SlideShare a Scribd company logo
1 of 9
Download to read offline
ISSN: 2278 – 1323
                                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                                              Volume 1, Issue 5, July 2012



       ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD

                         Vanaja Gokul, Venkatesh.G, Vignesh.B and GowriShankar.M
                                        Department of Computer Science & Engineering,
                                           Sri Venkateswara College of Engineering,
                                                 Sriperumbudur, Chennai, India
                                                     vanajagokul@gmail.com
                                                                             Utility computing: The packaging of computing
   Abstract— Hybrid cloud combines the external public                          resources [3], such as computation and storage, as a
services and the internal private cloud providing services                      metered service similar to a traditional public utility,
thereby enhancing the capabilities to secure, manage and                        such as electricity.
govern the entire cloud spectrum.      In this paper, online
business management system is implemented using a hybrid
cloud architecture which provides faster and greater ease of
                                                                              Peer-to-peer: Distributed architecture without the
access to business transaction and management.          The                     need for central coordination, with both the
implemented system effectively favors the small scale, large                    suppliers and consumers of resources being
scale, Business to Business (B2B) and Business to Consumers                     available at the same time.
(B2C) by using E-commerce for management solution.
                                                                              Cloud computing: Cloud computing [9] is a general
    Index Terms— Hybrid cloud, business management,                              term for anything that involves delivering hosted
    E-commerce                                                                   services over the Internet.


                        1. INTRODUCTION                                  1.2 Cloud Computing

                                                                             Cloud is an emerging technology [8, 14] that uses the
1.1 Distributed Computing
                                                                             internet and central remote servers to maintain data and
                                                                             applications. Cloud computing allows consumers and
Distributed computing is a field of computer science where
                                                                             businesses to use applications without installation and
multiple autonomous computers communicate through a
                                                                             access their personal files at any computer with internet
computer network. The computers interact with each other in
                                                                             access. This technology allows for much more efficient
order to achieve a common goal.
                                                                             computing by centralizing storage, memory, processing
                                                                             and bandwidth. It can also be defined as the delivery of
Types of Distributed Computing
                                                                             computing as a service rather than a product, whereby
                                                                             shared resources, software, and information are provided
      Autonomic computing: Computer systems capable
                                                                             to computers and other devices as a utility over a
        of self-management.
                                                                             network.
      Client–server model: Client–server computing
        refers to any distributed application that
        distinguishes service providers and service
        requesters.

      Grid computing: A form of distributed and parallel
        computing that forms the basic element for the large
        scale supply of cloud services [2].

      Mainframe computer: Powerful computers used
        mainly by large organizations for critical
        applications.

                                                                                  Figure 1.1 Sample Cloud Architecture

Manuscript received June, 2012.
Vanaja Gokul, Asst. Prof., Department of Computer Science & Engg., Sri   1.2.1 Service Models
Venkateswara College of Engineering, Sriperumbudur, India
(email:vanajagokul@gmail.com).                                           As referred from [14], the three service models supported in
Venkatesh,Vignesh and GowriShankar, Students,          Department of
Computer Science & Engg., Sri Venkateswara College of Engineering,
                                                                         cloud are,
Sriperumbudur, India.
                                                                              Infrastructure-as-a-Service (IaaS)

                                                                                                                                     51
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                             International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                  Volume 1, Issue 5, July 2012

     Platform-as-a-Service (PaaS)                                        1.2.2 Deployment Modes
     Software-as-a-Service (SaaS)
                                                                          As referred from [1, 14] the following are the deployment
1.2.1.1 Infrastructure-as-a-Service (IaaS)                                modes in cloud.

Cloud providers offer computers as physical or more often as              1.2.2.1 Private
virtual machines, raw (block) storage, firewalls, load
balancers, and networks. IaaS providers supply these                      Private cloud (also called internal cloud or corporate cloud) is
resources on demand from their large pools installed in data              a computing architecture [11] that provides hosted services to
centres. Local area networks including IP addresses are part              a limited number of people behind a security validation.
of the offer. Some examples of IaaS are                                   Hence, the organizations themselves have to buy, build, and
                                                                          manage them and thereby is not accepted by many as an
              Amazon S3/EC2,                                             actual cloud computing and subsequently do not even reap
              Microsoft Windows Azure,                                   benefits from major advantages of cloud computing.
              VMWare vCloud.
                                                                          1.2.2.2 Public
1.2.1.2 Platform-as-a-Service (PaaS)
                                                                          A public cloud is actually the known version of Cloud and is
In the PaaS model, cloud providers deliver a computing                    based on the original cloud computing model. Here the
platform or solution stack typically including operating                  service provider manages the resources including the
system, programming language execution environment,                       applications and data storage and makes it available to the
database, and web server. Application developers can                      general public over the Internet. Generally the Public cloud
develop and run their software solutions on a cloud platform              service providers operate on a pay-per-usage model but some
without the cost and complexity of buying and managing the                also provide free services till a certain limit to attract more
underlying hardware and software layers. With some PaaS                   users.
offers, the underlying compute and storage resources scale
automatically to match application demand such that the                   1.2.2.3 Hybrid
cloud user does not have to allocate resources manually.
Some examples of PaaS are                                                 Hybrid cloud as the name suggests is a composition of two or
               Google App Engine.                                        more clouds generally private and public. The individual
               Microsoft Azure Services Platform.                        cloud models remain independent entities but function
               ORACLE/AWS.                                               together, thereby, offering the benefits of multiple
                                                                          deployment models. It sometimes is used in the reference of
1.2.1.3 Software-as-a-Service (SaaS)                                      a platform where multiple cloud systems are connected and
                                                                          which offers the flexibility to move programs and data easily
In the SaaS cloud model, the vendor supplies the hardware                 from one deployment system to another. Organizations may
infrastructure, the software product and interacts with the               host critical applications on private clouds and applications
user through a front-end portal. SaaS is a very broad market.             with relatively less security concerns on the public cloud.
Services can be anything from Web-based email to inventory
control and database processing.         Because the service
provider hosts both the application and the data, the end user
is free to use the service from any application.


