CFP last date
20 December 2024
Reseach Article

An Expedition on Implementing the Cloud Data Centre using Shared Memory of Mobile Storage by Virtualization

by Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 11
Year of Publication: 2017
Authors: Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam
10.5120/ijca2017914153

Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam . An Expedition on Implementing the Cloud Data Centre using Shared Memory of Mobile Storage by Virtualization. International Journal of Computer Applications. 166, 11 ( May 2017), 30-37. DOI=10.5120/ijca2017914153

@article{ 10.5120/ijca2017914153,
author = { Nazmus Sakib, Raihan Ahmed, Tanvir Ahmed, Fahad Bin Islam },
title = { An Expedition on Implementing the Cloud Data Centre using Shared Memory of Mobile Storage by Virtualization },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 11 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 30-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number11/27715-2017914153/ },
doi = { 10.5120/ijca2017914153 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:13:26.994288+05:30
%A Nazmus Sakib
%A Raihan Ahmed
%A Tanvir Ahmed
%A Fahad Bin Islam
%T An Expedition on Implementing the Cloud Data Centre using Shared Memory of Mobile Storage by Virtualization
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 11
%P 30-37
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is now the biggest hotspot in modern era, which is spreading its impact in the technical site. For introducing a modern approach of cloud system, user’s mobile devices are placed at the top and bottom layer of the cloud system while different virtual servers are present at the middle layer that forms the structure of three-tier technology. For implementing the established idea of the three tier cloud technology, a scenario with different users that has been demonstrated in the paper where users can upload and download data to/from the cloud server using their handheld devices whereas users’ own device is also acting as cloud storage in behind scene. The result of the implementation of the three tier technology hashes out that the storage cost at the server can be roughly reduced by using a portion of users’ mobile device storage as server storage. In consequences, a reduction of power consumption and maintenance cost happened at the cloud servers side due to less storage uses and increasing parallel processing in clients devices. Moreover, the solutions of some rising problems to the cloud organization can also be introduced after thoroughly with the analytics and statistics of the result of this expedition.

References
  1. N. Sakib, R. Ahmed, T. Ahmed, B. Islam and B. Das, "A Proposal on Cloud Based Data Centre Using Shared Memory of Mobile Storage by Virtualization," International Journal of Applied Information System, vol. 11, no. 12, pp. 1-6, 2016.
  2. E. Gorelik, "Cloud Computing Models," Massachusetts Institute of Technology, USA, 2013.
  3. K. V. S. R. a. M. Q. J. SRINIVAS, "CLOUD COMPUTING BASICS," International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 5, pp. 1-3, 2012.
  4. K. W. E. G. S. F. S. D. A. M. N. R. A. W. P. S. F. M. J. L. G. C. B. L. K. H. V. K. a. M. M. A. Holt, "Cloud Computing Takes Off," MORGAN STANLEY RESEARCH Global, 2011.
  5. D. G. R. E. F.-M. a. E. B. F. K. Hashizume, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, no. 5, p. 1, 2013.
  6. "InfoQ," [Online]. Available: https://www.infoq.com/articles/power-consumption-servers. [Accessed 10 january 2017].
  7. "TechTarget," [Online]. Available: http://searchsecurity.techtarget.com/definition/authentication-server. [Accessed 20 january 2017].
  8. M. Vellon. [Online]. Available: http://www.networkworld.com/article/2194263/tech-primers/authentication-in-the-cloud.html. [Accessed 5 january 2017].
  9. J. Z. Y. X. a. G. Z. YunchuanSun, "Data Security and Privacy in Cloud Computing," International Journal of Distributed Sensor Networks, 2014.
  10. D. G. R. E. F.-M. a. E. B. F. K. Hashizume, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, no. 5, pp. 1-5, 2013.
  11. U. N. a. V. Kotak, "Security Issues with Implementation of RSA and Proposed Dual Security Algorithm for Cloud Computing," IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), vol. 9, no. 1, pp. 1-5, 2014.
  12. P. D. a. P. M. Pitchaiah, "Implementation of Advanced Encryption Standard Algorithm," International Journal of Scientific & Engineering Research, vol. 3, no. 3, pp. 1-5, 2012.
  13. i. nsk. [Online]. Available: http://blog.nskinc.com/IT-Services-Boston/bid/77545/When-to-Use-Mirroring-as-a-Data-Recovery-Solution. [Accessed 28 july 2016].
  14. H. J. a. K. Hwang, "Stripped mirroring RAID architecture," Journal of Systems Architecture, vol. 46, no. 543±550, pp. 1-6, 2000.
  15. "Prepressure," [Online]. Available: https://www.prepressure.com/library/technology/raid. [Accessed january 2017].
  16. "DriveHQ," [Online]. Available: https://www.drivehq.com/mapdrive/. [Accessed 25 january 2017].
  17. "Microsoft," [Online]. Available: https://msdn.microsoft.com/en-us/library/dd430340.aspx. [Accessed 27 january 2017].
  18. K. Khajehei, "Role of virtualization in cloud computing," International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 4, pp. 1-8, 2014.
  19. S. N. J. S. W. A. a. A. G. M. Liaqata, "Virtual Machine Migration Enabled Cloud Resource Management: A Challenging Task," University of Malaya, kualalampur and Jabalpur, 2016.
  20. D. M. a. K. P, "A Study On Virtualization Techniques And Challenges In Cloud Computing," INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 3, no. 11, pp. 1-3, 2014.
  21. "WdSupport," [Online]. Available: http://support.wdc.com/knowledgebase/answer.aspx?ID=10624. [Accessed 23 december 2016].
  22. M. S. a. A. Shukla, "Implementation of Location based Services in Android," IJCSI International Journal of Computer Science, vol. 9, no. 1, pp. 1-4, 2012.
  23. "Apica," [Online]. Available: https://www.apicasystem.com/blog/cloud-performance-testing-cloud-based-applications/. [Accessed 22 january 2017].
  24. "Techtarget," [Online]. Available: http://searchsoftwarequality.techtarget.com/feature/Performance-testing-in-the-cloud. [Accessed 12 january 2017].
  25. H. F. M. Satish Srirama, "REuse and Migration of legacy applications to Interoperable Cloud," 2012.
  26. P. J. Eckstein, "MEMORY STORAGE CALCULATIONS," 2007.
  27. "VmWare," [Online]. Available: https://www.vmware.com/cloud-services/pricing-guide.html. [Accessed 22 november 2016].
  28. "Rackspace," [Online]. Available: https://www.rackspace.com/cloud/servers/pricing. [Accessed 29 november 2016].
  29. Techopedia. [Online]. Available: https://www.techopedia.com/definition/17035/amdahls-law.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud shared memory virtualization encryption synchronization RAID security Virtual Machine(VM) Media Access Control(MAC) Rivest-Shamir-Adleman (RSA) Advanced Encryption Standard (AES) Central Processing Unit(CPU)