SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 
www.ijera.com 124 | P a g e 
Geochronos File Sharing Application Using Cloud Sathish.Y#1, Surabhi. S*2, Sanila.S#3 B.E(Computer Science and Engineering) Angel College of Engineering and Technology, Tirupur Anna University, Chennai Abstract Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment. Keywords- Cloud Computing, Social Networking, Virtualized application, Interactive session. 
I. INTRODUCTION 
Researchers face many computational and data related challenges. These challenges can detract and take away valuable time that could be better spent focusing on their research. One such challenge is the management of applications that researchers use for conducting simulations, processing and analyzing data, and visualizing results. Such applications could be commercial, open source, or developed in-house. Different applications may be designed for different operating systems and have different software dependencies. New versions of applications may also be released frequently. Many of these applications are interactive in nature, have a graphical user interface and visualization capability or provide a way to receive feedback from the user. These applications typically haven’t been suited for batch based high performance computing environments where on-demand access to resources has not been practical due to queue wait times and limited preemption capabilities. Downloading, installing, configuring and keeping applications up to date on heterogeneous computing systems can be a daunting and difficult task. Providing access to these applications from anywhere (i.e., home, office, lab, field, etc.) and at anytime is also challenging. In addition, many researchers may develop their own software, without realizing that others might have already done so. The ability to discover, share and access applications, data and results in a more transparent and on-demand manner could be of great benefit to researchers. Recent advances in cyber infrastructure technologies are making it possible to develop solutions to address the above concerns. Cloud computing solutions, such as the Amazon Elastic Compute Cloud (EC2) [2], enable transparent and on-demand access to dynamic and scalable applications/ services over the Internet. Virtual machine technologies,used by many cloud computing solutions, enable different applications developed for heterogeneous systems to be hosted on the same physical hardware with their own custom operating system and software stack. Software and applications can be maintained and updated by the developers or a technical team, so researchers can focus on using the applications rather than managing them. Social networking platforms, such as Facebook [10] which has grown to over 250 million users, have become very popular. They allow individuals to easily share/publish data and media and keep in contact with one another. Social networks can enable researchers to more easily share applications and results and collaborate one with another. In this paper we present a service called the Interactive Application Service (IAS) that combines cloud computing and social networking technologies to provide researchers with the ability to more easily discover, share and access applications and results from anywhere at any time. Users are able to access applications, including legacy applications without modification of any code, over the Internet just as if they were running it on their local system. 
RESEARCH ARTICLE OPEN ACCESS
Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 
www.ijera.com 125 | P a g e 
II. RELATEDWORK 
A. IAS Architecture The Interactive Application Service (IAS) combines the use of a cloud based infrastructure with a social networking front-end. IAS users are members of a social networking portal on which they can communicate with other members as well as exchange files, write blogs, take part in forum discussions, and comment on topics and issues. In addition to these interactions, IAS allows portal users to run applications in the cloud. This functionality is achieved by the integration of IAS with the Web portal as well as with a cloud computing environment in which the applications are run. An overview of the IAS architecture is shown in Figure 1 The service architecture can be conceptually divided into three layers: cloud infrastructure, IAS service, and social networking front-end. The infrastructure is composed of network connected compute nodes, virtualization software and a set of services that provide dynamic and scalable computing environment. The IAS service consists of the software components that enable the execution and visualization of interactive applications on the cloud. The social networking front-end is comprised of a Web server, a social networking engine, and a database management system. 
B. Cloud Infrastructure 
