IEEE Cloud Projects

Published on May 2016 | Categories: Documents | Downloads: 34 | Comments: 0 | Views: 231
of 10
Download PDF   Embed   Report

Comments

Content

1)

Building Cloud Computing Platform for new possibilities:

2) Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing: 1. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully ustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both.We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model [1] by manipulating the classic Merkle Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.

3)

Toward Green Cloud Computing:

ABSTRACT

2. Cloud computing is emerging as a critical information communication technology to heavily impact our daily life in the future. We systematically analyze its energy consumption based on types of services and obtain the conditions to facilitate green cloud computing to save overall energy consumption in the related information communication systems.With a tremendously increasing number of mobile devices, green mobile communications would be the foundation of green cloud computing. 4) Technical Challenges of Forensic Investigations in CloudComputing Environments: 3. Cloud Computing is arguably one of the most discussed information technology topics in recent times. It presents many promising technological and economical opportunities. However, many customers remain reluctant to move their business IT infrastructure completely to \the Cloud\. One of the main concerns of customers is Cloud security and the threat of the unknown. Cloud Service Providers (CSP) encourage this perception by not letting their customers see what is behind their 4. \virtual curtain\. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital investigations. This continues to fuel insecurity on the sides of both providers and customers. In Cloud Forensics, the lack of physical access to servers constitutes a completely new and disruptive challenge for investigators. Due to the decentralized nature of data processing in the Cloud, traditional approaches to evidence collection and recovery are no longer practical. This paper focuses on the technical aspects of digital forensics in distributed Cloud environments. We contribute by assessing whether it is possible for the customer of Cloud Computing services to perform a traditional digital investigation from a technical standpoint. Furthermore we discuss possible new methodologies helping customers to perform such investigations and discuss future issues. 5) The Eucalyptus Open-source Cloud-computing System:

5. Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over the past few years. However, most cloud computing systems in operation today are proprietary, rely upon infrastructure that is invisible to the research community, or are not explicitly designed to be instrumented and modified by systems researchers. In this work, we present EUCALYPTUS – an opensource software framework for cloud computing that implements what is commonly referred to as Infrastructure as a Service (IaaS); systems that give users the ability to run and control entire virtual machine instances deployed across a variety physical resources. We outline the basic principles of the EUCALYPTUS design, detail important operational aspects of the system, and discuss architectural trade-offs that we have made in order to allow Eucalyptus to be portable, modular and simple to use on infrastructure commonly found within academic settings. Finally, we provide evidence that EUCALYPTUS enables users familiar with existing Grid and HPC systems to explore new cloud computing functionality while maintaining access to existing, familiar application development software and Grid middle-ware. 6) Cloud Computing System Management Under Flat Rate Pricing:

6. Success of cloud computing service depends on an acceptable pricing mechanism both by users and the service provider. Piece rate pricing by counting work load should be favorable for the service provider due to the QoS control and finite resource, such as computing and, communication powers. Though the pricing mechanism based on counting work load is reasonable and fair, the experiences learned from ADSL, 3G and Wi-Fi show a different story. The flat rate pricing mechanism is the winner all the way. This study proposes a flat rate pricing mechanism with congestion control, called FRPCC. In the cloud computing system, allocation of resources can be formulated as an optimization problem seeking to maximize the sum of the utility function of each user under the constraints of fairness. The piece rate pricing mechanism is easy to achieve the social welfare but is not easy to be acceptable for customers. Consequently, we propose a congestion control scheme to reach the same goal with a flat rate pricing mechanism. The proposed FRPCC approach can achieve social welfare in the cloud computing environment. Performance evaluations show efficacy of, FRPCC approach in providingsocial welfare under fairness and preventing congestion. 7) Green Cloud Computing:Balancing Energy in Processing, Storage, and Transport:

7. ABSTRACT | Network-based cloud computing is rapidly expanding as an alternative to conventional office-based computing. As cloud computing becomes more widespread, the energy consumption of the network and computing resources that underpin the cloud will grow. This is happening at a time when there is increasing attention being paid to the need to manage energy consumption across the entire information and communications technology (ICT) sector. While data center energy use has received much attention recently, there has been less attention paid to the energy consumption of the transmission and switching networks that are key to connecting users to the cloud. In this paper, we present an analysis of energy consumption in cloud computing. The analysis considers both public and private clouds, and 8. includes energy consumption in switching and transmission as well as data processing and data storage. We show that energy consumption in transport and switching can be a significant percentage of total energy consumption in cloud computing. Cloud computing can enable more energy-efficient use of computing power, especially when the computing tasks are of low intensity or infrequent. However, under some circumstances cloud computing can consume more energy than conventional computing where each user performs all computing on their own personal computer (PC). 8) For Small and Medium Size Enterprises (SME) Deliberating Cloud Computing: A Proposed Approach: - Cloud computing is composed of complex systems using many different technologies, services, and delivery mechanisms and growing dramatically. Potential benefits of cloud computing include reducing IT capital expenditure, providing rapid dynamic scaling of resources on a metered basis, as well as transparency related to platforms, storage, transmission and processing of data. However, these benefits come with many potential problems. There is an urgent need to investigate and understand security assurance in cloud computing. Small to medium enterprises (SMEs) may be unable to dedicate specialized staff and other resources to this end. This paper argues that emerging taxonomies, frameworks and guidelines, collectively referred to as instruments in this paper, can facilitate SME enquiry into cloud computing. The instruments have been developed and refined by industry and government consortia. Yet, these instruments are rarely referenced in the academic literature, drawing attention to a continuing gap between industry and academia. The proposal is oriented in the context of a prevailing definition and model of cloud computing. Potential benefits and drawbacks in cloud
Abstract:

