INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 57    Submit Your Rating     Cite This   Download        Certificate

CLOUD COMPUTING – AN OVERVIEW & THE GROWTH OF EDGE COMPUTING

    1 Author(s):  DR. S. SUBATRA DEVI

Vol -  10, Issue- 1 ,         Page(s) : 61 - 67  (2020 ) DOI : https://doi.org/10.32804/RJSET

Abstract

The landscape of cloud computing has significantly changed over the last decade. To create smart devices, applications are moving rapidly to the cloud since the amount of data to be stored is increasing tremendously. However, in perspective of Internet of Things, traditional cloud computing has several shortcomings. In recent years, the IoT and the wide generation of wireless networks, the edge computing has been growing rapidly. These applications demand edge computing where data is stored and processed near the end device. This pushed the scope of edge computing, which process the data at the edge of the network. In this paper, a study on the growth of edge computing is analyzed based on the volume of usage.

[1] R.Buyya, C.S. Yeo and S. Venugopal, “Market oriented Cloud computing: Vision, hype and reality for delivering IT services as computing utilities”, in Proc. IEEE/ ACM Grid Conf., 2008, pp. 50-57.
[2] R. Aoun, E. A. Doumith and M. Gagnaire, “Resource Provisioning for enriched services in Cloud environment”, in Proc. IEEE Cloud Conf., 2010, pp. 296-303.
[3] U. Khalid, A. Ghafoor, M. Irum, and M. A. Shibli, “Cloud based secure and privacy enhanced authentication & authorization protocol”, Procedia Computer Science, 22, 2013, pp. 680-688.
[4] Web-Resource http://en.wikipedia.org/wiki/Cloud_computing
[5] “Cloud Computing: a Perspective Study” Lizhe WANG, Gregor VON LASZEWSKI
[6] S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud
Computing (S. Pearson and G. Yee, eds.), Computer Communications and Networks, pp. 3–42,
Springer London, 2013.
[7] R. Dua, A. Raja, and D. Kakadia, “Virtualization vs containerization to support paas,” in Cloud
Engineering (IC2E), 2014 IEEE International Conference on, pp. 610–614, March 2014.
[8]  N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, “A framework for authentication and authorization credentials in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509–516, July 2013.
[9]  R. Lomotey and R. Deters, “Saas authentication middleware for mobile consumers of iaas cloud,” in Services, 2013 IEEE Nineth World Congress on, pp. 448–455, June 2013.
[10] M. Anand, “Cloud monitor: Monitoring applications in cloud,” in Cloud Computing in Emerging Markets (CCEM), 2012 IEEE International Conference on, pp. 1–4, Oct 2012.
[11] Dr. Bhawna Nigam, Himanshu Dugar and Tanveer Singh Bhatia, “Comparative Study of IoT Platforms and Support for Edge Computing”, International Journal of Engineering & Technology, Vol 7, 2018, pp. 461-467.
[12] Volkan Gezer, Jumyung Um and Martin Ruskowski, “An Introduction to Edge Computing and A Real-Time Capable Server Architecture”, International Journal on Advances in Intelligent Systems”, Vol 11, no. 1 & 2, July 2018, pp. 105-114.
[13]   United Nations, “The Universal Declaration of Human Rights”
http://www.un.org/en/documents/udhr/index.shtml, 1948. Retrieved August 2015.
[14]  Cloud Security Alliance (CSA), “Security Guidance for Critical Areas of Focus in Cloud Computing” version 3, 2011. Available at: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
[15]  Cloud Security Alliance (CSA), “The Notorious Nine: Cloud Computing Top Threats in 2013”.
Available at: https://cloudsecurityalliance.org.
[16]  Devi, T. & Ganesan, R., 2015. Platform-as-a-Service (PaaS): Model and Security Issues. Telkomnika Indonesian Journal of Electrical Engineering, 15(1), pp. 151-161.
[17]  B.P. Rimal, Choi Eunmi, I. Lumb, ―A Taxonomy and Survey of Cloud Computing Systems‖, Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218
[18]  B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security Issues, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009.
[19] Saurabh Bagchi, Muhammad-Bilal Siddiqui, Paul Wood, Heng Zhang, “Dependability in Edge Computing” Communications of the ACM, January 2020, Vol. 63 No. 1, Pages 58-66.
[20] Shi, Weisong; Cao, Jie; Zhang, Quan; Li, Youhuizi; Xu, Lanyu, "Edge Computing: Vision and Challenges". IEEE Internet of Things Journal. 3 (5), Oct 2016, 637–646.
[21] Weisong shi, George Pallis, Zhiwei xu, “Edge Computing”, proceedings of the IEEE , Vol. 107, No. 8, August 2019.
[22] Blesson Varghese ; Nan Wang ; Sakil Barbhuiya ; Peter Kilpatrick ; Dimitrios S, “Challenges and Opportunities in Edge Computing”, 2016 IEEE International Conference on Smart Cloud.
[23] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
[24] Volkan Gezer, Jumyung Um, Martin Ruskowski, “An Introduction to Edge Computing and A Real-Time Capable Server Architecture”, International Journal of Intelligent Systems 11, July 2018.
[25] Ejaz ahmed, Arif Ahmed, Ibrar Yaqoob, Junaid Shuja, “Bringing computation closer towards user network: Is edge computing the solution?” IEEE Communications Magazine 55(11):138 – 144, Nov 2017.
[26] James McElhannon, “Future Edge Cloud and Edge Computing for Internet of Things Applications”, IEEE Internet of Things Journal, Volume: 5 , Issue 1, Feb. 2018, pp 439 – 449.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details