International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Size: px
Start display at page:

Download "International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015."

Transcription

1 Literature Survey On Cloud Data Recovery Techniques. Mrs. D.A Phalke, Onkar Kulkarni, AbhijitFulsagar,HarishRane, AjinkyaChothave Department of Computer Engineering, D.Y.Patil College of Engineering, Akurdi, Pune , Maharashtra, India. ABSTRACT -The cloud computing is increasing day by day as its advantages overcome the disadvantage of various early computing techniques. Cloud provides online data storage where data is stored. If in case, file deletion or if the cloud gets destroyed due to any reason the data stored at cloud gets lost. Hence to overcome this problem various data recovery techniques have been developed in cloud computing. In this literature paper, we explore some existing techniques that are previously implemented to tackle this problem. The objective of this paper is to give the brief explanation of the existing techniques. Keywords- Parity Cloud Service (PCS), Semantic Overlay Network (SON), Seed Block (Si), Virtual Cloud Manager (VCM), etc. I. INTRODUCTION In today s world, cloud computing is most exciting technologies because of its capacity to reduce cost associated with computing while increasing flexibility and scalability [1].The data available from the various sources is huge and in the electronic form. So to store this data requires lots of volume of data storage devices. Hence consumers usually prefer to store data on the cloud. If the cloud gets corrupted or damaged or if file deletion happens accidentally by consumer, which leads to loss of important data. Thus back-up of the uploaded data must be taken and if loss of data happens we can recover that data from the data back-up. Considering this situation, many techniques have been developed is cloud computing to recover the data such as HSDRT [4], ERGOT [6], PCS [5], Rent out Resource Service [7], old/hot backup strategy, Linux Box etc [1][2]. The performance of these techniques is based on level of complexity of implementation, cost of implementation, reliability, data backup limit, security, privacy etc. A. Cloud Cloud is basically a combination of servers at very high level. The combination of servers is virtually said to be in space, so it is called as cloud. The job is to store data. As cloud is combination of various servers, thus its storing capacity is also very high and with it many issues also arises with it such as security, performance, easiness, etc. B. Data Backup Server As the name suggests, it is similar to normal server, wherein data is stored. It is called as data backup server because, originally data is stored at main server and from there it is stored at another server which acts like backup server. C. Data Back-Up Server In Cloud , IJAFRC and NCRTIT 2015 All Rights Reserved

2 Here implementation takes place at very high level. Since many users now opt for cloud to store their data, thus it is important to provide security and backup. Backup because if cloud gets destroyed due to any reason then client/user can retrieve their data back. Thus whatever data is stored at cloud of n no of clients; whole of that data is stored at another server called as data backup server. Cloud computing provides on demand resources to the consumer as it requires the management of resources among each and every client/user [3]. Such management includes various aspects of proper utilization of the resources. The resources can be any hardware or software. Cloud computing must be able to provide reliability such that users can upload their sensitive and important data. The cost-effective approach is the main concern while implementing any cloud. During the study of cloud computing, we found various advantages of it. In its positive points, we found that the cloud is capable enough to store the huge amount of data of various different clients with complete security such that Internet Service Provider (ISP) provides a huge storage in a cloud to the user client and users are allow safely to upload there private and important data to the main cloud. And at the same time we found critical issue regarding this storage i.e. if any of the client s data is missing or disappeared for some reason or the cloud get destroyed either due to any natural hazardous things like flood, earthquake etc. then for back-up and recovery consumer/client has to depend on service provider which means the data has to be stored in the server. To overcome this problem, it requires an efficient technique for data backup and recovery so that the client can able to contact the backup server where private data is stored with high reliability and whenever a main cloud fails to provide the user s data. These techniques must possess the low cost of implementation and can easily recover the data after any disaster. That s why, the need of the back-up and recovery techniques for cloud computing arises due to heavy storage of its clients. II. DATA RECOVERY TECHNIQUES There was many data recovery techniques in cloud computing. They are as follows: A. HS-DRT The HS-DRT file backup mechanism has three principal components as shown in figure and those are Data Centre, Supervisory Server and various client nodes [4]. Figure 1 The Basic Configuration Of HS-DRT System The basic procedure is as follows: , IJAFRC and NCRTIT 2015 All Rights Reserved