                            CLOUD CLIENTS
                Web browser, mobile app, thin client, terminal
                emulators….



                                  SaaS
                               Application
                   CRM, E-mail, Virtual desktop, games…

                                   PaaS
                                 Platform                                         Figure 1.3 Hybrid Cloud Architecture
                 Database, webserver, development tools,….

                                                                          1.3 E-Commerce
                                      IaaS
                    Infrastructure, Storage, Load balancer,
                              network,servers,…                           E-commerce (e-commerce) or electronic commerce, subset
                                                                          of e-business, is the purchasing, selling, and exchanging of
                                                                          goods and services over computer networks (such as the
                      Figure 1.2 Service Models
                                                                          Internet) through which transactions or terms of sale are
                                                                          performed electronically.


                                                                                                                                       52
                                                        All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                          Volume 1, Issue 5, July 2012

           2. RELATED WORK AND MOTIVATION

Many of the previous work [3, 9] in the field of cloud                             3. PROPOSED WORK
computing have been in the areas of enhancing distributed
computing, general explanation of the cloud technology,
differences among similar technologies, security                   The proposed work of implementing an online business
requirements and the future expectations in these emerging       management tool using hybrid cloud architecture can be
environments. The new methods can be experimented and            deployed and can be used in an on-demand basis.
used by the advent of global industries acting as cloud
providers. This motivates the proposed implementation of           3.1 Modules used
hybrid cloud architecture.
                                                                   1. Setting up hybrid cloud infrastructures
2.1 Cloud-Scale Intelligent Infrastructure                         2. Configuring (Application Programming Interface)
                                                                      API’s using PHP
Cloud computing is an emerging application platform that           3. Designing Application patterns and User Interface
aims to share data, calculations and services among users.         4. Back end connectivity Modules
The methods to model it with the challenges like user              5. Deploying App to Local Cloud environment
interface, task distribution and coordination issues are           6. Acquiring DNS from Cloud portal and Test run
explained and evaluated in [4].
                                                                    Business application tool is built using PHP (whole
2.2 Cloud-Based Infrastructure                                   application runs on a web browser) which provides a good
                                                                 back end connectivity and runtime evaluation support. Back
   As an example of cloud, a set of distributed parallel         end modules are coded using SQL Azure an alternative to
computers is considered to be working independently or           SQL for developing cloud applications. The basic API
dependently, but additively to serve the cumulative needs of a   workflow consists of the design of the web application built
large number of customers requiring service. Quantitative        in PHP. Cloud app is a platform free website with cloud
methods of statistical inference on the quality of service       database as backend and it highlights the difference and
(QoS) or conversely, Loss of Service (LoS), as commonly          various uses of private, public and Hybrid cloud
used customer satisfaction metrics of system reliability and     infrastructures. End users access cloud based applications
security performance are reviewed in [7].                        through a web browser or a light weight desktop or mobile
                                                                 application.
2.3 On Demand Cloud Services

   The emergence of the cloud computing paradigm promises
flexibility and adaptability through on-demand provisioning
of compute resources. Different providers expose different
interfaces to their compute resources utilizing varied
architectures and implementation technologies [5].

2.4 Cloud Storage

   Cloud storage provides a large paradigm shift from the
past, where now the customers have to pay only for the
utilization of the storage and transfer of data. Large
enterprises use CDNS (Content Delivery Network System)
and content-centering [6] for the transfer of data and storage
of data. Some major advancement in cloud storage and
CDNS are given in [10].
                                                                             Figure 3.1: API Architecture
2.5 Hybrid Cloud Architectures
                                                                 3.2 Application Provider (SaaS)
     Hybrid architectures that combine traditionally
provided IT services with web-based services [1, 12] will        Online business application is built on cloud infrastructure
enable to harness the advantages of the computing paradigm,      and the system acts as an application provider or it acts a
                                                                 middleware. End users access the application through a PHP
while minimizing the risks.
                                                                 compatible browser, or it can also be incorporated as a
                                                                 standalone desktop application.



                                                                                                                          53
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                                              Volume 1, Issue 5, July 2012

                                                                  designing and editing tables, views, stored procedures,
                                                                  authoring and executing Transact-SQL queries.

                                                                  3.4 Application Pattern Design

                                                                  Microsoft Azure provides a wide range of options to design
                                                                  API’s using Cloud storage as the back end storage. The SaaS
                                                                  Application is designed using PHP for better compatibility
                                                                  and greater flexibility in creating dynamic web pages. The
                                                                  following describes the interface modules.

                                                                  3.4.1 Registration

              Figure 3.2 SaaS Provider                            Registration is a three step process which contains collection
                                                                  of details and credit card validation. Registration page gives
3.3 SQL-AZURE Overview                                            the introduction and modes of subscription for the users. A
                                                                  user can make use of both public and private modules by
SQL Azure [13] is a highly scalable cloud database service        subscribing to the appropriate resources of his needs.
built in SQL server technologies. SQL Azure database has
built-in high-availability, failover, and redundancy. SQL              PAY-AS-U-GO
Azure is a cloud version of SQL Server database engine. SQL       Public user has the independence to select the amount of
Azure is an ideal database for transactional query-based          database or time of usage.
business applications such as transaction processing,
departmental or line of business solutions. SQL Azure allows           SUBSCRIPTION
creation of virtual SQL server on cloud servers. Virtual          Private user can subscribe to the service in half yearly or
server consists of databases, user accounts etc. SQL azure is     annual subscription models.
a high availability Server and it provides automatic, seamless
fail-over.                                                        3.4.2 Dashboard

