cloud computing

67
CHAPTER 1 INTRODUCTION Cloud Computing has been envisioned as the next generation architecture of IT Enterprise [3]. In contract to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and database to the large data centers. Cloud Computing [5] Makes use of several servers placed at various locations connected to one another by using high speed networks. The idea governing the cloud computing is utilization of several different servers in various locations to host applications and data instead of using single server in one location. Cloud computing[6] is the single largest trend in computing infrastructure today, although commonly misunderstood or incorrectly referred to as Grid Computing, Utility Computing or Autonomic Computing. Although a Cloud solution may make use of these types of backbone, Cloud Computing is a much more generalized term in which little or no centralized infrastructure exists. Sets of 1

Upload: sahaya-rajan

Post on 26-Nov-2014

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cloud Computing

CHAPTER 1

INTRODUCTION

Cloud Computing has been envisioned as the next generation

architecture of IT Enterprise [3]. In contract to traditional solutions,

where the IT services are under proper physical, logical and personnel

controls, Cloud Computing moves the application software and database

to the large data centers. Cloud Computing [5] Makes use of several

servers placed at various locations connected to one another by using

high speed networks. The idea governing the cloud computing is

utilization of several different servers in various locations to host

applications and data instead of using single server in one location. Cloud

computing[6] is the single largest trend in computing infrastructure

today, although commonly misunderstood or incorrectly referred to as

Grid Computing, Utility Computing or Autonomic Computing.

Although a Cloud solution may make use of these types of

backbone, Cloud Computing is a much more generalized term in which

little or no centralized infrastructure exists. Sets of loosely coupled data

centers work together achieving high utilization levels to perform.

Common task, presenting GUI interfaces to users through virtualization

or thin clients via the ‘Cloud’. Indeed Cloud Computing can be

considered to be the next natural step from Grid and utility computing.

Cloud computing is unlike grid computing, utility computing, or

autonomic computing. In fact, it is a very independent platform in terms

of computing. The best example of cloud computing is Google Apps

where any application can be accessed using a browser and it can be

deployed on thousands of computer through the Internet

1

Page 2: Cloud Computing

Cloud Computing Architecture

When talking about a cloud computing [9] system, it's helpful to

divide it into two sections: the front end and the back end. They connect

to each other through a network, usually the Internet. The front end is the

side the computer user, or client, sees. The back end is the "cloud" section

of the system. The front end includes the client's computer (or computer

network) and the application required to access the cloud computing

system. Not all cloud computing systems have the same user interface.

Services like Web-based e-mail programs leverage existing Web

browsers like Internet Explorer or Firefox. Other systems have unique

applications that provide network access to clients. A cloud computing

system must make a copy of all its clients' information and store it on

other devices. The copies enable the central server to access backup

machines to retrieve data that otherwise would be unreachable. Making

copies of data as a backup is called redundancy. There are three types of

clouds are available public cloud, private cloud, hybrid cloud [7].

Public Cloud:

Open market for on demand computing and IT resources EX:

Amazon, Google, IBM...Huge adoption by SMEs and currently tested by

Enterprise

Private Cloud

The cloud infrastructure is operated solely for a single

organization. It May be managed by the organization or a third party, and

may exist on-premises or off premises .For Enterprises and Corporate

with large scale IT for their core and strategic applications.

2

Page 3: Cloud Computing

Cloud Hybrid

The cloud infrastructure is a composition of two clouds (private, or

public) that remain unique entities but are bound together by standardized

or proprietary technology that enables data and application portability

(e.g., cloud bursting for load-balancing between clouds).

Hybrid Cloud = Private Cloud with connections to Public Cloud

1.1 Project Overview

In this project we are using private cloud [10] to implement the

world-wide baking. Here the administrator can able to create the new

users, and create the branches in various countries. In each country one

main branch is created and sub branches

Administrator has the rights to deposit the user amount where the

customer can able to deposit in any countries branch to their account by

using their account number. Then the admin can able to see country-wise

Report, branch-wise report, overall transaction.

For user creation the user must have passport, national id and a

reference account holder to create account in our bank services. User

creation will be handled by the administrator.

