SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1095
Framework for Dynamic Resource Allocation and
Scheduling for Cloud
Tavhare Kisan Sopan 1, Shubham Khare2, Hiteshi Pandya3, Arush Tolkar4, Samruddhi Ubhe4
1,2,3,4,5 Student, Dept. of Computer Engineering Student, Pune University, Maharashtra, Pune
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Studies of Cloud Computing have mainly
addressed the implementation of private cloud and study
of how the facilities can be implemented. The study of
cloud includes the implementation of various security
algorithms and also to include the study of various
internet message transfer protocols (This system uses
STMP protocol). The existing cloud services available in
market are way costly and they cannot be implemented on
small scale. These technologies are developed by big
organizations like Google, Microsoft, and Yahoo etc. And
these are cannot be used on small systems. The system
designed, implemented and described in this report can be
used on small scale.
This report describes the development and
implementation of framework for dynamic resource
allocation for cloud computing based on local open cloud,
IAAS services, STMP, HTTP protocols, various encryption
algorithms, message transfer protocols. This system is
used for storing file in encrypted format on local cloud
also the system is able to send request to access other
user’s file. Also the admin panel is there so that admin can
observe all activities of other user’s and also admin is able
to block, delete or deactivate the user in other words he
can change accessibility of other users. When number of
nodes tries to access the traditional system then
eventually the system gets crashed because the load on
the cloud is not equally distributed. Also the data which is
stored on the cloud for every user should be moved to
another directory if the more space is gets occupied. The
implemented cloud system consists of following major
areas:
a) User Registration / Add user.
b) Upload file.
c) Encryption of uploaded file.
d) Accessing and request for specific file.
e) Message transfer and private key transfer.
f) Load balancing.
g) DNS pointing.
The implemented system will generate the report based
on the number of user registered on the system, the space
occupied by them, how the data is stored, and how the
load is getting distributed on the cloud system. The system
will be fully flexible by allowing quick modifications to
represent various studies such as increase in number of
users, increase in data storage. Admin is able to observe all
the activities by the user. DNS pointing is can be used to
locate and describe which server is online and working
(active state) with its associated name. The system is real-
time load balancing system. Thus, the system will be great
help to use on the small scale systems or other small
projects where there is no need of buying heavy server
services instead this complete system can be used for the
local service.
Keywords: Load Balancing, Cloud, AES Etc.
1. INTRODUCTION
Framework for dynamic resource allocation for cloud is a
system used for effective scheduling of load on the cloud
systems and also with enhanced security measures. The
system is based on following factors IAAS (Infrastructure
as a service) for cloud services, STMP (Simple mail
transfer protocol) is used to notify the user about file
access request and also to send the private key of one user
(owner of the file) to another user who is requester of file,
AES (Advances encryption standards) is used in order to
protect the data/files which are uploaded on the cloud by
users. This uploaded data will be encrypted by AES
algorithm so that the uploaded data cannot be viewed by
any other user.
The main purpose of the system is to distribute all
the load on the cloud efficiently so that the cloud services
can run more efficiently and effectively also the security to
cloud should be increased by using encryption algorithm
such as AES. The complete Cloud System consist of
following major areas they are: Admin panel to control all
other accounts, creating a user (i.e. User registration),
uploading a file to the Cloud, Encryption and storage of the
file on the cloud, load balancing, DNS pointing. The
features included in the system are user login is provided,
file storage is provided, secure data storage provided,
Asymmetric key cryptography features for secure storage
provided, load balancing provided, Ability of user to accept
or reject the request for file access provided, With
asymmetric key generation the facility to notify user about
request to access file and to send the private key to
specific user is provided (used 1B21mmcoe@gmail.com as
a dummy email which will notify user and send’s the
private key). These all features will be great help to create
efficient system that can run on even small platforms, use
better encryption support also can take corrective actions
to balance the load.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1096
1.1 MATHMATICAL MODEL
Let S be the system
S = {I, O, F, sc, fc}
I= {set of inputs}
O= {set of outputs}
F= {distribute the data and keeps replica of each data}
I1= {data} O1= {load is balanced}
sc= {success case} ={load is balanced}
1.2 NEED OF THE PROJECT/ MOTIVATION
Framework for dynamic resource allocation for cloud
system is process of executing the system on server/cloud
with the intent of minimize the load on the cloud system
also to enhance the security. The increase in data on the
cloud services had made the manual load balancing of
cloud admin intensive and expensive and cost of managing
the cloud servers grows drastically. The current available
system like Google cloud, Yahoo, Microsoft are used by
large organizations and these systems are feasible for
small systems. They are designed for the large systems. If
we develop a local system there is need of small system
that can handle the load also which supports good security
achievements. Automation in the system as well as
developing the system on uniform platform that is Java,
Html, Jsp, Bootstrap language will increase in performance
can have better optimality, better security and can reduce
the time required to balance load on server. Automation
would invariably reduce the redundancy, manual efforts
required to balance load on server, maximizing
repeatability and also will increase the accuracy of the
system. The user will come to know about his status of
