INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY



Similar documents
Data Integrity for Secure Dynamic Cloud Storage System Using TPA

QoS Provision in a Cloud-Based Multimedia Storage System

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

Data Integrity Check using Hash Functions in Cloud environment

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Public Auditing for Shared Data in the Cloud by Using AES

MOBILE CLOUD COMPUTING: OPEN ISSUES Pallavi 1, Pardeep Mehta 2

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada

Dynamic Query Updation for User Authentication in cloud Environment

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Chapter 19 Cloud Computing for Multimedia Services

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

MOBILE APPLICATIONS IN MULTIMEDIA CLOUD COMPUTING

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

An Intelligent Approach for Data Fortification in Cloud Computing

Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm

How To Understand Cloud Computing

ABSTRACT I. INTRODUCTION

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION

Enable Public Audit ability for Secure Cloud Storage

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Security Considerations for Public Mobile Cloud Computing

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Copyright IEEE. Citation for the published paper:

Mobile Hybrid Cloud Computing Issues and Solutions

University of Huddersfield Repository

Single Sign-On Secure Authentication Password Mechanism

Module 1: Facilitated e-learning

Analysis of Service Broker Policies in Cloud Analyst Framework

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

A Review of Load Balancing Algorithms for Cloud Computing

Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers

An Overview on Important Aspects of Cloud Computing

Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing

SECURITY THREATS TO CLOUD COMPUTING

MEDIA CLOUD: WHEN MEDIA REVOLUTION MEETS RISE OF CLOUD COMPUTING

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Mobile Multimedia Meet Cloud: Challenges and Future Directions

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Privacy Preservation and Secure Data Sharing in Cloud Storage

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm

3 Software Defined Radio Technologies

Optimized and Secured Educlouds by Implementing Virtualization

Optimal Service Pricing for a Cloud Cache

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 1, Volume 2 (January 2015)

New Cloud Computing Network Architecture Directed At Multimedia

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE

Cloud Based Instructional Resources for Distance Learning

An Innovative Two Factor Authentication Method: The QRLogin System

Chapter 1: Introduction

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Development of Private Cloud

CLOUD BASED HOME SECURITY 1 Anjali Chachra 1

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August ISSN

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Enterprise Cloud Solutions

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT

Mobile Cloud Middleware: A New Service for Mobile Users

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Fuzzy Keyword Search over Encrypted Stego in Cloud

An Efficient data storage security algorithm using RSA Algorithm

Mobile Cloud Computing In Business

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Testing & Assuring Mobile End User Experience Before Production. Neotys

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Road Map on Security Deliverables for Mobile Cloud Application

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment

Nessus or Metasploit: Security Assessment of OpenStack Cloud

How To Understand The Individual Competences Of An It Manager

Geoprocessing in Hybrid Clouds

Analysis on Virtualization Technologies in Cloud

International Journal of Engineering Research & Management Technology

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

High performance computing network for cloud environment using simulators

Mobile Cloud Computing Challenges

Transcription:

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD BASED MOBILE ENVIRONMENTS MS. MAYURI R. GAWANDE 1, MS. PARNAL P. PAWADE 2 1. M.E Second Year CSE, P.R.Patil COET Amravati, Maharashtra, INDIA. 2. Asst. Prof. IT Dept. P.R.Patil COET Amravati, Maharashtra, INDIA. Accepted Date: 05/03/2015; Published Date: 01/05/2015 Abstract: Mobile networks currently play a key role in the evolution of the Internet due to exponential increase in demand for Internet-enabled mobile devices and applications. As intelligent mobile phones and wireless networks become more and more popular, network services for users are no longer limited to the home. Multimedia information can be obtained easily using mobile devices; allowing users to enjoy everywhere network services. Here we are focusing on cloud base multimedia services. Multimedia services are mainly based on Quality of service (QoS). QoS contain Bandwidth, throughput, jitter, error rates etc. If the user get the multimedia services with high speed and more security then Quality of Experience (QoE) increases. But now days, there is a major problem of hacking of cloud data. In this paper we provide more security for cloud data using Secure OAuth protocol how it will implement and also when workload increases on cloud then service will serve in some delay. Here for this we are providing the solution by implementing service migration technique and serve the user request in lesser delay. This paper shows the multimedia sharing services over the cloud in a secure and optimized manner. Keywords: Cloud Computing, Service Migration, QoS, QoE, Mobile Multimedia, Secure OAuth Protocol. Corresponding Author: MS. MAYURI R. GAWANDE Access Online On: www.ijpret.com How to Cite This Article: PAPER-QR CODE 1401

