SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 17
MIGRATION OF APPLICATION SCHEMA TO WINDOWS AZURE
CLOUDS
Amandeep Singh1
, Karandeep Singh2
1
Assistant Professor, Computer Science and Engineering Dept, PTU, BMSCE, Muktsar, India
2
Head & Assistant Professor, MAMC, Agroha, Hisar, Haryana, India
Abstract
Schema migration involves the migration of application schema to clouds. Presently various script generation techniques are there
which are used for schema migration, which also sometimes require the application architecture to be changed to make it compatible
with cloud platform. This paper shows an approach using user templates for capturing the schema structure and access control
mechanism for migration of application schema without using script generation tools. Further it gives the necessary algorithm to
show the feasibility of its implementation.
Keywords— Cloud Computing, rbac, roles, nist, saas, schema, xsd, xml.
------------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is an emerging computing paradigm in which
resources of the computing infrastructure are provided as
services over the Internet [1]. Cloud computing is referred to as
the next big thing in IT, and a great deal of attention has been
focused on cloud technology. In the present scenarios cloud
computing is increasingly being adopted by large businesses
and mid-sized businesses. Moving to the cloud proves to be a
viable option for firms as it dramatically cuts down hardware
and software expenditure [2]. For the efficient migration to the
cloud, it involves transferring the application data as well as
application schema entirely, with authorized access, to the
clouds. Migration of the data to clouds is a phased process
which requires analysis of the schema which is to be moved,
analysis of data and the target cloud platform. BCP is one such
application which is used for migration of data but with a
major drawback that it cannot be used for the migration of
application schema. The challenge is to simplify the process of
schema migration and make it more efficient.
2. BACKGROUND
Cloud Computing moves computing and storage tasks from
individual systems to the cloud, thereby reducing the burden at
user’s end. It enables the delivery of hardware and software
resources over the Internet as a utility. It moves computing and
data away from desktop and portable PCs into large data
centers. Migrating the schema requires capturing the
information regarding the table, no of columns in the table and
data type of the columns in the table, by providing a user
friendly interface. Then, deploying access control over the data
requires capturing the information regarding user roles that
exist in the system, permissions granted to those roles,
according to which data in the tables can be accessed. As the
different user roles can be able to access the table data
according to the permissions given to the different user roles in
the system. In the role based access control
1 A user has access to an object based on the assigned
role.
2 Roles are defined based on job functions.
3 Permissions are defined based on job authority and
responsibilities within a job function.
4 Operations on an object are invocated based on the
permissions.
5 The object is concerned with the user’s role and not
the user. The Role based access control system is
clearly defined and agile, making the addition of new
applications, roles, and employees as efficient as
possible [3].
3. METHODOLOGY
3.1 Procedure
In this proposed approach the authorized users belong to roles,
and the permissions or access rights regarding the usage of
database are granted to roles. The user is provided with the
application interface. Through this application interface the
user provides all the relevant information needed for the
creation of the database and role-based schema on the Cloud.
The information includes the name of various database objects
and roles for the application and the permissions granted to
various roles. It become very easy for the user to create role
based schema on the Cloud as the user only need to specify
his/her requirements through an interactive interface without
taking into consideration of the technicalities of the migration
metadata. The XML file is generated from the information
provided by the user which is then sent to service providers
end where database and role based access control information
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 18
is read from XML file and information regarding database
objects and roles is extracted and deployed over the clouds. For
the implementation of the migration procedure following steps
are used:
1. Acquisition of Database Information.
2. Extraction of roles and database schema.
3. Creation of XML File.
4. Transfer of XML File.
5. Role based access generation.
3.1.1 Acquisiton of Database Information
The first phase of the proposed migration scheme is the
acquisition of database information which is required to
successfully and automatically reconstruct the database schema
of the onsite environment onto the Cloud. The information
consists of description of various database objects,
relationships, consistency constraints and configuration
settings. The user may make use of automated tools that
produce the XML document of the entire database schema but
in this proposed approach we have designed an interface which
