SlideShare a Scribd company logo
1 of 23
Download to read offline
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 1
CHAPTER 1
INTRODUCTION
Cloud computing is a model for enabling ubiquitous network access to a shared pool
of configurable computing resources. Cloud computing and storage solutions provide users
and enterprises with various capabilities to store and process their data in third-party data
centers. It relies on sharing of resources to achieve coherence and economies of scale, similar
to a utility (like the electricity grid) over a network. At the foundation of cloud computing is
the broader concept of converged infrastructure and shared services.
Cloud computing, or in simpler shorthand just "the cloud", also focuses on
maximizing the effectiveness of the shared resources. Cloud resources are usually not only
shared by multiple users but are also dynamically reallocated per demand. This can work for
allocating resources to users. For example, a cloud computer facility that serves European
users during European business hours with a specific application (e.g., email) may reallocate
the same resources to serve North American users during North America's business hours
with a different application (e.g., a web server). This approach should maximize the use of
computing power thus reducing environmental damage as well since less power, air
conditioning, rack space, etc. are required for a variety of functions. With cloud computing,
multiple users can access a single server to retrieve and update their data without purchasing
licenses for different applications.
The term "moving to cloud" also refers to an organization moving away from a
traditional CAPEX model (buy the dedicated hardware and depreciate it over a period of
time) to the OPEX model (use a shared cloud infrastructure and pay as one uses it).
Proponents claim that cloud computing allows companies to avoid upfront
infrastructure costs, and focus on projects that differentiate their businesses instead of on
infrastructure. Proponents also claim that cloud computing allows enterprises to get their
applications up and running faster, with improved manageability and less maintenance, and
enables IT to more rapidly adjust resources to meet fluctuating and unpredictable business
demand. Cloud providers typically use a "pay as you go" model. This can lead to
unexpectedly high charges if administrators do not adapt to the cloud pricing model.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 2
fig 1.0
The present availability of high-capacity networks, low-cost computers and storage
devices as well as the widespread adoption of hardware virtualization, service-oriented
architecture, and autonomic and utility computing have led to a growth in cloud computing.
Companies can scale up as computing needs increase and then scale down again as demands
decrease.
Cloud vendors are experiencing growth rates of 50% per annum.Cloud computing is
the result of evolution and adoption of existing technologies and paradigms. The goal of cloud
computing is to allow users to take benefit from all of these technologies, without the need for
deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and
helps the users focus on their core business instead of being impeded by IT obstacles.
The main enabling technology for cloud computing is virtualization. Virtualization
software separates a physical computing device into one or more "virtual" devices, each of
which can be easily used and managed to perform computing tasks. With operating system–
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 3
level virtualization essentially creating a scalable system of multiple independent computing
devices, idle computing resources can be allocated and used more efficiently. Virtualization
provides the agility required to speed up IT operations, and reduces cost by increasing
infrastructure utilization. Autonomic computing automates the process through which the user
can provision resources on-demand. By minimizing user involvement, automation speeds up
the process, reduces labor costs and reduces the possibility of human errors.
Users routinely face difficult business problems. Cloud computing adopts concepts
from Service-oriented Architecture (SOA) that can help the user break these problems into
services that can be integrated to provide a solution. Cloud computing provides all of its
resources as services, and makes use of the well-established standards and best practices
gained in the domain of SOA to allow global and easy access to cloud services in a
standardized way.
Cloud computing also leverages concepts from utility computing to provide metrics
for the services used. Such metrics are at the core of the public cloud pay-per-use models. In
addition, measured services are an essential part of the feedback loop in autonomic
computing, allowing services to scale on-demand and to perform automatic failure recovery.
Cloud computing is a kind of grid computing; it has evolved by addressing the QoS
(quality of service) and reliability problems. Cloud computing provides the tools and
technologies to build data/compute intensive parallel applications with much more affordable
prices compared to traditional parallel computing techniques.
Cloud computing shares characteristics with:
 Client–server model — Client–server computing refers broadly to any distributed
application that distinguishes between service providers (servers) and service
requestors (clients).
 Grid computing — "A form of distributed and parallel computing, whereby a 'super
and virtual computer' is composed of a cluster of networked, loosely coupled
computers acting in concert to perform very large tasks."
 Mainframe computer — Powerful computers used mainly by large organizations for
critical applications, typically bulk data processing such as: census; industry and
consumer statistics; police and secret intelligence services; enterprise resource
planning; and financial transaction processing.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 4
 Utility computing — The "packaging of computing resources, such as computation
and storage, as a metered service similar to a traditional public utility, such as
electricity."
 Peer-to-peer — A distributed architecture without the need for central coordination.
Participants are both suppliers and consumers of resources (in contrast to the
traditional client–server model).
Cloud storage services may be accessed through a co-located cloud computer service,
a web service application programming interface (API) or by applications that utilize the API,
such as cloud desktop storage, a cloud storage gateway or Web-based content management
systems.
Pixeom, a prototype device being Kickstarted by brother and sister duo Karishma and
Sam Nagar, with the aim of offering alternative cloud services that don’t require you to hand
over the keys to your private data in exchange for a convenient digital service.
Prior to Edward Snowden’s revelations about the NSA’s (and other governments’
security agencies’) dragnet surveillance of everyone’s online lives, Pixeom would probably
