Eti Project

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

NAVJEEVAN EDUCATION SOCIETY POLYTECHNIC

MICRO PROJECT
Academic year: 2020-21

TITLE OF PROJECT
CLOUDCOMPUTING

COURSE: COMPUTER ENGINEERING

COURSE CODE: CO6I

SUBJECT: ETI

SUBJECT CODE: 22618

1
\

MAHARASHTRA STATE BOARD OF


TECHNICAL EDUCATION
Certificate
This is to certify that Mr. Himanshu Bhoir, Mr. Ashish Pokharkar
& Mr.Vikas Yadev Roll No. 1306,1340 &1333 of 6th Semester of
Diploma in Computer Engineering of Institute, N.E.S POLYTECHNIC
(Code: 0144) has Completed the MICRO-PROJECT satisfactorily in
Subject- ETI (22618) for the academic year 2020-21 as prescribed in the
curriculum.

Place: Bhandup Enrolment No: 1801440102,1801440036 ,1901440100

Date: / /2021 Exam Seat No:

Subject Teacher Head of the Department Principal

2
GROUP DETAILS:

Sr Name of group members Roll Enrolment No.


No. No.

1. Himanshu Bhoir 1306 1801440102

2. Ashish Pokharkar 1340 1801440036

3. Vikas Yadav 1318 1901440100

3
1.0] BRIEF INTRODUCTION

While this decade comes to an end, it’s time to look ahead to what’s in store for
the future. One area where business leaders are looking for continued
development is the cloud. The cloud helps businesses with reducing costs,
boosting efficiency, increasing agility, and assisting in overall growth and
innovation. In the coming years, there are likely to be a variety of developments
that will impact cloud technology. From new abilities to new members of the
workforce, here are some of the trends we can expect in the years to come.

With technology swiftly changing the workforce strategy and business models,
organizations are aggressively adopting cloud services, and are also looking
forward to the recent trends in cloud computing that can help them leverage
their investment in the long run. Among the many current trends in Cloud
Computing, the cloud-based Infrastructure-as-a-Service (or IaaS) and
Platform-as-a-Service (PaaS) industry has doubled in size, in just the last two
years, and is projected to grow exponentially over the next three years.
2.0] Aim/Benefits of the Micro-Project
The main motivation behind cloud computing is to enable businesses to get access to
data centers and manage tasks from a remote location. Cloud computing works on the
pay-as-you-go pricing model, which helps businesses lower their operating cost and run
infrastructure more efficiently

3.0] ACTUAL RESOURCES USED

S. Name of
Specifications Qty Remarks
No. Resource/material

1 Operating System Window 7 1

Intel(R) Core (TM) i3-


7100U CPU @
2.40GHcez, 1 2400
2 Hardware 1
MHz, 2 Core(s), 4
Logical
Processor(s)

3 Other resources - -

6
WEEKLY PROGRESS REPORT (Action Plan)
MICRO PROJECT
TOPIC: CLOUDCOMPUTING

ACADEMIC YEAR: 2020-21 NAME OF THE FACULTY: Ms. Yamuna Yamgar

PROGRAM CODE:CO6I COURSE CODE: ETI(22618)


NAME OF THE CANDIDATE: A) Himanshu Bhoir - 1306
B) Ashish Pokharkar– 1340
C) Vikas Yadev - 1333

th
ENROLLMENT NO: 1801440102, 1801440036 ,1901440100 SEMESTER: 6

Plann Name of
Sr. Week Planned ed
Activity performed Responsible Team
no. Start date Finish date
Members
Himanshu,Ashish,Vikas
Discussion and
1 1st
finalization of topic
Himanshu,Ashish,Vikas
Preparation and
2 2nd
submission of Abstract

3 3th Collection of Data Himnashu,Ashish,Vikas

4 4th Implementation Himanshu,Ashish,Vikas


Compilation of Report
5 5th and Presentation Himanshu,Ashish,Vikas
Himanshu,Ashish,Vikas
6 6th
Actual Presentation &
Final submission of
Micro Project

Sign of the Faculty


INDEX
Academic year: 2020-21 Name of the faculty: Ms. Yamuna Yamgar

Program code: CO6I Course & course code: ETI(22628)

Name of the candidate: A) Himanshu Bhoir - 1306


B) Ashish Pokharkar– 1340
C) Vikas Yadev - 1333

Enrollment No. 1801440102, 1801440036,1901440100

SR.
NO. CONTENT PAGE NO.