INTRODUCTION Cloud computing is a relatively new trend in Information Technology that involves the provision of services over a network such as the Internet. The cloud services offered are divided in three categories: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) as illustrated in Fig.1.SaaS delivers software applications such as word processing over the network. PaaS delivers a host operating system and development tools that come installed on virtualized resources. Such Cloud services are now being used to support Video-on- Demand (VoD) services which have much more demanding Quality of Service (QoS) constraints. Finally, IaaS offers raw resources such as a number of virtual machines or processors and storage space and leaves it up to the user to select how these resources are used [1]. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. The cloud computing model allows access to information and computer resources from anywhere that a network connection is available. Cloud computing provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications [2]. Mobile computing also becomes more popular due to smartphones and tablet pcs. Multimedia services are widely run over the cloud. Due to the delay-sensitive characteristic of multimedia, the response time is taken as an important quality of service (QoS) factor. When any media service run on cloud, the QoS must be high so user get service with high speed and QoE will increase. But if many users access the same service then workload increase on one cloud. To solve this problem, this paper is providing solution my service migration from one cloud to another so the user will get service with lesser delay. There is one more issue in cloud based services, it is a security issue. Now days, hacking of client credentials increases because of this anyone can do unauthorized access to cloud based services. To overcome this issue, in this paper we are providing solution using Secure OAuth protocol. 1402

II. LITERATURE SURVEY Fig. 1. Cloud service layers. A. Mobile Multimedia QoS Provision Architecture: The provision of QoS for mobile multimedia applications requires the support of the architectures, protocols, and applications so that the mobile devices can access the multimedia data ubiquitously: anytime and anywhere. Multimedia transmission needs to meet the following requirements, namely high bandwidth, low error rate, low delay, and very small delay variance. As mentioned in the current research effort cannot provide solutions to fulfill all of these requirements for even the wired media. It is thus well-acknowledged that it is even more challenging to meet these requirements for high-quality multimedia transmission over wireless connections. The QoS of multimedia applications are not limited to bandwidth, delay, and jitter. Furthermore, the services provided to the mobile devices should be personalized. There are two ways of emphasizing Region of Interest (ROI), zooming in and enhancing the quality to optimize the overall user experience of viewing sports videos on mobile phones [3].It found out the overall user experience is closely related to the acceptance of video quality and the interest in video content. The current state of QoS provision in architectural frameworks can be summarized as follows [4]: 1403

1. Incompleteness: current interfaces(e.g.,application programming interfaces such as Berkeley Sockets) are generally not QoS configurable and provide only a small subset of the facilities needed for control and management of multimedia flows; 2. Lack of mechanisms to support QoS guarantees: research is needed in distributed control, monitoring and maintenance QoS mechanisms so that contracted levels of service can be predictable and assured; and 3. Lack of an overall framework: it is necessary to develop an overall architectural framework to build upon and reconcile the existing notion of quality of service at different system levels and among different network architectures. The End-to-End QoS Scenario is shown in Fig 2. In recognition of the above limitations, a number of research teams have proposed a systems architectural approach to QoS provision. In this paper these are referred to as QoS architectures. The intention of QoS architecture research is to define a set of quality of service configurable interfaces that formalize quality of service in the end-system and network, providing a framework for the integration of quality of service control and management mechanisms. Fig. 2. End-to-End QoS Scenario 1404

