Theses and Dissertations
Permanent URI for this collectionhttp://ir.daiict.ac.in/handle/123456789/1
Browse
11 results
Search Results
Item Open Access Empirical Study Of Smartphones As An Edge Device(Dhirubhai Ambani Institute of Information and Communication Technology, 2023) Shah, Vyom Hiteshkumar; Sasidhar, KalyanIncreased automation and intelligence in computer systems have revealed Cloudbasedcomputing constraints such as unpredictable latency in safety-critical andperformance-sensitive applications. Features of smartphones attract researchersmore towards using smartphones as edge computing devices because of the presenceof the sensors inbuilt and the computing powers of CPU cores. So a smartphoneis a combination of IoT and Edge computing devices.To overcome the usage of high-end computing devices at the edge layer, thisarticle proposes the idea of using a smartphone as an edge device for processingdata. Sensors or IoT devices generally send data to the edge device ratherthan directly sending it to the cloud for processing. So mainly, this article emphasizessolving the research question of whether smartphones can be used as edgedevices. So in this, a distributed smartphone system following master-slave architectureis proposed, which helps to distribute the computation power amongslaves. Word count, average of temperature data and indoor localization. Comparedto desktop PCs computation, master-slave utilizes CPU 75% more than juston single-device computation and on an average 50% faster than on computingon a single device. This motivates us to design an architecture that can utilizethe data from the cloud and perform the computation using the CPU cores of thesmartphone.Item Open Access Privacy and accountability in cloud computation and storage(Dhirubhai Ambani Institute of Information and Communication Technology, 2021) Gajera, Hardik; Das, Manik LalCloud computing is a cost-effective computing paradigm for convenient, ondemand data access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services. While providing payper-use on-demand service to the service consumer, the cloud service provider should minimize computation error on data stored in a cloud storage server. If there is any error, one can recompute or restore the data, but a user cannot detect an error. There have been some approaches like verifiable computation, secure computation, and multi-party computation, which may find a useful application in cloud storage/computation services; however, most of these approaches assume that the computation’s logic on data is public. The problem becomes challenging when the logic of computation is hidden to clients. In this thesis, the notion of Private Polynomial Evaluation (PPE) is defined along with a new security model “indistinguishability against chosen function attack" (IND-CFA), where an adversary tries to guess which polynomial is used among two polynomials of his/her choice. The existing schemes on verifiable computation with hidden polynomial are not IND-CFA secure. The proposed scheme, Private IND-CFA Polynomial Evaluation (PIPE), is the first IND-CFA secure PPE. It is IND-CFA secure under the decisional Diffie-Hellman (DDH) assumption in the random oracle model. In a public cloud system, the cloud requires to verify a user’s identity before providing any service. Depending on the nature of applications, the cloud server’s computation may require to preserve the user’s identity from the cloud. For example, in healthcare applications, it is advisable to preserve the privacy of users and the privacy of the data. Another proposed scheme Verifiable Obvious IND-CFA Polynomial Evaluation scheme (VIP-POPE), in which the server computes over encrypted data, and provides proof of computation, preserve the privacy of the user’s data. The proposed scheme VIP-POPE preserves the user’s data privacy and is shown secure against IND-CFA adversary and Client’s Privacy-Indistiguishability (CPI) security under standard security models. The user’s identity verification with the cloud is not considered in the VIP-POPE scheme. In the proposed privacy-preserving verifiable computation (PriVC) scheme, the server can compute on the user’s encrypted data and provide the proof of computation that can be verified by the user. The PriVC preserves the user’s privacy and ensures the undeniability of the service offered and the service consumed. The PriVC scheme is secure under IND-CFA, and the proof of computation is non-repudiable and unforgeable in the standard model. Verification of the integrity of the data stored on the public cloud is another important aspect of cloud services. Users generally do not keep a local copy of the data after uploading it over the cloud, and it is hard to remember whole data. In such a scenario, modification or deletion of a small part of the data may go unnoticed. Even though public clouds put lots of effort into maintaining and securing their storage server to ensure an efficient and error-free storage service, one can not rule out the possibility of corruption in data due to human or machine error. Many schemes, like proof of storage (POS), proof of data possession (PDP), proof of retrievability (POR), have been introduced in the literature to address the storage issue. Although there are a few proof of storage with data deduplication (POSD) schemes exist, these schemes are inefficient for real-world applications. In data deduplication, the cloud keeps only one copy of multiple duplicate copies of data that ensures an efficient storage system, and therefore, one cannot ignore it in the cloud storage system. The existing schemes consider only filelevel deduplication, which does not improve storage efficiency much compared to block-level data deduplication. Using the idea of VIP-POPE scheme, a new efficient scheme, Data Deduplication with Proof of Storage DPoS, is proposed for proof of storage scheme with data deduplication at the block-level. Imagine a file as a polynomial by breaking the file in fixed-sized blocks and considering each block as a polynomial coefficient. With file as a polynomial, one can use the idea of VIP POPE scheme for proof of storage verification. The unforgeability security of the proposed scheme is proven under the discrete logarithm assumption. The DPoS scheme is efficient in comparison to other related schemes.Item Open Access Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications(Dhirubhai Ambani Institute of Information and Communication Technology, 2018) Patwa, Dolly R.; Das, Manik LalIn recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It serves patients even in the remote locations. Remote patient monitoring enables serving patients outside of clinical conventional setting at hospitals. It may increase easy caring and monitoring of health frequently and decrease healthcare delivery costs. Healthcare applications for chronic diseases have significantly improved user's quality of life. It allows user to monitor his health frequently and decreases cost since he get personalized care as conventional doctor and hospital settings. mHealth is abbreviation of mobile health. It involves provision of healthcare services via smart phones and attached wearable wireless devices. Several healthcare systems proposed and it discusses privacy of user and security of user's data. Healthcare system involves healthcare companies, user and cloud mainly as participating entities in the system. Privacy should be maintained in a sense that nobody other than the user should be able to know his current health condition and get appropriate personalized care. Since companies lack of storage and computational resources, security of user's medical data is at risk. Several healthcare application systems have been proposed over the past decade yet user's privacy and security is a potential threat to such a system. Therefore, analysis of such systems is required. In this thesis work, we analyzed a healthcare application system and found outsider attack and proposed mitigation to prevent this attack. Our proposed mitigation borrows the idea of binding-blinding technique. We made security analysis of our proposed scheme as well as its performance analysis.Item Open Access SQL-GQL inter-query translation for Google App engine datastore(Dhirubhai Ambani Institute of Information and Communication Technology, 2012) Kotecha, Shyam; Bhise, MinalOn demand services, usage based pricing, and scalability features of cloud computing has attracted many customers to move their applications into cloud. But different cloud service providers are using different standards & frameworks to host applications & data. Customers have to follow these standards and frameworks. When customer wants to migrate application and/or data to another cloud service provider, application code and database structure must be modified according to the standard of new cloud service provider. This modification is very costly and as a consequence, changing cloud service provider becomes difficult. This situation is called vendor lock-in in cloud. Focusing on database, complete database migration requires migration of data, database schema, and query. This thesis work concentrates on migration of query. Automation in migration process is achieved by translation algorithms. This thesis work introduces inter-query translation algorithms. These algorithms translate SQL (Structured Query Language) query and GQL (Google Query Language) query into each other. The implementation of these algorithms is demonstrated for MySQL Sakila databaseItem Open Access Approach to build multi-tenant SaaS application with monitoring and SLA(Dhirubhai Ambani Institute of Information and Communication Technology, 2012) Aghera, Piyush; Chaudhary, SanjaySaaS (Software as a Service) is a modern approach to deliver large scalable enterprise software as a service on Internet. Cloud computing platform provides the scalability, availability and utility computing for services on internet. There are many technical challenges involved in SaaS development. One of them is multi-tenancy, which allows single instance of software to serve multiple organizations by accommodating their unique requirements through conguration at the same time. SaaS architecture requires both conguration and some level of customization to achieve higher maturity model. In this thesis, we propose a metadata based SaaS application architecture which is independent of underlying cloud infrastructure. We aim to propose independent SaaS platform concepts, to avoid vendor locking as observed in case of many commercial service providers. SaaS application development should be independent of underlying infrastructure so that application can be migrated from one cloud to another cloud without changing the code. It is possible only if all the players follow the identical as well dened standard SaaS architecture. Our proposed architecture includes monitoring, tenant management, tenant administration, tenant conguration and large data management services. Existing architecture has used simple XML le to store and retrieve tenant specic conguration. File