SlideShare a Scribd company logo
Collaboration in Multicloud Computing Environments Framework and
Security Issues
ABSTRACT
A proposed proxy-based multicloud computing framework allows dynamic, on the fly collaborations and
resource sharing among cloud-based services, addressing trust, policy, and privacy issues without
preestablished collaboration agreements or standardized interfaces. The recent surge in cloud computing
arises from its ability to provide software, infrastructure, and platform services without requiring large
investments or expenses to manage and operate them. Clouds typically involve service providers,
infrastructure/resource providers, and service users (or clients). They include applications delivered as
services, as well as the hardware and software systems providing these services. Cloud computing
characteristics include a ubiquitous (network-based) access channel; resource pooling; multitenancy; automatic
and elastic provisioning and release of computing capabilities; and metering of resource usage (typically on a
pay-per-use basis). Virtualization of resources such as processors, network, memory, and storage ensures
scalability and high availability of computing capabilities. Clouds can dynamically provision these virtual
resources to hosted applications or to clients that use them to develop their own applications or to store data.
Rapid provisioning and dynamic reconfiguration of resources help cope with variable demand and ensure
optimum resource utilization.
EXISTING SYSTEM:
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Many existing cloud data services provide similar access control models, in which individual and
organizational privacy, a key requirement for digital identity management, is unprotected. Also, with cloud
computing initiatives, the scope of insider threats, a major source of data theft and privacy breaches, is no
longer limited to the organizational perimeter. Multicloud environments exacerbate these issues because
proxies can access data (which the environment might dynamically move or partition across different clouds)
on behalf of clients. Revealing sensitive information in identity attributes to proxies that grant them
authorization to access the data on behalf of clients is not an attractive solution. Thus, assuring the private and
consistent management of information relevant to ABAC becomes more complex in multicloud systems.
PROPOSED SYSTEM:
Our proposed framework for generic cloud collaboration allows clients and cloud applications to
simultaneously use services from and route data among multiple clouds. This framework supports universal
and dynamic collaboration in a multicloud system. It lets clients simultaneously use services from multiple
clouds without prior business agreements among cloud providers, and without adopting common standards
and specifications. As more organizations adopt cloud computing, cloud service providers (CSPs) are
developing new technologies to enhance the cloud’s capabilities. Cloud mashups are a recent trend; mashups
combine services from multiple clouds into a single service or application, possibly with on-premises (client-
side) data and services. This service composition lets CSPs offer new functionalities to clients at lower
development costs.
MODULE DESCRIPTION:
Number of Modules
After careful analysis the system has been identified to have the following modules:
1. Collaboration Framework For Multicloud System Module.
2. Client/Users Module.
3. Cloud Service Provider Module.
4. Proxy Service Provider Module.
1. Collaboration Framework For Multicloud System Module:
Cloud collaboration allows clients and cloud applications to simultaneously use services from and route data
among multiple clouds. This framework supports universal and dynamic collaboration in a multicloud
system. It lets clients simultaneously use services from multiple clouds without prior business agreements
among cloud providers, and without adopting common standards and specifications.
2. Client/Users Module:
Client sends a request to cloud C1, which dynamically discovers the need to use services from clouds C2 and
C3. C1 employs proxies to manage these interactions. A client that wishes to simultaneously use services from
multiple clouds must individually interact with each cloud service, gather intermediate results, process the
collective data, and generate final results. Proxies can facilitate collaboration without requiring prior
agreements between the cloud service providers. First, the requesting entity chooses proxies to act on its behalf
and to interact with cloud applications. A client or a CSP might employ multiple proxies to interact with
multiple CSPs. It can select proxies based on, for example, latencies between proxies and clouds or workload
conditions at various proxies.
3.Cloud Service Provider Module:
Cloud service providers (CSPs) deploy proxies as an autonomous cloud system and offer it as a service to
clients. A client employs two proxies to interact with CSPs C1 and C2. Alternatively, a client initiates a service
request with C1, which then discovers the need for a service from C2. PSP: proxy service provider. Clients
deploy proxies within the infrastructure of their organization. A client employs two proxies to interact with
CSPs C1 and C2. A client initiates a service request with C1, which then discovers the need for a service from
C2.
4. Proxy Service Provider Module:
It involves deploying proxies as an autonomous cloud that offers collaborative services to clients and CSPs. A
group of CSPs that are willing to collaborate can manage this proxy-as-a-service cloud, or a third-party entity,
a proxy service provider (PSP), can provide management. Clients directly subscribe to the proxy cloud service
and employ them for intercloud collaboration. To protect data at rest and data in transit, proxies must provide a
trusted computing platform that prevents malicious software from taking control and compromising sensitive client and
cloud application data.
SOFTWARE REQUIREMENTS:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Tool kit : Android Phone
Database : My SQL
Java Version : J2SDK1.5
HARDWARE REQUIREMENTS:
Hardware : Pentium
Speed : 1.1 GHz
RAM : 1GB
Hard Disk : 20 GB
Floppy Drive : 1.44 MB
Key Board : Standard Windows Keyboard
Mouse : Two or Three Button Mouse
Monitor : SVGA
Flow Diagram:
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