have sunk without a trace. Or not even been conceived of as a mainstream project at all.
But, post-Snowden, there’s a perfect storm of cloud-computing concerns amassing to
undermine the convenience of mainstream online services. And, after a month seeking crowd
funding on Kickstarter, Pixeom has passed its funding target of $50,000 — with close to 400
backers, and still has 15 days left to run on its campaign.
In addition to the funds it’s currently raising on Kickstarter, Pixeom has also secured
more than $500,000 in private funding to get this personal cloud device to market.
It’s clear that Snowden has shone a light on something very rotten lurking at the core
of mainstream cloud services. Sure, web mail clients are handy — and you get a chunk of free
storage — but you’re also effectively handing the keys to your inbox over to the NSA (et al)
should they happen to feel like dipping into your personal correspondence one lunchtime or
other.
And of course it’s a given that your personal data will be mined by the service
provider; it’s a free service, so your privacy is the product. This general snooping on/data-
mining of users is a routine business model for the majority of free cloud-based services and
apps.
Multiple big name tech giants have built hugely lucrative businesses off of selling
your likes and dislikes to advertisers in exchange for furnishing you with a platform where
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 5
you can share that data in the first place. Or store the personal stuff they need to peek at to
gather sellable Intel on you.
Plus there’s also the sloppy security of (certain) startups that leak your personal info
all over the Internet’s just because they’re more interested in expanding their user-base than
expending effort on adequate security measures, or so it has, but — whipped up by the storm
of snooping revelations — some counter-currents are (finally) emerging to challenge the
accepted wisdom that accessing the convenience of cloud services necessitates giving up your
personal data and abandoning any shred of privacy in the process.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 6
CHAPETR 2
EXISTING SYSTEM
Consider the existing system of Pixeom, it mainly includes the cloud storage, that
anyone can save their data’s to a virtual memory and it can be accessed from anywhere from
any device and also it can be share among others. Now a day’s social networking sites and
email are very popular, this facilities are also implemented in this device by avoiding its
demerits. And also people are buying and selling their products are mainly through online
shopping, this facility is also added in this device.
2.1 CLOUD STORAGE
Cloud storage is a model of data storage where the digital data is stored in logical
pools, the physical storage spans multiple servers (and often locations), and the physical
environment is typically owned and managed by a hosting company. These cloud storage
providers are responsible for keeping the data available and accessible, and the physical
environment protected and running. People and organizations buy or lease storage capacity
from the providers to store user, organization, or application data.
Cloud storage services may be accessed through a co-located cloud computer service,
a web service application programming interface (API) or by applications that utilize the API,
such as cloud desktop storage, a cloud storage gateway or Web-based content management
systems.
Cloud storage is based on highly virtualized infrastructure and is like broader cloud
computing in terms of accessible interfaces, near-instant elasticity and scalability, multi-
tenancy, and metered resources. Cloud storage services can be utilized from an off-premises
service (Amazon S3) or deployed on-premises (ViON Capacity Services)
.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 7
A HIGH LEVEL ARCHITECTURE OF CLOUD STORAGE.
fig 2.0
Cloud storage typically refers to a hosted object storage service, but the term has
broadened to include other types of data storage that are now available as a service, like block
storage.
Object storage services like Amazon S3 and Microsoft Azure Storage, object storage
software like Open stack Swift, object storage systems like EMC Atmos and Hitachi Content
Platform, and distributed storage research projects like OceanStore and VISION Cloud are all
examples of storage that can be hosted and deployed with cloud storage characteristics.
Cloud storage is made up of many distributed resources, but still acts as one - often
referred to as federated storage clouds
 Highly fault tolerant through redundancy and distribution of data
 Highly durable through the creation of versioned copies
 Typically eventually consistent with regard to data replicas
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 8
2.1.1 ADVANTAGES
Companies need only pay for the storage they actually use, typically an average of
consumption during a month. This does not mean that cloud storage is less expensive, only
that it incurs operating expenses rather than capital expenses.
Organizations can choose between off-premises and on-premises cloud storage
options, or a mixture of the two options, depending on relevant decision criteria that is
complementary to initial direct cost savings potential; for instance, continuity of operations
(COOP), disaster recovery (DR), security (PII, HIPAA, SARBOX, IA/CND), and records
retention laws, regulations, and policies.
Storage availability and data protection is intrinsic to object storage architecture, so
depending on the application, the additional technology, and effort and cost to add availability
and protection can be eliminated. Storage maintenance tasks, such as purchasing additional
storage capacity, are offloaded to the responsibility of a service provider. Cloud storage
provides users with immediate access to a broad range of resources and applications hosted in
the infrastructure of another organization via a web service interface. Cloud storage can be
used for copying virtual machine images from the cloud to on-premises locations or to import
a virtual machine image from an on-premises location to the cloud image library. In addition,
cloud storage can be used to move virtual machine images between user accounts or between
data centers.
Cloud storage can be used as natural disaster proof backup, as normally there are 2 or
3 different backup servers located in different places around the globe.
2.2 SOCIAL NETWORKING
A social networking service (also social networking site or SNS) is a platform to build
social networks or social relations among people who share similar interests, activities,
backgrounds or real-life connections. A social network service consists of a representation of
each user (often a profile), his or her social links, and a variety of additional services. Social
network sites are web-based services that allow individuals to create a public profile, create a
list of users with whom to share connections, and view and cross the connections within the