3 1. Backup sequence: When the Data Centre receives the data which is to be backed up, it encrypts it, scrambles it, and divides it into fragments, and thereafter replicates the data. The Data Centre encrypts the fragments again in the second stage and distributes them to the client nodes in a random order. At the same time, the Data Centre sends the metadata used for deciphering the series of fragments to the Supervisory Server. The metadata comprises encryption keys (for both the first and second stages), and several items of information related to fragmentation, replication, and distribution. 2. Recovery sequence: When a disaster occurs, the Supervisory Server initiates the recovery sequence. The Supervisory Server collects the encrypted fragments from various appropriate clients in a manner similar to a rake reception procedure. Then they are decrypted, merged, and descrambled in the reverse order of that performed at the Data Centre and the decryption is then complete. Thus, the Supervisory Server can recover the original data that has been backed-up. 3. Security Level of HS-DRT: The Security level of the HS-DRT depends on spatial scrambling, fragmentation/replication, and the shuffling algorithm. Because of these three factors, nobody is able to decrypt without collecting all relevant fragments, selecting a unique set of fragments, and sorting the fragments into the correct order. Even if some fragments are intercepted, nobody is able to decrypt parts of the original data from such fragments. i. Spatial scrambling: The spatial scrambling procedure can be implemented using C simple algorithm. for (i=1;i<imax;i++) {buf[i]=buf[i]+buf[i-1];} buf [0] =buf[0] +buf[imax-1]; The array buf [] consist of data to be scrambled and imax is the size of the buf array. This computation process should be repeated at least six times. To descramble, it is only necessary to perform the same operations in the reverse order. By using spatial scrambling technology, it is almost impossible for a third party to decipher the data by comparing and combining the encrypted fragments. ii. Fragmentation/replication: Fragmentations means dividing data in small pieces. Even if a hacker captured all raw packets between the data centre and the client nodes, it would be extremely difficult to assemble all the packets in the correct order, and to determine whether all packets are there are not. Also, the proposed backup mechanism replicates each fragment and encrypts each copy of the fragment with a different encryption key. So even if a pair of encrypted fragments is the available different encryption key is required to decrypt the data. iii. Shuffling: HS-DRT mainly uses a shuffling method with pseudorandom number generators for the distribution to the client nodes. Distribution of encrypted fragments is done in a shuffled order, since we predetermine the destination client nodes from the shuffled table in advance. B. Parity Cloud Service (PCS) Parity cloud service is the technique based on parity recovery service [5].PCS has low cost of recovery and recovers data with high probability. For data backup, PCS creates the virtual disk in users system for , IJAFRC and NCRTIT 2015 All Rights Reserved

