Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

Full Text (PDF, 266KB), PP.20-29

Views: 0 Downloads: 0


Sumit Goyal 1,*

1. IDA, New Delhi, India

* Corresponding author.


Received: 16 May 2013 / Revised: 1 Sep. 2013 / Accepted: 16 Nov. 2013 / Published: 8 Feb. 2014

Index Terms

Public Cloud, Private Cloud, Hybrid Cloud, Community Cloud, Cloud Computing, Cloud Security


These days cloud computing is booming like no other technology. Every organization whether it’s small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

Cite This Paper

Sumit Goyal, "Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.3, pp.20-29, 2014. DOI:10.5815/ijcnis.2014.03.03


[1]T. Surcel and F. Alecu, “Applications of Cloud Computing,” In International Conference of Science and Technology in the Context of the Sustainable Development, pp. 177-180, 2008.
[2]M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis and A. Vakali, “Cloud computing: Distributed Internet computing for IT and scientific research,” Internet Computing, IEEE, 13(5), 10-13, 2009.
[3]Sumit Goyal, “Perils of cloud based enterprise resource planning,” Advances in Asian Social Science, 3(4), 880-881, 2013.
[4]G. Lewis, “Basics about cloud computing,” Software Engineering Institute Carniege Mellon University, Pittsburgh, 2010.
[5]A. Beloglazov, “Energy-Efficient Management of Virtual Machines in Data Centers for Cloud Computing,” PhD Thesis, 2013.
[6]I. Foster, Y. Zhao, I. Raicu and S. Lu, “Cloud computing and grid computing 360-degree compared,” In: IEEE Grid Computing Environments Workshop, pp.1-10, November, 2008.
[7]Z. Liu H.S. Lallie and L. Liu L, “A Hash-based Secure Interface on Plain Connection,” In: Proceedings of CHINACOM. ICST.OTG & IEEE Press, Harbin, China, 2011.
[8]A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee and I. Stoica, “ Above the clouds: A Berkeley view of cloud computing,” Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, Rep. UCB/EECS, 28, 2009.
[9]P. Mell and T. Grance, “The NIST definition of cloud computing (draft),” NIST special publication, 800(145), 7, 2011.
[10]A. Stevens, “When hybrid clouds are a mixed blessing,” The Register, June 29, 2011.
[11]S. Roschke, F. Cheng and C. Meinel, “Intrusion Detection in the Cloud,” In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009.
[12]R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation computer systems, 25(6), 599-616, 2009.
[13](2013) Open Cloud Manifesto. [Online]. Available:
[14]M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “BAbove the clouds: A Berkeley view of cloud computing,”[ Electr. Eng. Comput. Sci. Dept., Univ. California, Berkeley, CA, Tech. Rep. UCB/EECS-2009-28, February 2009.
[15]L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “BA break in the clouds: Towards a cloud definition,” [SIGCOMM Comput. Commun. Rev., 39(1), 50–55, 2009.
[16]D. Kondo, B. Javadi, P. Malecot, F. Cappello, and D. P. Anderson, “BCost-benefit analysis of cloud computing versus desktop grids,” In: Proceedings of IEEE International Symposium on Parallel and Distributed Processing, Rome, Italy, May 2009.
[17]R. Buyya, C. S. Yeo, and S. Venugopal, “BMarket-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” In: Proceedings of 10th IEEE International Conference on High Performance Computing and Communication, Dalian, China, Sep. 2008, pp. 5–13.
[18]S. Ostermann, A. Iosup, N. Yigitbasi, R. Prodan, T. Fahringer and D. Epema, “A performance analysis of EC2 cloud computing services for scientific computing,” In: Cloud Computing (pp. 115-131). Springer Berlin Heidelberg, 2010.
[19]D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff and D. Zagorodnov, “The eucalyptus open-source cloud-computing system,” In: Proceedings of 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, (pp. 124-131), May 2009.
[20]T. Velte, A. Velte and R. Elsenpeter, “Cloud computing, a practical approach,” McGraw-Hill, Inc., 2009.
[21]R. Buyya, S. Pandey and C. Vecchiola, “Cloudbus toolkit for market-oriented cloud computing,” In: Cloud Computing (pp. 24-44). Springer Berlin Heidelberg, 2009.