When creating branches in country. It have double layer

authentication. The second level admin creating the branch and it will go

for first level admin’s permission. First level admin is able to permit the

branch to create. Then only the branch will be created

Users can able to transfer the money from their account to

anybody’s account for that they must login with their userid and

password. And they can also able to change their personal information

and passwords and they can also see their transaction details.

3

Page 4: Cloud Computing

Corporate banking is also available. Companies also transfer and

maintain their accounts.

1.2 Organization Profile

Top Bean Technologies is a Custom software development firm.

Top Bean has a strong focus on Research and Development and works

with several leading edge technologies to offer superior products to its

customers. The company’s vision is to be a global partner of first choice

for our customers with leadership in select areas.

We are determined to grow as a focused & innovative player. The

company offers full cycle custom software development, product idea,

offshore development centre to outsourcing support and enhancements

and also they provide space for web site at low cost, web designing, web

hosting, Search Engine Optimization, Site Maintenance .

The company offers more than 500 different ideas under a

variety of categories like Grid Computing, Data Mining & Ware

housing, and Home Automation & Security etc…Some of their products

are used in schools, browsing centre, hospitals.

Some of their clients are

KONGU Institutions

Kalaimagal Institutions

Ferro Trading India.

Trade India fairs etc…

1.3 System Configuration:

4

Page 5: Cloud Computing

1.3.1 Server Configuration: Hardware Requirement:

Processor : Intel XEON processor

Memory : 420GB

RAM : 17.1GB (2 virtual cores)

Software Requirement:

Operating System : Windows Server 2003/2008

Language : ASP.NET

Back End : SQL Server 2005

1.3.2 Client Configuration: Hardware Requirement:

Processor : Pentium IV

Hard Memory : 40GB

RAM : 1GB

Monitor : Samsung 15 color

Keyboard : 118 keys

Mouse : Logitech

Software Requirement:

Operating System : Windows XP

Package : Ms Office

Browser : Mozilla, Opera.etc...

5

Page 6: Cloud Computing

1.4 Programming Environment:

1.4.1 Asp.Net:

ASP.NET is a part of the .NET Framework [2], a new

computing platform from Microsoft optimized for creating applications

that are highly distributed across the Internet. Highly distributed means

that the components of the application, as well as the data, may reside

anywhere on the Internet rather than all being contained inside one

software program somewhere. Each part of an application can be

referenced and accessed using a standard procedure ASP.NET is the part

that provides the features necessary to easily tie all this capability

together for coherent web-based applications. It is a programming

framework, and one of the primary differences between it and traditional

ASP is that it uses a Common Language Runtime (CLR) capable of

running compiled code on a web server to deploy powerful wed-based

applications.

ASP.NET still use HTTP to communicate to the browser and back,

but it brings added functionality that makes the communication process

much richer. If any files have the appropriate extension or contain code,

the server routes those files to ASP.NET for processing prior to sending

them out to the client. The script or code is then processed and the

appropriate content is generated for transmission back to the

browser/client. Because processing takes place before the results are

delivered to the user, all manner of functionality can be built-in such as

database access, component usage and the ordinary programmatic

functionality available with scripting languages.

6

Page 7: Cloud Computing

ASP.NET applications [10] can be coded using a plain text edited

such as notepad, although this not the most efficient method to use.

Developing all the other resources that might be required for a particular

ASP.NET application, especially for the user interface, may involve

range of specialized tools including image-editing programs, database

programs and HTML editors.

ASP.NET also enables you to separate HTML design from the data

retrieval mechanism. Therefore changing the HTML deign does

not affect the program that retrieve data from the databases.

Similarly, server-side scripting ensures that changing data sources

does not require a change in HTML documents.

ASP.NET has a number of advance features that help you develop

robust web applications. The advance features of ASP.NET are

based on the .NET Framework.

1.4.1.1 Features

Compiled Code - Code written in ASP.NET [10] is compiled

and not interpreted. This makes ASP.NET applications faster to

execute than other server- side scripts that are interpreted, such as

scripts written in a previous of ASP.

Enriched Tool Support - The ASP.NET Framework is provided

with a rich toolbox and designer in VS.NET IDE (Visual

Studio .NET integrated development environment). Some of the

features of this powerful tool are the WYSIWTG (What You See Is

What You Get) editor, drag-and-drop server controls and automatic

deployment.

