SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 17
MIGRATION OF APPLICATION SCHEMA TO WINDOWS AZURE
CLOUDS
Amandeep Singh1
, Karandeep Singh2
1
Assistant Professor, Computer Science and Engineering Dept, PTU, BMSCE, Muktsar, India
2
Head & Assistant Professor, MAMC, Agroha, Hisar, Haryana, India
Abstract
Schema migration involves the migration of application schema to clouds. Presently various script generation techniques are there
which are used for schema migration, which also sometimes require the application architecture to be changed to make it compatible
with cloud platform. This paper shows an approach using user templates for capturing the schema structure and access control
mechanism for migration of application schema without using script generation tools. Further it gives the necessary algorithm to
show the feasibility of its implementation.
Keywords— Cloud Computing, rbac, roles, nist, saas, schema, xsd, xml.
------------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is an emerging computing paradigm in which
resources of the computing infrastructure are provided as
services over the Internet [1]. Cloud computing is referred to as
the next big thing in IT, and a great deal of attention has been
focused on cloud technology. In the present scenarios cloud
computing is increasingly being adopted by large businesses
and mid-sized businesses. Moving to the cloud proves to be a
viable option for firms as it dramatically cuts down hardware
and software expenditure [2]. For the efficient migration to the
cloud, it involves transferring the application data as well as
application schema entirely, with authorized access, to the
clouds. Migration of the data to clouds is a phased process
which requires analysis of the schema which is to be moved,
analysis of data and the target cloud platform. BCP is one such
application which is used for migration of data but with a
major drawback that it cannot be used for the migration of
application schema. The challenge is to simplify the process of
schema migration and make it more efficient.
2. BACKGROUND
Cloud Computing moves computing and storage tasks from
individual systems to the cloud, thereby reducing the burden at
user’s end. It enables the delivery of hardware and software
resources over the Internet as a utility. It moves computing and
data away from desktop and portable PCs into large data
centers. Migrating the schema requires capturing the
information regarding the table, no of columns in the table and
data type of the columns in the table, by providing a user
friendly interface. Then, deploying access control over the data
requires capturing the information regarding user roles that
exist in the system, permissions granted to those roles,
according to which data in the tables can be accessed. As the
different user roles can be able to access the table data
according to the permissions given to the different user roles in
the system. In the role based access control
1 A user has access to an object based on the assigned
role.
2 Roles are defined based on job functions.
3 Permissions are defined based on job authority and
responsibilities within a job function.
4 Operations on an object are invocated based on the
permissions.
5 The object is concerned with the user’s role and not
the user. The Role based access control system is
clearly defined and agile, making the addition of new
applications, roles, and employees as efficient as
possible [3].
3. METHODOLOGY
3.1 Procedure
In this proposed approach the authorized users belong to roles,
and the permissions or access rights regarding the usage of
database are granted to roles. The user is provided with the
application interface. Through this application interface the
user provides all the relevant information needed for the
creation of the database and role-based schema on the Cloud.
The information includes the name of various database objects
and roles for the application and the permissions granted to
various roles. It become very easy for the user to create role
based schema on the Cloud as the user only need to specify
his/her requirements through an interactive interface without
taking into consideration of the technicalities of the migration
metadata. The XML file is generated from the information
provided by the user which is then sent to service providers
end where database and role based access control information
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 18
is read from XML file and information regarding database
objects and roles is extracted and deployed over the clouds. For
the implementation of the migration procedure following steps
are used:
1. Acquisition of Database Information.
2. Extraction of roles and database schema.
3. Creation of XML File.
4. Transfer of XML File.
5. Role based access generation.
3.1.1 Acquisiton of Database Information
The first phase of the proposed migration scheme is the
acquisition of database information which is required to
successfully and automatically reconstruct the database schema
of the onsite environment onto the Cloud. The information
consists of description of various database objects,
relationships, consistency constraints and configuration
settings. The user may make use of automated tools that
produce the XML document of the entire database schema but
in this proposed approach we have designed an interface which