4 data backup, make parity groups and store parity data of group in cloud. The PCS algorithm works using Exclusive OR for creating parity information. 1. Initial parity generation: First the seed block (Si) is generated for virtual disk of client. PCS server sends the initialize message to each Recovery Manager in the group. After sending the message, the server sends temporary random block (r) to the first node. After receiving the r block, the first node generates an intermediate parity block via r Exclusive-OR S1 and sends it to its successor, 2nd node. Then second node generates an intermediate parity block via XORing the received parity block with its seed block, S2, and sends it to its successor, third node and so on. The final block transferred to the PCS server from node 4 is XORed with the temporary random block, r, again, to generate the seed parity block across all seed blocks (((((r Exclusive-OR S1) Exclusive-OR S2)Exclusive-OR S3) Exclusive-OR S4) r = S1 Exclusive-OR S2Exclusive-OR S3Exclusive-OR S4). For each group the initialization process occur only at once. 2. Parity Block Update: The Manager in PCS agent maintains map to indicate whether the parity block for each data block in the virtual disk has been generated or not which is parity generation bitmap (PG-bitmap).All fields of bitmap is initialized (set to 0) after the initialization process for any data block in the virtual disk. The PG-bitmap is referred when a parity block is updated. When a block (Bold) in node is to be updated to a new block (Bnew), the Storage Manager refers to the corresponding value in the PG-bitmap. If it is 0, then the Storage Manager generates an intermediate parity block (Pt) by XORing the new block with the seed block (Pt = BnewSi), and set the corresponding value in the PG-bitmap to 1. Otherwise, the intermediate parity block is generated by XORing the new block and the old block (Pt = Bnew-Bold). For each VDPG, the PCS server also maintains the PG-bitmap. 3. Data Block Recovery: When a data block is corrupted, it can be recovered using the parity block provided by the PCS server and encoded data blocks provided by other nodes in the parity group. Assume that the n-th data block in nodei, Bin, has been corrupted. Nodei sends a recovery request message to the PCS server. On receiving the recovery request message, the PCS server identifies to which VDPG the node belongs to and reads the corresponding parity block, Pn. Then, it generates a temporary random block, r, and a temporary parity block, Pr, for recovery process. When the size of the VDPG is even, Pr= Pnr. Otherwise, Pr= Pn. The PCS server sends Pr along with the list of nodes that will send their encoded data block to nodei for recovery along with the IP address of nodei to all other nodes in the group. If there are any off-line nodes, the PCS server sends the message when they become on-line. On receiving the message, each node generates their own encoded data block, E, by XORing the n-the data block with r (Ej = Bin r, for each node j VDPG, j i) and sends to nodei. Then, the nodei recovers the corrupted data block by Bin = PrE1 Ei-1 Ei+1 E VDPG. C. ERGOT The increasing demands for online services needs distributed architecture for promoting its scalability and semantics to enable to their efficient retrieval [6]. So by using two different approaches towards goal are Semantic Overlay Network (SON) and Distributed Hash Tables (DHT). Semantic based discovery is done in distributed infrastructure such as grids and clouds. By combining SON and DHT, ERGOT (Efficient routing grounded on taxonomy) is introduced. ERGOT takes advantage in two ways first is services are advertised in DHT on basis of their annotations and , IJAFRC and NCRTIT 2015 All Rights Reserved

5 another one is annotations enable semantic based service match making, so these approaches enables us for accuracy of search and network traffic. Service oriented architecture (SOA) paradigm is model for modular composition and reuse of third party software component on large scale. SOA model aims that the developers can dynamically discover and assemble software module to fulfil their needs. As an example, think a user is looking for a service that offers car-selling information. A possibly provided service description request may add terms such as price, vehicle model, year and so forth. Using Chord, relevant services would only be retrieved if their semantic profiles have exactly the same keywords that used in the query. However, it can be perfect possible that in the specifications related terms are used instead, for instance automobile instead of car and car type instead of car model. In this case session, ERGOT s semantic similarity approach will still be able to return correct relevant services, while Chord would face failure to find any matches related to that. We have explored the viability of these ideas in the particular case where peers are autonomous and distributed semantic service registries. D. Rent Out The Rented Resourses The architecture of Virtual Cloud is a client-server model. It consists of two main components i.e. Virtual Cloud Manager (VCM) and Host Manager (HM)[7]. Virtual Cloud Manager is a server type component, functioning on the cloud vendor s infrastructure. Host Manager is a component installed at each host machine. 1. Virtual Cloud Manager: Virtual cloud manager consists of 3 layers i.e. Client Service API, Virtual Cloud Middleware and Communication Layer. Figure 2. Interaction model for Virtual Cloud Service Utilization a. Client Service API: Client service API is an interface layer to the Virtual Cloud Middleware. It enables different clients to request different types of services from Virtual Cloud Manager. It understands different types of messages and service requests , IJAFRC and NCRTIT 2015 All Rights Reserved