used data storage. The one of the advantages of the system
are the system is able to store the user files in encrypted
format also when the other user want to access that file
then the owner of the user will be informed via E-mail.
2. PROBLEM DEFINATION
Framework for dynamic resource allocation for cloud is
system that based on cloud services, various internet
protocols, encryption algorithm for automation and load
balancing.
2.4 LITERATURE SURVEY
In traditional approach people often try to use big services
provided by Amazon, Google to connect with their system
even if the system is much smaller and it doesn’t actually
need that type of big services. Also the system is unable to
work if your basic (main) machine is not available. These
various services are provided by different tech. companies
are expensive and they are not always that secure. For
example the Google drive’s data can be easily retrieved if
the owner gives permission to 1 file in his storage not all
files but if one time the one user asks permission for the
data and one time access is given to that user not more.
Fig. Amazon cloud and its pricing
When a user is using a small system and does not need this
large amount of data storage but he can use his own
storage as a cloud and other users also can use this storage
as a cloud service. Our system is beneficial for such systems
where there is no need of large systems and small storage
is sufficient for the user. Our system is also capable of
balancing the load i.e. data uploaded on the cloud. The
framework designed allows the system to concentrate on
minimizing the load on the cloud by moving the unused
data into other storage hence the other storage is used as
resource and the data which is unused will be moved to
that folder. This method will decrease the load on the
server and will free some space so that user can do his
work daily basis. This includes description of the interfaces
required to integrate the modules in later stages. The flow
goes in following manner. First the new user needs to give
all the required personal credentials by filling up the “user
registration” form. At this stage user needs to provide their
mail id and password during registration that will be useful
for login at every time. The user can then login with the
registered mail id and password on the page. After the
successful login, now user is navigated to a page wherein
they are able to view options namely “upload files”,
“request files”, “files details”. The user can send request for
the files made available by other users. On sending the
request, the file owner will receive a notification mail along
with a key. The file owner now needs to login on the web
page where they could either accept or reject the request
made by users. The file is being transmitted in encrypted
mode in order to ensure data security for that requested
file. The user is able to view the file details. The user can
even upload the files present in their system and made
those files available for other users. The administrator is
the one who is responsible for handling the load on the
system. Once the administrator encounters that the file has
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1097
not been used by the user within a particular time period
that file will be transmitted to a temporary folder. This
transmission of unused files to a temporary folder makes it
possible for the user to download the other required files
in their respective user folder, thus creating an additional
space for useful files only and balancing the overload over
the user system. In case if the unused files are not being
transmitted the users file folder might get filled up beyond
the allocated space assigned to them and user will not be
able to download additional files required. Such situation
will ultimately lead to user’s system failure.
2.5 METHODOLOGIES OF PROBLEM SOLVING AND
EFFICIENCY ISSUES
The proposed system resides between cloud server and
database.
• The number of users connected, active users, amount of
storage used, number of files uploaded can be seen through
admin panel.
• The selected data by the user is categorized into three
sections Education, Hospitality, Business which is selected
by user.
• When data is stored on cloud it gets encrypted into AES
format so no one will able to read the file. • Every user has
specific space allotted to him this can be viewed through
the file details.
• When one user wants to access the file of other user then
he will request to that user for file other user will get
notification about it. When file owner accepts the request
then the private key will be sent to requesting user. Only
after using this (private) key requesting user can download
the file.
• System uses Mysql database to store the login
information and Navicat tool is used as connector between
the main cloud module and Mysql database.
Fig -1: DNS Pointing
Fig-2:AES Encryption.
Fig-3: Cloud Status
3. CONCLUSION
Load will be evenly distributed. Hence, there is less chance
of system failure.
4. APPLICATIONS
Useful in industrial sector where there is a need for large
amount of data to be generated and its exchange over the
network which further requires management of
computing resources.
• Useful for enterprises with small scale applications.
• The system can be used in school, college
• Useful in small private organizations.
• It can be used when there is no need for buying
expensive and large services of big companies like
Google, Amazon.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1098
REFERENCES
[1] D. Kornack and P. Rakic, “Cell Proliferation without
Neurogenesis in Adult Primate Neocortex,” Science,
vol. 294, Dec. 2001, pp. 2127-2130,
doi:10.1126/science.1065467.
[2] M. Young, The Technical Writer’s Handbook. Mill
Valley, CA: University Science, 1989.
[3] R. Nicole, “Title of paper with only first word
capitalized,” J. Name Stand. Abbrev., in press.
[4] K. Elissa, “Title of paper if known,” unpublished.
AUTHORS
Shubham Khare
Student, Department of
Computer Engineering, Pune
University, Maharashtra, India
Kisan Tavhare
Student, Department of
Computer Engineering, Pune
University, Maharashtra, India
Arush Talokar
Student, Department of
Computer Engineering, Pune
University, Maharashtra, India
Hiteshi Pandya
Student, Department of
Computer Engineering, Pune
University, Maharashtra, India
Samruddhi Ubhe
Student, Department of
Computer Engineering, Pune
University, Maharashtra, India

