Beruflich Dokumente
Kultur Dokumente
CHAPTER 1
INTRODUCTION
Cloud computing is a style of computing in which
dynamically scalable and often virtualized resources are provided as a service
over the Internet. Users need not have knowledge of, expertise in, or control over
the technology infrastructure in the "cloud" that supports them. Cloud computing
is one of today's most exciting technologies due to its ability to reduce costs
associated with computing while increasing flexibility and scalability for
computer processes. During the past few years, cloud computing has grown from
being a promising business idea to one of the fastest growing parts of the IT
industry. Cloud computing others the vision of a virtually infinite pool of
computing, storage and networking resources where applications can be scalable
deployed The use of cloud computing has increased rapidly in many
organizations. Cloud computing provides many benefits in terms of low cost and
accessibility of data. Ensuring the security of cloud computing is a major factor in
the cloud computing environment. In System the development of a technique
through cloud computing in which user will access application on server which is
allocated far away from user system. Cloud computing is a phenomenon of the
21st century, an all-new services delivery model that uses the Internet as a
platform. According to independent technology and market research, cloud
computing is a standardized IT capability, such as software application platform or
infrastructure, delivered via Internet technologies in a pay-per-use and self-service
way.
Cloud Computing the familiar term Cloud Computing also approaches
Software used as a service for consumption over the Internet (the cloud). The
word Cloud Computing is not associated with any particular technology, protocol
or vendor. It allows cloud applications to service the users (usually via websites,
client applications, and so on) assuring that the service will have a single point of
access (i.e. from main server ) and all the scaling, parallel computation,
virtualization and whatever technology is used on the back end will be transparent
to the client. From this perspective, Cloud Computing is a model rather than an
architecture. Not all SOA based applications (like web services) are cloud based.
It is not necessary to host a web service on a cloud using the elasticity concept.
The cloud architecture is probably the best way to efficiently host a web service.
Cloud computing is a network-based environment that focuses on sharing
computations or resources. Actually, clouds are Internet-based and it tries to
disguise complexity for clients. Cloud computing refers to both the applications
delivered as services over the Internet and the hardware and software in the
2
CHAPTER 2
AIM AND OBJECTIVE
AIM:
This work aims to promote the use of multi-clouds due to its ability
to reduce security risks that affect the cloud computing user. This surveys recent
research related to single and multi-cloud security and addresses possible
solutions. It is found that the research into the use of multi-cloud providers to
maintain security has received less attention from the research community than
has the use of single clouds.
CHAPTER 3
CLOUD DEPLOYMENT MODELS
Public cloud
Public cloud applications, storage, and other resources are made
available to the general public by a service provider. These ser-vices are free or o
ered on a pay-per-use model. Generally, public cloud service providers like
Amazon AWS, Microsoft and Google own and operate the infrastructure and
offer access only via Internet (direct connectivity is not offered).
Community cloud
Community cloud shares infrastructure between several organizations from a
special community with common concerns whether managed internally or by a
third-party and hosted internally or externally. The costs are spread over fewer
users than a public cloud.
Hybrid cloud
Hybrid cloud is a composition of two or more clouds (private,
community or public) that remain unique entities but are bound together, offering
the benefits of multiple deployment models.
By utilizing "hybrid cloud" architecture, companies and individuals are able
to obtain degrees of fault tolerance combined with locally immediate usability
without dependency on internet connectivity. Hybrid cloud architecture requires
both on-premises resources and o -site (remote) server-based cloud infrastructure.
Private cloud
Private cloud is cloud infrastructure operated solely for a single
organization, whether managed internally or by a third-party and hosted internally
or externally. Undertaking a private cloud project requires a sign in cant level and
degree of engagement to virtualizes the business environment, and it will require
the organization to re-evaluate decisions about existing resources
Proxy server
The use of proxy server could help provide adequate access and re-sponse
time to large numbers of World Wide Web (WWW) users requesting previously
5
accessed page. While some studies have re-ported performance increase due to the
use of Proxy servers, a study reported performance decrease associated with the
use of proxy server.
SECURITY
The system needs to log clients information of registration such as IP address
and time for security purpose. Password should be encrypted and store in the
database.
MAINTAINABILITY
The system developing using .NET framework, all les are easy to
modify and make update.
Feasibility study
The feasibility study is major factor which contributes to
analysis of system. In earlier stages of S/W development, it is necessary to check
whether system is feasible or not. Detail study was carried out to check
workability of proposed system, so the feasibility study is system proposal
regarding to its workability, impact on organization, ability to meet user
requirements and effective use of resources. Thus, when application progresses it
normally goes through a feasibility study and risk analysis.
Feasibility study was carried out considering the following aspects:-
TECHNICAL FEASIBILITY
6
TIME FEASIBILITY
The client that the system must be completed within 5 or 6 months proposed
it. Which is considerable time for development and analysis, so it is also feasible
with respect to time?
LEGAL FEASIBILITY
There is no violation or liability that could be result from the
development. The idea is not copyright/patent of any person or organization. We
shall be using Open source version of various development tools/software
required. Thus this project is legally feasible.
