SlideShare a Scribd company logo
1 of 38
DEPENDABILITY ASSESSMENTS
OF RELIABLE SERVICES IN A
PRIVATE CLOUD ENVIRONMENT
VIVA DATE: 29-06-2016
PRAKASH.U
211614405010
M.E., CSE
SUPERVISOR: MR.S.UDHAYAKUMAR
(ASSOCIATE PROFESSOR)
AGENDA
• INTRODUCTION
• MOTIVATION
• ABSTRACT
• LITERATURE SURVEY
• SYSTEM ARCHITECTURE
• ARCHITECTURE EXPLANATION
• IMPLEMENTATION STACK
• CONCLUSION AND FUTURE ENHANCEMENT
• REFERENCES
• LIST OF PUBLICATIONS
INTRODUCTION
• The project is push the limits of the cloud which is built for a
private environment, by instantiating multiple instances and
performing resource migration The reliability-related
challenges that we face today are not dramatically different
from those that we’ve faced in years past, such as unexpected
hardware failures, power outages, software bugs, failed
deployments, people making mistakes, and so on.
MOTIVATION
• The goal is to prove that Openstack services are reliable, the
project implements a recommendation system on top of a
private cloud platform.
• Hence a confluence of cloud and big data makes the project
more complex and challenging for implementation in a real
world setup instead of simulation.
ABSTRACT
Openstack ensure that the service deployed is highly stable
and provides resource migration without any service
disruption.
In order to prove the dependability of the service, our project
makes use of Hadoop for distributed processing, movie data
set is evaluated and analyzed for prediction.
Hence recommendation and prediction system is built over
Hadoop using Apache Mahout.
This stack of software implementation running on top of a
private cloud is built on a stable Linux environment like
Ubuntu or Cent OS.
LITERATURE SURVEY
S.NO TOPIC AUTHOR AND YEAR DESCRIPTION
1. Adaptive Trust Model
for Software Services
in Hybrid Cloud
Environment
S.Udhayakumar,
S.Chandrasekaran,
Latha Tamilselvan,
Fareez Ahmed
(2014)
The reputations of the constituent
domain specific services are
evaluated to determine the
overall trust of the demanded
service assuming other
infrastructure and platform
services.
2. A Trust Model for a
Group of E-mail
Servers
Leonardo B.de Oliveira
and Carlos A. Maziero
(2008)
This work presents a distributed
trust model, allowing to create
dynamic and decentralized
trusted server lists, through the
exclusion of servers recognized
as spreaders of malicious
messages.
S.NO TOPIC AUTHOR AND
YEAR
DESCRIPTION
3. A Classification
Scheme for Trust
Functions in
Reputation-Based
Trust Management
by Qing Zhang ,
Ting Yu , Keith
Irwin
(2004)
We propose a classification
scheme for trust functions, which
will help the systematic
analysis and selection of trust
functions for particular
applications.
4. Scheduler
Vulnerabilities and
Attacks in Cloud
Computing
Fangfei Zhou,
Manish Goel,
Peter Desnoyers,
Ravi Sundaram
(2011)
We present experimental results
demonstrating the effectiveness
of these defenses while imposing
negligible
overhead.
5. Remote Attestation
Service
Trustworthy Clouds,
Dr. Klaus-Michael
Koch
(2013)
The Remote Attestation Service
is a cloud subsystem responsible
to assess the integrity of nodes in
the cloud infrastructure through
techniques introduced by the
Trusted Computing technology.
S.NO TOPIC AUTHOR AND
YEAR
DESCRIPTION
6. A Trust-aware
Framework for
Evaluating Security
Controls of Service
Providers in Cloud
Marketplaces
Habib, S.M.
Telecooperation
Lab
(2013)
This paper proposes a trust-aware
framework to verify and evaluate
these security controls considering
consumers’ requirements.
7. Building Private
Cloud using
OpenStack
Girish L ,
Dr. H S
Guruprasad
(2010)
This paper discusses about
implementing a private cloud using
open source software and