operations are the bottle neck while accessing data for large organization at the same time. In this approach, we have used Memcached concept and it is supported by almost all databases to boost the performance. In addition to this, we have considered application pooling on a web server to manage priority among tenants. Application pooling works as a static load balancer for incoming large request. To realize proposed architecture, we have developed and demonstrated seleced functionalities of University Management System and it is capable to support multi-tenancy.Item Metadata only Service level agreement parameter matching in cloud computing(Dhirubhai Ambani Institute of Information and Communication Technology, 2011) Chauhan, Tejas; Chaudhary, Sanjay; Bise, MinalCloud is a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or software services). It provides an on-demand, pay-asyo-ugo computing resources and had become an alternative to traditional IT infrastructure. As more and more consumers delegate their task to cloud providers, Service Level Agreement (SLA) between consumer and provider becomes an important aspect. Due to the dynamic nature of cloud the matching of service level agreement need to be dynamic and continuous monitoring of Quality of Service (QoS) is necessary to enforce SLAs. This complex nature of cloud warrants a sophisticated means of managing SLAs. SLA contains many parameters like cloud’s types of services, resources (physical memory, main memory, processor speed, ethernet speed etc.) and properties (availability, response time, server reboot time etc.). At present, actual Cloud SLAs are typically plain-text documents, and sometimes an informative document published online. Consumer needs to manually match application requirements with each and every cloud provider to identify compatible cloud provider. This work addresses the issue of matching SLA parameters to find best suitable cloud provider. Proposed algorithm identifies the compatible cloud provider by matching parameters of application requirements and cloud SLAs. It gives suggestion to a consumer in terms of number of matched parameters.Item Open Access Policy based resource allocation on infrastructure as a service cloud(Dhirubhai Ambani Institute of Information and Communication Technology, 2011) Vora, Dhairya; Chaudhary, Sanjay; Bise, MinalCloud computing refers to the provision of computational resources on demand. Resource allocation is an important aspect in cloud computing. Cloud user asks for resources in terms of a lease. Lease stores the information about required resources and the time at which these resources are required. Cloud provider accepts the lease if it can provide guarantee for assigning resources at asked time to the cloud user. Better scheduling algorithm can accept more number of leases and hence give better resource utilization. Cloud provides four types of leases: immediate, advance reservation, best effort and deadline sensitive. Immediate allocation policy accepts the lease if resources are available, else it rejects the lease. Advance reservation policy accepts the lease if resources are available at the asked time, else it rejects the lease. Best effort allocation policy accepts the lease as soon as the resources are available. Deadline sensitive leases have parameters like required resources, startTime, endTime and duration. Scheduler can accept such lease by providing required resources for the asked duration of time between given startTime and endTime. Haizea is a resource lease manager which handles the scheduling of the lease. Proposed algorithm extends the current scheduling algorithm of Haizea for deadline sensitive type of leases. Aim of the thesis is to improve resource utilization by extending the current scheduling algorithms of Haizea. Proposed scheduling algorithm accepts more number of leases by dividing a deadline sensitive lease into multiple slots and by back filling already.Item Open Access Migration of database from one cloud to other clouds(Dhirubhai Ambani Institute of Information and Communication Technology, 2011) Bhatt, Shreyansh; Chaudhary, SanjayOn demand services and scalability features of cloud computing has attracted many customers to move their applications into cloud. Cloud service providers are following di erent standards to host applications and data. Data must be stored according the schema of a particular cloud service provider. A need can arise to migrate cloud application and/or data to another cloud service provider. In that case, the relevant code, and structure of database must be modi ed based on newly identi ed cloud service provider. Which is a costly deal and as a consequence, chang ing cloud service provider becomes di cult. This issue is regarded as vendor lock-in in terms of cloud computing. Current study will help to identify issues of migrating database between two clouds and development of novel techniques, which would facilitate this migration. For this, RDF /RDFS (Resource Description Framework/Resource Description Framework Schema) is used as an intermediate model. Automation in migration process is achieved by transformation algorithms. Bigtable, Google App Engine datastore, is taken as a cloud datastore and algorithms are developed and implemented to convert RDF/RDFS data into data that can be stored in Bigtable and vice versa. Results are shown for the same. Subsequently, the same algorithm is generalized to store RDF/RDFS data into any cloud datastore.Item Open Access Resource allocation on infrastructure as