CFP last date
15 October 2024
Reseach Article

A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization

by Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam, Bijoya Das
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 8
Year of Publication: 2017
Authors: Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam, Bijoya Das
10.5120/ijais2017451635

Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam, Bijoya Das . A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization. International Journal of Applied Information Systems. 11, 8 ( Jan 2017), 1-7. DOI=10.5120/ijais2017451635

@article{ 10.5120/ijais2017451635,
author = { Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam, Bijoya Das },
title = { A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization },
journal = { International Journal of Applied Information Systems },
issue_date = { Jan 2017 },
volume = { 11 },
number = { 8 },
month = { Jan },
year = { 2017 },
issn = { 2249-0868 },
pages = { 1-7 },
numpages = {9},
url = { https://www.ijais.org/archives/volume11/number8/956-2017451635/ },
doi = { 10.5120/ijais2017451635 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:03:34.238334+05:30
%A Nazmus Sakib
%A Raihan Ahmed
%A Tanvir Ahmed
%A Fahad Bin Islam
%A Bijoya Das
%T A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 11
%N 8
%P 1-7
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a broadly used technology which serves users with resources on specific demand enhancing manageability, minimizing the data management and operational cost. Basically, cloud allows users to store their valuable data on the cloud storage so the security of the data center and easy access are considered as focusable parts in cloud computing. In the study we spot light to a new approach of cloud computing where mobile storage is used to build the data center of cloud and easy access having a preferable security. We deliberate that it is possible to lower the cost if the data center is built using user's mobile storage so a 3-tier technology is proposed. Firstly, a layer is user's mobile devices, second layer is server with different virtual machines and last layer is again the user's mobile device which is used to build the data center of cloud (mobile-server-mobile). A mobile app implements the initial security and management issues. Users can oscillate data between first layer and third layer with the help of virtual machines that ensure secure transaction of data, reduction of power consumption, maintenance cost, bandwidth consumption and fast data sharing.

References
  1. E. Gorelik, "Cloud Computing Models," Massachusetts Institute of Technology, USA, 2013.
  2. K. Hashizume, D. G. Rosado, E. Fernández-Medina and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, no. 5, p. 1, 2013.
  3. A. Holt, K. Weiss, E. Gelblum, S. Flannery, S. Devgan, A. Malik, N. Rozof, A. Wood, P. Standaert, F. Meunier, J. Lu, G. Chen, B. Lu, K. Han, V. Khare and M. Miyachi, "Cloud Computing Takes Off," MORGAN STANLEY RESEARCH Globa l, 2011.
  4. J. SRINIVAS, K. VENKATA, S. REDDY and M. QYSER, "CLOUD COMPUTING BASICS," International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 5, pp. 1-3, 2012.
  5. S.-i. Kuribayashi, "Optimal Joint Multiple Resource Allocation Method for Cloud Computing Environments," International Journal of Research and Reviews in Computer Science (IJRRCS), vol. 2, no. 1, pp. 1-2, 2011.
  6. S.-i. Kuribayashi, "Reducing Total Power Consumption Method in Cloud Computing Environments," International Journal of Computer Networks & Communications (IJCNC), vol. 4, no. 2, pp. 1-2, 2012.
  7. K. Patel and M. Rathod J., "Effective Utilization of Bandwidth for Mobile Ad Hoc Network," Indian Journal of Science and Technology, vol. 9, no. 27, pp. 1-2, 2016.
  8. K. Kaur and K. Rai, "A Comparative Analysis: Grid, Cluster and Cloud Computing," International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 3, pp. 1-3, 2014.
  9. Q. Hassan F., "Demystifying Cloud Computing," Cross Talk, Cross Talk, 2011.
  10. M. Amini, S. Safavi, D. M. Khavidaki and A. Abdollahzadegan, "Type Of Cloud Computing (Public And Private) That Transform The Organization More Effectively," International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 5, pp. 1-5, 2013.
  11. K. Khajehei, "Role of virtualization in cloud computing," International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 4, pp. 1-8, 2014.
  12. M. Liaqata, S. Ninoriyab, J. Shujaa, W. Ahmada and A. Gania, "Virtual Machine Migration Enabled Cloud Resource Management: A Challenging Task," University of Malaya, kualalampur and Jabalpur ;, 2016.
  13. D. M and K. P, "A Study On Virtualization Techniques And Challenges In Cloud Computing," :International Journal Of Science & Technology Research, vol. 3, no. 11, pp. 1-3, 2014.
  14. YunchuanSun, J. Zhang, Y. Xiong and G. Zhu, "Data Security and Privacy in Cloud Computing," International Journal of Distributed Sensor Networks, vol. 2014, 2014.
  15. K. Hashizume, D. G. Rosado, E. Fernández-Medina and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, no. 5, pp. 1-5, 2013.
  16. U. Naik and V. Kotak, " Security Issues with Implementation of RSA and Proposed Dual Security Algorithm for Cloud Computing," IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), vol. 9, no. 1, pp. 1-5, 2014.
  17. M. Pitchaiah, P. Daniel and Praveen, "Implementation of Advanced Encryption Standard Algorithm," International Journal of Scientific & Engineering Research, vol. 3, no. 3, pp. 1-5, 2012.
  18. "Techopedia," [Online]. [Accessed 26 july 2016]. Available: https://www.techopedia.com/definition/1006/data-synchronization.
  19. N. Malhotra and A. Chaudhary, "Implementation of Database Synchronization Technique between Client and Server," International Journal of Engineering Science and Innovative Technology (IJESIT), vol. 3, no. 4, pp. 1-5, 2014.
  20. S. S and B. K, "Data Synchronization Using Cloud Storage," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 11, pp. 1-4, 2012.
  21. "Techopedia," [Online]. [Accessed 27 july 2016] Available:https://www.techopedia.com/definition/1006/data-synchronization.
  22. "nsk inc," [Online]. Available: http://blog.nskinc.com/IT-Services-Boston/bid/77545/When-to-Use-Mirroring-as-a-Data-Recovery-Solution. [Accessed 28 july 2016].
  23. H. Jin and K. Hwang, "Stripped mirroring RAID architecture," Journal of Systems Architecture, vol. 46, no. 543±550, pp. 1-6, 2000.
  24. "Android developers," [Online]. [Accessed 20 july 2016] Available:https://developer.android.com/guide/topics/data/data-storage.html..
  25. S. Arianfar, P. Sarolahti and J. Ott, "Reducing Server and Network Load with Shared Buffering," Aalto University, FRANCE, 2012.
  26. "WD support," [Online]. [Accessed 15 july 2016] Available:http://support.wdc.com/KnowledgeBase/answer.aspx?ID=10624..
  27. M. Singhal and A. Shukla, " Implementation of Location based Services in Android," IJCSI International Journal of Computer Science, vol. 9, no. 1, pp. 1-4, 2012.
  28. D. Vadlamudi, K. Chaitanya, T. Srikanth, B. Venu, U. Joseph and T.-h. Kim, "An Applicative Approach for Collecting and Fortifying History of Data in Cloud Environment," International Journal of Software Engineering and Its Applications, vol. 9, no. 5, pp. 1-7, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud shared memory virtualization encryption synchronization RAID security Virtual Machine(VM) Media Access Control(MAC) Rivest-Shamir-Adleman (RSA) Advanced Encryption Standard (AES)