OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST

Similar documents
Department of CSE KMM institute of technology and Science Tirupati, Andhra Pradesh, India

Prediction System for Reducing the Cloud Bandwidth and Cost

A Novel Approach for Calculation Based Cloud Band Width and Cost Diminution Method

Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds

PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM

Periodically Predicting Client s Bandwidth & Cost Acknowledgements Sends to Cloud Server to Optimize Resource Usage

Enhanced PACK Approach for Traffic Redundancy Elimination

PREDICTION BASED CLOUD BANDWIDTHAND COSTREDUCTION SYSTEMOFCLOUD COMPUTING

AN EFFECTIVE WAY FOR COST REDUCTION OF CLOUD BANDWIDTH BASED ON PREDICTION

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

Distributed Management for Load Balancing in Prediction-Based Cloud

The Power of Prediction: Cloud Bandwidth and Cost Reduction

Multi-level Metadata Management Scheme for Cloud Storage System

Cisco WAAS Context-Aware DRE, the Adaptive Cache Architecture

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

On the Performance of Redundant Traffic Elimination in WLANs

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

Live Streaming with CCN & Content Transmission with CCNx

Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.

HTTP-Level Deduplication with HTML5

Transport Layer Protocols

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

A Deduplication-based Data Archiving System

The assignment of chunk size according to the target data characteristics in deduplication backup system

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

Data Deduplication Scheme for Cloud Storage

De-duplication-based Archival Storage System

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

A First Look at Mobile Cloud Storage Services: Architecture, Experimentation and Challenge

Fault-Tolerant Framework for Load Balancing System

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Celleration: Loss-Resilient Traffic Redundancy Elimination for Cellular Data

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

Privacy Preservation and Secure Data Sharing in Cloud Storage

Using UDP Packets to Detect P2P File Sharing

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

The Algorithm of Sharing Incomplete Data in Decentralized P2P

Peer-to-peer Cooperative Backup System

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

A Network Control Plane for Massive Video Delivery

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

SECURITY THREATS TO CLOUD COMPUTING

Quanqing XU YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

An Introduction to VoIP Protocols

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Per-Flow Queuing Allot's Approach to Bandwidth Management

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

THe exponential growth of mobile data traffic has led

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

Security related to the information designing or even media editing. This enables users

Data Integrity Check using Hash Functions in Cloud environment

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE

Comparative Traffic Analysis Study of Popular Applications

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer

Development Model and Environment for Dynamic Mobile Cloud Services

How To Write A Blog Post On Dropbox

A Comparative Study of cloud and mcloud Computing

Overview. SSL Cryptography Overview CHAPTER 1

Data Security Using Reliable Re-Encryption in Unreliable Cloud

A Data De-duplication Access Framework for Solid State Drives

Cloud Based E-Learning Platform Using Dynamic Chunk Size

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

A Review of Load Balancing Algorithms for Cloud Computing

Windows Web Based VPN Connectivity Details & Instructions

Enable Public Audit ability for Secure Cloud Storage

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Cisco Application Networking for Citrix Presentation Server

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks

HIGH-SPEED BRIDGE TO CLOUD STORAGE

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Chapter 3. Internet Applications and Network Programming

Inside Dropbox: Understanding Personal Cloud Storage Services

Cloud Based Instructional Resources for Distance Learning

CLOUD BASED HOME SECURITY 1 Anjali Chachra 1

The Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks

FAST 11. Yongseok Oh University of Seoul. Mobile Embedded System Laboratory

The Evolution of Application Acceleration:

An Architecture to Manage Performance and Reliability on Hybrid Cloud-Based Firewalling

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August ISSN

Transcription:

OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST Akshata B Korwar #1,Ashwini B Korwar #2,Sharanabasappa D Hannure #3 #1 Karnataka Kalburgi, 9742090637, korwar9.aksha ta@ gmail.com. #2 Karnataka Kalburgi, 7406777478, korw ar.ashwi ni@ gmail.com. #3 Karnataka Kalburgi, 9886038922, dhsh aran @g mail.com. ABSTRACT Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage would be optimized. PACK main advantage is its ability to offload the cloudserver TRE effort to end users, thus minimizing the processing costs induced by the TRE algorithm. Unlike previous solutions, PACK does not require the server to continuously maintain clients status. This makes PACK very suitable for pervasive computation environments that combine client mobility and server migration to maintain cloud elasticity. The aim is to present a fully functional PACK implementation, transparent to all TCP-based applications and network devices by using its offloading capability to minimize the processing cost and increasing benefits for cloud users. INTRODUCTION Cloud system offers their clients to a low spending plan and convenient pay of service model, that is also called as usage based pricing [2], cloud customers (client) give money only for the cloud resources that they use [1], storage of information and bandwidth of usage, according to the customer changing needs, and make use of cloud adaptable and elastic computational capabilities. Traffic redundancy problem occur from natural customers exercises, for example, continuously or repeatedly accessing, download, upload disperse and change the same or different data things. The main work in this solution is, cloud owner has to upload the file in cloud server and each file may consume some bandwidth and cost, so the owner has to pay for that. When file is uploaded the chunk is matched internally and it shows remaining bandwidth and cost that will be allocated for other files. When receiver needs to download the file receiver give the file name and secrete key. If receiver given the different key, then he will be automatically blocked, because he is not authorized person. Here SHA-1 is used to give the security. If any redundant or duplicate chunks are founded means, the sender replaces the transmission of all each redundant chunk with its powerful signature. In typical TRE, arrangements are well known at this enterprise level systems or networks, and it include the use of three or more techniques, and it state synchronized middle-box at 2015 RS Publication, rspublicationhouse@gmail.com Page 73

two-level that is server exists in both points that is entry and exit point of branchoffices, (e.g.,cisco[6],riverbed[7],quantum[8]) removing the cyclic action among many clients. Within enterprise proprietary middle boxes are very popular points solution and but they are not so attractive in cloud environment. Moreover cloud customers can t profit by an innovation whose objective is to put resources into one. Increase of on interest "work spaces, meeting rooms, and telecommute plans [9] disconnect the specialists from their workplaces. In such a dynamic workplace, permanent end arrangements that need a serverside and client-side middle box solution become ineffective. Then again, cloud flexibility stimulates work allotment among servers and movement among server frames. Therefore it is generally arranged that software or product based End- TRE is critical in today s pervasive environment [10].This enables the make use of set of protocol stack and use of TRE within destination-to-destination secured traffic (e.g., SSL) conceivable. In this state where the cloud server is the sender and these arrangements need that the server consistently keeps up customer s status. In existing system cloud flexibility requires another new TRE solution. Initially, cloud weight controlling and power optimization may prompt a server-side procedure and information relocation environment, in which traffic redundancy elimination arrangements that need full synchronization between the server and the customer are difficult to achieve or may lose productivity because of lost synchronization. In second case, the status of rich media that devour high transfer speeds and prompts content distribution network (CDN) arrangements, in which the administration point for permanent and moveable clients may change with dynamically as per the relative administration point arrangements. If a destination-to-destination solution is utilized, it s extra computational and storage expense at the cloud side ought to be weighed against its bandwidth saving gains. In existing work security is not given, attacker can easily get modify the content of file, uploaded by the cloud owner. Clearly, TRE solutions that put vast majority of its computational exertion on the cloud side may swing to be less cost effective than the particular case that influences the joined customer side capabilities. Given a destination-to-destination solution found through some experiments that sender based destination-to-destination TRE solutions [4] add considerable load to the servers, which may eliminate the cloud cost savings tended to by the TRE in any case. In this system cloud flexibility requires another TRE arrangement that do not need the server to constantly keep up customer status. Each receiver-side watches the arriving stream and tries to match its chunk with a formally received chunk chain or chunk chain of local file using the extended word chunks metadata kept mainly, the receiver sends to the server prediction that in cloud chunk signature and easy to verify hints(part of chunk) of the sender future information. The sender initially checks the hint and performs the TRE action just on hint match. At the point when redundancy is recognized, the sender then sends to the receiver just the ACKs to the guess, as opposed to sending the information. Upon the clue match the sender starts the TRE operations, saving the clouds TRE computational exertion without activity repetition. On the client side, guidance a novel computationally lightweight chunking (fingerprinting) method termed as PACK chunking. PACK chunking is another option for Rabin fingerprinting effectively used by RE applications. Offloading the computational 2015 RS Publication, rspublicationhouse@gmail.com Page 74