   SQL Azure can be accessed from Windows Azure                   The domain serves as the homepage of the application and it
applications, as well as on-premises applications hosted in       is a public domain in the hybrid architecture. The domain is
customer’s data centers. It provides high availability by         responsible for posting news about pending payments, delay
storing multiple copies of databases, elastic scale and rapid     in the shipment of the item and keeps track of time usage and
provisioning. It exposes a subset of the full SQL Server          memory bytes used. The domain shows the order of the
functionality, including only a subset of the data types          status of a particular item with its item code and the name of
including string, numeric, date and boolean. It uses an           the user who ordered the item. It shows the invoice summary
XML-based format for data transfer. Like Microsoft SQL            of the user giving descriptions of the invoice and the changes
Server, SQL Azure uses T-SQL as the query language and            occurring in the invoice every month.
Tabular Data Stream (TDS) as the protocol to access the
service over internet.                                            3.4.3 Customer

3.3.1 Setting up Windows Azure Cloud Development                  This domain keeps log of all the customer names in an
Environment                                                       alphabetical order. Details about the customers include email
                                                                  id, phone number, addresses. The domain is also responsible
Microsoft Windows Azure [13] provides PaaS to build and           for getting the mode of payments for items purchased by the
deploy the application into the cloud storage media. A            customer.
unique App Key and client name is provided for every
subscription. Windows Azure enables us to build and run           3.4.4 Billing
highly available applications without focusing on the
infrastructure. It provides automatic OS and service              Invoice is a record of business transaction. There is typically
patching, built in network load balancing and resiliency to       an invoice for every order that a customer places. This
hardware failure. It supports a deployment model that             invoice records all the information regarding the items
enables to upgrade the application without downtime. In           purchased along with the customer details and also includes
addition to service deployment and management tasks, the          the cost incurred for using the service. The billing domain is
Windows Azure Platform Management Portal provides the             used to generate reports which can be used to calculate the
user interface for provisioning SQL Azure servers and logins,     profit gained by the business.
configuring the firewall, and creating SQL Azure databases.
                                                                  3.4.5 Organizer
  After provisioning a server, a tool such as SQL Server
Management Studio or the Management Portal for SQL                The organizer is a private module domain which is used to
Azure must be used for database management tasks such as          specify the different tasks and all the upcoming events to a
                                                                  particular customer.

                                                                                                                              54
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 5, July 2012

                                                                                  distribute the table's entities over many storage
3.4.6 Module Request and Feedback                                                 nodes.
                                                                                 RowKey – A second key property for the table.
Module request is an on-demand private module, which                              This is the unique ID of the entity within the
includes customer feedback and interaction.                                       partition it belongs to. The PartitionKey
                                                                                  combined with the RowKey uniquely identifies
3.4.7 Reports                                                                     an entity in a table.
A report is a private module that is used to generate dynamic                               Table 3.1 SQL table
graphs and tables by analyzing the invoice and customer                              NUMBER             NAME      PHONE
                                                                     Data
statistics. Cloud usage and subscription details can also be         Fields
viewed in the reports module.
                                                                                     001                Axvdjh    9822104534
3.5 Back End Connectivity Modules
                                                                                     002                Bsdkdf    9884144559
The whole back end infrastructure is coded in windows azure
cloud development environment. The SQL Azure query
language is utilized for storage and performing data mining.        Normal SQL tables are scaled vertically downwards where
                                                                    the first row of the table represents the data fields as shown in
There are three major types of storage medium                       Table 3.1.
• Tables
• Blobs                                                                                Table 3.2 SQL Azure Table
• Queues
                                                                                     Entity
3.5.1 Tables
                                                                Property
                                                                                   Number         001               002
The tables contain entities, and the entities contain properties.
Entities act as classes and rows act as objects providing an                       Name           Axvdjh            bsdkdf
object oriented approach to the data variables. The tables are
scalable to billions of entities and terabytes of data, and may
                                                                                   Phone          9884144559      9822104534
be partitioned across thousands of servers. The tables in
Windows Azure Storage enforce no schema and the
properties in a single entity can be of different types that can
change over time.                                                   SQL Azure tables are scaled horizontally where each row
                                                                    represents entity and column represents property.
Table Data Model
                                                                    3.5.2 Blob Storage
The following summarizes the data model for Windows
Azure Table,                                                        Binary large objects (Blobs) are just slabs of bytes.
                                                                    Windows Azure Blob enables applications to store large sets
           Storage Account – An application must use a             of these slabs of bytes, up to 50GB each in the cloud. Blob
            valid account to access Windows Azure Storage.          storage can be used to upload multimedia and document files;
            A new account can be created via the Windows            it acts as an online hard disk for the application. It supports a
            Azure portal web interface. The user will receive       massively scalable blob system, where hot blobs will be
            a 256-bit secret key once the account is created.       served from many servers to scale out and meet the traffic
            This secret key is then used to authenticate user       needs of the application. Furthermore, the system is highly
            requests to the storage system.                         available and durable. One can always access the data from
           Table – contains a set of entities. An application      anywhere at any time, and the data is replicated at least 3
            may create many tables within a storage account.        times for durability.      In addition, strong consistency is
                                                                    provided to ensure that the object is immediately accessible
           Entity (Row) – Entities (an entity is analogous to      once it is added or updated, a subsequent read will
            a "row") are the basic data items stored in a table.    immediately see the changes made from a previously
            An entity contains a set of properties. Each table      committed write.
            has two properties, namely the “PartitionKey and
            RowKey” that form the unique key for the entity.        Blob Data Model
           Property (Column) – This represents a single
            value in an entity. Property names are case
            sensitive. A rich type set is supported for             1. Storage Account – All access to Windows Azure Storage is
            property values.                                        done through a storage account.