operating system. This private
cloud is capable of providing the
infrastructure and platform as a
service.
S.NO TOPIC AUTHOR AND
YEAR
DESCRIPTION
8. Emerging Security
Issues and
Challenges in Cloud
Computing
S C Rachana,
Dr. H S Guruprasad
(2014)
The information about the
threats such as- Multitenancy,
Availability, Loss of control,
Loss of Data, outside attacks,
DOS attacks, malicious insiders,
etc. The solutions to overcome
some of these threats have also
been highlighted in this paper.
9. Integrity Attestation
for Software-as-a
Service Clouds
Chashu Mol R,
Alfia A P
(2013)
An effective service integrity
attestation framework for SaaS
clouds. IntTest provides an
integrated graph attestation
analysis method that can
pinpoint malicious service
providers than existing methods.
S.NO TOPIC AUTHOR AND
YEAR
DESCRIPTION
10. Scalable Analysis
and Improved
Search in
Software as a
Service in Cloud
Dr. K. Swathi1
Professor and Head
(2014)
we represent IntTest, verification
method that can enthusiastically
verify the integrity of data
processing results in the cloud
infrastructure and pinpoint
malicious service providers when
inconsistent results are noticed.
11. Scalable
Distributed
Service Integrity
Attestation for
Software-as-a-
Service Clouds
Juan Du, Member,
IEEE,
Daniel J. Dean,
Student Member,
IEEE,
Yongmin Tan,
Member, IEEE,
Xiaohui Gu, Senior
Member, IEEE,
we present IntTest, a scalable and
effective service integrity
attestation framework for SaaS
clouds. IntTest provides a novel
integrated attestation graph
analysis scheme that can provide
stronger attacker pinpointing power
than previous schemes
HADOOP
MAHOUT
RECOMMENDATION
SSH
JAVA
PYTHON RESULT
OPENSTACK PACKSTACK
OUTPUT.txt
MOVIELENS
DATASET
U.ITEMU.USERU.DATA
SYSTEM ARCHITECTURE
ARCHITECTURE EXPLANATION
• The OpenStack project is an open source cloud computing
platform that supports all types of cloud environments.
• The project aims for simple implementation, massive
scalability, and a rich set of features.
• OpenStack provides an Infrastructure-as-a-Service (IaaS)
solution through a variety of complemental services.
• Each service offers an application programming interface
(API) that facilitates this integration.
CONTD..
The following steps toward deployment using a Openstack
architecture:
• Determine and implement the necessary core and optional
services to meet performance and redundancy
requirements.
• Increase security using methods such as firewalls,
encryption, and service policies.
• Implement a deployment tool such as Ansible, Chef,
Puppet, or Salt to automate deployment and management
of the production environment.
CONTD..
To run the Mahout recommendation engine on a dataset of
movie ratings and show the movie recommendations for each
user.
Following Requirements of Mahout Recommendation engine
on a Hadoop cluster:
Running Hadoop
To install and configure Hadoop
To install Mahout
Getting the movie dataset
Running the Mahout recommender
HARDWARE REQUIREMENTS
Machine with at least 8GB RAM, preferably 16GB RAM
Minimum 100GB of Disk Memory.
Processors with hardware virtualization extensions.
and at least one network adapter.
SOFTWARE REQUIREMENTS
CentOS 7 64-bit Host OS
Ubuntu Instance Image
CirrOS Instance Image
Openstack
Hadoop - hadoop-1.1.1
Java - jdk-8u77-linux-x64
Mahout - mahout-distribution-0.7
Movie Lens Dataset - ml-100k
Python (use to show the recommendations result)
IMPLEMENTATION STACK
INSTALLING OPENSTACK ON
CENTOS
OPENSTACK DASHBOARD
CREATE PRIVATE AND PUBLIC
NETWORK
LAUNCH INSTANCES
INSTANCES LIST
NETWORK TOPOLOGY WITH
INSTANCES
LAUNCH AN UBUNTU INSTANCE
STARTED AND RUNNING HADOOP
RUNNING MAHOUT RECOMMENDER
HADOOP MAPREDUCE JOBS
