Abstract
The creation of a Cloud computing solution for individuals or businesses has proven to be essential in meeting the ever-increasing demand of the public in search of low-cost online storage services. A private cloud server is a solution to many concerns regarding the security and costs of the service. Considering that a microprocessor like Raspberry Pi can perform complex operations, and at the cloud maintenance level can handle performance with low latency, the output of it would certainly allow an efficient storage solution. This report describes the analysis and design of Cloud in Wallet—a Cloud computing system that offers reliable, secure, and cheap storage service.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493–9532 (2020). https://doi.org/10.1007/s11227-020-03213-1
Review on OwnCloud features for private cloud data center. TEM J. 10(2), 954–960 (2021). https://www.ceeol.com/search/article-detail?id=955455. Accessed 13 Sep 2021
Baun, C.: Mobile clusters of single board computers: an option for providing resources to student projects and researchers. SpringerPlus 5(1), 360 (2016). https://doi.org/10.1186/s40064-016-1981-3
Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P.: The cost of a cloud: research problems in data center networks. SIGCOMM Comput. Commun. Rev. 39(1), 68–73 (2009). https://doi.org/10.1145/1496091.1496103
Blem, E., Menon, J., Sankaralingam, K.: Power struggles: revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures. In: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), Shenzhen, pp. 1–12 (2013).https://doi.org/10.1109/HPCA.2013.6522302
Akshay, S., Vishnukumar, B., Mohan, V., Anand, M.S.: Energy and performance analysis of Raspberry Pi with modern computing devices. IJET 7(4.36), 777 (2018). https://doi.org/10.14419/ijet.v7i4.36.24242
Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: 2010 International Conference on Intelligent Computing and Cognitive Informatics, Kuala Lumpur, Malaysia, pp. 380–383 (2010). https://doi.org/10.1109/ICICCI.2010.119
Padala, H.V.R., Vurukonda, N., Mandhala, V.N., Valluru, D., Tangirala, N.S.R., Lakshmi Manisha, J.: Private cloud for data storing and maintain integrity using Raspberry Pi. In: Machine Intelligence and Soft Computing, Singapore, pp. 335–350 (2021). https://doi.org/10.1007/978-981-15-9516-5_28
Barhate, S.M., Dhore, M.P.: Hybrid Cloud: a cost optimised solution to cloud interoperability. In: 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), pp. 1–5 (2020). https://doi.org/10.1109/ICITIIT49094.2020.9071563
Antohi, T.: Model for cloud migration cost. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 20–28 (2019). https://doi.org/10.1109/CSCloud/EdgeCom.2019.00014
Teing, Y.-Y., et al.: Private cloud storage forensics: seafile as a case study. In: Dehghantanha, A., Choo, K.-K.R. (eds.) Handbook of Big Data and IoT Security, pp. 73–127. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-030-10543-3_5
Alotaibi, S., Alomair, H., Elhussein, M.: Comparing performance of commercial cloud storage systems: the case of dropbox and one drive. In: 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, pp. 1–5 (2019). https://doi.org/10.1109/ICCISci.2019.8716385
Quick, D., Choo, K.-K.R.: Dropbox analysis: data remnants on user machines. Digit. Investig. 10(1), 3–18 (2013). https://doi.org/10.1016/j.diin.2013.02.003
‘iCloud’: Apple (Polska). https://www.apple.com/pl/icloud/. Accessed 13 Sep 2021
Garg, S.K., Versteeg, S., Buyya, R.: Smicloud: a framework for comparing and ranking cloud services. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp. 210–218 (2011)
Alkhelaiwi, A., Grigoras, D.: Challenges of crowd sensing for cost-effective data management in the cloud. In Cloud Computing and Big Data: Technologies, Applications and Security, pp. 73–88. Cham (2019). https://doi.org/10.1007/978-3-319-97719-5_6
‘AWS vs. Azure vs. Google Cloud|Top Cloud Providers 2021’, Datamation (2021). https://www.datamation.com/cloud/aws-vs-azure-vs-google-cloud/. Accessed 16 Aug 2021
Daryabar, F., Dehghantanha, A., Choo, K.-K.R.: Cloud storage forensics: MEGA as a case study. Aust. J. Forensic Sci. 49(3), 344–357 (2017). https://doi.org/10.1080/00450618.2016.1153714
Download - MEGA. https://mega.nz/download. Accessed 13 Sep 2021
Cloud Storage Forensics. Elsevier (2014). https://doi.org/10.1016/C2013-0-09718-6