system. Most social network services are web-based and provide means for users to interact
over the Internet, such as e-mail and instant messaging. Social network sites are varied and
they incorporate new information and communication tools such as mobile connectivity,
photo/video/sharing and blogging. Online community services are sometimes considered a
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 9
social network service, though in a broader sense, social network service usually means an
individual-centered service whereas online community services are group-centered. Social
networking sites allow users to share ideas, pictures, posts, activities, events, and interests
with people in their network.
The main types of social networking services are those that contain category places
(such as former school year or classmates), means to connect with friends (usually with self-
description pages), and a recommendation system linked to trust. Popular methods now
combine many of these, with American-based services such as Facebook, Google+, LinkedIn,
Instagram, Reddit, Pinterest, Vine, Tumblr, and Twitter widely used worldwide; Nexopia in
Canada; Badoo, Bebo, Vkontakte (Russia), Delphi, Draugiem.lv (Latvia), Hyves (The
Netherlands), iWiW Hungary), Nasza-Klasa (Poland), Soup (Austria), Glocals in Switzerland,
Skyrock, The Sphere, StudiVZ (Germany), Tagged, Tuenti (mostly in Spain), Myspace,
Xanga and XING in parts of Europe; Hi5 in South America and Central America; Mxit in
Africa; Cyworld, Mixi, Renren, Friendster, Sina Weibo and Wretch in Asia and the Pacific
Islands.
There have been attempts to standardize these services to avoid the need to duplicate
entries of friends and interests (see the FOAF standard and the Open Source Initiative
[clarification needed]. A study reveals that India has recorded world's largest growth in terms
of social media users in 2013. A 2013 survey found that 73% of U.S adults use social
networking sites.
Web-based social networking services make it possible to connect people who share
interests and activities across political, economic, and geographic borders. Through e-mail
and instant messaging, online communities are created where a gift economy and reciprocal
altruism are encouraged through cooperation. Information is suited to a gift economy, as
information is a nontrivial good and can be gifted at practically no cost. Scholars have noted
that the term "Social" cannot account for technological features of the social network
platforms alone. Hence, the level of network sociability should determine by the actual
performances of its users.
Companies are using social media as a way to learn about potential employees'
personalities and behavior. In numerous situations a candidate who might otherwise have
been hired has been rejected due to offensive or otherwise unseemly photos or comments
posted to social networks or appearing on a newsfeed.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 10
CHAPTER 3
PROPOSED SYSTEM
The Pixeom Smart Cloud device provides a suite of productivity, collaboration, and
e-commerce apps for owners that make it easy to manage their data, with complete control
over content sharing. Built with datacenter technology, Pixeom is a secure, scalable
alternative to public cloud and home NAS solutions.
Privacy is one of the most significant issues facing us today. The platforms created to
address this are still hosted in large data centers and have suffered privacy breaches, leaving
the public looking for solutions wherein they control their data. The Pixeom Personal Cloud
Device and Exchange Network allows users to easily create, access, and share their content
sfrom anywhere, while connecting with a global community, through the use of a secure
Pixeom X1 device. The X1, built using Raspberry Pi, is a small personal cloud device that
facilitates file storage, collaboration, social networking, and e-commerce, by acting together
with other X1 devices to power a community-built independent network.
While there are other cloud services on the market today, Pixeom is transformational
in combining cloud storage, being a gateway to a global community, where content sharing, e-
commerce, collaboration and relationship building is made possible. We have created a truly
boundary-less content sharing and e-commerce platform without rules and limits imposed on
its users by other cloud service providers," said Sam Nagar the co-founder.
Customers who purchase an X1 device for a one-time cost can easily upload, store,
post, and share data from anywhere without using a third-party cloud or hosting service
provider, and without being subject to storage limits, usage restrictions, incremental fees, or
the potential for security breaches. X1 device owners can create public or private groups,
content and marketplaces, all the while maintaining absolute control over what content is
shared. The Personal Exchange Network Apps facilitate three types of content exchanges.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 11
3.1 TYPES OF CONTENT EXCHANGES
FIG 3.0
• File Exchange – enables Pixeom users to store and share files with built-in
synchronization and commenting for collaboration, as well as versioning for
convenient recovery. In file exchange, for each file that we send to some other
Persons, while we sending the file we also send a mail to him with a private
Key. Only using that key, he would have to access that file. Another important
feature in this file exchange is that, when anyone upload a file to its storage he has
two options ie. View the file as private and public. If we select it as private, it can
only be viewed by the user itself. If the user select that file as public, he can share
that file to specific persons or as public.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 12
FIG 4.0
• Club Exchange – provides Pixeom users the ability to create interactive discussion boards
and build social communities around topics of interest, or allow businesses to foster
communication with customers and partners. In this exchange, if anyone want to add a
member, first he have to send a request to another one. And the other one wants to join this
discussion, he have to take the key from mail and enter it into the approval submission.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 13
FIG 5.0
• Market Exchange – allows Pixeom users to create interactive online stores or list individual
items for sale, without having to pay listing fees or forfeit profits due to excessive
commissions charged by hosting service providers. The app is developed to be simple and
turnkey, including; payment processing, inventory management, and CRM.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 14
Customers who purchase a Pixeom device for a one-time cost can easily upload, store,
post, and share data from anywhere without using a third-party cloud or hosting service
provider, and without being subject to storage limits, usage restrictions, incremental fees, or
the potential for widespread security breaches.
Data stored on a Pixeom Smart Cloud can be privately shared with the owner’s circle