1.0. Brief Description 10,11,13,14,15,161,17,18,19,


20,21,22,23,24,25

2.0. Aim of Micro project 26

3.0. Course Outcomes 26

4.0. Resource Used 27

5.0. Skill Developed / learning out of this 27


Micro-Project

6.0 CONCLUSION 28

8
CLOUDCOMPUTING

CLOUD COMPUTING is a technique where Data owners or can say users can remotely store their data in the
cloud to enjoy on demand high quality applications and services from a shared pool of configurable
computing resourc
resources.
es. Cloud computing is an internet
internet-based
based model of computing, where the shared
information, software and resources are provided to computers and other devices upon demand. This
enables the users to access the cloud computing resources anytime from any suita
suitable
ble platform such as a
cell phone, mobile computing platform, desktop and laptops.

Cloud computing is the use of computing resources (hardware and software) that are delivered as a
services over a network (typically the Internet) i.e it is defined as tthe
he means of delivering any and all
technology – from computing power to computing Infrastructure , services and applications to users as a
service whenever and wherever they required it. The data and the software applications required by the
users are not stored on their own computers; instead they are stored on remote servers which are under
the control of other hosts.

9
“Cloud” is simply a metaphor for the internetHence, Cloud Computing is also known as “
Internet computing”.The cloud itself is a set of hardware , networks , storage , services and interfaces that
enable the delivery of computing as a service.

Why Cloud Computing?cloudcomputingThe cloud makes it possible for you to access your information from
anywhere at any time. While a traditional computer setup requires you to be in the same location as your
data storage device. The cloud removes the need for you to be in the same physical location as the
hardware that stores your data. Economically, the main appeal of cloud computing is that users only pay for
what they actually use. Resources are available to be accessed from the cloud at any time, and from any
location via the internet. There’s no need to worry about how things are being maintained behind the
scenes .Because of this, cloud computing has also been called “Utility Computing” or “IT on demand”

Cloud Computing will lead to increase in the following categories:

 Virtualization
 Agility
 Standardization
 Scalability

How can you use the Cloud?

Cloud Computing is a subscription-based service. One can understand the concept of cloud computing by
considering their experience with E-mail.email_logoYour email client, say Gmail, takes care of housing all of
the hardware and software necessary to support your personal email account. When you want to access
your email you open your web browser, go to the email client, and log in. The only requirement is you need
to have an internet connection in order to access the cloud. Your email is not housed on your physical
computer, you access it through an internet connection, and you can access it anywhere. An email client is
similar to how cloud computing works. The devices that could support cloud computing services can be a
desktop, laptop, tablet, or phone.

10
History of Cloud Computing

Idea that revolutionized Cloud Computing is moving from Clustering Computing to Grid Computing. Concept
dating back to the 1960’s by John McCarthy, a computer scientist, brought up the idea that

The concept of Cloud computing originated in early 90s and has progressed significantly over time
as under :
 1960 – John McCarthy opined that “computation may someday be organized as a public
utility”.
 1990 – Usage of “Cloud” terminology to indicate large networks
 1999 – On Demand service started by salesforce.com
 2001 – IBM creates a roadmap for SaaS concept
 2005 – Amazon offers excess capacity on utility computing and storage basis
 2007 – Google, IBM and several universities initiate research projects on cloud computing.
 2008 – “Cloud computing will shape the relationship among consumers of IT services, those who use
IT services and those who sell them” – Gartner
The need for Cloud computing was triggered by various factors, the major ones being :
 Huge Investment in Data Centres – The traditional data centres are highly capital intensive with
rising demands for infrastructure. There are 11.8 Million servers in data centres spread across the
world. The number of servers has doubled from 2006 to 2011. The space requirements and power
consumption for these data centres is growing exponentially. Average power consumption per server
has quadrupled in the last five years.
 Usage – Most of the data centres have a significantly high proportion of unutilized capacity. Most of
the servers are utilized at only 15% of their full capacity.
 Enterprise Applications – The annual spend on purchase and maintenance of software is currently
around 800 Billion USD. 80% of the IT budget of organisations is spent on software purchase,
installation and maintenance.
 Scalability Issues – The major issue pertains to software obsolescence and repeated software
upgrades. While there is a large scale data growth, the expectations levels for response time have
become quite stringent, with the organisations expecting a faster response.
 Business Needs – There are rapid changes in business requirements, with the applications
consolidating data from diverse sources.
 Cost Effectiveness – It is estimated that a transformation to Cloud technology can result in IT cost
savings of 50% to 90%.

11
Model
Cloud computing is a model for facilitating seamless, convenient and on-demand access to a common pool of
resources like servers, networks, processors, storage, applications, and services, that can be easily configured
and provisioned with minimal effort. The model for cloud computing comprises of essential characteristics,
service models and deployment models.

