Drive System By Using Cloud Computing



Similar documents
Cloud computing an insight

Cloud Computing Security Issues And Methods to Overcome

Cloud Computing, and REST-based Architectures Reid Holmes

Cloud Computing. Karan Saxena * & Kritika Agarwal**

20 th Year of Publication. A monthly publication from South Indian Bank.

Module 1: Facilitated e-learning

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Skills You Will Need

Security Considerations for Public Mobile Cloud Computing

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING

A Survey on Cloud Security Issues and Techniques

Web Application Hosting Cloud Architecture

About me & Submission details

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

Web Applications Access Control Single Sign On

File Sharing & LiveBox WHITE PAPER.

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

How To Use Egnyte

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Cloud Computing and Business Intelligence

Chapter 6: Fundamental Cloud Security

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Investigation of Cloud Computing: Applications and Challenges

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Data Storage Security in Cloud Computing

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors


Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, What Cloud Computing is and How it Works

ADVANCE SECURITY TO CLOUD DATA STORAGE

SHARPCLOUD SECURITY STATEMENT

How to Install SSL Certificates on Microsoft Servers

Deploying SwiftStack Object Storage for Storage Made Easy

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

How To Secure Cloud Computing

Voice. Internet. Apps. Data Center. Wide Area Networks. Business is better in the cloud

Cloud Data Protection for the Masses

Near Sheltered and Loyal storage Space Navigating in Cloud

National Cyber Security Month 2015: Daily Security Awareness Tips

Securing Corporate on Personal Mobile Devices

Cloud Computing Thunder and Lightning on Your Horizon?

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

join.me architecture whitepaper

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

Cloud Data Storage Services Considering Public Audit for Security

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Data Leakage Detection in Cloud Computing using Identity Services

Everything you need to know!

One platform for all your print, scan and device management

Cloud-Security: Show-Stopper or Enabling Technology?

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Control and management of privileged users

That Point of Sale is a PoS

DIGITAL FORENSIC INVESTIGATION OF CLOUD STORAGE SERVICES


Copyright Giritech A/S. Secure Mobile Access

White Paper on CLOUD COMPUTING

CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS

Remote sensing information cloud service: research and practice

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SHORT MESSAGE SERVICE SECURITY

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Information Security Basic Concepts

Dynamic Query Updation for User Authentication in cloud Environment

Electronic Document Workflow Platform for KBA Customers

Memeo C1 Secure File Transfer and Compliance

Authentication Mechanism for Private Cloud of Enterprise. Abstract

Recommended IP Telephony Architecture

Chapter 19 Cloud Computing for Multimedia Services

Internet threats: steps to security for your small business

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

How To Set Up Dataprotect

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Encryption Key Best Practices Nasuni Corporation Natick, MA

Introduction to Cloud Services

Closing the Security Gap Extending Microsoft SharePoint, OCS, and Exchange to Support Secure File Transfer

Brochure Achieving security with cloud data protection. Autonomy LiveVault

How To Use Uniflow

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Citrix GoToAssist Service Desk Security

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Secure Hybrid Cloud Architecture for cloud computing

Making Sense of Cloud Computing in the Public Sector. By EVA OlSAKER

Mobile Cloud Computing Security Considerations

Assuring Application Security: Deploying Code that Keeps Data Safe

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

(Unofficial Translation)

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Resco Mobile CRM Security

Security Model for VM in Cloud

Selecting a Secure Conferencing Solution

One Platform for all your Print, Scan and Device Management

Wireless VPN White Paper. WIALAN Technologies, Inc.

Transcription:

Drive System By Using Cloud Computing Prof. Indira Joshi,Chinar Churi,Sushil Ganapuram. Dilkap Research Institute Of Engineering And Management Studies, NERAL ipj.indira@gmail.com,chinar.churi@gmail.com, sushil30g@gmail.com ABSTRACT A Drive System is Cloud based web application that helps a user to store data on secure place and also to share their data with they like one. The web application typically has a reserved space for user to hold their data. Many Spaces sharing web application provides space to store data but these provides space as well as give option to edit files like word and text online. Drive System by using cloud computing comes in four basic flavors:1) Web Application access your data on any computer and anywhere.2) Sharing share your data with your friends and colleagues. 3) Online Editing It offers you to edit your data like document files online.4) Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster. Index Terms: Drive system, cloud computing, web application, sharing I. INTRODUCTION The need of cloud computing is increasing day by day as its advantages overcome the disadvantage of various early computing techniques. Cloud storage provides online storage where data stored in form of virtualized pool that is usually hosted by third parties. The hosting company operates large data on large data center and according to the requirements of the customer these data center virtualized the resources and expose them as the storage pools that help user to store files or data objects. [1] National Institute of Standard and Technology defines cloud computing as a model for enabling convenient, on-demand network access to a share pool of configurable computing service that can be provisioned rapidly and released with minimal management effort or services provider. Today, Cloud Computing is itself a gigantic technology which is surpassing all the previous technology of computing (like cluster, grid, distributed, etc.) of this competitive and challenging IT world. Drive system is ultimate solution to store your private data on secure place other than any space sharing web application. You have to remember only one ID and Password for Login to this website and then you will get your all saved data. Cloud Computing is a relatively new concept that presents a good number of benefits for its users. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet.