CHAPTER 4
PROBLEM STATEMENT
To develop a system for sharing of software and hardware in cloud from
which user can access applications anytime, anywhere with secure architecture.
CHAPTER 5
8
PROJECT PLAN
The Implementation Plan describes how the information
system will be deployed, installed and transitioned into an operational system. The
plan is developed during the Design Phase and is updated during the Development
Phase; the final version is provided in the Integration and Test Phase and is used
for guidance during the Implementation Phase.
SYSTEM ARCHITECTURE
Design is concerned with identifying software
components specifying relationships among components. Specifying software
structure and providing blue print for the document phase. Modularity is one of
the desirable properties of large systems. It implies that the system is divided into
several parts. In such a manner, the interaction between parts is minimal clearly
specified. Design will explain software components in detail. This will help the
implementation of the system. Moreover, this will guide the further changes in the
system to satisfy the future requirements
The DepSky architecture consists of four clouds and each
cloud uses its own particular interface. The DepSky algorithm exists in the clients
machines as software library to communicate with each cloud These four clouds
are storage clouds, so there are no codes to be executed. The DepSky library
permits reading and writing operations with the storage clouds.with different
cloud providers, the DepSky library deals with different cloud interface providers
and consequently, the data format is accepted by eachcloud. The DepSky data
model consists of three abstraction levels: the conceptual data unit, a generic
data unit, and the data unit implementation.
DepSKy System model. The DepSky system model
contains three parts readers, writers, and four cloud storage providers, where
readers and writers are the clients tasks. Reader can fail arbitrarily (for example,
they can fail by crashing, they can fail from time to time and then display any
behavior) whereas, writers only fail by crashing. Cloud storage providers in the
DepSky system model. The Byzantine protocols involve a set of storage clouds
(n) where n = 3 f +1, and f is maximum number of clouds which could be faulty.
In addition, any subset of (n f) storage cloud creates byzantine quorum
protocols
.
CHAPTER 6
PROJECT METHODOLOGY
This protocol uses secret sharing and erasure code techniques to replicate
the data in a cloud-of-clouds. The image below show how this is donne. First is
generated an encryption key, and after that the original data block is encrypted.
Then the encrypted data block is erasure coded and are computed key shares of
the encryption key. In this case we get four erasure coded blocks and four key
shares because we use four clouds. Lastly, is stored in each cloud a different coded
block together with a diffenret key share.
10
11
Functional Requirement:I] Authentication with the system: The functionality is to authenticate the user .
II] Distributed Database on server: SQL SERVER 2008 is used to store that
data.
III] Web service integration Integrity: create the web services as middle wear
architecture it will same as scalable transactions.
Client system with low configuration User and server must connected throw
cloud via internet.
Software Interfaces
This project requires Microsoft Visual studio version for
.NET development. The system shall run on a Microsoft Windows based system.
No extra software is needed for accessing service, cloud is platform in-dependent.
Communication Interfaces
For communicating to server, client only need web-browser and
internet connection.
12
CHAPTER 8
EXPECTED OUTCOME
Number of services available by category wise It can be used in college campus It
can be used in huge cloud also. It provide secured cloud. In system server side
program can be access and can be modified as per as your need and teacher can
able to comment on it.
Load balancing will be provide to avoid any system clash and Dividing
the traffic between servers, data can be sent and received without major delay
Multi cloud computing service availability Http and SOAP protocol is used, for
two way communication Minimum response time required when worker processor
is busy i.e. proxy server can reply. Secret sharing algorithm provides security.
13
Performance Requirements:The product should be able to function 24x7. The client experience
should be good and page loads should not take excessive time to display except on
noisy dialup connections. System should be developed with min response time.
. Project Scope:-
15
PROPOSED SYSTEM :
The term multi-clouds is similar to the terms interclouds or cloudof-clouds that were introduced by Vukolic [54]. These terms suggest
that cloud computing should not end with a single cloud. Using their
illustration, a cloudy sky incorporates different colors and shapes of
clouds which leads to different implementations and administrative
domains. Recent research has focused on the multi-cloud environment
[3],[8],[10],[11] which control several clouds and avoids dependency
on any one individual cloud. Cachin et al. [11] identify two layers in the
multicloud environment: the bottom layer is the inner-cloud, while the
second layer is the inter-cloud. In the intercloud, the Byzantine fault
tolerance finds its place. We will first summarize the previous
Byzantine protocols over the last three Decades. This section will
explain the recent work that has been done in the area of multi clouds.
Bessani et al. [8] present a virtual storage cloud system called DepSky
which consists of a combination of different clouds to build a cloud-ofclouds. The DepSky system addresses the availability and the
confidentiality of data in their storage system by using multi-cloud
providers, combining Byzantine quorum system protocols,
cryptographic secret sharing and erasure codes [8].
EXSISTING SYSTEM :
Disadvantages:
1. Cloud providers should address privacy and security issues as a
matter of high and urgent priority.
2. Dealing with single cloud providers is becoming less popular with
customers due to potential problems such as service availability failure
and the possibility that there are malicious insiders in the single cloud.
18