Вы находитесь на странице: 1из 24

MALWA INSTITUTE OF TECHNOLOGY

CHETAK V1.0 Unleashing the power of Cloud computing


Mrs.Divya Gautum H.O.D Of Information Technology

GUIDED BY:Ms.Parul Dongre Mr.O.P.Karada Mr.Pawan Rathore

SUBMITED BY:Arti Namdev(0821IT081016) Jyoti Mishra(0821IT081040) Kavita Jedhe(0821IT081043)

Cloud Summary
Cloud computing is an umbrella term used to refer to Internet based development and services. A number of characteristics define cloud data, applications services and infrastructure:
Services or data are hosted on remote infrastructure. Services or data are available from anywhere. The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!

Application Services(services on demand) Gmail, Google Calender Payroll, HR, CRM etc IBM Lotus Live

Platform Services (resources on demand) Middleware, Integration , Messaging, Information, connectivity etc AWS, IBM Virtual images, Cast Iron, Google App engine
Infrastructure as services(physical assets as services) IBM Blue house, VMWare, Amazon EC2, Microsoft Azure Platform, Sun Parascale and more

Cloud Architecture

Cloud Service

Cloud Platform

Cloud Infrastructure

Cloud Storage (Database)

Cloud Ecosystem
Public Cloud
Virtual Private Cloud

External Internal
Private Cloud
Enterprise

Private Cloud

Amazon S3 (March 2006) Salesforce AppExchange (March 2006)

Amazon EC2 (August 2006)

Google App Engine (April 2008) Facebook Platform (May 2007) Microsoft Azure (Oct 2008)

Utility Computing

Platform as a Service (PaaS)

Cloud-based User Applications

Types of Cloud

Cloud Benefits
Cloud = Less Investment (not own data center, hardware; use outside provider of servers, storage, and bandwidth) Cloud = Scale (tens of thousands of server computers) Cloud = Flexible and Efficiency

Cloud Storage
Several large Web companies (such as Amazon and Google) are now exploiting the fact that they have data storage capacity that can be hired out to others. This approach, known as cloud storage allows data stored remotely to be temporarily cached on desktop computers, mobile phones or other Internet-linked devices. Amazons Elastic Compute Cloud (EC2) and Simple Storage Solution (S3) are well known examples.

Security In cloud

Security is generally perceived as a huge issue for the cloud:


During a key note speech to the Brookings Institution policy forum, Cloud Computing for Business and Society, [Microsoft General Counsel Brad] Smith also highlighted data from a survey commissioned by Microsoft measuring attitudes on cloud computing among business leaders and the general population. The survey found that while 58 percent of the general population and 86 percent of senior business leaders are excited about the potential of cloud computing, more than 90 percent of these same people are concerned about the security, access and privacy of their own data in the cloud.

CHETAK 1.0
Our Project shows the power of cloud computing and shows us a glimpse of its implications I near future. Complete Web Based Application which is browser independent as well as platform independent. Based on java platform, an object oriented based software.

Aims
Our project will be based on 2 major characteristics: Cloud Data Storage

One to Many Desktop Sharing


It is able to access log file of three to more clients over different networks simultaneously at the same time provided they have no connectivity bottleneck.

Salient Features
Easy to use with a friendly user interface. Can be used on any platform. Uses minimum resources of clients. Gives real time simultaneous log file data of clients and helps to keep track of their activities from a remote application. Cost effective as there is no need to use licensed software on every client as they can share the software over a cloud.

The proposed Cloud Computing System is an Web Based Application has following stages
Login

Applications
Log File Tracing in Real Time

LOGIN:Login Page will contain User ID and Password. Here we will assign a master login to the administrator who will have all the authorities regarding adding/deleting users modifying apps, enabling or disabling log file tracing etc. Clients will be given separate user ID and password allotted by administrator.
APPLICATIONS:It will contain all the utility software required for day to day work and will include many licensed versions as to save the cost of deploying a licensed software in multiple computers . Some examples may include Microsoft Office , Adobe Photoshop etc. Log File Tracing in Real Time:Log File is inherently hidden in the root of operating system and contains all the information regarding usage of the computer resources and modifications done to the computer by the specified users of that computer. It will be a hidden feature which can only be modified by the Administrator and the clients will have no control over it..

Design and Implementation Constraints


The whole implementation is done in two modules. The first one is Administrator and the second is Examinee.

Module I:-

This first module tracks the path of Administrator. In this module it shows how the admin can log into the system with a valid password and can add new valid user to the database. His name and user id is saved in the database. Also he can manipulate the database and add new applications the database from the webpage itself. It also shows how many applications are in database. He also can enable/disable log file tracing from the end user clients in real time

Module II:-

This second module track the path for the clients .They can log into the system with a valid ID issued by the admin. After successfully login into the system the client moves to the instruction web page where he will get instruction about using the applications available on the cloud. Then after clicking the start button the Cloud starts . In this manner client can work on the required apps on his workstation without having to purchase them. However his log file will be traced in real time by the server and he will have no control over modifying/deleting it

Hardware Interfaces
Server Side: Operating System: Windows Vista/7 Processor: Pentium 2.0 GHz or higher RAM: 2 GB or more Hard Drive: 500 GB or more Client side: Operating System: Windows 9x or above, MAC or UNIX. Processor: Pentium III higher. RAM: 256 Mb or more

Software Interfaces
Client Side : .HTML, Web Browser, Windows XP/Vista/7 Web Server: .HTML, Windows XP/2000/Vista/7/

Communications Interfaces
The Customer must connect to the Internet to access the Website: Dialup Modem of 52 kbps Broadband Internet Dialup or Broadband Connection with a Internet Provider.

Advantages
Lower computer costs Improved performance Reduced software costs Instant software updates Improved document format compatibility Unlimited storage capacity Increased data reliability Universal document access Latest version availability

Disadvantages

Can be slow Features might be limited Stored data might not be secure Stored data can be lost Requires a constant Internet connection Does not work well with low-speed connections General Concerns

Refrences:http://www.sans.org/reading_room/analysts_program/LogMg mtCloud_Oct10.pdf http://cscr.nist.gov/groups/SNS/cloud-computing/cloud-defv15.doc http://www.alexa.com/topsites http://citeseerX.com http://Amazon.cloud_infra.com

Cloud-Based Management of Log Data A SANs Whitepaper October 2010 Written by: Jerry Shenk

BOOK:-Cloud Computing (Bible) Barrie Sosinsky

THANK YOU

Вам также может понравиться