PYTHON PROGRAM TO SHOW
OUTPUT
RATED MOVIES AND
RECOMMENDED MOVIES RESULT
RATED MOVIES TABLE
Rated Movies Ratings
Mimic (1997) 3
Ulee's Gold (1997) 5
Incognito (1997) 5
One Flew Over the Cuckoo's Nest (1975), 4
Event Horizon (1997) 4
Client, The (1994) 3
Liar Liar (1997) 5
Scream (1996) 4
Star Wars (1977) 5
Wedding Singer, The (1998) 5
Starship Troopers (1997) 4
Air Force One (1997) 5
Conspiracy Theory (1997) 3
Contact (1997) 5
Indiana Jones and the Last Crusade (1989) 3
Desperate Measures (1998) 5
Seven (Se7en) (1995) 4
Cop Land (1997) 5
Lost Highway (1997) 5
Assignment, The (1997) 5
Blues Brothers 2000 (1998) 5
Spawn (1997) 2
Wonderland (1997) 5
In & Out (1997) 5
RATED MOVIES GRAPH
RECOMMENDED MOVIES TABLE
Recommended Movies Ratings
Saint, The (1997)
5
Indian summer (1996)
5
Broken Arrow (1996)
5
Speed (1994)
5
Anastasia (1997)
5
People vs. Larry Flynt, The (1996)
5
Casablanca (1942)
5
Trainspotting (1996)
5
Courage Under Fire (1996)
5
Money Talks (1997)
5
RECOMMENDED MOVIES GRAPH
CONCLUSION AND FUTURE
ENHANCEMENT
• The implementation conducted here concludes that, we
propose an efficient and stable means of cloud deployment
through a private cloud installation using OpenStack.
• In the future, Openstack Multi-node implementation of a
private and public cloud is built on a both Linux and Windows
Instances.
REFERENCES
[1] S.Udhayakumar, S.Chandrasekaran, Latha Tamilselvan, Fareez Ahmed, "An
Adaptive Trust Model for Software Services in Hybrid Cloud Environment," Recent
Researches in Computer Science, 2014.
[2] Girish L S, Dr. H S Guruprasad, "Building Private Cloud using Openstack,"
International Journal of Emerging Trends & Technology in Computer Science
(IJETTCS), Volume 3, Issue 3, May – June 2014.
[3] S C Rachana, Dr. H S Guruprasad, "Emerging Security Issues and Challenges in
Cloud Computing," International Journal of Engineering Science and Innovative
Technology (IJESIT), Volume 3, Issue 2, March 2014.
[4] Dr. K. Swathi, G. Anushiya, R. Vijayanathan, "Scalable Analysis and Improved
Search in Software as a Service in Cloud," International Journal of Advance Research
in Computer Science and Management Studies, Volume 2, Issue 12, December 2014.
[5] Juan Du, Daniel J. Dean, Yongmin Tan, Xiaohui Gu and Ting Yu, "Scalable
Distributed Service Integrity Attestation for Software-as-a-Service Clouds," IEEE
Transactions On Parallel and Distributed Systems, VOL. 25, NO. 3, MARCH 2014.
CONTD..
[6] Chashu Mol R, Alfia A P, "Integrity Attestation for Software-as-a Service Clouds,"
International Journal of Science and Research (IJSR), Index Copernicus Value (2013):
6.14 | Impact Factor (2013): 4.438.
[7] Dr. Klaus-Michael Koch, Dr. Christian Cachin, "Remote Attestation Service,"
TClouds — Trustworthy Clouds, www.tclouds-project.eu., 2013.
[8] Sheikh Mahbub Habib, Vijay Varadharajan, Max Muhlhauser, "A Trust-aware
Framework for Evaluating Security Controls of Service Providers in Cloud
Marketplaces," Telecooperation Lab., 2013.
[9] Fangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram, "Scheduler
Vulnerabilities and Attacks in Cloud Computing," arXiv:1103.0759v1 [cs.DC] 3 Mar
2011.
[10] Leonardo B. de, Oliveira and Carlos A. Maziero, "A Trust Model for a Group of
E-mail Servers," CLEI Electronic Journal, Volume 11, Number 2, Paper 1, Dec 2008.
[11] Qing Zhang, Ting Yu and Keith Irwin, "A Classification Scheme for Trust
Functions in Reputation-Based Trust Management," 2004.
LIST OF PUBLICATION
• Prakash.U, “Dependability Assessments of Reliable
Services in a Private Cloud Environment, Dec - 2015”
Proceedings of the International Conference on Mathematical
Computer Engineering ( ICMCE – 2015 ).
THANK YOU !