Power and Flexibility - ASP.NET applications are based on

Common Language Runtime (CLR).

7

Page 8: Cloud Computing

Simplicity - ASP.NET enables you to build user interfaces that

separate application logic from presentation content. In addition,

CLR simplifies application development by using managed code

services, such as automatic reference counting and garbage

collection.

Manageability - ASP.NET enables you to manage Web

application by storing the configuration information in an XML

file. You can open the XML file in the visual Studio .NET IDE.

Scalability - ASP.NET has been designed with scalability in mind.

It has features that help improve performance in a multiprocessor

environment.

Security - ASP.NET provides a number of options for

implementing security and restricting user access to a web

application. All these options are configured within the

configuration file.

1.4.1.2 IIS- Internet Information Service:

The most important server [2] you can install is internet

information server (IIS) because you will need it to run your ASP.NET

applications. There a number of other servers specifically designed to

work with the .NET Framework.

1.4.2 .Net Framework:

ASP.NET, which is the .NET version of ASP [2], is built on

Microsoft .NET Framework. Microsoft introduced the .NET Framework

to help developers create globally distributed software with Internet

functionality and interoperability.ASP.NET application include WEB

Forms, configuration files and XML, web service files. Web forms enable

8

Page 9: Cloud Computing

you to include user interfaces, such as Textbox, listbox controls and

application logic of Web applications, and configuration files enable you

to store the configuration settings of an ASP.NET application. The

elements of an ASP.NET application also include Web service to provide

a mechanism for programs to communicate over the Internet.

1.4.3 Sql-Server:

SQL Server is an enterprise-scale [11], industrial strength,

relational database management solution. It contains all the features

expected of high-end DBMS systems, as well as XML support.

Sql Server 2005:

Microsoft SQL Server [1] is a relational database management

system (RDMS) produced by Microsoft. Its primary query language is

Transact-SQL, an implementation of the ANSI/ISO standard Structured

Query Language (SQL) used by both Microsoft and Sybase. SQL Server

is commonly used by businesses for small-to-medium-sized databases,

but the past five years have been greater adoption of the product for

larger enterprise databases.

The SQL Server 2005 data engine lies at the core of this enterprise

data management solution. In addition to providing support for relational

databases or XML, SQL Server 2005 combines the best in analysis,

reporting, integration and notification. This enables your team to build

and deploy cost effective BI solutions with which they can drive data into

every corner of your business though scorecards, dashboards, web

services and mobile devices

Close integration with Visual Studio, the Microsoft Office System,

and a suite of new development tools, including the business Intelligence

Development Studio, sets SQL Server 2005 apart. Whether you are a

9

Page 10: Cloud Computing

developer, database administrator, information worker, or decision

maker, SQL Server 2005 provides innovative solutions that help you gain

more value from your data whether stored in a relational database or

XML data format.SQL Server 2005 provides an end-to-end development

environment that includes many new technologies that empower

developers and significantly increase their productivity.

The following are the features of SQL Server 2005

Build, deploy, and manage enterprise applications that

are more secure scalable and reliable.

Maximize IT productivity by reducing the complexity of

building, deploying, and managing database applications.

Share data across multiple platforms, applications and

devices to make it easier to connect internal and external

systems.

Simplify the integration of back-end systems and data

transfer across firewalls.

Web developers can access data using XML without

relational database programming, while database

administrators can easily manipulate data in XML format

using Transact-SQL (T-SQL) and stored procedure.

1.4.4. Ado.Net:

ADO.NET is all about data access [11]. Data is generally stored in

a relational database in the form of related tables. Retrieving and

manipulating data directly from a database requires the knowledge of

database commands to access the data.

10

Page 11: Cloud Computing

1.4.4.1. Features of Ado.Net:

1. Disconnected data architecture- ADO.NET [11] uses the

disconnected data architecture. Applications connect to the

database only while retrieving and updating data.

2. Data cached in datasets- A dataset is the most common

method of accessing data since it implements a disconnected

architecture.

3. ADO.NET supports scalability by working with datasets.

Datasets operations are performed on the datasets instead of

on the database.

