Title
SIJO.T.JOHN
STUDENT No: 1415747
CLOUD COMPUTING DESIGN PROPOSAL AND ENABLING DATA INTEGRITY PROTECTION IN REGENERATING-CODING-BASED CLOUD STORAGE
Bachelor of Sciences with Honours - Computer Networking
Independent Project
Supervisor Name Yue Zhang
Course Coordinator name Ghazanfar Safdar
Contents
TITLE 1
CONTENTS PAGE 2
ABSTRACT 3
SECTION 1- INTRODUCTION 4
Section 1.1 Project Scope 5
Section 1.2 Project Requirements 5
Section 1.3 Project objectives. 5
Section 1.4 Objective of the study 5
SECTION 2- LITERATURE SURVEY 6
Section 2.1 What Cloud Computing can do 6
Section 2.2 Security Cloud Networks can provide 6
Section 2.3 Why Cloud Computing 7
Section 2.4 Motivation 7
Section 2.5 Deployment Model 8
SECTION 3- PROJECT PLAN 11
Section 3.1 Project Approach 11
SECTION 3.2 Initial Project Risk Assessment 12
Section 3.3 Gannt Chart 14
SECTION 4- PLANNING YOUR ARTEFACT 15
Section 4.1 Problem Definition 15
Section 4.2 Problem Explanation 15
Section 4.3 Project Requirement analysis and solutions 16
Section 4.4 IP Network Design for LAN users 16
Section 4.5 Network Topology Diagram 17
Section 4.6 Product list and references 18
SECTION 5- RESEARCH METHODOLOGY 19
Section 5.1 Resources 19
REFERENCES 20
APPENDICES 21
ABSTRACT
The many uses of cloud computing which has been rising rapidly in current and many years to come which has created an attention from all kinds of different organisations, different kinds of institutions and level of different users which lead them to take advantage of what web application has to offer.
It has resulted for many different purposes which has led to a new cost-effective model for the IT world that shows what cloud computing has to offer and its promises and what it can deliver. Cloud computing promises a change to organisation and its smart to invest heavily for restricted or limit in the IT resources that are managed inside, to a respected model which we call cloud computing where the company or an organisation has an option either to rent the resources or buy them to its full use.
This is managed and controlled by a cloud provider which is same as an internet provider providing users with the internet, and pay them according to the use. One of the features of cloud computing is that it offers and provide the assurances for scalability of resources as in today’s world resources get wider and wider and on-demand availability of resources for each and every user who gets access to it.
SECTION 1- INTRODUCTION
Cloud computing is the new and the latest technology which is available for storage and file sharing. The basic and the underline concept of cloud computing is that it separate the application from the operating system from the hardware which runs everything. This means with the help of cloud computing there is no use of expensive hardware such as servers, cpu, hard drive etc to be required to use cloud computing. The main idea of using cloud computing is that it disconnects the application, the operating system and the hardware from themselves. It works like a virtual computer as it creates its own operating system and works on that. With the help of virtualization if a users using a system working in the cloud and if the system fails, or if there is a power fails the work is not lost. The user can simply log into another system and resume its work. Virtualisation is a part of cloud computing.
The simplest form of cloud computing is its web application which is used by the user and it’s created by using standard world wide web technology which is crated by using html, java, xms etc. Cloud computing consists of highly virtualised data centres that provides various hardware, software and information resources to us when needed. Any organisation simply connect to the cloud and can use it pay per use basis which is one of the feature of having cloud computing which can help companies to avoid capital expenditure on additional on premises infrastructure resources and instantly scale up or down according the business requirement.
Section 1.1 Project Scope
My project scope is to Design a cloud network and give the best proposal to my client who is a software development organization. My client has many different departments in which one of them is a technical department and is the core department of the company. The technical department has 100 users who uses the network for many different uses and purposes. My clients want a new cost effective method and the latest technology which can help its employees to use and make life easier for them as well. I came up with the proposal to build a cloud network for 100 users and implement security measures in the network,
Section 1.2 Project Requirements
• The company needs a website in the cloud network.
