Private Network (VPN). It is a demandconfigurable pool of shared resources allocated within thecloud environment.3. DIFFERENT DEPLOYMENT MODELS3.1 Public Cloud4. OVERVIEW OF HYBRID CLOUDIt is the genuine portrayal of cloud hosting where the clientand provider have a strong Service Level Agreement (SLA) tomaintain the trust between them. Saurabh Singh[5] hasproposed a cloud framework, which provides open access tothe public and the organization. Businesses, scholastics, orgovernmental associations possess a public cloudenvironment. A public cloud is run and managed by theCloud Service Provider (CSP) and the physical foundationmay introduced at off-site location of the client.Hencenumerous elements may claim and work in a public cloud.This makes many issues, as it is unaware of where theShandi Reza [11] has proposed a hybrid cloud as a blendof both public cloud and private cloud, as it can provideservice to various organizations with a legitimate structure ofthe model, versatility and appropriate coordination betweenboth platforms, for example, public cloud and privateclouds.When people talk in terms of cloud computing, theyare generally referring to public clouds, such as Rackspace,which is shared by several thousands of customers from allover the world. Rahul Khurana1 [7] has discussed about430

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2 (2019) pp. 429-434 Research India Publications. http://www.ripublication.comFig.2. Hybrid cloud Services Modelsystem, in a perfect world, without fixing the present onpremise infrastructure or the applications. Hybrid cloudprovides regular data and software system managementdevices. Different providers attempt to solve this in a fewroutes, together with getting to everything through a webcomputing system Interface, coordination is essential forstorage within the cloud or by means of a cloud gateway ofsome sort, for instance.a cloud provider that offers storage space, data transfercapacity and computing energy to organizations atsubstantially less expensive rates than those of actual, physicalservers. While this saves the organization a tremendous chunkof investment, it could likewise bring about concerns overaccessibility, availability and security. Most organizationswould reconsider before porting delicate information onto apublic cloud. Fig.2. shows the Hybrid cloud service model.This kind of speculation got a few organizations working onsetting up their own cloud-like computing procedures, whichin turn, made what is known as the private cloud. While thesemists work in an indistinguishable route from open mists, theyare implied only for the organization and can be firewalled farfrom whatever is left of the Internet. This gives the privatecloud greater security and better execution too.with the hybridcloud demonstrate, IT leaders have an extra administrationover each, the private and public components, than utilizing apre-packed public cloud platform, especially for big businesscontent administration Rahul Khurana1 [7]. These prepacked programming Software -as-a-service (SaaS) makesfrequent redesigns and change without past notice or contentand, if ineffectively composed, will break similarity withprevious content. This hybrid approach will allow anorganization to exploit the measurability and costeffectiveness of cloud storage while not uncovering missionbasic data. The test is to incorporate and represent such a5. ADVANTAGE OF HYBRID CLOUD(1) It is more versatile in wording that it contains bothprivate and public cloud.(2) Rahul Khurana1 [7]; Saurabh Singh[5] hasoutlined a hybrid cloud in a way as to rapidly scale theorganization's needs. Since a few standardizedprocedures run together to accomplish synchronizationbetween different type of cloud, it makes the perfectanswer for load heavy projects, which can't beeffectively handled by an organization's in-houseserver. Utilizing the hybrid cloud would likewise savethe organization the additional cost of buying eliteserver hardware which would some way or another isvital.431

