Web Services & Database Services Availability through Multi-Cloud Environment

Similar documents
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Dynamic Query Updation for User Authentication in cloud Environment

A survey on cost effective multi-cloud storage in cloud computing

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Scientific Journal Impact Factor (SJIF): 1.711

Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT

CLOUD COMPUTING INTRODUCTION HISTORY

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Ensuring Data Storage Security in Cloud Crop

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

CLOUD COMPUTING OVERVIEW

How To Ensure Correctness Of Data In The Cloud

The cloud - ULTIMATE GAME CHANGER ===========================================

Improving data integrity on cloud storage services

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Secure Way of Storing Data in Cloud Using Third Party Auditor

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Keyword: Cloud computing, service model, deployment model, network layer security.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Development of Intranet App with JAVA on Oracle Cloud

CLOUD COMPUTING SECURITY ISSUES

Verifying Correctness of Trusted data in Clouds

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Data Storage Security in Cloud Computing

Information Security: Cloud Computing

Cryptographic Data Security over Cloud

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Security Considerations for Public Mobile Cloud Computing

How To Design A Cloud Data Storage Service For A Cloud Computer System

Chapter 1: Introduction

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Rapid Application Development

Peer-to-peer Cooperative Backup System

CLOUD COMPUTING SECURITY CONCERNS

CHARM: A COST-EFFICIENT MULTI-CLOUD DATA HOSTING SCHEME WITH HIGH AVAILABILITY

Research on Digital Forensics Based on Private Cloud Computing

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Computing: Advantages and Security Challenges

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa

Security Issues in Cloud Computing

Security Evaluation Using Shamir s Algorithm in Multi Cloud Data Storage

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Management of Security Information and Events in Future Internet

20 th Year of Publication. A monthly publication from South Indian Bank.

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Investigation of Cloud Computing: Applications and Challenges

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

White Paper on CLOUD COMPUTING

Data Protection: From PKI to Virtualization & Cloud

(C) Global Journal of Engineering Science and Research Management

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

A Survey on Cloud Computing

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

CLOUD COMPUTING. When It's smarter to rent than to buy

TOP SECRETS OF CLOUD SECURITY

Data Protection Act Guidance on the use of cloud computing

Cloud Computing. Cloud computing:

A Review on Cloud Computing Vulnerabilities

Performance Gathering and Implementing Portability on Cloud Storage Data

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Role of Cloud Computing to Overcome the Issues and Challenges in E-learning

Cloud Computing for SCADA

A Survey on Cloud Security Issues and Techniques

Privacy preserving technique to secure cloud

Secured Storage of Outsourced Data in Cloud Computing

CAPABILITY STATEMENT

An Intelligent Approach for Data Fortification in Cloud Computing

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

Cloud Computing Security Issues And Methods to Overcome

Introduction to Cloud Computing

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

CLOUD COMPUTING IN HIGHER EDUCATION

Transcription:

Web Services & Database Services Availability through Multi-Cloud Environment Veenesh Kumar Shrotriya 1, Ashutosh Kumar 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science and Engineering, Swami Vivekanand Subharti University, Meerut Abstract Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. Developed system is a technique through cloud computing in which user will handle systems from far distances with the help of centralized server and can access applications as well insert them from client machines, and can store data on data storage area on proxy server. The main advantage of cloud computing over the other nonnetwork methods is of faster processing. Also, many processors can be used remotely, without the knowledge of the users, in order to expedite the processing. Thus, keeping this main advantage in mind, the main reason for creating the project is to provide a centralized compiling scheme for organizations or institutions. Also, it will act as a centralized repository for all the codes written. The other major advantage that this system will have over the others is that it will make the users system lightweight. The proposed system will be used by an organization to compile and execute code on centralized compiler. Users don t have to install compiler on each machine. The proposed system will also be used for conducting online exanimation. Keywords Cloud computing, single cloud, multi-clouds, cloud storage, data integrity, data intrusion, service availability. In System the development of a technique through cloud computing in which user will access application on server which is allocated far away from user system. Cloud computing is a phenomenon of the 21 st century, an all-new services delivery model that uses the Internet as a platform. According to independent technology and market research, cloud computing is a standardized IT capability, such as software application platform or infrastructure, delivered via Internet technologies in a pay-per-use and self-service way. 1.1 Cloud Computing The familiar term Cloud Computing also approaches Software used as a service for consumption over the Internet (the cloud). The word Cloud Computing is not associated with any particular technology, protocol or vendor. It allows cloud applications to service the users (usually via websites, client applications, and so on) assuring that the service will have a single point of access (i.e. from main server ) and all the scaling, parallel computation, virtualization and whatever technology is used on the back end will be transparent to the client. 1.2 Cloud Environment Architecture The cloud computing model consists of five characteristics, three delivery models, and four deployment models. I. INTRODUCTION Cloud computing is a style of computing in which dynamically scalable and often virtualizes resources are provided as a service over the Internet. Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. Cloud computing offers the vision of a virtually infinite pool of computing, storage and networking resources where applications can be scalable deployed. The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment. Fig. 1 Cloud environment architecture 669

1.3 Cloud Delivery Models The cloud computing model consists of five characteristics, three delivery models, and four deployment models. Infrastructure as a service (IaaS) Infrastructure as a service (IaaS) refers to the sharing of hardware resources for executing services, typically using Virtualization technology. With IaaS approach, potentially multiple users use available resources. The resources can easily be scaled up depending on the demand from user and they are typically charged for on a pay-per-use basis. The resources are all virtual machines, which has to be managed. This also helps to avoid uncontrolled access to user s sensitive information. Platform as a service approach (PaaS) In the Platform as a service approach (PaaS), the offering also includes a software execution environment. PaaS model aims to protect data, which is especially important in case of storage as a service. The need for security against outage is important to ensure load balanced service. The data needs to be encrypted when hosted on a platform for security reasons. Software as a service (SaaS) In SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. This eliminates the need to install and run the application on the cloud user's own computers simplifying maintenance and support. What makes a cloud application different from other applications is its elasticity. This can be achieved by cloning tasks onto multiple virtual machines at run-time to meet the changing work demand. Load balancers distribute the work over the set of virtual machines. 1.4 Cloud Deployment Models Public cloud Public cloud applications, storage, and other resources are made available to the general public by a service provider. These services are free or offered on a pay-peruse model. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered). Community cloud Community cloud shares infrastructure between several organizations from a specific community with common concerns whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud. 670 Hybrid cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. By utilizing "hybrid cloud" architecture, companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity. Hybrid cloud architecture requires both onpremises resources and off-site (remote) server-based cloud infrastructure. Private cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Undertaking a private cloud project requires a significant level and degree of engagement to virtualise the business environment, and it will require the organization to reevaluate decisions about existing resources. 1.5 PROXY SERVER The use of proxy server could help provide adequate access and response time to large numbers of World Wide Web (WWW) users requesting previously accessed page. While some studies have reported performance increase due to the use of Proxy servers, a study reported performance decrease associated with the use of proxy server. 1.6 Brief Description Cloud computing is a network-based environment that focuses on sharing computations or resources. Actually, clouds are Internet-based and it tries to disguise complexity for clients. Cloud computing refers to both the applications delivered as services over the Internet and the hardware and software in the organisation that provide those services. Cloud computing provides many opportunities for enterprises by offering a range of computing services. In today s competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. Our proposed system in cloud computing user will handle systems in which any client machine can interact with server machine and can access applications on server from home or where internet is available. Algorithm of Secret sharing used in cryptography, secret sharing refers to a method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their own.

