You are on page 1of 7

1.

ABSTRACT/KEYWORDS
Cloud computing is a very popular field at present which is KEYWORDS→ Application Migration, Optimization,
growing very fast and the future of the field seems really Search-Based Software Engineering, Systematic Literature
wide. With progressive spotlight on cloud computing as a Review.
possible solution for a flexible, on-demand computing
infrastructure for lots of applications, many companies and 2. LITERATURE REVIEWS/COMPARATIVE
unions have started using it. Obviously, cloud computing STUDY
has been recognized as a model for supporting In this module focuses on cloud computing resources,
infrastructure, platform and software services. Within resource allocation models and methods, machine learning
cloud systems, massive distributed data center tools and algorithms, profiling and modeling resource usage,
infrastructure, virtualized physical resources, virtualized and other related works. Cloud computing offers three main
middleware platform such as VMware as well as services which are PaaS, SaaS and Iaas. There is lack of an
applications are all being provided and consumed as appropriate machine learning technique that can be used to
services. The cloud clients should get good and reliable predict storage resource consumption for the case of IaaS
services from a provider and the provider should allocate cloud computing service. Machine learning can be used to
the resources in a proper way so as to render good services predict these, storage resource usage based on previous
to a client. This brings about the problem of optimization client usage patterns. Cloud computing can be offered using
where clients request for more services than they actually various deployment models and there are various players
require leading to wastage of the cloud storage resource. involved in offering cloud computing service. These have
been conclusively discussed in the literature review. Various
This demands for optimization both on the part of the client resource allocation models are reviewed so as to get an
and the cloud service provider. This has lead to increased overview of the various resources and the methods that are
project in the various techniques that can be used for used to allocate these resources. A review on machine
resource allocation within cloud services. This project learning is also done so as to give a firm background on the
focuses on the analysis of machine learning as a technique various machine learning algorithms and modeling
that can be used to predict the cloud storage service request techniques, their strengths, weaknesses and applications.
patterns from the clients. The project focuses on a review
of machine learning as a technique that can be used to The benefits of this include a better awareness on storage
predict and therefore optimize the user storage resource resource usage for future planning on the part of the
demand and usage for the case of cloud computing storage organizations Cloud computing services and hence saving on
IaaS. costs as well as better client advisory on future requirements
Data on cloud storage resource usage was subjected to when they request for storage service requests thereby saving
experiments using machine learning techniques so as to clients from unnecessary additional costs. The poor
determine which give the most accurate prediction. Some performance results produced by statistical estimation models
of these machine learning techniques to be reviewed in this have flooded the estimation area for over the last decade. Their
project include linear regression, artificial neural networks inability to handle categorical data, cope with missing data
(ANN), support vector machines (SVM). points, spread of data points and most importantly lack of
reasoning capabilities has triggered an increase in the number
RESULTS→From the experiments done in this project, it of studies using non-traditional methods like machine learning
can be concluded that the use of support vector machine techniques (Beekey jha, et. al). The area of machine learning
algorithm (SVM) proves to be the best algorithm for draws on concepts from diverse fields such as statistics,
learning the storage resource usage patterns and predicting artificial intelligence, philosophy,
their future usage so as to enable better resource budgeting.
systems and applications. The consumer does not manage or
control the underlying cloud infrastructure but has control
information theory, biology, cognitive science, over operating systems, storage, and deployed applications;
computational complexity and control theory. In this case and possibly limited control of select networking
the researcher picked on Safaricom limited as a local cloud components (NIST).
computing service provider and corporate organizations it Examples of infrastructure services provider include IBM
provides this BlueHouse, VMWare, Amazon EC2, Microsoft Azure
services to as the clients for the case of IaaS. If not well Platform, Sun ParaScale Cloud Storage, and more.
managed, a cloud service provider may end up Infrastructure services address the problem of properly
underutilizing the available resources on his part and the equipping data centers by assuring computing power when
cloud client may end up paying for more services than they needed.
actually require. This can be both detrimental to the client in
terms of unnecessary cost and to the service provider in
terms of resource wastages. Saa
S
Definition of cloud computing?