• All users in the technical department need to have email accounts under the company’s name and to be setup on the cloud.
• The source of each data storage and the accessibility of that source should be available for all the users on the cloud
• An application server should be presented in the company, which would be a committed system on the cloud.
• The company should have a LAN with proper mechanisms like routers and switches.
• There should be internet access to all the users in the technical department.
Section 1.3 Project objectives.
1. Exploring basics of Cloud Computing and study all features and benefits it will provide my client to build his cloud network and its advantages and disadvantages
2. Carry out a full research about security issues posed by cloud computing and to find ways to eliminate these risk
3. Investigating and conduct research the most appropriate solution to threats and applying them.
4. Built the best cloud based network for the client which will meet the company needs.
5. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage
Section 1.4 Objective of the study
1. Introducing cloud computing to the company and its uses.
2. Designs of the network in packet tracer which would be a prototype and explain how the network would be.
3. Implement the security feature in cloud computing which would provide ease of mind to the compnay when sharing resources or any users accessing the inform
Section 2- Literature Survey
The term cloud meand to delever hoster service over the internet.Cloud computing is the new way and trend to store information, sharing resources and is used by many types of users .There are mainly 3 attraction of using cloud computing:
Self-Service Provisioning: There is no need for anyone to manage the computer resources as the end user themself can use and maintain the resources for any workload on demand.
Elasticity: Many compnaies invest lots of money during the busy time and then later on the profit goes down, with cloud computing compnaies hav the option to scale up when thre is an increase for computing needs and then in the future can go down when th demand is over which helps the compnay to save lot of money.
Pay Per Use: Users have the freedom to pay for what they use which can also help to save lot of mony.
Section 2.1 What Cloud Computing can do
Saving of documents and sharing them has undergone a vast change from floppy disc to CD Drives.Cloud Computing is the new trend for sharinbg of resources which is wasy to access and safe from small users to big huge companies.The information is stores in a servr which is maintained and looked after by its provider. For example apple which uses i cloud as their cloud storage. The main advatage of having a cloud storage is that it does not require any hardware tools to store information.With the help of cloud computing the user can us its smartphone, tablets or laptops to accss information from any location the user is.Thre are different types of cloud storage which varys from a single users to large companies.
Section 2.2 Security Cloud Networks can provide
This project also covers how to enable and add extra security feature for the protection of data in regeneration coding based which will cover a major security issue in cloud computing and from a business viewpoint, it will ensure that the adoption in cloud computing are full cost, and understanding the risk. We will be adding this part to enable the extra security which is need in cloud computing for an organisation. By enabling data integrity protection in regeneration coding based on the cloud storage it safeguard the outsourced data which is present in the cloud storage against any kind of corruption which can lead to loss of data. This is why it’s become really crucial and critical by putting a fault tolerance in the cloud storage and also adding an efficient data integrity checking and recovery procedure to prevent any issues. In this report we will also outline why it is important to study the problem to check remotely the integrity of codes which are regenerated to check against any corruption of data. In order to achieve I will be designing and implementing Data integrity protection(DIP) for a precise code regeneration and keeping in mind to preserve it’s its basic fault tolerance and to repair traffic. This will enable the clients or users which are using the service to easily see confirm the data integrity of different types of different subsets of data which is been outsourced against malicious corruptions. The DIP scheme which will be created under a mobile Byzantine adversarial model that will enable my client to achieve the level of verification of the reliability of random subsets of data which is been outsourced against all-purpose or malicious corruptions. The way it works is by assuming the simple cloud storage and will allow different kind of parameter to be tuned for the better performance security. The DIP scheme will be implemented and evaluating the overhead in a real cloud storage and will be tested under different choice of parameter. To strengthen the security of the DIP scheme I will be adding mathematical models.