1.7 Problem Definition To develop a system for sharing of software and hardware in cloud from which user can access applications anytime, anywhere with secure architecture? II. EXISTING SYSTEM Customers can use cryptographic methods to protect the stored data in the cloud. Using a hash function is a good solution for data integrity. The loss of availability of service is considered one of the main limitations in cloud computing and it has been addressed by storing the data on several clouds. If the data is processed from different clients, data encryption cannot ensure privacy in the cloud. Cloud can be attacked by the Third-party This system provides a secure storage environment, but does not provide security of data in the cloud model. 2.1 Algorithm Available To Develop Proposed System A. HAIL (High Availability and Integrity Layer) HAIL is example of protocol of a protocol that controls multiple clouds. HAIL is a distributed cryptographic system that permits a set of servers to ensure that the client s stored data is retrievable and integral. HAIL provides a software layer to address availability and integrity of the stored data in an intercloud. B. RAID (Redundant Array of Cloud Storage) RACS, a proxy that transparently spreads the storage load over many providers. In system, evaluate a prototype of system and estimate the costs incurred and benefits reaped. Finally, user use trace-driven simulations to demonstrate how RACS can reduce the cost of switching storage vendors for a large organization such as the Internet Archive by seven-fold or more by varying erasure-coding parameters. 2.2 Proposed System User guarantee data confidentiality, it does not need code execution in their servers. User s data does not affected by loss of availability, loss of corruption of data, loss of privacy, vendor lock-in problem. User is able to access application environment which is located on server side. Every user can access licensed version software for their work. Customers can use cryptographic methods to protect the stored data in the cloud. A. Data rebalance or persistence Data must be effectively and completely removed to be deemed destroyed. Therefore, techniques for completely and effectively locating data in the cloud, erasing/destroying data, and assuring the data has been completely removed or rendered unrecoverable must be available and used when required. B. Data backup and recovery schemes for recovery and restoration Data must be available and data backup and recovery schemes for the cloud must be in place and effective in order to prevent data loss, unwanted data overwrite, and destruction. Don t assume cloud-based data is backed up and recoverable. C. Commingling data with other cloud customers Data especially classified / sensitive data must not be commingled with other customer data without compensating controls while in use, storage, or transit. Mixing or commingling the data will be a challenge when concerns are raised about data security and geolocation. D. Data discovery As the legal system continues to focus on electronic discovery, cloud service providers and data owners will need to focus on discovering data and assuring legal and regulatory authorities that all data requested has been retrieved. E. Data aggregation and inference Data in the cloud, there are added concerns of data aggregation and inference that could result in breaching the confidentiality of sensitive and confidential information. Hence practices must be in play to assure the data owner and data stakeholders that the data is still protected from subtle breach when data is commingled and/or aggregated, thus revealing protected information (e.g., medical records containing names and medical information mixed with anonymous data but containing the same crossover field). 2.3 Security The system needs to log client s information of registration such as IP address and time for security purpose. Password should be encrypted and store in the database 2.4 Maintainability The system developing using.net framework, all files are easy to modify and make update. Developed cloud must be available for 24*7.User data must be maintained efficiently so that authenticated user must get access. Mobile service must be available for every time (bulksms.com). 671