Graves, D.C., Wendel, A.A., Troescher, A.W., Livingston, A.J.: Analysis of cloud storage providers for enterprise readiness based on usage patterns and local resources. In: SoutheastCon 2015, Fort Lauderdale, FL, USA, pp. 1–6 (2015). https://doi.org/10.1109/SECON.2015.7133040
Martini, B., Choo, K.-K.R.: Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10(4), 287–299 (2013). https://doi.org/10.1016/j.diin.2013.08.005
Introducing: ownCloud X - ownCloud. https://owncloud.com/news/introducing-owncloud-x/. Accessed 13 Sep 2021
Red Hat Ceph Storage. https://www.redhat.com/en/technologies/storage/ceph. Accessed 13 Sep 2021
Gluster. https://www.gluster.org/. Accessed 26 Sep 2021
Leite, R., Solis, P.: Performance analysis of data storage in a hyperconverged infrastructure using docker and GlusterFS. In 2019 XLV Latin American Computing Conference (CLEI), pp. 1–10 (2019). https://doi.org/10.1109/CLEI47609.2019.235108
Mondal, S., Das, G., Wong, E.: Efficient cost-optimization frameworks for hybrid cloudlet placement over fiber-wireless networks. J. Opt. Commun. Netw. 11(8), 437 (2019). https://doi.org/10.1364/JOCN.11.000437
Martin, M.: CISC vs RISC: difference between architectures, instruction set. (2021). https://www.guru99.com/risc-vs-cisc-differences.html. Accessed 23 Sep 2021
Xiang, T., et al.: RISC-NN: Use RISC, NOT CISC as neural network hardware infrastructure. (2021). https://arxiv.org/abs/2103.12393v1. Accessed 23 Sep 2021
Princy, S.E., Nigel, K.G.J.: Implementation of cloud server for real time data storage using Raspberry Pi. In 2015 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1–4 (2015). https://doi.org/10.1109/GET.2015.7453790
FrontPage - Raspbian. https://www.raspbian.org/. Accessed 13 Sep 2021
Poniszewska-Maranda, A., Matusiak, R., Kryvinska, N., Yasar, A.-U.-H.: A real-time service system in the cloud. J. Ambient Intell. Human. Comput. 11(3), 961–977 (2020). https://doi.org/10.1007/s12652-019-01203-7
Hasimi, L.: Cost-effective solutions in cloud computing security. In: Kryvinska, N., Poniszewska-Marańda, A. (eds.) Developments in Information & Knowledge Management for Business Applications, vol. 2, pp. 177–202. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-76632-0_5
Kryvinska, N., Bauer, C., Strauss, C., Michal, G.: A SWOT analysis of the soft-computing paradigms SOA/SOC/cloud combination (C-SOA) in software development. In: MCIS 2014 Proceedings (2014). https://aisel.aisnet.org/mcis2014/27
Greguš, M., Karovic, V.: Practical implementation of private cloud based on open source owncloud for small teams—case study. In: 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) (2015). https://doi.org/10.1109/3PGCIC.2015.149
Chien, T.: Building a Datacenter with ARM Devices. In: Poster Presented at 2017 Student Project Showcase at SUNY Polytechnic Institute (2017). https://dspace.sunyconnect.suny.edu/handle/1951/69311. Accessed 13 Sep 2021
Kryvinska, N., Poniszewska-Marańda, A. (eds.) Developments in Information & Knowledge Management for Business Applications: Volume 2, vol. 376. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-76632-0
Lee, I.: An optimization approach to capacity evaluation and investment decision of hybrid cloud: a corporate customer’s perspective. J. Cloud. Comput. 8(1), 15 (2019). https://doi.org/10.1186/s13677-019-0140-0
Hassan, Q.F., Khan, A.R., Madani, S.A.: Internet of Things: Challenges, Advances, and Applications. CRC Press (2017)
Pi, R.: Teach, Learn, and Make with Raspberry Pi. Raspberry Pi. https://www.raspberrypi.org/. Accessed 26 Sep 2021
Farooque, Md., Patidar, K., Kushwah, R., Saxena, G.: An efficient data security mechanism with data sharing and authentication. TIS 5(19), 26–31 (2020). https://doi.org/10.19101/TIS.2020.517008
An, S., et al.: CloudSafe: a tool for an automated security analysis for cloud computing. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 602–609 (2019). https://doi.org/10.1109/TrustCom/BigDataSE.2019.00086
Agrawal, T., Singh, S.K.: Analysis of Security Algorithms in Cloud Computing, pp. 106–108. (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hasimi, L. (2022). Cloud in the Wallet. In: Kryvinska, N., Greguš, M. (eds) Developments in Information & Knowledge Management for Business Applications. Studies in Systems, Decision and Control, vol 420. Springer, Cham. https://doi.org/10.1007/978-3-030-95813-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-95813-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95812-1
Online ISBN: 978-3-030-95813-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)