of trust, or publically available on Pixeoms one of a kind Personal Exchange Network, a
global platform for sharing content that anyone can access without needing to have a device
of their own.
“There is plenty of data that people are willing to send up to the public cloud,” said
Sam Nagar, CEO and Founder of Pixeom. “But when some files can’t be sent to the cloud, we
bring the cloud to them.”
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 15
CHAPTER 4
CONNECTION TO GLOBAL NETWORK
For a Pixeom device it mainly consist of three ports ie. RJ45 connector and two
USB ports. In this RJ45 socket is for connecting the Ethernet cable, ie. For Internet
connection’s ports are for connecting external storage devices. And by using another port, it is
connected to any of the device such as computers, mobiles etc….
When the Pixeom is connected to any of the device, Open any browser and type the port
number of the device.
Then the Pixeom Home screen is opened.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 16
Later shows the three exchanges
And then we can perform any of the operations.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 17
In files we can add our files and can be share among other Pixeom users. These files can be
locked by keys and can also send this file from o``ne person to other using keys. And in
collaboration section, it mainly include group discussions about various matters like
education, lifestyle, business etc… And finally in pixlists we can sell our products and also
we can buy any product without any cost.
HAND DRAWN DIAGRAM OF PIXEOM DIMENSIONS AND MEASUREMENTS
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 18
CHAPTER 5
APPLICATIONS OF PIXEOM
All cloud services in a box for a small one-time cost, we are a combination of Drop
box/Box/Facebook/Shopify with a focus on privacy. With the creation of sites like Facebook,
many people are giving their personal information out on the internet. Most users are not
aware that they can modify the privacy settings and unless they modify them, their
information is open to the public. Sites such as Facebook and Twitter have grown popular by
broadcasting status updates featuring personal information such as location. Some
applications border on "cyber stalking." This has redefined the role of Internet privacy as
overlapping with that of security.
Some applications are explicitly centered on "cyber stalking." An application named
"Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr.
When a person uploads photos to a social networking site, others are able to track their most
recent location. Some smart phones are able to embed the longitude and latitude coordinates
into the photo and automatically send this information to the application. Anybody using the
application can search for a specific person and then find their immediate location. This poses
many potential threats to users who share their information with a large group of followers.
Facebook "Places," is a Facebook service, which publicizes user location information
to the networking community. Users are allowed to "check-in" at various locations including
retail stores, convenience stores, and restaurants. Also, users are able to create their own
"place," disclosing personal information onto the Internet. This form of location tracking is
automated and must be turned off manually. Various settings must be turned off and
manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are
recommended to: disable "Friends can check me in to Places, customize "Places I Check In,
“disable "People Here Now," and (uncheck "Places I've Visited." Moreover, the Federal Trade
Commission has received two complaints in regards to Facebook’s "unfair and deceptive"
trade practices, which are used to target advertising sectors of the online community. "Places"
tracks user location information and is used primarily for advertising purposes. Each location
tracked allows third party advertisers to customize advertisements that suit one’s interests.
Currently, the Federal Trade Commissioner along with the Electronic Privacy Information
Center are shedding light on the issues of location data tracking on social networking sites.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 19
Pixeom is a Scalable device and portable device that continues to grow as one large
storage pool instead of multiple “islands” of user data. And it is an optional exchange network
that anyone can browse full of public content from people’s devices that can one day rival the
large datacenter based on public networks.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 20
CHAPTER 6
ADVANTAGES OF PIXEOM
 Each Pixeom device is expandable, so you can attach USB hard drives and connect multiple
Pixeom devices together to indefinitely increase your storage space.
 The Pixeom device is designed to save you money. It is remarkably low power, and will
always be a one-time cost to you. Compare that to the subscription based model of cloud
storage options today, and the choice is easy. In this device the motherboard is of Raspberry
pi Technology, ie efficient board at low cost.
 By using this device, there is no need to buy storage space from cloud and also no fear about
the security concerns and no more restrictions by third party service providers.
TECHNICAL SPECIFICATIONS
 Embedded Linux
 Broadcom BCM2835 system on a chip (SoC)
 ARM1176JZF-S 700 MHz processor
 512 MB RAM
 16 GB Internal Storage
 2 USB Ports
 10/100 LAN Port
 LEDs for Power, Storage Access, Ethernet
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 21
 Low Power, Green 5V/1A Power Supply - equates to about $5 per year in electricity costs to
the owner
 Easy to setup and connect from anywhere in the world. It has a self-configuration software
built in that will perform a self-installation without any human inference.
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 22
CONCLUSION
Pixeom Is an Anti-Corporate Cloud Device that provide many advantages .Mainly
increase the data storage without any cost. Increase the confidentiality of personal datas.It
provides secure and reliable data transfer. And finally these all facilities are provided without
any third party authorization.
By the invention of this Pixeom cloud device, now a days in market or any industrial
purpose cloud service are developing drastically. So finally it is an excellent device which is
used for cloud services instead of bearing huge expensive things. In future the device can be
upgraded by adding new features like connect using Wifi,including new ports for connecting
other peripheral devices, increase storage capacity etc…………..
PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 23
REFERENCES
[1]www.networkworld.com/article/.../Pixeom
[2]www.kickstarter.com/projects/pixeom/pixeom-the-personal-exchange-device
[3]Khan et al. Journal of Cloud Computing: Advances, Systems and Applications
2014
[4]Khan Z, Kiani SL (2012) A cloud-based architecture for citizen services in
smart cities. In: Proceedings of the 2012 IEEE/ACM fifth international
conference on utility and cloud computing.