III. SOFTWARE REQUIREMENT SPECIFICATION A. Purpose The use of multi-cloud providers to maintain security than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the single cloud computing user. In system provide a service which will allows any application to print to printer device connected to server via cloud and user can able to access applications which are installed on server. Main advantage is that user needs not to purchase license copy of particular software/application. B. Project scope Number of services available by category wise. It can be used in college campus. It can be used in huge cloud also. It provides secured cloud. In system, server side program can be access and can be modified as per as user's need and teacher can able to comment on it. Load balancing will be provide to avoid any system clash and dividing the traffic between servers, data can be sent and received without major delay C. Design and implementation constraints The admin has all the rights to do all the things and modifications in the project. Admin can do the modifications related all services like adding, updating, removing services. E. Assumption and dependency As project will deploy on internet, web browser is needed for accessing the same. The user of the product should have at least 256 kbps dialup (ADSL recommended) connection to the Internet. Server should not crash which may arise system to be halt. Uninterrupted internet connection should be present. 3.1 SYSTEM FEATURE To overcome on drawbacks of existing system, user is proposing new technique multi cloud computing, in which user can access the application from server, use those applications, and can store data on server. Even if main server application is busy, a proxy server will store the data. The advantage of proposed system is that all clients can interact with Server. User can access service at any time also there is no requirement of installation software s. User memory load reduced in the system. System is platform independent and also has data security through data encryption and decryption. Data integrity has been provided at any time. 672 3.2 EXTERNAL INTERFACE REQUIREMENT A. User interface Admin: admin all authorities to access services. Admin can add, delete update services for client. Teacher:-Teacher has authorities more than student and less than admin like adding and removing services. Teachers can view some more applications than students which can t be viewed by student. Teaches can comment on programs which are made by students. Student: Students have less authority than teacher and admin. B. Hardware interface User and server must connected throw cloud via internet. Cloud infrastructure is connected via RJ-45 connecter. C. Software interface No extra software is needed for accessing service, Cloud is platform independent. Framework is needed from running Application. D. Communication interface For communicating to server, Client only need webbrowser and internet connection. 3.3 NON-FUNCTIONAL REQUIREMENT A. Performance requirement The product should be able to function 24x7. The client experience should be good and page loads should not take excessive time to display except on noisy dialup connections. System should be developed with min response time. Client and server should connect in minimum time i.e. application response time must be less. After connection access time must be minimum. B. Safety requirement The system should be built on such foundations that the system is easy to extend. It should be built using such design and development practices that it is interoperable by using standard protocols and products. The system availability requirement is always. User must get reply from server which actually has to give reply not from any other server. Client must get proper from any application which user is using. If server is busy proxy must reply with uninterrupted communication. C. Security requirement The product should be able to sustain abuse and misuse with or without negative intentions from any and everyone on the Internet. Every effort should be made to eliminate vulnerabilities in the product. Customer personal information stored in the system should be sealed.

User login should be encrypted. Attacks must be preserved outside of cloud. Use of secret sharing algorithm provides security. D. Software quality attributes Software Quality Attributes are the benchmarks that describe systems intended behaviour within the environment for which it was built. The quality attributes provide the means for measuring the fitness and suitability of a System. Software architecture has a profound effect on most qualities in one way or another, and software quality attributes affect architecture. 3.4 SYSTEM ANALYSIS MODEL A. Use case diagram Two actors are participated in System Client and Server. System uses various Use-cases. Client Register to system then login And Request for service. Server will give response to client s request. Fig. 3 State transition diagram IV. SYSTEM ARCHITECTURE Fig. 2 Use case diagram B. State transition diagram Various transitions are done in proposed system which denotes user request and response given by server. Fig. 4 System architecture 673

A. Client model The Client model sends request using WCF services. User will give ID and password and the service required. If the user is authorized user the requested service is given as output from client model. B. Service model It will take client output as a input to the service model and it will contain service classes and mainly it will contain byzantine quorum system protocol,cryptographic secrete sharing and erasure codes. It will be used to address availability and Confidentiality of data using encryption, encoding and replication of data on diverse clouds that form a cloud of clouds. System model give output which is given by cloud model. Deals with this problem using Byzantine fault tolerance replication to store data on cloud services, allowing data to be retrieved correctly even if some of the clouds corrupt or lost data. Depsky algorithm is implemented as software library in clients. It starts by pre -sending the system architecture, then defines the data and system models, the two main algorithms (DEPSKY- A and DEPSKY-CA), and a set of auxiliary protocols. B. Depsky (Depsky A- available Depsky) The first DEPSKY protocol is called DEPSKY-A, and improves the availability and integrity of cloud-stored data by replicating it on several providers using quorum techniques. C. Cloud model The Cloud model is nothing model it will contain data storage and data sharing It does not contain any algorithm it is nothing but a database which will contain all information and that information is circulated if the key is perfect then only data is shared. V. SOFTWARE / HARDWARE IMPLEMENTATION Detailed access of cloud provided by vendor is explained. In cloud user have created virtual hardware on which application and services and installed. This work aims to promote the use of cloud which provide user resource pooling and reliability of service. Main Task is to Provide Quality of service by using efficient security toward data and application. 5.1 IMPORTANT MODULE AND ALGORITHM A. Depsky Fig. 6 Depsky A- available Depsky C. Depsky (Depsky CA- Confidential and Available DepSky) The First DEPSKY protocol is called DEPSKY-CA, and improves the confidentially. Fig. 5 Depsky architecture 674