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2 (2019) pp. 429-434 Research India Publications. Hybrid cloud can be worked whenever and whereverfrom any part of the world. This gives them aworldwide reach for organizations that need to spreadtheir range past geographic limits.It offers both secureresource and versatile public resource.(4) It gives dependably a most level of security as it hasassigned private cloud.It can diminish and deal with thecost based on the requirement.(5) Hybrid cloud could turn out to be exceptionally costlyfor an organization to put resources into hostingsuppliers or outsourcing the same. This innovation,then again, is accessible for exceptionally sensible ratesand consequently, works out considerably lessexpensive for the foundation.Fig. 3. Hybrid Cloud Storage Vendors8. ISSUES IN CLOUD COMPUTING6. TRAITS OF HYBRID CLOUDThere are different issues required in the field of CloudComputing. These issues incorporate Cloud Compatibility,Compliance of the Cloud, Standardizing Cloud Technology,Monitoring while on the Cloud, and Cloud Security RahulKhurana1 [7]. These issues are depicted beneath quickly.(1) Security: Security is regularly a common threat.Guaranteed safety efforts are set up when data isexchanged amongst storage and on-premises areas,furthermore as access- control measures once the datais stored Saurabh Singh[5].Documents should besecure, whereas in storage as well.(1) R.Charanya et. Al[14] has discussed a Role based modelwhere Data owner before storing the data in the cloud,they first encrypt the data in local system and then storethe encrypted data in the cloud. Data users can’t directlyaccess the data from cloud. Each users are assigned withroles and responsibility. The roles are assigned based onthe responsibilities and qualification. The authenticateusers have privileges to access the data with specificroles. The users are assigned with different roles and eachof them are having a set of permissions. A role managerresponsibility is to assign a role to the user, and if the useris going out, then revoke a role from the user. CloudProvider, users and others are not able to see the data ifthey are not assigned with proper roles. Data owner canrevoke the role if they found as unauthorized user.(2) Reliability: Data integrity is also a touch of the hybridcloud condition. The data received from person A toperson B must keep up its integrity. Cloud providerwould index the data. Its honesty also should stay inplace once it's away. For example, if indexes arecorrupted it prompts lose the data.(3) Business coherence: Planned and even unplanneddowntime will bring about issues for the business. TheCapacity provider must embody snapshots, reflecting,and reinforcements, moreover as quick recuperation soif the supplier's framework goes down, it's secured.(4) Reporting and charge-back: Rahul Khurana1[7]has stated that a cloud storage might be acompensation pay-you-pay model, bill are toward theend of the charge cycle. This can exemplify any valuebased charges the provider would conceivably chargewhat's more as capacity costs.(2) Zheng Yan[12] has stated the most difficult issue inthe development of cloud computing, the trustmanagement. Information privacy and security was a vitalperspective. On account of the dynamic nature of cloudcondition trust management was extremely testing.(5) Management: In a hybrid cloud environment, if theclient selects to store some of client's data on-premisesand a few inside the cloud, they should be prepared todeal with the conditions together.(3) Chirag[9] has proposed the issuesencompassing towards the difficulty of the web clients totrust the cloud service.This has been finished by doingcustomer criticism overview and after that proposal hasbeen given to the cloud service provider.They proposedthat if security is not taken care properly, the whole zoneof cloud computing would come up short since cloudcomputing for the most part includes managing personaldelicate data in a public network. Customer input studyhas been done on the basis of taking after targets, i.e. isthere a purchaser with absence of trust or is there a routefor cloud service providers to acquire consumer trust.7. SUPPLIER STORAGE FOR HYBRID CLOUDA few of the fundamental unusual providers and cloudproviders have the particular item focused on building anagent cross hybrid cloud. Fig.3.shows some of hybrid cloudstorage Vendors.(4) There is a work process scheduling algorithm whichconcentrates on execution time and cost of cloud services.Be that as it may, it is not free from attacks and threats soa trust service oriented model is required.A trust service432

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2 (2019) pp. 429-434 Research India Publications. http://www.ripublication.comoriented work process scheduling algorithm has beenproposed in SanaeiZohreh[17]. This algorithmworks, to calculate trust metric and gives approaches toenable clients to choose from various services accessibleas indicated by the requirement.grouped into two type: Key Policy Attributed BasedEncryption(KP-ABE) and Ciphertext-Policy AttributedBased Encryption(CP-ABE).(6) Kan Yang[16]has proposed a Multi-authority Multispecialist CP-ABE which is more reasonable forinformation access control.Various authorities issued theattributes to clients and utilizing access policy.Theinformation owner shares the information characterizedover attributes from various authorities. In this procedure,clients attribute can be changed dynamically. If a clienthas assigned with new attributes or denied some presentattributes, then information access should be changedappropriately. Every information owner before encodingthe information, they partition the information intovarious parts and each part is encrypted with contentskeys by utilizing symmetric encryption system.(5) Albert[13] has proposed a trusted agent which willproduce public key and master keys for the client.Therole of the information proprietor is to encode theinformation with client public key and the client willdecode the information with possessing private key.ITsuggests two focal points in this plan 1) it reducescommunication overhead in the web ,and 2) it providesfine grained access control.The issue behind in thismethod is the information owner needs to utilize theapproved client public key for encryption .According to(ABE) Attribute Based Encryption, the access policy is9.TECHNIQUES FOR CLOUD COMPUTINGTable 1. Techniques and its Advantage & Disadvantage433