What's hot (19)

PPTX
Presenting Cloud Computing
Naveen Karn
 
PDF
Advanced Concepts of Cloud Computing
Swwapnil Saali
 
PPT
Cloud Computing Introduction
guest90f660
 
PPTX
Cloud computing
Arar Fahem
 
PPTX
Cloud computing presentation
hemanth S R
 
PPSX
Cloud computing
حيدر نافع nafaa
 
PPTX
Cloud Computing
Mohammad Shakirul islam
 
PPTX
Cloud computing
hari krishnan.n
 
PPTX
Cloud computing
DebrajKarmakar
 
PPTX
Introduction to cloud computing
Jithin Parakka
 
PPT
An Introduction To Infarstructures For Cloud Computing V0.2
Ignacio M. Llorente
 
PPTX
Cloud computing seminar
ANKIT KUMAR
 
PDF
Cloud Computing - An Introduction
Ravindra Dastikop
 
PPTX
cloud computing ppt
himanshuawasthi2109
 
PPT
Cc unit 1 ppt
Dr VISU P
 
PPTX
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
PDF
Cloud computing writeup
selvavijay1987
 
PDF
Software Developer Conference 2012 - Paper Presentation - Cloud File Systems
Abhijeet Kulkarni
 
PPTX
Cloud computing
Suryavamsi51
 
Presenting Cloud Computing
Naveen Karn
 
Advanced Concepts of Cloud Computing
Swwapnil Saali
 
Cloud Computing Introduction
guest90f660
 
Cloud computing
Arar Fahem
 
Cloud computing presentation
hemanth S R
 
Cloud computing
حيدر نافع nafaa
 
Cloud Computing
Mohammad Shakirul islam
 
Cloud computing
hari krishnan.n
 
Cloud computing
DebrajKarmakar
 
Introduction to cloud computing
Jithin Parakka
 
An Introduction To Infarstructures For Cloud Computing V0.2
Ignacio M. Llorente
 
Cloud computing seminar
ANKIT KUMAR
 
Cloud Computing - An Introduction
Ravindra Dastikop
 
cloud computing ppt
himanshuawasthi2109
 
Cc unit 1 ppt
Dr VISU P
 
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Cloud computing writeup
selvavijay1987
 
Software Developer Conference 2012 - Paper Presentation - Cloud File Systems
Abhijeet Kulkarni
 
Cloud computing
Suryavamsi51
 

Viewers also liked (9)

PPTX
Cloud Computing- components, working, pros and cons
Amritpal Singh Bedi
 
PPT
Cloud Computing & Soa
saurabh soni
 
PPTX
Cloud computing - Pros and Cons
Savvycom Savvycom
 
ODP
How cloud computing work
icloud9
 
PPT
Benefits of Cloud Computing
Richard Byrne
 
PPTX
Top 10 benefits of cloud computing - By Techvedic
Techvedic
 
PPT
Cloud Application Development Lifecycle
Suhas Kelkar
 
PDF
Advantages of Cloud Computing for Business
Grazitti Interactive
 
PPTX
Introduction of Cloud computing
Rkrishna Mishra
 
Cloud Computing- components, working, pros and cons
Amritpal Singh Bedi
 
Cloud Computing & Soa
saurabh soni
 
Cloud computing - Pros and Cons
Savvycom Savvycom
 
How cloud computing work
icloud9
 
Benefits of Cloud Computing
Richard Byrne
 
Top 10 benefits of cloud computing - By Techvedic
Techvedic
 
Cloud Application Development Lifecycle
Suhas Kelkar
 
Advantages of Cloud Computing for Business
Grazitti Interactive
 
Introduction of Cloud computing
Rkrishna Mishra
 
Ad

Similar to Collaboration in multicloud computing environments framework and security issues (20)