4. Data transfer in XML format- XML is the fundamental format

for data transfer in ADO.NET. Data is transferred from a

database into a dataset and from the dataset to another

component by using XML.

5. Interaction with the database is done through data commands

– All operations on the database are performed by using data

commands. A data command can be a SQL statement or a

stored procedure.

11

Page 12: Cloud Computing

CHAPTER 2

THEME OF THE PROJECT

2.1 System Review:

2.1.1 Existing System:

In Existing System the banking operations are implemented within

country that is nationalized banks. It is hard to store large amount of data

in the server. Even though the server is capable of store large amount of

data the retrieval time is large. There may be server crash and loss of

data. We want to maintain large amount of server’s space and number of

servers required is also increased.

2.1.2 Proposed System:

In Proposed System we are using cloud computing concept to

implement banking process. Cloud computing offers large amount of

storage by combining large data warehouses. So we can able to store

large amount of data.

So here we are implementing world-wide banking. Compared to

existing system cloud servers is support fast access of data. It always

provides correctness of user data. Cloud servers are automatically backup

the server data to the virtual workspace, so data loss is avoided. Cloud

disaster recovery scheme are under development so data’s are never

losses.

Data storage security is essential in the banking process. So here

we are implementing private cloud. So the data’s are secured and

accessed within the organization. Hackers list is maintained to track those

who are trying to access others bank accounts.

12

Page 13: Cloud Computing

2.2 Feasibility Study:

Feasibility study is about the viability of a system [4]. The

proposed system has to be examined for its technical, economical and

operational feasibility.

2.2.1 Economic Feasibility:

Cloud computing [4] is cost-effective. Here, cost is greatly reduced

as initial expense and recurring expenses are much lower than traditional

computing

2.2.2 Technical Feasibility:

The Possibility that the organization can procure the necessary

resources [4] is available. This is demonstrated if the needed hardware

and software are available in the marketplace or can be developed by the

time of implementation. In this project we use normal Pentium IV

system. All other technical resources are available in the marketplace.

The cloud works in the ‘distributed mode’ environment. It shares

resources among users and tasks, while improving efficiency and agility

(responsiveness). Cloud is characterized by features such as platform,

location and device independency, which make it easily adoptable for all

sizes of businesses, in particular small and mid-sized.

2.2.3 Operational Feasibility:

The stakeholders include management, employees, customers, and

suppliers. The stakeholders are interested in systems that are easy to

operate, make few, if any, errors, produce the desired information, and

fall within the objectives of the organization [4]. Another important

characteristic of cloud is scalability, which is achieved through server

virtualization.

13

Page 14: Cloud Computing

2.3 System Design:

2.3.1 Database Design:

A database is a collection of interrelated data stored with minimum

redundancy to serve many users quickly and efficiently. The general

objective of database design is to make the data access easy, inexpensive

and flexible to the user.

Database design is used to define and then specify the structure of

business used in the client/server system. A business object is nothing but

information that is visible to the users of the system. The database must

be normalized one.

Data Normalization:

The entities along with their attributes can be stored in many

different ways into a set of tables [1]. The methods of arranging these

attributes are called normal forms. The theory behind the arrangement of

attributes into table is known as normalization theory. It helps in,

Minimization of duplication data.

Providing flexibility to support different functional requirements.

Enabling the model to be translated to database design.

All relations in a relational database are required to satisfy the

following condition, every value in a relation each attribute value is

atomic so far as system is concerned. Advantage of normalization is,

Helps in reduction in the complexity of maintaining data integrity

by removing the redundant data.