[22]L. Youseff, M. Butrico and D. Da Silva, “Toward a unified ontology of cloud computing,” In: Proceedings of IEEE Grid Computing Environments Workshop, (pp. 1-10), November 2008.
[23]S. Pearson, Y. Shen and M. Mowbray, “A privacy manager for cloud computing,” In: Cloud Computing (pp. 90-106). Springer Berlin Heidelberg, 2009.
[24]M.A. Vouk, “Cloud computing–issues, research and implementations,” Journal of Computing and Information Technology, 16(4), 235-246, 2004.
[25]Q. Zhang, L. Cheng and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” Journal of Internet Services and Applications, 1(1), 7-18, 2010.
[26]L. Wang, J. Tao, M. Kunze, A.C. Castellanos, D. Kramer and W. Karl, “Scientific cloud computing: Early definition and experience,” In: Proceedings of 10th IEEE International Conference on High Performance Computing and Communications, (pp. 825-830), September 2008.
[27]H. Brian, T. Brunschwiler, H. Dill, H. Christ, B. Falsafi, M. Fischer and M. Zollinger, “Cloud computing,” Communications of the ACM, 51(7), 9-11, 2008.
[28]R.L. Grossman, “The case for cloud computing,” IT professional, 11(2), 23-27, 2009.
[29]N. Leavitt, “Is cloud computing really ready for prime time,” Growth, 27(5), 2009.
[30]C. Wang, Q. Wang, K. Ren and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” In: IEEE Proceedings of INFOCOM, (pp. 1-9), March 2010.
[31]L.M. Kaufman, “Data security in the world of cloud computing,” IEEE Security & Privacy, 7(4), 61-64, 2009.
[32]B. P. Rimal, E. Choi and I. Lumb, “A taxonomy and survey of cloud computing systems,” In: Proceedings of IEEE 5th International Joint Conference on IMS and IDC, (pp. 44-51), August 2009.
[33]L. Yan, C. Rong and C. Zhao, “Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography,” In: Cloud Computing (pp. 167-177). Springer Berlin Heidelberg, 2009.
[34]D. Catteddu, “Cloud Computing: Benefits, risks and recommendations for information security,” (pp. 17-17). Springer Berlin Heidelberg.
[35]B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin, I.M. Llorente and F. Galán, “The reservoir model and architecture for open federated cloud computing,” IBM Journal of Research and Development, 53(4), 4-1, 2009.
[36]N. Santos, K.P. Gummadi and R. Rodrigues, “Towards trusted cloud computing,” In: Proceedings of the conference on Hot topics in cloud computing (pp. 3-3), June, 2009.
[37]M. Jensen, J. Schwenk, N. Gruschka and L.L. Iacono, “On technical security issues in cloud computing,” In: Proceedings of IEEE International Conference on Cloud Computing, (pp. 109-116), September, 2009.
[38]L. Wang, G. Von Laszewski, A. Younge, X. He, M. Kunze, J. Tao and C. Fu, “Cloud computing: a perspective study,” New Generation Computing, 28(2), 137-146, 2010.
[39]M. D. Ryan, “Cloud computing privacy concerns on our doorstep,” Communications of the ACM, 54(1), 2011.
[40]S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, 34(1), 1-11, 2011.
[41]R. Buyya, R. Ranjan and R.N. Calheiros, “Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In: Proceedings of IEEE International Conference on High Performance Computing & Simulation, (pp. 1-11), June 2009.
[42]J. Brodkin, “Gartner: Seven cloud-computing security risks,” 2008.
[43]Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” In: Computer Security–ESORICS (pp. 355-370). Springer Berlin Heidelberg, 2009.
[44]L. Qian, Z. Luo, Y. Du and L. Guo, “Cloud computing: an overview,” In: Cloud Computing (pp. 626-631). Springer Berlin Heidelberg, 2009.
[45]H. Li, Y. Dai, L. Tian and H. Yang, “Identity-based authentication for cloud computing,” In Cloud computing (pp. 157-166). Springer Berlin Heidelberg, 2009.
[46]S. Pearson, “Taking account of privacy when designing cloud computing services,” In: IEEE ICSE Workshop on Software Engineering Challenges of Cloud Computing, (pp. 44-52), May 2009.
[47]S. Yu, C. Wang, K. Ren and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” In: Proceedings of IEEE INFOCOM, (pp. 1-9), March 2010.
[48]H. Takabi, J.B. Joshi and G.J. Ahn, “Security and privacy challenges in cloud computing environments,” Security & Privacy, IEEE, 8(6), 24-31, 2010.
[49]T. Dillon, C. Wu and E. Chang, “Cloud computing: Issues and challenges,” In: Proceedings of IEEE 24th International Conference on Advanced Information Networking and Applications, (pp. 27-33), April, 2010.