PDF
A Framework for Multicloud Environment Services
Eswar Publications
 
DOCX
Cloud computing
Misha Ali
 
PDF
ITU-T requirement for cloud and cloud deployment model
Hitesh Mohapatra
 
PPTX
What is public cloud Explained
jeetendra mandal
 
DOC
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
ALTANAI BISHT
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
hemanthbbc
 
PDF
Cloud Computing and It's Types in Mobile Network
International Journal of Science and Research (IJSR)
 
PDF
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Editor IJMTER
 
PPTX
Introducing cloud computing
Dr. Ramkumar Lakshminarayanan
 
PPTX
NSUT_Lecture1_cloud computing[1].pptx
UtkarshKumar608655
 
PDF
Cloud computing security through symmetric cipher model
ijcsit
 
PDF
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
PDF
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
PDF
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
PDF
CA NOTES ON EMERGING TECHNOLOGIES
Kanoon Ke Rakhwale India
 
PDF
An study of security issues & challenges in cloud computing
ijsrd.com
 
PDF
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
A Framework for Multicloud Environment Services
Eswar Publications
 
Cloud computing
Misha Ali
 
ITU-T requirement for cloud and cloud deployment model
Hitesh Mohapatra
 
What is public cloud Explained
jeetendra mandal
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
ALTANAI BISHT
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
hemanthbbc
 
Cloud Computing and It's Types in Mobile Network
International Journal of Science and Research (IJSR)
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Editor IJMTER
 
Introducing cloud computing
Dr. Ramkumar Lakshminarayanan
 
NSUT_Lecture1_cloud computing[1].pptx
UtkarshKumar608655
 
Cloud computing security through symmetric cipher model
ijcsit
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
CA NOTES ON EMERGING TECHNOLOGIES
Kanoon Ke Rakhwale India
 
An study of security issues & challenges in cloud computing
ijsrd.com
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
IEEEFINALYEARPROJECTS
 
DOCX
Reversible data hiding with optimal value transfer
IEEEFINALYEARPROJECTS
 
DOCX
Query adaptive image search with hash codes
IEEEFINALYEARPROJECTS
 
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
IEEEFINALYEARPROJECTS
 
DOCX
Local directional number pattern for face analysis face and expression recogn...
IEEEFINALYEARPROJECTS
 
DOCX
An access point based fec mechanism for video transmission over wireless la ns
IEEEFINALYEARPROJECTS
 
DOCX
Towards differential query services in cost efficient clouds
IEEEFINALYEARPROJECTS
 
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
IEEEFINALYEARPROJECTS
 
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
IEEEFINALYEARPROJECTS
 
DOCX
Non cooperative location privacy
IEEEFINALYEARPROJECTS
 
DOCX
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
IEEEFINALYEARPROJECTS
 
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
IEEEFINALYEARPROJECTS
 
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
IEEEFINALYEARPROJECTS
 
DOCX
Two tales of privacy in online social networks
IEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
Reversible watermarking based on invariant image classification and dynamic h...
IEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
IEEEFINALYEARPROJECTS
 
Query adaptive image search with hash codes
IEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
IEEEFINALYEARPROJECTS
 
Local directional number pattern for face analysis face and expression recogn...
IEEEFINALYEARPROJECTS
 
An access point based fec mechanism for video transmission over wireless la ns
IEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
IEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
IEEEFINALYEARPROJECTS
 
Non cooperative location privacy
IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
Geo community-based broadcasting for data dissemination in mobile social netw...
IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
IEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
IEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
IEEEFINALYEARPROJECTS
 

Recently uploaded (20)

PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 

Collaboration in multicloud computing environments framework and security issues

  • 1. Collaboration in Multicloud Computing Environments Framework and Security Issues ABSTRACT A proposed proxy-based multicloud computing framework allows dynamic, on the fly collaborations and resource sharing among cloud-based services, addressing trust, policy, and privacy issues without preestablished collaboration agreements or standardized interfaces. The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers, infrastructure/resource providers, and service users (or clients). They include applications delivered as services, as well as the hardware and software systems providing these services. Cloud computing characteristics include a ubiquitous (network-based) access channel; resource pooling; multitenancy; automatic and elastic provisioning and release of computing capabilities; and metering of resource usage (typically on a pay-per-use basis). Virtualization of resources such as processors, network, memory, and storage ensures scalability and high availability of computing capabilities. Clouds can dynamically provision these virtual resources to hosted applications or to clients that use them to develop their own applications or to store data. Rapid provisioning and dynamic reconfiguration of resources help cope with variable demand and ensure optimum resource utilization. EXISTING SYSTEM: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected]
  • 2. Many existing cloud data services provide similar access control models, in which individual and organizational privacy, a key requirement for digital identity management, is unprotected. Also, with cloud computing initiatives, the scope of insider threats, a major source of data theft and privacy breaches, is no longer limited to the organizational perimeter. Multicloud environments exacerbate these issues because proxies can access data (which the environment might dynamically move or partition across different clouds) on behalf of clients. Revealing sensitive information in identity attributes to proxies that grant them authorization to access the data on behalf of clients is not an attractive solution. Thus, assuring the private and consistent management of information relevant to ABAC becomes more complex in multicloud systems. PROPOSED SYSTEM: Our proposed framework for generic cloud collaboration allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. This framework supports universal and dynamic collaboration in a multicloud system. It lets clients simultaneously use services from multiple clouds without prior business agreements among cloud providers, and without adopting common standards and specifications. As more organizations adopt cloud computing, cloud service providers (CSPs) are developing new technologies to enhance the cloud’s capabilities. Cloud mashups are a recent trend; mashups combine services from multiple clouds into a single service or application, possibly with on-premises (client- side) data and services. This service composition lets CSPs offer new functionalities to clients at lower development costs. MODULE DESCRIPTION: Number of Modules After careful analysis the system has been identified to have the following modules: 1. Collaboration Framework For Multicloud System Module. 2. Client/Users Module. 3. Cloud Service Provider Module. 4. Proxy Service Provider Module.
  • 3. 1. Collaboration Framework For Multicloud System Module: Cloud collaboration allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. This framework supports universal and dynamic collaboration in a multicloud system. It lets clients simultaneously use services from multiple clouds without prior business agreements among cloud providers, and without adopting common standards and specifications. 2. Client/Users Module: Client sends a request to cloud C1, which dynamically discovers the need to use services from clouds C2 and C3. C1 employs proxies to manage these interactions. A client that wishes to simultaneously use services from multiple clouds must individually interact with each cloud service, gather intermediate results, process the collective data, and generate final results. Proxies can facilitate collaboration without requiring prior agreements between the cloud service providers. First, the requesting entity chooses proxies to act on its behalf and to interact with cloud applications. A client or a CSP might employ multiple proxies to interact with multiple CSPs. It can select proxies based on, for example, latencies between proxies and clouds or workload conditions at various proxies. 3.Cloud Service Provider Module: Cloud service providers (CSPs) deploy proxies as an autonomous cloud system and offer it as a service to clients. A client employs two proxies to interact with CSPs C1 and C2. Alternatively, a client initiates a service request with C1, which then discovers the need for a service from C2. PSP: proxy service provider. Clients deploy proxies within the infrastructure of their organization. A client employs two proxies to interact with CSPs C1 and C2. A client initiates a service request with C1, which then discovers the need for a service from C2. 4. Proxy Service Provider Module: It involves deploying proxies as an autonomous cloud that offers collaborative services to clients and CSPs. A group of CSPs that are willing to collaborate can manage this proxy-as-a-service cloud, or a third-party entity, a proxy service provider (PSP), can provide management. Clients directly subscribe to the proxy cloud service and employ them for intercloud collaboration. To protect data at rest and data in transit, proxies must provide a trusted computing platform that prevents malicious software from taking control and compromising sensitive client and cloud application data.
  • 4. SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA