Skip to main content

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 420))

  • 627 Accesses

Abstract

The creation of a Cloud computing solution for individuals or businesses has proven to be essential in meeting the ever-increasing demand of the public in search of low-cost online storage services. A private cloud server is a solution to many concerns regarding the security and costs of the service. Considering that a microprocessor like Raspberry Pi  can perform complex operations, and at the cloud maintenance level can handle performance with low latency, the output of it would certainly allow an efficient storage solution. This report describes the analysis and design of Cloud in Wallet—a Cloud computing system that offers reliable, secure, and cheap storage service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.gartner.com.

References

  1. Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493–9532 (2020). https://doi.org/10.1007/s11227-020-03213-1

  2. Review on OwnCloud features for private cloud data center. TEM J. 10(2), 954–960 (2021). https://www.ceeol.com/search/article-detail?id=955455. Accessed 13 Sep 2021

  3. Baun, C.: Mobile clusters of single board computers: an option for providing resources to student projects and researchers. SpringerPlus 5(1), 360 (2016). https://doi.org/10.1186/s40064-016-1981-3

    Article  Google Scholar 

  4. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P.: The cost of a cloud: research problems in data center networks. SIGCOMM Comput. Commun. Rev. 39(1), 68–73 (2009). https://doi.org/10.1145/1496091.1496103

    Article  Google Scholar 

  5. Blem, E., Menon, J., Sankaralingam, K.: Power struggles: revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures. In: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), Shenzhen, pp. 1–12 (2013).https://doi.org/10.1109/HPCA.2013.6522302

  6. Akshay, S., Vishnukumar, B., Mohan, V., Anand, M.S.: Energy and performance analysis of Raspberry Pi with modern computing devices. IJET 7(4.36), 777 (2018). https://doi.org/10.14419/ijet.v7i4.36.24242

  7. Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: 2010 International Conference on Intelligent Computing and Cognitive Informatics, Kuala Lumpur, Malaysia, pp. 380–383 (2010). https://doi.org/10.1109/ICICCI.2010.119

  8. Padala, H.V.R., Vurukonda, N., Mandhala, V.N., Valluru, D., Tangirala, N.S.R., Lakshmi Manisha, J.: Private cloud for data storing and maintain integrity using Raspberry Pi. In: Machine Intelligence and Soft Computing, Singapore, pp. 335–350 (2021). https://doi.org/10.1007/978-981-15-9516-5_28

  9. Barhate, S.M., Dhore, M.P.: Hybrid Cloud: a cost optimised solution to cloud interoperability. In: 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), pp. 1–5 (2020). https://doi.org/10.1109/ICITIIT49094.2020.9071563

  10. Antohi, T.: Model for cloud migration cost. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 20–28 (2019). https://doi.org/10.1109/CSCloud/EdgeCom.2019.00014

  11. Teing, Y.-Y., et al.: Private cloud storage forensics: seafile as a case study. In: Dehghantanha, A., Choo, K.-K.R. (eds.) Handbook of Big Data and IoT Security, pp. 73–127. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-030-10543-3_5

  12. Alotaibi, S., Alomair, H., Elhussein, M.: Comparing performance of commercial cloud storage systems: the case of dropbox and one drive. In: 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, pp. 1–5 (2019). https://doi.org/10.1109/ICCISci.2019.8716385

  13. Quick, D., Choo, K.-K.R.: Dropbox analysis: data remnants on user machines. Digit. Investig. 10(1), 3–18 (2013). https://doi.org/10.1016/j.diin.2013.02.003

    Article  Google Scholar 

  14. ‘iCloud’: Apple (Polska). https://www.apple.com/pl/icloud/. Accessed 13 Sep 2021

  15. Garg, S.K., Versteeg, S., Buyya, R.: Smicloud: a framework for comparing and ranking cloud services. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp. 210–218 (2011)

    Google Scholar 

  16. Alkhelaiwi, A., Grigoras, D.: Challenges of crowd sensing for cost-effective data management in the cloud. In Cloud Computing and Big Data: Technologies, Applications and Security, pp. 73–88. Cham (2019). https://doi.org/10.1007/978-3-319-97719-5_6

  17. ‘AWS vs. Azure vs. Google Cloud|Top Cloud Providers 2021’, Datamation (2021). https://www.datamation.com/cloud/aws-vs-azure-vs-google-cloud/. Accessed 16 Aug 2021

  18. Daryabar, F., Dehghantanha, A., Choo, K.-K.R.: Cloud storage forensics: MEGA as a case study. Aust. J. Forensic Sci. 49(3), 344–357 (2017). https://doi.org/10.1080/00450618.2016.1153714

    Article  Google Scholar 

  19. Download - MEGA. https://mega.nz/download. Accessed 13 Sep 2021

  20. Cloud Storage Forensics. Elsevier (2014). https://doi.org/10.1016/C2013-0-09718-6

  21. Graves, D.C., Wendel, A.A., Troescher, A.W., Livingston, A.J.: Analysis of cloud storage providers for enterprise readiness based on usage patterns and local resources. In: SoutheastCon 2015, Fort Lauderdale, FL, USA, pp. 1–6 (2015). https://doi.org/10.1109/SECON.2015.7133040