Cloud computing is a model for enabling convenient, on-


Paa
demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage, S
applications, and services) that can be rapidly provisioned
and released with minimal management effort or service
provider interaction. Iaa
S
Software as a service (SaaS)

Cloud systems
The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure. architecture
The applications are accessible from various client devices
through either a thin client interface, such as a web browser
(e.g., web-based email), or a program interface. Benefits of cloud computing
Platform as a service (PaaS)
The advantages of ―renting‖ these ―virtual resources‖ over
traditional on-premise IT includes:
The capability provided to the consumer is to deploy onto
the cloud infrastructure consumer created or acquired
applications created using programming languages,• On demand and elastic services—quickly scale up or down
libraries, services, and tools supported by the provider. The
consumer does not manage or control the underlying cloud• Self-service, automated provisioning and de-provisioning
infrastructure including network, servers, operating systems,
or storage, but has control over the deployed applications• Reduced costs from economies of scale and resource pooling
and possibly configuration settings for the application-
hosting environment (NIST). • Pay-for-use—costs based on metered service usage
There are three benefits in PaaS.
Public Cloud: The deployment of a public cloud computing
• Develop applications and get to market faster
system is characterized on the one hand by the public
• Deploy new web applications to the cloud in minutes
availability of the cloud service offering and on the other hand
• Reduce complexity with middleware as a service
by the public network that is used to communicate with the
cloud service. The cloud services and cloud resources are
Infrastructure as a service (IaaS) procured from very large resource pools that are shared by all
end users. Some of the best-known examples of public cloud
IaaS: The capability provided to the consumer is to provision systems are Amazon Web Services (AWS) containing the
processing, storage, networks, and other fundamental Elastic Compute Cloud (EC2) and the Simple Storage Service
computing resources where the consumer is able to deploy (S3) which form an IaaS cloud offering and the Google App
and run arbitrary software, which can include operating Engine with provides a PaaS to its customers.
eCloudIDS Objective 1: Logical storage segregation and
Private Cloud: Private cloud computing systems emulate multi-tenancy security issues One of the top/ primary
public cloud service offerings within an organization’s security concerns in cloud computing, logical storage
boundaries to make services accessible for one designated segregation and multi-tenancy security issue, gains major
organization. Private cloud computing systems make use of attention from all the stakeholders on cloud. Given the
virtualization solutions and focus on consolidating nature of cloud, multi-tenancy being unique and more
distributed IT services often within data centers belonging beneficial property with respect to utmost utilization of
to the company. pooled resources with multiple users, it carries a 65 new
style of security threat to the entire cloud infrastructure.
Community Cloud: In a community cloud, organizations Hence, this research work will primarily focus towards the
with similar requirements share a cloud infrastructure. It way and means of handling logical storage and multi-
may be understood as a generalization of a private cloud, a tenancy security issues.
private cloud being an infrastructure which is only eCloudIDS Objective 2: Identity management issues Being
accessible by one certain organization. an essential component of today’s enterprise computing,
identity management has become more influential with
respect to all aspects of the way business run. When
Hybrid Cloud: A hybrid cloud service deployment model
considering the essence and importance of identity
implements the required processes by combining the cloud
management, it can concluded that without a proper identity
services of different cloud computing systems, e.g. private
management, cloud computing may not be complete and
and public cloud services. The hybrid model is also suitable
effective. At one hand, the traditional identity management
for enterprises in which the transition to full outsourcing has
portfolio getting more maturity; on the other hand it is also
already been completed, for instance, to combine
having its own challenges.
community cloud services with public cloud services.
eCloudIDS Objective 3: Insider attacks One of the most
popular security threats for many decades by now, insider
attacks are gaining more vigor due to the new characteristics
3. PROBLEM FORMULATION of cloud computing. When an insider attack is being
The main objective of this investigation is to design performed at cloud service providers premises, the volume
eCloudIDS, a next generation generic security framework and velocity of its effect is multiple times than a traditional
with a hybrid two-tier expert engine-based IDS for public, environment. Hence, this research work will attempt to
private and hybrid cloud computing environments, which prevent insider attacks with possible mechanism.
completely safeguards the cloud service provider’s eCloudIDS Objective 4: Virtualization issues Virtualization
infrastructure along with cloud service user’s virtual being a backbone of achieving cloud’s objectives, it also brings
machines (with data and applications) in utmost protected a new line of vulnerabilities to the cloud infrastructure.
mode. Protecting both cloud infrastructure and the hosted VMs are
• SPECIFIC OBJECTIVES → In order to achieve the main equally important from CSP and cloud user(s) perspectives.
objective it is essential to address the many security Hence, this research work aimed to address the virtualization
concerns: security issues to possible extend.
Security Concern 1: Who retains the data ownership and eCloudIDS Objective 5: Cloud VM auditor management
control ownership? issues In a traditional environment, a dedicated system’s host
Security Concern 2: Who maintains the audit records of the (server) OS being a parent process on top of underlying server