[50]G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall, “Cloud computing,” IBM white paper, 321, 224-231, 2007.
[51]J.W. Rittinghouse and J.F. Ransome, “Cloud computing: implementation, management, and security,” CRC press, 2009.
[52]W. Kim, “Cloud Computing: Today and Tomorrow,” Journal of Object Technology, 8(1), 65-72, 2009.
[53]Y. Chen, V. Paxson and R.H. Katz, “What’s new about cloud computing security,” University of California, Berkeley Report No. UCB/EECS-2010-5 January, 20(2010).
[54]D. Durkee, “Why cloud computing will never be free. Queue, 8(4), 20, 2010.
[55]D. G. Feng, M. Zhang, Y. Zhang and Z. Xu, “Study on cloud computing security,” Journal of Software, 22(1), 71-83, 2011.
[56]S. Pearson and A. Charlesworth, “Accountability as a way forward for privacy protection in the cloud,” In: Cloud computing (pp. 131-144). Springer Berlin Heidelberg, 2009.
[57]P. Mell and T. Grance, “Effectively and securely using the cloud computing paradigm,” NIST, Information Technology Lab., 2009.
[58]D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, 28(3), 583-592, 2012.
[59]K. Popovic and Z. Hocenski, “Cloud computing security issues and challenges,” In: Proceedings of IEEE 33rd International Convention on MIPRO, (pp. 344-349) May, 2010.
[60]W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” NIST special publication 800-144, 2011.
[61]S. Srinivasan and R.B. Krishnan, “Data property analyzer for information storage in cloud,” In: Proceedings of IEEE International Conference on Pattern Recognition, Informatics and Medical Engineering (pp. 443-446), February, 2013.
[62]C. Liu, J. Chen, L. Yang, X. Zhang, C. Yang, R. Ranjan and K. Ramamohanarao, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” 2013.
[63]S. Sawhney, H. Puri and H.V. Rietschote, U.S. Patent No. 8,370,312. Washington, DC: U.S. Patent and Trademark Office, 2013.
[64]A. Juels, M.E. Van Dijk, A. Oprea, R.L. Rivest and E.P. Stefanov, U.S. Patent No. 8,346,742. Washington, DC: U.S. Patent and Trademark Office, 2013.
[65]J. Ekanayake and G. Fox, “High performance parallel computing with clouds and cloud technologies,” In: Cloud Computing (pp. 20-38). Springer Berlin Heidelberg, 2010.
[66]S. Hossain, “Infrastructure as a Service,” In: A. Bento, and A. Aggarwal (Eds.), Cloud Computing Service and Deployment Models: Layers and Management (pp. 26-49). Hershey, PA: Business Science Reference. doi:10.4018/978-1-4666-2187-9.ch002, 2013.
[67]W. Dawoud, I. Takouna and C. Meinel, "Infrastructure as a service security: Challenges and solutions," In: 7th International Conference on Informatics and Systems, 1(8), pp. 28-30, March 2010.
[68]R. Prodan and S. Ostermann, “A survey and taxonomy of infrastructure as a service and web hosting cloud providers," In: Proceedings of 10th IEEE/ACM International Conference on Grid Computing, 17(25), 13-15, October 2009.
[69]M. Mattess, C. Vecchiola and R. Buyya, “Managing Peak Loads by Leasing Cloud Infrastructure Services from a Spot Market,” In: Proceedings of IEEE 12th International Conference on High Performance Computing and Communications, 180(188), 1-3, September 2010.
[70]S. Bhardwaj, J. Jain and S. Jain, “Cloud computing: A study of infrastructure as a service (IAAS),” International Journal of engineering and information Technology, 2(1), 60-63, 2010.
[71]W.J. Rittinghouse and F.J. Ransome, “Cloud Computing Implementation, Management, and Security,” Boca Raton, FL, CRC Press, 2010.
[72]G. Reese, “Cloud Application Architectures,” O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472, 2009.
[73](2012) Aws. Amazon website. [Online]. Available:
[74]J. Hurwitz, R. Bloor, M. Kaufman and F. Halper, “Cloud computing for dummies,” Wiley Publishing, Inc., Indianapolis, Indiana, 2010.
[75]O. Hamrén. (2012). M.S. Thesis. “Mobile phones and cloud computing”.
[76]J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang and Q. Li, "Comparison of Several Cloud Computing Platforms," In: 2nd IEEE International Symposium on Information Science and Engineering,(pp.23-27), 2009.