computing are presented. Organizations responsible for developing the instruments are depicted followed by the systematic approach based upon the cloud instruments. Risk assessment and several of the cloud instruments are central to illuminating cloud computing for SMEs. Additionally, the proposal offers an opportunity for industry and academic collaboration.

9) SECURITY IMPLICATION OF SOAP AND WEBSERVICE INTERFACE TO THE CLOUD COMPUTING SYSTEM: Cloud Computing system launched a evolution in IT industry with removing application from user’s PC. It could be implemented in Webservice technology and its interface will be no more than a web browser. Consequently, the inherent vulnerabilities of webservice also can make Cloud Computing System under the same risk as it has. In this report, I am going to discuss the security issues of Clouding Computing System caused by webservice. This paper is comprised of four parts; the first and second part is used to introduce some back ground about Cloud Computing and Webservice. The security issues will be discussed in third and forth parts. The security flaw in Saas layer, caused by webservice, is arranged in part three. The last part explained what the vulnerabilities in Iaas layer are. 10) Operating System Virtualization: Practice and Experience:

Operating system (OS) virtualization can provide a number of important bene_ts, including transparent migration of applications, server consolidation, online OS maintenance, and enhanced system security. However, the construction of such a system presents a myriad of challenges, even for the most cautious developer, that if overlooked may result in a weak, incomplete virtualization. We present a detailed discussion of key implementation issues in providing OS virtualization in a commodity OS, including system call interposition, virtualization state management, and race conditions.We discuss our experiences in implementing such functionality across two major versions of Linux entirely in a loadable kernel module without any kernel modi_cation. We present experimental results on both uniprocessor and multiprocessor systems that demonstrate the ability of our approach to provide _ne-grain virtualization with very low overhead. 11) Grids, Clouds, and Virtualization:

This chapter introduces and puts in context Grids, Clouds, and Virtualization. Grids promised to deliver computing power on demand. However, despitea decade of active research, no viable commercial grid computing provider has

emerged. On the other hand, it is widely believed—especially in the Business World—that HPC will eventually become a commodity. Just as some commercial consumers of electricity have mission requirements that necessitate they generate their own power, some consumers of computational resources will continue to need to provision their own supercomputers. Clouds are a recent business-oriented development with the potential to render this eventually as rare as organizations that generate their own electricity today, even among institutions who currently consider themselves the unassailable elite of the HPC business. Finally, Virtualization is one of the key technologies enabling many different Clouds. We begin with a brief history in order to put them in context, and recall the basic principles and concepts underlying and clearly differentiating them. A thorough overview and survey of existing technologies provides the basis to delve into details as the reader progresses through the book. 12) Driving Process Improvement Via Comparative Agility Assessment: Abstract—Rather than striving to be “perfectly agile,” some organizations desire to be more agile than their competition and/or the industry. The Comparative Agility™ (CA) assessment tool can be used to aid organizations in determining their relative agility compared with other teams who responded to CA.The results of CA can be used by a team to guide process improvement related to the use of agile software development practices. This paper provides an overview of industry trends in agility based upon 1,235 CA respondents in a range of domains and geographical locations. Additionally, the paper goes further in depth on the results of four industrial teams who responded to the CA, explaining why their results were relatively high or low based upon experiences with the teams. The paper also discusses the resultant process improvement reactions and plans of these teams subsequent to reviewing their CA results. 13) EXPERIENCES IN APPLYING AGILE SOFTWARE DEVELOPMENT PRACTICES IN NEW PRODUCT DEVELOPMENT Experiences with software technology development projects at ABB Inc. indicated a need for additional flexibility and speed during explorations of applying new technologies to future products. A case study was conducted at ABB to compare and contrast the use of an evolutionary-agile approach with a more traditional incremental approach in two different technology development projects. The study indicated benefits associated with the evolutionary approach with agile practices, such as streamlined documentation, increased customer involvement, enhanced customer satisfaction, increased capability to include emergent requirements, and increased risk management ability. This paper suggests that using agile