Section 2.3 Why Cloud Computing
Cloud computing offers various type of benefits to an company or organisation but in order to receive a successful acceptance of cloud computing in an company who wants to use its feature to its full potential an understand the different dynamics and expertise in varied domains. This project focuses on a range of how my client can use cloud computing by building him the network and offer him all the advantages of it. It depends on the company if they feel confident, open and secure to make full use of the services provided by cloud computing which will result in a drastic change in the company in many good ways. The use of cloud computing may differ for different company’s but if the proper guidelines are followed which is specially marked for them the company can make full use of the service and also making sure that that the use of cloud computing is effective in many ways and is efficient which will provide them with better and great results and a guaranteed satisfaction.
Section 2.4 Motivation
Its is very expensiv in todays world to purchas high costly hardware and to pay to technicians to fix any problms which comes with it. Many compnaies spend huge amount of money during the busy trading off priod when it comes to computr systm and looses that money after compnay expriences a low trading time. Cloud computing is a upcomming platform which should be used by small organisation as well. . Any organisation simply connect to the cloud and can use it pay per use basis which is one of the feature of having cloud computing which can help companies in cost and also help them in capital expenditure and on additional on premises infra-structure information and help the compnaies to scale high or low according the business requirement
Section 2.5 Deployment Model
In a cloud network theer are four different types of cloud deployment. These models have different ways they operate that addresses and used in different suitation or specific needs.The deployment model in the cloud mainly defines by where the infrastructure for the deployment exsists.
• Who owns the physical server?
• Who owns the Virtualization software
• Who provides support if something gows wrong?
• It is owned by cloud service provider and offers the highest level of efficiency in shared resources.
• Any customer who wants to use the public cloud can pay for the resources on the cloud
• The support in the public cloud is handled by its provider.
• It offers increased availability and scale
• The cost savings are passed to the customers who use the services.
• It is easily accessible.
• Documentation and best practises are abundant.
• The support in a public cloud may not be thorough and may also get expensive.
• In a public cloud there is only little control for hardware upgrades.
• The security level is low
• It has far more control over the hardware and software upgrades
• The security can be ensured in this model
• More monitoring and insights
• Compliance and legal control may be improved.
• Mainly used for one organisation
• The cost is very high
• There are training and expertise needed in this model for server administration, virtualization specialist and for networking specialist.
• It is a combination of private and public deployment models. In a hybrid cloud specific resources are used and run in a public cloud and other are run and used in premises in a private cloud which provides increased efficiency
• It is not currently common in use but its demand is increasing over time.
• This model gives more control when needed, but can take advantage of public cloud benefits.
• Community clouds are very rare and less known as its not used by its users.
• The cloud infrastructure is owned and shared by several organisation like research groups, companies working together and even governmental organisation.
• It is basically a private cloud but with multiple organisation
SECTION 2.6 Characteristics
On-Demand Self- Service
• It can add additional computing resources
• It can help to reduce resources when there is less demand
• Adding or reducing of these resources can be done without any technical support
Broad Network Access
• Customers can access the cloud service over internet
• Customer can maange the cloud from anywhere
• There is no need for any dedicated VPN or remote connectivity to access these services
Resource Pooling
• In cloud resources will be shared with other customers but there are option provided to restrict it.
• Resources allocation are all dynamic. That is when a customer application requires more resources it will be dynamically allocated from the pool.
• These resources can be allocated from any geographical location.
Rapid Elasticity
• Cloud has the capability to allocate or de-allocate resources dynamically
• The criteria for scaling up and down can be defined by the customers
• The dynamic allocation gurantees the performance of the application deployed in the cloud with optimum resources.
Measured Service
• In cloud, customers are charged based on the usage of the resource.
• There will be mechanism to automatically mesaure the usuage of the resources.
• Billing will be based on pay-per-use which benifits the customer.