[77]L.M. Vaquero, L. Rodero-Merino, J. Caceres and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, 39(1), 50-55, 2008.
[78]T. Mather, S. Kumaraswamy and S. Latif, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance,” Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472, 2009.
[79]P. Nema and B.D. Bailey, “Is SaaS the Silver Lining to the Cloud,” SVB, September 2, 2009.
[80]G. Newton, “Software as a Service (SaaS) Strategy V1.0, State of Oregon, 2011.
[81](2012) Drive. Google Website. [Online]. Available:
[82]J. Baliga, R. Ayre, W. V. Sorin, K. Hinton, and R. S. Tucker, “BEnergy consumption in access networks,” In: Proceedings of National Optical Fiber Communication Conference, San Diego, CA, February 2008.
[83](2013) Veruscorp Website. [Online]. Available:
[84](2012) Aberdeen Website. [Online]. Available:
[85](2013) Datamation Website. [Online]. Available: benefits-of-private-cloud-over-public-cloud-2.html.
[86]F. Doelitzscher, A. Sulistio, C. Reich, H. Kuijs and D. Wolf, “Private cloud for collaboration and e-Learning services: from IaaS to SaaS,” Computing, 91(1), 23-42, 2011.
[87]Y.W. Ahn and A. M. K. Cheng, “Autonomic computing architecture for real-time medical application running on virtual private cloud infrastructures. ACM SIGBED Review, 10(2), 15-15, 2013.
[88]M. Missbach, J. Stelzel, C. Gardiner, G. Anderson and M. Tempes, “Private Cloud Infrastructures for SAP,” In: SAP on the Cloud (pp. 137-166). Springer Berlin Heidelberg, 2013.
[89]A. Flavel, C. Lund, and H.F. Nguyen, “Network connectivity wizard to support automated creation of customized configurations for virtual private cloud computing networks,” U.S. Patent Application 13/771,188, 2013.
[90]S. Kumar, J. Ali, A. Bhagat, and P.K. Jinendran, “An Approach of Creating a Private Cloud for Universities and Security Issues in Private Cloud, 2013.
[91]L. Cao, X. Liu, M. Liu and K. Han, “Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms,” Journal of Networks, 8(6), 1380-1386, 2013.
[92]T.S. Soares, M.A.R. Dantas, D. Macedo and M.A. Bauer, “A data management in a private cloud storage environment utilizing high performance distributed file systems,” In: Proceedings of the IEEE 22nd International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, (pp. 158-163) June 2013.
[93]H. Ghanbari, B. Simmons, M. Litoiu and G. Iszlai, “Feedback-based optimization of a private cloud,” Future Generation Computer Systems, 28(1), 104-111, 2012.
[94](2013) Search cloud computing Tec target Website. [Online]. Available:
[95]D.E.Y. Sarna, “Implementing and Developing Cloud Computing Applications,” Taylor and Francis Group, Boca Raton, FL: CRC Press, 2011.
[96]D. Garber, J. Malik and A. Fazio, “Windows Azure Hybrid Cloud,” John Wiley & Sons, 2013.
[97]Z. Zhou, H. Zhang, X. Du, P. Li and X. Yu, “Prometheus: Privacy-aware data retrieval on hybrid cloud,” In: Proceedings of IEEE INFOCOM, (pp. 2643-2651), April 2013.
[98]A. Tripathi and M.S. Jalil, “Data access and integrity with authentication in hybrid cloud,” Oriental International Journal of Innovative Engineering Research, 1(1), pp-030, 2013.
[99]R.K. Grewal and P.K. Pateriya, “A rule-based approach for effective resource provisioning in hybrid cloud environment,” In: New Paradigms in Internet Computing (pp. 41-57). Springer Berlin Heidelberg, 2013.
[100](2013) Emma TrendMicro Website. [Online]. Available: http://emea. TrendMicro. com/imperia/md/content/uk/cloud security/wp01_hybridcloud-krish_110624us. pdf.
[101]R. Palwe, G. Kulkarni and A. Dongare, “A new approach to hybrid cloud,” International Journal of Computer Science and Engineering. 2(1), 1-6, 2012.
[102]R. Sujay, “Hybrid cloud: A new era,” International Journal of Computer Science and Technology, 2(2), 323-326, 2011.
[103](2013) Philippheckel Website. [Online]. Available:
[104]C. Philipp, “Heckel Hybrid Clouds: Comparing Cloud Toolkits,” University of Mannheim, 7 May, 2010.
[105]A. Marinos and G. Briscoe, “Community cloud computing,” In: Cloud Computing (pp. 472-484). Springer Berlin Heidelberg, 2009.
[106]X. G. Condori, “Community cloud computing,” Revista de Información Teconología Y Sociedad, 70-72, 2013.
[107](2013) Thecaseforcloud Website. [Online]. Available: