Sie sind auf Seite 1von 9

Project Proposal

Performance evaluation of Cloud


Database along with Storage and
Retrieval mechanisms

Presented By:

Department of Computer Sc.&Engg.


Gandhi Institute for Education & Technology

Coordinators:
1. Dr. Anil Kumar Mishra
2. Dr. Sambit Kumar Mishra
3. Prof. Nilamadhab Mishra
Abstract
The cloud is used as a storage location and database can be accessed and computed from
anywhere. The large number of web application makes the use of distributed storage solution in
order to scale up. It enables user to outsource the resource and services to the third party server.
In present scenario every user wants to access the relevant data at any time and at anywhere.
Cloud computing can be the substitute for data storage mechanism and accessing the data at
anywhere. As the accessing data anywhere are through networks, the user must think about the
security and privacy issue under this cloud computing. For this issue this survey shows various
techniques for the security and privacy mechanism for the user data. There are many data storage
techniques available, but we are trying to combine cloud database service along with data
security and also can perform independent and concurrent operations on encrypted data.
In this paper, we discuss the recent trend in cloud service based on database management system
and offering it as one of the services in cloud. A cloud services reduces the cost and complexity
of owning and operating computer networks and provide scalability, reliability and efficiency.
A cloud database is a database that involves variety of designing, developing of hardware and
software. It is a system in which variety of computers are connected through network such as
internet. All DBMS, whether traditional or cloud-based, act as communicators between the
operating system and the database. Cloud based DBMS works on large volume of data that
would exhaust a classical DBMS. Cloud DBMS combines data structures and the data query
language and utilize all of DBMS components or may devise new strategies that combine one or
more elements. The big challenge at the present time is to manage big distributed data like cloud.
Traditional relational database management systems (RDBMS) are a choice but they are not
well-suited to scale across large clusters of distributed servers. Hence alternatives to RDBMS
have been developed. The development of new database management systems (DBMS) for the
cloud computing environment or adaptability of the existing systems to the cloud computing
environment. In this work, it is aimed to study different types of existing DBMS in the cloud
computing domain. It will also focus on the parameters responsible for the performance of cloud
database queries.
Keywords— Cloud Storage, Security, Independent Access, DBaaS.
1.Introduction
1.1. Objective

Cloud computing is one of the most increasing one with the increase number of cloud users. In
today’s environment every user wants to access their data at any time and at anywhere. In an
organization they store their data only on their computers, if they want their data during roaming
situation means it is not possible one to carry the data at every time, this is a difficult factors for
an organization. Cloud computing can address this problem by providing data storage
mechanism to access the data at anywhere. This is one of the storage device used to access their
data at anywhere through networks which is called cloud provider. For this service user worry
about the security and privacy issue under this cloud computing for their personal data. For this
issue this survey shows various techniques for the security and privacy mechanism for the user
data. There are many data storage techniques available, but we are trying to combine cloud
database service along with data security and also can perform independent and concurrent
operations on encrypted data.
Cloud computing has emerged as a widespread and popular paradigm due to the
enormous growth of data in recent times and also due to the rapid development of Web 2.0
applications. Some of the well known applications of cloud computing involve large scale
data management, grid computing, mobile computing and virtualization. Many companies
now are moving towards hosting their applications on the cloud due to its numerous
advantages. Leading cloud service providers like Amazon, Rackspace along with other as-a-
service providers also provide database systems to customers for use.
A cloud computing system is a set of huge networks and computing nodes, where
enormous amount of data flow takes place. An efficient performance is needed along with
security to access and store data.
In order to meet the availability and confidentiality properties with performance, is
the backbone of any computing system and is the basic expectation of a vendor from its
Providers in Cloud Computing environment.
The main purpose of this manual is build up a system based upon procedures and
algorithms to provide a full-proof system to vendors. The focus in this paper would be upon:
1. Security
2. Accessibility
3. Availability and Confidentiality Properties
4. Performance

1.2. Problem
The whole world is tied up with World Wide Web. The internet is an enormous
collection of computers spanning the globe that when linked together. The amount of
information accessed today is immense. Every user expects all the knowledge to be at hand
with a single key-mouse click. This enforces lots of responsibility upon the Provider to meet
the needs of its users and vendors.
The cloud is being considered as an efficient and economical solution for storing huge
organizational data, accessible to public. The pay-as-you-use billing model has attracted
many organizations, not wanting to invest into the data centre infrastructure and the
maintenance cost that is associated with managing these expensive centres, towards cloud.
Though the cloud offers scalable and flexible services, the data stored on the cloud service
providers’ end is susceptible to attacks from unauthorized entities as well as from the service
provider itself. Data owners need to be aware of these security issues and are expected to take
preventive measures such as encrypting data before moving it to the cloud. The problem
today is there are not many easy to use and lightweight encryption mechanisms that could
encourage data owners to go with this option.
The provider needs to keep the information confidential and secured. It also has to be kept
accessible around the globe at any time of day, 365 days a year. Along with these factors;
Performance of the system is also vital. It completely depends upon Data Congestion and
Network Delay.

