You are on page 1of 47

CHAPTER 1

INTRODUCTION

Cloud Computing has been envisioned as the next generation


architecture of IT Enterprise [3]. In contract to traditional solutions,
where the IT services are under proper physical, logical and personnel
controls, Cloud Computing moves the application software and database
to the large data centers. Cloud Computing [5] Makes use of several
servers placed at various locations connected to one another by using
high speed networks. The idea governing the cloud computing is
utilization of several different servers in various locations to host
applications and data instead of using single server in one location. Cloud
computing[6] is the single largest trend in computing infrastructure
today, although commonly misunderstood or incorrectly referred to as
Grid Computing, Utility Computing or Autonomic Computing.
Although a Cloud solution may make use of these types of
backbone, Cloud Computing is a much more generalized term in which
little or no centralized infrastructure exists. Sets of loosely coupled data
centers work together achieving high utilization levels to perform.
Common task, presenting GUI interfaces to users through virtualization
or thin clients via the ‘Cloud’. Indeed Cloud Computing can be
considered to be the next natural step from Grid and utility computing.
Cloud computing is unlike grid computing, utility computing, or
autonomic computing. In fact, it is a very independent platform in terms
of computing. The best example of cloud computing is Google Apps
where any application can be accessed using a browser and it can be
deployed on thousands of computer through the Internet

1
Cloud Computing Architecture
When talking about a cloud computing [9] system, it's helpful to
divide it into two sections: the front end and the back end. They connect
to each other through a network, usually the Internet. The front end is the
side the computer user, or client, sees. The back end is the "cloud" section
of the system. The front end includes the client's computer (or computer
network) and the application required to access the cloud computing
system. Not all cloud computing systems have the same user interface.
Services like Web-based e-mail programs leverage existing Web
browsers like Internet Explorer or Firefox. Other systems have unique
applications that provide network access to clients. A cloud computing
system must make a copy of all its clients' information and store it on
other devices. The copies enable the central server to access backup
machines to retrieve data that otherwise would be unreachable. Making
copies of data as a backup is called redundancy. There are three types of
clouds are available public cloud, private cloud, hybrid cloud [7].

Public Cloud:

Open market for on demand computing and IT resources EX:


Amazon, Google, IBM...Huge adoption by SMEs and currently tested by
Enterprise

Private Cloud

The cloud infrastructure is operated solely for a single


organization. It May be managed by the organization or a third party, and
may exist on-premises or off premises .For Enterprises and Corporate
with large scale IT for their core and strategic applications.

2
Cloud Hybrid
The cloud infrastructure is a composition of two clouds (private, or
public) that remain unique entities but are bound together by standardized
or proprietary technology that enables data and application portability
(e.g., cloud bursting for load-balancing between clouds).

Hybrid Cloud = Private Cloud with connections to Public Cloud

1.1 Project Overview

In this project we are using private cloud [10] to implement the


world-wide baking. Here the administrator can able to create the new
users, and create the branches in various countries. In each country one
main branch is created and sub branches
Administrator has the rights to deposit the user amount where the
customer can able to deposit in any countries branch to their account by
using their account number. Then the admin can able to see country-wise
Report, branch-wise report, overall transaction.
For user creation the user must have passport, national id and a
reference account holder to create account in our bank services. User
creation will be handled by the administrator.
When creating branches in country. It have double layer
authentication. The second level admin creating the branch and it will go
for first level admin’s permission. First level admin is able to permit the
branch to create. Then only the branch will be created
Users can able to transfer the money from their account to
anybody’s account for that they must login with their userid and
password. And they can also able to change their personal information
and passwords and they can also see their transaction details.

3
Corporate banking is also available. Companies also transfer and
maintain their accounts.

1.2 Organization Profile


Top Bean Technologies is a Custom software development firm.
Top Bean has a strong focus on Research and Development and works
with several leading edge technologies to offer superior products to its
customers. The company’s vision is to be a global partner of first choice
for our customers with leadership in select areas.
We are determined to grow as a focused & innovative player. The
company offers full cycle custom software development, product idea,
offshore development centre to outsourcing support and enhancements
and also they provide space for web site at low cost, web designing, web
hosting, Search Engine Optimization, Site Maintenance .
The company offers more than 500 different ideas under a
variety of categories like Grid Computing, Data Mining & Ware
housing, and Home Automation & Security etc…Some of their products
are used in schools, browsing centre, hospitals.
Some of their clients are
• KONGU Institutions
• Kalaimagal Institutions
• Ferro Trading India.
• Trade India fairs etc…

4
1.3 System Configuration:

1.3.1 Server Configuration:

Hardware Requirement:

Processor : Intel XEON processor


Memory : 420GB
RAM : 17.1GB (2 virtual cores)

Software Requirement:

Operating System : Windows Server 2003/2008


Language : ASP.NET
Back End : SQL Server 2005

1.3.2 Client Configuration:

Hardware Requirement:

Processor : Pentium IV
Hard Memory : 40GB
RAM : 1GB
Monitor : Samsung 15 color
Keyboard : 118 keys
Mouse : Logitech

Software Requirement:

Operating System : Windows XP


Package : Ms Office
Browser : Mozilla, Opera.etc...

5
1.4 Programming Environment:

1.4.1 Asp.Net:

ASP.NET is a part of the .NET Framework [2], a new


computing platform from Microsoft optimized for creating applications
that are highly distributed across the Internet. Highly distributed means
that the components of the application, as well as the data, may reside
anywhere on the Internet rather than all being contained inside one
software program somewhere. Each part of an application can be
referenced and accessed using a standard procedure ASP.NET is the part
that provides the features necessary to easily tie all this capability
together for coherent web-based applications. It is a programming
framework, and one of the primary differences between it and traditional
ASP is that it uses a Common Language Runtime (CLR) capable of
running compiled code on a web server to deploy powerful wed-based
applications.

ASP.NET still use HTTP to communicate to the browser and back,


but it brings added functionality that makes the communication process
much richer. If any files have the appropriate extension or contain code,
the server routes those files to ASP.NET for processing prior to sending
them out to the client. The script or code is then processed and the
appropriate content is generated for transmission back to the
browser/client. Because processing takes place before the results are
delivered to the user, all manner of functionality can be built-in such as
database access, component usage and the ordinary programmatic
functionality available with scripting languages.

6
ASP.NET applications [10] can be coded using a plain text edited
such as notepad, although this not the most efficient method to use.
Developing all the other resources that might be required for a particular
ASP.NET application, especially for the user interface, may involve
range of specialized tools including image-editing programs, database
programs and HTML editors.

• ASP.NET also enables you to separate HTML design from the data
retrieval mechanism. Therefore changing the HTML deign does
not affect the program that retrieve data from the databases.
Similarly, server-side scripting ensures that changing data sources
does not require a change in HTML documents.

• ASP.NET has a number of advance features that help you develop


robust web applications. The advance features of ASP.NET are
based on the .NET Framework.

1.4.1.1 Features

• Compiled Code - Code written in ASP.NET [10] is compiled


and not interpreted. This makes ASP.NET applications faster to
execute than other server- side scripts that are interpreted, such as
scripts written in a previous of ASP.

• Enriched Tool Support - The ASP.NET Framework is provided


with a rich toolbox and designer in VS.NET IDE (Visual Studio
.NET integrated development environment). Some of the features
of this powerful tool are the WYSIWTG (What You See Is What
You Get) editor, drag-and-drop server controls and automatic
deployment.

• Power and Flexibility - ASP.NET applications are based on


Common Language Runtime (CLR).

7
• Simplicity - ASP.NET enables you to build user interfaces that
separate application logic from presentation content. In addition,
CLR simplifies application development by using managed code
services, such as automatic reference counting and garbage
collection.

• Manageability - ASP.NET enables you to manage Web


application by storing the configuration information in an XML
file. You can open the XML file in the visual Studio .NET IDE.

• Scalability - ASP.NET has been designed with scalability in mind.


It has features that help improve performance in a multiprocessor
environment.

• Security - ASP.NET provides a number of options for


implementing security and restricting user access to a web
application. All these options are configured within the
configuration file.

1.4.1.2 IIS- Internet Information Service:

The most important server [2] you can install is internet


information server (IIS) because you will need it to run your ASP.NET
applications. There a number of other servers specifically designed to
work with the .NET Framework.

1.4.2 .Net Framework:

ASP.NET, which is the .NET version of ASP [2], is built on


Microsoft .NET Framework. Microsoft introduced the .NET Framework
to help developers create globally distributed software with Internet
functionality and interoperability.ASP.NET application include WEB
Forms, configuration files and XML, web service files. Web forms enable

8
you to include user interfaces, such as Textbox, listbox controls and
application logic of Web applications, and configuration files enable you
to store the configuration settings of an ASP.NET application. The
elements of an ASP.NET application also include Web service to provide
a mechanism for programs to communicate over the Internet.