is used by the user to generate XML file which contains all the
required information.
3.1.2 Extraction of Roles and Database Schema
The information regarding roles and database objects is the
basis for automatically creating the entire database on the
Cloud. The name, type and number of attributes of various
database objects are extracted along with roles and access
information. Roles describe “who does what” in the application.
Access rights are the permissions which are granted to roles to
access the database. This information is structured in a
standard way by making it comply with the XML schema
document which has been specifically designed to hold
database, roles and access information in such a way that
automatic processing of this information becomes easy for the
server application which will handle it at service provider’s
end. The use of XML document is to extract access control
data from several platforms and represent the access control
data for the entire enterprise [4].
3.1.3 Creation of XML File
In this step, XML file is actually generated which holds the
information gathered during above two steps. This is the file
which the user needs to transfer to service provider’s end, as
the file contains sensitive information (i.e. information
regarding database objects, relationships, access control, roles
etc.).
3.1.4 Transfer of XML File and Role Based Access
Generation
The generated XML file is transferred to the Cloud by
establishing sql connection with database server on the clouds.
The database schema information is extracted from the XML
file and various routines are executed which construct the copy
of the onsite database on Cloud databases along with roles and
their corresponding access rights.
Fig. 1 Steps in the proposed approach
Fig. 1 showing the steps used in the proposed approach.
F. Algorithm Used for generating xml from GUI
The basic algorithm is as follows:
1. Get the values of table_count, column_count, role_count,
Permission_count from user.
2. Start with <table> tag // starting of XML.
3. Insert table name from user within <table_name> tag.
4. Start with the column tag.
5. Insert the column name from user within <column_name>
tag.
6. Go to step 5 until column_count reaches maximum.
7. End of column tag
8. Goto step 3 until table_count reaches maximum
9. Start with <role> tag
10. Insert role name within <role name> tags from user.
11. Start with <Permission > tag.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 19
12. Insert <table_name> <column_name> <read> < write>
<delete> tag that the user chooses.
13. Set true/false value within <allowed> tag.
14. End of <permission>.
15. Goto step 11 until permission_count reaches Maximum.
16. Closing tags.
Example scenario:
The proposed scheme is demonstrated using an application
called Banking Information System. The Banking Information
System taken here keeps the records of customers regarding
the registration details of the customers and payments. The
employee’s salary is maintained by the administration manager.
The job describes the role that employee plays in the Bank. To
restrict the access to the database by the authorized users, Role
Based Access Control model has been implemented onsite.
4. RESULTS
The proposed scheme has been demonstrated by taking
example scenario. The case study has been done on a Banking
Information system. A Banking Information system is migrated
to the cloud by implementing and making use of the proposed
scheme.
5. CONCLUSIONS
The approach discussed in this paper can be used for migration
of the application schemas to clouds in various real world
scenarios. In this research work role based model is used for
data access. Further Attribute based model can be combined
with the present approach which further enhances the security
of access controls mechanisms on the cloud.
ACKNOWLEDGEMENTS
We convey our sincere gratitude to Prof Sandhu M for
providing us with the platform and opportunity to work in this
area. His encouragement and valuable guidance throughout the
course of the paper was a constant support.
REFERENCES
[1]. Preiya, V. S., Pavithra, R. and Joshi., “Secure Role based
Data Access Control in Cloud Computing”, International
Journal of Computer Trends and Technology, pp. 146-151,
2011.
[2]. Rao, R. and Prakash, P., “Improving security for data
migration in cloud computing using randomized encryption
technique“, IOSR Journal of Computer Engineering, vol. 11,
no. 6, pp. 39-42, May-June 2013.
[3]. Salunke, D., Upadhay, A., Sarwade, A. and Vaibhav,
M. ”A survey paper on Role Based Access Control”,
International Journal of Advanced Research in Computer and
Communication Engineering, vol. 2, no. 3, pp. 1340–1342,
2013.
[4]. Chandramouli, R. “Application of XML Tools for
Enterprise-Wide RBAC Implementation Tasks”, Proceedings
of the fifth ACM workshop on Role-based access control, USA,
pp. 11-18, 2000.
[5]. Damyanov, I. and Holmes, N. “Metadata Driven Code
Generation Using .NET Framework”, International Conference
on Computer Systems and Technologies – CompSysTech, pp.
IIIB.2.1-IIIB.2.6, 2004.
[6]. Das, S., Nishimura, S., Agrawal, D. and Abbadi, A. E.
“Database Migration for Elasticity in a Multitenant Database
for Cloud Platforms”, UCSB Computer Science Technical
Report, 2010-09.
[7]. Foster, I., Zhao, Y. and Raicu, I. “Cloud Computing and
Grid Computing – 360 Degree Compared“, IEEE Grid
Computing Environments (GCE08), 2008.