The cloud infrastructure on which the IAS has being deployed is the Automated Service Provisioning Environment (ASPEN) The goal of ASPEN is to enable the dynamic allocation of computational resources in a flexible and controlled manner. In order to satisfy dynamic demands for computational resources a virtualization layer which provides dynamic resource allocation is installed on top of each physical node. A utility provider orchestrator (UPO) is responsible for the management of physical resources and for the allocation of virtual appliances (VAs) to these resources.A VA, in the context of this work, is defined as a virtual machine which is streamlined for fast boot-up and configured to run a specific application. All VAs run on top of the Xen hypervisor [3]. Xen is a high-performance, virtual machine monitor which runs on top of the physical hardware and enables the execution of multiple operating systems on a single computing appliance.This is achieved by logically partitioning the hardware resources and executing virtual machines (VMs) in a concurrent manner. Xen supports the dynamic instantiation of VMs which is advantageous in environments in which the demand for computation dynamically changes over time. 
III. GEOCHRONOS PLATFORM 
The Interactive Application Service has been integrated as part of GeoChronos [11], a portal aimed at enabling members of the earth observation science community to share data and scientific applications, and to collaborate more effectively. The project is funded as part of the CANARIE Network Enabled Platforms program [4]. Earth observation scientists collect data from a variety of sensors at different spatial and temporal resolutions, including ground based, airborne and satellite sensors, that help them in analyzing the Earth’s ecosystem. The GeoChronos portal facilitates the collection, storage, sharing, processing and analysis of this data. The IAS, is a service currently available to scientists on the portal that will enable them to visualize and analyze data using common tools used by the community on-line. Other services that are currently being developed include a batch processing service for handling automated work flows and longer running tasks, and libraries for storing and browsing spectra and other data. The architecture for the GeoChronos portal and Interactive Application Service follows that laid out in Section 3.The portal is built on top of the Elgg social networking platform. The Elgg base provides users with a variety of social networking functionality including blogs, tags, media/ document sharing, wikis, friends/contacts, groups, discussions, message boards, calendars, status, activity feeds and more. Much of this functionality is available from a users customizable dashboard as can be seen in Figure 3.
Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 
www.ijera.com 126 | P a g e 
IV. IMPLEMENTATION AND EVALUATION 
To enable portability between various devices, we built our prototype implementation in java. Our implementation was tested on one of the state of the art 3G devices. Since the main bottleneck of this protocol is the device-todevice authentication that is based on a ZKP protocol, wefocus our evaluation on this aspect. It is the most challenging part both in terms of computation and bandwidth. The applied ZKP protocol is based on graph isomorphism that we described in our earlier work [34], [36]. It requires two parties: a client and a server. In our protocol, devices act as both clients and servers for the device-to-device authentication. From the perspective of computations and data generations,the client application, which is in our case a browser executed at a user’s device, is responsible for the following operations: Generating a private key, Pk, from the user password Generating a public key, Puk, from the private key Generating random data of size (Pk)2 for the ZKP authentication Responding Server’s challenge vector Checking server timeout Delaying responses to provide a correct implementation for concurrent environments 
The server, which is in our case a home network gateway, is responsible for the following operations: 
Looking-up the user’s public key Storing user’s random data Generating a random vector of size (Pk) to match the user’s random data Verifying the user’s response Checking its clients timeouts In comparison with classical authentication approaches, such as HTTP Basic and Digest, there is a requirement of additional computations for both parties. Table I depicts how the ratio of the computations that are conducted by the server and the client depends on the number of authentication challenges and the graph size. We observe that once we increase one of these parameters, the server needs proportionally more time to respond the client’s request. However, as we see in Figure 5, the amount of data sent by the server, which is equal to data received by the client, is much smaller than the data sent by client. 
The number of bytes exchanged for various authentication parameters. Figure 5 depicts the impact of the graph size and the number of challenges on the authentication times. It shows that together with the increase of the number of challenges, the time required for computations grows linearly. However, the increase of the size of the graph causes quadratic time increase for the same number of challenges (see Fig. 6).
Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 
www.ijera.com 127 | P a g e 
We observe that the amount of data exchanged between the client and the server grows linearly for a fixed graph size and the increasing number of challenges. Increasing the graph size has, however, polynomial impact on the number of data exchanged. This dependency is best described by O(n2). The quadratic dependency relates to the fact that the graphs are kept in matrices whose sizes are square function of their number of vertices. This property is important when customers of a given system are required to pay for bandwidth usage. In such a situation, the selection of this parameter would influence not only the system security properties but also the price of the service. 
