Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD)



Similar documents
ISSN: Journal of Chemical and Pharmaceutical Sciences Multiple-client data management using robust database pattern design S. A.

The deployment of OHMS TM. in private cloud

KEYWORD SEARCH IN RELATIONAL DATABASES

IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE

PartJoin: An Efficient Storage and Query Execution for Data Warehouses

An Approach Towards Customized Multi- Tenancy

Building Multi-tenant Applications with Actian PSQL

SAAS. Best practices for SAAS implementation using an Open Source Portal (JBoss)

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System

Multi Tenancy and Customizations Issues in e-health SaaS Applications

ABSTRACT: [Type text] Page 2109

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

Iaas for Private and Public Cloud using Openstack

User Authentication Platform using Provisioning in Cloud Computing Environment

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Dependency Free Distributed Database Caching for Web Applications and Web Services

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Convert your web application to a Multi tenant SaaS solution using "SaaS-Tenant " Framework

Dynamic resource management for energy saving in the cloud computing environment

Method of Fault Detection in Cloud Computing Systems

Security Analysis of Cloud Computing: A Survey

5-Layered Architecture of Cloud Database Management System

Parallels Virtuozzo Containers

Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture

Load Testing and Monitoring Web Applications in a Windows Environment

Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries

SURVEY ON VIRTUALIZATION VULNERABILITIES

[Sudhagar*, 5(5): May, 2016] ISSN: Impact Factor: 3.785

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

CLOUD BASED PEER TO PEER NETWORK FOR ENTERPRISE DATAWAREHOUSE SHARING

Development of Software As a Service Based GIS Cloud for Academic Institutes. Singh, Pushpraj 1 and Gupta, R. D. 2

Cryptographic Data Security over Cloud

Optimized Resource Allocation in Cloud Environment Based on a Broker Cloud Service Provider

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

International Journal of Advance Research in Computer Science and Management Studies

MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

Buffer Operations in GIS

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

SAP HANA - Main Memory Technology: A Challenge for Development of Business Applications. Jürgen Primsch, SAP AG July 2011

Case Study. Migration to Cloud and SaaS. InVision Software AG, Germany. Enterprise-wide Workforce Management Solution

Multi-Tenant Architecture Comparison

Ranked Keyword Search Using RSE over Outsourced Cloud Data

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

Ensuring security the last barrier to Cloud adoption

EXIN Cloud Computing Foundation

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

SQL Server Administrator Introduction - 3 Days Objectives

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

An efficient Join-Engine to the SQL query based on Hive with Hbase Zhao zhi-cheng & Jiang Yi

Software as a Service (SaaS) Testing Challenges- An Indepth

Optimizing Service Levels in Public Cloud Deployments

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Performance Modeling for Web based J2EE and.net Applications

Gladstone Health & Leisure Technical Services

Virtual Machine in Data Center Switches Huawei Virtual System

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

Design and Implementation of IaaS platform based on tool migration Wei Ding

Cloud Based E-Learning Platform Using Dynamic Chunk Size


A SURVEY ON MAPREDUCE IN CLOUD COMPUTING

InfiniteGraph: The Distributed Graph Database

Software as a Service (SaaS) for Management information system using multiple tenants

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Mobile Based Cloud Data Retrieval System

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Multi-Tenant Engineering Architecture in SaaS

Security Considerations for Public Mobile Cloud Computing

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Hadoop Market - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast,

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities

BB2798 How Playtech uses predictive analytics to prevent business outages

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone

Transcription:

Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD) M.Rajesh, Research Scholar, Department of Computer Science & Engg., St.Peter's University Chennai, rajesmano@gmail.com J.M Gnanasekar, Professor & Head, Department of Computer Science & Engg., Karpaga Vinayaga College of Engg & Tech., jmg_sekar@yahoo.com Abstract: Major application of Software as a Service is a Multiple-Clients data management. Data management service is offered by a third party vendor to manage the outsourced data with the aid of Multiple-clients database system. The Multiple-clients database system needs a high quality database pattern to have high execution, low space requirements and excellent scalability. II approaches to design the pattern are Independent Tables Shared Instances (ITSI) and Shared Tables Shared Instances (STSI). ITSI has poor scalability; cost of implementation is high when the table size increases and bottleneck occurs. STSI provides good scalability, but poor performance and it calls for a great number of NULLS & wastes large number of places. An adaptive database pattern design method is suggested for Multiple-clients applications to overcome the problems and limitations of ITSI & STSI. ITSI & STSI are used to find a balance to achieve good scalability and high performance with low space requirements. An appropriate number of base tables and supplemental tables are made by identifying the important attributes and remaining attributes. The turn of base tables is specified and constructed using Kernel matrix and Graph partitioning algorithms. A Page Rank algorithm is employed to measure the importance of attributes. The proposed method achieves high scalability, high performance and space demands. Key words: Multiple-Clients, STSI, ITSI C 1 INTRODUCTION loud is something, which is present at the remote location. Cloud Computing refers to manipulating, configuring and accessing the applications online. It offers online data storage, infrastructure and application. Cloud computing in which large group of remote servers is networked to allow the centralized data storage, and online access to computer services or resources. Software as a Service (SaaS) represents a model that companies do not have to purchase and maintain their own infrastructure, instead they can acquire the services by software from a third party. Requests can be made by Service on Demand for Service Providers and require only Internet access to use the avails. The Service Provider must support Multipleclients; it requires excellent public presentation, low space requirement and full scalability. In lodge to provide good performance the service provider must design a high-quality database pattern. 2 MULTIPLE-CLIENTS APPLICATIONS Multitenancy is a principle in software architecture where a single instance of the software functions on a server waiting on multiple customers. A client is a group of users sharing the same view of the software they use. With Multiple client architecture, a software application is designed to provide every client a dedicated part of the instance, including its data, configuration, user management and client s individual functionality. A Multiple-clients application allows customers or clients to share the same hardware resources, by providing them one shared application and database instance; clients can also configure the application based on their demands. 2.1 Characteristics of Multiple-Tenancy 2.1.1 Hardware Resource Sharing 2.1.2 High Degree of Configurability * Corresponding author

2.1.1 Hardware Resource Sharing The traditional method similar to Application Service Provider (ASP), is the single-clients software development method in which clients have their own server, where server utilization is low. Through virtualization the server utilization can be amended by placing multiple clients on the same host. Virtualization enables higher utilization of the existing servers and scales down the hardware resources needed. Multiple clients has different shapes they are: i. Shared application, Independent database ii. iii. Shared application, Independent tables shared database instances Shared application, Shared tables shared database instances 2.1.2 High Degree of Configurability Customers or clients receive their own customized applications in a single client s environment so they can configure their applications based on their demands. When comes to Multiple-clients environment, Multiple customers or clients share the single application, then it is impossible to configure the application based on user demands. It is necessary to run Multiple versions of the same application next to each other for high degree of configurability. 2.2 Problem Formulation Service Provider maintains Multiple-clients databases to store and handle the outsourced Multiple-clients data. Renters can apply SQL queries to view their information. Every client outsources a database with the number of tables (T1, T2, T3 Tn) they are called as source tables. It s the obligation of service provider to serve the clients with quick response. To offer such a service to large number of renters. Service Provider requires a Multiple-clients database with good scalability and high performance with low space requirements. To reach this challenge the service provider needs to redesign the database pattern to manage the information efficiently. Redesigned tables are called physical tables. Source Tables a) CUSTOMER Table for Clients 3 CUSTKEY NAME ADDRESS SALARY NATION 0005 Raju UK 9000 London 0046 Sakthi Goa 20000 India 0012 Gopi New York 20000 US 0009 Arun Japan 12000 France b) CUSTOMER table for Clients 6 CUSTKEY NAME ADDRESS SALARY 1111 Ram Chennai 25000 0215 Shoba Africa 15000 1580 Jeni Mumbai 10000 c) CUSTOMER table for Clients 10 CUSTKEY NAME ADDRESS AGE 0002 Sri Coimbatore 25 0258 Srini Kumbakonam 45 2580 Sathish Chennai 25 3 ARCHITECTURE OF ADAPTIVE DATABASE PATTERN DESIGN Client outsources their tables to service provider in their own name. The service provider reconstructs the physical tables from attribute level. Several base tables are constructed using the highly important attributes and by using the remaining unimportant attributes supplementary tables are generated. Common Attribute An attribute from source table that is highly shared is known as a common attribute. When the usual properties are highly shared by a number of clients then they are called as important attributes. Star Attribute An attribute from source tables that is primary key and also referenced by some other source tables is called star attribute.