More Related Content

What's hot (20)

Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
E-PAPER TECHNOLOGY
E-PAPER TECHNOLOGYE-PAPER TECHNOLOGY
E-PAPER TECHNOLOGY
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Silverlight
SilverlightSilverlight
Silverlight
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
Rain technology
Rain technologyRain technology
Rain technology
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Utility fog ppt
Utility fog pptUtility fog ppt
Utility fog ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
E-Paper Display
E-Paper DisplayE-Paper Display
E-Paper Display
 
The Halo Network
The Halo NetworkThe Halo Network
The Halo Network
 
About Nimbus Concept
About Nimbus ConceptAbout Nimbus Concept
About Nimbus Concept
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
Optical Computing
Optical ComputingOptical Computing
Optical Computing
 
Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI)
 
AIRBORNE
AIRBORNEAIRBORNE
AIRBORNE
 
seminar report on smart glasses
seminar report on smart glasses seminar report on smart glasses
seminar report on smart glasses
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 

Similar to Seminar

Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud ComputingJIM MUKERJEE
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorialsUdara Sandaruwan
 
Cloud computing white paper
Cloud computing white paperCloud computing white paper
Cloud computing white paperVaneesh Bahl
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatioChetan Sontakke
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computinggaurav jain
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 

Similar to Seminar (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Cloud computing white paper
Cloud computing white paperCloud computing white paper
Cloud computing white paper
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
G017324043
G017324043G017324043
G017324043
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatio
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 

Recently uploaded

457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 

Recently uploaded (20)