data? hardware. Due to the new nature of cloud, this scenario gets a
Security Concern 3: What is the mechanism in the delivery new dimension. In a typical cloud environment, on top of the
of this audit record to the customer? underlying server(s) infrastructure, hypervisor (or cloud native
Security Concern 4: As a real owner of the data, does the OS) becomes a parent process and host/guest OSs become
CSP allow customers to secure and manage access from end- child processes. Hence, protecting cloud VMs along with
users (customer’s client)? performing a regular/continuous auditing becomes mandatory
eCloudIDS Objective: Logical storage segregation and in cloud environment.
multitenancy security issues eCloudIDS Objective 6: Hacker attacks After protecting a
eCloudIDS Objective: Identity management issues cloud infrastructure from the newly derived cloud
eCloudIDS Objective: Insider attacks characteristics-based threats and vulnerabilities, it is also
eCloudIDS Objective: Virtualization issues important to consider other regular hacker or third-party enemy
eCloudIDS Objective: Cloud VM auditor management attacks. Hence, this research will target to handle possible
issues hacker attacks.
eCloudIDS Objective: Hacker attacks eCloudIDS Objective 7: Signature based attacks caused by
eCloudIDS Objective: Signature based attacks caused by Worms, Viruses, Trojans, etc. Newly derived/designed
Worms, Viruses, Trojans, etc. worms, viruses and Trojans for cloud environments are
becoming more challenging and difficult to the existing Will the proposed system cause harm?
traditional security tools and frameworks. This proposed The project would be beneficial because it satisfies the
system is aimed to capture such possible new attacks objectives when developed and installed.
through its machine learning intelligence. All behaviour aspects are considered carefully and
conclude that the project is behaviourally feasible.
4.REQUIRED TOOLS
1. SOFTWARE RQUIREMENT TOOLS
• Machine Learning
• Python 6. Complete Work Plan Layout
2.HARDWARE REQUIREMENT TOOLS 1. Review-1
• 4GB RAM For this project we all studied about the course like
• 1GB ROM • Python
• 1.2 GHZ PROCESSOR • Machine Learning(ML)
And most important think is that we are studying the
5.FEASIBILITY ANALYSIS research paper on Optimizing the efficiency of storage
The prime focus of the feasibility is evaluating the resources in cloud computing using ML.
practicality of the proposed system keeping in mind a 2. Review-2
number of factors. The following factors are taken into In this module we design the basic structure, use case
account before deciding in favour of the new system. diagram and by those knowledge of python and Machine
ECONOMIC FEASIBILITY → The developing system Learning we code and implement it in Our Project.
must be justified by cost and benefit. Criteria to ensure that 3. Review-3
effort is concentrated on project, which will give best, return In this module we start working on the project and code
at the earliest. One of the factors, which affect the on that by using python Programming Languages and
development of a new system, is the cost it would require. Machine Learning.
The following are some of the important financial questions 4. Review-4
asked during preliminary investigation: In last module we submit the project after doing all the
-The costs conduct a full system investigation. implementation.
-The cost of the hardware and software.
-The benefits in the form of reduced costs or fewer costly 7.First Phase Progress
errors. In the first phase we all team member had work properly and
-Since the system is developed as part of project work, there design the first module of our project in that it helps the new
is no manual cost to spend for the proposed system. user to communicate to our online storage. In the first Module
Also all the resources are already available, it give an we have create the login page if the user already exist then he /
indication of the system is economically possible for she have to login to our website and after that he / she can use
development. it. If the user doesn’t have any account then first he have to
TECHNICAL FEASIBILITY → The system must be signup and after that they move to login page and they have to
evaluated from the technical point of view first. The do login then he move to new page in that page they can use
assessment of this feasibility must be based on an outline the online storage and store there data and can access the data
design of the system requirement in the terms of input, through network.
output, programs and procedures. Having identified an We all also work on the architecture design and on the coding
outline system, the investigation must go on to suggest the in python language on Visual Studio Code and design our
type of equipment, required method developing the system, module.
of running the system once it has been designed. 8. Architecture Diagram for Proposed method
Technical issues raised during the investigation are: In architecture design we have basically define the activity
The project should be developed such that the necessary diagram, use case diagram and other diagram also.
functions and performance are achieved within the Activity Diagram:
constraints.
The project is developed within latest technology.
Through the technology may become obsolete after some
period of time, due to the fact that never version of same
software supports older versions, the system may still be
used.
So there are minimal constraints involved with this project.
OPERATATIONAL FEASIBILITY →This includes
the following questions: Is there sufficient support for the
users?
In this activity diagram the diamond shape defines the
condition and rectangle shape defines the entity.
The main aim of this diagram tells that if you are new user
than you have to create your account and after that you can
login. After the login what you want to do you want to do
download the document or upload the document on I cloud.
If you have upload the data on I cloud then it encrypt and
afte that store on the I cloud . If you want to download the
data from the icloud then It Decrypt it and after that it start
downloading into your personal storage it may be phone
storage or system storage.
The last step after performing these thing that you have to
log out from I cloud.
Use Case Diagram