           PartitionKey – The first key property of every
            table. The system uses this key to automatically
                                                                                                                                  55
                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                                             Volume 1, Issue 5, July 2012

        This is the highest level of the namespace for
          accessing blobs                                            3.6.1 New Deployment

        An account can have many Blob Containers                    To deploy an application to Windows Azure, a new hosted
                                                                     service must be created via the Windows Azure Management
   2. Blob Container – A container provides a grouping of a set      Portal. A hosted service allows the application to select one
   of blobs. The container name is scoped by the account.            of the six Windows Azure data centers around the world
                                                                     where the applications will be deployed. A DNS record is
        Sharing policies are set at the container level.            created which maps the custom domain name to the Windows
          Currently "Public READ" and "Private" are                  Azure DNS name.
          supported. When a container is "Public READ", all
          its contents can be read by anyone without requiring       3.6.2 Configuration Change
          authentication.
                                                                     Once an application is deployed and running, the roles can be
        When a container is "Private", only the owner of the        reconfigured by modifying the CSCFG file in use.
          corresponding account can access the blobs in that
          container with authenticated access.                       3.6.3 Incremental Code Upgrade

                                                                     If the application wants an incremental code upgrade to a role
        Containers can also have metadata associated with
                                                                     a new CSPKG file containing the new code is created and
          them. Metadata is in the form of pairs, and they are
                                                                     uploaded to Windows Azure via the Windows Azure
          up to 8KB in size per container.
                                                                     Management Portal.
        The ability to list all of the blobs within the container   3.6.4 Major Upgrade
          is also provided.
                                                                     Windows Azure also offers a way to make a major new
   3.5.3 Queues                                                      release of the application without incurring any downtime.
   Queue allows decoupling of different parts of a cloud
   application, enabling cloud applications to be easily built
   with different technologies and easily scale with traffic                        4. EXPERIMENT AND ANALYSIS
   needs.
                                                                     Registration
                      Request Queue
                                                                     The first step of registration contains a form to fill up the
                                                                     basic user details as shown below,

                                               Backend
  Web                                         Processing
Server FE                                       Server

                                                Backend
                                               Processing
Web Server                                       Server
   FE




                  Blob Store         Table Store                                       Figure 4.1 Registration (Step 1)


               Figure 3.4 Queue usage in SQL Azure                   The second step of registration contains a form to get input
                                                                     about the basic details of organization as shown below,
   3.6 Deployment and Test Run

   In a traditional server hosting model, the deployment of an
   application to a host, patching the operating system,
   components and application code has to be taken care
   manually. Windows Azure handles deployment and update
   issues automatically. There are four major scenarios for
   deploying cloud application.

                                                                                                                                56
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                                             Volume 1, Issue 5, July 2012




                   Figure 4.2 Registration (Step 2)
                                                                                  Figure 4.5 Subscription (Public)



Subscription                                                       Dashboard (Private)

In the first step of subscription, user has to choose between      Dashboard is the home page of the application. Private users
public or private service.                                         have all the modules specified.




                  Figure 4.3 Subscription

The following snapshot shows the different subscription
options for private service subscribers.


                                                                                      Figure 4.6 Dashboard (Private)




                                                                   Dashboard (Public)

                                                                   The following interface shows that the public users can
                                                                   access only three important modules in the dashboard.




             Figure 4.4 Subscription (Private)

      The following snapshot shows the different
subscription options for public service subscribers. Public
user can either pay for the database size or a fixed amount can
be specified.




                                                                                                                             57
                                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 5, July 2012




                                                                                   Figure 4.9 Report

            Figure 4.7 Dashboard (Public)




                                                                Organizer
Billing Module
                                                                Organizer is a private module that is used to schedule events
Billing panel is a hybrid module where new invoices and bills
                                                                and set reminders
are added to the database.




                                                                                  Figure 4.10 Organizer



                                                                Worker Role

                                                                The Worker Role is similar to a windows service. It starts up
              Figure 4.8 Billing                                and will be running all the time. It is used to perform some
                                                                maintenance work.

Reports Module

The screenshot below shows a report that is generated from
the bills in the form of charts and graphs.




                                                                            Figure 4.11 Worker Role



                                                                Packaging application

                                                                The following interface shows the packaging of the cloud
                                                                application for deployment in local development
                                                                environment.

                                                                                                                          58
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 5, July 2012

                                                                   Technologies, Ostrava, CZECH REPUBLIC, IEEE 2008, pp
                                                                   120-125.

                                                                   3. Banerjee, P. “An intelligent IT infrastructure for the future”. In
                                                                   Proceedings of 15th International Symposium on High-Performance
                                                                   Computer Architecture, 2009.

                                                                   4. Delic, K. A., and Riley, J. A.. “Enterprise Knowledge Clouds:
                                                                   Next Generation KM Systems”. In Proceedings of International
                                                                   Conference on Information, Process, and Knowledge Management,
                                                                   Cancun, MEXICO. 2009, pp 49-53.

                                                                   5. Dodda, R. T., Smith, C., and van Moorsel, A. “An Architecture
                                                                   for Cross-Cloud System Management”. In Proceedings of 2nd
                                                                   International Conference on Contemporary Computing, Noida,
                                                                   INDIA, 2009, pp 556-567.
             Figure 4.12 Packaging                                 6. Erickson, J. S., Spence, S., Rhodes, M., Banks, D., Rutherford, J.,
                                                                   Simpson, E., et al. (2009), “Content-Centered Collaboration Spaces
                                                                   in the Cloud”. IEEE Internet Computing, volume 13 Issue 5, pp
                                                                   34-42.
APP Deployment
The screenshot below shows the sample Azure app                    7. Grossman, R. L., Gu, Y. H., Sabala, M., and Zhang, W. Z. (2009),
deployment and worker roles maintaining the backbone of            “Compute and storage clouds using wide area high performance
the application.                                                   networks”. Future Generation Computer Systems: The International
                                                                   Journal of Grid Computing Theory Methods and Applications,
                                                                   volume 25 Issue 2, pp 179-183.

                                                                   8. Lijun, M., Chan, W.K., and Tse, T.H. (2008), “A tale of clouds:
                                                                   Paradigm comparisons and some thoughts on research issues”. In
                                                                   Proceedings of IEEE Asia-Pacific Services Computing Conference,
                                                                   APSCC’08, pp 464-469.

                                                                   9. Praveena, K., and Betsy T. (2009), “Application of Cloud
                                                                   Computing in Academia”. IUP Journal of Systems Management’,
                                                                   volume 7 Issue 3, pp 50-54.

                                                                   10. Open Grid Forum and Storage Networking Industry Association
                                                                   (2009), “Cloud Storage for Cloud Computing”.