457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Seminar

  • 1. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 1 CHAPTER 1 INTRODUCTION Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing power thus reducing environmental damage as well since less power, air conditioning, rack space, etc. are required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications. The term "moving to cloud" also refers to an organization moving away from a traditional CAPEX model (buy the dedicated hardware and depreciate it over a period of time) to the OPEX model (use a shared cloud infrastructure and pay as one uses it). Proponents claim that cloud computing allows companies to avoid upfront infrastructure costs, and focus on projects that differentiate their businesses instead of on infrastructure. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and enables IT to more rapidly adjust resources to meet fluctuating and unpredictable business demand. Cloud providers typically use a "pay as you go" model. This can lead to unexpectedly high charges if administrators do not adapt to the cloud pricing model.
  • 2. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 2 fig 1.0 The present availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of hardware virtualization, service-oriented architecture, and autonomic and utility computing have led to a growth in cloud computing. Companies can scale up as computing needs increase and then scale down again as demands decrease. Cloud vendors are experiencing growth rates of 50% per annum.Cloud computing is the result of evolution and adoption of existing technologies and paradigms. The goal of cloud computing is to allow users to take benefit from all of these technologies, without the need for deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and helps the users focus on their core business instead of being impeded by IT obstacles. The main enabling technology for cloud computing is virtualization. Virtualization software separates a physical computing device into one or more "virtual" devices, each of which can be easily used and managed to perform computing tasks. With operating system–
  • 3. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 3 level virtualization essentially creating a scalable system of multiple independent computing devices, idle computing resources can be allocated and used more efficiently. Virtualization provides the agility required to speed up IT operations, and reduces cost by increasing infrastructure utilization. Autonomic computing automates the process through which the user can provision resources on-demand. By minimizing user involvement, automation speeds up the process, reduces labor costs and reduces the possibility of human errors. Users routinely face difficult business problems. Cloud computing adopts concepts from Service-oriented Architecture (SOA) that can help the user break these problems into services that can be integrated to provide a solution. Cloud computing provides all of its resources as services, and makes use of the well-established standards and best practices gained in the domain of SOA to allow global and easy access to cloud services in a standardized way. Cloud computing also leverages concepts from utility computing to provide metrics for the services used. Such metrics are at the core of the public cloud pay-per-use models. In addition, measured services are an essential part of the feedback loop in autonomic computing, allowing services to scale on-demand and to perform automatic failure recovery. Cloud computing is a kind of grid computing; it has evolved by addressing the QoS (quality of service) and reliability problems. Cloud computing provides the tools and technologies to build data/compute intensive parallel applications with much more affordable prices compared to traditional parallel computing techniques. Cloud computing shares characteristics with:  Client–server model — Client–server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requestors (clients).  Grid computing — "A form of distributed and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks."  Mainframe computer — Powerful computers used mainly by large organizations for critical applications, typically bulk data processing such as: census; industry and consumer statistics; police and secret intelligence services; enterprise resource planning; and financial transaction processing.
  • 4. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 4  Utility computing — The "packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity."  Peer-to-peer — A distributed architecture without the need for central coordination. Participants are both suppliers and consumers of resources (in contrast to the traditional client–server model). Cloud storage services may be accessed through a co-located cloud computer service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems. Pixeom, a prototype device being Kickstarted by brother and sister duo Karishma and Sam Nagar, with the aim of offering alternative cloud services that don’t require you to hand over the keys to your private data in exchange for a convenient digital service. Prior to Edward Snowden’s revelations about the NSA’s (and other governments’ security agencies’) dragnet surveillance of everyone’s online lives, Pixeom would probably have sunk without a trace. Or not even been conceived of as a mainstream project at all. But, post-Snowden, there’s a perfect storm of cloud-computing concerns amassing to undermine the convenience of mainstream online services. And, after a month seeking crowd funding on Kickstarter, Pixeom has passed its funding target of $50,000 — with close to 400 backers, and still has 15 days left to run on its campaign. In addition to the funds it’s currently raising on Kickstarter, Pixeom has also secured more than $500,000 in private funding to get this personal cloud device to market. It’s clear that Snowden has shone a light on something very rotten lurking at the core of mainstream cloud services. Sure, web mail clients are handy — and you get a chunk of free storage — but you’re also effectively handing the keys to your inbox over to the NSA (et al) should they happen to feel like dipping into your personal correspondence one lunchtime or other. And of course it’s a given that your personal data will be mined by the service provider; it’s a free service, so your privacy is the product. This general snooping on/data- mining of users is a routine business model for the majority of free cloud-based services and apps. Multiple big name tech giants have built hugely lucrative businesses off of selling your likes and dislikes to advertisers in exchange for furnishing you with a platform where
  • 5. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 5 you can share that data in the first place. Or store the personal stuff they need to peek at to gather sellable Intel on you. Plus there’s also the sloppy security of (certain) startups that leak your personal info all over the Internet’s just because they’re more interested in expanding their user-base than expending effort on adequate security measures, or so it has, but — whipped up by the storm of snooping revelations — some counter-currents are (finally) emerging to challenge the accepted wisdom that accessing the convenience of cloud services necessitates giving up your personal data and abandoning any shred of privacy in the process.
  • 6. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 6 CHAPETR 2 EXISTING SYSTEM Consider the existing system of Pixeom, it mainly includes the cloud storage, that anyone can save their data’s to a virtual memory and it can be accessed from anywhere from any device and also it can be share among others. Now a day’s social networking sites and email are very popular, this facilities are also implemented in this device by avoiding its demerits. And also people are buying and selling their products are mainly through online shopping, this facility is also added in this device. 2.1 CLOUD STORAGE Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data. Cloud storage services may be accessed through a co-located cloud computer service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems. Cloud storage is based on highly virtualized infrastructure and is like broader cloud computing in terms of accessible interfaces, near-instant elasticity and scalability, multi- tenancy, and metered resources. Cloud storage services can be utilized from an off-premises service (Amazon S3) or deployed on-premises (ViON Capacity Services) .
