EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 8

A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization

journal image
 Download
161
  • Nazmus Sakib and Raihan Ahmed and Tanvir Ahmed and Fahad Bin Islam and Bijoya Das 2017. A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization. International Journal of Applied Information Systems. 11, 8 (Jan 2017), 1-7. DOI=http://dx.doi.org/10.5120/ijais451392
  • @article{10.5120/ijais2017451568,
    author = {Nazmus Sakib and Raihan Ahmed and Tanvir Ahmed and Fahad Bin Islam and Bijoya Das},
    title = {A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization},
    journal = {International Journal of Applied Information Systems},
    issue_date = {Jan 2017},
    volume = {11},
    number = {},
    month = {Jan},
    year = {2017},
    issn = {2249-0868},
    pages = {1-7},
    numpages = {7},
    url = {/archives/volume11/number8/956-956-2017451635},
    doi = {10.5120/ijais2017451635},
    publisher = {Publisher: Foundation of Computer Science (FCS), NY, USA},
    address = {}
    }
    
  • %1 451392
    %A Manish M Potey
    %A C.  A.  Dhote
    %A Deepak Sharma
    %T A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization
    %J International Journal of Applied Information Systems
    %@ 2249-0868
    %V 11
    %N 
    %P 1-7
    %D 2017
    %I Publisher: Foundation of Computer Science (FCS), NY, USA
    

Abstract

Cloud computing is a broadly used technology which serves users with resources on specific demand enhancing manageability, minimizing the data management and operational cost. Basically, cloud allows users to store their valuable data on the cloud storage so the security of the data center and easy access are considered as focusable parts in cloud computing. In the study we spot light to a new approach of cloud computing where mobile storage is used to build the data center of cloud and easy access having a preferable security. We deliberate that it is possible to lower the cost if the data center is built using user's mobile storage so a 3-tier technology is proposed. Firstly, a layer is user's mobile devices, second layer is server with different virtual machines and last layer is again the user's mobile device which is used to build the data center of cloud (mobile-server-mobile). A mobile app implements the initial security and management issues. Users can oscillate data between first layer and third layer with the help of virtual machines that ensure secure transaction of data, reduction of power consumption, maintenance cost, bandwidth consumption and fast data sharing.

References

  1. K. Hashizume, D. G. Rosado, E. Fernández-Medina and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, no. 5, p. 1, 2013.
  2. A. Holt, K. Weiss, E. Gelblum, S. Flannery, S. Devgan, A. Malik, N. Rozof, A. Wood, P. Standaert, F. Meunier, J. Lu, G. Chen, B. Lu, K. Han, V. Khare and M. Miyachi, "Cloud Computing Takes Off," MORGAN STANLEY RESEARCH Globa l, 2011.
  3. J. SRINIVAS, K. VENKATA, S. REDDY and M. QYSER, "CLOUD COMPUTING BASICS," International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 5, pp. 1-3, 2012.
  4. S.-i. Kuribayashi, "Optimal Joint Multiple Resource Allocation Method for Cloud Computing Environments," International Journal of Research and Reviews in Computer Science (IJRRCS), vol. 2, no. 1, pp. 1-2, 2011.
  5. S.-i. Kuribayashi, "Reducing Total Power Consumption Method in Cloud Computing Environments," International Journal of Computer Networks & Communications (IJCNC), vol. 4, no. 2, pp. 1-2, 2012.
  6. K. Patel and M. Rathod J., "Effective Utilization of Bandwidth for Mobile Ad Hoc Network," Indian Journal of Science and Technology, vol. 9, no. 27, pp. 1-2, 2016.
  7. K. Kaur and K. Rai, "A Comparative Analysis: Grid, Cluster and Cloud Computing," International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 3, pp. 1-3, 2014.
  8. Q. Hassan F., "Demystifying Cloud Computing," Cross Talk, Cross Talk, 2011.
  9. M. Amini, S. Safavi, D. M. Khavidaki and A. Abdollahzadegan, "Type Of Cloud Computing (Public And Private) That Transform The Organization More Effectively," International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 5, pp. 1-5, 2013.
  10. K. Khajehei, "Role of virtualization in cloud computing," International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 4, pp. 1-8, 2014.
  11. M. Liaqata, S. Ninoriyab, J. Shujaa, W. Ahmada and A. Gania, "Virtual Machine Migration Enabled Cloud Resource Management: A Challenging Task," University of Malaya, kualalampur and Jabalpur ;, 2016.
  12. D. M and K. P, "A Study On Virtualization Techniques And Challenges In Cloud Computing," :International Journal Of Science & Technology Research, vol. 3, no. 11, pp. 1-3, 2014.
  13. YunchuanSun, J. Zhang, Y. Xiong and G. Zhu, "Data Security and Privacy in Cloud Computing," International Journal of Distributed Sensor Networks, vol. 2014, 2014.
  14. K. Hashizume, D. G. Rosado, E. Fernández-Medina and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, no. 5, pp. 1-5, 2013.
  15. U. Naik and V. Kotak, " Security Issues with Implementation of RSA and Proposed Dual Security Algorithm for Cloud Computing," IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), vol. 9, no. 1, pp. 1-5, 2014.
  16. M. Pitchaiah, P. Daniel and Praveen, "Implementation of Advanced Encryption Standard Algorithm," International Journal of Scientific & Engineering Research, vol. 3, no. 3, pp. 1-5, 2012.
  17. "Techopedia," [Online]. [Accessed 26 july 2016]. Available: https://www.techopedia.com/definition/1006/data-synchronization.
  18. N. Malhotra and A. Chaudhary, "Implementation of Database Synchronization Technique between Client and Server," International Journal of Engineering Science and Innovative Technology (IJESIT), vol. 3, no. 4, pp. 1-5, 2014.
  19. S. S and B. K, "Data Synchronization Using Cloud Storage," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 11, pp. 1-4, 2012.
  20. "Techopedia," [Online]. [Accessed 27 july 2016] Available:https://www.techopedia.com/definition/1006/data-synchronization.
  21. "nsk inc," [Online]. Available: http://blog.nskinc.com/IT-Services-Boston/bid/77545/When-to-Use-Mirroring-as-a-Data-Recovery-Solution. [Accessed 28 july 2016].
  22. H. Jin and K. Hwang, "Stripped mirroring RAID architecture," Journal of Systems Architecture, vol. 46, no. 543±550, pp. 1-6, 2000.
  23. "Android developers," [Online]. [Accessed 20 july 2016] Available:https://developer.android.com/guide/topics/data/data-storage.html..
  24. S. Arianfar, P. Sarolahti and J. Ott, "Reducing Server and Network Load with Shared Buffering," Aalto University, FRANCE, 2012.
  25. "WD support," [Online]. [Accessed 15 july 2016] Available:http://support.wdc.com/KnowledgeBase/answer.aspx?ID=10624..
  26. M. Singhal and A. Shukla, " Implementation of Location based Services in Android," IJCSI International Journal of Computer Science, vol. 9, no. 1, pp. 1-4, 2012.
  27. D. Vadlamudi, K. Chaitanya, T. Srikanth, B. Venu, U. Joseph and T.-h. Kim, "An Applicative Approach for Collecting and Fortifying History of Data in Cloud Environment," International Journal of Software Engineering and Its Applications, vol. 9, no. 5, pp. 1-7, 2015.

Keywords

Cloud, shared memory, virtualization, encryption, synchronization, RAID, security, Virtual Machine(VM), Media Access Control(MAC), Rivest-Shamir-Adleman (RSA), Advanced Encryption Standard (AES)

Index Terms

Computer Science
Information Sciences