is used by the user to generate XML file which contains all the
required information.
3.1.2 Extraction of Roles and Database Schema
The information regarding roles and database objects is the
basis for automatically creating the entire database on the
Cloud. The name, type and number of attributes of various
database objects are extracted along with roles and access
information. Roles describe “who does what” in the application.
Access rights are the permissions which are granted to roles to
access the database. This information is structured in a
standard way by making it comply with the XML schema
document which has been specifically designed to hold
database, roles and access information in such a way that
automatic processing of this information becomes easy for the
server application which will handle it at service provider’s
end. The use of XML document is to extract access control
data from several platforms and represent the access control
data for the entire enterprise [4].
3.1.3 Creation of XML File
In this step, XML file is actually generated which holds the
information gathered during above two steps. This is the file
which the user needs to transfer to service provider’s end, as
the file contains sensitive information (i.e. information
regarding database objects, relationships, access control, roles
etc.).
3.1.4 Transfer of XML File and Role Based Access
Generation
The generated XML file is transferred to the Cloud by
establishing sql connection with database server on the clouds.
The database schema information is extracted from the XML
file and various routines are executed which construct the copy
of the onsite database on Cloud databases along with roles and
their corresponding access rights.
Fig. 1 Steps in the proposed approach
Fig. 1 showing the steps used in the proposed approach.
F. Algorithm Used for generating xml from GUI
The basic algorithm is as follows:
1. Get the values of table_count, column_count, role_count,
Permission_count from user.
2. Start with <table> tag // starting of XML.
3. Insert table name from user within <table_name> tag.
4. Start with the column tag.
5. Insert the column name from user within <column_name>
tag.
6. Go to step 5 until column_count reaches maximum.
7. End of column tag
8. Goto step 3 until table_count reaches maximum
9. Start with <role> tag
10. Insert role name within <role name> tags from user.
11. Start with <Permission > tag.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 19
12. Insert <table_name> <column_name> <read> < write>
<delete> tag that the user chooses.
13. Set true/false value within <allowed> tag.
14. End of <permission>.
15. Goto step 11 until permission_count reaches Maximum.
16. Closing tags.
Example scenario:
The proposed scheme is demonstrated using an application
called Banking Information System. The Banking Information
System taken here keeps the records of customers regarding
the registration details of the customers and payments. The
employee’s salary is maintained by the administration manager.
The job describes the role that employee plays in the Bank. To
restrict the access to the database by the authorized users, Role
Based Access Control model has been implemented onsite.
4. RESULTS
The proposed scheme has been demonstrated by taking
example scenario. The case study has been done on a Banking
Information system. A Banking Information system is migrated
to the cloud by implementing and making use of the proposed
scheme.
5. CONCLUSIONS
The approach discussed in this paper can be used for migration
of the application schemas to clouds in various real world
scenarios. In this research work role based model is used for
data access. Further Attribute based model can be combined
with the present approach which further enhances the security
of access controls mechanisms on the cloud.
ACKNOWLEDGEMENTS
We convey our sincere gratitude to Prof Sandhu M for
providing us with the platform and opportunity to work in this
area. His encouragement and valuable guidance throughout the
course of the paper was a constant support.
REFERENCES
[1]. Preiya, V. S., Pavithra, R. and Joshi., “Secure Role based
Data Access Control in Cloud Computing”, International
Journal of Computer Trends and Technology, pp. 146-151,
2011.
[2]. Rao, R. and Prakash, P., “Improving security for data
migration in cloud computing using randomized encryption
technique“, IOSR Journal of Computer Engineering, vol. 11,
no. 6, pp. 39-42, May-June 2013.
[3]. Salunke, D., Upadhay, A., Sarwade, A. and Vaibhav,
M. ”A survey paper on Role Based Access Control”,
International Journal of Advanced Research in Computer and
Communication Engineering, vol. 2, no. 3, pp. 1340–1342,
2013.
[4]. Chandramouli, R. “Application of XML Tools for
Enterprise-Wide RBAC Implementation Tasks”, Proceedings
of the fifth ACM workshop on Role-based access control, USA,
pp. 11-18, 2000.
[5]. Damyanov, I. and Holmes, N. “Metadata Driven Code
Generation Using .NET Framework”, International Conference
on Computer Systems and Technologies – CompSysTech, pp.
IIIB.2.1-IIIB.2.6, 2004.
[6]. Das, S., Nishimura, S., Agrawal, D. and Abbadi, A. E.
“Database Migration for Elasticity in a Multitenant Database
for Cloud Platforms”, UCSB Computer Science Technical
Report, 2010-09.
[7]. Foster, I., Zhao, Y. and Raicu, I. “Cloud Computing and
Grid Computing – 360 Degree Compared“, IEEE Grid
Computing Environments (GCE08), 2008.

More Related Content

What's hot

ORUTA BASE PAPER
ORUTA BASE PAPER ORUTA BASE PAPER
ORUTA BASE PAPER suthi
 
Real time text stream processing - a dynamic and distributed nlp pipeline
Real time text stream  processing - a dynamic and distributed nlp pipelineReal time text stream  processing - a dynamic and distributed nlp pipeline
Real time text stream processing - a dynamic and distributed nlp pipelineConference Papers
 
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITIONSOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITIONijseajournal
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in CloudMaintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloudacijjournal
 
Data Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network ConnectionData Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network ConnectionIOSR Journals
 
Fntdb07 architecture
Fntdb07 architectureFntdb07 architecture
Fntdb07 architecturelasyjack
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEEGLOBALSOFTSTUDENTPROJECTS
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
 
Cobe framework cloud ontology blackboard environment for enhancing discovery ...
Cobe framework cloud ontology blackboard environment for enhancing discovery ...Cobe framework cloud ontology blackboard environment for enhancing discovery ...
Cobe framework cloud ontology blackboard environment for enhancing discovery ...ijccsa
 
Electronics Library Management System from the Website
Electronics Library Management System from the WebsiteElectronics Library Management System from the Website
Electronics Library Management System from the WebsiteIJERD Editor
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing IJMER
 
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...1crore projects
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET Journal
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storageKhaja Moiz Uddin
 
panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...swathi78
 
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...hemanthbbc
 

What's hot (17)

ORUTA BASE PAPER
ORUTA BASE PAPER ORUTA BASE PAPER
ORUTA BASE PAPER
 
Real time text stream processing - a dynamic and distributed nlp pipeline
Real time text stream  processing - a dynamic and distributed nlp pipelineReal time text stream  processing - a dynamic and distributed nlp pipeline
Real time text stream processing - a dynamic and distributed nlp pipeline
 
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITIONSOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in CloudMaintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
Data Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network ConnectionData Usage Monitor for a Shared Wireless Network Connection
Data Usage Monitor for a Shared Wireless Network Connection
 
Fntdb07 architecture
Fntdb07 architectureFntdb07 architecture
Fntdb07 architecture
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studio
 
Cobe framework cloud ontology blackboard environment for enhancing discovery ...
Cobe framework cloud ontology blackboard environment for enhancing discovery ...Cobe framework cloud ontology blackboard environment for enhancing discovery ...
Cobe framework cloud ontology blackboard environment for enhancing discovery ...
 
Electronics Library Management System from the Website
Electronics Library Management System from the WebsiteElectronics Library Management System from the Website
Electronics Library Management System from the Website
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...
 