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2 (2019) pp. 429-434 Research India Publications. http://www.ripublication.comcomputing,Journal of Supercomputing, Volume. 63,pp:561-592, 2013.10. CONCLUSIONProtection and security of information is a prime concern incloud computing information storage. Despite the fact thatcloud gives flexibility and ease public information storage andmanagement, yet there are chances for any intruder interactionand malicious activity. Information stored at cloud servermight be secret along with greater security. In this paper, wehave discussed about the fundamental components of thecloud computing and the security issues that begin due to thefertilized, shared, public, private and hybrid nature of thecloud. Therefore, the paper proposed various countermeasures to address the security issues and various method inthe cloud computing.REFERENCES[1][2]Atta urRehman Khan, Mazliza Othman, Sajjad AhmadMadani, A Survey of Mobile Cloud ComputingApplication Models, IEEE Communications Surveys &Tutorials , Volume.16, pp: 393-413, 2014.Haolong Fan, Farookh Khadeer Hussain, MuhammadYounas, and Omar Khadeer Hussain,An integratedpersonalization framework for SaaS-based me. 53, pp:157-173, 2015.[3]S.Priyadarshi, N.Deepa, HimamshuKumar,Implementation Software as a Service in anced Research in Computer Engineering &Technology Volume.1, pp:383-386, 2012.[4]PatilBhagyashri D,P L Ramteke, Development ofandroid Based Cloud Server for EfficientImplementation of Platform as a Service, InternationalJournal of Advanced Research in Computer Scienceand Software Engineering Volume .4, pp:309-312,2014.[5]Saurabh Singh, Young-Sik Jeong, Jong Hyuk park, ASurvey on Cloud Computing Security: Issues, Threats,and Solutions ,Journal of Network and ComputerApplications, SI1084-8045, ,2016.[6]Younis A Younis, Madjid Merabti, Kashif Kifaya, ASurvey on cloud Computing Security,Journal 2, ,2013.[7]Rahul Khurana1, Himanshu Gupta, A Hybrid Model onCloud Security 5th International Conference onReliability, Infocom Technologies and Optimization(ICRITO) ,Volume.16,pp:347-352, ,2016.[8]Mazhar Ali, Samee U Khan, Athanasios V Vasilakos,Security in cloud computing: Opportunities andchallenges, Information Sciences ,Volume. 305,pp:357383, , 2015.[9]Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, AviPatel, Muttukrishnan Rajarajan, A survey on securityissues and solutions at different layers of Cloud434[10]W Cearley, Kyle Hilgendorf, Cloud ComputingInnovation Key Initiative Overview, Gartner ResearchDatabase, Volume.15 pp:45-52, 2014.[11]Sahandi Reza, Alkhalil Adel, Martins Opara, cloudcomputing from SMES Perspective: A Survey BasedInvestigation,Journal of Information TechnologyManagement, Volume-24,pp:1-12, 2013.[12]Zheng Yan, Xueyun Li, Mingjun Wang and AthanasiosV Vasilakos, Flexible Data Access Control based onTrust and Reputation in Cloud Computing, IEEETransactions on Cloud Computing,Volume.99,pp:1-4,2015.[13]Albert S Horvath and Rajeev Agrawal, 2015,Trust inCloud Computing Proceedings of the IEEE SoutheastCon - Fort Lauderdale, Florida, Volume.25, pp: 1-8.[14]R Charanya and M Aramudhan, Survey on ,pp:4673‐6725, 2016.[15]Junbeom Hur,Improving Security and Efficiency inAttribute-Based Data Sharing,IEEE Transactions onKnowledge And Data Engineering,Volume. 25,pp:2271 – 2282, 2013.[16]Kan Yang, Xiaohua Jia, Expressive, Efficient, andRevocable Data Access Control for Multi-Authoritycloud Storage, IEEE Transactions on Parallel andDistributed Systems,Volume.25,No 7,pp: 1735 – aei,EjazAhmed, Abdullah Gani and RajkumarBuyya,CloudBased Augmentation for Mobile Devices: Motivation,Taxonomies and Open Challenges , ,IEEECommunications Surveys & Tutorials ,Volume.16,pp:337-368, 2014.[18]SanaeiZohreh,AbolfazliSacid, Abdullah Gani,Heterogeneity in Mobile Cloud Computing: Taxonomyand Open Challenges, IEEE Communication Survey &Tutorials ,Volume. 16, pp:-369-392, 2014.[19]InukolluVenkataNarasimha, SailajaArsi and SrinivasaRaoRavuri, Security Issues Associated with Big Data inCloud Computing,International Journal of NetworkSecurity & Its Applications, Volume.6, pp:45-56, 2014.[20]KhannaLeena and AnantJaiswal, Cloud computing:Security Issues and Description of Encryption BasedAlgorithm to Overcome Them, International Journal ofAdvanced Research in Computer Science and SoftwareEngineering (IJARCSSE) , Volume 3, pp:279-283,2013.[21]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, YangXiang and Duncan S Wong, Secure OutsourcedAttribute-Based Signature, EEE ,,Volume.25,pp: 32853, 2014.

model,traits,supplier storage and issues of cloud computing. Keywords: Cloud Computing, Private Cloud, Public Cloud, Hybrid Cloud, SaaS, PaaS, IaaS, Cloud Security . 1. INTRODUCTION In Today’s world, innovation is developing at a quick pace and offers the