14

Page 15: Cloud Computing

It reduces inconsistency of data

Table 2.1 Admin Table

Field Name Data Type-Size Description Constraint

Id AutoNumber(2) Admin id number Primary Key

Userid Text(10) User identification Not null

Dateofcreation Date Date of user

creation

Not null

Table 2.2 Country Details

Field

Name

Data Type Description Constraint

Cid AutoNumbe

r

Country identification number Primary

Key

Cname Text(20) From admin new country name Not null

Ccode Number (20) Created country code of the branch Not null

Address Text (20) Created address of the country Not null

Area Text (20) Brach area of the created country Not null

City Text (15) City name of the branch in the country Not null

State Text (15) State name of the branch in the

country

Not null

CManager Text (15) Chief manager of the branch Not null

Manager Text (15) Manage of the branch in the country Not null

Cperson Text (15) Contact Person of the branch Not null

BranchAu Text (15) Branch created authentication person Not null

15

Page 16: Cloud Computing

Table 2.3 Country Hacker

Field Name Data Type Description Constraint

Hid AutoNumber Hacker identification Number PrimaryKey

userID Text (10) User identification for identification Foreign Key

Userpwd Text (10) Tried Password from the other user Not null

Attacktime Text (10) Time of the attach from other user Not null

Attackdate Date Date of the attach from other user Not null

IP Text(10) Attackers system ip address Not null

Table 2.4 Transaction Details

Field Name Data Type Description Constraints

Tid AutoNumber AutoNumber Primary Key

Transid Number (16) Identification number Not null

FromAccno Number (16) From the account number transacted Not null

Fromaccmode Text From the account type transacted Not null

ToAccno Number (16) To the account number transacted Not null

Toaccmode Text To the account type transacted Not null

TransTime Number (10) Transacted time Not null

TransDate Date/Time Transacted date Not null

Transamount Number (16) Transacted Amount Notnull

16

Page 17: Cloud Computing

17

Page 18: Cloud Computing

Table 2.5 Customer Account Details

Field Name Data Type Description Constriant

Caid AutoNumber Customer account number Primay Key

CustomerID Text (10) Customer id number Not null

BranchCode Text (5) Branch code of the customer Not null

CardNum Number (16) Credit card number Not null

CRVNum Number (4) CRV number of the credit card Not null

Accno Number (12) Account number of the customer Not null

AccountType Text (10) Account type of the customer Not null

Debitbalance Number (10) balance in the debit account Not null

CreditBalance Number (10) balance of the credit account Not null

ExistAccount Number (15) Referred customer account number Not null

ExistBankName Text (15) Referred customer Bank name Not null

ExistOtherBank Text (15) Other banking details for customer Not null

ExistAcctype Text (10) Account type of the customer Not null

ReferalName Text (15) Name of the existing customer Not null

Dateofcreation Date/Time Date/Time of the account creation Not null

Username Text (15) Username of the existing customer Not null

Psw Text Password of the existing customer Not null

18

Page 19: Cloud Computing

Table 2.6 Customer Personal Information

Field Name Data Type Description Constriant

Cpid AutoNumber Customer personal id auto number PrimaryKey

Accno Number (15) Account number for the customer Foreign Key

CardNum Number (15) credit card number of the customer Not null

Customerid Number (15) Transaction id number Not null

CrvNum Number (15) Transaction CRV number Not null

Fname Text(20) First name of the customer Not null

Lname Text (20) last name of the customer Not null

Address Text (20) Full address of the customer Not null

Country Text (20) Country details of the customer Not null

Pcod Number (15) Pin code of the area of customer Not null

PhoneNum Number (15) phone number of the customer Not null

Voterid Number (15) Voter id number of the customer Not null

Did Text (15) Driving license no of the customer Not null

Pancard Text (15) Pancard number of the customer Not null

Passportid Text (20) Passport details of the customer Not null

PassportNum Number (20) Passport number of the customer Not null

Email Text (25) Valid email id of the customer Not null

SecurityQues Text (25) Security question Not null

SecureAnswer Text (15) Security answer Not null

Dateofcreation Date/Time Date/Time Not null

Gender Text (5) Gender of the customer Not null

Username Text (15) username of the customer Not null

Userpassword Text (15) password of the customer Not null

2.3.2 Dataflow Diagram:

19

Page 20: Cloud Computing

Level 0: Login Process

Fig. 2.1 Login Process

Level 1: Cloud Formation

Fig. 2.2 Cloud Formation

20

LOGIN

ENTER USERID, PASSWORD

ADMIN TABLE

CLOUD SERVER (CLOUD DATABASE)

AUTHENTICATION

SUCCESSFUL

NAVIGATE HOME PAGE

ADMINENTER COUNTRY MAIN AND SUB BRANCH DETAILS

VALIDATIONSUCCESSFUL

UPDATE COUNTRY TABLE DETAILS

CLOUD SERVER(CLOUD DATABASE)

