SlideShare a Scribd company logo
International Journal of Current Trends in Engineering & Research (IJCTER)
e-ISSN 2455–1392 Volume 1 Issue 1, November 2015 pp. 28-31
http://www.ijcter.com
@IJCTER-2015, All rights Reserved 28
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA
STORAGE
Shekhar Pandit
Allahabad University
Abstract— In without internet connection. this paper we have implemented private cloud data
storage server in Microsoft windows server 2K12operating system which provides software as a
services with mailing system for private cloud consumers & clients, through private cloud server
services clients can access web services, centralized data storage services , software as services and
can also send and receive mails in entire network without internet connectivity. This paper is the
implementation of cloud software as service, centralized remote accessibility and private mails
system.
Keyword— Cloud Computing, Data Storage
I. INTRODUCATION
Cloud computing has recently reached popularity in computer networking world which provide
centralized data storage service, remote accessibility and many more cloud is very new, safe, and
advanced technology it provides remote access service and centralized data storage service to the
cloud consumers and its domain client in cloud. This paper is the implementation of private cloud
software as service server; centralized remote accessibility and data storage system without internet
connection in Microsoft windows server 2K8 with domain controlling. Migrating from a traditional
model to the cloud model reduce cost for enterprise customer. The main objectives of SaaS provider
are to minimize cost and to improve Customer Satisfaction Level (CSL).
II. PROPOSED WORK
In this paper we are implementing a private cloud server with the help of windows server 2k12. We
are providing Data storage, security and mailing system to our cloud networks client without using
internet connections and in this cloud server we are also providing software as service facility to our
private cloud networks clients.
Clients can send and receive mails remotely by private cloud mailing system services.
Previous algorithm to calculate time coast (TTL):
Minimize (cost) = VM Cost + Penalty Cost;
Where Penalty Cost = 100
Per Unit Time VMC cost large = VM Price large X Min (VM large) = VM Price large
Client needs application software’s and windows 32 bit application for their databases
SQI = respT (SLA) - respT (actual) = 32 bit /seconds
III. EXPERIMENT METHODOLOGY
To implement cloud server we have to install and configure Hyper-V with the following steps 1.
Open Windows Firewall with Advance Security and click Inbound Rules. 2. Right-click Hyper-V
Replica HTTP Listener (TCP-In) and click Enable Rule. Enable the firewall rules for certificate-
based authentication 1. Open Windows Firewall with Advance Security and click Inbound Rules. 2.
Right-click Hyper-V Replica HTTPS Listener (TCP-In) and click Enable Rule. For servers that are
part of a failover cluster, run this Windows PowerShell cmdlet on any node in the cluster if you will
be using Kerberos authentication for Replica. The cmdlet must be run by a user with administrative
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 29
privileges. get-clusternode | ForEach-Object {Invoke-command - computername $_.name -
scriptblock {Enable-Netfirewallrule - displayname "Hyper-V Replica HTTP Listener (TCP-In)"}}
For servers that are part of a failover cluster, run this Windows PowerShell cmdlet on any node in
the cluster if you will be using certificate-based authentication for Replica. The cmdlet must be run
by a user with administrative privileges.
get-clusternode | ForEach-Object {Invoke-command - computername $_.name -scriptblock {Enable-
Netfirewallrule - displayname "Hyper-V Replica HTTPS Listener (TCP-In)"}} Configure the Hyper-
V Replica Broker 1.In Server Manager, open Failover Cluster Manager. 2.In the left pane, connect to
the cluster, and while the cluster name is highlighted, click Configure Role in the Actions pane. The
High Availability wizard opens 3. In the Select Role screen, select Hyper-V Replica Broker. 4.
Complete the wizard, providing a NetBIOS name and IP address to be used as the connection point
to the cluster (called a “client access point”). The Hyper-V Replica Broker is configured, resulting in
a client access point name. Make a note of the client access point name for configuring Replica later
on. 5. Verify that the Hyper-V Replica Broker role comes online successfully and can fail over
between all nodes of the cluster. To do this, right-click the role, point to Move, and then click Select
Node. Then, select a node, and then click OK..Windows Power Shell equivalent commands The
following Windows Power Shell cmdlet or cmdlets perform the same function as the preceding
procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across
several lines here because of formatting constraints.This example sequence of cmdlets will create a
Hyper-V Replica Broker names “HVR-Broker” that uses the static IP address 192.168.1.5. All steps
