Abstract
The Cloud computing (CC) has been widely recognized as the next generation’s computing infrastructure. CC offers many advantages by allowing users to use infrastructure like servers, networks, and storages, platforms containing middleware services and operating systems, and software for application programs. Cloud computing is an emerging style of IT delivery that intends to make the Internet the ultimate home of all computing resources. Cloud computing has emerged as a popular model in computing world to support processing large volumetric data using clusters of commodity computers. The delivery of Services by cloud Service Providers in terms of infrastructure is important as the cloud environment gives access to centralized shared hardware, software and other information. This paper introduces a new transactional “Infrastructure-as-a-Service” (IaaS) called Infrastructure /Relational Cloud. An IaaS promises to move much of the operational burden of provisioning, configuration, scaling, performance tuning, backup, privacy, and access control from the database users to the service operator, offering lower overall costs to users. Infrastructure as a service has several major issues and concerns, such as data Scalability, Elasticity, Availability, security, expectations, etc., issues. Proposed solutions include risk management, better contractual agreements, database encryption, and authenticity techniques and will be develop using OpenStack platform, CloudSim and MySql as the server. By bettering these situation, the IaaS service in cloud computing is effective to manage today’s vast growing datasets.
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Cloud computing is an emerging style in the field of IT that intends to make the Internet the ultimate home of all computing resources- storage, computations, and accessibility. It offers on-demand use of third-party infrastructures on the basis of pay-per-use. In Cloud computing multimedia database is based on the current of database development, object-oriented technology and object-oriented fields in the database, which increasing display and its vitality. [Lee, D. Patterson et al 2009]. This paradigm reduces customers’ need for hardware while improving the elasticity of computational resources, by which they allow to adapt to business requirements. Because of its robustness, scalability, performance, high availability, least cost and many others, businesses are finding it attractive to adopt the cloud computing paradigm.
It is very advantageous to use cloud services for business person, to customer, businesses can eliminate the need for the professionals who maintain and support the underlying complexities for some of the most desirable new IT technologies, such as highly scalable, variably provisioned systems. An obvious benefit to customers is that computing resources, such as virtual servers, data storage, and network capabilities, are all load balancing and automatically expandable. Resources are allocated as needed, and loads can be transferred automatically to better locations, producing a robust, reliable service. [M. Armbrust et al 2009]. The idea is simple enough. A large company with many computing resources, such as large datacenters, reaches an agreement with customers. Customers can run their programs, store their data, and host virtual machines, and so on, using the provider’s resources. Customers can terminate their contract, avoid startup and maintenance costs, and benefit from the provider’s ability to dynamically allocate their resources. Cloud computing service provides typically following resource types, which create a more common classification of cloud types: infrastructure, platform, or software.
In this paper we are mainly focusing on Iaas service type. IaaS is a prime example of SaaS. [E. Ferrari, 2009] SaaS i.e. Software as a service provides customers with aparticular piece of software. The provider runs the software and provides Internet access to it, but the customerfeeds it data and instructions. The service provider picks the database management software and installs, runs,and manages it.
In any case, it’s still just a software application provided to the customer. For economic reasons, IaaS isparticularly well suited to many small- to medium-sized businesses that rely on databases but find theirinstallation and maintenance costs restrictive. Maintaining a database requires trained professionals, so theservice is even more valuable because customers don’t have to hire, train, and pay them.
1.2 STATEMENT OF THE PROBLEM
In an IaaS model it is the cloud provider’s responsibility to offer a number of pre-configured virtual machines that constantly have to be kept updated with the latest security patches. When clients provision the virtual machines, they have to trust the cloud provider to deliver secure systems. The clients do not have access to the hypervisor layer—the underlying operating system that manages one or more virtual machines that run on a physical machine—which typically does not share the virtual network segment with any of the other hosted virtual machines to avoid network-based intrusions. The cloud provider may also separately offer an optional virtual private network (VPN) capability so that the client can help ensure a protected network that is not directly visible for Internet-based attackers. It is the client’s responsibility to maintain the patch level for all provisioned virtual machines after the initial deployment as well as a properly configured VPN to shield their valuable data and infrastructure. If a client, however, chooses to refrain from purchasing a VPN option or does not patch any of their web facing virtual machines, the machines can be vulnerable.
If an organization decides to implement these mechanisms in a private cloud using their internal IT department, they will rely on their business policies to govern aspects like data confidentiality, access control to applications and systems, and so on. Employees will be entrusted to handle the IT infrastructure because they are recertified against the business policies on a regular basis. In this environment organizations have to deal with the risk of unauthorized privileged user access, data loss prevention, malicious intrusions and unintentional user errors. They also have to observe and comply with internal or regulatory guidelines.