  • 7. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 7 A HIGH LEVEL ARCHITECTURE OF CLOUD STORAGE. fig 2.0 Cloud storage typically refers to a hosted object storage service, but the term has broadened to include other types of data storage that are now available as a service, like block storage. Object storage services like Amazon S3 and Microsoft Azure Storage, object storage software like Open stack Swift, object storage systems like EMC Atmos and Hitachi Content Platform, and distributed storage research projects like OceanStore and VISION Cloud are all examples of storage that can be hosted and deployed with cloud storage characteristics. Cloud storage is made up of many distributed resources, but still acts as one - often referred to as federated storage clouds  Highly fault tolerant through redundancy and distribution of data  Highly durable through the creation of versioned copies  Typically eventually consistent with regard to data replicas
  • 8. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 8 2.1.1 ADVANTAGES Companies need only pay for the storage they actually use, typically an average of consumption during a month. This does not mean that cloud storage is less expensive, only that it incurs operating expenses rather than capital expenses. Organizations can choose between off-premises and on-premises cloud storage options, or a mixture of the two options, depending on relevant decision criteria that is complementary to initial direct cost savings potential; for instance, continuity of operations (COOP), disaster recovery (DR), security (PII, HIPAA, SARBOX, IA/CND), and records retention laws, regulations, and policies. Storage availability and data protection is intrinsic to object storage architecture, so depending on the application, the additional technology, and effort and cost to add availability and protection can be eliminated. Storage maintenance tasks, such as purchasing additional storage capacity, are offloaded to the responsibility of a service provider. Cloud storage provides users with immediate access to a broad range of resources and applications hosted in the infrastructure of another organization via a web service interface. Cloud storage can be used for copying virtual machine images from the cloud to on-premises locations or to import a virtual machine image from an on-premises location to the cloud image library. In addition, cloud storage can be used to move virtual machine images between user accounts or between data centers. Cloud storage can be used as natural disaster proof backup, as normally there are 2 or 3 different backup servers located in different places around the globe. 2.2 SOCIAL NETWORKING A social networking service (also social networking site or SNS) is a platform to build social networks or social relations among people who share similar interests, activities, backgrounds or real-life connections. A social network service consists of a representation of each user (often a profile), his or her social links, and a variety of additional services. Social network sites are web-based services that allow individuals to create a public profile, create a list of users with whom to share connections, and view and cross the connections within the system. Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Social network sites are varied and they incorporate new information and communication tools such as mobile connectivity, photo/video/sharing and blogging. Online community services are sometimes considered a
  • 9. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 9 social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, pictures, posts, activities, events, and interests with people in their network. The main types of social networking services are those that contain category places (such as former school year or classmates), means to connect with friends (usually with self- description pages), and a recommendation system linked to trust. Popular methods now combine many of these, with American-based services such as Facebook, Google+, LinkedIn, Instagram, Reddit, Pinterest, Vine, Tumblr, and Twitter widely used worldwide; Nexopia in Canada; Badoo, Bebo, Vkontakte (Russia), Delphi, Draugiem.lv (Latvia), Hyves (The Netherlands), iWiW Hungary), Nasza-Klasa (Poland), Soup (Austria), Glocals in Switzerland, Skyrock, The Sphere, StudiVZ (Germany), Tagged, Tuenti (mostly in Spain), Myspace, Xanga and XING in parts of Europe; Hi5 in South America and Central America; Mxit in Africa; Cyworld, Mixi, Renren, Friendster, Sina Weibo and Wretch in Asia and the Pacific Islands. There have been attempts to standardize these services to avoid the need to duplicate entries of friends and interests (see the FOAF standard and the Open Source Initiative [clarification needed]. A study reveals that India has recorded world's largest growth in terms of social media users in 2013. A 2013 survey found that 73% of U.S adults use social networking sites. Web-based social networking services make it possible to connect people who share interests and activities across political, economic, and geographic borders. Through e-mail and instant messaging, online communities are created where a gift economy and reciprocal altruism are encouraged through cooperation. Information is suited to a gift economy, as information is a nontrivial good and can be gifted at practically no cost. Scholars have noted that the term "Social" cannot account for technological features of the social network platforms alone. Hence, the level of network sociability should determine by the actual performances of its users. Companies are using social media as a way to learn about potential employees' personalities and behavior. In numerous situations a candidate who might otherwise have been hired has been rejected due to offensive or otherwise unseemly photos or comments posted to social networks or appearing on a newsfeed.
  • 10. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 10 CHAPTER 3 PROPOSED SYSTEM The Pixeom Smart Cloud device provides a suite of productivity, collaboration, and e-commerce apps for owners that make it easy to manage their data, with complete control over content sharing. Built with datacenter technology, Pixeom is a secure, scalable alternative to public cloud and home NAS solutions. Privacy is one of the most significant issues facing us today. The platforms created to address this are still hosted in large data centers and have suffered privacy breaches, leaving the public looking for solutions wherein they control their data. The Pixeom Personal Cloud Device and Exchange Network allows users to easily create, access, and share their content sfrom anywhere, while connecting with a global community, through the use of a secure Pixeom X1 device. The X1, built using Raspberry Pi, is a small personal cloud device that facilitates file storage, collaboration, social networking, and e-commerce, by acting together with other X1 devices to power a community-built independent network. While there are other cloud services on the market today, Pixeom is transformational in combining cloud storage, being a gateway to a global community, where content sharing, e- commerce, collaboration and relationship building is made possible. We have created a truly boundary-less content sharing and e-commerce platform without rules and limits imposed on its users by other cloud service providers," said Sam Nagar the co-founder. Customers who purchase an X1 device for a one-time cost can easily upload, store, post, and share data from anywhere without using a third-party cloud or hosting service provider, and without being subject to storage limits, usage restrictions, incremental fees, or the potential for security breaches. X1 device owners can create public or private groups, content and marketplaces, all the while maintaining absolute control over what content is shared. The Personal Exchange Network Apps facilitate three types of content exchanges.