V. CONCLUSIONS AND FUTUREWORK 
In this paper we introduced the Interactive Application Service (IAS), a service providing users on-demand access to applications interactively over the Internet. The service is built on a cloud computing infrastructure called ASPEN,that dynamically adapts to meet the needs of users and uses efficient image management techniques to rapidly provision resources. With some modifications, the service could also be adapted to work with other cloud platforms. Collaboration and sharing of applications and data are achieved through a social networking front end built on the Elgg open source social networking platform. The IAS has been successfully deployed in the GeoChronos portal, a portal enabling members of the earth observation science community to share applications and data with each other. Naturally the greatest risk to any such system is at the human level. It has been assumed that high levels of trust exist when services are shared. But there are risks that a friend or neighbor may decide to abuse the trust shown to them and effectively hi-jack a user's services and personalized content. In this paper we have not directly considered the potential for such service hi-jacking and associated preventative measures. From the perspective of a service provider there are straightforward session management mechanisms for ensuring that only a single real-time access to a cloud service is available to a registered user and these could be readily adapted to address such issues. However this lies outside the scope of the current work and we prefer to leave a detailed consideration of such issues for now. Again we recall that the purpose of this paper is to examine how we can move beyond the traditional model of device authentication for home networks, and begin to implement a more user-centric approach in line with current trends in mobile network services. It is shown that ZKP techniques combined with cloud computing services can offer a suitable and practical approach to this problem. 
VI. ACKNOWLEDGMENT 
Thanks to Mr.S.Balaji,Asst.Prof,Department of Computer Science and Engineering,Angel College of Engineering and Technology for his contribution to complete this project and motivating us to do better in future. REFERENCES [1] Academia.edu Website.http://www.academi a.edu/. Accessed July, 2009. [2] Amazon. Elastic compute cloud website.http://aws.amazon.com/ec2. Accessed July, 2009. [3] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho,R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pages 164–177, 2003. 
[4] CANARIE Network Enabled Platforms (NEP) Program. http://www.canarie.ca/ funding/nep/funded projects.html. Accessed July, 2009.
Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 
www.ijera.com 128 | P a g e 
[5] A. Charbonneau and V. Terskikh. Spectrogrid: Providing simple secure remote access to scientific instruments. In HPCS, pages 76–82. IEEE Computer Society, 2008. 
[6] Cluster Resources, Inc. Moab Cluster Suite Website. http://www.clusterresources.com/ pages/products/moabcluster-suite.php. Accessed July, 2009. [7] Cluster Resources, Inc. Torque Resource Manager Website.http://www.clusterresour ces.com/pages/products/torqueresource-manager.php. Accessed April, 2008. [8] R. Curry, C. Kiddle, N. Markatchev, R. Simmonds, T. Tan,M. Arlitt, and B. Walker. ASPEN: An automated service provisioning environment for data centres. In Proceedings of the 15th HP Software University Association (HP-SUA) Workshop, pages 189–200, 2008. [9] Elgg Website. http://elgg.org/. Accessed July, 2009. 
[10] Facebook Website. http://www.facebook. com /. Accessed July, 2009. [11] GeoChronos Portal. http://geochronos.org/. Accessed July,2009. 
[12] Globus Alliance Website. http://www.globus .org/. Accessed July, 2009. [13] Google App Engine Website. http://code.google.com/appengine/. Accessed July, 2009. [14] Java web start. Accessed July, 2009. http://java.sun.com/javase/technologies/desktop/javawebstart/index.jsp. [15] P. J¨onsson and L. Eklundh. TIMESAT - a program for analysing time-series of satellite sensor data. Computers andGeosciences, 30:833–845, 2004. [16] K. Keahey, R. Figueiredo, J. Fortes, T. Freeman, and M. Tsugawa. Science clouds: Early experiences in cloud computing for scientific applications. In Proceedings of the First Wrokshop on Cloud Computing and Its Applications, 2008. [17] KVM Website. http://www.linux-kvm.org/. Accessed July,2009. [18] LinkedInWebsite. http://www.linkedin.com/. Accessed July,2009. [19] Microsoft. Windows Azure Website.http://www.microsoft.com/azure/. Accessed July, 2009. [20] MODIS reprojection tool page. https://lpdaac.usgs.gov/lpdaac/tools/modis reprojection tool.Accessed July, 2009. [21] Spec Net toolkit software page. http://spectralnetwork.net/specnet toolkit. htm. Accessed July, 2009.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET Journal
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computingAlexander Decker
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
76 s201911
76 s20191176 s201911
76 s201911IJRAT
 