Key Attributes :
The Key attributes of the Cloud Model are as follows :
Shared, standard service – it is built for a bigger pool (public) and not for a single customer.
Solution-packaged – it is generally a turnkey offering, which integrates all the required resources
Self-service – incorporates user-friendly administration and provisioning of applications and infrastructure.
Elastic-scaling – it is truly dynamic in nature and can be scaled to meet the increasing demands.
Use-based pricing– The pricing model is flexible, supported by service metering and the users are billed as
per usage.
Access - Easily accessible via the Internet
Standard User Interfaces – Accessible via browsers, thin clients and underlying technologies
Service Models:
Software as a Service (SaaS) - The consumer has access to use the applications running on a cloud
infrastructure. The consumer accesses the applications from client devices through a thin client
interface like web browser or an application program interface. The consumer has no control on the
underlying infrastructure i.e. hardware, network, servers, operating systems, storage, memory. There
could be specific cases where the consumer may have exceptional access to the configuration
settings at an application level. The service provider provisions the customer with ready-to-use
applications, accessible from client devices as on-demand services. The examples of SaaS are -
Salesforce, DocLanding, Zoho, Workday which are used for different purposes such as human
resource management, billing, email etc.
Platform as a Service (PaaS) -. The consumer has access to deploy self-created or acquired applications onto
the provided cloud infrastructure. The consumer does not control the underlying infrastructure but can
manage the deployed applications and configurations for the hosting environment. PaaS can have a constraint
by way of the services that the application can request from the operating system. The examples of PaaS are
Google App Engine, LoadStorm, which are used for deploying and testing web based applications.
Infrastructure as a Service (IaaS) - The consumer has the access to shared resources like memory, processing,
storage, and networks where the consumer can deploy and run software, including operating systems and
applications. The consumer has control over operating systems, storage, applications and some components
of the network. The service provider provisions infrastructure i.e. memory, cpu and storage. The consumer
can deploy and run operating system and software. It optimizes the hardware and software licensing cost in

12
all layers. The examples of IaaS are Amazon S3 and FlexiScale, which are used for storage and maintaining
virtual servers.

Deployment Models:Private cloud – Cloud infrastructure is created for exclusive use by an organisation,
which may comprise of multiple business units. The Cloud Infrastructure may be owned and supported by the
organisation, a third party, or a combination of these. The Infrastructure could exist within the organisation’s
premises or at a remote location.
Community cloud - The infrastructure is created for the exclusive use by a group of consumers from
organisations that have certain common features and requirements. It may be owned and supported by one or
more of the participating, a third party, or a combination of these. The Infrastructure could exist within the
premises of any of the organisations or at any remote location.
Public cloud - The infrastructure is created for use by anyone. It may be owned and supported by a corporate,
academic, or public organisation, or a combination of these. The infrastructure is hosted at the premises of the
provider.
Hybrid cloud - The infrastructure is a combination of two or more cloud infrastructures that continue to
remain as separate clouds, but are integrated seamlessly to enable portability of data and application across
the clouds.

Comparison of Deployment Models :

Model Private Cloud Community Cloud Public Cloud Hybrid Cloud

Organisation or Organisations or Organisation or


Ownership Third Party
Third Party Third Party Third Party
Exclusive use by Organisations with Combination of
Usage General Public
Organisation similarities other Models
Provider's Combination of
Location On/ Off Premises On/ Off Premises
Premises other Models
Organisation or Organisations or Combination of
Management Third Party
Third Party Third Party other Models

13
14
Essential Characteristics:
1. Self-service On-demand – The consumer or user has the option of provisioning computing resources
like network, storage, processors, and servers as per their requirements without too much of a
human intervention.
2. Network access - The resources are available to the consumer over the network and accessed
through thin or thick clients like desktops, Laptops, Tablets, Mobile phones.
3. Resource pooling - The service provider’s resources are pooled to service many consumers
simultaneously using a time-sharing model, with the physical and virtual resources allocated
dynamically according to the varying demand from consumers. The whole mechanism is
independent of location, since the customer is neither concerned nor affected by the physical
location of the resources that he is utilising.
4. Rapid elasticity – The resources available to a consumer can be dynamically provisioned and
released. Usually the resources are scaled according to the demand for these resources. This
dynamic allocation gives an impression of unlimited availability of the resources to the consumer.
5. Measured service - Cloud computing ensures the utilization of a metering capability to evaluate the
usage of resources by the consumer, so that the consumer can be billed for his resources as per the
quantity of usage.

15
What technologies is Cloud Computing replacing?

Cloud computing is replacing large Corporate Data Centers.

expensive private server infrastructure.

Web 2.0, Enterprise and government users are adopting cloud computing because it eliminates capital
investment in hardware and facilities as well as reduces operations labor.