Uncommon Attribute An attribute is called an uncommon attribute if it is neither a common attribute nor a star attribute. In the above case of the Customer table in STSI, the data of several clients are stored below the single board using the properties. As we discussed earlier STSI method occupies number of NULL values in empty attribute places. In the above example Nation & Age attribute occupies several NULL values that waste a large sum of quads. Adaptive Database Pattern design method is presented to overcome the problems of ITSI & STSI. In this method Customer table is separated into a Base Table and Supplementary Table based on the important attributes and insignificant attributes. Multiple-Clients Upload Accept Provider Files Files Application Layer Base Table 1 Base Table 2 Base Table N Kernel Matrix Page Rank Graph Partition Supplementary Table 1.N Supplementary Table 2.N Supplementary Table N.N Service Provider 3.1 Experimental Work 3.1.1 Data Upload to Service Provider Many companies outsource their data to a third party service supplier that supplies information management service which hosts a Multiple-clients database. Each society is called clients. Clients manage and query their information by posing SQL queries to the database scheme. Renters must register their information to a service provider for a service request. Once the service is granted the clients companies can log on to their profile and can upload their data to the avail provider. Service Provider authenticates the data for cloud storage. Renters can view their data from cloud storage once the files have been uploaded. Company login details can be viewed from the Company Register table. Status table can be utilized to consider the status of data that has been uploaded. Service Provider details can be viewed from the Service Provider Login table. 3.1.2 ITSI & STSI The traditional method developed to design a Multiple-clients database is Independent Databases and Independent Instances (IDII). In this method the service provider will build an independent and separate database to store the client files, but the single hardware is shared by multiple clients. Deployment of IDII is easy and it has good data isolation and security. Maintenance cost of IDII is very expensive; the service provider has to do so many constellations in order to manage different database instances. As advancement to IDII, Independent Tables Shared Database Instances (ITSI) has been introduced, by this method clients can share both hardware and database instance. The service provider utilizes the same database instance to store all the source tables that are uploaded by multiple clients in this method maintains private tables for each renter. A TENANT ID is applied to separate the tables from different clients with similar names. Queries from clients are translated using clients ID to return correct answers to the corresponding clients. Maintenance cost of ITSI is low when compared to IDII and also offers better scalability because of its single database instances. The scalability is limited when the number of private tables in the shared database grows in proportion to the number of clients. When

the number of tables is large the memory cost will increase. Shared Tables and Shared Database Instances (STSI) was introduced to overcome the limitations of IDII &ITSI. STSI shares both the database instances and the control panels. The service provider employs a great table to stash away the Multiple-clients data these tables contain all the tuples of clients. A column client ID is used for the purpose of dividing the tuples of each clients. NULL is filled for clients with no attributes. STSI has reduced maintenance cost and provides better scalability as the size of the big table varies based on the number of source tables uploaded by clients. Of course STSI also have more or less of the limitations, large quantities of space are wasted with NULLS by a low number of clients with less attributes. The performance of STSI is obviously degraded when database tables become too sparse. 3.1.3 Multiple-Clients DB Design Multiple clients outsource their data to the service provider; the service provider evaluates the tables and extract the common, uncommon, star, important and unimportant attributes. Kernel matrix is used to determine the number of base tables and adopt graph partitioning algorithm to construct the base tables. Page Rank algorithm is used to analyze the importance of attributes. A cost based model is used to automatically generate high-quality database pattern. 4 Graph Partitioning Algorithms The graph partition problem is defined on data presented in the shape of a graph G = (V, E) with V vertices and E edges, such that it is possible to partition G into smaller components with specific attributes. For illustration, a k-way partition divides the vertex set into k smaller components. A good segmentation is defined as one in which the number of edges running between separated components is small. Uniform graph partition is a type of graph partitioning problem that consists of splitting up a graph into components, such that the components are of roughly the same size and there are few connections between the parts. Significant applications of graph partitioning include scientific computing, partitioning various stages of a VLSI design circuit and task scheduling. CUSTOMER Table Layout in STSI TID CUSTKEY NAME ADDRESS SALARY NATION AGE 3 0005 Raju UK 9000 London NULL 3 0046 Suri Goa 20000 India NULL 3 0012 Gopi New York 20000 US NULL 3 0009 Arun Japan 12000 France NULL 6 1111 Ram Chennai 25000 NULL NULL 6 0215 Shoba Africa 15000 NULL NULL 6 1580 Jeni Mumbai 10000 NULL NULL 10 0002 Sri Chennai NULL NULL 25 10 0258 Srini Andhra NULL NULL 45 10 2580 Sai Chennai NULL NULL 25 ATTR_NAME BTable_ NO Expensive Attribute List OCC_TIME NULL_NUM C_SALARY 1 10 3 C_AGE 1 5 7 C_NATION 1 2 6 CUSTOMER Table Layout in ADAPT a) Base Table TID CUSTKEY NAME ADDRESS SALARY 3 0005 Raju UK 9000 3 0046 Suri Goa 20000 3 0012 Gopi New York 20000