must be completed by a user with administrative privileges. $BrokerName = “HVR-Broker” Add-
ClusterServerRole -Name $BrokerName –StaticAddress 192.168.1.5 Add-ClusterResource -Name
“Virtual Machine Replication Broker” -Type "Virtual Machine Replication
Broker"Group$BrokerNameAdd-lusterResourceDependency “Virtual Machine Replication
Broker”$Broker NameStartClusterGroup $BrokerName create a self-signed certificate with
Makecert.exe Time coast (TTL) reduce algorithm: when we provide all applications and windows
operating system to the client Minimize (cost) = VM Cost + Penalty Cost; Where Penalty Cost = 0
Per Unit Time VMC cost large = VM Price large 0 Min (VM 0) = VM Price large X VMcost Where
VMcost = 0 SQI = respT (SLA) - respT (actual) = 32 and 64 bit /seconds
IV. RESULT ANALYSIS
After this implementation process client can connect from cloud server remotely and can use its
software as service facility, client can install operating systems , software from everywhere. Client
can download software also, but cloud clients need to register on cloud server.All those software,
windows applications and operating systems can be 32 bit or 64 bit. Which reduce the cost of VM
and increases the time limits for all cloud clients?
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 30
In previous result user can just use 32 bit applications from server. and after implementing
algorithum user need to register first to get user id and password and user can also use 32 bit and 64
bit applications both and also can install 32 bit and 64 bit operating system remotely from server
Start=> Run => Type the command MSTSC Type=> 192.168.1.1 (cloud servers ip address)
Username => Client 1 Password => @#$passwd
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 31
V. CONCLUSION
After all these configuration client will directly connect to the cloud server and can access cloud
client software as a service from server, server will provide operating system to the client and
software’s , with all these facilities client can also use or download software’s from cloud server
express to entire private cloud networks , server and to cloud clients and user can also use 32 bit and
64 bit applications both and also can install 32 bit and 64 bit operating system remotely from server
REFERENCES
[1] A Secure Framework for User Data Storage in Public Cloud Systems using Symmetric Cryptography Reetika
Singh1, Rajesh Tiwari2 1Research Scholar, Faculty of Engineering & Technology, 2Faculty of Engineering &
Technology Department of Computer Science & Engineering, Shri Shankaracharya College of Engineering &
Technology, Chhattisgarh Swami Vivekananda Technical University, Bhilai - 490006, Chhattisgarh, INDIA
[2] Cloud computing: state-of-the-art and research challenges Qi Zhang·Lu Cheng·Raouf Boutaba
[3] Cloud Computing – Issues, Research and Implementations, Mladen A. Vouk Department of Computer Science,
North Carolina State University, Raleigh, North Carolina, USA
[4] Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th
Utility ,Rajkumar Buyya 1,2 , Chee Shin Yeo 1, Srikumar Venugopal 1, James Broberg 1, and Ivona Brandic 3
,1 Grid d Computing and Distributed Systems (GRIDS) Laboratory Department of Computer Science and
Software Engineering The University of Melbourne, Australia Email: {raj, csyeo, srikumar,
brobergj}@csse.unimelb.edu.au ,2 Manjrasoft Pty Ltd, Melbourne, Australia.
[5] Cloud Computing Nariman Mirzaei (nmirzaei@indiana.edu) Fall 2008.,
[6] FOSTER, I., ZHAO, Y., RAICU, I. and LU, S. 2008. Cloud Computing and Grid Computing 360-Degree
Compared. In Grid Computing Environments Workshop (GCE '08), Austin, Texas, USA, November 2008, 1-10
[7] Corbató, F. J., Saltzer, J. H., and Clingen, C. T. 1972. Multics: the first seven years. In Proceedings of the May
16- 18, 1972, Spring Joint Computer Conference, Atlantic City, New Jersey, May 1972, 571-583.
[8] BUYYA, R., YEO, C. and VENUGOPAL, S. 2008. MarketOriented Cloud Computing: Vision, Hype, and
Reality for Delivering IT Services as Computing Utilities. In High Performance Computing and
Communications, 2008. HPCC '08. 10th IEEE International Conference on, 5-13
[9] Implementing and operating an internet scale distributed application using service oriented architecture
principles and cloud computing infrastructure. In iiWAS '08: Proceedings of the 10th International Conference
on Information Integration and Web-based Applications & Services, 417-421. CHANG, M., HE, J., and E.
Leon, "Service-Orientation in the Computing Infrastructure," 2006, pp. 27-33.
[10] Implementation of Data Security in Cloud Computing G. Jai Arul Jose1, C. Sajeev2 1,2 Research Scholar,
Sathyabama University, Chennai, INDIA. International Journal of P2P Network Trends and Technology- July to
Aug Issue 2011ISSN: 2249-2615.
[11] SLA-based resource provisioning for hosted software-as-aservice application in cloud computing
environments.by linlin Wn,saurabh kumar garg,steve verteeg and rajkumar Buyya.IEEE vol-7,no 3,july-
september 2014

More Related Content

What's hot

Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administration
Ashish Sharma
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
IRJET Journal
 
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio TavillaOpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
Lorenzo Carnevale
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
IGEEKS TECHNOLOGIES
 
Deep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons LearnedDeep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons Learned
Priti Desai
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
Steve Martinelli
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocol
IAEME Publication
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
JPINFOTECH JAYAPRAKASH
 
Secure Keystone Deployment
Secure Keystone DeploymentSecure Keystone Deployment
Secure Keystone Deployment
Priti Desai
 
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
DevDay.org
 
Service Discovery using etcd, Consul and Kubernetes
Service Discovery using etcd, Consul and KubernetesService Discovery using etcd, Consul and Kubernetes
Service Discovery using etcd, Consul and Kubernetes
Sreenivas Makam
 
OpenStack Administration by Mobarak Hossain Group Organizer Bangladesh
OpenStack Administration by Mobarak Hossain Group Organizer BangladeshOpenStack Administration by Mobarak Hossain Group Organizer Bangladesh
OpenStack Administration by Mobarak Hossain Group Organizer Bangladesh
Mobarak Hossain
 
Cloud and OpenStack
Cloud and OpenStackCloud and OpenStack
Cloud and OpenStack
Seyed Ehsan Beheshtian
 
6. flow processing
6. flow processing6. flow processing
6. flow processing
JudePragashVedam
 
HPC Cloud Burst Using Docker
HPC Cloud Burst Using DockerHPC Cloud Burst Using Docker
HPC Cloud Burst Using Docker
IRJET Journal
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API Security
CloudIDSummit
 
Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)
Krunal Jain
 
OpenStack- A ringside view of Services and Architecture
OpenStack- A ringside view of Services and ArchitectureOpenStack- A ringside view of Services and Architecture
OpenStack- A ringside view of Services and Architecture
Ritesh Somani
 
Cloud Computing using OpenStack
Cloud Computing using OpenStackCloud Computing using OpenStack
Cloud Computing using OpenStack
Jobayer Almahmud Hossain (RHCA, RHCDS, RHCSS)
 

What's hot (19)

Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administration
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio TavillaOpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Deep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons LearnedDeep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons Learned
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocol
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
 
Secure Keystone Deployment
Secure Keystone DeploymentSecure Keystone Deployment
Secure Keystone Deployment
 
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
 
Service Discovery using etcd, Consul and Kubernetes
Service Discovery using etcd, Consul and KubernetesService Discovery using etcd, Consul and Kubernetes
Service Discovery using etcd, Consul and Kubernetes
 
OpenStack Administration by Mobarak Hossain Group Organizer Bangladesh
OpenStack Administration by Mobarak Hossain Group Organizer BangladeshOpenStack Administration by Mobarak Hossain Group Organizer Bangladesh
OpenStack Administration by Mobarak Hossain Group Organizer Bangladesh
 
Cloud and OpenStack
Cloud and OpenStackCloud and OpenStack
Cloud and OpenStack
 
6. flow processing
6. flow processing6. flow processing
6. flow processing
 
HPC Cloud Burst Using Docker
HPC Cloud Burst Using DockerHPC Cloud Burst Using Docker
HPC Cloud Burst Using Docker
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API Security
 
Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)
 
OpenStack- A ringside view of Services and Architecture
OpenStack- A ringside view of Services and ArchitectureOpenStack- A ringside view of Services and Architecture
OpenStack- A ringside view of Services and Architecture
 
Cloud Computing using OpenStack
Cloud Computing using OpenStackCloud Computing using OpenStack
Cloud Computing using OpenStack
 

Viewers also liked

Sem 1 aplikasi komputer (amali 6) boy london
Sem 1 aplikasi komputer (amali 6) boy londonSem 1 aplikasi komputer (amali 6) boy london
Sem 1 aplikasi komputer (amali 6) boy london
Ismah Ishak Idris
 
Pcpm Temat 13 2009
Pcpm Temat 13 2009Pcpm Temat 13 2009
Family Medicine History
Family Medicine HistoryFamily Medicine History
Family Medicine History
DJ CrissCross
 
Suggestopedia
SuggestopediaSuggestopedia
Suggestopedia
Babek Raifov
 
CBIMCI and CBNCP Programme In Nepal
CBIMCI and CBNCP Programme In NepalCBIMCI and CBNCP Programme In Nepal
CBIMCI and CBNCP Programme In Nepal
Bhatt Laxman
 
CV Papori Dey
CV Papori DeyCV Papori Dey
CV Papori Dey
Papori Dey
 

Viewers also liked (8)

La serpiente
La serpienteLa serpiente
La serpiente
 
Sem 1 aplikasi komputer (amali 6) boy london
Sem 1 aplikasi komputer (amali 6) boy londonSem 1 aplikasi komputer (amali 6) boy london
Sem 1 aplikasi komputer (amali 6) boy london
 
Hpsf rep
Hpsf repHpsf rep
Hpsf rep
 
Pcpm Temat 13 2009
Pcpm Temat 13 2009Pcpm Temat 13 2009
Pcpm Temat 13 2009
 
Family Medicine History
Family Medicine HistoryFamily Medicine History
Family Medicine History
 
Suggestopedia
SuggestopediaSuggestopedia
Suggestopedia
 
CBIMCI and CBNCP Programme In Nepal
CBIMCI and CBNCP Programme In NepalCBIMCI and CBNCP Programme In Nepal
CBIMCI and CBNCP Programme In Nepal
 
CV Papori Dey
CV Papori DeyCV Papori Dey
CV Papori Dey
 

Similar to PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE

Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 Wrap
HarbourIT
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptx
Michel Burger
 
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
idescitation
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Eduardo Patrocinio
 
Scheduling in CCE
Scheduling in CCEScheduling in CCE
Scheduling in CCE
Mayuri Saxena
 
Internship Presentation.pptx
Internship Presentation.pptxInternship Presentation.pptx
Internship Presentation.pptx
jisogo
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
Red Hat India Pvt. Ltd.
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
ApthiriSurekha
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
Sandip Kadam
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
ijccsa
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
neirew J
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
hiij
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
ijccsa
 
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 PreviewCloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
Chip Childers
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
Hussain Hamil
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the Cloud
The UberCloud
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the Cloud
Wolfgang Gentzsch
 

Similar to PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE (20)

Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 Wrap
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptx
 
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
 
Scheduling in CCE
Scheduling in CCEScheduling in CCE
Scheduling in CCE
 
Internship Presentation.pptx
Internship Presentation.pptxInternship Presentation.pptx
Internship Presentation.pptx
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 PreviewCloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the Cloud
 
High Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the CloudHigh Performance Computing (HPC) and Engineering Simulations in the Cloud
High Performance Computing (HPC) and Engineering Simulations in the Cloud
 

More from Editor IJCTER

Android Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design PaperAndroid Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design Paper
Editor IJCTER
 
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATIONPROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
Editor IJCTER
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
Editor IJCTER
 
Study about AVL Tree & Operations
Study about AVL Tree & OperationsStudy about AVL Tree & Operations
Study about AVL Tree & Operations
Editor IJCTER
 
Comparison of various page Rank Algorithms
Comparison of various page Rank AlgorithmsComparison of various page Rank Algorithms
Comparison of various page Rank Algorithms
Editor IJCTER
 
A Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic ProgrammingA Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic Programming
Editor IJCTER
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
Editor IJCTER
 
BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANET
Editor IJCTER
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
Editor IJCTER
 

More from Editor IJCTER (10)

Android Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design PaperAndroid Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design Paper
 
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATIONPROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Study about AVL Tree & Operations
Study about AVL Tree & OperationsStudy about AVL Tree & Operations
Study about AVL Tree & Operations
 
Comparison of various page Rank Algorithms
Comparison of various page Rank AlgorithmsComparison of various page Rank Algorithms
Comparison of various page Rank Algorithms
 
A Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic ProgrammingA Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic Programming
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANET
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 

Recently uploaded

Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 

Recently uploaded (20)

Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 

PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE

  • 1. International Journal of Current Trends in Engineering & Research (IJCTER) e-ISSN 2455–1392 Volume 1 Issue 1, November 2015 pp. 28-31 http://www.ijcter.com @IJCTER-2015, All rights Reserved 28 PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE Shekhar Pandit Allahabad University Abstract— In without internet connection. this paper we have implemented private cloud data storage server in Microsoft windows server 2K12operating system which provides software as a services with mailing system for private cloud consumers & clients, through private cloud server services clients can access web services, centralized data storage services , software as services and can also send and receive mails in entire network without internet connectivity. This paper is the implementation of cloud software as service, centralized remote accessibility and private mails system. Keyword— Cloud Computing, Data Storage I. INTRODUCATION Cloud computing has recently reached popularity in computer networking world which provide centralized data storage service, remote accessibility and many more cloud is very new, safe, and advanced technology it provides remote access service and centralized data storage service to the cloud consumers and its domain client in cloud. This paper is the implementation of private cloud software as service server; centralized remote accessibility and data storage system without internet connection in Microsoft windows server 2K8 with domain controlling. Migrating from a traditional model to the cloud model reduce cost for enterprise customer. The main objectives of SaaS provider are to minimize cost and to improve Customer Satisfaction Level (CSL). II. PROPOSED WORK In this paper we are implementing a private cloud server with the help of windows server 2k12. We are providing Data storage, security and mailing system to our cloud networks client without using internet connections and in this cloud server we are also providing software as service facility to our private cloud networks clients. Clients can send and receive mails remotely by private cloud mailing system services. Previous algorithm to calculate time coast (TTL): Minimize (cost) = VM Cost + Penalty Cost; Where Penalty Cost = 100 Per Unit Time VMC cost large = VM Price large X Min (VM large) = VM Price large Client needs application software’s and windows 32 bit application for their databases SQI = respT (SLA) - respT (actual) = 32 bit /seconds III. EXPERIMENT METHODOLOGY To implement cloud server we have to install and configure Hyper-V with the following steps 1. Open Windows Firewall with Advance Security and click Inbound Rules. 2. Right-click Hyper-V Replica HTTP Listener (TCP-In) and click Enable Rule. Enable the firewall rules for certificate- based authentication 1. Open Windows Firewall with Advance Security and click Inbound Rules. 2. Right-click Hyper-V Replica HTTPS Listener (TCP-In) and click Enable Rule. For servers that are part of a failover cluster, run this Windows PowerShell cmdlet on any node in the cluster if you will be using Kerberos authentication for Replica. The cmdlet must be run by a user with administrative
  • 2. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 29 privileges. get-clusternode | ForEach-Object {Invoke-command - computername $_.name - scriptblock {Enable-Netfirewallrule - displayname "Hyper-V Replica HTTP Listener (TCP-In)"}} For servers that are part of a failover cluster, run this Windows PowerShell cmdlet on any node in the cluster if you will be using certificate-based authentication for Replica. The cmdlet must be run by a user with administrative privileges. get-clusternode | ForEach-Object {Invoke-command - computername $_.name -scriptblock {Enable- Netfirewallrule - displayname "Hyper-V Replica HTTPS Listener (TCP-In)"}} Configure the Hyper- V Replica Broker 1.In Server Manager, open Failover Cluster Manager. 2.In the left pane, connect to the cluster, and while the cluster name is highlighted, click Configure Role in the Actions pane. The High Availability wizard opens 3. In the Select Role screen, select Hyper-V Replica Broker. 4. Complete the wizard, providing a NetBIOS name and IP address to be used as the connection point to the cluster (called a “client access point”). The Hyper-V Replica Broker is configured, resulting in a client access point name. Make a note of the client access point name for configuring Replica later on. 5. Verify that the Hyper-V Replica Broker role comes online successfully and can fail over between all nodes of the cluster. To do this, right-click the role, point to Move, and then click Select Node. Then, select a node, and then click OK..Windows Power Shell equivalent commands The following Windows Power Shell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints.This example sequence of cmdlets will create a Hyper-V Replica Broker names “HVR-Broker” that uses the static IP address 192.168.1.5. All steps must be completed by a user with administrative privileges. $BrokerName = “HVR-Broker” Add- ClusterServerRole -Name $BrokerName –StaticAddress 192.168.1.5 Add-ClusterResource -Name “Virtual Machine Replication Broker” -Type "Virtual Machine Replication Broker"Group$BrokerNameAdd-lusterResourceDependency “Virtual Machine Replication Broker”$Broker NameStartClusterGroup $BrokerName create a self-signed certificate with Makecert.exe Time coast (TTL) reduce algorithm: when we provide all applications and windows operating system to the client Minimize (cost) = VM Cost + Penalty Cost; Where Penalty Cost = 0 Per Unit Time VMC cost large = VM Price large 0 Min (VM 0) = VM Price large X VMcost Where VMcost = 0 SQI = respT (SLA) - respT (actual) = 32 and 64 bit /seconds IV. RESULT ANALYSIS After this implementation process client can connect from cloud server remotely and can use its software as service facility, client can install operating systems , software from everywhere. Client can download software also, but cloud clients need to register on cloud server.All those software, windows applications and operating systems can be 32 bit or 64 bit. Which reduce the cost of VM and increases the time limits for all cloud clients?
  • 3. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 30 In previous result user can just use 32 bit applications from server. and after implementing algorithum user need to register first to get user id and password and user can also use 32 bit and 64 bit applications both and also can install 32 bit and 64 bit operating system remotely from server Start=> Run => Type the command MSTSC Type=> 192.168.1.1 (cloud servers ip address) Username => Client 1 Password => @#$passwd
  • 4. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 31 V. CONCLUSION After all these configuration client will directly connect to the cloud server and can access cloud client software as a service from server, server will provide operating system to the client and software’s , with all these facilities client can also use or download software’s from cloud server express to entire private cloud networks , server and to cloud clients and user can also use 32 bit and 64 bit applications both and also can install 32 bit and 64 bit operating system remotely from server REFERENCES [1] A Secure Framework for User Data Storage in Public Cloud Systems using Symmetric Cryptography Reetika Singh1, Rajesh Tiwari2 1Research Scholar, Faculty of Engineering & Technology, 2Faculty of Engineering & Technology Department of Computer Science & Engineering, Shri Shankaracharya College of Engineering & Technology, Chhattisgarh Swami Vivekananda Technical University, Bhilai - 490006, Chhattisgarh, INDIA [2] Cloud computing: state-of-the-art and research challenges Qi Zhang·Lu Cheng·Raouf Boutaba [3] Cloud Computing – Issues, Research and Implementations, Mladen A. Vouk Department of Computer Science, North Carolina State University, Raleigh, North Carolina, USA [4] Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility ,Rajkumar Buyya 1,2 , Chee Shin Yeo 1, Srikumar Venugopal 1, James Broberg 1, and Ivona Brandic 3 ,1 Grid d Computing and Distributed Systems (GRIDS) Laboratory Department of Computer Science and Software Engineering The University of Melbourne, Australia Email: {raj, csyeo, srikumar, brobergj}@csse.unimelb.edu.au ,2 Manjrasoft Pty Ltd, Melbourne, Australia. [5] Cloud Computing Nariman Mirzaei (nmirzaei@indiana.edu) Fall 2008., [6] FOSTER, I., ZHAO, Y., RAICU, I. and LU, S. 2008. Cloud Computing and Grid Computing 360-Degree Compared. In Grid Computing Environments Workshop (GCE '08), Austin, Texas, USA, November 2008, 1-10 [7] Corbató, F. J., Saltzer, J. H., and Clingen, C. T. 1972. Multics: the first seven years. In Proceedings of the May 16- 18, 1972, Spring Joint Computer Conference, Atlantic City, New Jersey, May 1972, 571-583. [8] BUYYA, R., YEO, C. and VENUGOPAL, S. 2008. MarketOriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. In High Performance Computing and Communications, 2008. HPCC '08. 10th IEEE International Conference on, 5-13 [9] Implementing and operating an internet scale distributed application using service oriented architecture principles and cloud computing infrastructure. In iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, 417-421. CHANG, M., HE, J., and E. Leon, "Service-Orientation in the Computing Infrastructure," 2006, pp. 27-33. [10] Implementation of Data Security in Cloud Computing G. Jai Arul Jose1, C. Sajeev2 1,2 Research Scholar, Sathyabama University, Chennai, INDIA. International Journal of P2P Network Trends and Technology- July to Aug Issue 2011ISSN: 2249-2615. [11] SLA-based resource provisioning for hosted software-as-aservice application in cloud computing environments.by linlin Wn,saurabh kumar garg,steve verteeg and rajkumar Buyya.IEEE vol-7,no 3,july- september 2014