Companies leading in cloud Computing

GOOGLECompanies leading in Cloud Computing

Google has invested more than $2 billion a year in data centers for cloud computing. Google “101” is a
Network made up of millions of cheap servers, that would store staggering amounts of data, including
numerous copies of the world wide web.

Cloud computing helps to Make Google search faster, ferret out answers to billions of queries in a fraction
of a second.

AMAZONCompanies leading in Cloud Computing

Amazon introduced Amazon Elastic Compute Cloud “Amazon EC2” which is a web service interface that
provides resizable computing capacity in a cloud which designed to make web-scale computing easier for
developers and reduces the time required to obtain and boot new server space from weeks to minutes.

MICROSOFTCompanies leading in Cloud Computing

Introduced ” Azure” which is a Internet-scale cloud computing and services platform hosted in Microsoft
data center Designed to help developers quickly and easily create, deploy, manage, and distribute web
services and applications on the internet .

IBMCompanies leading in Cloud Computing

IBM’s system introduced in the mid 2000’s is called Blue Cloud.

YOUTUBE

Youtube would not function without cloud computing. The simultaneous Sreaming& Uploading of files by
million users would not be possible without Cloud Computing.

Companies leading in Cloud Computing.

FACEBOOK

Facebook uses cloud computing to serve Million of users at once.

Services offered by Cloud Computing technology

Cloud Services differ in the amount of control that you have over your information.cloudcomputing

Software As a service (Saas) – This model is based on licensing software use on demand, which is already
installed and running on cloud platform. A single instance of the service runs on the cloudand multiple end

16
users are serviced. SaaS makes it unnecessary for you to have a physical copy of software to install on your
devices.

Saas Is offered by : Google , Salesforce.com

Platform as a service(Paas) – In this delievery model , a layer of software or development environment is


encorporated and offered as a service , upon which other higher levels of service can be built. The customer
has the priviledge to build his own applications.

Paas is Offered by :Engineyard And Azure.

Infrastructure as a service(Iaas) – In this delivery model , it provides basic storage, operating systems,
computing capabilities as standardize services over the network. Hence also known as hardware as services.

Iaas is Offered by : Amazon and GoGrid.

Cloud Computing Pros:

 Reduced Hardware equipments for end users


 Improved Performance
 Lower Hardware and Software maintenance
 Instant software updates
 Accesibility
 Less Expensive
 Less Expensive
 Better collaboration
 Pay for what you use
 Cloud Computing cons:
 Security Issues
 Internet connection
 Too many platform
 Time for Transition
 Speed

Lets say for example, the employees in a particular organization are having their personal computers and
right hardware and software is being installed in it for doing their jobs. If say, another employee joins the
organization, we need to buy a new software for that computer so that he can perform his task, which is
indeed a tiresome task. So, instead of installing a software everytime, we need to load just one application.
That application allows the user to log in to Web based service which hosts all the programs that user
needs for performing his job.

Characteristics define cloud data asRemotely managing infrastructure such as desktops, laptops etc. It also
includes storage management and server management.

Data are available from anywhere.

Commodification.

Layers of Cloud Computing

17
IaaS (Infrastructure-as-a-Service) :-It involves servers, network devices, and storage disks which are made
available to the organization according to their need.Companies uses IaaS to build new versions of
applications.They are basically used in hosting and monitoring of websites and make them run without any
fault.

1. PaaS(Platform-as-a-Service):-It provides platform for creating applications. It deploys Customer


created applications. Web applications can be made without installing tools on computer.
2. SaaS(Software-as-a-Service) :- Applications run over here and are provided to the users based on
their demand.
3. Virtualization:- virtualization is the process in which the software is used to allow a piece of
hardware to run multiple operating system images at the same time and so does the cloud
computing works.
4. Resilient Computing:- Resilience is maintaining the level of service inspite of faults, threats and
challenges. Hence resilient computing can be defined as a service that can be trusted, even when
facing challenges.
5. Homogeneity or uniformity.
6. Geographic Distribution
7. Virtualization.
8. Service Orientation:- Basically the interaction between the computing entities such as, programs.
9. The software cost is comparatively low
10. Security is maintained.
11. Flexible and elastic.
12. Payment on the need basis.

Benefits of cloud computing

More work can be done in minimum time.

Can be accessed anywhere, anytime on a condition that they should have an internet connection.

Big money is not spent on licensing or any software.

Cost efficient.

Backing up data and restoring is much easier.

Disadvantages of cloud computing

1. Security issues:- Cyber Crime can be the issue as the process works purely on internet.
2. Data transfer:- It’s a time consuming task to transfer data in or out of the cloud.

Latency can be the major issue as the all data is not available on our computer.

Not that flexible as upgrades result in loss of data sometimes.

Cloud Computing Applications And Security Issues For basics information of cloud computing please visit:

1.Cloud Computing Basics

2.Cloud Computing Implementation

18
Cloud Computing Implementation:Cloud Computing provides enormous storage capacity as a
service to the end users. Cloud computing is the better way to run a business. Instead of running
applicationsonself, they run on a shared data center. Where one uses any application that runs in the cloud,
he/she just logs in, customizes it and starts using it. The most common examples of cloud computing is
Google mail, Yahoo mail etc.

PC access from anywhere using Cloud:Is storage of your work computer is limited? Space is full of your
mobile phone or tablet? If you are using internet in those devices then you should have access of
computer’s hard drive from anywhere.

Create your own personal Cloud PC:

For this purpose you have to setup remote access in your computer. You will need to install the small server
application. You can download server software from LogMeIn For the windows and Mac Os. After the
installation process you have to create an account or login through existing account (if you have any).After
login you can setup your desired shared folders. Now you can access your files by simply login from other
computers / tablets. Now you can run programs & access your home system from anywhere. You can buy
network connected hard drive like buffalo cloudstation for remotely access your files.

If you replace the content of the web browser to your mobile / tablet device to access the smartphone
platform, there are many free apps. For this you will need to install these apps on your home PC. You can
download The Free Application for- Toledo IOS, Android, Windows Phone 7 and BlackBerry it works on WI-
Fi and 3G network connections. Similarly, the personal cloud Podcast application to convert your computer
is free.

Streaming Music from PC:

If you have audio streaming subsonic app for(iOS, Android), it can be used. desktop software for Windows,
Mac or Linux can be downloaded from www.subsonic.com . By creating an account you have to create
folders, then the files can be shared.

Supercharge your Drop Box:

Drop box online file storage may be more than handy. you can access DropBox using the Dropatuns. Visit
www.droptun.es and create your account for DropBox. You can access your files in a Web browser and can
play without having to transfer. After Dropatuns , you can stream the file over your iPhone or iPad via iOS
app. The conversion or transfer of files is also available.

19
CloudSecurity

If you need milk what will you do … “Buy a cow” or “Buy Milk”. this is cloud computing all about these days.
Two things are sure Consumer love cloud based file share and storage system and consumers have concerns
about cloud based file share and storage system.

Cloud Security :Since Cloud Computing is a “network of networks” over the internet, therefore chances of
intrusion is more with the erudition of intruder’s attacks. Different IDS techniques are used to counter
malicious attacks in traditional networks.Intrusion Detection System : An intrusion detection system (IDS) is
a device or software application that monitors network or system activities for malicious activities. It detects
policy violations and produces reports to a management stations.

Types of IDS:

HIDS(Host intrusion Detection system): Host Based Intrusion Detection System Deploying HIDS in hypervisor
or host machine would allow the administrator to monitor the hypervisor and virtual machines on that
hypervisor. But with the rapid flow of high volume of data as in cloud model, there would be issues of
performance like overloading of VM hosting IDS and dropping of data packets..

NIDS(Network Intrusion detection system): Network Based Intrusion Detection System will be more reliable
and efficient in this context.If placed outside the VM servers on bottle neck of network points such as
switch, router or gateway for network traffic monitoring to have a global view of the system. Such NIDS
would still be facing the issue of large amount of data through network access rate in cloud environment.

Intrusion detection system

A NIDS is placed on a network to analyze traffic in search of unwanted or malicious events. Network traffic is
built on various layers; each layer delivers data from one point to another.Two main component types
comprise a NIDS appliance and software only.

With an IDS, the “system” component is vital to efficiency. Basically NIDS comprises of many physically
separated components.

 Sensor
 Management Server
 Database Server
 Console
1. Passive Sensor : A passive sensor analyses traffic that has been copied from the network versus
traffic that passes through it.
2. Network Tap : A network tap copies traffic at the physical layer.

Although the detection portion of an IDS is most complicated, the goal of the IDS is to make the network
more secure, and the prevention portion of the IDS must accomplish that effort. After malicious and
unwanted traffic is identified, using prevention technique can stop it. A choke point would be any point in a
network where traffic is limited to a small number of connections. An example is usually a company’s
20
internet boundary, where traffic crosses only a router and a firewall. The links between the router and
firewall are perfect choke points and good places to consider placing sensors.

5. Benefits
Cloud Computing results in several benefits to the customer as well as the service providers. The technology
basically reaps the benefits of time-sharing and economies of scale. The benefits can be listed as under :
• Cost Saving – Usage of Cloud Infrastructure has a huge potential for cost benefits. Since the
resources are shared across multiple applications hosted in the cloud, it reduces the costs. These
benefits would accrue from :
• Pay as per usage
• Economies of scale
• Resource sharing
• Shifting Capes to Opex - Enterprises adopting cloud technology move their investments from capital
expenses (CapEx) to operating expenses (OpEx), allowing them to focus more on innovation and
operations, instead of building and maintaining an IT infrastructure.
• Flexibility - Cloud computing enables faster set-up and ramp-down of resources. When a project is
funded, service can be initiated, and then if the project is completed, we can simply terminate the
cloud contract.
• Accessibility – Easy accessibility to the Infrastructure from anywhere, over the net.
• Scalability – The Infrastructure can be easily scaled as per requirements, due to time-sharing
of the resources and load balancing across resources. As a consequence, the end-customer
feels an Infinite scalability potential.
• Ease of maintenance – The service provider takes care of the software maintenance. They ensure the
availability of the application with latest versions and updated patch sets.
• Upgrades
• Patching/ Bug-fixes
• Backups
• Prototyping – Cloud computing enables ease in large scale prototyping and load testing. This refers
to simultaneous spawning of multiple servers in a cloud to test the application load and then release
them when it the testing/ prototype is completed.
• Operational Benefits – The software license and deployment cost is apportioned across multiple
customers due to economies of scale.
• Instant Deployment
• Licensing Cost
• Platform Diversity - Cloud infrastructure offers support for a wide range of client platforms and
operating systems.
• Faster Development – Cloud can provide the basic infrastructure, operating system and Tools on-
demand, thereby accelerating the development cycle, whereas we would spend a significant amount
of time in setting up the basics in a traditional in-house infrastructure.

21
• Guaranteed Up-times – The service provider guarantees a minimum up-time ensuring uninterrupted
service availability.
• Disaster Recovery – The service provider ensures business continuity and immediate recovery in case
of disaster.
• Reduction in IT Staffing cost

6. Mobile Cloud Computing

There has been a sporadic growth in mobile applications spanning various categories like games,
entertainment, social media, news, business and travel. These applications are highly popular due to the user's
location independence, but they also have a share of issues by way of resource scarceness, finite energy and
low connectivity. This limitation could be addressed by using resources external to the mobile devices for
execution of the applications. The data storage and processing happening outside the mobile device gives rise
to the concept of mobile cloud.
The computing and storage capabilities of mobile cloud facilitates the execution of resource-intensive
applications on mobile devices. Mobile cloud computing involves an application on a remote server, accessed
through a thin client mobile device. Sometimes the mobile devices could also be a resource provider, thereby
creating a mobile peer-to-peer network, utilising the resources of the mobile devices in the vicinity. Another
approach involves the mobile device offloading a part of the computation workload to a local ‘cloudlet’
comprised of several multi-core computers with connectivity to the remote cloud servers. Mobile Cloud uses
either VM migration or Mobile code to offload tasks rather than the conventional Client–Server
Communication systems.
Mobile cloud inherits the security risks of normal cloud computing. However, mobile clouds also involve a
group of issues that are particular to mobile devices offloading jobs through wireless communication
channels. In addition, it is also liable to security concerns specific to mobile devices. A key concern exhibited
by people pertains to their personal data on mobile device, which is liable to be stored on, or accessed by the
cloud. A mobile device contains personal information. However, a personal computer also stores such
personal data and a conventional cloud could also access such data. Thus, the risks involved in mobile cloud
are not necessarily greater than those involved in traditional clouds. However, the issue here is whether the
means of handling those risks have been properly implemented in the mobile cloud. Users would need to feel
confident when offloading their jobs to other surrogates such that their privacy would not be violated.
Although many of the reviewed frameworks mention the need for security and trust, very few of them have
actually implemented it and have left the implementation for future directions.

7. Cloud Manufacturing

The manufacturing industry is undergoing a major transformation enabled by IT and related smart
technologies. Cloud computing is one of such technologies. The main thrust of Cloud computing is to provide
on-demand computing services with high reliability, scalability and availability in a distributed environment.
Cloud computing is considered a multidisciplinary field as a result of convergence of several computing
22
trends such as Internet delivery, ‘‘pay-as-you- go/use’’ utility computing, virtualization, distributed and grid
computing. Implementing cloud computing means a paradigm shift of business and IT infrastructure, where
computing power, data storage and services are outsourced to third-parties and made available as
commodities. The manufacturing industries have been adopting cloud services focussed around BPM
applications. Cloud computing can also offer better and effective solutions by moving traditional processes to
cloud for improved operational efficiency. This goes very well with the DAMA (Design anywhere
Manufacture anywhere) approach, which propagates the ability to exchange design and manufacturing data
across multiple sites. Cloud computing is emerging as a key enabler for manufacturing industry, helping it
create intelligent factory networks that encourage effective collaboration. Users could request services like
product design, manufacturing, testing of products. It is a step in moving from production-oriented
manufacturing to service-oriented manufacturing.

