SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 856
Transforming the Data into Virtual
Set-Up Segmented usage and Adoption
Dr. R. Poorvadevi
Assistant Professor, CSE Department, SCSVMV University, Kanchipuram, Tamil Nadu, India
How to cite this paper: Dr. R.
Poorvadevi "TransformingtheDatainto
Virtual Set-Up Segmented usage and
Adoption" Published in International
Journal of Trend in Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-3 , April 2019,
pp.856-858, URL:
https://www.ijtsrd.c
om/papers/ijtsrd23
094.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
CreativeCommons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
In digitalized environment, heterogeneous users are host and deploy their
applications as a digital transformation. As the growing of dynamic business
requirements, the operational values of service level agility, scaling and
availability of resources are the more focusing components. However,
enterprises are needed to deliver the data with atmost desired security value to
its genuineness users. All the client level processes are initiated by verifying the
strong security level access parameters. So, it is important to process the data
migration with the adopted cloud vendors. Lots of securitybreachesarecausing
the data level protection in the service access environment. The proposed work
will implement the secured transformation user’s data, applications, and
resources to the desired virtual set-up in order to strengthen the customer’s
application. The approach will be used to finding the service adoption by
verifying the level of service guaranty with the cloud vendor adoption.
KEYWORDS: Data migration, Cloud adoption, cloud vendor, data segmentation,
cloud service provider, Virtual set-up, cloud client, Security breaches.
1. Introduction
Cloud framework has the challenges for fundamentals of
security which are isolation and segmentation. Moving
applications and data from fully self-controlled to third
party-controlled realms poses a significant cyber security
concern to most enterprises. IT and security teams
rigorously assess applications on a case by case basis before
they are moved to the cloud – especially applications which
create, process, and store sensitive data. As a best practice
for cloud adoption, the less criticalapplicationsaremoved to
the cloud first, with the assumption that this reduces the
security risk and allows gaining experience..Attackerstoday
use sophisticated techniques, not only to steal data, but also
to compromise the systems to create bot networks. This
eventually robs the enterprise with excessive cloud billing
and potentially opens the door to access more sensitive
applications which are on-premise. These are some of the
reasons why cloud adoption is a slow and carefulprocessfor
most enterprises.
2. Literature Study
An author Paulo Rupino da Cunha, et.al, “Avoiding Lock-In:
Timely Reconfiguration of a virtual cloud Platformon Topof
Multiple PaaS and IaaS Providers”. This paper has mainly
focused on virtual cloud platform creation for multiple level
of PaaS and IaaS service provider. All the lock-incontrols are
reconfigured with cloud underlying architecture. [1]
Zhengping Liang et.al, “Security of virtual working
on cloud computing platform”. This paper has implemented
the security metrics for the various cloud user applications.
Determined the virtual set-up process for all the cloud
service provider data sources. [2]
Pongsakorn U-chupala et. al, “An implementation of a multi-
site virtual cluster cloud”. This paper proposed a novel
approach of multi site user application transformed to the
virtual cluster groups by specifying the access level policies,
data protection in the service platform.[3]
So, from the analysis of background work all the security
level implementations were considered and processed into
the different cloud adoption. There arenospecificstandards,
access policies are formed for the data migration.
3. Proposed Work
Accelerating the cloudapplicationtothemicrosegmentation
will process the application, data level functions the digital
transformation level to mitigate the security policies with
the compromising security parametric values. The various
client service specific applications were examinedunderthe
machine –critical applications and finding the enterprises to
secure the entire client level resources tobesegmented with
the cloud user adoption level. External threats also to be
IJTSRD23094
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 857
notified with the security perimeter control to process and
regulate the traffic between the access policies. Internal
networks, technologies are combined with the data
segmentation policy level to produce the application
migration and content specific process over the
transformation levels.
The following are the needs for transforming data to the
virtual setup for the cloud user and enterprise applications
which is listed below:
Modernize Current IT asset base
Prepare for future needs
Lower infrastructure costs
Increase Business agility
Disaster Recovery Security
The major concern for transformation of data to the virtual
setup is data gravity. The cloud infrastructure will explicitly
specify the data abstraction for the user applications.
Integration of business segments to the varioususergroups.
It also finds the customized time factor for transforming of
any client level resources to the virtual environment.