More Related Content

What's hot

Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergentJayakrishnan U
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsIRJET Journal
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...IRJET Journal
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
Cloud Resilience with Open Stack
Cloud Resilience with Open StackCloud Resilience with Open Stack
Cloud Resilience with Open StackJorge Cardoso
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.prudhvikumar madithati
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Angelo Corsaro
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudIAEME Publication
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET Journal
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditingvmshimavm
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Information Security Awareness Group
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA ExplainedAngelo Corsaro
 

What's hot (20)

Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Cloud Resilience with Open Stack
Cloud Resilience with Open StackCloud Resilience with Open Stack
Cloud Resilience with Open Stack
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 

Viewers also liked

Booklet cult
Booklet cultBooklet cult
Booklet cultSan Tone
 
марика, јован и снешко
марика, јован и снешкомарика, јован и снешко
марика, јован и снешкоZivko Petrovski
 
Crisis communications 2014 general
Crisis communications 2014 generalCrisis communications 2014 general
Crisis communications 2014 generalVirginia White
 
GSU - History of Web 2.0
GSU - History of Web 2.0GSU - History of Web 2.0
GSU - History of Web 2.0Jake Aull
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachIan Sommerville
 

Viewers also liked (6)

Booklet cult
Booklet cultBooklet cult
Booklet cult
 
марика, јован и снешко
марика, јован и снешкомарика, јован и снешко
марика, јован и снешко
 
Crisis communications 2014 general
Crisis communications 2014 generalCrisis communications 2014 general
Crisis communications 2014 general
 
GSU - History of Web 2.0
GSU - History of Web 2.0GSU - History of Web 2.0
GSU - History of Web 2.0
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
 

Similar to Reliable Private Cloud Services for Recommendation

Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...
Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...
Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...IRJET Journal
 
A survey-report-on-cloud-computing-testing-environment
A survey-report-on-cloud-computing-testing-environmentA survey-report-on-cloud-computing-testing-environment
A survey-report-on-cloud-computing-testing-environmentshritosh kumar
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...ijafrc
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchDakshineshwar Swain
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
Consistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud ConsistencyConsistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud ConsistencyLakshmiPriya UdayaKumar
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloudPapitha Velumani
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
 
Survey of uncertainty handling in cloud service discovery and composition
Survey of uncertainty handling in cloud service discovery and compositionSurvey of uncertainty handling in cloud service discovery and composition
Survey of uncertainty handling in cloud service discovery and compositionijngnjournal
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Reliable Private Cloud Services for Recommendation (20)

Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...
Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...
Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...
 
A survey-report-on-cloud-computing-testing-environment
A survey-report-on-cloud-computing-testing-environmentA survey-report-on-cloud-computing-testing-environment
A survey-report-on-cloud-computing-testing-environment
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Consistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud ConsistencyConsistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud Consistency
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Duc le CV
Duc le CVDuc le CV
Duc le CV
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...
 
Survey of uncertainty handling in cloud service discovery and composition
Survey of uncertainty handling in cloud service discovery and compositionSurvey of uncertainty handling in cloud service discovery and composition
Survey of uncertainty handling in cloud service discovery and composition
 
Sharad openstack slides
Sharad openstack slidesSharad openstack slides
Sharad openstack slides
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Compiler
Cloud Compiler Cloud Compiler
Cloud Compiler
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