Transfer time of data intensive applications accounts for a larger proportion of the overall
running time. System response less than 2 seconds is considered to be efficient.

In order to meet the expectations of World Wide Web users, a whole integrated technology
needs to be developed and implemented in the Cloud System.

1.3. Why this project?


The whole learning needs to be based upon the Cloud technology and its
Implementation. This project will give an insight upon minute details of the information
stored and how different access properties play a role in mechanism of security and access
constraints. Also, keeping in consideration the performance factors like network speed, cache
data characteristics and other aspects which play a role in speed of data flow; this project
gives a complete end-to-end picture of a Cloud System where a user reads data from and
writes data to.
The project touches upon the essential security challenges in the cloud as well as the
performance improvement scope in data retrieval speed by making use of proactive caching
mechanism. Data is being stored on cloud presuming that service providers are trustworthy
and will never try to access confidential data. The project attempts to provide a lightweight
and flexible encryption module that will help data owners protecting their data from cloud
providers.

1.4. Area or Scope of Investigation:


We would build up a system considering the important factors that play an important
role in making a cloud system successful. The scope would be:
1. Data Security in Cloud.
2. Mechanism to store data in cloud
3. Mechanism to fetch data from cloud
4. Access Control Lists with respect to roles on Data
5. Performance improvement with improved mechanism.

1.5. Structure of Cloud Database

The cloud database holds the data on different data centers located at different locations. This
makes the cloud database structure different from the rational database management system. This
makes the structure of the cloud database a complex one. There are multiple nodes across a cloud
database, designed for query services, for data centers that are located in different geological
locations and the corporate data centers as well. This is linking is mandatory for the easy and
complete access of the database over the cloud services. There are different methods for
accessing the database over the cloud services, the user can access it via computer through the
internet, or a user using a mobile phone can access the cloud database via 3G or 4G services
(Pizzete and Cabot 2012). To better understand the structure of the cloud database we will
demonstrate the example of a Business Intelligence application.

1.5.1. Overview
Once the query is generated from the user via computer, the node first decides the sort of query,
and which node will be best for the query. After the query is identified by the node, then it is
transferred to that specific node. Then the specific node takes care of the query and responds to
the user. For example, when the query is received then maybe it is first sent to Node 1, then
Node 1 identifies that which Node will solve the query will be suitable. May be Node 7 holds the
data, Node 1 will send the query to Node 7 after checking the data map. Once the query is sent to
the specific query, then data is directly sent to the user without any further delay.

1.5.2. Distributed queries


If we consider a database of a major company who is holding a large amount of data distributed
like, products, customers, staff and company policies, then in this case different sorts of queries
can be involved to get data (Curino, Madden, and et.al.). In CDBMS these different entities may
end up in different applications. Resolve to each query; different nodes may be involved. In
CDBMS; there are different methods for storing data in DBMS like in query oriented database or
column store database. However the most effective way to handle the database is by having
distributed queries. The distributed query can be understood as the combination of many queries,
and each query will make contact to each distributed node for the retrieval of the information. As
there are different queries; so the number of results can be multiplied as well (Bloor, 2011). As
the answer that are distributed; they are joined at the end.

1.5.3. Cloud database service

Many different cloud database service providers are working who provide database as a service
that is further divided into major three categories. There are rational database, non-rational
database and operating virtual machine loaded with local database software like SQL.
There are different companies offering database as a service, DBaaS like Amazon RDS,
Microsoft SQL Azure, Google AppEngine Datastore and Amazon SimpleDB (Pizzete and Cabot
2012). Each service provider is different from the other depending upon the quality and sort of
services being provided.

1.5.4. Maintaining Size of data


Every database as a service provider has a different capacity of storing data on the database. The
data sizing is very important as the company will need to be sure about the size of data that it
will be stored in its database. For example, the Amazon RDS allows the user to store up to 1TB
of data in one database on the other hand SQL Azure offers only 50GB of data for one database.