  • 11. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 11 3.1 TYPES OF CONTENT EXCHANGES FIG 3.0 • File Exchange – enables Pixeom users to store and share files with built-in synchronization and commenting for collaboration, as well as versioning for convenient recovery. In file exchange, for each file that we send to some other Persons, while we sending the file we also send a mail to him with a private Key. Only using that key, he would have to access that file. Another important feature in this file exchange is that, when anyone upload a file to its storage he has two options ie. View the file as private and public. If we select it as private, it can only be viewed by the user itself. If the user select that file as public, he can share that file to specific persons or as public.
  • 12. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 12 FIG 4.0 • Club Exchange – provides Pixeom users the ability to create interactive discussion boards and build social communities around topics of interest, or allow businesses to foster communication with customers and partners. In this exchange, if anyone want to add a member, first he have to send a request to another one. And the other one wants to join this discussion, he have to take the key from mail and enter it into the approval submission.
  • 13. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 13 FIG 5.0 • Market Exchange – allows Pixeom users to create interactive online stores or list individual items for sale, without having to pay listing fees or forfeit profits due to excessive commissions charged by hosting service providers. The app is developed to be simple and turnkey, including; payment processing, inventory management, and CRM.
  • 14. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 14 Customers who purchase a Pixeom device for a one-time cost can easily upload, store, post, and share data from anywhere without using a third-party cloud or hosting service provider, and without being subject to storage limits, usage restrictions, incremental fees, or the potential for widespread security breaches. Data stored on a Pixeom Smart Cloud can be privately shared with the owner’s circle of trust, or publically available on Pixeoms one of a kind Personal Exchange Network, a global platform for sharing content that anyone can access without needing to have a device of their own. “There is plenty of data that people are willing to send up to the public cloud,” said Sam Nagar, CEO and Founder of Pixeom. “But when some files can’t be sent to the cloud, we bring the cloud to them.”
  • 15. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 15 CHAPTER 4 CONNECTION TO GLOBAL NETWORK For a Pixeom device it mainly consist of three ports ie. RJ45 connector and two USB ports. In this RJ45 socket is for connecting the Ethernet cable, ie. For Internet connection’s ports are for connecting external storage devices. And by using another port, it is connected to any of the device such as computers, mobiles etc…. When the Pixeom is connected to any of the device, Open any browser and type the port number of the device. Then the Pixeom Home screen is opened.
  • 16. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 16 Later shows the three exchanges And then we can perform any of the operations.
  • 17. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 17 In files we can add our files and can be share among other Pixeom users. These files can be locked by keys and can also send this file from o``ne person to other using keys. And in collaboration section, it mainly include group discussions about various matters like education, lifestyle, business etc… And finally in pixlists we can sell our products and also we can buy any product without any cost. HAND DRAWN DIAGRAM OF PIXEOM DIMENSIONS AND MEASUREMENTS
  • 18. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 18 CHAPTER 5 APPLICATIONS OF PIXEOM All cloud services in a box for a small one-time cost, we are a combination of Drop box/Box/Facebook/Shopify with a focus on privacy. With the creation of sites like Facebook, many people are giving their personal information out on the internet. Most users are not aware that they can modify the privacy settings and unless they modify them, their information is open to the public. Sites such as Facebook and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Some applications border on "cyber stalking." This has redefined the role of Internet privacy as overlapping with that of security. Some applications are explicitly centered on "cyber stalking." An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When a person uploads photos to a social networking site, others are able to track their most recent location. Some smart phones are able to embed the longitude and latitude coordinates into the photo and automatically send this information to the application. Anybody using the application can search for a specific person and then find their immediate location. This poses many potential threats to users who share their information with a large group of followers. Facebook "Places," is a Facebook service, which publicizes user location information to the networking community. Users are allowed to "check-in" at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own "place," disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: disable "Friends can check me in to Places, customize "Places I Check In, “disable "People Here Now," and (uncheck "Places I've Visited." Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s "unfair and deceptive" trade practices, which are used to target advertising sectors of the online community. "Places" tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.
  • 19. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 19 Pixeom is a Scalable device and portable device that continues to grow as one large storage pool instead of multiple “islands” of user data. And it is an optional exchange network that anyone can browse full of public content from people’s devices that can one day rival the large datacenter based on public networks.
  • 20. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 20 CHAPTER 6 ADVANTAGES OF PIXEOM  Each Pixeom device is expandable, so you can attach USB hard drives and connect multiple Pixeom devices together to indefinitely increase your storage space.  The Pixeom device is designed to save you money. It is remarkably low power, and will always be a one-time cost to you. Compare that to the subscription based model of cloud storage options today, and the choice is easy. In this device the motherboard is of Raspberry pi Technology, ie efficient board at low cost.  By using this device, there is no need to buy storage space from cloud and also no fear about the security concerns and no more restrictions by third party service providers. TECHNICAL SPECIFICATIONS  Embedded Linux  Broadcom BCM2835 system on a chip (SoC)  ARM1176JZF-S 700 MHz processor  512 MB RAM  16 GB Internal Storage  2 USB Ports  10/100 LAN Port  LEDs for Power, Storage Access, Ethernet
  • 21. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 21  Low Power, Green 5V/1A Power Supply - equates to about $5 per year in electricity costs to the owner  Easy to setup and connect from anywhere in the world. It has a self-configuration software built in that will perform a self-installation without any human inference.
  • 22. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 22 CONCLUSION Pixeom Is an Anti-Corporate Cloud Device that provide many advantages .Mainly increase the data storage without any cost. Increase the confidentiality of personal datas.It provides secure and reliable data transfer. And finally these all facilities are provided without any third party authorization. By the invention of this Pixeom cloud device, now a days in market or any industrial purpose cloud service are developing drastically. So finally it is an excellent device which is used for cloud services instead of bearing huge expensive things. In future the device can be upgraded by adding new features like connect using Wifi,including new ports for connecting other peripheral devices, increase storage capacity etc…………..
  • 23. PIXEOM A cloud device for data privacy Department of CSE,KMPCE 23 REFERENCES [1]www.networkworld.com/article/.../Pixeom [2]www.kickstarter.com/projects/pixeom/pixeom-the-personal-exchange-device [3]Khan et al. Journal of Cloud Computing: Advances, Systems and Applications 2014 [4]Khan Z, Kiani SL (2012) A cloud-based architecture for citizen services in smart cities. In: Proceedings of the 2012 IEEE/ACM fifth international conference on utility and cloud computing.