6 b. Virtual Cloud Middleware: Virtual Cloud Middleware is the core part of the Virtual Cloud Manager. The functionality of these components is given below. c. Distributor: It is the central point of the Virtual Cloud Middleware and is responsible for task assignment and communication among all its components. It receives a request from a client through client service API and route it to the appropriate component responsible for the desired task. d. AAA Server: It is a module responsible for the Authentication, Authorization, and Auditing of the clients. Authentication is required to use the cloud service. It verifies the correct use of services and resources by the users. e. Metering Service: It is an accounting service for both the users and hosts. It calculates the billing for the users on the basis of account and metering settings. User can choose among different types of packages depending upon his needs and offers made by virtual cloud vendor. It also calculates the billing for hosts on the basis of type of contract and resource utilization. f. Client Directory: All the users/clients information is registered in the user directory. g. Service Directory: It keeps the record of the available cloud services at a particular time. h. Resource Directory: It keeps record of all the hosts and the information about their infrastructure resources. It also has a record of resources from other cloud vendors. i. Host Controller: It is responsible for managing the hosts. It has a capability to perform certain node management tasks, including the node creation, termination, assignment/acquisition, release etc. j. Federation Manager/Service: It is responsible for cross-cloud connection with other virtual cloud vendors. It has the record about all the cloud vendors in its federation. It has two main tasks to do. The first is to periodically advertise its own shareable resources and services to the other cloud vendors in its federation. The second task is to receive advertisements from the other virtual cloud vendors for their available resources. It records the details about the resources into the Resource Directory and details about the services in the Service Directory. Federation Manager uses the Instant Messaging and Presence Service (IMPS) protocol to advertise its resources. If the desired resource is not available locally within the Virtual Cloud then federation manager requests its peer federation manager located on the remote Virtual Cloud for the resources. k. Logging Service: It is responsible for keeping record of all the events occurring in the VCM manager. 2. Communication Layer: Communication layer is responsible for communication with the clients, hosts and possibly with other VCM in case of cross-cloud federation. It is also understand different communication protocols and technologies , IJAFRC and NCRTIT 2015 All Rights Reserved

7 a. Host Manager: It creates a virtualized environment with the help of a hypervisor, to provide a set of cloud services. It has three components i.e. Metering Service Sensor, Communication Layer and Low Level Services. b. Metering Service Sensor: It is responsible for the accounting of resource usage. Metering Service at VCM does the billing for the user on the basis of this information. c. Communication Layer: Communication layer is responsible for communication with the clients, Virtual Cloud Manager, and other hosts d. Low Level Services: It is responsible for interaction with the external environment of the host manager. e. Execution Process: o Client first request for a service to virtual cloud vendor. o The request is first forwarded through Client Service API, which allows the access from different types of client platforms and message formats. o Then the request if send to distributor, which checks the service validity (in which domain service lies and it can be provided at time or not). o Then authentication of user. o Then it checks from the resource directory that where the resource for the particular service does exists. o If the Distributor manages to find a resource to perform the task, it asks the Host controller to assign a host node to the service. But if the Distributor cannot find an existing resource/host for the service, then it asks the Host Controller to first create/register a host node and then assign that host to the service. o Host node creation and termination record is updated in the Resource Directory and host assignment and release is updated in Metering Service. o At the time of service assignment, a unique service assignment ID (SaID) is generated, which shows that a particular client is using a particular service. o If the distributor fails to find an existing resource or to create a new host then it asks federation manager to contact the remote federation manager for a service assignment. o Host node serves the required service to the client/user, on the basis of service request from the VCM. It creates a direct communication link with the client and uses the SaID for reference. When a client wants to finish the service utilization, it asks the VCM. Host controller at VCM requests the host node to terminate the service and it releases the node from the service. Then distributor updates the resource directory that the node has been released and also informs metering service to stop servicing. III. VARIOUS TOOLS USED FOR CLOUD DISASTER RECOVERY There are various tools which helps in data recovery, and those are as follows [8]: 1. AppSim: Internet Level application and efficiently used for multitenant nonfunctional requirement. 2. Google App Engine: Google App Engine is a Java and Python based platform that affords web application, resource storage and application hosting, data storage. 3. OpenNebula: It is open source toolkit which makes public, private, and hybrid cloud. This tool support VM migration , IJAFRC and NCRTIT 2015 All Rights Reserved