  22. Martini, B., Choo, K.-K.R.: Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10(4), 287–299 (2013). https://doi.org/10.1016/j.diin.2013.08.005

    Article  Google Scholar 

  23. Introducing: ownCloud X - ownCloud. https://owncloud.com/news/introducing-owncloud-x/. Accessed 13 Sep 2021

  24. Red Hat Ceph Storage. https://www.redhat.com/en/technologies/storage/ceph. Accessed 13 Sep 2021

  25. Gluster. https://www.gluster.org/. Accessed 26 Sep 2021

  26. Leite, R., Solis, P.: Performance analysis of data storage in a hyperconverged infrastructure using docker and GlusterFS. In 2019 XLV Latin American Computing Conference (CLEI), pp. 1–10 (2019). https://doi.org/10.1109/CLEI47609.2019.235108

  27. Mondal, S., Das, G., Wong, E.: Efficient cost-optimization frameworks for hybrid cloudlet placement over fiber-wireless networks. J. Opt. Commun. Netw. 11(8), 437 (2019). https://doi.org/10.1364/JOCN.11.000437

    Article  Google Scholar 

  28. Martin, M.: CISC vs RISC: difference between architectures, instruction set. (2021). https://www.guru99.com/risc-vs-cisc-differences.html. Accessed 23 Sep 2021

  29. Xiang, T., et al.: RISC-NN: Use RISC, NOT CISC as neural network hardware infrastructure. (2021). https://arxiv.org/abs/2103.12393v1. Accessed 23 Sep 2021

  30. Princy, S.E., Nigel, K.G.J.: Implementation of cloud server for real time data storage using Raspberry Pi. In 2015 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1–4 (2015). https://doi.org/10.1109/GET.2015.7453790

  31. FrontPage - Raspbian. https://www.raspbian.org/. Accessed 13 Sep 2021

  32. Poniszewska-Maranda, A., Matusiak, R., Kryvinska, N., Yasar, A.-U.-H.: A real-time service system in the cloud. J. Ambient Intell. Human. Comput. 11(3), 961–977 (2020). https://doi.org/10.1007/s12652-019-01203-7

    Article  Google Scholar 

  33. Hasimi, L.: Cost-effective solutions in cloud computing security. In: Kryvinska, N., Poniszewska-Marańda, A. (eds.) Developments in Information & Knowledge Management for Business Applications, vol. 2, pp. 177–202. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-76632-0_5

  34. Kryvinska, N., Bauer, C., Strauss, C., Michal, G.: A SWOT analysis of the soft-computing paradigms SOA/SOC/cloud combination (C-SOA) in software development. In: MCIS 2014 Proceedings (2014). https://aisel.aisnet.org/mcis2014/27

  35. Greguš, M., Karovic, V.: Practical implementation of private cloud based on open source owncloud for small teams—case study. In: 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) (2015). https://doi.org/10.1109/3PGCIC.2015.149

  36. Chien, T.: Building a Datacenter with ARM Devices. In: Poster Presented at 2017 Student Project Showcase at SUNY Polytechnic Institute (2017). https://dspace.sunyconnect.suny.edu/handle/1951/69311. Accessed 13 Sep 2021

  37. Kryvinska, N., Poniszewska-Marańda, A. (eds.) Developments in Information & Knowledge Management for Business Applications: Volume 2, vol. 376. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-76632-0

  38. Lee, I.: An optimization approach to capacity evaluation and investment decision of hybrid cloud: a corporate customer’s perspective. J. Cloud. Comput. 8(1), 15 (2019). https://doi.org/10.1186/s13677-019-0140-0

    Article  Google Scholar 

  39. Hassan, Q.F., Khan, A.R., Madani, S.A.: Internet of Things: Challenges, Advances, and Applications. CRC Press (2017)

    Google Scholar 

  40. Pi, R.: Teach, Learn, and Make with Raspberry Pi. Raspberry Pi. https://www.raspberrypi.org/. Accessed 26 Sep 2021

  41. Farooque, Md., Patidar, K., Kushwah, R., Saxena, G.: An efficient data security mechanism with data sharing and authentication. TIS 5(19), 26–31 (2020). https://doi.org/10.19101/TIS.2020.517008

  42. An, S., et al.: CloudSafe: a tool for an automated security analysis for cloud computing. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 602–609 (2019). https://doi.org/10.1109/TrustCom/BigDataSE.2019.00086

  43. Agrawal, T., Singh, S.K.: Analysis of Security Algorithms in Cloud Computing, pp. 106–108. (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lumbardha Hasimi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hasimi, L. (2022). Cloud in the Wallet. In: Kryvinska, N., Greguš, M. (eds) Developments in Information & Knowledge Management for Business Applications. Studies in Systems, Decision and Control, vol 420. Springer, Cham. https://doi.org/10.1007/978-3-030-95813-8_4

Download citation

Publish with us

Policies and ethics