1.3 OBJECTIVES OF THE STUDY
The goal of this research is to provide an authentication mechanism for the users of cloud services for limited period of time in a stepwise fashion.
Specific objectives include
- Creating a platform that uses infrastructure as a service in deploying applications
- Making the user have total control over the deployed application by restricting access for unauthorized users.
1.4 SCOPE OF THE STUDY
The focus of this study is development of an application to manage cloud infrastructure. It is an evaluation of the aforementioned cloud framework on IaaS projects, as initiated or not initiated in a generic strategy for IaaS systems. The foundation of the investment in a model of strategy is important to firms, as established providers as Amazon, Bluelock, CSC, IBM and Rackspace, and insurgent providers as Google, HP and Microsoft, expect further migration to IaaS and introduce numerous options for production workloads (Knorr, 2012) that necessitate review. Therefore, this study contributes a formidable framework for investment in a cloud computing IaaS strategy.
1.5 SIGNIFICANCE OF THE STUDY
The financial firms in the case study are benefiting from cost savings of Infrastructureas-a-Service (IaaS). However, the firms are cautious about investing in critical few objective systems on IaaS, due to constraints of increasing industry regulation. They are focused on investment in limited systems not integrated
with other systems that may be on IaaS or on other Platform-as-a-Service (PaaS) or Softwareas-a-Service (SaaS) systems, more than in the previous SaaS study (Howell-Barber et. al., 2012). They gain a competitive edge in the industry in investment in provider services, but the investment is marginal if they are hesitant
about integration of potential systems with IaaS technologies. The implication is that these firms benefit from IaaS but may benefit further from a cohesive plan for a strategy.
The firms in most of the study are also benefiting from fundamental governance of the IaaS projects. Planning, process management and project management are enabling the implementation of most of the projects, if not
facilitating IaaS infrastructure standardization (Pande, 2012). Risk management is facilitating regulation sensitivity. These factors of the framework of the study are furnishing a foundation for an incremental integrative migration of other systems on to IaaS provider technologies. The implication is that these firms may eventually formulate a plan so that infrastructure systems are subordinate to an IaaS, if not a larger PaaS, SaaS and IaaS strategy.
Finally, the information technology organizations of the firms are clearly the drivers of the IaaS projects in the study. The enterprise architects of the organizations are enabling the IaaS projects at higher involvement than the client organizations of the firms, as IaaS systems are inherently technical. These firms are fortunate in
having in-house technologists not only passionate but skilled to move them on to the
cloud and IaaS provider technologies – a requirement (Linthicum, 2012b) for which
shortages are cited frequently in the literature (Adams, 2012 and McDougall, 2012). The intricacies of the cloud IaaS projects in networks, servers and systems, as they related to non-cloud organizational systems, had to be managed not by the provider staff but by these technologists. The implication is that these firms have an opportunity to pursue other projects and systems on the cloud with their own technologists and to hopefully pursue a strategy.
1.6 LIMITATIONS OF THE STUDY
The study is limited to a few firms in the financial industry initiating innovation in the cloud. The study is further limited by the inherent immaturity and limited number of IaaS projects and systems in the industry, and the purposes of the projects and systems in the firms of the study are specific to these firms, which may be a limitation. Moreover, the hesitation of senior management in fully informing on the intricacies of IaaS systems is a limitation of external studies. Nevertheless, this
study furnishes good indications of factors facilitating initiatives of managers in the
technology. This study furnishes a framework for investment in this method of cloud
computing technology for the financial sector if not non-financial sectors that may be helpful to future researchers.
1.7 DEFINITION OF TERMS
- Cloud computing: The use of internet as a space for processing and storage of data
- Infrastructure as a service: The Infrastructure-as-a-Service (IaaS) is defined
in the literature as a data center-as-a-servicemodel enabling “the capability … [for a business firmfor] provisioning fundamental computing, networking, processing and storage, where the[business firm] is able to deploy and [operate]arbitrary software, which can includeapplications and operating systems. - Security: The condition of not been threatened physically, psychologically, emotionally or financially especially by unauthorized persons.
- Authentication: Proof of the identity of a user logging on to some network
+
This material content is developed to serve as a GUIDE for students to conduct academic research
AN APPLICATION FOR SECURE BASED DATA MANAGEMENT USING INFRASTRUCTURE AS A SERVICE>
Project 4Topics Support Team Are Always (24/7) Online To Help You With Your Project
Chat Us on WhatsApp » 09132600555
DO YOU NEED CLARIFICATION? CALL OUR HELP DESK:
09132600555 (Country Code: +234)
YOU CAN REACH OUR SUPPORT TEAM VIA MAIL: [email protected]
09132600555 (Country Code: +234)