8. Limitations
The Limitations of Cloud Infrastructure are as follows :

• Privacy
• Security
• Internet Access
• Product dependency
• Possibility of Data Loss/ Leakage
• Application Interfaces/ Customisations
• Geographical location of data – Since the data is in the cloud, we may not know the physical location
where the data resides. This could violate the regulatory requirements of some countries.

Security Challenges :
One of the major concerns faced by clients in adopting Cloud Technology is the challenges in respect of
security. These can be broadly classified as :

Authentication :
The User information for distinct services is stored on the cloud, which is susceptible to unauthorized access.
This necessitates the provision of an identity management system for authenticating the users and services.

Access Control :
The cloud needs to have well-defined access control policies to identify and restrict the access to only
authorized users. Service Level Agreements may be established for the access control services.

Service Management :
The Service providers may package the services to create and offer a composite service to meet specific
customer needs.

23
Cloud Vendors & Services Offered

Backup Backupify, JungleDisk, Mozy, Online Backup, SpiderOak, Zmanda


Amazon EC2, AT&T Synaptic, CloudSigma, GoGrid, LayeredTech, Navisite, Verizon
Computation
CaaS, Rackspace
IaaS Content Delivery Amazon CloudFront
Cloud Management enStratus, New Relic, RightScale, Sytanding Cloud
Service Management CloudWatch, Scalr, ylastic
Storage Amazon EBS, Amazon S3, AT&T Synaptic, EMC Atmos, Rackspace, Zetta
Birst, Clario, Cloud9, ColdLight Neuron, Datameer, K2 Analytics, Oco, PivotLink,
Business Intelligence
Quantivo, Sterna, Vertica
Database Amazon RDS, Amazon SimpleDB, Cloudant, MS Azure, Rackspace Drizzle
BrowserMob, CollabNet, Keynote, LoadStorm, Rational SDS, RhoHub, SkyTap,
Development & Testing
SOASTA, WhiteHat Sentinel
PaaS
Amazon SNS, Amazon SQS, Apigee, Appian Anywhere, Boomi, IBM Cast iron,
Integration
Informatica, SnapLogic
Caspio, Engine Yard, Etelos, Force.com, Google App Engine, Heroku.com, InfoDome,
General Purpose
LongJump, OrangeScape, Qrimp, Rollbase, SmartPlatform, Vmforce.com

Billing Aria, eVapt, Redi2, Zuora


Acrobat.com, Box.net, ExpanDrive, IBM Lotus Live, MindQuilt, MS Office Live,
Collaboration
NetDocuments, SocialText
SaaS Content Management Clickability, Crown Peak, Mosaic, NetDocuments, SpringCM
Financials AstoriaSoftware, DocLanding, NetDocuments, SpringCM
Personal Usage Google Docs, MS Office web Apps

24
2.0 Aim/Benefits of the Micro-Project
Cloud computing offers your business many benefits. It allows you to set up what is essentially a
virtual office to give you the flexibility of connecting to your business anywhere, any time. With the
growing number of web-enabled devices used in today's business environment (e.g. smartphones,
tablets), access to your data is even easier.

3.0 Course Outcomes Addressed


Describe Artificial Intelligence, Machine learning and deep learning
Interpret IoT concepts
Compare Models of Digital Forensic Investigation.
Describe Evidence Handling procedures.
Describe Ethical Hacking process.
Detect Network, Operating System and applications vulnerabilities

25
4.0 Actual Resource Used

S. Name of
Specifications Qty Remarks
No. Resource/material

1 Operating System Window 7 1

Intel(R) Core (TM) i3-


7100U CPU @
2.40GHcez, 1 2400
2 Hardware 1
MHz, 2 Core(s), 4
Logical
Processor(s)
3 - -
Other resources

5.0 Skill Developed / learning out of this Micro-Project

1. Increase the IQ level.


2. Helps in increasing the knowledge.
3. Identifies a variety of potential sources of information.
4. Can select those that are appropriate to a given need.
5. Scheduling of Project.
6. Documentation of Project.
7. Developed efficient and effective search strategies.
8. Understands standard systems of information organization.
9. Identifies and retrieves information relevant to the question/need

26
6.Conclusion

In conclusion, cloud computing is recently new technological development that has the
potential to have a great impact on the world. It has many benefits that it provides to it
users and businesses. For example, some of the benefits that it provides to businesses, is
that it reduces operating cost by spending less on maintenance and software upgrades
and focus more on the businesses it self. But there are other challenges the cloud
computing must overcome. People are very skeptical about whether their data is secure
and private. There are no standards or regulations worldwide provided data through
cloud computing. Europe has data protection laws but the US, being one of the most
technological advance nation, does not have any data protection laws. Users also worry
about who can disclose their data and have ownership of their data. But once, there are
standards and regulation worldwide, cloud computing will revolutionize the future.