1.5.5. Transaction Processing


The transaction capabilities are the major feature of the cloud database as the completion of the
transaction is very important for the user. The user must be aware if the transaction has been
successful or not. There are companies who mostly do transact money, in this situation the
complete read and write operations must be accomplished. The user needs a guarantee of the
transaction he made, and this sort of transaction is called an ACID transaction.

1.5.6. Database Accessibility


As there are different number of databases, the mechanism for accessing the database are
different as well. The first method is the one that is RDBMS being offered through the standards
of the industry drivers such as Java Database Connectivity. The motive of this driver is that
allows the external connection to access the services through the standard connection. The
second accessibility of the database is that by the usage of interfaces or protocols like, Service-
Oriented Architecture (SOA) and SOAP or rest (Pizzete and Cabot 2012). These interfaces use
HTTP and some new API definition.

1.6. Challenges to Cloud Database

1.6.1. Internet Speed

The speed of data transfer in the data center is comparatively very high as compare to the speed
of the internet that is used to access the data center. This is a barrier to the performance of the
cloud database. This affects the performance of the cloud database (Bloor, 2011). The queries
sent to the database are very fast, but the time taken to retrieve data from data center depends on
the speed of the internet. The solution to this challenge is that to have faster speed cables, but
that will cost very high and the motive of having a cloud database will waste.
1.6.2. Query and transaction workload

There is a major difference between the query workload and the transaction work load. When we
talk about the transactional workload, we can get an estimate about the time that will be required
while on the other hand, we cannot estimate about the time of query workload. In query
workload, it depends on the number of queries, and it is not known how many users will be there
who will be making queries to the database.

1.6.3. Elastic scalability


As we are talking about the cloud database, then a good cloud database as a service is the one
that can handle any sort of the work load. However in the cloud database, the problem arises
when the workload increases the capacity of the system. The cloud database must be able to
scale out itself when the workload increases. The scaling out of the database helps in the best
performance and efficiency of the cloud database.
1.6.4. Privacy
Privacy has been the most important issue when it comes to cloud computing. The cloud
computing is a more advanced in terms of the accessibility to the users and hackers who like to
break into the system. The privacy in the cloud database is the very important thing that keeps
the record of the customers of the companies (Curino, Madden, and et.al.). The companies
cannot afford to leak out the information that is stored in their database. If there is encryption of
data in database, then it is quite easy to store in a secure way.

1.6.5. Advantages of Cloud database


The cloud computing has given a new dimension to IT industry and the companies are looking to
adopt cloud services rather than investing a huge money in getting the infrastructure for own
database system. This advent in computing and cloud computing, the cloud database is also
picking up its pace in making its permanent place in IT world. There are a number of advantages
that make it preferable and adoptable by a huge number of companies for its matchless services
in a very cost saving manner. If the companies do not get the services of a cloud database, then
they will have to invest huge money for setting up their own data centers and then hiring separate
staff to manage and take care of all the data center processes. Here are few advantages of
adopting cloud database.

I. The technology has changed the way of business, and now the people use to shop over
the internet and they rely on shopping for saving their time. This change in the business
has let the companies think about the fastest way they can do business over the internet.
There was a time when software needed to be installed to access the database of the
company but now a day the employees even don’t have time to install software on their
computer rather they prefer to use a ready to available resources. They prefer to use the
cloud database so that they can access the information stored in their database without
wasting any time.
II. The other advantage of using a cloud database is that it saves a lot of money. The
company does not need to invest money in setting up their own data centers and then
managing it by hiring extra staff for this purpose. Moreover, after setting up a data center,
the company will need to buy the softwares as well and their maintenance is also
required.
III. The cloud database service providers of DBaaS providers also make the customer free
from the tensions of making any immediate changes in the database. On the other hand,
the cloud database providers also offer scalability on the peak times that does not let the
performance of the company go down.
IV. Cloud computing has given the freedom to access the information from anywhere without
any boundaries of getting to your personal computer at home. This makes it a very
powerful technology and the companies prefer it as the customers, employees or the
authorities of the companies can get the formation they want from anywhere at any time.
V. There are many other benefits of cloud database as well, that makes it the best option
available to the larger organizations and companies who need to hold terabytes of data.
The cloud database makes the availability of data possible anytime from anywhere.

Das könnte Ihnen auch gefallen