Edadc
EdadcEdadc
Edadcragh6
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprisewhite paper
 
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...IAEME Publication
 
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...IOSR Journals
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issuesRezgar Mohammad
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesIJCSIS Research Publications
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing reportANKIT KUMAR
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...csandit
 
Cost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher EducationCost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher EducationCSCJournals
 

Was ist angesagt? (18)

IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
76 s201911
76 s20191176 s201911
76 s201911
 
Edadc
EdadcEdadc
Edadc
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprise
 
484 488
484 488484 488
484 488
 
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
 
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
 
B1802041217
B1802041217B1802041217
B1802041217
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and Techniques
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
Cost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher EducationCost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher Education
 

Ähnlich wie Geochronos File Sharing Application Using Cloud

Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
A Framework To Generate 3D Learning Experience
A Framework To Generate 3D Learning ExperienceA Framework To Generate 3D Learning Experience
A Framework To Generate 3D Learning ExperienceNathan Mathis
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...AM Publications
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities ManagementOmer Dawelbeit
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computingAlexander Decker
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devicesijasuc
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsIJCSIS Research Publications
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 

Ähnlich wie Geochronos File Sharing Application Using Cloud (20)

Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
A Framework To Generate 3D Learning Experience
A Framework To Generate 3D Learning ExperienceA Framework To Generate 3D Learning Experience
A Framework To Generate 3D Learning Experience
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities Management
 
pptseminar.pptx
pptseminar.pptxpptseminar.pptx
pptseminar.pptx
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devices
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of Things
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 