Reliable Private Cloud Services for Recommendation

  • 1. DEPENDABILITY ASSESSMENTS OF RELIABLE SERVICES IN A PRIVATE CLOUD ENVIRONMENT VIVA DATE: 29-06-2016 PRAKASH.U 211614405010 M.E., CSE SUPERVISOR: MR.S.UDHAYAKUMAR (ASSOCIATE PROFESSOR)
  • 2. AGENDA • INTRODUCTION • MOTIVATION • ABSTRACT • LITERATURE SURVEY • SYSTEM ARCHITECTURE • ARCHITECTURE EXPLANATION • IMPLEMENTATION STACK • CONCLUSION AND FUTURE ENHANCEMENT • REFERENCES • LIST OF PUBLICATIONS
  • 3. INTRODUCTION • The project is push the limits of the cloud which is built for a private environment, by instantiating multiple instances and performing resource migration The reliability-related challenges that we face today are not dramatically different from those that we’ve faced in years past, such as unexpected hardware failures, power outages, software bugs, failed deployments, people making mistakes, and so on.
  • 4. MOTIVATION • The goal is to prove that Openstack services are reliable, the project implements a recommendation system on top of a private cloud platform. • Hence a confluence of cloud and big data makes the project more complex and challenging for implementation in a real world setup instead of simulation.
  • 5. ABSTRACT Openstack ensure that the service deployed is highly stable and provides resource migration without any service disruption. In order to prove the dependability of the service, our project makes use of Hadoop for distributed processing, movie data set is evaluated and analyzed for prediction. Hence recommendation and prediction system is built over Hadoop using Apache Mahout. This stack of software implementation running on top of a private cloud is built on a stable Linux environment like Ubuntu or Cent OS.
  • 6. LITERATURE SURVEY S.NO TOPIC AUTHOR AND YEAR DESCRIPTION 1. Adaptive Trust Model for Software Services in Hybrid Cloud Environment S.Udhayakumar, S.Chandrasekaran, Latha Tamilselvan, Fareez Ahmed (2014) The reputations of the constituent domain specific services are evaluated to determine the overall trust of the demanded service assuming other infrastructure and platform services. 2. A Trust Model for a Group of E-mail Servers Leonardo B.de Oliveira and Carlos A. Maziero (2008) This work presents a distributed trust model, allowing to create dynamic and decentralized trusted server lists, through the exclusion of servers recognized as spreaders of malicious messages.
  • 7. S.NO TOPIC AUTHOR AND YEAR DESCRIPTION 3. A Classification Scheme for Trust Functions in Reputation-Based Trust Management by Qing Zhang , Ting Yu , Keith Irwin (2004) We propose a classification scheme for trust functions, which will help the systematic analysis and selection of trust functions for particular applications. 4. Scheduler Vulnerabilities and Attacks in Cloud Computing Fangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram (2011) We present experimental results demonstrating the effectiveness of these defenses while imposing negligible overhead. 5. Remote Attestation Service Trustworthy Clouds, Dr. Klaus-Michael Koch (2013) The Remote Attestation Service is a cloud subsystem responsible to assess the integrity of nodes in the cloud infrastructure through techniques introduced by the Trusted Computing technology.
  • 8. S.NO TOPIC AUTHOR AND YEAR DESCRIPTION 6. A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces Habib, S.M. Telecooperation Lab (2013) This paper proposes a trust-aware framework to verify and evaluate these security controls considering consumers’ requirements. 7. Building Private Cloud using OpenStack Girish L , Dr. H S Guruprasad (2010) This paper discusses about implementing a private cloud using open source software and operating system. This private cloud is capable of providing the infrastructure and platform as a service.
  • 9. S.NO TOPIC AUTHOR AND YEAR DESCRIPTION 8. Emerging Security Issues and Challenges in Cloud Computing S C Rachana, Dr. H S Guruprasad (2014) The information about the threats such as- Multitenancy, Availability, Loss of control, Loss of Data, outside attacks, DOS attacks, malicious insiders, etc. The solutions to overcome some of these threats have also been highlighted in this paper. 9. Integrity Attestation for Software-as-a Service Clouds Chashu Mol R, Alfia A P (2013) An effective service integrity attestation framework for SaaS clouds. IntTest provides an integrated graph attestation analysis method that can pinpoint malicious service providers than existing methods.
  • 10. S.NO TOPIC AUTHOR AND YEAR DESCRIPTION 10. Scalable Analysis and Improved Search in Software as a Service in Cloud Dr. K. Swathi1 Professor and Head (2014) we represent IntTest, verification method that can enthusiastically verify the integrity of data processing results in the cloud infrastructure and pinpoint malicious service providers when inconsistent results are noticed. 11. Scalable Distributed Service Integrity Attestation for Software-as-a- Service Clouds Juan Du, Member, IEEE, Daniel J. Dean, Student Member, IEEE, Yongmin Tan, Member, IEEE, Xiaohui Gu, Senior Member, IEEE, we present IntTest, a scalable and effective service integrity attestation framework for SaaS clouds. IntTest provides a novel integrated attestation graph analysis scheme that can provide stronger attacker pinpointing power than previous schemes
