Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Seminar
1. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 1
CHAPTER 1
INTRODUCTION
Cloud computing is a model for enabling ubiquitous network access to a shared pool
of configurable computing resources. Cloud computing and storage solutions provide users
and enterprises with various capabilities to store and process their data in third-party data
centers. It relies on sharing of resources to achieve coherence and economies of scale, similar
to a utility (like the electricity grid) over a network. At the foundation of cloud computing is
the broader concept of converged infrastructure and shared services.
Cloud computing, or in simpler shorthand just "the cloud", also focuses on
maximizing the effectiveness of the shared resources. Cloud resources are usually not only
shared by multiple users but are also dynamically reallocated per demand. This can work for
allocating resources to users. For example, a cloud computer facility that serves European
users during European business hours with a specific application (e.g., email) may reallocate
the same resources to serve North American users during North America's business hours
with a different application (e.g., a web server). This approach should maximize the use of
computing power thus reducing environmental damage as well since less power, air
conditioning, rack space, etc. are required for a variety of functions. With cloud computing,
multiple users can access a single server to retrieve and update their data without purchasing
licenses for different applications.
The term "moving to cloud" also refers to an organization moving away from a
traditional CAPEX model (buy the dedicated hardware and depreciate it over a period of
time) to the OPEX model (use a shared cloud infrastructure and pay as one uses it).
Proponents claim that cloud computing allows companies to avoid upfront
infrastructure costs, and focus on projects that differentiate their businesses instead of on
infrastructure. Proponents also claim that cloud computing allows enterprises to get their
applications up and running faster, with improved manageability and less maintenance, and
enables IT to more rapidly adjust resources to meet fluctuating and unpredictable business
demand. Cloud providers typically use a "pay as you go" model. This can lead to
unexpectedly high charges if administrators do not adapt to the cloud pricing model.
2. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 2
fig 1.0
The present availability of high-capacity networks, low-cost computers and storage
devices as well as the widespread adoption of hardware virtualization, service-oriented
architecture, and autonomic and utility computing have led to a growth in cloud computing.
Companies can scale up as computing needs increase and then scale down again as demands
decrease.
Cloud vendors are experiencing growth rates of 50% per annum.Cloud computing is
the result of evolution and adoption of existing technologies and paradigms. The goal of cloud
computing is to allow users to take benefit from all of these technologies, without the need for
deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and
helps the users focus on their core business instead of being impeded by IT obstacles.
The main enabling technology for cloud computing is virtualization. Virtualization
software separates a physical computing device into one or more "virtual" devices, each of
which can be easily used and managed to perform computing tasks. With operating system–
3. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 3
level virtualization essentially creating a scalable system of multiple independent computing
devices, idle computing resources can be allocated and used more efficiently. Virtualization
provides the agility required to speed up IT operations, and reduces cost by increasing
infrastructure utilization. Autonomic computing automates the process through which the user
can provision resources on-demand. By minimizing user involvement, automation speeds up
the process, reduces labor costs and reduces the possibility of human errors.
Users routinely face difficult business problems. Cloud computing adopts concepts
from Service-oriented Architecture (SOA) that can help the user break these problems into
services that can be integrated to provide a solution. Cloud computing provides all of its
resources as services, and makes use of the well-established standards and best practices
gained in the domain of SOA to allow global and easy access to cloud services in a
standardized way.
Cloud computing also leverages concepts from utility computing to provide metrics
for the services used. Such metrics are at the core of the public cloud pay-per-use models. In
addition, measured services are an essential part of the feedback loop in autonomic
computing, allowing services to scale on-demand and to perform automatic failure recovery.
Cloud computing is a kind of grid computing; it has evolved by addressing the QoS
(quality of service) and reliability problems. Cloud computing provides the tools and
technologies to build data/compute intensive parallel applications with much more affordable
prices compared to traditional parallel computing techniques.
Cloud computing shares characteristics with:
Client–server model — Client–server computing refers broadly to any distributed
application that distinguishes between service providers (servers) and service
requestors (clients).
Grid computing — "A form of distributed and parallel computing, whereby a 'super
and virtual computer' is composed of a cluster of networked, loosely coupled
computers acting in concert to perform very large tasks."
Mainframe computer — Powerful computers used mainly by large organizations for
critical applications, typically bulk data processing such as: census; industry and
consumer statistics; police and secret intelligence services; enterprise resource
planning; and financial transaction processing.
4. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 4
Utility computing — The "packaging of computing resources, such as computation
and storage, as a metered service similar to a traditional public utility, such as
electricity."
Peer-to-peer — A distributed architecture without the need for central coordination.
Participants are both suppliers and consumers of resources (in contrast to the
traditional client–server model).
Cloud storage services may be accessed through a co-located cloud computer service,
a web service application programming interface (API) or by applications that utilize the API,
such as cloud desktop storage, a cloud storage gateway or Web-based content management
systems.
Pixeom, a prototype device being Kickstarted by brother and sister duo Karishma and
Sam Nagar, with the aim of offering alternative cloud services that don’t require you to hand
over the keys to your private data in exchange for a convenient digital service.
Prior to Edward Snowden’s revelations about the NSA’s (and other governments’
security agencies’) dragnet surveillance of everyone’s online lives, Pixeom would probably
have sunk without a trace. Or not even been conceived of as a mainstream project at all.
But, post-Snowden, there’s a perfect storm of cloud-computing concerns amassing to
undermine the convenience of mainstream online services. And, after a month seeking crowd
funding on Kickstarter, Pixeom has passed its funding target of $50,000 — with close to 400
backers, and still has 15 days left to run on its campaign.
In addition to the funds it’s currently raising on Kickstarter, Pixeom has also secured
more than $500,000 in private funding to get this personal cloud device to market.
It’s clear that Snowden has shone a light on something very rotten lurking at the core
of mainstream cloud services. Sure, web mail clients are handy — and you get a chunk of free
storage — but you’re also effectively handing the keys to your inbox over to the NSA (et al)
should they happen to feel like dipping into your personal correspondence one lunchtime or
other.
And of course it’s a given that your personal data will be mined by the service
provider; it’s a free service, so your privacy is the product. This general snooping on/data-
mining of users is a routine business model for the majority of free cloud-based services and
apps.
Multiple big name tech giants have built hugely lucrative businesses off of selling
your likes and dislikes to advertisers in exchange for furnishing you with a platform where
5. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 5
you can share that data in the first place. Or store the personal stuff they need to peek at to
gather sellable Intel on you.
Plus there’s also the sloppy security of (certain) startups that leak your personal info
all over the Internet’s just because they’re more interested in expanding their user-base than
expending effort on adequate security measures, or so it has, but — whipped up by the storm
of snooping revelations — some counter-currents are (finally) emerging to challenge the
accepted wisdom that accessing the convenience of cloud services necessitates giving up your
personal data and abandoning any shred of privacy in the process.
6. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 6
CHAPETR 2
EXISTING SYSTEM
Consider the existing system of Pixeom, it mainly includes the cloud storage, that
anyone can save their data’s to a virtual memory and it can be accessed from anywhere from
any device and also it can be share among others. Now a day’s social networking sites and
email are very popular, this facilities are also implemented in this device by avoiding its
demerits. And also people are buying and selling their products are mainly through online
shopping, this facility is also added in this device.
2.1 CLOUD STORAGE
Cloud storage is a model of data storage where the digital data is stored in logical
pools, the physical storage spans multiple servers (and often locations), and the physical
environment is typically owned and managed by a hosting company. These cloud storage
providers are responsible for keeping the data available and accessible, and the physical
environment protected and running. People and organizations buy or lease storage capacity
from the providers to store user, organization, or application data.
Cloud storage services may be accessed through a co-located cloud computer service,
a web service application programming interface (API) or by applications that utilize the API,
such as cloud desktop storage, a cloud storage gateway or Web-based content management
systems.
Cloud storage is based on highly virtualized infrastructure and is like broader cloud
computing in terms of accessible interfaces, near-instant elasticity and scalability, multi-
tenancy, and metered resources. Cloud storage services can be utilized from an off-premises
service (Amazon S3) or deployed on-premises (ViON Capacity Services)
.
7. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 7
A HIGH LEVEL ARCHITECTURE OF CLOUD STORAGE.
fig 2.0
Cloud storage typically refers to a hosted object storage service, but the term has
broadened to include other types of data storage that are now available as a service, like block
storage.
Object storage services like Amazon S3 and Microsoft Azure Storage, object storage
software like Open stack Swift, object storage systems like EMC Atmos and Hitachi Content
Platform, and distributed storage research projects like OceanStore and VISION Cloud are all
examples of storage that can be hosted and deployed with cloud storage characteristics.