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori AlgorithmWeb Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
 
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
 

Viewers also liked

Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Publishing House
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical methodeSAT Publishing House
 
Active self interference cancellation techniques in
Active self interference cancellation techniques inActive self interference cancellation techniques in
Active self interference cancellation techniques ineSAT Publishing House
 
Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...eSAT Publishing House
 
Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...eSAT Publishing House
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Publishing House
 
Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...eSAT Publishing House
 
Study of shape of intermediate sill on the design of stilling basin model
Study of shape of intermediate sill on the design of stilling basin modelStudy of shape of intermediate sill on the design of stilling basin model
Study of shape of intermediate sill on the design of stilling basin modeleSAT Publishing House
 
Application of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mixApplication of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mixeSAT Publishing House
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...eSAT Publishing House
 
Zero rotation aproach for droop improvement in
Zero rotation aproach for droop improvement inZero rotation aproach for droop improvement in
Zero rotation aproach for droop improvement ineSAT Publishing House
 
Study of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositesStudy of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositeseSAT Publishing House
 
Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmseSAT Publishing House
 
Co axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaCo axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaeSAT Publishing House
 
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...eSAT Publishing House
 
Comparative study of one and two diode model of solar photovoltaic cell
Comparative study of one and two diode model of solar photovoltaic cellComparative study of one and two diode model of solar photovoltaic cell
Comparative study of one and two diode model of solar photovoltaic celleSAT Publishing House
 
Computer aided diagnosis for liver cancer using
Computer aided diagnosis for liver cancer usingComputer aided diagnosis for liver cancer using
Computer aided diagnosis for liver cancer usingeSAT Publishing House
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Publishing House
 
Securing cluster based adhoc network through
Securing cluster based adhoc network throughSecuring cluster based adhoc network through
Securing cluster based adhoc network througheSAT Publishing House
 

Viewers also liked (20)

Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
Active self interference cancellation techniques in
Active self interference cancellation techniques inActive self interference cancellation techniques in
Active self interference cancellation techniques in
 
Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...
 
Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...
 
Composites from natural fibres
Composites from natural fibresComposites from natural fibres
Composites from natural fibres
 
Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...
 
Study of shape of intermediate sill on the design of stilling basin model
Study of shape of intermediate sill on the design of stilling basin modelStudy of shape of intermediate sill on the design of stilling basin model
Study of shape of intermediate sill on the design of stilling basin model
 
Application of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mixApplication of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mix
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...
 
Zero rotation aproach for droop improvement in
Zero rotation aproach for droop improvement inZero rotation aproach for droop improvement in
Zero rotation aproach for droop improvement in
 
Study of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositesStudy of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced composites
 
Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin films
 
Co axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaCo axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antenna
 
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
 
Comparative study of one and two diode model of solar photovoltaic cell
Comparative study of one and two diode model of solar photovoltaic cellComparative study of one and two diode model of solar photovoltaic cell
Comparative study of one and two diode model of solar photovoltaic cell
 
Computer aided diagnosis for liver cancer using
Computer aided diagnosis for liver cancer usingComputer aided diagnosis for liver cancer using
Computer aided diagnosis for liver cancer using
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
Securing cluster based adhoc network through
Securing cluster based adhoc network throughSecuring cluster based adhoc network through
Securing cluster based adhoc network through
 

Similar to Migration of application schema to windows azure

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Data Dictionary Similarities Discussion.docx
Data Dictionary Similarities Discussion.docxData Dictionary Similarities Discussion.docx
Data Dictionary Similarities Discussion.docxstudywriters
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architecturesprasadsmn
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesPvrtechnologies Nellore
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 

Similar to Migration of application schema to windows azure (20)

Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Data Dictionary Similarities Discussion.docx
Data Dictionary Similarities Discussion.docxData Dictionary Similarities Discussion.docx
Data Dictionary Similarities Discussion.docx
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information services
 
G017553540
G017553540G017553540
G017553540
 
TermPaper
TermPaperTermPaper
TermPaper
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Migration of application schema to windows azure