Page 21: Cloud Computing

Level 2: User Creation

Fig. 2.3 User Creation

Level 3: Money Deposit

Fig. 2.4 Money Deposit

21

ADMINENTER CUSTOMER NAME AND ACCOUNT NUMBER

VALIDATIONSUCCESSFUL

UPDATE THE AMOUNT TO TRANSACTION AND CUSTOMER TABLE

CLOUD SERVER(CLOUD DATABASE)

ADMINENTER ACCOUNT AND PERSONAL DETAILS

VALIDATIONSUCCESSFUL

UPDATE USER PERSONAL AND ACCOUNT TABLE DETAILS

CLOUD SERVER(CLOUD DATABASE)

Page 22: Cloud Computing

Level 4: Money Transfer

Fig. 2.5 Money Transfer

Level 5: Personal & Corporate Banking

Fig. 2.6 Personal & Corporate Banking

22

USERENTER USER NAME AND PASSWORD

VALIDATIONSUCCESSFUL

UPDATE THE AMOUNT TO TRANSACTION AND CUSTOMER TABLE

CLOUD SERVER(CLOUD DATABASE)

NAME AND ACCOUNT NUMBEROF WHOM WE TRANSFER

VALIDATIONSUCCESSFUL

USERENTER USER NAME AND PASSWORD

VIEW AND CHANGE ACCOUNT AND PERSONAL DETAILS

UPDATE THE CUSTOMER TABLE

CLOUD SERVER(CLOUD DATABASE)

Page 23: Cloud Computing

Level 6: Overall DFD Diagram

Fig. 2.7 Overall DFD Diagram: Admin

23

LOGIN

CREATE COUNTRY

BRANCH AUTHORIZATION

VIEW HACKER LIST

CHANGE ADMIN PASSWORD

VIEW COUNTRY AND BRANCH LIST

CREATE USER

MONEY DEPOSIT

VIEW PERSONAL BANKING DEPOSIT

VIEW CORPORATE BANKING DEPOSIT

ACCOUNT AND PERSONAL DETAILS

UPDATION ON CUSTOMER ACCOUT DETAILS

STORE COUNTRYDETAILS

HACKER LIST

CREATE STATE MAIN BRANCH

CREATE SUB BRANCH

UPDATE PASSWORD

STORE ADMIN TABLE

CLOUD SERVER(CLOUD DATABASE)

Page 24: Cloud Computing

Fig. 2.8 Overall DFD Diagram: User

24

HOMEPAGE

LOGIN CORPORATE BANKING

LOGIN PERSONAL BANKING

VIEW PERSONAL BANKING TRANSACTION DETAILS

VIEW CORPORATEBANKDETAILS LOGIN FOR MONEY TRANSFER

ENTER MONEY TRANSFER DETAILS

MONEY TRANSFER SUCCESSFULLY

UPDATETRANSACTION DETAILS TO DATA BASES

CLOUD SERVERS(CLOUD DATABASES)

Page 25: Cloud Computing

2.4 Module Description:

Cloud Computing Modules

Cloud Formation

Create customer

Money integrity

Money transfer

Personal Banking through cloud

Corporate Banking through cloud

2.4.1 Cloud Formation:

In Cloud Formation Module it will take us to create country zone.

While creating the country we need to specify the unique country code

and code number for each and every state. According to this project we

put some limits such as country can have only 10 branches. If we try to

insert more than 10 branches it will provide a message about the limits. If

the same country code was used create a new country it will provide a

message as country code already exists error message. When proper data

was entered for the branch, bank will be creates in that particular country

successfully and an acknowledgement will be received.

2.4.2 Create Customer:

While creating the customer we need to specify various

information’s such as name, address, id proof, pan card number, passport

number, branch code, If the customer has any existing account or not, if

they have an existing account details of those account. And the referral

account holder information has to be specified. After providing all those

25

Page 26: Cloud Computing

information when we click create customer, in the background process

we are creating the customer account number, Customer ID, Card

number, and the crv num.

2.4.3 Money Integrity:

In the Money integrity form we need to pass the account number,

name of the account holder, branch code, account mode such as credit or

debit of the person we are going to deposit. When those information’s are

passed successfully and we click the deposit amount button the amount

will be deposited to that account number, a message will appear for the

conformation of the deposited amount. Particular account holder bank

details will be displayed in the form.

