International Journal of Innovative Research in Engineering and Management
Year: 2014, Volume: 2, Issue: 4
First page : ( 9) Last page : ( 15)
Online ISSN : 2350-0557.
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Ravinder Chauhan , Sukhwinder Kaur
The ability to range a web application or website is tied directly to understanding where the resource constraints lie and what force the addition of various resources has on the Multi-Tenant applications. Unfortunately, the skeleton and architects more often than not assume that simply adding another server into the mix can fix any performance difficulty and security issues as well as data storage issues. When we start adding new hardware/update existing hardware in a private, public, Hybrid clouds, the complexity starts growing which affects recital and hence security. While priced cloud computing services save pains to maintain the computational environment, there are several drawbacks such as overhead of virtual machines, possibility to share one physical machine with several virtual machines, and indeterminacy of topological allocation of their own virtual machines. Multi-tenancy is one of key characteristics of the service oriented computing especially for Software as a Service (SaaS) to leverage economy of scale to drive down total cost of ownership for both service consumer and provider. This paper aims to study the technologies to build a cost-effective, protected and scalable multi-tenant infrastructure and how to improve the security and enhance its performance. This paper also identifies the potential performance bottlenecks, summarizes corresponding optimization approaches and best implementation practices for different multi-tenant business usage models
[1] Bhushan Lal Sahu, “A Comprehensive Study on Cloud Computing Volume2, Issue9, and September2012 Available at: www.ijarcsse.com
[2] Mohsin Nazir,” Cloud Computing: Overview & Current Research Challenges 8Volume 8, Issue 1 (Nov. - Dec. 2012) Available at: www.iosjournals.om
[3] Mills, Elinor Mills, “Cloud Computing Security Forecast: Clear Skies”, 2009 http://news.zdnet.com/2100- 9595_22-264312.html
[4] Foley, M., J., 2008. Microsoft 2.0: How Microsoft Plans to Stay Relevant in the Post-Gates Era. Indianapolis: Wiley
[5] Whittaker, Z., 2008. Egnyte: using and sustaining Enterprise 2.0 | Enterprise Alley | ZDNet. [Online]. Available at: http://blogs.zdnet.com/enterprisealley/?p=289 [Accessed 6th November 2008]
[6] Mladen A. Vouk,” Cloud Computing – Issues, Research and Implementations Available at: Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246
[7] IsecT Ltd., 2004. Notice Board technical briefing: securing physical access and environmental services for datacenters. [E-book] Available at:http://www.noticebored.com/NB_tech_briefing_on_data center_security_SAMPLE.pdf [Accessed 9th November 2008]
[8] Weiss, A., 2007. Computing in the clouds, netWorker, 11(4), 16-25
Computer Science and Department, Kurukshetra University/YIET, Yamunanagar, India, 9050761166, (email:ravinder85@gamil.com).
No. of Downloads: 12 | No. of Views: 2729