a service cloud using policies(Dhirubhai Ambani Institute of Information and Communication Technology, 2010) Nathani, Amit; Divakaran, SrikrishnanConventionally, a cloud refers to an Infrastructure as a service cloud. Infrastructure as a service cloud providers manage a large set of computing resources. These resources can be provided to cloud users on demand in the form of virtual machines. Cloud consumers do not need to manage resources and be worried about the performance issues because they are handled by cloud providers. Resource allocation in the context of infrastructure as a service cloud means allocating virtual resources namely computing capacity, storage etc. to competing requests based on pre-defined resource allocation policies. In real world most of the Infrastructure as a service clouds rely on simple resource allocation policies like immediate and best effort. Immediate means the resources are allocated if they are available or the request is rejected and best effort means the requested resources are allocated if they are available or the request is placed in first come first serve queue. Sometimes it is not possible for a cloud provider to satisfy all the requests which come to them immediately because of lack of resources. In this case cloud providers can benefit from more complex resource allocation policies. Haizea is a resource lease manager that tries to address above issues. It uses resource leases as resource allocation abstraction and implements these leases as virtual machines. Currently, it supports four kinds of resource allocation policies: immediate, best-effort, advance reservation and deadline sensitive. The aim of thesis is to extend the current scheduling algorithm of Haizea to support deadline leases in an efficient manner. A dynamic planning based scheduling algorithm is proposed which will admit new leases and prepare the schedule whenever a new lease can be accommodated. The proposed algorithm is implemented in Haizea. Experiments are performed to demonstrate the effectiveness of it. The results show that it maximizes resource utilization and acceptance of leases compared to the existing algorithm of Haizea.Item Open Access Negotiation for resource allocation on infrastructure as a service cloud(Dhirubhai Ambani Institute of Information and Communication Technology, 2010) Akhani, Janki; Divakaran, SrikrishnanThe Cloud is a computing platform that provides dynamic resource pools, virtualization, and high availability. Cloud computing infrastructures can allow enterprises to achieve more efficient use of their IT hardware and software investments. Infrastructure As A Service (IAAS) cloud providers manage a large set of computing resources. These resources can be provided to cloud consumers on demand in the form of virtual machines. Cloud consumers do not need to manage resources and be worried about the performance issues because they are handled by cloud providers. Open Nebula is an open source cloud toolkit which can be used to setup an IAAS cloud. It has three components: Open Nebula Core, Virtual Machine Scheduler and Cloud Drivers. Haizea is an open-source resource lease manager, and can act as a virtual machine scheduler for Open Nebula or used on its own as a simulator to evaluate the performance of different scheduling strategies. Haizea supports four kinds of resource allocation policies: immediate, best-effort, advance reservation and deadline sensitive. To reserve resources in advance using Haizea, consumer submits parameters like amount of resources, start time and duration of a reservation as a request. If one or more parameters can not be satisfied, then Haizea will reject the request. This method is very rigid method because it does not allow negotiation of any parameter. Consumer can resubmit new requests by modifying previously submitted request parameters. Consumer will not be aware of the current resource allocation on provider side so, the chances of new requests getting rejected are more. Thus, it will increase communication overhead between cloud provider and consumer as well as it will decrease resource utilization on provider’s side. It will also degrade the performance of a provider in managing many incoming requests due to previously rejected ones. To overcome the above problems, negotiation can be provided. Negotiation process consists of three components which are negotiation protocol, negotiation objectives and agents’ decision making algorithm. The proposed algorithm to generate set of counter offers is a part of decision making model at provider side. It provides set of counter offers to consumer when his advance reservation request gets rejected. It provides set of counter offers considering parameters’ flexibilities to maximize the chances of their acceptance. The proposed algorithm for User selection policy is a part of decision making model at consumer side. Consumer can get best suitable offer from set of counter offers using the algorithm of user selection policy. Ranking algorithm is a partof algorithm for user selection policy. Using this ranking algorithm, consumers will get suitable offers sorted according to their needs. It will reduce consumers’ efforts to go through all the provided counter offers and choose best suitable one. These algorithms are implemented in Haizea. Experiments are performed to demonstrate the effectiveness of algorithms. The results show that the proposed algorithm to generate counter offers maximizes resource utilization and acceptance of requests compared to rigid and exact methods.