More Related Content

PDF
H017554148
PDF
Heterogeneous data transfer and loader
PDF
Heterogeneous data transfer and loader
PDF
Data migration system in heterogeneous database
PDF
Data migration system in heterogeneous database
PDF
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
PDF
Maintaining Data Integrity for Shared Data in Cloud
DOCX
H017554148
Heterogeneous data transfer and loader
Heterogeneous data transfer and loader
Data migration system in heterogeneous database
Data migration system in heterogeneous database
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
Maintaining Data Integrity for Shared Data in Cloud

What's hot (17)

PDF
ORUTA BASE PAPER
PDF
Real time text stream processing - a dynamic and distributed nlp pipeline
PDF
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
PDF
Maintaining Data Integrity for Shared Data in Cloud
PDF
Data Usage Monitor for a Shared Wireless Network Connection
PDF
Fntdb07 architecture
DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
PDF
a novel technique to pre-process web log data using sql server management studio
PDF
Cobe framework cloud ontology blackboard environment for enhancing discovery ...
PDF
Electronics Library Management System from the Website
PDF
Towards Secure and Dependable Storage Services in Cloud Computing
PDF
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
PDF
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
PPTX
Towards secure and dependable storage
DOCX
panda public auditing for shared data with efficient user revocation in the c...
PDF
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
ORUTA BASE PAPER
Real time text stream processing - a dynamic and distributed nlp pipeline
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
Maintaining Data Integrity for Shared Data in Cloud
Data Usage Monitor for a Shared Wireless Network Connection
Fntdb07 architecture
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
a novel technique to pre-process web log data using sql server management studio
Cobe framework cloud ontology blackboard environment for enhancing discovery ...
Electronics Library Management System from the Website
Towards Secure and Dependable Storage Services in Cloud Computing
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
Towards secure and dependable storage
panda public auditing for shared data with efficient user revocation in the c...
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ad

Viewers also liked (20)

PDF
Brisk and secure ad hoc vehicular communication
PDF
Web performance prediction using geo statistical method
PDF
Active self interference cancellation techniques in
PDF
Fpga implementation of optimal step size nlms algorithm and its performance a...
PDF
Experimental investigation, optimization and performance prediction of wind t...
PDF
A remote monitoring system for a three phase 10-kva switchable distribution t...
PDF
Composites from natural fibres
PDF
Seismic response of reinforced concrete structure by using different bracing ...
PDF
Study of shape of intermediate sill on the design of stilling basin model
PDF
Application of ibearugbulem’s model for optimizing granite concrete mix
PDF
Economical placement of shear walls in a moment resisting frame for earthquak...
PDF
Zero rotation aproach for droop improvement in
PDF
Study of properties of banana fiber reinforced composites
PDF
Surface morphology of mg f2yf3 multi layer thin films
PDF
Co axial fed microstrip rectangular patch antenna
PDF
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
PDF
Comparative study of one and two diode model of solar photovoltaic cell
PDF
Computer aided diagnosis for liver cancer using
PDF
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
PDF
Securing cluster based adhoc network through
Brisk and secure ad hoc vehicular communication
Web performance prediction using geo statistical method
Active self interference cancellation techniques in
Fpga implementation of optimal step size nlms algorithm and its performance a...
Experimental investigation, optimization and performance prediction of wind t...
A remote monitoring system for a three phase 10-kva switchable distribution t...
Composites from natural fibres
Seismic response of reinforced concrete structure by using different bracing ...
Study of shape of intermediate sill on the design of stilling basin model
Application of ibearugbulem’s model for optimizing granite concrete mix
Economical placement of shear walls in a moment resisting frame for earthquak...
Zero rotation aproach for droop improvement in
Study of properties of banana fiber reinforced composites
Surface morphology of mg f2yf3 multi layer thin films
Co axial fed microstrip rectangular patch antenna
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
Comparative study of one and two diode model of solar photovoltaic cell
Computer aided diagnosis for liver cancer using
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
Securing cluster based adhoc network through
Ad

Similar to Migration of application schema to windows azure (20)

PDF
Secure data storage and retrieval in the cloud
PPTX
Thesis presentation
PDF
Ijarcet vol-2-issue-3-942-946
PPTX
Moving Your Data to The Cloud
PDF
Enhancing highly-collaborative access control system using a new role-mappin...
PPTX
Cloud Computing
PDF
Measurable, safe and secure data management for sensitive users in cloud comp...
PPT
Ahearn Cloud Presentation
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
PPTX
Key Capibilities.pptx
DOCX
Cloud MigrationNTC30205122020Running head CLOU.docx
DOCX
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
PDF
1784 1788
PDF
1784 1788
PPTX
Platform Security IRL: Busting Buzzwords & Building Better
PPTX
Impact of cloud services on software development life
PPTX
Migrating Legacy Applications to AWS Cloud: Strategies and Challenges
Secure data storage and retrieval in the cloud
Thesis presentation
Ijarcet vol-2-issue-3-942-946
Moving Your Data to The Cloud
Enhancing highly-collaborative access control system using a new role-mappin...
Cloud Computing
Measurable, safe and secure data management for sensitive users in cloud comp...
Ahearn Cloud Presentation
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
Key Capibilities.pptx
Cloud MigrationNTC30205122020Running head CLOU.docx
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
1784 1788
1784 1788
Platform Security IRL: Busting Buzzwords & Building Better
Impact of cloud services on software development life
Migrating Legacy Applications to AWS Cloud: Strategies and Challenges