Section 3- PROJECT PLAN
My project plan is to Design a cloud network and give the best proposal to my client who is a software development organization. In order to achieve each aspects and meet all requirement for my client my project plan will provide a meaning and definition of the whole project which will also include the objectives and the goals. The project plan will also acts as an agreement between the clients, the project manager, people who are sponsoring the project and other associates who are affected by the project.
The Project Plan defines the following:
• Project Scope
• Project Requirements
• Project objectives
• Project management approach
• Assumptions and constraints
• Project budget
• Project timeline
• The conceptual design of the technology
Section 3.1 Project Approach
I have taken step by step process in order for the project to be completely successful and completed before the deadline.
STEP I: Complete the ethics form and get it signed and approved by the supervisor
STEP II: Start with the project proposal and review it with the supervisor in order to get it approved so the project can move forward.
STEP III: Start with the contextual report for the projedct which covers all the main aspects on how the project will be undertaken and finished.
STEP IV: Propose a design for the client in packet tracer.
STEP V:To start witht he design for the security which is included in the network
STEP VI: Testing of the system and records all faults and fixing it
STEP VII: The final and complete design with all implementation made according to the client.
SECTION 3.2 Initial Project Risk Assessment
Risk Risk Level
L/M/H Likelihood of Event Mitigation Strategy
Project Size H Certainty Break task and creating a Ghantt chart to make the project easy
Person Hours H: Over 500 Certainty Taking help from the supervisor if needed and doing lot of research.
Estimated Project Schedule H: Over 6 months Certainty Create a Ghantt chart which will help in future planning
Project Definition
Available documentation on the project M: More than 75% complete/current Likely Information to be gathered in the website.
Cost Estimates L: Softwares used in the computer lab and other resources gathered from university Unlikely Adapt if any cost comes in way.
Timeline for the project M: No derailment in the timeline Somewhat likely The timeline will be revieved and checked by the project manager and the supervisor.
Number of Team Members L: Independent Project Unlikely Full responsibility on the project manager and does not have to depend on anyone.
Project Leadership
Supervisor L: Helpful Unlikely Gets feedback to improve
Project Management
Methodology Used L: Methodology familiar the manager. Unlikely N/A
Change in procedure L: Well-defined Unlikely N/A
Quality Management which leads to unclear Procedures L: Well-defined Unlikely N/A
Software
Software testing L: Never Unlikely All resources provided in the university lab.
Lack of Knowledge of Package L: Never Unlikely Training given on how to use the specific software related to the project
Section 3.3 Gannt Chart
Section 4- PLANNING YOUR ARTEFACT
Section 4.1 Problem Definition
Majestic software Development Company who has run as an independent business for the last 8 years developing new software and sell their products to different clients. The company has three different departments which are divided into development, testing and trainee in which all these departments receive a high speed internet connection. My client wants to expand his horizon over the World Wide Web by introducing his entire product online for users to download and pay for the service. The company wants to move services to cloud as much as possible as its more cheap, flexible, easy to recover and want to get all the feature of a cloud network which can boost up the company. I have been appointed by the company to present and built the Cloud Based Networking Proposal to satisfy every need for my client. Majestic software Development Company prefer Cloud Services over Local Services due to its advantages. The cost to build the network is the company’s 2nd priority.
Section 4.2 Problem Explanation
Cloud storage is one of the main proposals used in todays works and the demand is very big as everyone is starting to adopt it,and is increasily gaining more attention because of its many different feature like cost used to maintaining and its elasticity. There are also some negative impacts as well, one of them is the security concerns as it’s a high risk when data which is stored is outsourced to a another cloud provider who is a third party which can result the data to be compromised.
It is important for the cloud providers to allow cloud customers to confirm the trust of the data which is been outsourced in the cloud which will allow the users the need to know if their data has been corrupted on purpose or compormised by malicious act by an insider or outsider attacks.