Fig: 1 proposed system architecture
An above diagram will (fig1) depicts the functional process
of iterating the applications and client’s data in the
virtualized environment. All the genericprocesswillanalyze
the micro level segmentation task in thecloud infrastructure
platform to specify the level of segmented data usage.
4. Implementation Work
Customizing the data integration among the cloud vendors
will specify to locate the users application in the secured
platform by maintaining the data management policies and
application mobility and also improving the governance.
The main issue is that every application complicates data
management by introducing elements of application logic
into the data management tier, and each one is indifferentto
the next data use case. Business processes use data in
isolation and then output their own formats, leaving
integration for the next process. Therefore, application
design, data architecture, and business processes must all
respond to each other, but often one of these groups is
unable or unwilling to change. This forces application
administrators to sidestep ideal and simple workflows,
resulting in suboptimal designs. And, although the
workaround may have been necessary at the time, this
technical debt must eventually be addressed during data
migration or integration projects
Fig: 2 Process of Data migration in Virtual set-up
All the generic process is built on the application
environment and identification of client level security
parameters are evaluated with the virtual key ID values.
However, entire transaction of client’s information is also
migrated with the specific cloud vendor platform. The
following are the various strategicprocessesareverified and
demonstrated in the virtualized environment. The key
logger’s data has been identified by encrypting the correct
key values in the client access platform. The following table
shows the sample identified results for the application
transformation to the virtual setup which is listed below:
Service
Process ID
Migrated
Environment
Cloud
adoption
status
Process
efficiency
(%)
ID –709 AWS Processd 89.23
ID - 15.267 GAE optimizd 94.3
ID - 53.083 Sales force verified 97.16
ID –67.1
Microsoft
Azure cloud
processd 99.03
ID –48.2 EC2 Processd 99.42
Table: 1 depicting the migration process outcome
The above table process the significant role of application
migration to the requested user access zone. All the generic
processes are evaluated under the desired service
environment. This table show that, how the migration has
taken place for the various service access platforms.
5. Experimental Results
The user application process isdemonstratedfor the various
migration policies to evaluate the service migrationprocess.
Segmented data has been adapted to the cloud vendor
location and process the migration level access constraints
along the service environment.Toenabletheserviceprocess
for the various cloud user applications virtualized
environment credentials are investigated with the specific
user level access information.
Fig: 3 Process of Transformation of user application to the
virtual environment
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 858
6. Conclusion
From the migration perspective all the user access level
constraints are verified for the applications transformation
to the virtualized environment. All the security components
are iterated with the specific functional parameters for
segmenting the data into the concern and schematic cloud
adoption mechanism.
References:
[1] Paulo Melo ; Catarina FerreiradaSilva, :AvoidingLock-
In: Timely Reconfiguration of a virtual cloud Platform
on Top of Multiple PaaS and IaaS Providers”,
International conference on Cloud Computing, Year:
2013, Pages: 970 – 971
[2] ZhengpingLiang ; SongsongJia ; JianyongChen ; Pengfu
Chen, “Security of virtual working on cloud computing
platform”,2012 IEEE Asia Pacific cloud Computing
Congress (APCloudCC),Year: 2012, Pages: 72 – 75
[3] Pongsakorn U-chupala ; Putchong Uthayopas ; Kohei
Ichikawa ; Susumu Date ; Hirotake Abe, “An
implementation of a multi-site virtual cluster cloud ”,
The 2013 10th International Joint Conference on
Computer Science and Software Engineering (JCSSE),
Year: 2013, Pages: 155 - 159
[4] Qi Zhang ; Ling Liu ; Calton Pu ; Qiwei Dou ; Liren
Wu ; Wei Zhou, “A Comparative Study of Containers
and virtual Machines in Big Data Environment”,2018
IEEE 11th International Conference on
Cloud Computing (CLOUD), Year: 2018, Pages: 178 –
185
[5] Subhadra Bose Shaw ; Jay Prakash Kumar ; AnilKumar
Singh, “Energy-performance trade-off through
restricted virtual machine consolidation in cloud data
center”, 2017 International Conference on Intelligent
Computing and Control (I2C2), Year:2017, Pages: 1 – 6
[6] Fanqiang ; Xiaoxia Xu ; Libo cui, “The research about
modeling technology of irregular virtual reality scene
based on point cloud data”, 2010 International
Conference on Computer Application and System
Modeling (ICCASM 2010), Year: 2010 , Volume: 6
Pages: V6-538 - V6-541
[7] D. Maria Manuel Vianny ; M. Aramudhan ; G.