  • 12. ARCHITECTURE EXPLANATION • The OpenStack project is an open source cloud computing platform that supports all types of cloud environments. • The project aims for simple implementation, massive scalability, and a rich set of features. • OpenStack provides an Infrastructure-as-a-Service (IaaS) solution through a variety of complemental services. • Each service offers an application programming interface (API) that facilitates this integration.
  • 13. CONTD.. The following steps toward deployment using a Openstack architecture: • Determine and implement the necessary core and optional services to meet performance and redundancy requirements. • Increase security using methods such as firewalls, encryption, and service policies. • Implement a deployment tool such as Ansible, Chef, Puppet, or Salt to automate deployment and management of the production environment.
  • 14. CONTD.. To run the Mahout recommendation engine on a dataset of movie ratings and show the movie recommendations for each user. Following Requirements of Mahout Recommendation engine on a Hadoop cluster: Running Hadoop To install and configure Hadoop To install Mahout Getting the movie dataset Running the Mahout recommender
  • 15. HARDWARE REQUIREMENTS Machine with at least 8GB RAM, preferably 16GB RAM Minimum 100GB of Disk Memory. Processors with hardware virtualization extensions. and at least one network adapter.
  • 16. SOFTWARE REQUIREMENTS CentOS 7 64-bit Host OS Ubuntu Instance Image CirrOS Instance Image Openstack Hadoop - hadoop-1.1.1 Java - jdk-8u77-linux-x64 Mahout - mahout-distribution-0.7 Movie Lens Dataset - ml-100k Python (use to show the recommendations result)
  • 20. CREATE PRIVATE AND PUBLIC NETWORK
  • 24. LAUNCH AN UBUNTU INSTANCE
  • 28. PYTHON PROGRAM TO SHOW OUTPUT
  • 30. RATED MOVIES TABLE Rated Movies Ratings Mimic (1997) 3 Ulee's Gold (1997) 5 Incognito (1997) 5 One Flew Over the Cuckoo's Nest (1975), 4 Event Horizon (1997) 4 Client, The (1994) 3 Liar Liar (1997) 5 Scream (1996) 4 Star Wars (1977) 5 Wedding Singer, The (1998) 5 Starship Troopers (1997) 4 Air Force One (1997) 5 Conspiracy Theory (1997) 3 Contact (1997) 5 Indiana Jones and the Last Crusade (1989) 3 Desperate Measures (1998) 5 Seven (Se7en) (1995) 4 Cop Land (1997) 5 Lost Highway (1997) 5 Assignment, The (1997) 5 Blues Brothers 2000 (1998) 5 Spawn (1997) 2 Wonderland (1997) 5 In & Out (1997) 5
  • 32. RECOMMENDED MOVIES TABLE Recommended Movies Ratings Saint, The (1997) 5 Indian summer (1996) 5 Broken Arrow (1996) 5 Speed (1994) 5 Anastasia (1997) 5 People vs. Larry Flynt, The (1996) 5 Casablanca (1942) 5 Trainspotting (1996) 5 Courage Under Fire (1996) 5 Money Talks (1997) 5
  • 34. CONCLUSION AND FUTURE ENHANCEMENT • The implementation conducted here concludes that, we propose an efficient and stable means of cloud deployment through a private cloud installation using OpenStack. • In the future, Openstack Multi-node implementation of a private and public cloud is built on a both Linux and Windows Instances.
  • 35. REFERENCES [1] S.Udhayakumar, S.Chandrasekaran, Latha Tamilselvan, Fareez Ahmed, "An Adaptive Trust Model for Software Services in Hybrid Cloud Environment," Recent Researches in Computer Science, 2014. [2] Girish L S, Dr. H S Guruprasad, "Building Private Cloud using Openstack," International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 3, May – June 2014. [3] S C Rachana, Dr. H S Guruprasad, "Emerging Security Issues and Challenges in Cloud Computing," International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 3, Issue 2, March 2014. [4] Dr. K. Swathi, G. Anushiya, R. Vijayanathan, "Scalable Analysis and Improved Search in Software as a Service in Cloud," International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 12, December 2014. [5] Juan Du, Daniel J. Dean, Yongmin Tan, Xiaohui Gu and Ting Yu, "Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds," IEEE Transactions On Parallel and Distributed Systems, VOL. 25, NO. 3, MARCH 2014.
  • 36. CONTD.. [6] Chashu Mol R, Alfia A P, "Integrity Attestation for Software-as-a Service Clouds," International Journal of Science and Research (IJSR), Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438. [7] Dr. Klaus-Michael Koch, Dr. Christian Cachin, "Remote Attestation Service," TClouds — Trustworthy Clouds, www.tclouds-project.eu., 2013. [8] Sheikh Mahbub Habib, Vijay Varadharajan, Max Muhlhauser, "A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces," Telecooperation Lab., 2013. [9] Fangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram, "Scheduler Vulnerabilities and Attacks in Cloud Computing," arXiv:1103.0759v1 [cs.DC] 3 Mar 2011. [10] Leonardo B. de, Oliveira and Carlos A. Maziero, "A Trust Model for a Group of E-mail Servers," CLEI Electronic Journal, Volume 11, Number 2, Paper 1, Dec 2008. [11] Qing Zhang, Ting Yu and Keith Irwin, "A Classification Scheme for Trust Functions in Reputation-Based Trust Management," 2004.
  • 37. LIST OF PUBLICATION • Prakash.U, “Dependability Assessments of Reliable Services in a Private Cloud Environment, Dec - 2015” Proceedings of the International Conference on Mathematical Computer Engineering ( ICMCE – 2015 ).