Escolar Documentos
Profissional Documentos
Cultura Documentos
Cloud Computing
Introduction to the area
The end of this decade is marked by a paradigm shift of the
industrial information technology towards a pay-per-use service
business model known as cloud computing. Cloud data storage
redefines the security issues targeted on customers outsourced
data (data that is not stored/retrieved from the costumers own
servers). In this work we observed that, from a customers point
of view, relying upon a solo SP for his outsourced data is not very
promising. In addition, providing better privacy as well as
ensuring data availability, can be achieved by dividing the users
data block into data pieces and distributing them among the
available SPs in such a way that no less than a threshold number
of SPs can take part in successful retrieval of the whole data
block. In this paper, we propose a secured cost-effective multicloud storage (SCMCS) model in cloud computing which holds an
economical distribution of data among the available SPs in the
market, to provide customers with data availability as well as
secure storage. Our results show that, our proposed model
provides a better decision for customers according to their
available budgets.
Literature survey
Exiting System
The end of this decade is marked by a paradigm shift of the
industrial information technology towards a subscription based or
pay-per-use service business model known as cloud computing.
This paradigm provides users with a long list of advantages, such
as provision computing capabilities; broad, heterogeneous
network access; resource pooling and rapid elasticity with
measured services. Huge amounts of data being retrieved from
geographically distributed data sources, and non-localized datahandling requirements, create such a change in technological as
Problem Definition
Problem definition
Privacy preservation and data integrity are two of the
most critical security issues related to user data. In conventional
paradigm, the organizations had the physical possession of their
data and hence have an ease of implementing better data
security policies. But in case of cloud computing, the data is
stored on an autonomous business party that provides data
storage as a subscription service. The users have to trust the
cloud service provider (SP) with security of their data. In, the
author discussed the criticality of the privacy issues in cloud
computing, and pointed out that obtaining information from a
third party is much easier than from the creator himself. Following
the pattern of paradigm shift, the security policies also evolved
from
the
conventional
cryptographic
schemes
applied
in
Proposed solution
In this project, we proposed an economical distribution of
data among the available SPs in the market, to provide customers
with data availability as well as secure storage. In our model, the
customer divides his data among several SPs available in the
market, based on his available budget. Also we provide a decision
for the customer, to which SPs he must chose to access data, with
respect to data access quality of service offered by the SPs at the
location of data retrieval. This not only rules out the possibility of
a SP misusing the customers data, breaching the privacy of data,
but can easily ensure the data availability with a better quality of
service.
Our proposed approach will provide the cloud computing
users a decision model, that provides a better security by
distributing the data over multiple cloud service providers in such
a way that, none of the SP can successfully retrieve meaningful
information from the data pieces allocated at their servers. Also,
in addition, we provide the user with better assurance of
availability of data, by maintaining redundancy in data
distribution. In this case, if a service provider suffers service
outage or goes bankrupt, the user still can access his data by
retrieving it from other service providers.
Development process
Requiremen
ts
System and
Software
Implementati
on
Integration
and System
testing
Operation
and
Maintenanc
Product overview
We consider the storage services for cloud data storage between
two entities, cloud user and cloud service providers. The cloud
storage service is generally priced on two factors, how much data
is to be stored on the cloud servers and for how long the data is
to be stored. In our model, we assume that all the data is to be
stored for same period of time. We consider number of cloud
service providers each available cloud service provider
is
Functional requirement
Cloud computing is the one of the most overused buzzwords in
IT. Similar to many other new and emerging technologies,
vendors are trying to cash in on the hype by over promising and
under delivering. Not defining a clear and complete set of
requirements for cloud computing is a recipe for disappointment.
Requirements are needed to ensure alignment with your business
processes and compatibility with your system architecture.
Developing requirements for cloud computing is similar to other
projects, but also differs in many ways. In addition to functional
requirements, it is necessary to define many types of
supplemental requirements unique to cloud computing, such as:
Governance
Who will own the application?
What governance structure is needed?
Who pays for the solution?
What are the responsibilities of IT?
What are the responsibilities of the Business Unit?
What operational mechanisms are needed to support the
solution?
Accessibly
Who is responsible for setting up new users?
Who will have access to the system?
Architectural integration
How do we integrate this into our existing infrastructure?
How will we monitor performance?
Deployment and test responsibilities
Who is responsible for designing and testing the solution?
Who is responsible for training the users?
Data integration
How do we extract data and import to our data warehouse?
How do we integrate with our existing ERP systems?
How do we integrate with our external suppliers?
Security
What are the security implications for our organization?
Do we have any auditing requirements?
Will the solution integrate with our single user log in?
Performance requirement
Guaranteed performance
Guaranteed performance means that, in the face of a abrupt
increase in traffic to an
unexpected level, which can degrade its performance due to
overload to cloud system, a
cloud system autonomously selects a provider that offers an SLA
that satisfies the
consumers demands, and distributes its load to other cloud
systems, thereby continuing
to provide guaranteed service performance for consumers. It also
means guaranteeing
the performance for a higher-priority processing by means of
temporarily delegating the
workload of low-priority processing tasks to other cloud systems.