The data is kept private to you and only you can share this data with your friends. Once you are successfully login then you can edit the document and Spreadsheet files online. You can access different Web Applications on Drive System like, (Online Calculator, Online Word, Online Excel, Online Encrypter and many others.) II. LITERATURE SURVEY A public cloud is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model.[1] To write to an already existing file, the user must send its message with the claim policy as done during file creation. The cloud verifies the claim policy, and only if the user is authentic, is allowed to write on the file. [2] Data sharing is becoming increasingly important for many users and sometimes a crucial requirement, especially for businesses and organisations aiming to gain profit. People love to share information with one another. Whether it is with friends, family, colleagues or the world, many people benefit greatly through sharing data. [3] Where is your data more secure, on your local hard driver or on high security servers in the cloud? Some argue that customer data is more secure when managed internally, while others argue that cloud providers have a strong incentive to maintain trust and as such employ a higher level of security. However, in the cloud, your data will be distributed over these individual computers regardless of where your base repository of data is ultimately stored.[4] Similar to confidentiality, the notion of integrity in cloud computing concerns both data integrity and computation integrity. Data integrity implies that data should be honestly stored on cloud servers, and any violations (e.g., data is lost, altered, or compromised) are to be detected. Computation integrity implies the notion that programs are executed without being distorted by malware, cloud providers, or other malicious users, and that any incorrect computing will be detected. [5] When dealing with cloud environments, confidentiality implies that a customer s data and computation tasks are to be kept confidential from both the cloud provider and other customers. [6] PaaS customers must develop their applications using languages and service APIs specified by the cloud provider. The supported languages are typically those most popular for web-development. The services provided include facilities such as key-value stores, relational databases, caching systems and various platform specific functionalities. [7] Different from the traditional computing model, cloud computing utilizes the virtual computing technology, users personal data may be scattered in various virtual data center rather than stay in the same physical location, even across the national borders. [8] In cloud data storage system, users store their data in the cloud and no longer possess the data locally. Thus, the correctness and availability of the data files being stored on the distributed cloud servers must be guaranteed. One of the key issues is to effectively detect any unauthorized data modification and corruption, possibly due to server compromise. [9] III. PROBLEM DEFINATION Data sharing is one of the needs while computing. As data sharing is part of networking it becomes easy task.

A time before, we used pen drive, external drives & CD Roms to share our data. In distributed multimedia system we have number of extensions, if we don t have the correct application we can t open that file or that file is just useless. Now a days we have personal clouds which gives us option to access data from anywhere, but they also have some limitations (as We can not make our any document online, or we can t edit our document online.) Existing System The existing system can provide facilities as:1.storing DOC files 2.Storing images. 3. Storing your video and audio files. 3.Share your data i.e doc files & images 4. You can store your data upto 1GB Disadvantages of the Existing System You can only store your DOC files in your account but cannot edit it without downloading. You can only store your video and audio files but cannot play it without downloading. If you want to read DOC files the first you want to download it then you can read it. If you want to view your store images in your account then first you want to download it then you can view your store images. You can store your data only upto 1GB. IV. Propose Work The proposed system can provide facilities as:1. Storing & editing DOC files online without downloading. 2. Storing & play videos and audio files online without downloading. 3. You can extend your storage space. 4. Storing images and view images online. 5. Share your data that is DOC files, images, videos and audio files etc. 6. Message to friends online Advantages of Proposed System In proposed system you can edit your DOC files online without downloading it. You can also play your audio files online which are stored in your account, no need of downloading it. To play your stored video files there is no need to download it, you can play it from your drive online without downloading. If you want more space in your drive then you can extend it by paying money for it depended on space you wanted. Existing system Proposed system Data Storage Only upto 1GB Upto 10GB DOC Files Not edited online Edited online

Play video & audio files After downloading the file Play online & download also View images After download View online Messaging Only public chatting Private Chatting also Table1. COMPARISON BETWEEN EXISTING & PROPOSED SYSTEMS Drive System Architecture When talking about a drive system, it's helpful to divide it into two sections: the front end and the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system. The front end includes the client's computer (or computer network) and the application required to access the drive system. Not all cloud computing systems have the same user interface. Services like Web-based email programs leverage existing Web browsers like Internet Explorer or Firefox. Other systems have unique applications that provide network access to clients. On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services. In theory, a drive system could include practically any computer program you can imagine, from data processing to video games. Usually, each application will have its own dedicated server. Flowchart Fig. Flowchart for Drive System V. RESULTS

Fig.1 Fig.2

Fig.3 VI. CONCLUSION In this paper Cloud storage enables users to remotely store their data. Cloud Computing is a relatively new concept that presents a good number of benefits for its users. Data shearing is one of the needs while computing. As data shearing is part of networking it becomes easy task. A time before we used pen drives, external devices & CD ROMs to share our data. In distributed multimedia system we have number of extensions, if we don t have the correct application we can t open that file or that file is just useless. Now a days we have personal clouds which gives us option to access data from anywhere, but they also have some limitations. VII. REFERENCES [1] PankajArora, RubalChaudhryWadhawan& all, Cloud Computing Security Issues in Infrastructure as a Service. January 2012. [2] Jean Bacon,DavidEyers& all, Information Flow Control for Secure Cloud Computing., March 2014. [3] DananThilakanathan, ShipingChen, Secure Data Sharing in the Cloud. 2014. [4] Maria D. Alvarado, Rajeev Agrawal& all, Security Mechanisms Utilized in a Secured Cloud Infrastructure.,2013. [5] SushmitaRuj,MilosStojmenovicandAmiyaNayak, Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds., February 2014.

[6] Cong Wang, KuiRen all, Towards Secure and Dependable Storage Services in Cloud Computing., February 2014. [7] Daniel Ricardo dos Santos, Carla MerkleWestphall all, A Dynamic Risk-based Access Control Architecture for Cloud Computing., 2014. [8] Edna Dias Canedo, Rafael Timoteo de Sousa Junior, Trust Modelfor Reliable File Exchange in Cloud Computing.,Feb 2012. [9] Cong Wang, KuiRen, Towards Secure and Dependable Storage Services in Cloud Computing. [10] Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing.,2013.