8 4. CloudSim: Enable modeling and simulation. It also creates virtual machine. 5. Cloud Analyst: Cloud Analyst is competent produces graphical output results of simulation in the form charts and tables. The advantage of this tool is that it supports Virtualization. 6. Open stack: This is suitable for Public and Hybrid cloud. The tool is progressing with improvements to support wide of requests from the growing user community. Table 1.Comparison between different approaches S.N Approach Advantage Disadvantage 1 HSDRT This technique can be used by movable clients like Smartphone s, laptop etc. High implementation cost. 2 Parity service cloud Provides reliable service Privacy to data Low implementation cost High Implementation complexity 3 ERGOT Fast and exact match data retrieval Privacy to data High time and implementation complexity 4 Rent out the Rented Resources Cost depends on infrastructure utilization Implementation gets complex Resources must be kept under special attention due to rented concept IV. CONCLUSION Thus conclusion is PCS generates a virtual disk in user system for data backup, make parity groups across virtual disk, and store parity data of parity group in cloud. It uses the Exclusive OR () for creating Parity information. It is comparatively reliable, simple, easy to use and more convenient for data recovery, but it contains complexities. HS-DRT provides an efficient way for movable clients but fails to manage implementation cost. It effectively uses wide distributed data transfer mechanism and high encryption. ER-GOT is based on the semantic analysis and unable to focus on time and implementation complexity. Rent out the Rented Resources is based on renting the resources to clients in form of cloud service. V. REFERENSES [1] Ms. Kruti Sharma, Prof. Kavita R Singh, Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing, 2013 International Conference on Communication Systems and Network Technologies. [2] Ms..KrutiSharma,ProfK.R.Singh, 2012, Online data Backup And Disaster Recovery techniques in cloud computing:a review, IJEIT, Vol.2, Issue , IJAFRC and NCRTIT 2015 All Rights Reserved

9 [3] ChintureenaThingom, Cloud Disaster Management With Scheduling Strategy, International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 3, Issue 5, May 2014, ISSN: [4] Yoichiro Ueno, NoriharuMiyaho, Shuichi Suzuki,MuzaiGakuendai, Inzai-shi, Chiba,Kazuo Ichihara, Performance Evaluation of a Disaster Recovery System and Practical Network System Applications, Fifth International Conference on Systems and Networks Communications, 2010, pp [5] Chi-won Song, Sungmin Park, Dong-wook Kim, Sooyong Kang, 2011, Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11. [6] Giuseppe Pirr o, Paolo Trunfio, Domenico Talia, Paolo Missier and Carole Goble, 2010, ERGOT: A Semantic-based System for Service Discovery in Distributed Infrastructures, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. [7] Sheheryar Malik, FabriceHuet, 2011, Virtual Cloud: Rent out the Rented Resourses, 6th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2011). [8] ChintureenaThingom, A Study on Tools for Cloud Disaster Management, International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2014, Vol 1, No.4, , IJAFRC and NCRTIT 2015 All Rights Reserved

How To Create A Backup And Backup Algorithm In Cloud (Cloud)

How To Create A Backup And Backup Algorithm In Cloud (Cloud) A SMART DATA BACKUP TECHNIQUE IN CLOUD COMPUTING USING SIGNCRYPTION Sridevi.N. 1, Ashwini.A 2 1 Asst.Professor,, Dept of CSE,SVCE,Bengaluru, n.sridevi5@gmail.com 2 PG Student Dept of CSE,SVCE,Bengaluru,

More information

A Review on Data Back-up Techniques for Cloud Computing

A Review on Data Back-up Techniques for Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Privacy Preserving Public Auditing For Secure Cloud Storage

Privacy Preserving Public Auditing For Secure Cloud Storage Privacy Preserving Public Auditing For Secure Cloud Storage V. Lakshmikanth, K. Sreekanth # Student of M.Tech, Computer science and engineering in Vaagdevi Institute of Technology and Sciences, Proddatur,

More information

Data Recovery in Cloud Environment Using Seed Block Algorithm

Data Recovery in Cloud Environment Using Seed Block Algorithm Data Recovery in Cloud Environment Using Seed Block Algorithm 1 Vedashree N, 2 Praveen Kumar KC, 3 Anilkumar G 1 PG Student Dept. Of CS&E, 2 PG Student Dept. Of CS&E, 3 Associate professor Dept. Of CS&E

More information

241 P a g e. Keywords: - Seed Block Algorithm, AES, Cloud back-up, Remote cloud, Main Cloud

241 P a g e. Keywords: - Seed Block Algorithm, AES, Cloud back-up, Remote cloud, Main Cloud INTELLIGENT CLOUD SECURITY BACK-UP SYSTEM Tanay Kulkarni 1, Sumit Memane 2, Onkar Nene 3, Krupali Dhaygude 4 Students of Department of Computer Engineering, RMD Sinhgad School of Engineering, Pune, Maharashtra,