B. Features & Challenges 1. Delivery and Distribution Challenges With mobile multimedia applications, users are more concentrate on-demand services, and telecommunication companies are looking for more alternatives to maintain their income levels. These requirements cause several delivery and distribution issues such as, QoS, quality of experience (QoE), content adaptation, and security. Addressing these issues will make the multimedia cost-effective for mobile users and will improve the quality. 2. QoE and Core Network Congestion Although LTE seemingly presents a great opportunity for mobile multimedia applications delivery, MNOs must address some challenges to fully exploit this technology s power. In 3G and 3.5G mobile networks, congestion occurs more frequently at the physical layer because of the high mobile multimedia applications consumption, which in turn causes more delays on cellular networks and has a direct impact on the users QoE. To recognize the increased delays in application delivery and enhance the QoE, content must be adapted or optimized on the basis of metadata related to the network, service, terminals and user [5]. C. Cloud Computing and Mobile Multimedia To provide good media services, multimedia computing has grown as a eminent technology for generating edit, process and search media contents, such as images, video, audio, graphics, and so on. Now days for multimedia applications and services over the Internet and mobile wireless networks, there are strong demands for cloud computing because of the huge amount of calculations required for serving millions of Internet or mobile users at the same time [5]. In this new cloud-based multimedia-computing model, users store and process their multimedia application data in the cloud in a distributed manner, eliminating full installation of the media application software on the users computer or device and thus reducing the burden of multimedia software maintenance and upgrade as well as sparing the computation of user devices and saving the battery of mobile phones. For multimedia computing in a cloud, continuous bursts of multimedia data access, huge processing, and transmission in the cloud would create a threshold in a general-purpose cloud because of tough multimedia QoS requirements and large amounts of users simultaneous accesses at the Internet scale. However, for multimedia applications, in addition to the CPU and storage requirements, another very important factor is the QoS requirement for bandwidth, delay, and jitter. Therefore, using a general-purpose cloud in the Internet to deal with 1405

multimedia services may suffer from unacceptable media QoS or QoE [6]. Mobile devices have limitations in memory, computing power, and battery life; thus, they have even more prominent needs to use a cloud to address the tradeoff between computation and communication. More specifically, in mobile media applications and services, because of the power requirement for multimedia [7] and the time-varying features of the wireless channels, QoS requirements in cloud computing for mobile multimedia applications and services become more stringent than those for the Internet cases. To meet multimedia s QoS requirements in cloud computing for multimedia services over the internet and mobile wireless networks, we tell the main concepts of multimedia cloud computing for multimedia computing and communications, shown in Fig. 3. III. PROPOSED SYSTEM Fig. 3. Fundamental Concept of Multimedia Cloud Computing. Here we are implemented the Multimedia File Sharing service over the cloud in secured and optimized manner as shown below in the modules. Database Creation In this module, we have created a database in MySql which contain three tables. One table contain multimedia files, second contain the user information and third table keep record of which files get share between users. 1406

B. Android Application Development for Client In this module we have created an application which contains description of application and login form. Using this application user can use the file sharing cloud based service. For new user there is an option of signup to system, which takes information from user and store data in database using php. Once user signup successfully then the user can login. The password and secure key which is used for sharing file is in encrypted form. For this AES algorithm is used so a user credentials is more secure on cloud. After signup, user information is stored in second table. Once user signup successfully, login window will open. After Signup, user credentials check from database if it is valid then user can login by entering password and click on login button then user enters into new window. In that user will upload any file on cloud and share that file. Here we can see secret code. Secret code is nothing but a4 digit random number or alphabet. This is a authorization we are proving for user using OAuth protocol. It is totally based on ip address and imei number (Mobile Device hardware number) which is taken from mobile when this application install in mobile. If imei Number changes then user could not login to the system. If the ip address of user change then user has to remember this secret code and then user will login to system. This is a strong authorization we are proving here so our cloud data will not hack by hacker. As the secret code is only in user s mind, no one can hack it. C. Development of cloud The cloud is developed using php and MySql. This cloud contains multimedia files which are uploaded by user using android phones. Once the user login successfully, user can upload any multimedia file from their mobile sd card and it get store into private cloud. Here we are using private cloud only. D. Segregation of data into public and private cloud Here the actual sharing of information is done based on the public private cloud architecture. Here the sharing takes place between two users. For example 2 users A and B have their account on this application. If user A uploaded one file on cloud and user B wants to download this file then user B has to request to user A. The files which are uploaded on cloud are in encrypted form so it will not hack by anyone. For encryption AES algorithm is used. Now user A can see the request and requested user name. By clicking on that file there is an option that user may approve the request or reject it. If user A approves it then the secure key is also submitted to the user B and with the help of that key the encrypted file first get 1407