VI. FUTURE SCOPE Regarding service availability risk or loss of data, if user replicates the data into different cloud providers, user could argue that the data loss risk will be reduced. If one cloud provider fails, User can still access data live in other cloud providers. This fact has been discovered from this survey and user will explore dealing with different cloud provider interfaces and the network traffic between cloud providers. Deploy Application on Real-time cloud. Increase no of software provided in system. Provide no of software and other services for different areas and also for library and college office system. Provide mailing system for web application Fig. 7 Depsky CA- Confidential and Available DepSky D. Secret sharing ( shamirs secret sharing) In cryptography, secret sharing refers to a method for distributing a secret amongst a group of participants. When shares are combined together then and then only secret can only be reconstructed. Individual key share holder cannot change/access the data. Goal is to divide some data D (e.g., the safe combination) into n pieces D1, D2.Dn in such a Way that: Knowledge of any k or more D pieces which in turns makes D easily computable. Knowledge of any k -1 or less pieces will not be sufficient for determination of D. This scheme is called (k,n) threshold scheme. If k=n then all participants are required together to reconstruct the secret. Suppose user want to use (k,n) threshold scheme to share secret S where k<n. Choose at random (k-1) coefficients a1, a2, a3ak-1, and let S be The a0 Construct n points (i,f(i)) where i=1,2..n Given any subset of k of these pairs, user can find the coefficients of the polynomial by interpolation, and then evaluate a0=s, which is the secret. VII. CONCLUSION Our system allows user to access web and database applications remotely.system is available on internet so that user can access application anytime from anywhere. When any users access any service, server will get a notification. Service is available any time for user need not to purchase license software. As the development of cloud computing, security issue has become a high priority. System will be developing the cloud computing environment with the safety issues through analysing a cloud computing framework security needs. Finally conclude a cloud computing model for data security from single to multi-cloud. Cloud computing, while still evolving in all its iterations, can offer it a powerful alternative for efficient application, infrastructure, and platform delivery. If system is implemented on practical basis it will be very efficient for user REFERENCES [1] Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom "Cloud Computing Security: From Single to Multi-Clouds", 45th Hawaii International Conference on System Sciences,2012 [2] A. Bessani, M. Correia, B. Quaresma, F. Andre and P. Sousa "DepSky: dependable and secure storage in a cloud-of-clouds ", EuroSys'11:Proc. 6thConf. on Computer systems, 2011, pp. 31-46. [3] CongWang, Kui Ren, and JiaWang "Secure and Practical Outsourcing of Linear Programming in Cloud Computing ", IEEE transactions on cloud computing April 10-15, 2011 [4] Zhou Wei, Guillaume Pierre, Chi-Hung Chi "Cloud TPS: Scalable Transactions for Web Applications in the Cloud", IEEE transactions on services computing, special issue on cloud computing, 2011 [5] Joel Siegel, Jae Shim Client / Server Computing in Business and Finance, Thomson South-Western from Vikas Pyblishing House. [6] Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar Introduction to parallel computing, Pearson Education Ltd. [7] Robert Burnett, P. David Marshall Web Theory, Routledge Taylor & Francis Group. 675

[8] Michael E. Whitman, Herbert J. Mattord Principles of Information Security, Thomson Course Technology from Vikas Publishing House. [9] Andrew S. Tanenbaum, Maarten Van Steen Distributed Systems, Pearso Education Ltd. [10] www.google.com [11] www.aws.amazon.com [12] www.wikipedia.org [13] www.ieeexplore.ieee.org [14] www.cloudinfinit.com [15] www.ebooks.com 676