                                                                   11. Rohit Maheshwari and Sunil Pathak, ―A Proposed Secure
                                                                   Framework for Safe Data Transmission in Private Cloud”

                                                                   12. www.gartner.com
                   Figure 4.13 APP Deployment
                                                                   13. www.windowsazure.com

                                                                   14. http://en.wikipedia.org/wiki/Cloud_computing
                       5. CONCLUSION

     In this proposed work the advantages of cloud computing
is illustrated as a developing technology and its impact on
E-commerce and the IT industry. The proposed work mainly
concentrates on the implementation of the Hybrid cloud
architecture.


                     6. REFERENCES

1. Georg Lackermair. “Hybrid cloud architectures for the online
commerce”. In Proceedings of Procedia Computer Science, 2011,
Vol: 3, pp 550–555.

2. Aymerich, F. M., Fenu, G., Surcis, S. “An Approach to a Cloud
Computing Network”. In Proceedings of 1st International
Conference on the Applications of Digital Information and Web

                                                                                                                                      59
                                                All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud ComputingQuaid Sodawala
 
A220113
A220113A220113
A220113irjes
 
A Proposed Virtualization Technique to Enhance IT Services
A Proposed Virtualization Technique to Enhance IT ServicesA Proposed Virtualization Technique to Enhance IT Services
A Proposed Virtualization Technique to Enhance IT ServicesHossam Al-Ansary
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Cloud computing
Cloud computingCloud computing
Cloud computingJawhar Ali
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 

What's hot (17)

Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
 
D045031724
D045031724D045031724
D045031724
 
A220113
A220113A220113
A220113
 
A Proposed Virtualization Technique to Enhance IT Services
A Proposed Virtualization Technique to Enhance IT ServicesA Proposed Virtualization Technique to Enhance IT Services
A Proposed Virtualization Technique to Enhance IT Services
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 

Viewers also liked (9)

22 27
22 2722 27
22 27
 
158 162
158 162158 162
158 162
 
134 138
134 138134 138
134 138
 
331 340
331 340331 340
331 340
 
106 110
106 110106 110
106 110
 
18 23
18 2318 23
18 23
 
699 703
699 703699 703
699 703
 
213 221
213 221213 221
213 221
 
172 179
172 179172 179
172 179
 

Similar to Online Business Management Using a Hybrid Cloud

Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryCloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryStudying
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewIOSR Journals
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaSoftware Guru
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCINGCLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCINGIAEME Publication
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING IAEME Publication
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computingMehul Patel
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingSteven Wallach
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 

Similar to Online Business Management Using a Hybrid Cloud (20)

119 125
119 125119 125
119 125
 
Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryCloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industry
 
70 74
70 7470 74
70 74
 
489 493
489 493489 493
489 493
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
G017324043
G017324043G017324043
G017324043
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCINGCLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
 
G0314043
G0314043G0314043
G0314043
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Am36234239
Am36234239Am36234239
Am36234239
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Online Business Management Using a Hybrid Cloud