Cloud storage is made up of many distributed resources, but still acts as one - often
referred to as federated storage clouds
Highly fault tolerant through redundancy and distribution of data
Highly durable through the creation of versioned copies
Typically eventually consistent with regard to data replicas
8. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 8
2.1.1 ADVANTAGES
Companies need only pay for the storage they actually use, typically an average of
consumption during a month. This does not mean that cloud storage is less expensive, only
that it incurs operating expenses rather than capital expenses.
Organizations can choose between off-premises and on-premises cloud storage
options, or a mixture of the two options, depending on relevant decision criteria that is
complementary to initial direct cost savings potential; for instance, continuity of operations
(COOP), disaster recovery (DR), security (PII, HIPAA, SARBOX, IA/CND), and records
retention laws, regulations, and policies.
Storage availability and data protection is intrinsic to object storage architecture, so
depending on the application, the additional technology, and effort and cost to add availability
and protection can be eliminated. Storage maintenance tasks, such as purchasing additional
storage capacity, are offloaded to the responsibility of a service provider. Cloud storage
provides users with immediate access to a broad range of resources and applications hosted in
the infrastructure of another organization via a web service interface. Cloud storage can be
used for copying virtual machine images from the cloud to on-premises locations or to import
a virtual machine image from an on-premises location to the cloud image library. In addition,
cloud storage can be used to move virtual machine images between user accounts or between
data centers.
Cloud storage can be used as natural disaster proof backup, as normally there are 2 or
3 different backup servers located in different places around the globe.
2.2 SOCIAL NETWORKING
A social networking service (also social networking site or SNS) is a platform to build
social networks or social relations among people who share similar interests, activities,
backgrounds or real-life connections. A social network service consists of a representation of
each user (often a profile), his or her social links, and a variety of additional services. Social
network sites are web-based services that allow individuals to create a public profile, create a
list of users with whom to share connections, and view and cross the connections within the
system. Most social network services are web-based and provide means for users to interact
over the Internet, such as e-mail and instant messaging. Social network sites are varied and
they incorporate new information and communication tools such as mobile connectivity,
photo/video/sharing and blogging. Online community services are sometimes considered a
9. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 9
social network service, though in a broader sense, social network service usually means an
individual-centered service whereas online community services are group-centered. Social
networking sites allow users to share ideas, pictures, posts, activities, events, and interests
with people in their network.
The main types of social networking services are those that contain category places
(such as former school year or classmates), means to connect with friends (usually with self-
description pages), and a recommendation system linked to trust. Popular methods now
combine many of these, with American-based services such as Facebook, Google+, LinkedIn,
Instagram, Reddit, Pinterest, Vine, Tumblr, and Twitter widely used worldwide; Nexopia in
Canada; Badoo, Bebo, Vkontakte (Russia), Delphi, Draugiem.lv (Latvia), Hyves (The
Netherlands), iWiW Hungary), Nasza-Klasa (Poland), Soup (Austria), Glocals in Switzerland,
Skyrock, The Sphere, StudiVZ (Germany), Tagged, Tuenti (mostly in Spain), Myspace,
Xanga and XING in parts of Europe; Hi5 in South America and Central America; Mxit in
Africa; Cyworld, Mixi, Renren, Friendster, Sina Weibo and Wretch in Asia and the Pacific
Islands.
There have been attempts to standardize these services to avoid the need to duplicate
entries of friends and interests (see the FOAF standard and the Open Source Initiative
[clarification needed]. A study reveals that India has recorded world's largest growth in terms
of social media users in 2013. A 2013 survey found that 73% of U.S adults use social
networking sites.
Web-based social networking services make it possible to connect people who share
interests and activities across political, economic, and geographic borders. Through e-mail
and instant messaging, online communities are created where a gift economy and reciprocal
altruism are encouraged through cooperation. Information is suited to a gift economy, as
information is a nontrivial good and can be gifted at practically no cost. Scholars have noted
that the term "Social" cannot account for technological features of the social network
platforms alone. Hence, the level of network sociability should determine by the actual
performances of its users.
Companies are using social media as a way to learn about potential employees'
personalities and behavior. In numerous situations a candidate who might otherwise have
been hired has been rejected due to offensive or otherwise unseemly photos or comments
posted to social networks or appearing on a newsfeed.
10. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 10
CHAPTER 3
PROPOSED SYSTEM
The Pixeom Smart Cloud device provides a suite of productivity, collaboration, and
e-commerce apps for owners that make it easy to manage their data, with complete control
over content sharing. Built with datacenter technology, Pixeom is a secure, scalable
alternative to public cloud and home NAS solutions.
Privacy is one of the most significant issues facing us today. The platforms created to
address this are still hosted in large data centers and have suffered privacy breaches, leaving
the public looking for solutions wherein they control their data. The Pixeom Personal Cloud
Device and Exchange Network allows users to easily create, access, and share their content
sfrom anywhere, while connecting with a global community, through the use of a secure
Pixeom X1 device. The X1, built using Raspberry Pi, is a small personal cloud device that
facilitates file storage, collaboration, social networking, and e-commerce, by acting together
with other X1 devices to power a community-built independent network.
While there are other cloud services on the market today, Pixeom is transformational
in combining cloud storage, being a gateway to a global community, where content sharing, e-
commerce, collaboration and relationship building is made possible. We have created a truly
boundary-less content sharing and e-commerce platform without rules and limits imposed on
its users by other cloud service providers," said Sam Nagar the co-founder.
Customers who purchase an X1 device for a one-time cost can easily upload, store,
post, and share data from anywhere without using a third-party cloud or hosting service
provider, and without being subject to storage limits, usage restrictions, incremental fees, or
the potential for security breaches. X1 device owners can create public or private groups,
content and marketplaces, all the while maintaining absolute control over what content is
shared. The Personal Exchange Network Apps facilitate three types of content exchanges.
11. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 11
3.1 TYPES OF CONTENT EXCHANGES
FIG 3.0
• File Exchange – enables Pixeom users to store and share files with built-in
synchronization and commenting for collaboration, as well as versioning for
convenient recovery. In file exchange, for each file that we send to some other
Persons, while we sending the file we also send a mail to him with a private
Key. Only using that key, he would have to access that file. Another important
feature in this file exchange is that, when anyone upload a file to its storage he has
two options ie. View the file as private and public. If we select it as private, it can
only be viewed by the user itself. If the user select that file as public, he can share
that file to specific persons or as public.
12. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 12
FIG 4.0
• Club Exchange – provides Pixeom users the ability to create interactive discussion boards
and build social communities around topics of interest, or allow businesses to foster
communication with customers and partners. In this exchange, if anyone want to add a
member, first he have to send a request to another one. And the other one wants to join this
discussion, he have to take the key from mail and enter it into the approval submission.
13. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 13
FIG 5.0
• Market Exchange – allows Pixeom users to create interactive online stores or list individual
items for sale, without having to pay listing fees or forfeit profits due to excessive
commissions charged by hosting service providers. The app is developed to be simple and
turnkey, including; payment processing, inventory management, and CRM.
14. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 14
Customers who purchase a Pixeom device for a one-time cost can easily upload, store,
post, and share data from anywhere without using a third-party cloud or hosting service
provider, and without being subject to storage limits, usage restrictions, incremental fees, or
the potential for widespread security breaches.
Data stored on a Pixeom Smart Cloud can be privately shared with the owner’s circle
of trust, or publically available on Pixeoms one of a kind Personal Exchange Network, a
global platform for sharing content that anyone can access without needing to have a device
of their own.
“There is plenty of data that people are willing to send up to the public cloud,” said
Sam Nagar, CEO and Founder of Pixeom. “But when some files can’t be sent to the cloud, we
bring the cloud to them.”
15. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 15
CHAPTER 4
CONNECTION TO GLOBAL NETWORK
For a Pixeom device it mainly consist of three ports ie. RJ45 connector and two
USB ports. In this RJ45 socket is for connecting the Ethernet cable, ie. For Internet
connection’s ports are for connecting external storage devices. And by using another port, it is
connected to any of the device such as computers, mobiles etc….
When the Pixeom is connected to any of the device, Open any browser and type the port
number of the device.
Then the Pixeom Home screen is opened.
16. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 16
Later shows the three exchanges
And then we can perform any of the operations.
17. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 17
In files we can add our files and can be share among other Pixeom users. These files can be
locked by keys and can also send this file from o``ne person to other using keys. And in
collaboration section, it mainly include group discussions about various matters like
education, lifestyle, business etc… And finally in pixlists we can sell our products and also
we can buy any product without any cost.