3 0009 Arun Japan 12000 6 1111 Ram Chennai 25000 6 0215 Shoba Africa 15000 6 1580 Jeni Mumbai 10000 10 0002 Sri Chennai NULL 10 0258 Srini Andhra NULL 10 2580 Sai Chennai NULL b) Supplementary Tables TID CUSTKEY AGE 10 0002 25 10 0258 45 10 2580 25 TID CUSTKEY NATION 3 0005 London 3 0046 India 3 0012 US 3 0009 France 5 PAGE RANK ALGORITHM Page Rank is a link analysis and it specifies a numerical weighting to each component of a hyperlinked set of text files, such as the World Wide Web, with the design of assessing its relative importance within the circle. The algorithm may be applied to any collection of entities with reciprocal quotations and citations. The numerical weight that it ascribes to any given element E is referred to as the Page Rank of E denoted by PR (E). 6 ADVANTAGES OF ADAPTIVE DATABASE PATTERN 6.1 High Scalability Scalability is the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth. Our proposed system the number of tables does not grow linearly and the scalability is limited. 6.2 High Performance In Adaptive database pattern method the index method is very effective and it delivers high performance with reduced NULLs but STSI degrades the performance with a number of NULLS in the board. 6.3 Low Space Requirements The attributes from all the clients are put into a single large table without any importance in STSI and it lets in a great amount of Nulls. In proposing method the attributes are divided into important and unimportant attributes and stored in the base table and auxiliary tables 7 CONCLUSIONS In this report, we propose an Adaptive database pattern design by placing the important attributes such as common properties, star attributes and dependent attributes to get the base tables using the important properties. Supplementary tables are built utilizing the other properties. In this method base table is set and built using Kernel matrix and Graph partitioning algorithms. A Page Rank algorithm is used to evaluate the importance of attributes. The proposed method achieves high scalability, high performance and space requirements. REFERENCES [1] C P Bezemer and A Zaidman. Multiple-clients saas applications: maintenance dream or nightmare? In EVOL/IWPSE, pages 88-92, 2010. [2] H Cai, B Reinwald, N Wang and C Guo. Saas Multi-tenancy: Framework, technology and case study. IJCAC, 1(1):62-77, 2011. [3] K Haller. Web services from service provider prespective: clients management services for Multitenant information systems. ACM SIGSOFT Software Engineering Notes, 36(1):1-4, 2011. [4] M Hui, D Jiang, G Li and Y Zhou. Supporting database applications as a service. In ICDE, pages 832-843, 2009 [5] W Lang, S Shankar, J M Patel and A Kalhan. Towards Multitenants performance slos. In ICDE, pages 702-713,2012. [6] W Lee and M Choi. A Multiple-clients web application framework for saas. In IEEE CLOUD, pages 970-971, 2012 [7] B C Ooi, B Yu and G Li. One table stores all: Enabling painless free-and-easy data publishing and sharing. In CIDR, pages 142-153, 2007.

Author Biographies M.Rajesh, received the BE degree in computer Science and engineering from kamban engineering Tiruvannamalai, Tamilnadu in 2006 and the ME Degree in computer science and engineering from Arunai college of engineering Tiruvannamalai, Tamilnadu, India in 2012. He pursuing Ph.D in computer Science and engineering from St.Peter s university, Chennai, Tamilnadu. He is currently working as a Assistant Professor in computer science and engineering from KRS College Of Engineering, Vandavasi, Tamilnadu.