Weitere ähnliche Inhalte

Was ist angesagt?

Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
ActivedirecotryfundamentalsShekhar Singh
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory DomainNapoleon NV
 
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingPriyank Rupera
 
Windows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory GuideWindows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory Guidewebhostingguy
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDSHarsh Sethi
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudGowthami Konakanchi
 
The enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloudThe enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloudjournalBEEI
 
Active directory ii
Active directory   iiActive directory   ii
Active directory iideshvikas
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on CloudSupriya .
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 

Was ist angesagt? (20)

70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 04100970 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory Domain
 
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwarding
 
Windows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory GuideWindows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory Guide
 
70 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 04100970 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 041009
 
I017554954
I017554954I017554954
I017554954
 
Active Directory
Active Directory Active Directory
Active Directory
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
H017554148
H017554148H017554148
H017554148
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
The enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloudThe enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloud
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Active directory ii
Active directory   iiActive directory   ii
Active directory ii
 
70 640 Lesson04 Ppt 041009
70 640 Lesson04 Ppt 04100970 640 Lesson04 Ppt 041009
70 640 Lesson04 Ppt 041009
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on Cloud
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 

Ähnlich wie IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud

IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check SchemeIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudEditor IJCATR
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Ähnlich wie IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud (20)

IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in Cloud
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Kürzlich hochgeladen (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1095 Framework for Dynamic Resource Allocation and Scheduling for Cloud Tavhare Kisan Sopan 1, Shubham Khare2, Hiteshi Pandya3, Arush Tolkar4, Samruddhi Ubhe4 1,2,3,4,5 Student, Dept. of Computer Engineering Student, Pune University, Maharashtra, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Studies of Cloud Computing have mainly addressed the implementation of private cloud and study of how the facilities can be implemented. The study of cloud includes the implementation of various security algorithms and also to include the study of various internet message transfer protocols (This system uses STMP protocol). The existing cloud services available in market are way costly and they cannot be implemented on small scale. These technologies are developed by big organizations like Google, Microsoft, and Yahoo etc. And these are cannot be used on small systems. The system designed, implemented and described in this report can be used on small scale. This report describes the development and implementation of framework for dynamic resource allocation for cloud computing based on local open cloud, IAAS services, STMP, HTTP protocols, various encryption algorithms, message transfer protocols. This system is used for storing file in encrypted format on local cloud also the system is able to send request to access other user’s file. Also the admin panel is there so that admin can observe all activities of other user’s and also admin is able to block, delete or deactivate the user in other words he can change accessibility of other users. When number of nodes tries to access the traditional system then eventually the system gets crashed because the load on the cloud is not equally distributed. Also the data which is stored on the cloud for every user should be moved to another directory if the more space is gets occupied. The implemented cloud system consists of following major areas: a) User Registration / Add user. b) Upload file. c) Encryption of uploaded file. d) Accessing and request for specific file. e) Message transfer and private key transfer. f) Load balancing. g) DNS pointing. The implemented system will generate the report based on the number of user registered on the system, the space occupied by them, how the data is stored, and how the load is getting distributed on the cloud system. The system will be fully flexible by allowing quick modifications to represent various studies such as increase in number of users, increase in data storage. Admin is able to observe all the activities by the user. DNS pointing is can be used to locate and describe which server is online and working (active state) with its associated name. The system is real- time load balancing system. Thus, the system will be great help to use on the small scale systems or other small projects where there is no need of buying heavy server services instead this complete system can be used for the local service. Keywords: Load Balancing, Cloud, AES Etc. 1. INTRODUCTION Framework for dynamic resource allocation for cloud is a system used for effective scheduling of load on the cloud systems and also with enhanced security measures. The system is based on following factors IAAS (Infrastructure as a service) for cloud services, STMP (Simple mail transfer protocol) is used to notify the user about file access request and also to send the private key of one user (owner of the file) to another user who is requester of file, AES (Advances encryption standards) is used in order to protect the data/files which are uploaded on the cloud by users. This uploaded data will be encrypted by AES algorithm so that the uploaded data cannot be viewed by any other user. The main purpose of the system is to distribute all the load on the cloud efficiently so that the cloud services can run more efficiently and effectively also the security to cloud should be increased by using encryption algorithm such as AES. The complete Cloud System consist of following major areas they are: Admin panel to control all other accounts, creating a user (i.e. User registration), uploading a file to the Cloud, Encryption and storage of the file on the cloud, load balancing, DNS pointing. The features included in the system are user login is provided, file storage is provided, secure data storage provided, Asymmetric key cryptography features for secure storage provided, load balancing provided, Ability of user to accept or reject the request for file access provided, With asymmetric key generation the facility to notify user about request to access file and to send the private key to specific user is provided (used 1B21mmcoe@gmail.com as a dummy email which will notify user and send’s the private key). These all features will be great help to create efficient system that can run on even small platforms, use better encryption support also can take corrective actions to balance the load.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1096 1.1 MATHMATICAL MODEL Let S be the system S = {I, O, F, sc, fc} I= {set of inputs} O= {set of outputs} F= {distribute the data and keeps replica of each data} I1= {data} O1= {load is balanced} sc= {success case} ={load is balanced} 1.2 NEED OF THE PROJECT/ MOTIVATION Framework for dynamic resource allocation for cloud system is process of executing the system on server/cloud with the intent of minimize the load on the cloud system also to enhance the security. The increase in data on the cloud services had made the manual load balancing of cloud admin intensive and expensive and cost of managing the cloud servers grows drastically. The current available system like Google cloud, Yahoo, Microsoft are used by large organizations and these systems are feasible for small systems. They are designed for the large systems. If we develop a local system there is need of small system that can handle the load also which supports good security achievements. Automation in the system as well as developing the system on uniform platform that is Java, Html, Jsp, Bootstrap language will increase in performance can have better optimality, better security and can reduce the time required to balance load on server. Automation would invariably reduce the redundancy, manual efforts required to balance load on server, maximizing repeatability and also will increase the accuracy of the system. The user will come to know about his status of used data storage. The one of the advantages of the system are the system is able to store the user files in encrypted format also when the other user want to access that file then the owner of the user will be informed via E-mail. 2. PROBLEM DEFINATION Framework for dynamic resource allocation for cloud is system that based on cloud services, various internet protocols, encryption algorithm for automation and load balancing. 