Ravikumar, “Effective binary cuckoo search
optimization based cloud brokering mechanism
on cloud”, 2017 International Conference on IoT and
Application (ICIOT), Year: 2017, Pages: 1 - 8

More Related Content

PDF
IRJET- Efficient and Secure Data Storage in Cloud Computing
PDF
Abstraction and Automation: A Software Design Approach for Developing Secure ...
PDF
Cloud Computing: Overview & Utility
PDF
Addressing the cloud computing security menace
PDF
Paper id 27201433
PDF
360º Degree Requirement Elicitation Framework for Cloud Service Providers
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Enhanced security framework to ensure data security
IRJET- Efficient and Secure Data Storage in Cloud Computing
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Cloud Computing: Overview & Utility
Addressing the cloud computing security menace
Paper id 27201433
360º Degree Requirement Elicitation Framework for Cloud Service Providers
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security

What's hot (19)

PDF
Overview of cloud computing architecture service
PDF
Overview of cloud computing architecture
PDF
A Novel Computing Paradigm for Data Protection in Cloud Computing
PDF
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
PDF
Authenticated and unrestricted auditing of big data space on cloud through v...
PDF
IRJET- Deduplication of Encrypted Bigdata on Cloud
PDF
IRJET- Effective Privacy based Distributed Storage Structure
PDF
Addressing Security Issues and Challenges in Mobile Cloud Computing
PDF
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
PDF
Advanced resource allocation and service level monitoring for container orche...
PDF
Smart and Secure Healthcare Administration over Cloud Environment
PDF
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
PPTX
A study on security issues in cloud based e learning
PDF
50120140503020
PDF
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
PDF
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
PDF
Toward Cloud Computing: Security and Performance
PDF
IRJET- Secure Cloud Storage through Dual Protection
Overview of cloud computing architecture service
Overview of cloud computing architecture
A Novel Computing Paradigm for Data Protection in Cloud Computing
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
Authenticated and unrestricted auditing of big data space on cloud through v...
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Effective Privacy based Distributed Storage Structure
Addressing Security Issues and Challenges in Mobile Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Advanced resource allocation and service level monitoring for container orche...
Smart and Secure Healthcare Administration over Cloud Environment
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
A study on security issues in cloud based e learning
50120140503020
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
Toward Cloud Computing: Security and Performance
IRJET- Secure Cloud Storage through Dual Protection
Ad

Similar to Transforming the Data into Virtual Set Up Segmented usage and Adoption (20)

PPTX
Navigating Cloud Trends in 2024 Webinar Deck
PPT
How to Get Cloud Architecture and Design Right the First Time
PDF
Implementing a Solution to the Cloud Vendor Lock-In Using Standardized API
PPTX
Key Capibilities.pptx
PDF
Leverage the Power of SAP HANA with Microsoft Azure Cloud Migration
PDF
Pragmatic Enterprise Application Migration to AWS
PDF
Virtual Machine Migration and Allocation in Cloud Computing: A Review
PDF
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
PDF
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
PPTX
Impact of cloud services on software development life
PPTX
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
DOCX
The Journal of Systems and Software 120 (2016) 31–69 Conte.docx
PDF
Challenges in Cloud Migration & Solutions
PPTX
Simplify Cloud Migration to AWS with RISC Network’s Complete App Analysis
PDF
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
PDF
Velostrata cloud migration --Whitepaper
PDF
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
PPTX
Securing your Cloud Deployment
PDF
Software Infrastructure Design, Integration, & Migration Roadmap
Navigating Cloud Trends in 2024 Webinar Deck
How to Get Cloud Architecture and Design Right the First Time
Implementing a Solution to the Cloud Vendor Lock-In Using Standardized API
Key Capibilities.pptx
Leverage the Power of SAP HANA with Microsoft Azure Cloud Migration
Pragmatic Enterprise Application Migration to AWS
Virtual Machine Migration and Allocation in Cloud Computing: A Review
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
Impact of cloud services on software development life
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
The Journal of Systems and Software 120 (2016) 31–69 Conte.docx
Challenges in Cloud Migration & Solutions
Simplify Cloud Migration to AWS with RISC Network’s Complete App Analysis
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Velostrata cloud migration --Whitepaper
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Securing your Cloud Deployment
Software Infrastructure Design, Integration, & Migration Roadmap
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Basic Mud Logging Guide for educational purpose
PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
O5-L3 Freight Transport Ops (International) V1.pdf
O7-L3 Supply Chain Operations - ICLT Program
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Microbial diseases, their pathogenesis and prophylaxis
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Sports Quiz easy sports quiz sports quiz
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial disease of the cardiovascular and lymphatic systems
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf
RMMM.pdf make it easy to upload and study
Basic Mud Logging Guide for educational purpose
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Transforming the Data into Virtual Set Up Segmented usage and Adoption

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 856 Transforming the Data into Virtual Set-Up Segmented usage and Adoption Dr. R. Poorvadevi Assistant Professor, CSE Department, SCSVMV University, Kanchipuram, Tamil Nadu, India How to cite this paper: Dr. R. Poorvadevi "TransformingtheDatainto Virtual Set-Up Segmented usage and Adoption" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-3 , April 2019, pp.856-858, URL: https://www.ijtsrd.c om/papers/ijtsrd23 094.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the CreativeCommons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT In digitalized environment, heterogeneous users are host and deploy their applications as a digital transformation. As the growing of dynamic business requirements, the operational values of service level agility, scaling and availability of resources are the more focusing components. However, enterprises are needed to deliver the data with atmost desired security value to its genuineness users. All the client level processes are initiated by verifying the strong security level access parameters. So, it is important to process the data migration with the adopted cloud vendors. Lots of securitybreachesarecausing the data level protection in the service access environment. The proposed work will implement the secured transformation user’s data, applications, and resources to the desired virtual set-up in order to strengthen the customer’s application. The approach will be used to finding the service adoption by verifying the level of service guaranty with the cloud vendor adoption. KEYWORDS: Data migration, Cloud adoption, cloud vendor, data segmentation, cloud service provider, Virtual set-up, cloud client, Security breaches. 1. Introduction Cloud framework has the challenges for fundamentals of security which are isolation and segmentation. Moving applications and data from fully self-controlled to third party-controlled realms poses a significant cyber security concern to most enterprises. IT and security teams rigorously assess applications on a case by case basis before they are moved to the cloud – especially applications which create, process, and store sensitive data. As a best practice for cloud adoption, the less criticalapplicationsaremoved to the cloud first, with the assumption that this reduces the security risk and allows gaining experience..Attackerstoday use sophisticated techniques, not only to steal data, but also to compromise the systems to create bot networks. This eventually robs the enterprise with excessive cloud billing and potentially opens the door to access more sensitive applications which are on-premise. These are some of the reasons why cloud adoption is a slow and carefulprocessfor most enterprises. 2. Literature Study An author Paulo Rupino da Cunha, et.al, “Avoiding Lock-In: Timely Reconfiguration of a virtual cloud Platformon Topof Multiple PaaS and IaaS Providers”. This paper has mainly focused on virtual cloud platform creation for multiple level of PaaS and IaaS service provider. All the lock-incontrols are reconfigured with cloud underlying architecture. [1] Zhengping Liang et.al, “Security of virtual working on cloud computing platform”. This paper has implemented the security metrics for the various cloud user applications. Determined the virtual set-up process for all the cloud service provider data sources. [2] Pongsakorn U-chupala et. al, “An implementation of a multi- site virtual cluster cloud”. This paper proposed a novel approach of multi site user application transformed to the virtual cluster groups by specifying the access level policies, data protection in the service platform.[3] So, from the analysis of background work all the security level implementations were considered and processed into the different cloud adoption. There arenospecificstandards, access policies are formed for the data migration. 3. Proposed Work Accelerating the cloudapplicationtothemicrosegmentation will process the application, data level functions the digital transformation level to mitigate the security policies with the compromising security parametric values. The various client service specific applications were examinedunderthe machine –critical applications and finding the enterprises to secure the entire client level resources tobesegmented with the cloud user adoption level. External threats also to be IJTSRD23094
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 857 notified with the security perimeter control to process and regulate the traffic between the access policies. Internal networks, technologies are combined with the data segmentation policy level to produce the application migration and content specific process over the transformation levels. The following are the needs for transforming data to the virtual setup for the cloud user and enterprise applications which is listed below: Modernize Current IT asset base Prepare for future needs Lower infrastructure costs Increase Business agility Disaster Recovery Security The major concern for transformation of data to the virtual setup is data gravity. The cloud infrastructure will explicitly specify the data abstraction for the user applications. Integration of business segments to the varioususergroups. It also finds the customized time factor for transforming of any client level resources to the virtual environment. Fig: 1 proposed system architecture An above diagram will (fig1) depicts the functional process of iterating the applications and client’s data in the virtualized environment. All the genericprocesswillanalyze the micro level segmentation task in thecloud infrastructure platform to specify the level of segmented data usage. 4. Implementation Work Customizing the data integration among the cloud vendors will specify to locate the users application in the secured platform by maintaining the data management policies and application mobility and also improving the governance. The main issue is that every application complicates data management by introducing elements of application logic into the data management tier, and each one is indifferentto the next data use case. Business processes use data in isolation and then output their own formats, leaving integration for the next process. Therefore, application design, data architecture, and business processes must all respond to each other, but often one of these groups is unable or unwilling to change. This forces application administrators to sidestep ideal and simple workflows, resulting in suboptimal designs. And, although the workaround may have been necessary at the time, this technical debt must eventually be addressed during data migration or integration projects Fig: 2 Process of Data migration in Virtual set-up All the generic process is built on the application environment and identification of client level security parameters are evaluated with the virtual key ID values. However, entire transaction of client’s information is also migrated with the specific cloud vendor platform. The following are the various strategicprocessesareverified and demonstrated in the virtualized environment. The key logger’s data has been identified by encrypting the correct key values in the client access platform. The following table shows the sample identified results for the application transformation to the virtual setup which is listed below: Service Process ID Migrated Environment Cloud adoption status Process efficiency (%) ID –709 AWS Processd 89.23 ID - 15.267 GAE optimizd 94.3 ID - 53.083 Sales force verified 97.16 ID –67.1 Microsoft Azure cloud processd 99.03 ID –48.2 EC2 Processd 99.42 Table: 1 depicting the migration process outcome The above table process the significant role of application migration to the requested user access zone. All the generic processes are evaluated under the desired service environment. This table show that, how the migration has taken place for the various service access platforms. 5. Experimental Results The user application process isdemonstratedfor the various migration policies to evaluate the service migrationprocess. Segmented data has been adapted to the cloud vendor location and process the migration level access constraints along the service environment.Toenabletheserviceprocess for the various cloud user applications virtualized environment credentials are investigated with the specific user level access information. Fig: 3 Process of Transformation of user application to the virtual environment
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 858 6. Conclusion From the migration perspective all the user access level constraints are verified for the applications transformation to the virtualized environment. All the security components are iterated with the specific functional parameters for segmenting the data into the concern and schematic cloud adoption mechanism. References: [1] Paulo Melo ; Catarina FerreiradaSilva, :AvoidingLock- In: Timely Reconfiguration of a virtual cloud Platform on Top of Multiple PaaS and IaaS Providers”, International conference on Cloud Computing, Year: 2013, Pages: 970 – 971 [2] ZhengpingLiang ; SongsongJia ; JianyongChen ; Pengfu Chen, “Security of virtual working on cloud computing platform”,2012 IEEE Asia Pacific cloud Computing Congress (APCloudCC),Year: 2012, Pages: 72 – 75 [3] Pongsakorn U-chupala ; Putchong Uthayopas ; Kohei Ichikawa ; Susumu Date ; Hirotake Abe, “An implementation of a multi-site virtual cluster cloud ”, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE), Year: 2013, Pages: 155 - 159 [4] Qi Zhang ; Ling Liu ; Calton Pu ; Qiwei Dou ; Liren Wu ; Wei Zhou, “A Comparative Study of Containers and virtual Machines in Big Data Environment”,2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Year: 2018, Pages: 178 – 185 [5] Subhadra Bose Shaw ; Jay Prakash Kumar ; AnilKumar Singh, “Energy-performance trade-off through restricted virtual machine consolidation in cloud data center”, 2017 International Conference on Intelligent Computing and Control (I2C2), Year:2017, Pages: 1 – 6 [6] Fanqiang ; Xiaoxia Xu ; Libo cui, “The research about modeling technology of irregular virtual reality scene based on point cloud data”, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Year: 2010 , Volume: 6 Pages: V6-538 - V6-541 [7] D. Maria Manuel Vianny ; M. Aramudhan ; G. Ravikumar, “Effective binary cuckoo search optimization based cloud brokering mechanism on cloud”, 2017 International Conference on IoT and Application (ICIOT), Year: 2017, Pages: 1 - 8