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 17 MIGRATION OF APPLICATION SCHEMA TO WINDOWS AZURE CLOUDS Amandeep Singh1 , Karandeep Singh2 1 Assistant Professor, Computer Science and Engineering Dept, PTU, BMSCE, Muktsar, India 2 Head & Assistant Professor, MAMC, Agroha, Hisar, Haryana, India Abstract Schema migration involves the migration of application schema to clouds. Presently various script generation techniques are there which are used for schema migration, which also sometimes require the application architecture to be changed to make it compatible with cloud platform. This paper shows an approach using user templates for capturing the schema structure and access control mechanism for migration of application schema without using script generation tools. Further it gives the necessary algorithm to show the feasibility of its implementation. Keywords— Cloud Computing, rbac, roles, nist, saas, schema, xsd, xml. ------------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet [1]. Cloud computing is referred to as the next big thing in IT, and a great deal of attention has been focused on cloud technology. In the present scenarios cloud computing is increasingly being adopted by large businesses and mid-sized businesses. Moving to the cloud proves to be a viable option for firms as it dramatically cuts down hardware and software expenditure [2]. For the efficient migration to the cloud, it involves transferring the application data as well as application schema entirely, with authorized access, to the clouds. Migration of the data to clouds is a phased process which requires analysis of the schema which is to be moved, analysis of data and the target cloud platform. BCP is one such application which is used for migration of data but with a major drawback that it cannot be used for the migration of application schema. The challenge is to simplify the process of schema migration and make it more efficient. 2. BACKGROUND Cloud Computing moves computing and storage tasks from individual systems to the cloud, thereby reducing the burden at user’s end. It enables the delivery of hardware and software resources over the Internet as a utility. It moves computing and data away from desktop and portable PCs into large data centers. Migrating the schema requires capturing the information regarding the table, no of columns in the table and data type of the columns in the table, by providing a user friendly interface. Then, deploying access control over the data requires capturing the information regarding user roles that exist in the system, permissions granted to those roles, according to which data in the tables can be accessed. As the different user roles can be able to access the table data according to the permissions given to the different user roles in the system. In the role based access control 1 A user has access to an object based on the assigned role. 2 Roles are defined based on job functions. 3 Permissions are defined based on job authority and responsibilities within a job function. 4 Operations on an object are invocated based on the permissions. 5 The object is concerned with the user’s role and not the user. The Role based access control system is clearly defined and agile, making the addition of new applications, roles, and employees as efficient as possible [3]. 3. METHODOLOGY 3.1 Procedure In this proposed approach the authorized users belong to roles, and the permissions or access rights regarding the usage of database are granted to roles. The user is provided with the application interface. Through this application interface the user provides all the relevant information needed for the creation of the database and role-based schema on the Cloud. The information includes the name of various database objects and roles for the application and the permissions granted to various roles. It become very easy for the user to create role based schema on the Cloud as the user only need to specify his/her requirements through an interactive interface without taking into consideration of the technicalities of the migration metadata. The XML file is generated from the information provided by the user which is then sent to service providers end where database and role based access control information
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 18 is read from XML file and information regarding database objects and roles is extracted and deployed over the clouds. For the implementation of the migration procedure following steps are used: 1. Acquisition of Database Information. 2. Extraction of roles and database schema. 3. Creation of XML File. 4. Transfer of XML File. 5. Role based access generation. 3.1.1 Acquisiton of Database Information The first phase of the proposed migration scheme is the acquisition of database information which is required to successfully and automatically reconstruct the database schema of the onsite environment onto the Cloud. The information consists of description of various database objects, relationships, consistency constraints and configuration settings. The user may make use of automated tools that produce the XML document of the entire database schema but in this proposed approach we have designed an interface which is used by the user to generate XML file which contains all the required information. 