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD Vanaja Gokul, Venkatesh.G, Vignesh.B and GowriShankar.M Department of Computer Science & Engineering, Sri Venkateswara College of Engineering, Sriperumbudur, Chennai, India vanajagokul@gmail.com   Utility computing: The packaging of computing Abstract— Hybrid cloud combines the external public resources [3], such as computation and storage, as a services and the internal private cloud providing services metered service similar to a traditional public utility, thereby enhancing the capabilities to secure, manage and such as electricity. govern the entire cloud spectrum. In this paper, online business management system is implemented using a hybrid cloud architecture which provides faster and greater ease of  Peer-to-peer: Distributed architecture without the access to business transaction and management. The need for central coordination, with both the implemented system effectively favors the small scale, large suppliers and consumers of resources being scale, Business to Business (B2B) and Business to Consumers available at the same time. (B2C) by using E-commerce for management solution.  Cloud computing: Cloud computing [9] is a general Index Terms— Hybrid cloud, business management, term for anything that involves delivering hosted E-commerce services over the Internet. 1. INTRODUCTION 1.2 Cloud Computing Cloud is an emerging technology [8, 14] that uses the 1.1 Distributed Computing internet and central remote servers to maintain data and applications. Cloud computing allows consumers and Distributed computing is a field of computer science where businesses to use applications without installation and multiple autonomous computers communicate through a access their personal files at any computer with internet computer network. The computers interact with each other in access. This technology allows for much more efficient order to achieve a common goal. computing by centralizing storage, memory, processing and bandwidth. It can also be defined as the delivery of Types of Distributed Computing computing as a service rather than a product, whereby shared resources, software, and information are provided  Autonomic computing: Computer systems capable to computers and other devices as a utility over a of self-management. network.  Client–server model: Client–server computing refers to any distributed application that distinguishes service providers and service requesters.  Grid computing: A form of distributed and parallel computing that forms the basic element for the large scale supply of cloud services [2].  Mainframe computer: Powerful computers used mainly by large organizations for critical applications. Figure 1.1 Sample Cloud Architecture Manuscript received June, 2012. Vanaja Gokul, Asst. Prof., Department of Computer Science & Engg., Sri 1.2.1 Service Models Venkateswara College of Engineering, Sriperumbudur, India (email:vanajagokul@gmail.com). As referred from [14], the three service models supported in Venkatesh,Vignesh and GowriShankar, Students, Department of Computer Science & Engg., Sri Venkateswara College of Engineering, cloud are, Sriperumbudur, India.  Infrastructure-as-a-Service (IaaS) 51 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012  Platform-as-a-Service (PaaS) 1.2.2 Deployment Modes  Software-as-a-Service (SaaS) As referred from [1, 14] the following are the deployment 1.2.1.1 Infrastructure-as-a-Service (IaaS) modes in cloud. Cloud providers offer computers as physical or more often as 1.2.2.1 Private virtual machines, raw (block) storage, firewalls, load balancers, and networks. IaaS providers supply these Private cloud (also called internal cloud or corporate cloud) is resources on demand from their large pools installed in data a computing architecture [11] that provides hosted services to centres. Local area networks including IP addresses are part a limited number of people behind a security validation. of the offer. Some examples of IaaS are Hence, the organizations themselves have to buy, build, and manage them and thereby is not accepted by many as an  Amazon S3/EC2, actual cloud computing and subsequently do not even reap  Microsoft Windows Azure, benefits from major advantages of cloud computing.  VMWare vCloud. 1.2.2.2 Public 1.2.1.2 Platform-as-a-Service (PaaS) A public cloud is actually the known version of Cloud and is In the PaaS model, cloud providers deliver a computing based on the original cloud computing model. Here the platform or solution stack typically including operating service provider manages the resources including the system, programming language execution environment, applications and data storage and makes it available to the database, and web server. Application developers can general public over the Internet. Generally the Public cloud develop and run their software solutions on a cloud platform service providers operate on a pay-per-usage model but some without the cost and complexity of buying and managing the also provide free services till a certain limit to attract more underlying hardware and software layers. With some PaaS users. offers, the underlying compute and storage resources scale automatically to match application demand such that the 1.2.2.3 Hybrid cloud user does not have to allocate resources manually. Some examples of PaaS are Hybrid cloud as the name suggests is a composition of two or  Google App Engine. more clouds generally private and public. The individual  Microsoft Azure Services Platform. cloud models remain independent entities but function  ORACLE/AWS. together, thereby, offering the benefits of multiple deployment models. It sometimes is used in the reference of 1.2.1.3 Software-as-a-Service (SaaS) a platform where multiple cloud systems are connected and which offers the flexibility to move programs and data easily In the SaaS cloud model, the vendor supplies the hardware from one deployment system to another. Organizations may infrastructure, the software product and interacts with the host critical applications on private clouds and applications user through a front-end portal. SaaS is a very broad market. with relatively less security concerns on the public cloud. Services can be anything from Web-based email to inventory control and database processing. Because the service provider hosts both the application and the data, the end user is free to use the service from any application. CLOUD CLIENTS Web browser, mobile app, thin client, terminal emulators…. SaaS Application CRM, E-mail, Virtual desktop, games… PaaS Platform Figure 1.3 Hybrid Cloud Architecture Database, webserver, development tools,…. 1.3 E-Commerce IaaS Infrastructure, Storage, Load balancer, network,servers,… E-commerce (e-commerce) or electronic commerce, subset of e-business, is the purchasing, selling, and exchanging of goods and services over computer networks (such as the Figure 1.2 Service Models Internet) through which transactions or terms of sale are performed electronically. 52 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 2. RELATED WORK AND MOTIVATION Many of the previous work [3, 9] in the field of cloud 3. PROPOSED WORK computing have been in the areas of enhancing distributed computing, general explanation of the cloud technology, differences among similar technologies, security The proposed work of implementing an online business requirements and the future expectations in these emerging management tool using hybrid cloud architecture can be environments. The new methods can be experimented and deployed and can be used in an on-demand basis. used by the advent of global industries acting as cloud providers. This motivates the proposed implementation of 3.1 Modules used hybrid cloud architecture. 1. Setting up hybrid cloud infrastructures 2.1 Cloud-Scale Intelligent Infrastructure 2. Configuring (Application Programming Interface) API’s using PHP Cloud computing is an emerging application platform that 3. Designing Application patterns and User Interface aims to share data, calculations and services among users. 