exertion from the cloud to a huge set of customers structures a load allocation activity; every customer procedures just its traffic redundancy elimination part. SYSTEM ARCHITECTURE AND ALGORITHM The architecture of the system is presented in figure 1 Fig 1: System architecture The flow of data received at the PACK receiver is parsed to a sequence of variable size, content based signed chunks. The chunks are then compared to the receiver local storage, is called as chunk store. Receiver retrieves the sequence of subsequent chunks, if any matching chunk is found in local chunk store, by traversing the sequence of LRU chunk pointers present in the chunk metadata. The receiver sends a prediction to the sender for subsequent information using constructed chain. Part of each prediction chunk is called as a hint. The receiver prediction contains the range of the predicted data, the hint and the signature of the chunk. The sender then identifies the predicted range in its buffered data, and verifies the hint for that range. If the result matches the received hint, it continues to perform the more computationally intensive SHA-1 signature operation. Upon a signature match, the sender sends a confirmation message to the receiver, enabling it to copy the matched data from its local storage. Pack algorithm For the purpose of clarity, here first describe the essential beneficiary driven operation of the PACK convention. The pack receiver received the stream of data and parsed to a sequence of variable size and marked chunks similar to [3] and [5]. The pieces are then contrasted with the collector nearby capacity, termed chunk store. Utilizing the built chain, the beneficiary sends a form to the sender for the subsequent data. Part of each chunks expectation, termed a hint, is a simple to register capacity with a sufficiently little false positive worth, for example, the estimation of the last byte in the anticipated information or a extensive XOR checksum of all or chose bytes. The prediction sent by the recipient includes the extent of the anticipated information, the hint, and the chunk signature. The sender distinguishes the estimated accumulation in its cushioned information and checks the indication for that range. If that outcome coordinates the got indication, it keeps on performing the all the more computationally escalated SHA-1 mark operation. Upon the 2015 RS Publication, rspublicationhouse@gmail.com Page 75

chunk pieces are matched then sender sends confirmation message. Then the receiver gives the permission to copy the matched data from local storage. Receiver Algorithm Proc. 1: Recipient Segment Processing 1. in the event that section conveys payload information then 2. form piece 3. in the event that came to piece limit then 4. pass predattempt() 5. end if 6. else if PRED-ACK section then 7. processpredack() 8. pass predattempt() 9. end if Proc. 2: predattempt() 1. in the event that got piece coordinates one in chunk store then 2. in the event that foundchain(chunk) then 3. get ready PREDs 4. send single TCP ACK with PREDs as per Alternatives free space 5. exit 6. end if 7. else 8. store chunk 9. connection chunk to current chain 10. end if 11. send TCP ACK just Proc. 3: processpredack() 1. for all counterbalances PRED-ACK do 2. read information from chunk store 3. place information in TCP data buffer 4. end for 2015 RS Publication, rspublicationhouse@gmail.com Page 76

CONCLUSION The proposed work is carried out to reduce the cloud cost and bandwidth. Cloud provides its customer pay-as-you go service model, so the customer cannot benefit from the technology whose goal is to invest in one. In this work cloud bandwidth and cost is reduced by using chunk scheme, SHA-1 algorithm is used to give the security to cloud, where only authorized user can access the data or information from cloud. The work present in this system is only shown how the bandwidth and cost is reduced and one more enhancement is security is implemented. The future work will be combined to show how multi user can access the data without any conflicts. REFERENCES [1] E. Zohar, I. Cidon, and O. Mokryn, The power of prediction: Cloud bandwidth and cost reduction, in Proc. SIGCOMM, 2011, pp. 86 97. [2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph,R.Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing, Commun. ACM, vol. 53, no. 4, pp. 50 58, 2010. [3] U. Manber, Finding similar files in a large file system, in Proc. USENIX Winter Tech. Conf., 1994, pp. 1 10. [4] A. Muthitacharoen, B. Chen, and D. Mazières, A low-bandwidth network file system, in Proc. SOSP, 2001, pp. 174 187. [5] R. Williams, Method for partitioning a block of data into subblocks and for storing and communicating such subblocks, US Patent 5990810, Nov. 1999. [6] Juniper Networks, Sunnyvale, CA, USA, Application acceleration, 1996 [Online]. Available: http://www.juniper.net/us/ en/products-services/application-acceleration [7] Blue Coat Systems, Sunnyvale, CA, USA, MACH5, 1996 [Online]. Available: http://www.bluecoat.com/products/mach5 2015 RS Publication, rspublicationhouse@gmail.com Page 77

[8] A. Anand, C. Muthukrishnan, A. Akella, and R. Ramjee, Redundancy in network traffic: Findings and implications, in Proc. SIGMETRICS, 2009, pp. 37 48. [9] M. Zink, K. Suh, Y. Gu, and J. Kurose, Watch global, cache local: YouTube network traffic at a campus network Measurements and implications, in Proc. MMCN, 2008, pp. 1 13. [10] S. Schleimer, D. S. Wilkerson, and A. Aiken, Winnowing: Local algorithms for document fingerprinting, in Proc. SIGMOD, 2003, pp. 76 85. 2015 RS Publication, rspublicationhouse@gmail.com Page 78