3.1.2 Extraction of Roles and Database Schema The information regarding roles and database objects is the basis for automatically creating the entire database on the Cloud. The name, type and number of attributes of various database objects are extracted along with roles and access information. Roles describe “who does what” in the application. Access rights are the permissions which are granted to roles to access the database. This information is structured in a standard way by making it comply with the XML schema document which has been specifically designed to hold database, roles and access information in such a way that automatic processing of this information becomes easy for the server application which will handle it at service provider’s end. The use of XML document is to extract access control data from several platforms and represent the access control data for the entire enterprise [4]. 3.1.3 Creation of XML File In this step, XML file is actually generated which holds the information gathered during above two steps. This is the file which the user needs to transfer to service provider’s end, as the file contains sensitive information (i.e. information regarding database objects, relationships, access control, roles etc.). 3.1.4 Transfer of XML File and Role Based Access Generation The generated XML file is transferred to the Cloud by establishing sql connection with database server on the clouds. The database schema information is extracted from the XML file and various routines are executed which construct the copy of the onsite database on Cloud databases along with roles and their corresponding access rights. Fig. 1 Steps in the proposed approach Fig. 1 showing the steps used in the proposed approach. F. Algorithm Used for generating xml from GUI The basic algorithm is as follows: 1. Get the values of table_count, column_count, role_count, Permission_count from user. 2. Start with <table> tag // starting of XML. 3. Insert table name from user within <table_name> tag. 4. Start with the column tag. 5. Insert the column name from user within <column_name> tag. 6. Go to step 5 until column_count reaches maximum. 7. End of column tag 8. Goto step 3 until table_count reaches maximum 9. Start with <role> tag 10. Insert role name within <role name> tags from user. 11. Start with <Permission > tag.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 19 12. Insert <table_name> <column_name> <read> < write> <delete> tag that the user chooses. 13. Set true/false value within <allowed> tag. 14. End of <permission>. 15. Goto step 11 until permission_count reaches Maximum. 16. Closing tags. Example scenario: The proposed scheme is demonstrated using an application called Banking Information System. The Banking Information System taken here keeps the records of customers regarding the registration details of the customers and payments. The employee’s salary is maintained by the administration manager. The job describes the role that employee plays in the Bank. To restrict the access to the database by the authorized users, Role Based Access Control model has been implemented onsite. 4. RESULTS The proposed scheme has been demonstrated by taking example scenario. The case study has been done on a Banking Information system. A Banking Information system is migrated to the cloud by implementing and making use of the proposed scheme. 5. CONCLUSIONS The approach discussed in this paper can be used for migration of the application schemas to clouds in various real world scenarios. In this research work role based model is used for data access. Further Attribute based model can be combined with the present approach which further enhances the security of access controls mechanisms on the cloud. ACKNOWLEDGEMENTS We convey our sincere gratitude to Prof Sandhu M for providing us with the platform and opportunity to work in this area. His encouragement and valuable guidance throughout the course of the paper was a constant support. REFERENCES [1]. Preiya, V. S., Pavithra, R. and Joshi., “Secure Role based Data Access Control in Cloud Computing”, International Journal of Computer Trends and Technology, pp. 146-151, 2011. [2]. Rao, R. and Prakash, P., “Improving security for data migration in cloud computing using randomized encryption technique“, IOSR Journal of Computer Engineering, vol. 11, no. 6, pp. 39-42, May-June 2013. [3]. Salunke, D., Upadhay, A., Sarwade, A. and Vaibhav, M. ”A survey paper on Role Based Access Control”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 3, pp. 1340–1342, 2013. [4]. Chandramouli, R. “Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks”, Proceedings of the fifth ACM workshop on Role-based access control, USA, pp. 11-18, 2000. [5]. Damyanov, I. and Holmes, N. “Metadata Driven Code Generation Using .NET Framework”, International Conference on Computer Systems and Technologies – CompSysTech, pp. IIIB.2.1-IIIB.2.6, 2004. [6]. Das, S., Nishimura, S., Agrawal, D. and Abbadi, A. E. “Database Migration for Elasticity in a Multitenant Database for Cloud Platforms”, UCSB Computer Science Technical Report, 2010-09. [7]. Foster, I., Zhao, Y. and Raicu, I. “Cloud Computing and Grid Computing – 360 Degree Compared“, IEEE Grid Computing Environments (GCE08), 2008.