2.4 LITERATURE SURVEY In traditional approach people often try to use big services provided by Amazon, Google to connect with their system even if the system is much smaller and it doesn’t actually need that type of big services. Also the system is unable to work if your basic (main) machine is not available. These various services are provided by different tech. companies are expensive and they are not always that secure. For example the Google drive’s data can be easily retrieved if the owner gives permission to 1 file in his storage not all files but if one time the one user asks permission for the data and one time access is given to that user not more. Fig. Amazon cloud and its pricing When a user is using a small system and does not need this large amount of data storage but he can use his own storage as a cloud and other users also can use this storage as a cloud service. Our system is beneficial for such systems where there is no need of large systems and small storage is sufficient for the user. Our system is also capable of balancing the load i.e. data uploaded on the cloud. The framework designed allows the system to concentrate on minimizing the load on the cloud by moving the unused data into other storage hence the other storage is used as resource and the data which is unused will be moved to that folder. This method will decrease the load on the server and will free some space so that user can do his work daily basis. This includes description of the interfaces required to integrate the modules in later stages. The flow goes in following manner. First the new user needs to give all the required personal credentials by filling up the “user registration” form. At this stage user needs to provide their mail id and password during registration that will be useful for login at every time. The user can then login with the registered mail id and password on the page. After the successful login, now user is navigated to a page wherein they are able to view options namely “upload files”, “request files”, “files details”. The user can send request for the files made available by other users. On sending the request, the file owner will receive a notification mail along with a key. The file owner now needs to login on the web page where they could either accept or reject the request made by users. The file is being transmitted in encrypted mode in order to ensure data security for that requested file. The user is able to view the file details. The user can even upload the files present in their system and made those files available for other users. The administrator is the one who is responsible for handling the load on the system. Once the administrator encounters that the file has
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1097 not been used by the user within a particular time period that file will be transmitted to a temporary folder. This transmission of unused files to a temporary folder makes it possible for the user to download the other required files in their respective user folder, thus creating an additional space for useful files only and balancing the overload over the user system. In case if the unused files are not being transmitted the users file folder might get filled up beyond the allocated space assigned to them and user will not be able to download additional files required. Such situation will ultimately lead to user’s system failure. 2.5 METHODOLOGIES OF PROBLEM SOLVING AND EFFICIENCY ISSUES The proposed system resides between cloud server and database. • The number of users connected, active users, amount of storage used, number of files uploaded can be seen through admin panel. • The selected data by the user is categorized into three sections Education, Hospitality, Business which is selected by user. • When data is stored on cloud it gets encrypted into AES format so no one will able to read the file. • Every user has specific space allotted to him this can be viewed through the file details. • When one user wants to access the file of other user then he will request to that user for file other user will get notification about it. When file owner accepts the request then the private key will be sent to requesting user. Only after using this (private) key requesting user can download the file. • System uses Mysql database to store the login information and Navicat tool is used as connector between the main cloud module and Mysql database. Fig -1: DNS Pointing Fig-2:AES Encryption. Fig-3: Cloud Status 3. CONCLUSION Load will be evenly distributed. Hence, there is less chance of system failure. 4. APPLICATIONS Useful in industrial sector where there is a need for large amount of data to be generated and its exchange over the network which further requires management of computing resources. • Useful for enterprises with small scale applications. • The system can be used in school, college • Useful in small private organizations. • It can be used when there is no need for buying expensive and large services of big companies like Google, Amazon.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1098 REFERENCES [1] D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-2130, doi:10.1126/science.1065467. [2] M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [3] R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press. [4] K. Elissa, “Title of paper if known,” unpublished. AUTHORS Shubham Khare Student, Department of Computer Engineering, Pune University, Maharashtra, India Kisan Tavhare Student, Department of Computer Engineering, Pune University, Maharashtra, India Arush Talokar Student, Department of Computer Engineering, Pune University, Maharashtra, India Hiteshi Pandya Student, Department of Computer Engineering, Pune University, Maharashtra, India Samruddhi Ubhe Student, Department of Computer Engineering, Pune University, Maharashtra, India