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Project quality management in manufacturing
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Welding lecture in detail for understanding
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Construction Project Organization Group 2.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Internet of Things (IOT) - A guide to understanding
Geodesy 1.pptx...............................................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Project quality management in manufacturing
UNIT 4 Total Quality Management .pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CH1 Production IntroductoryConcepts.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Welding lecture in detail for understanding
Arduino robotics embedded978-1-4302-3184-4.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lecture Notes Electrical Wiring System Components
Construction Project Organization Group 2.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Foundation to blockchain - A guide to Blockchain Tech
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

Migration of application schema to windows azure

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 17 MIGRATION OF APPLICATION SCHEMA TO WINDOWS AZURE CLOUDS Amandeep Singh1 , Karandeep Singh2 1 Assistant Professor, Computer Science and Engineering Dept, PTU, BMSCE, Muktsar, India 2 Head & Assistant Professor, MAMC, Agroha, Hisar, Haryana, India Abstract Schema migration involves the migration of application schema to clouds. Presently various script generation techniques are there which are used for schema migration, which also sometimes require the application architecture to be changed to make it compatible with cloud platform. This paper shows an approach using user templates for capturing the schema structure and access control mechanism for migration of application schema without using script generation tools. Further it gives the necessary algorithm to show the feasibility of its implementation. Keywords— Cloud Computing, rbac, roles, nist, saas, schema, xsd, xml. ------------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet [1]. Cloud computing is referred to as the next big thing in IT, and a great deal of attention has been focused on cloud technology. In the present scenarios cloud computing is increasingly being adopted by large businesses and mid-sized businesses. Moving to the cloud proves to be a viable option for firms as it dramatically cuts down hardware and software expenditure [2]. For the efficient migration to the cloud, it involves transferring the application data as well as application schema entirely, with authorized access, to the clouds. Migration of the data to clouds is a phased process which requires analysis of the schema which is to be moved, analysis of data and the target cloud platform. BCP is one such application which is used for migration of data but with a major drawback that it cannot be used for the migration of application schema. The challenge is to simplify the process of schema migration and make it more efficient. 2. BACKGROUND Cloud Computing moves computing and storage tasks from individual systems to the cloud, thereby reducing the burden at user’s end. It enables the delivery of hardware and software resources over the Internet as a utility. It moves computing and data away from desktop and portable PCs into large data centers. Migrating the schema requires capturing the information regarding the table, no of columns in the table and data type of the columns in the table, by providing a user friendly interface. Then, deploying access control over the data requires capturing the information regarding user roles that exist in the system, permissions granted to those roles, according to which data in the tables can be accessed. As the different user roles can be able to access the table data according to the permissions given to the different user roles in the system. In the role based access control 1 A user has access to an object based on the assigned role. 2 Roles are defined based on job functions. 3 Permissions are defined based on job authority and responsibilities within a job function. 4 Operations on an object are invocated based on the permissions. 5 The object is concerned with the user’s role and not the user. The Role based access control system is clearly defined and agile, making the addition of new applications, roles, and employees as efficient as possible [3]. 3. METHODOLOGY 3.1 Procedure In this proposed approach the authorized users belong to roles, and the permissions or access rights regarding the usage of database are granted to roles. The user is provided with the application interface. Through this application interface the user provides all the relevant information needed for the creation of the database and role-based schema on the Cloud. The information includes the name of various database objects and roles for the application and the permissions granted to various roles. It become very easy for the user to create role based schema on the Cloud as the user only need to specify his/her requirements through an interactive interface without taking into consideration of the technicalities of the migration metadata. The XML file is generated from the information provided by the user which is then sent to service providers end where database and role based access control information