27
Micro Project Evaluation Sheet

Name of Student: Himanshu Bhoir Enrolment No: 1801440102

Name of Programme: Computer Engineering Semester: VI

Course Title: Emerging Trends(ETI) Code: 22618

Title of Micro Project: CLOUDCOMPUTING

Course Outcomes Achieved:


Describe Artificial Intelligence, Machine learning and deep learning
Interpret IoT concepts
Compare Models of Digital Forensic Investigation

Sr. n Charateristic to Poor (Mar Average(Ma Good(Mar Excellent(Ma Sub


O be assessed ks 1-3) rks 4 - 5) ks 6-8 ) rks 9-10) Total
(A)Process and Product Assessment(Convert above total marks out of 6 marks.)

1. Relevance to the
Course
2. Literature
Review/information
collection
3. Completion of the
target as per project
proposal
4. Analysis of data
and representation
5. Qualityof
Prototype/Model

6. Report Preparation.
(B) Individual Presentation/Viva (Convert above marks Total Marks out of 4)

7. Presentation

8. Viva

(A) (B) Total Marks 10


Process and Product Individual
Assessment (6 marks) Presentation/Viva(4 marks)

Comments/Suggestions about team work.leadership/inter-personal communication


……………………………………………………………………………………….

Name and designation of the Teacher Ms. Yamuna Yamgar

Dated Signature ……………………………………………..


33
Micro Project Evaluation Sheet

Name of Student: Ashish Pokharkar Enrolment No: 1810440036

Name of Programme: Computer Engineering Semester: VI

Course Title: Emerging Trends(ETI) Code : 22618

Title of Micro Project: CLOUDCOMPUTING

Course Outcomes Achieved:


Describe Artificial Intelligence, Machine learning and deep learning
Interpret IoT concepts
Compare Models of Digital Forensic Investigation

Sr.n Charateristic to Poor(Mar Average(Ma Good(Mar Excellent(Ma Sub


O be assessed ks 1-3) rks 4 - 5) ks 6-8 ) rks 9-10) Total
(A)Process and Product Assessment(Convert above total marks out of 6 marks.)

1. Relevance to the
Course
2. Literature
Review/information
collection
3. Completion of the
target as per project
proposal
4. Analysis of data
and representation
5. Qualityof
Prototype/Model

6. Report Preparation.
(B) Individual Presentation/Viva (Convert above marks Total Marks out of 4)

7. Presentation

8. Viva

(A) (B) Total Marks 10


Process and Product Individual
Assessment (6 marks) Presentation/Viva(4 marks)

Comments/Suggestions about team work.leadership/inter-personal communication

……………………………………………………………………………………….

Name and designation of the Teacher Ms. Yamuna Yamgar

Dated Signature ……………………………………………..

35
Micro Project Evaluation Sheet

Name of Student:Vikas Yadav Enrolment No:1901440100

Name of Programme: Computer Engineering Semester: VI

Course Title: Emerging Trends(ETI) Code: 22618

Title of Micro Project: CLOUDCOMPUTING

Course Outcomes Achieved:


Describe Artificial Intelligence, Machine learning and deep learning
Interpret IoT concepts
Compare Models of Digital Forensic Investigation

Sr. n Charateristic to Poor (Mar Average(Ma Good(Mar Excellent(Ma Sub


o be assessed ks 1-3) rks 4 - 5) ks 6-8 ) rks 9-10) Total
(A)Process and Product Assessment(Convert above total marks out of 6 marks.)

1. Relevance to the
Course
2. Literature
Review/information
collection
3. Completion of the
target as per project
proposal
4. Analysis of data
and representation
5. Qualityof
Prototype/Model

6. Report Preparation.
(B) Individual Presentation/Viva (Convert above marks Total Marks out of 4)

7. Presentation

8. Viva

(A) (B) Total Marks 10


Process and Product Individual
Assessment (6 marks) Presentation/Viva(4 marks)

Comments/Suggestions about team work.leadership/inter-personal communication

……………………………………………………………………………………….

Name and designation of the Teacher Ms. Yamuna Yamgar

Dated Signature ……………………………………………..


37

You might also like