More information

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,

More information

Intelligent Cloud Back-Up System

Intelligent Cloud Back-Up System International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 82-89 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Intelligent Cloud Back-Up System Tanay Kulkarni

More information

REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR

REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR 1 S. N. Uke, 2 Mohini Shinde, 3 Shweta Joshi, 4 Priya Sharma, 5 Rushikesh Rathod 1 Assistant Professor,Smt. Kashibai Navale

More information

SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING

SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING Vijayalaxmi V Kadlimatti 1, Ramesh Kumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering,

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 5, November 2012

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 5, November 2012 Online Data Back-up and Disaster Recovery Techniques in Cloud Computing: A Review Kruti Sharma, Kavita R Singh Computer Science Engineering, YCCE, Nagpur (M.S), 441 110, India Abstract Today, in electronic

More information

A smart data backup technique for cloud computing using seed block algorithm strategy

A smart data backup technique for cloud computing using seed block algorithm strategy A smart data backup technique for cloud computing using seed block algorithm strategy Mr. G. S. Narke 1 Mr. A. K. Harijan 2 Mr. A. R. Shinde 3 Prof.H.D.Sonawane 4 ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption

Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption Mrs. Priyanka Patil SIT Lonavala, SPPU Maharashtra, INDIA Prof. Vikas Kadam SIT Lonavala, SPPU Maharashtra,

More information

Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing

Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing 2013 International Conference on Communication Systems and Network Technologies Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing Ms. Kruti Sharma Department of Computer Technology,

More information

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 01, 2015 ISSN (online): 2321-0613

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 01, 2015 ISSN (online): 2321-0613 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 01, 2015 ISSN (online): 2321-0613 Data Recovery Technique using Seed Block Algorithm for Cloud Computing J.Sangeetha Priya

More information

How To Backup A Cloud Server With Seed Block Algorithm

How To Backup A Cloud Server With Seed Block Algorithm R. V. Gandhi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm R. V. Gandhi 1, M

More information

Keywords-Main cloud; Backup; Parity Cloud Service; Seed Block; Complexity; HSDRT;

Keywords-Main cloud; Backup; Parity Cloud Service; Seed Block; Complexity; HSDRT; Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Disaster Recovery

More information

Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding

Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding Kolipaka Kiran 1, Janapati Venkata Krishna 2 1 pursuing M.Tech (CSE), 2 Associate Professor & HOD (CSE Department) 1,2 Holy

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014 RESEARCH ARTICLE An Efficient Service Broker Policy for Cloud Computing Environment Kunal Kishor 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2 Department of Computer Science and Engineering,

More information

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing - Architecture, Applications and Advantages Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Web-Based Data Backup Solutions

Web-Based Data Backup Solutions "IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Efficient Backingup Data for Migrating Cloud to Cloud

Efficient Backingup Data for Migrating Cloud to Cloud Efficient Backingup Data for Migrating Cloud to Cloud 1 PS.Vijayabaskaran, Assistant Professor, Department of Information Technology, Sri Manakula Vinayagar Engineering College, Pondicherry, India. 2 U.Prabu,

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching 1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

A STUDY ON CLOUD STORAGE

A STUDY ON CLOUD STORAGE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Study of a Backup Service Concept Using Secure Distributed Networks

Study of a Backup Service Concept Using Secure Distributed Networks Study of a Backup Service Concept Using Secure Distributed Networks Noriharu Miyaho, Shuichi Suzuki, and Yoichiro Ueno Tokyo Denki University 1. Introduction In the present advanced information society,

More information

Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH

Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014 RESEARCH ARTICLE An Efficient Priority Based Load Balancing Algorithm for Cloud Environment Harmandeep Singh Brar 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2, Department of Computer Science

More information

AVLOR SERVER CLOUD RECOVERY

AVLOR SERVER CLOUD RECOVERY AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties

More information

Cloud Models and Platforms

Cloud Models and Platforms Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model

More information

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC. White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

Automated Virtual Cloud Management: The need of future

Automated Virtual Cloud Management: The need of future Automated Virtual Cloud Management: The need of future Prof. (Ms) Manisha Shinde-Pawar Faculty of Management (Information Technology), Bharati Vidyapeeth Univerisity, Pune, IMRDA, SANGLI Abstract: With