decrypted and then that file get shown in user B Approved Files to download Section. So the sharing will be done in more secured manner. By clicking on that file user can now download it. The shared file get store in cloud with appropriate file id, user id who share it, user id for whom file get shared, sharing date and approval status for that file. IV. RESULT ANALYSIS Here the proposed system is providing the enhanced QoS for multimedia cloud based service. As the user get the multimedia file sharing service with high speed and more security the QoE also enhanced as the user experience better service than previous. Here following table clearly show it as follows. Table 1. Comparison Table Sr. Terms Previous System Proposed System No. 1 Performance Generally cloud services use a connected approach where a connection is established on per user basis and the connection is alive till the client is online Which reduces the response time of the service and performance is degraded and also reduces the number of client which can be served. 2 QoS As the bandwidth of multimedia application is high, if number of users request the same multimedia service then workload increase on one cloud and user gets response with delays. 3 Security Pervious system used authorization based on user credentials so it may be hacked by hacker. In our approach we connect as per the client request, so that the number of client can be increased and response to the service is increased and performance of the system increases. In our approach as the workload increases the migration of service takes place between public and private cloud so the user get data with lesser delay and quality of service increases. In proposed system, the authorization is done on basis of IP address and imei no. of mobile which is unique for every mobile. So it provides strong authorization than previous and also for data security AES algorithm is used. 4 QoE QoE is less than proposed system. QoE is enhanced as user experience the service with high speed and in secured manner. V. CONCLUSION In information society, data is become one of the most important part to company or individual. At the same time data leakage becomes an important aspect. Here we have designed the secured and optimized system for multimedia sharing service over the cloud by providing authorization to user; store the data in encrypted form, providing secure key for sharing, optimized response time to the cloud service. Using these four perspectives QoS as well as QoE is enhanced for multimedia applications over the cloud. 1408

REFERENCES 1. Fragkiskos Sardis, Glenford Mapp, Jonathan Loo, On the Investigation of Cloud Based Mobile Media Environment with Service Populating QoS Aware Mechanisms, IEEE trasaction on multimedia, vol.15, JUNE 2013. 2. http://www.scaledb.com/dbaas-database-aa-a Service.php 3. Hongli Luo, Mei-Ling Shyu, Quality of service provision in mobile multimedia - a survey, Human-centric Computing and Information Sciences 2011 4. Hutchison, D., Coulson G., Campbell, A., and G. Blair, Quality of Service Management in Distributed Systems, M. Slomaned., Network and Distributed Systems Management, Addison Wesley, Chapter 11, 1994. 5. RAMESH.B, Ssvitha. N, Manjunath. A.E, Mobile Applications in Multimedia Cloud Computing, Int. J. Computer Technology & Applications, Vol 4 (1), jan-feb 2013, pp. 97-103. 6. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. (2009, Feb. 10). Above the clouds: A Berkeley view of cloud computing. EECS Dept., Univ. California, Berkeley, No. UCB/EECS-2009-28 [Online]. Available: http://radlab. cs.berkeley.edu/ 7. R. Stankiewicz and A. Jajszczyk, A Survey of QoE Assurance in Converged Networks, Elsevier Computer Networks, vol. 55, no. 7, 2011, pp. 1459 1473. 1409