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 18 is read from XML file and information regarding database objects and roles is extracted and deployed over the clouds. For the implementation of the migration procedure following steps are used: 1. Acquisition of Database Information. 2. Extraction of roles and database schema. 3. Creation of XML File. 4. Transfer of XML File. 5. Role based access generation. 3.1.1 Acquisiton of Database Information The first phase of the proposed migration scheme is the acquisition of database information which is required to successfully and automatically reconstruct the database schema of the onsite environment onto the Cloud. The information consists of description of various database objects, relationships, consistency constraints and configuration settings. The user may make use of automated tools that produce the XML document of the entire database schema but in this proposed approach we have designed an interface which is used by the user to generate XML file which contains all the required information. 3.1.2 Extraction of Roles and Database Schema The information regarding roles and database objects is the basis for automatically creating the entire database on the Cloud. The name, type and number of attributes of various database objects are extracted along with roles and access information. Roles describe “who does what” in the application. Access rights are the permissions which are granted to roles to access the database. This information is structured in a standard way by making it comply with the XML schema document which has been specifically designed to hold database, roles and access information in such a way that automatic processing of this information becomes easy for the server application which will handle it at service provider’s end. The use of XML document is to extract access control data from several platforms and represent the access control data for the entire enterprise [4]. 3.1.3 Creation of XML File In this step, XML file is actually generated which holds the information gathered during above two steps. This is the file which the user needs to transfer to service provider’s end, as the file contains sensitive information (i.e. information regarding database objects, relationships, access control, roles etc.). 3.1.4 Transfer of XML File and Role Based Access Generation The generated XML file is transferred to the Cloud by establishing sql connection with database server on the clouds. The database schema information is extracted from the XML file and various routines are executed which construct the copy of the onsite database on Cloud databases along with roles and their corresponding access rights. Fig. 1 Steps in the proposed approach Fig. 1 showing the steps used in the proposed approach. F. Algorithm Used for generating xml from GUI The basic algorithm is as follows: 1. Get the values of table_count, column_count, role_count, Permission_count from user. 2. Start with <table> tag // starting of XML. 3. Insert table name from user within <table_name> tag. 4. Start with the column tag. 5. Insert the column name from user within <column_name> tag. 6. Go to step 5 until column_count reaches maximum. 7. End of column tag 8. Goto step 3 until table_count reaches maximum 9. Start with <role> tag 10. Insert role name within <role name> tags from user. 11. Start with <Permission > tag.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 19 12. Insert <table_name> <column_name> <read> < write> <delete> tag that the user chooses. 13. Set true/false value within <allowed> tag. 14. End of <permission>. 15. Goto step 11 until permission_count reaches Maximum. 16. Closing tags. Example scenario: The proposed scheme is demonstrated using an application called Banking Information System. The Banking Information System taken here keeps the records of customers regarding the registration details of the customers and payments. The employee’s salary is maintained by the administration manager. The job describes the role that employee plays in the Bank. To restrict the access to the database by the authorized users, Role Based Access Control model has been implemented onsite. 4. RESULTS The proposed scheme has been demonstrated by taking example scenario. The case study has been done on a Banking Information system. A Banking Information system is migrated to the cloud by implementing and making use of the proposed scheme. 5. CONCLUSIONS The approach discussed in this paper can be used for migration of the application schemas to clouds in various real world scenarios. In this research work role based model is used for data access. Further Attribute based model can be combined with the present approach which further enhances the security of access controls mechanisms on the cloud. ACKNOWLEDGEMENTS We convey our sincere gratitude to Prof Sandhu M for providing us with the platform and opportunity to work in this area. His encouragement and valuable guidance throughout the course of the paper was a constant support. REFERENCES [1]. Preiya, V. S., Pavithra, R. and Joshi., “Secure Role based Data Access Control in Cloud Computing”, International Journal of Computer Trends and Technology, pp. 146-151, 2011. [2]. Rao, R. and Prakash, P., “Improving security for data migration in cloud computing using randomized encryption technique“, IOSR Journal of Computer Engineering, vol. 11, no. 6, pp. 39-42, May-June 2013. [3]. Salunke, D., Upadhay, A., Sarwade, A. and Vaibhav, M. ”A survey paper on Role Based Access Control”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 3, pp. 1340–1342, 2013. [4]. Chandramouli, R. “Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks”, Proceedings of the fifth ACM workshop on Role-based access control, USA, pp. 11-18, 2000. [5]. Damyanov, I. and Holmes, N. “Metadata Driven Code Generation Using .NET Framework”, International Conference on Computer Systems and Technologies – CompSysTech, pp. IIIB.2.1-IIIB.2.6, 2004. [6]. Das, S., Nishimura, S., Agrawal, D. and Abbadi, A. E. “Database Migration for Elasticity in a Multitenant Database for Cloud Platforms”, UCSB Computer Science Technical Report, 2010-09. [7]. Foster, I., Zhao, Y. and Raicu, I. “Cloud Computing and Grid Computing – 360 Degree Compared“, IEEE Grid Computing Environments (GCE08), 2008.