International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 14 - Mar 2014
Student at Rajiv Gandhi
Institute of Technology,
Mumbai,India
Student at Rajiv Gandhi
Institute of
Technology,Mumbai
,India.
Abstract - As the number of user-managed devices continues to increase; the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant problem. In this project, we propose a new approach for efficient virtualized-based synchronization of an arbitrary number of distributed files. Our approach maintains both the advantages of peer-to-peer synchronization with the virtualized-based approach.
In contrast, we do not assume storage of any user's data in the cloud, so we address the related capacity, cost, security, and privacy limitations. Finally, the proposed system performs data synchronization in a peer-to-peer manner, eliminating cost and bandwidth.
I. INTRODUCTION
Today is the age of information technology. The facets of work and personal life are moving towards the concept of availability of everything online.
Understanding this trend, the big and giant web based companies like Google, Amazon, and Salesforce.com came with a model named Cloud Computing the sharing of web infrastructure to deal with the internet data storage, scalability and computation (Kambil, 2009).
According to the definition Virtual Safe Online System is a model for on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction”. It is an online service model by which hardware and software services are delivered to customers depending upon their requirements and pay as an operating expense without incurring high cost. Basically it is a set of services that provide Infrastructure resources using Internet media and data storage on a third party server. It has three dimensions known as Software level service, Platform level service, Infrastructure service.
Student at Rajiv Gandhi
Institute of
Technology,Mumbai,
India.
Assistant Professor at
Rajiv Gandhi Institute of
Technology,Mumbai
,India
The main cloud computing attributes are pay per use, elastic self-provisioning through software, simple scalable services, virtualized physical resources
(Tucker). These Virtual technologies enable the user to access storage resources and charge according to the resources access. Virtual Safe Online System platforms are based on utility model that enhances the reliability, scalability, performance and need based configurability and all these capabilities are provided at relatively low costs. This new model of infrastructure sharing is being widely adopted by the industries. Industries experts predict that Virtual Safe Online System has bright future in spite of changing technology that faces significant challenge.
Virtual Safe Online System refers to the use, through the
Internet, of diverse applications as if they were installed in the user’s computer, independently of platform and location. Several formal definitions for Virtual Safe
Online System have been proposed by industry and academia. We adopt the following definition: Virtual
Safe Online System, a scalable distributed storage system that deploys a pastiche of theoretical and practical techniques, providing tolerance of malicious faults, reduced management overhead such as periodic repairs, and very high availability at an archival scale.
Virtual Safe Online System is designed to provide a storage utility for environments such as large-scale data centres in enterprise networks where the servers experience high loads and thus show temporary unavailability (as opposed to P2P systems, where servers disappear over the long run). Consequently, the design
Goals of Virtual Safe Online System are to provide high load resilience in a seamlessly extensible way. Virtual
Safe Online System is based on the simple principle: efficiently sprinkle data all over a distributed storage and robustly reconstruct even when many of them are unavailable under high loads . This definition includes cloud architectures, security, and deployment strategies.
Virtual Safe Online System is being progressively
ISSN: 2231-5381 http://www.ijettjournal.org
Page 705
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 14 - Mar 2014 adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market.
Being based on diverse technologies (e.g. virtualization, utility computing, grid computing and service oriented architectures) and constituting a whole new computational paradigm, it requires high level management routines.
II.TECHNICAL VIEW
A. Objectives:
Virtual Safe Online System provides ease of access to the multimedia files stored at the server’s side using the concept of cloud computing.
At the server’s side the documents created using the traditional pattern of paperwork are converted to electronic media files and stored for future access.
At the client side the system provides access to these media files which are just an application away.
Virtual Safe Online System is based on the idea of Carry Less, Use More.
This system provides elasticity that is the ability to retrieve the media files almost at a moment’s notice.
The device can be synced anywhere, anytime with the help of any one device.
Virtual Safe Online System provides flexible storage of electronic media files that can be scaled up and down as needed.
B. Proposed System:
The existing system involves a lot of paperwork. All our important documents like mark sheets, driving license are drafted using the traditional paperwork fashion. In addition to this in case of loss or damage of these documents, retrieval of these documents proves to be a tedious process. In the existing system portability is also an issue since carrying these documents without losing them is not guaranteed. Virtual Safe Online System provides solution to these problems involved with the traditional existing system.
In our proposed system, at the server’s end initially the documents that are created using the traditional paperwork are converted into multimedia files using an electronic media device such as the scanner. The media file is uploaded on the server’s site and added to the database present at the server’s end after verification by the respective authority implementing the system. This file gets added to the user’s profile which will be created by the administrator of the system at the time of the user’s first interaction with system. The server will be common for one working environment. A server may be provided to multiple clients, which will work as the cloud storage.
Fig 1: Block diagram of Proposed System.
At the client’s side the user can access his profile with the help of an application installed on a portable device like a mobile or a tablet working on an android platform.
In order to access his profile using the application, the user undergoes an authentication wherein he has to provide his username and password. Once logged in the user can view the multimedia files of his documents uploaded in the server’s database. These multimedia files are watermarked by the authority using this system and are considered to be as good as the original.
III.ARCHITECTURE
The figure below explains the logical structure of Virtual
Safe Online System.
The basic architecture of the system is based on the concept of cloud computing. The interface at the server’s end is nothing but a website that will be hosted on a
ISSN: 2231-5381 http://www.ijettjournal.org
Page 706
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 14 - Mar 2014 cloud. Storage of the user data is managed on the cloud itself .SQL is used for the storage purpose of the multimedia documents.
REFERENCES
“Complete Reference to java” by TaTa MC-graw hill.[1]
ArnabPaul,SandipAgarwala,UmakishoreRamachandran
,”e-SAFE:AnExtensible,Secure and Fault Tolerant
Storage System”,Georgia Tech Atlanta,GA
30332,USA.[2]
P.M.Chen, E.K.Lee, G.A.Gibson, R.H.Katz, and
D.A.Patterson. RAID: High-performer,reliable secondary storage.ACM Computing Surveys,26(2):145-
185,1994.[3]
R.J.Morris and B.J.Truskowski. Evolution osstoage area network.IBM system journal,423(2),2002.[4]
R.H.Thomas. A majority consensus approach to concurrency control for multiple copy databases . In
Database Systems , Volume 4.[5]
Fig. Architecture of Virtual Safe Online System.
The application on the user’s end runs on the android platform. The application is first developed using
Software Development Kit (SDK) in such a way that it is compatible with the android OS environment. This application is then deployed on mobile devices functioning on an android platform such as tablet or a smart phone. The application when connected with the cloud using protocols like GSM (Global System for
Mobile Communication) and CDMA (Code Division
Multiple Access) can be used to view the stored multimedia documents.
IV.CONCLUSION
Thus this paper focuses on the approach that is proposed to virtualize the raw data into the distributed storage system and can be brought into the use whenever required. It is clear that proposed approach is very efficient for ensuring the security of the huge stock of the data stored and even for the retrieval purpose. We formulate most frequent pattern of virtual storage system like cloud computing by using their known properties in these system.
Its cost efficient as a large numbers of the crowd make the use of Smart Mobile Devices, Tablets, PDA’s which is required for retrieval of data at user side from backend. It is highly flexible on-the-go which also does not require high software and hardware capabilities.
ISSN: 2231-5381 http://www.ijettjournal.org
Page 707