Cloud Computing

Back to Project List

                                        Domain Description

          Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flow charts and diagrams. A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access). Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet and a weak economy, have accelerated interest in cloud computing. 
         A cloud can be private or public. A public cloud sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.) A private cloud is a proprietary netwrk or a data center that supplies hosted services to a limited number of people. When a servce provider uses public cloud resources to create their private cloud, the result is called a virtual private cloud. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services.
Infrastructure-as-a-Service like Amazon Web Services provides virtual server instances with unique IP addresses and blocks of storage on demand. Customers use the provider's application program interface (API) to start, stop, access and configure their virtual servers and storage. In the enterprise, cloud computing allows a company to pay for only as much capacity as is needed, and bring more online as soon as required. Because this pay-for-what-you-use model resembles the way electricity, fuel and water are consumed, it's sometimes referred to as utility computing.
         Platform-as-a-service in the cloud is defined as a set of software and product development tools hosted on the provider's infrastructure. Developers create applications on the provider's platform over the Internet. PaaS providers may use APIs, website portals or gateway software installed on the customer's computer., (an outgrowth of and GoogleApps are examples of PaaS. Developers need to know that currently, there are not standards for interoperability or data portability in the cloud. Some providers will not allow software created by their customers to be moved off the provider's platform. In the software-as-a-service cloud model, the vendor supplies the hardware infrastructure, the software product and interacts with the user through a front-end portal. SaaS is a very broad market. Services can be anything from Web-based email to inventory control and database processing. Because the service provider hosts both the application and the data, the end user is free to use the service from anywhere.



                                                                                                    View Abstract

           Cloud computing has been envisioned as the next generation architecture of IT enterprise becoming domain in IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. In this paper, we deploy a computing cluster on the top of a multicloud infrastructure, for solving loosely coupled Many-Task Computing (MTC) applications. By this way, the cluster nodes can be provisioned with resources from different clouds to improve the cost effectiveness of the deployment, or to implement high availability strategies. We prove the viability of this kind of solutions by evaluating the scalability, performance and cost of different configurations of a single cluster, deployed on a multicloud infrastructure spanning a local data centre and other different cloud sites.

System Requirement Specification:-
DOMAIN : Transactions on Parallel and Distributed Systems
SOFTWARE : Operating System: windows xp, Platform: J2EE
Protocol : TCP, Application server : Tomcat 5.0, Database : MySQL
HARDWARE : Processor: Pentium-IV,Speed: 1.8 GHZ ,RAM: 512 MB, HDD: 80 GB


                                                                                                    View Abstract

            Peer-to-peer (P2P) networks have been emerging as one of the most promising approaches to improve the calability of video-on-demand (VoD) service over Internet. Although a number of architectures and streaming protocols have been proposed in pastyears, there is few work to study the practical performance of P2P-based VoD service especially considering the real user behaviorwhich actually has significant impact on the system scalability. Therefore, in this paper, we first characterize the user behavior byanalyzing a large amount of real traces from a popular VoD system supported by the biggest television station in China,, we examine the practical scalability of P2P-based VoD service through extensive trace-driven simulation under a general system framework. The results show that P2P networks scale well in providing VoD service under real user behavior by saving a considerable percentage of server bandwidth. Moreover, it is observed that adopting hard cache at client side achieves much better system scalability than that with soft cache. We also identify the impact of various aspects of user behavior upon system scalability through detailed simulation. We believe that our study will shine insightful light on the understanding of practical scalability of P2P-based VoDservice and be helpful to future system design and optimization.

System Requirement Specification:-
SOFTWARE : Operating System: windows xp, Platform: JAVA/J2EE
HARDWARE : Pentium-IV Speed: 1.8 GHZRAM: 512 MB;HDD: 80 GB

    (IEEE-2008) (SaaS)

                                                                                                    View Abstract

                 Current research trend towards mobile computing emphasizes the need for distribution of data among various clients in wireless environment. Sharng the data in J2ME opens the data to be accessible for all MIDLETs present on the device, hence creating a number of vulnerabilities to the confidential information that is intended to be shared with specific MIDLETs, e.g. a malicious MIDLET can delete, copy or move the Shared Record Store, in J2ME based application. This project aims at overcoming record store sharing problem through the concept of Multi- Agent System by providing a shared storage with explicit access to authenticated & authorized MIDLETs. With this mechanism data can be shared among specific MIDLETs. The implementation uses the SAGE-Lite framework as a solution to our proposed work.

System Requirement Specification:-

SOFTWARE : Operating System: windows xp, Platform: JAVA /J2ME MOBILE AGENT: SAGE_LITE
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ RAM: 512 MB HDD: 80 GB


                                                                                                    View Abstract

            Multiparty voice over IP (MVoIP)services allow a group of people to freely communicate with each other via the internet, which have many important applications such as online gaming and teleconferencing. In this paper, we present peer-to-peer MVoIP system called peer Talk. Compared to Traditional approaches such as server-based mixing.peerTalk achieves better scalability and failure resilience by dynamically distributing the stream processing workload among different peers particularly. PeerTalk decouples the MvoIP services delivery into two phases: mixing phases and distribution phase. The decoupled model allows us to explore the asymmetric property of MVoIP services (for example distinct speaking/listening activities and unequal inbound/outbound bandwidths) so that the system can better adapt to distinct stream mixing and distribution requirements. To overcome arbitrary peer departures/failures. Peer Talk provides lightweight backup schemes to achieve fast failure recovery. We have implemented a prototype of the peerTalk system and evaluated its performance using both a large simulation testbed and a real intenet environment. Our initial implementation demonstrates the feasiblility of our approach and show promising results. Peer Talk can outperform existing approaches such as P2P overlay multicast and coupled distributed processing for providing MvOIP Services.