Kürzlich hochgeladen

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 

Kürzlich hochgeladen (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 

Geochronos File Sharing Application Using Cloud

  • 1. Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 www.ijera.com 124 | P a g e Geochronos File Sharing Application Using Cloud Sathish.Y#1, Surabhi. S*2, Sanila.S#3 B.E(Computer Science and Engineering) Angel College of Engineering and Technology, Tirupur Anna University, Chennai Abstract Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment. Keywords- Cloud Computing, Social Networking, Virtualized application, Interactive session. I. INTRODUCTION Researchers face many computational and data related challenges. These challenges can detract and take away valuable time that could be better spent focusing on their research. One such challenge is the management of applications that researchers use for conducting simulations, processing and analyzing data, and visualizing results. Such applications could be commercial, open source, or developed in-house. Different applications may be designed for different operating systems and have different software dependencies. New versions of applications may also be released frequently. Many of these applications are interactive in nature, have a graphical user interface and visualization capability or provide a way to receive feedback from the user. These applications typically haven’t been suited for batch based high performance computing environments where on-demand access to resources has not been practical due to queue wait times and limited preemption capabilities. Downloading, installing, configuring and keeping applications up to date on heterogeneous computing systems can be a daunting and difficult task. Providing access to these applications from anywhere (i.e., home, office, lab, field, etc.) and at anytime is also challenging. In addition, many researchers may develop their own software, without realizing that others might have already done so. The ability to discover, share and access applications, data and results in a more transparent and on-demand manner could be of great benefit to researchers. Recent advances in cyber infrastructure technologies are making it possible to develop solutions to address the above concerns. Cloud computing solutions, such as the Amazon Elastic Compute Cloud (EC2) [2], enable transparent and on-demand access to dynamic and scalable applications/ services over the Internet. Virtual machine technologies,used by many cloud computing solutions, enable different applications developed for heterogeneous systems to be hosted on the same physical hardware with their own custom operating system and software stack. Software and applications can be maintained and updated by the developers or a technical team, so researchers can focus on using the applications rather than managing them. Social networking platforms, such as Facebook [10] which has grown to over 250 million users, have become very popular. They allow individuals to easily share/publish data and media and keep in contact with one another. Social networks can enable researchers to more easily share applications and results and collaborate one with another. In this paper we present a service called the Interactive Application Service (IAS) that combines cloud computing and social networking technologies to provide researchers with the ability to more easily discover, share and access applications and results from anywhere at any time. Users are able to access applications, including legacy applications without modification of any code, over the Internet just as if they were running it on their local system. RESEARCH ARTICLE OPEN ACCESS
  • 2. Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 www.ijera.com 125 | P a g e II. RELATEDWORK A. IAS Architecture The Interactive Application Service (IAS) combines the use of a cloud based infrastructure with a social networking front-end. IAS users are members of a social networking portal on which they can communicate with other members as well as exchange files, write blogs, take part in forum discussions, and comment on topics and issues. In addition to these interactions, IAS allows portal users to run applications in the cloud. This functionality is achieved by the integration of IAS with the Web portal as well as with a cloud computing environment in which the applications are run. An overview of the IAS architecture is shown in Figure 1 The service architecture can be conceptually divided into three layers: cloud infrastructure, IAS service, and social networking front-end. The infrastructure is composed of network connected compute nodes, virtualization software and a set of services that provide dynamic and scalable computing environment. The IAS service consists of the software components that enable the execution and visualization of interactive applications on the cloud. The social networking front-end is comprised of a Web server, a social networking engine, and a database management system. B. Cloud Infrastructure The cloud infrastructure on which the IAS has being deployed is the Automated Service Provisioning Environment (ASPEN) The goal of ASPEN is to enable the dynamic allocation of computational resources in a flexible and controlled manner. In order to satisfy dynamic demands for computational resources a virtualization layer which provides dynamic resource allocation is installed on top of each physical node. A utility provider orchestrator (UPO) is responsible for the management of physical resources and for the allocation of virtual appliances (VAs) to these resources.A VA, in the context of this work, is defined as a virtual machine which is streamlined for fast boot-up and configured to run a specific application. All VAs run on top of the Xen hypervisor [3]. Xen is a high-performance, virtual machine monitor which runs on top of the physical hardware and enables the execution of multiple operating systems on a single computing appliance.This is achieved by logically partitioning the hardware resources and executing virtual machines (VMs) in a concurrent manner. Xen supports the dynamic instantiation of VMs which is advantageous in environments in which the demand for computation dynamically changes over time. III. GEOCHRONOS PLATFORM The Interactive Application Service has been integrated as part of GeoChronos [11], a portal aimed at enabling members of the earth observation science community to share data and scientific applications, and to collaborate more effectively. The project is funded as part of the CANARIE Network Enabled Platforms program [4]. Earth observation scientists collect data from a variety of sensors at different spatial and temporal resolutions, including ground based, airborne and satellite sensors, that help them in analyzing the Earth’s ecosystem. The GeoChronos portal facilitates the collection, storage, sharing, processing and analysis of this data. The IAS, is a service currently available to scientists on the portal that will enable them to visualize and analyze data using common tools used by the community on-line. Other services that are currently being developed include a batch processing service for handling automated work flows and longer running tasks, and libraries for storing and browsing spectra and other data. The architecture for the GeoChronos portal and Interactive Application Service follows that laid out in Section 3.The portal is built on top of the Elgg social networking platform. The Elgg base provides users with a variety of social networking functionality including blogs, tags, media/ document sharing, wikis, friends/contacts, groups, discussions, message boards, calendars, status, activity feeds and more. Much of this functionality is available from a users customizable dashboard as can be seen in Figure 3.