4. Back end connectivity Modules The methods to model it with the challenges like user 5. Deploying App to Local Cloud environment interface, task distribution and coordination issues are 6. Acquiring DNS from Cloud portal and Test run explained and evaluated in [4]. Business application tool is built using PHP (whole 2.2 Cloud-Based Infrastructure application runs on a web browser) which provides a good back end connectivity and runtime evaluation support. Back As an example of cloud, a set of distributed parallel end modules are coded using SQL Azure an alternative to computers is considered to be working independently or SQL for developing cloud applications. The basic API dependently, but additively to serve the cumulative needs of a workflow consists of the design of the web application built large number of customers requiring service. Quantitative in PHP. Cloud app is a platform free website with cloud methods of statistical inference on the quality of service database as backend and it highlights the difference and (QoS) or conversely, Loss of Service (LoS), as commonly various uses of private, public and Hybrid cloud used customer satisfaction metrics of system reliability and infrastructures. End users access cloud based applications security performance are reviewed in [7]. through a web browser or a light weight desktop or mobile application. 2.3 On Demand Cloud Services The emergence of the cloud computing paradigm promises flexibility and adaptability through on-demand provisioning of compute resources. Different providers expose different interfaces to their compute resources utilizing varied architectures and implementation technologies [5]. 2.4 Cloud Storage Cloud storage provides a large paradigm shift from the past, where now the customers have to pay only for the utilization of the storage and transfer of data. Large enterprises use CDNS (Content Delivery Network System) and content-centering [6] for the transfer of data and storage of data. Some major advancement in cloud storage and CDNS are given in [10]. Figure 3.1: API Architecture 2.5 Hybrid Cloud Architectures 3.2 Application Provider (SaaS) Hybrid architectures that combine traditionally provided IT services with web-based services [1, 12] will Online business application is built on cloud infrastructure enable to harness the advantages of the computing paradigm, and the system acts as an application provider or it acts a middleware. End users access the application through a PHP while minimizing the risks. compatible browser, or it can also be incorporated as a standalone desktop application. 53 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 designing and editing tables, views, stored procedures, authoring and executing Transact-SQL queries. 3.4 Application Pattern Design Microsoft Azure provides a wide range of options to design API’s using Cloud storage as the back end storage. The SaaS Application is designed using PHP for better compatibility and greater flexibility in creating dynamic web pages. The following describes the interface modules. 3.4.1 Registration Figure 3.2 SaaS Provider Registration is a three step process which contains collection of details and credit card validation. Registration page gives 3.3 SQL-AZURE Overview the introduction and modes of subscription for the users. A user can make use of both public and private modules by SQL Azure [13] is a highly scalable cloud database service subscribing to the appropriate resources of his needs. built in SQL server technologies. SQL Azure database has built-in high-availability, failover, and redundancy. SQL  PAY-AS-U-GO Azure is a cloud version of SQL Server database engine. SQL Public user has the independence to select the amount of Azure is an ideal database for transactional query-based database or time of usage. business applications such as transaction processing, departmental or line of business solutions. SQL Azure allows  SUBSCRIPTION creation of virtual SQL server on cloud servers. Virtual Private user can subscribe to the service in half yearly or server consists of databases, user accounts etc. SQL azure is annual subscription models. a high availability Server and it provides automatic, seamless fail-over. 3.4.2 Dashboard SQL Azure can be accessed from Windows Azure The domain serves as the homepage of the application and it applications, as well as on-premises applications hosted in is a public domain in the hybrid architecture. The domain is customer’s data centers. It provides high availability by responsible for posting news about pending payments, delay storing multiple copies of databases, elastic scale and rapid in the shipment of the item and keeps track of time usage and provisioning. It exposes a subset of the full SQL Server memory bytes used. The domain shows the order of the functionality, including only a subset of the data types status of a particular item with its item code and the name of including string, numeric, date and boolean. It uses an the user who ordered the item. It shows the invoice summary XML-based format for data transfer. Like Microsoft SQL of the user giving descriptions of the invoice and the changes Server, SQL Azure uses T-SQL as the query language and occurring in the invoice every month. Tabular Data Stream (TDS) as the protocol to access the service over internet. 3.4.3 Customer 3.3.1 Setting up Windows Azure Cloud Development This domain keeps log of all the customer names in an Environment alphabetical order. Details about the customers include email id, phone number, addresses. The domain is also responsible Microsoft Windows Azure [13] provides PaaS to build and for getting the mode of payments for items purchased by the deploy the application into the cloud storage media. A customer. unique App Key and client name is provided for every subscription. Windows Azure enables us to build and run 3.4.4 Billing highly available applications without focusing on the infrastructure. It provides automatic OS and service Invoice is a record of business transaction. There is typically patching, built in network load balancing and resiliency to an invoice for every order that a customer places. This hardware failure. It supports a deployment model that invoice records all the information regarding the items enables to upgrade the application without downtime. In purchased along with the customer details and also includes addition to service deployment and management tasks, the the cost incurred for using the service. The billing domain is Windows Azure Platform Management Portal provides the used to generate reports which can be used to calculate the user interface for provisioning SQL Azure servers and logins, profit gained by the business. configuring the firewall, and creating SQL Azure databases. 3.4.5 Organizer After provisioning a server, a tool such as SQL Server Management Studio or the Management Portal for SQL The organizer is a private module domain which is used to Azure must be used for database management tasks such as specify the different tasks and all the upcoming events to a particular customer. 54 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 distribute the table's entities over many storage 3.4.6 Module Request and Feedback nodes.  RowKey – A second key property for the table. Module request is an on-demand private module, which This is the unique ID of the entity within the includes customer feedback and interaction. partition it belongs to. The PartitionKey combined with the RowKey uniquely identifies 3.4.7 Reports an entity in a table. A report is a private module that is used to generate dynamic Table 3.1 SQL table graphs and tables by analyzing the invoice and customer NUMBER NAME PHONE Data statistics. Cloud usage and subscription details can also be Fields viewed in the reports module. 001 Axvdjh 9822104534 3.5 Back End Connectivity Modules 002 Bsdkdf 9884144559 The whole back end infrastructure is coded in windows azure cloud development environment. The SQL Azure query language is utilized for storage and performing data mining. Normal SQL tables are scaled vertically downwards where the first row of the table represents the data fields as shown in There are three major types of storage medium Table 3.1. • Tables • Blobs Table 3.2 SQL Azure Table • Queues Entity 3.5.1 Tables Property Number 001 002 The tables contain entities, and the entities contain properties. Entities act as classes and rows act as objects providing an Name Axvdjh bsdkdf object oriented approach to the data variables. The tables are scalable to billions of entities and terabytes of data, and may Phone 9884144559 9822104534 be partitioned across thousands of servers. The tables in Windows Azure Storage enforce no schema and the properties in a single entity can be of different types that can change over time. SQL Azure tables are scaled horizontally where each row represents entity and column represents property. Table Data Model 3.5.2 Blob Storage The following summarizes the data model for Windows Azure Table, Binary large objects (Blobs) are just slabs of bytes. Windows Azure Blob enables applications to store large sets  Storage Account – An application must use a of these slabs of bytes, up to 50GB each in the cloud. Blob valid account to access