This diagram tells that what kind of activity can be done


by user and as well as by admin.
The user can do activity like: Registration, login, file
uploading, file downloading, update the profile and
logout from the storage.
The activity done by admin are: Login, file upload, View
User, View profile, Update profile, download file and log
out mean a user can do all kinds of activity because they
have each and every kind of access.

9. Implementation and Description of Project


Modules
1. Login Module
3. After Login

10.References
• A. Matsunaga and J. A. B. Fortes, ―On the use of machine
learning to predict the time and resources consumed by
2. Sign Up Module applications‖, in Proceedings of the 2010 10th IEEE/ACM
➔After Filling Textbox International Conference on Cluster, Cloud and Grid
Computing, 2010, p. 495-504.
• 2.Antoine Bordes, Léon Bottou, Patrick Gallinari, and
JasonWeston.Solving MultiClass Support Vector Machines
with LaRank In Zoubin Ghahramani, editor, Proceedings of the
24th International Machine Learning Conference, pages 89–
96, Corvallis,Oregon, 2007. OmniPress.URL
http://leon.bottou.org/papers/bordes-2007.
• 3. Arkaitz Ruiz-Alvarez, Marty Humphrey, A Model and
Decision Procedure for Data Storage in Cloud Computing, in
Proceedings of the IEEE/ACM International Symposium on
Cluster, Ottawa Canada, 2012.
• 4. Corinna Cortes and Vladimir Vapnik. Support vector
networks. In Machine Learning, pages 273–297, 1995.
• 5. Daniel Nurmi, Rich Wolski, Chris Grzegorczyk,
GrazianoObertelli, Sunil Soman, LamiaYouseff,
DmitriiZagorodnov, (2009). “The Eucalyptus Open-source
CloudcomputingSystem”.In Proceedings of the IEEE/ACM
International Symposium on Cluster Computing and the Grid,
2009. IEEE Press.
• 6. Dustin Amrhein, Scott Quint. Cloud computing for the
enterprise - Understanding cloud computing and related
technologies: Part 1: Capturing the cloud.
http://www.ibm.com/developerworks/websphere/techjour
nal/0904_amrhein/0904_amrhein.html, 2009.

You might also like