System Requirement Specification:-

DOMAIN     : Clolud Computing
SOFTWARE : Operating System: windows xp     Platform: JAVA JDK 1.5.0,JMF 
HARDWARE : Processor: Pentium-IV   Speed: 1.8 GHZ   RAM: 512 MB   HDD: 80 GB


                                                                                   &nbs;                View Abstract

                 The Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher level Internet service providers (ISPs) supply connectivity to the local ISPs and charge the local ISPs for the transit services. One of the challenging problems facing service providers today is how the profitability can be increased while maintaining good service qualities as the network scales up. In this work, we seek to understand the fundamental issues on the "interplay" (or interaction) between ISPs at different tiers. Although the local ISPs (which we term peers) can communicate with each other by purchasing the connectivity from transit ISPs, there stands an opportunity for them to set up private peering relationships. Under this competitive framework, we explore the issues on 1) the impact of peering relationship; 2) resource distribution; 3) revenue maximization; and 4) condition for network upgrade. First, a generalized model is presented to characterize the behaviors of peers and the transit ISP, in which their economic interests are reflected. We study how a peer can distributive determine its optimal peering strategy. Furthermore, we show how a transit ISP is able to utilize the available information to infer its optimal pricing strategy, under which a revenue maximization is achieved. Two distributed algorithms are proposed to help ISPs to provide a fair and efficient bandwidth allocation to peers, avoiding a resource monopolization of the market. Last, we investigate the above issues in a "many-peers region," that is, when we scale up the network. We provide insightful evidence to show that the ISPs can still gain profits as they upgrade the network infrastructures. Extensive simulations are carried out to support our theoretical claims.

System Requirement Specification:-

SOFTWARE : Operating System: windows xp, Platform: JAVA,  DB: MySQL
HARDWARE : Processor:  Pentium-IV  Speed: 1.8 GHZ  RAM: 512 MB   HDD: 80 GB


                                                                                                    View Abstract

                The conditional access system (CAS) is an essential part of digital pay-TV systems for controlling access to the program services. Conventionally, due to the restrictions of bandwidth and computational capability, a CAS only supports period subscription services that are charged on a monthly basis. In this paper, based on the concept of hierarchical key assignment, we propose three key distribution schemes for the access control of pay-TV systems. With these schemes, a CAS can support more charging strategies for service providers, such as adopting a smaller charging unit and allowing a subscription of any subset of channels with little communication and computational overhead. In addition, the piracy management problem can also b dealt with easily.

System Requirement Specification:-

DOMAIN      TRANSACTIONS ON MULTIMEDIA                               
SOFTWARE  : Operating System: windows xp, Platform: JAVA, Protocol: RTP, TooI: JMF   
HARDWARE  : Processor:  Pentium-IV        Speed: 1.8 GHZ    RAM: 512 MB    HDD: 80 GB


                                                                                                    View Abstract

                  This project concentrates on pricing network service dynamically based on the level of service, usage and congestion allows the network resources to be used more effectively. We integrate the proposed Service dependent pricing scheme with dynamic pricing and service negotiation environment. This increases network resource utilization and avoid high call blocking rate. Users are able to maintain stable expenditure, and allowing user to migrate between services classes in response to price increase further stabilizes the individual service prices.

System Requirement Specification:-

SOFTWARE : Operating System: Windows xp , Platform:JAVA, Back end: MySql
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ , RAM: 512 MB, HDD:80 GB


                                                                                                    View Abstract

                  One of the most challenging problems in managing large web-applications is the complexity of security administration and user-profile management. Role based access control(RBAC) has become the predominant model for advanced access control due to the reduced complexity and cost of administration. Under RABAC, security administration is greatly simplified by using roles, hierarchies and privileges, and user management is uncomplicated by using LDAP API specification within the J2EE applcation. System administrators create roles according to the job functions performed in an organization.

System Requirement Specification:-
SOFTWARE : Operating System: windows xp; Platform: JAVA/J2EE,Application
Server       : TOMCAT5.0,API:SAX,DOM, Protocol : TCP /IP, Back End: Ms-access
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ, RAM: 512 MB, HDD: 80 GB


                                                                                                    View Abstract

                 This software is developed for all types of users who requires the secure transmission or storage of data in any kind of media or network. Since the data transmission on the inter net or over any networks are vulnerable to the hackers attack. We ae in great need of encrypting the data. By addition our net transmission in INDIA is very low and hence we are in need to develop the software that encrypts as well as compress the data in order to achieve the maximum output of our effort.
                 This program uses TCP/IP Protocol for data transfer and ports for streaming communication between Client to Client or Client to Server. The need for this software can be categorized in two categories: Encryption and Decryption, Compression.
                  Ø Compression
                  Ø Decompression
                  Ø Encryption
                  Ø Decryption

System Requirement Specification:-

SOFTWARE : Operating System: windows xp, Platform: JAVA                                            
HARDWARE : Processor:  Pentium-IV, Speed: 1.8 GHZ,  RAM: 512 MB,  HDD: 80 GB

                                                                                                                               Back to Project List