2.4.4 Money Transfer:

In the money transfer form we need to specify the both customers

information such as account number, name of the account holder, branch

code, account mode credit or debit, and the sender has to specify the

amount of transfer. When user click transfer in the background process

the customer account balance will be checked with the transfer amount. If

the customer balance is lower than the amount specified for transfer

means an error message is specified for the user and the transaction will

be incomplete. When the user has the sufficient balance the transaction

will take place successfully the transfer amount will be reduced from the

sender amount and that amount will be added to the receiver amount.

After those process completed successfully a message will be displayed

to the user about the transaction.

2.4.5 Personal Banking through cloud:

In the personal banking the saving account holders can check there

account balance, list of transaction done by the customer, account

26

Page 27: Cloud Computing

personal information can be edited efficiently, Each account holder will

be provided by a unique user id and password, By using their user id and

password they can view their account details as well as personal

information’s . Change password rights are provided to the customer to

make their own security password.

2.4.6 Corporate Banking through cloud:

In the Corporate bank the current account holder has the rights to

check there account information, list of transaction done in their account,

Account balance, Account holders personal information’s. The account

holder can view that information only with the unique user id and

password provided by the bank. The account holder has the rights to

change their password according to their wish to maintain their security.

If the account holder provides the wrong user ID or Password it will

provide an error

2.5 Testing:

Once the program exists, we must test it to see if it is free of bugs.

High quality products must meet user’s needs and expectations.

Furthermore the product should attain this with minimal or no defects, the

focus being on improving products prior to delivery rather than correcting

them after delivery [4]. The ultimate goal of building high quality

software is user’s satisfaction.

In Cloud System’s [8] we are using two familiar testing tools HP’s

LOAD RUNNER, IBM’S RATIONAL PERFORMANCE TESTER.

27

Page 28: Cloud Computing

2.5.1 Testing Methodologies:

SOASTA Cloud Test is the first product [8] to be incorporated into

this methodology and extend traditional approaches to address the new

opportunities and challenges presented by cloud testing.

These include:

Testing live web-based applications in production

Leveraging the Cloud to test at both typical and peak traffic levels,

from hundreds of users to millions

Responding to the acceleration of development cycle times by

making agile performance testing a realistic alternative

Generating geographically dispersed load to most accurately

represent real-world traffic

2.5.2. Stress Testing:

This is the test of handling characteristics of the system [4]. Peak

time usage is simulated and the system is subjected to extreme conditions

to check for its vulnerability to load of operations. It verifies that the

solution delivered is capable of coping with the workload which it is

required to undertake? Load or Stress testing can be used to prove.

By using test techniques and tools which are capable of

applying huge amounts of load on the solution the Cloud can be

accurately measured and its capacity verified. The tools used for this

testing is HP’s QUICK PRO, IBM’s RATIONAL ROBOT [8].

28

Page 29: Cloud Computing

2.5.3. Security Testing:

Security testing can provide the assurance that business critical

data is stored and transported safely. Techniques such as penetration

Testing can prove, that the mechanisms, which have been developed

security will remain intact during potential attempts to compromise the

cloud solutions.

2.5.4. System Testing:

Generally, testing is performed [4] to ensure that the software does

not fail and it is carried out with the explicit intention of finding errors in

the program. After the development of the system, the next step would be

test the system. So that the system could be subjected to different test to

determine the reliability of the system.

SOASTA CLOUDTEST [8] is the test tool for testing the cloud

systems entirely. This tool will work effectively under cloud

environments.

29

Page 30: Cloud Computing

2.5.5 Test Cases:

Table 2.7 Test Cases for Unit Testing

TEST

CASE

ID

Test cases Input Obtained

Output

Expected

output

1 In country creation

module admin try

to create already

created country

branch

Country code,

Country name

Country already

exist error

message will be

displayed

Country

created

successfully

2 In money deposit

and money transfer

the user enter

wrong account

number

Account number

and amount

Error message

will be displayed

Transaction

completed

successfully

3 In personal

banking current

account holder try

to enter

Userid,Password Error message

will be displayed

All user

details will be

displayed

30

Page 31: Cloud Computing

2.6 Implementation Issues:

While implementing cloud system main issue is security. While

using public clouds there is no security for our data. But we are using

private cloud. It is purely for a single organization purpose.