practices during the Research and Development (R&D) phase of new product development contributes to improving productivity, to increasing value-added activities, to showing progress early in the development project, and to enhancing customer satisfaction. Another observation derived from this study is that by offering a carefully selected subset of agile practices, ABB R&D groups are more likely to successfully incorporate them into their existing processes. 14) Claims Management System: Claim Management System is a web based software application, used to process and settle claims raised by registered customers. The application allows faster processing, tracking and settlement of claims. Since it is a web based application, authorized users from any geographical location with the required access rights can view or edit details of a customer, incidents and claims, status, history and other parameters. CS ensures greater transparency, seamless information flow and faster turnaround times leading to enhanced customer satisfaction. When registered customers have an incident in which the vehicle is damaged or people are injured, then they lodge a claim. As per the terms of the insurance contract, money needs to be paid to reimburse part or full loss sustained due to the incident. Incidents can be part damage, theft or total loss to the vehicle. If the vehicle is damaged and it can be repaired, then to verify the extent of damage and the amount that can be paid, details of the incident are entered in different screens of CS. The application provides an extensive and comprehensive combination of possible causes and reasons and these can be selected by the user. A high amount of drill down that allows users to refine issues like the type of incident, how it happened, state of road conditions, ambient and vehicle lighting status, third party and witness details, personal injury and vehicle damage details and many others. Once these details are entered, then the vehicle can be sent for repairs to authorized garages from the CS network. The garage then gives an estimate that can be approved or rejected. After the estimate is approved, then the vehicle can be repaired In case of theft or total loss, factors like current market value, book value and others are computed and a suitable payment is released. CS has different modules like Admin, Business Rules, Estimation and Authorization and others. These can be allotted selectively to various roles like Admin, Customer, Back Office, Front Office and others. The Admin role has global privileges like adding roles and allotting user name and password to authorized roles. And CS has features that allow synchronization of data with other third party systems. 15) System Uptime Monitoring: System Uptime is a website monitoring service that checks your website at regular intervals and notifies you via email or SMS if it becomes unavailable. System Uptime helps you eliminate downtime by providing free and advanced remote monitoring services for your website. When your website goes down, we notify you instantly via email so that you may fix problems before they cost your e-business money, customers or reputation. In addition, our service provides detailed statistics about your website's availability and response times so that you can track how often your site is down.

Multi-Check technology allows user to monitor your website from diverse geographic regions to ensure that your website is accessible from multiple Internet points. Each monitoring location, operating independently and time-synchronized, tests your website and reports the results to a central database. Before alerting you of a problem, our software verifies the error with multiple stations. Therefore, you are notified about problems that you have control over and not about isolated Internet outages. MODULES: Register: Customer need to register his details he will get access once administrator accepts. Administrator: This module will creates the remaining users based on enterprise needs and maintain the client requests My monitor: user will add, edit, delete, download the site which he need to monitor Reports: Weekly, monthly it will generate the report of the site uptime and downtime Billing information: Billing info regarding the customer can be tracked SMS reports: Any problems occurred means it will send the message through sms

16)Patch Management Tool:
PMS is web based software update tool, where a product based will provide support to their customers with this application. PMS is an informational and patch database service for Data Precision. It is used by system administrators, network administrators, and others who are responsible for maintenance of Data Precision hardware and software. It contains proactive alerts for avoiding problems before they happen, and it provides helpful hints and guides for getting the most out of your Sun hardware and software. A patch can be anything from a simple bug fix to a firmware upgrade to a software revision upgrade. PMS provides recommended and security patches - including Year 2008-09 patches - to all users. This is the official channel where the customers of the product based company will provide the support, patches, test fixes, service packs and workarounds through this portal here the company can provide the new releases also if they have. In this portal itself it will provide the solutions and downloads also in these days its very difficult to provide the support with remote location development and onsite and offshore model. Better customer support system. Online solutions can be provided. Beta releases and service packs can be released through this. Better control over downloads based on user authentication and authorization. Online forum can be here with the discussions on the support system provided by the company. Tester can also upload the process

documents and work around and known issues of the problem. Product Read me can be available here. Administrator will creates the reaming users based on enterprise needs. Project manager will have upload facility to upload the patches service packs. Developer and se people will provide the fixes and solutions and workarounds. Tester can download the test fixes and can raise the issues here. Beta customer can download beta release where as others cant get. Regular customers should have release capability with their license key. 17)Wake on LAN (WoL) Green IT Practice 9. Wake on LAN is a way for users to power on computers remotely across a network. Obviously, the computer must be plugged in to a power outlet for this to work, but it does not need to be in standby, hibernate or other power saving mode. As long as your hardware meets all the requirements and you have all the right settings configured, WoL will let you turn on your computer from anywhere within the local network.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close