  • 3. Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 www.ijera.com 126 | P a g e IV. IMPLEMENTATION AND EVALUATION To enable portability between various devices, we built our prototype implementation in java. Our implementation was tested on one of the state of the art 3G devices. Since the main bottleneck of this protocol is the device-todevice authentication that is based on a ZKP protocol, wefocus our evaluation on this aspect. It is the most challenging part both in terms of computation and bandwidth. The applied ZKP protocol is based on graph isomorphism that we described in our earlier work [34], [36]. It requires two parties: a client and a server. In our protocol, devices act as both clients and servers for the device-to-device authentication. From the perspective of computations and data generations,the client application, which is in our case a browser executed at a user’s device, is responsible for the following operations: Generating a private key, Pk, from the user password Generating a public key, Puk, from the private key Generating random data of size (Pk)2 for the ZKP authentication Responding Server’s challenge vector Checking server timeout Delaying responses to provide a correct implementation for concurrent environments The server, which is in our case a home network gateway, is responsible for the following operations: Looking-up the user’s public key Storing user’s random data Generating a random vector of size (Pk) to match the user’s random data Verifying the user’s response Checking its clients timeouts In comparison with classical authentication approaches, such as HTTP Basic and Digest, there is a requirement of additional computations for both parties. Table I depicts how the ratio of the computations that are conducted by the server and the client depends on the number of authentication challenges and the graph size. We observe that once we increase one of these parameters, the server needs proportionally more time to respond the client’s request. However, as we see in Figure 5, the amount of data sent by the server, which is equal to data received by the client, is much smaller than the data sent by client. The number of bytes exchanged for various authentication parameters. Figure 5 depicts the impact of the graph size and the number of challenges on the authentication times. It shows that together with the increase of the number of challenges, the time required for computations grows linearly. However, the increase of the size of the graph causes quadratic time increase for the same number of challenges (see Fig. 6).
  • 4. Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 www.ijera.com 127 | P a g e We observe that the amount of data exchanged between the client and the server grows linearly for a fixed graph size and the increasing number of challenges. Increasing the graph size has, however, polynomial impact on the number of data exchanged. This dependency is best described by O(n2). The quadratic dependency relates to the fact that the graphs are kept in matrices whose sizes are square function of their number of vertices. This property is important when customers of a given system are required to pay for bandwidth usage. In such a situation, the selection of this parameter would influence not only the system security properties but also the price of the service. V. CONCLUSIONS AND FUTUREWORK In this paper we introduced the Interactive Application Service (IAS), a service providing users on-demand access to applications interactively over the Internet. The service is built on a cloud computing infrastructure called ASPEN,that dynamically adapts to meet the needs of users and uses efficient image management techniques to rapidly provision resources. With some modifications, the service could also be adapted to work with other cloud platforms. Collaboration and sharing of applications and data are achieved through a social networking front end built on the Elgg open source social networking platform. The IAS has been successfully deployed in the GeoChronos portal, a portal enabling members of the earth observation science community to share applications and data with each other. Naturally the greatest risk to any such system is at the human level. It has been assumed that high levels of trust exist when services are shared. But there are risks that a friend or neighbor may decide to abuse the trust shown to them and effectively hi-jack a user's services and personalized content. In this paper we have not directly considered the potential for such service hi-jacking and associated preventative measures. From the perspective of a service provider there are straightforward session management mechanisms for ensuring that only a single real-time access to a cloud service is available to a registered user and these could be readily adapted to address such issues. However this lies outside the scope of the current work and we prefer to leave a detailed consideration of such issues for now. Again we recall that the purpose of this paper is to examine how we can move beyond the traditional model of device authentication for home networks, and begin to implement a more user-centric approach in line with current trends in mobile network services. It is shown that ZKP techniques combined with cloud computing services can offer a suitable and practical approach to this problem. VI. ACKNOWLEDGMENT Thanks to Mr.S.Balaji,Asst.Prof,Department of Computer Science and Engineering,Angel College of Engineering and Technology for his contribution to complete this project and motivating us to do better in future. REFERENCES [1] Academia.edu Website.http://www.academi a.edu/. Accessed July, 2009. [2] Amazon. Elastic compute cloud website.http://aws.amazon.com/ec2. Accessed July, 2009. [3] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho,R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pages 164–177, 2003. [4] CANARIE Network Enabled Platforms (NEP) Program. http://www.canarie.ca/ funding/nep/funded projects.html. Accessed July, 2009.
  • 5. Sathish.Y et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 5), September 2014, pp.124-128 www.ijera.com 128 | P a g e [5] A. Charbonneau and V. Terskikh. Spectrogrid: Providing simple secure remote access to scientific instruments. In HPCS, pages 76–82. IEEE Computer Society, 2008. [6] Cluster Resources, Inc. Moab Cluster Suite Website. http://www.clusterresources.com/ pages/products/moabcluster-suite.php. Accessed July, 2009. [7] Cluster Resources, Inc. Torque Resource Manager Website.http://www.clusterresour ces.com/pages/products/torqueresource-manager.php. Accessed April, 2008. [8] R. Curry, C. Kiddle, N. Markatchev, R. Simmonds, T. Tan,M. Arlitt, and B. Walker. ASPEN: An automated service provisioning environment for data centres. In Proceedings of the 15th HP Software University Association (HP-SUA) Workshop, pages 189–200, 2008. [9] Elgg Website. http://elgg.org/. Accessed July, 2009. [10] Facebook Website. http://www.facebook. com /. Accessed July, 2009. [11] GeoChronos Portal. http://geochronos.org/. Accessed July,2009. [12] Globus Alliance Website. http://www.globus .org/. Accessed July, 2009. [13] Google App Engine Website. http://code.google.com/appengine/. Accessed July, 2009. [14] Java web start. Accessed July, 2009. http://java.sun.com/javase/technologies/desktop/javawebstart/index.jsp. [15] P. J¨onsson and L. Eklundh. TIMESAT - a program for analysing time-series of satellite sensor data. Computers andGeosciences, 30:833–845, 2004. [16] K. Keahey, R. Figueiredo, J. Fortes, T. Freeman, and M. Tsugawa. Science clouds: Early experiences in cloud computing for scientific applications. In Proceedings of the First Wrokshop on Cloud Computing and Its Applications, 2008. [17] KVM Website. http://www.linux-kvm.org/. Accessed July,2009. [18] LinkedInWebsite. http://www.linkedin.com/. Accessed July,2009. [19] Microsoft. Windows Azure Website.http://www.microsoft.com/azure/. Accessed July, 2009. [20] MODIS reprojection tool page. https://lpdaac.usgs.gov/lpdaac/tools/modis reprojection tool.Accessed July, 2009. [21] Spec Net toolkit software page. http://spectralnetwork.net/specnet toolkit. htm. Accessed July, 2009.