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises

More information

About me & Submission details

About me & Submission details About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe

More information

AN ANDROID APPLICATION FOR ISSUING AND VERIFYING COMMUTER TRAIN TICKET THROUGH GPS USING CLOUD

AN ANDROID APPLICATION FOR ISSUING AND VERIFYING COMMUTER TRAIN TICKET THROUGH GPS USING CLOUD BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN 2348-0513 Vol. 2, Issue 3, Mar 2014, 47-52 BEST Journals AN ANDROID APPLICATION FOR ISSUING AND VERIFYING

More information

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Keywords: PDAs, VM. 2015, IJARCSSE All Rights Reserved Page 365

Keywords: PDAs, VM. 2015, IJARCSSE All Rights Reserved Page 365 Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Energy Adaptive

More information

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of

More information

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

CDBMS Physical Layer issue: Load Balancing

CDBMS Physical Layer issue: Load Balancing CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna Shweta.mongia@gdgoenka.ac.in Shipra Kataria CSE, School of Engineering G D Goenka University,

More information

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

The Case Study for IsaStor Series Products

The Case Study for IsaStor Series Products The Case Study for IsaStor Series Products (CONTINUOUS DATA PROTECTION SOLUTIONS) XLink Technology, Inc. Milpitas, California www.xlink.com August, 2006 Table of Contents The Product - IsaStor Series Software

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

CLOUD COMPUTING. When It's smarter to rent than to buy

CLOUD COMPUTING. When It's smarter to rent than to buy CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,

More information

Enterprise Resource Planning System Deployment on Mobile Cloud Computing

Enterprise Resource Planning System Deployment on Mobile Cloud Computing Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.3, No.1 (2013), pp. 1-8 http://dx.doi.org/10.14257/ajmscahs.2013.06.02 Enterprise Resource Planning System

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image

More information

2) Xen Hypervisor 3) UEC

2) Xen Hypervisor 3) UEC 5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Oracle Database Security and Audit

Oracle Database Security and Audit Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Cloud Platforms, Challenges & Hadoop. Aditee Rele Karpagam Venkataraman Janani Ravi

Cloud Platforms, Challenges & Hadoop. Aditee Rele Karpagam Venkataraman Janani Ravi Cloud Platforms, Challenges & Hadoop Aditee Rele Karpagam Venkataraman Janani Ravi Cloud Platform Models Aditee Rele Microsoft Corporation Dec 8, 2010 IT CAPACITY Provisioning IT Capacity Under-supply

More information

Federation of Cloud Computing Infrastructure

Federation of Cloud Computing Infrastructure IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Chapter 7. Using Hadoop Cluster and MapReduce

Chapter 7. Using Hadoop Cluster and MapReduce Chapter 7 Using Hadoop Cluster and MapReduce Modeling and Prototyping of RMS for QoS Oriented Grid Page 152 7. Using Hadoop Cluster and MapReduce for Big Data Problems The size of the databases used in

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers

More information

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed

More information

Technical. Overview. ~ a ~ irods version 4.x

Technical. Overview. ~ a ~ irods version 4.x Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security

More information

GLOSSARY OF TECHNICAL TERMS

GLOSSARY OF TECHNICAL TERMS This glossary contains explanations of certain terms, definitions and abbreviations used in this prospectus in connection with our Group and our business. The terms and their meanings may not correspond

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

Effective disaster recovery using Software defined networking

Effective disaster recovery using Software defined networking Effective disaster recovery using Software defined networking Thyagaraju, Mrs. Jyothi. K.S, Girish.L PG Student, Associate professor, Assistant Professor Dept of CSE, Cit, Gubbi, Tumkur Abstract In this

More information

August 2009. Transforming your Information Infrastructure with IBM s Storage Cloud Solution

August 2009. Transforming your Information Infrastructure with IBM s Storage Cloud Solution August 2009 Transforming your Information Infrastructure with IBM s Storage Cloud Solution Page 2 Table of Contents Executive summary... 3 Introduction... 4 A Story or three for inspiration... 6 Oops,

More information

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information