In our banking system we are using private clouds. Private clouds

are secured than public clouds but implementing this we want to form our

own clouds. Usually the cost is high. But compare to traditional banking

implementation it will be less.

` We are in internet banking so there is one main problem. Stealing

or hacking of our account. Cloud servers are effective in transferring the

data more secured way. One of the main features of Cloud computing is

secure transformation. So the data will be transferred securely and

correctly. So there is no hacking of account numbers and crv numbers.

If somebody trying to open our account their ip address and time

and date will be notified to the administrator.

31

Page 32: Cloud Computing

CHAPTER 3

CONCLUSION

3.1 Conclusion:

Cloud computing (‘cloud’) is an evolving term that describes the

development of many existing technologies and approaches to computing

into something different. Cloud separates application and information

resources from the underlying infrastructure, and the mechanisms used to

deliver them.

Cloud computing brings significant promise in terms of scalability,

reliability, competitive advantage, cost reductions, simplified

maintenance and management of applications across the enterprise, along

with high availability and automation. Rated as one of the key area of

innovative implementation for enterprises, by experts and analysts, it is

expected to bring ample change in the way computing is approached in

today’s world.

Cloud computing technologies can provide banks competitive

advantage in the market, cost reductions, higher margins, simplified

maintenance and management of applications across the enterprise,

greatly extended scalability, agility, high availability, automation, large

data storages and reliable backup mechanisms.

Banks may explore use of cloud computing initially for better

performance through peak demand Though the current adoption of cloud

computing at banks is low, the benefits it assures will result in cloud

computing gaining prominence and the years ahead will see a higher

adoption rate.

32

Page 33: Cloud Computing

3.2 Future Enhancement:

The system can be further enhanced by adding new features and

facilities. Abstract the hosting platform as set of virtual resources (i.e.

compute, storage, and network). Manage those resources based on

scalability and availability needs. So we can implement the Cloud

Infrastructure Services (IaaS) further. Ensure the token provisioning

identity federation and claims transformation for Security data

transformation.

Software as a service (SaaS) computing can implement the

supporting service based data integrity for huge data transformation with

secured way. More security features will be added in the system for

effective transmission.

The system will be further enhanced to provide loan facilities to the

customers.

33

Page 34: Cloud Computing

APPENDIX

Screen Layouts

34

Page 35: Cloud Computing

35

Page 36: Cloud Computing

36

Page 37: Cloud Computing

37

Page 38: Cloud Computing

38

Page 39: Cloud Computing

39

Page 40: Cloud Computing

40

Page 41: Cloud Computing

41

Page 42: Cloud Computing

42

Page 43: Cloud Computing

43

Page 44: Cloud Computing

44

Page 45: Cloud Computing

45

Page 46: Cloud Computing

46

Page 47: Cloud Computing

47

Page 48: Cloud Computing

REFERENCES

1. Bill Hamilton (2006), “Programming SQL server 2005”,

O'REILLY.

2. Jesse Liberty, Dan Hurwitz (2006), “Programming ASP.NET”,

O'REILLY.

3. John Rittenhouse (2009), “Cloud computing: implementation,

management, and security”, CRC press.

4. Roger. S. Pressman (2006), “Software Engineering: A

Practitioner's Approach” Third (Asia) Edition by TATA

McGraw HILL.

5. Tim Mather, subra Kumarasamy and shahed latif (2009), “Cloud

Security and Privacy. An Enterprise Perspective on Risks and

Compliance”, O’REILLY.

6. Toby velte, Antony Velte, Robert Elsenpeter (2009), “Cloud

computing: A practical Approach” , TATA McGraw HILL.

7. http://www.docstoc.com/docs/6533575/What-Is-Cloud.

8. http://www.docstoc.com/docs/5852681/Testing-the-cloud .

9. http://www.docstoc.com/docs/34803287/Cloud-Computing.

10. www.infosys.com/finacle/finacle-connect/Tech_Watch.doc.

11. www.w3schools.com/aspnet/default.asp.

48