If any kind of detection is made in the outsourced data which results in corruption,then necessary steps need to be taken to fix the data which got corrupted and getting back the original data. Nonetheless, in a single server if all the data is vulnerable to the single point of failure which can cause a problem resulting the vendor to lock-ins. There is a solution to this problem is by to stripe data across multiple servers, by doing this it will result in to fix the server which is failed and will allow the data to be read from other surviving servers. It will also help to rebuilt the data which was corrupted from the failed server and write the data which is restored to a new server. The 2 models which are proposed for this is POR and PDP for a single server case.To check multi-server settings using replication and erasure coding i will be implementing MR-PDP 16 and HAIL 11.
Section 4.3 Project Requirement analysis and solutions
The following details the list of solutions based on the project requirements
1. To setup a website on the cloud, the organization can avail a website hosting service provider. A domain name can be purchased for the website, with the required name. A hosting is also purchased, to setup the website, which is then mapped with the domain name. Services providers like Godaddy, host gator offer these services.
2. Email accounts can be purchased and mapped with the required name using services like google apps.
3. Google apps also offer data storage services along with its plan.
4. Dedicated systems can be purchased on a monthly or annual basis from service providers like Godaddy, Hostgator etc on which applications can be hosted.
5. As there are 100 users, 3 nos of 48 port switches is proposed considering future expansion plans. ADSL or cable modem router can be purchased for internet access
6. Internet connection, which can be ADSL or cable, can be taken as a service at the respective location of the organization.
Section 4.4 IP Network Design for LAN users
The LAN IP network addresses of 192.168.1.100 – 192.168.1.200 with the subnet mask of 255.255.255.0 is proposed for the systems on the network. The IP address 192.168.1.100 is allocated for the LAN interface of the router, which would be the default gateway address for computers in the LAN.
Section 4.5 Network Topology Diagram
Section 4.6 Product list and references
Item Description Quantity
Router
Cisco 2600 Series 2621 ROUTER with high speed interface (ADSL or Cable modem)
1
Switches
48 Ethernet 10/100 ports
3
Internet Connection
ADSL or cable
1
Google Apps for Business
Account for 100 users
100
Hosting
Godaddy hosting for website
1
Dedicated servers
Godaddy dedicated servers
1
Section 5- RESEARCH METHODOLOGY
A very well widespread research will be conducted to get the best results out. A bunch of referenced text and source will be made which includes acknowledged texts from different sources, standards documents, white papers, analysts’ reports and conference journals industry periodicals. Privacy policy, acceptable use policy, terms of use and service level agreements is different kind of data for this research which will be collected from statements about available websites of the cloud vendors. If any information seems to be missing a research of whitepapers, press releases and news articles of cloud computing in different IT magazines will be done. From the list of top 10 Forrester research a cloud computing vendors will be chosen to continue with the project.
Section 5.1 Resources
There are number of resources which I would need to complete this independent project and make sure the best service is provided to the company.The following is number of list of the resources which will be required during the course of conducting the research project.
• Laptop and desktop computer for writing the project and doing the research project.
• Internet access which is vital at both at home and in DIT.
• Access to DIT library which will give me access to a variety of academic resources
• Access to DIT student account to create research project materials. •
• Access to statistical tools
• Network equipment’s borrowed to build the network
REFERENCES
Chen, h. a. (2012). Enabling data integrity protection . Enabling data integrity protection in regeneration coding-based cloud storage .
Dublin institute of technology. (2009). Cloud Computing. Cloud computing and its future , 6-7.
Dublin Institute of Technology. (2010). Cloud Computing:Strategies for cloud computing adoption. Faith Shimba.
Joe.f. (2010). What is cloud computing. Heartland blog .
St Petersburg International . (2011). How cloud computing will reshape the digital age. St petersburg.
Telecoms Academy. (2011). Security in cloud network. Telecoms academy.
APPENDICES
Appendix A: Cloud Deployment model figures
Appendix B: Network Diagram