Guaranteed availability
dealt with at that level is the following program construct and the
comment that follows it:
public void someMethod() throws Exception{
}
This method is a blank one; it does not have any code in it. How
can a blank method throw exceptions? Java does not stop you
from doing this.
Acceptance criteria
Acceptance criteria define the boundaries of a user story, and are
used to confirm when a story is completed and working as
intended.
For the above example, the acceptance criteria could include:
1.
2.
3.
4.
Blog: Short for Web log, a blog is a Web page that serves as a
publicly accessible personal journal for an individual. Typically
updated daily, blogs often reflect the personality of the author.
Browser: Short for Web browser, a software application used to
locate and display Web pages. The most popular browser is
Microsoft Internet Explorer a graphical browser, which means
that it can display graphics as well as text. In addition, most
modern browsers can present multimedia information, including
sound and video, though they require plug-ins for some formats.
Cloud Computing: Cloud computing is the use of computing
resources (hardware and software) that are delivered as a service
over a network (typically the Internet). The name comes from the
use of a cloud-shaped symbol as an abstraction for the complex
infrastructure it contains in system diagrams. Cloud computing
entrusts remote services with a user's data, software and
computation.
Convergence: The condition or process of combining
complementary technologies such as telecommunications,
networking and multimedia.
Cookies: The main purpose of cookies is to identify users and
possibly prepare customized Web pages for them. When you
enter a website using cookies, you may be asked to fill out a form
providing such information as your name and interests. This
information is packaged into a cookie and sent to your Web
browser which stores it for later use. The next time you go to the
same website, your browser will send the cookie to the Web
server. The server can use this information to present you with
custom Web pages. So, for example, instead of seeing just a
generic welcome page you might see a welcome page with your
name on it.
Customer Relationship Management (CRM): A database that
stores all customer information for easy retrieval.
cloud value; well understood and widely used, and that public
clouds do not require rethinking your IT from the ground up.
Pure IP: Digital phone system that digitizes analog speech into
bits to transmit them along with data bits over a unified network.
QoS (Quality of Service): A term used when describing IP
phone systems, QoS is a guaranteed or predictable level of
bandwidth, transmission speed, and freedom from dropped
packets, delay, jitter, and error that is necessary to ensure
adequate performance of particular applications.
Security: In the computer industry, refers to techniques for
ensuring that data stored in a computer cannot be read or
compromised by any individuals without authorization. Most
security measures involve data encryption and passwords. Data
encryption is the translation of data into a form that is
unintelligible without a deciphering mechanism. A password is a
secret word or phrase that gives a user access to a particular
program or system.
Server: This is where your website programming actually resides.
Think of this as one very, huge hard drive! A computer or device
on a network that manages network resources. For example, a file
server is a computer and storage device dedicated to storing files.
Any user on the network can store files on the server. A print
server is a computer that manages one or more printers. A
network server is a computer that manages network traffic. A
database server is a computer system that processes database
queries.
URL (Uniform Resource Locator): A URL is the global address
of documents and other resources on the World Wide Web. This is
your street address that no one else can have. Its your
www.yourname.com.
Virtual Private Network (VPN): A secure connection created
over a public network by using tunneling-mode encryption.
System design
Use Case Model
Detailed design
High level design
Implementation
The goal of the coding phase is to translate the design into
code in the given programming language. The coding steps
translate the detailed design of the system into programming
language. The translation process continues when the compiler
accepts source code as input and produces machine dependent
object code as output. Linking of object files are done to produce
the machine code.
Internal documentation is another important factor, to
facilitate others to understand the code and the logic.
Module Specifications
The modules specified in the design are implemented using
various .htm, .jsp and .class files. These files in the source
code shares the common routines and share data structures, to
establish the hierarchical relationship.
Future Enhancement
For the future work , this research should be extended by adding
the ensuring the availability system in this project which in result
of availability of data in case of failure of data retrieving process.
And even the backup data server can fails so there is no cured
mention for this. So this drawback can be covered in next future
work of this project task.
0TiloSTRi_Ndw&bvm=bv.84607526,d.dGc
2. https://www.google.co.in/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact
=8&ved=0CDIQFjAC&url=http%3A%2F%2Fwww.ijser.org
%2Fresearchpaper%255CA-Secured-Cost-Effective-MultiCloud-Storage-in-CloudComputing.pdf&ei=ybPIVJWHN4W3mAWvwoCQBw&usg=AFQ
jCNFkDAaAFwg2t4Vq79js9Mx593pCqw&bvm=bv.84607526,d
.dGc
3. https://www.google.co.in/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=6&cad=rja&uact
=8&ved=0CEcQFjAF&url=http%3A%2F%2Fijarcet.org
%2Fwp-content%2Fuploads%2FIJARCET-VOL-2-ISSUE-4-14051409.pdf&ei=ybPIVJWHN4W3mAWvwoCQBw&usg=AFQjCNG
KsJ_qtmH6bq0zuq_cPF156bFZ9g&bvm=bv.84607526,d.dGc
Appendices
IEEE Reference Papers