HAND DRAWN DIAGRAM OF PIXEOM DIMENSIONS AND MEASUREMENTS
18. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 18
CHAPTER 5
APPLICATIONS OF PIXEOM
All cloud services in a box for a small one-time cost, we are a combination of Drop
box/Box/Facebook/Shopify with a focus on privacy. With the creation of sites like Facebook,
many people are giving their personal information out on the internet. Most users are not
aware that they can modify the privacy settings and unless they modify them, their
information is open to the public. Sites such as Facebook and Twitter have grown popular by
broadcasting status updates featuring personal information such as location. Some
applications border on "cyber stalking." This has redefined the role of Internet privacy as
overlapping with that of security.
Some applications are explicitly centered on "cyber stalking." An application named
"Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr.
When a person uploads photos to a social networking site, others are able to track their most
recent location. Some smart phones are able to embed the longitude and latitude coordinates
into the photo and automatically send this information to the application. Anybody using the
application can search for a specific person and then find their immediate location. This poses
many potential threats to users who share their information with a large group of followers.
Facebook "Places," is a Facebook service, which publicizes user location information
to the networking community. Users are allowed to "check-in" at various locations including
retail stores, convenience stores, and restaurants. Also, users are able to create their own
"place," disclosing personal information onto the Internet. This form of location tracking is
automated and must be turned off manually. Various settings must be turned off and
manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are
recommended to: disable "Friends can check me in to Places, customize "Places I Check In,
“disable "People Here Now," and (uncheck "Places I've Visited." Moreover, the Federal Trade
Commission has received two complaints in regards to Facebook’s "unfair and deceptive"
trade practices, which are used to target advertising sectors of the online community. "Places"
tracks user location information and is used primarily for advertising purposes. Each location
tracked allows third party advertisers to customize advertisements that suit one’s interests.
Currently, the Federal Trade Commissioner along with the Electronic Privacy Information
Center are shedding light on the issues of location data tracking on social networking sites.
19. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 19
Pixeom is a Scalable device and portable device that continues to grow as one large
storage pool instead of multiple “islands” of user data. And it is an optional exchange network
that anyone can browse full of public content from people’s devices that can one day rival the
large datacenter based on public networks.
20. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 20
CHAPTER 6
ADVANTAGES OF PIXEOM
Each Pixeom device is expandable, so you can attach USB hard drives and connect multiple
Pixeom devices together to indefinitely increase your storage space.
The Pixeom device is designed to save you money. It is remarkably low power, and will
always be a one-time cost to you. Compare that to the subscription based model of cloud
storage options today, and the choice is easy. In this device the motherboard is of Raspberry
pi Technology, ie efficient board at low cost.
By using this device, there is no need to buy storage space from cloud and also no fear about
the security concerns and no more restrictions by third party service providers.
TECHNICAL SPECIFICATIONS
Embedded Linux
Broadcom BCM2835 system on a chip (SoC)
ARM1176JZF-S 700 MHz processor
512 MB RAM
16 GB Internal Storage
2 USB Ports
10/100 LAN Port
LEDs for Power, Storage Access, Ethernet
21. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 21
Low Power, Green 5V/1A Power Supply - equates to about $5 per year in electricity costs to
the owner
Easy to setup and connect from anywhere in the world. It has a self-configuration software
built in that will perform a self-installation without any human inference.
22. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 22
CONCLUSION
Pixeom Is an Anti-Corporate Cloud Device that provide many advantages .Mainly
increase the data storage without any cost. Increase the confidentiality of personal datas.It
provides secure and reliable data transfer. And finally these all facilities are provided without
any third party authorization.
By the invention of this Pixeom cloud device, now a days in market or any industrial
purpose cloud service are developing drastically. So finally it is an excellent device which is
used for cloud services instead of bearing huge expensive things. In future the device can be
upgraded by adding new features like connect using Wifi,including new ports for connecting
other peripheral devices, increase storage capacity etc…………..
23. PIXEOM A cloud device for data privacy
Department of CSE,KMPCE 23
REFERENCES
[1]www.networkworld.com/article/.../Pixeom
[2]www.kickstarter.com/projects/pixeom/pixeom-the-personal-exchange-device
[3]Khan et al. Journal of Cloud Computing: Advances, Systems and Applications
2014
[4]Khan Z, Kiani SL (2012) A cloud-based architecture for citizen services in
smart cities. In: Proceedings of the 2012 IEEE/ACM fifth international
conference on utility and cloud computing.