Windows Azure Storage. storage can be used to upload multimedia and document files; A new account can be created via the Windows it acts as an online hard disk for the application. It supports a Azure portal web interface. The user will receive massively scalable blob system, where hot blobs will be a 256-bit secret key once the account is created. served from many servers to scale out and meet the traffic This secret key is then used to authenticate user needs of the application. Furthermore, the system is highly requests to the storage system. available and durable. One can always access the data from  Table – contains a set of entities. An application anywhere at any time, and the data is replicated at least 3 may create many tables within a storage account. times for durability. In addition, strong consistency is provided to ensure that the object is immediately accessible  Entity (Row) – Entities (an entity is analogous to once it is added or updated, a subsequent read will a "row") are the basic data items stored in a table. immediately see the changes made from a previously An entity contains a set of properties. Each table committed write. has two properties, namely the “PartitionKey and RowKey” that form the unique key for the entity. Blob Data Model  Property (Column) – This represents a single value in an entity. Property names are case sensitive. A rich type set is supported for 1. Storage Account – All access to Windows Azure Storage is property values. done through a storage account.  PartitionKey – The first key property of every table. The system uses this key to automatically 55 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012  This is the highest level of the namespace for accessing blobs 3.6.1 New Deployment  An account can have many Blob Containers To deploy an application to Windows Azure, a new hosted service must be created via the Windows Azure Management 2. Blob Container – A container provides a grouping of a set Portal. A hosted service allows the application to select one of blobs. The container name is scoped by the account. of the six Windows Azure data centers around the world where the applications will be deployed. A DNS record is  Sharing policies are set at the container level. created which maps the custom domain name to the Windows Currently "Public READ" and "Private" are Azure DNS name. supported. When a container is "Public READ", all its contents can be read by anyone without requiring 3.6.2 Configuration Change authentication. Once an application is deployed and running, the roles can be  When a container is "Private", only the owner of the reconfigured by modifying the CSCFG file in use. corresponding account can access the blobs in that container with authenticated access. 3.6.3 Incremental Code Upgrade If the application wants an incremental code upgrade to a role  Containers can also have metadata associated with a new CSPKG file containing the new code is created and them. Metadata is in the form of pairs, and they are uploaded to Windows Azure via the Windows Azure up to 8KB in size per container. Management Portal.  The ability to list all of the blobs within the container 3.6.4 Major Upgrade is also provided. Windows Azure also offers a way to make a major new 3.5.3 Queues release of the application without incurring any downtime. Queue allows decoupling of different parts of a cloud application, enabling cloud applications to be easily built with different technologies and easily scale with traffic 4. EXPERIMENT AND ANALYSIS needs. Registration Request Queue The first step of registration contains a form to fill up the basic user details as shown below, Backend Web Processing Server FE Server Backend Processing Web Server Server FE Blob Store Table Store Figure 4.1 Registration (Step 1) Figure 3.4 Queue usage in SQL Azure The second step of registration contains a form to get input about the basic details of organization as shown below, 3.6 Deployment and Test Run In a traditional server hosting model, the deployment of an application to a host, patching the operating system, components and application code has to be taken care manually. Windows Azure handles deployment and update issues automatically. There are four major scenarios for deploying cloud application. 56 All Rights Reserved © 2012 IJARCET
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Figure 4.2 Registration (Step 2) Figure 4.5 Subscription (Public) Subscription Dashboard (Private) In the first step of subscription, user has to choose between Dashboard is the home page of the application. Private users public or private service. have all the modules specified. Figure 4.3 Subscription The following snapshot shows the different subscription options for private service subscribers. Figure 4.6 Dashboard (Private) Dashboard (Public) The following interface shows that the public users can access only three important modules in the dashboard. Figure 4.4 Subscription (Private) The following snapshot shows the different subscription options for public service subscribers. Public user can either pay for the database size or a fixed amount can be specified. 57 All Rights Reserved © 2012 IJARCET
  • 8. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Figure 4.9 Report Figure 4.7 Dashboard (Public) Organizer Billing Module Organizer is a private module that is used to schedule events Billing panel is a hybrid module where new invoices and bills and set reminders are added to the database. Figure 4.10 Organizer Worker Role The Worker Role is similar to a windows service. It starts up Figure 4.8 Billing and will be running all the time. It is used to perform some maintenance work. Reports Module The screenshot below shows a report that is generated from the bills in the form of charts and graphs. Figure 4.11 Worker Role Packaging application The following interface shows the packaging of the cloud application for deployment in local development environment. 58 All Rights Reserved © 2012 IJARCET
  • 9. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Technologies, Ostrava, CZECH REPUBLIC, IEEE 2008, pp 120-125. 3. Banerjee, P. “An intelligent IT infrastructure for the future”. In Proceedings of 15th International Symposium on High-Performance Computer Architecture, 2009. 4. Delic, K. A., and Riley, J. A.. “Enterprise Knowledge Clouds: Next Generation KM Systems”. In Proceedings of International Conference on Information, Process, and Knowledge Management, Cancun, MEXICO. 2009, pp 49-53. 5. Dodda, R. T., Smith, C., and van Moorsel, A. “An Architecture for Cross-Cloud System Management”. In Proceedings of 2nd International Conference on Contemporary Computing, Noida, INDIA, 2009, pp 556-567. Figure 4.12 Packaging 6. Erickson, J. S., Spence, S., Rhodes, M., Banks, D., Rutherford, J., Simpson, E., et al. (2009), “Content-Centered Collaboration Spaces in the Cloud”. IEEE Internet Computing, volume 13 Issue 5, pp 34-42. APP Deployment The screenshot below shows the sample Azure app 7. Grossman, R. L., Gu, Y. H., Sabala, M., and Zhang, W. Z. (2009), deployment and worker roles maintaining the backbone of “Compute and storage clouds using wide area high performance the application. networks”. Future Generation Computer Systems: The International Journal of Grid Computing Theory Methods and Applications, volume 25 Issue 2, pp 179-183. 8. Lijun, M., Chan, W.K., and Tse, T.H. (2008), “A tale of clouds: Paradigm comparisons and some thoughts on research issues”. In Proceedings of IEEE Asia-Pacific Services Computing Conference, APSCC’08, pp 464-469. 9. Praveena, K., and Betsy T. (2009), “Application of Cloud Computing in Academia”. IUP Journal of Systems Management’, volume 7 Issue 3, pp 50-54. 10. Open Grid Forum and Storage Networking Industry Association (2009), “Cloud Storage for Cloud Computing”. 11. Rohit Maheshwari and Sunil Pathak, ―A Proposed Secure Framework for Safe Data Transmission in Private Cloud” 12. www.gartner.com Figure 4.13 APP Deployment 13. www.windowsazure.com 14. http://en.wikipedia.org/wiki/Cloud_computing 5. CONCLUSION In this proposed work the advantages of cloud computing is illustrated as a developing technology and its impact on E-commerce and the IT industry. The proposed work mainly concentrates on the implementation of the Hybrid cloud architecture. 6. REFERENCES 1. Georg Lackermair. “Hybrid cloud architectures for the online commerce”. In Proceedings of Procedia Computer Science, 2011, Vol: 3, pp 550–555. 2. Aymerich, F. M., Fenu, G., Surcis, S. “An Approach to a Cloud Computing Network”. In Proceedings of 1st International Conference on the Applications of Digital Information and Web 59 All Rights Reserved © 2012 IJARCET