1.4.3 Sql-Server:

SQL Server is an enterprise-scale [11], industrial strength,


relational database management solution. It contains all the features
expected of high-end DBMS systems, as well as XML support.
Sql Server 2005:
Microsoft SQL Server [1] is a relational database management
system (RDMS) produced by Microsoft. Its primary query language is
Transact-SQL, an implementation of the ANSI/ISO standard Structured
Query Language (SQL) used by both Microsoft and Sybase. SQL Server
is commonly used by businesses for small-to-medium-sized databases,
but the past five years have been greater adoption of the product for
larger enterprise databases.
The SQL Server 2005 data engine lies at the core of this enterprise
data management solution. In addition to providing support for relational
databases or XML, SQL Server 2005 combines the best in analysis,
reporting, integration and notification. This enables your team to build
and deploy cost effective BI solutions with which they can drive data into
every corner of your business though scorecards, dashboards, web
services and mobile devices
Close integration with Visual Studio, the Microsoft Office System,
and a suite of new development tools, including the business Intelligence
Development Studio, sets SQL Server 2005 apart. Whether you are a

9
developer, database administrator, information worker, or decision
maker, SQL Server 2005 provides innovative solutions that help you gain
more value from your data whether stored in a relational database or
XML data format.SQL Server 2005 provides an end-to-end development
environment that includes many new technologies that empower
developers and significantly increase their productivity.
The following are the features of SQL Server 2005
• Build, deploy, and manage enterprise applications
that are more secure scalable and reliable.
• Maximize IT productivity by reducing the
complexity of building, deploying, and managing
database applications.
• Share data across multiple platforms, applications
and devices to make it easier to connect internal and
external systems.
• Simplify the integration of back-end systems and
data transfer across firewalls.
• Web developers can access data using XML
without relational database programming, while database
administrators can easily manipulate data in XML format
using Transact-SQL (T-SQL) and stored procedure.

1.4.4. Ado.Net:

ADO.NET is all about data access [11]. Data is generally stored in


a relational database in the form of related tables. Retrieving and
manipulating data directly from a database requires the knowledge of
database commands to access the data.

10
1.4.4.1. Features of Ado.Net:

1. Disconnected data architecture- ADO.NET [11] uses the

disconnected data architecture. Applications connect to the


database only while retrieving and updating data.
2. Data cached in datasets- A dataset is the most common
method of accessing data since it implements a disconnected
architecture.
3. ADO.NET supports scalability by working with datasets.
Datasets operations are performed on the datasets instead of
on the database.
4. Data transfer in XML format- XML is the fundamental format

for data transfer in ADO.NET. Data is transferred from a


database into a dataset and from the dataset to another
component by using XML.
5. Interaction with the database is done through data commands
– All operations on the database are performed by using data
commands. A data command can be a SQL statement or a
stored procedure.

11
CHAPTER 2

THEME OF THE PROJECT

2.1 System Review:

2.1.1 Existing System:

In Existing System the banking operations are implemented within


country that is nationalized banks. It is hard to store large amount of data
in the server. Even though the server is capable of store large amount of
data the retrieval time is large. There may be server crash and loss of
data. We want to maintain large amount of server’s space and number of
servers required is also increased.

2.1.2 Proposed System:

In Proposed System we are using cloud computing concept to


implement banking process. Cloud computing offers large amount of
storage by combining large data warehouses. So we can able to store
large amount of data.

So here we are implementing world-wide banking. Compared to


existing system cloud servers is support fast access of data. It always
provides correctness of user data. Cloud servers are automatically backup
the server data to the virtual workspace, so data loss is avoided. Cloud
disaster recovery scheme are under development so data’s are never
losses.

Data storage security is essential in the banking process. So here


we are implementing private cloud. So the data’s are secured and
accessed within the organization. Hackers list is maintained to track those
who are trying to access others bank accounts.

12
2.2 Feasibility Study:

Feasibility study is about the viability of a system [4]. The


proposed system has to be examined for its technical, economical and
operational feasibility.

2.2.1 Economic Feasibility:


Cloud computing [4] is cost-effective. Here, cost is greatly reduced
as initial expense and recurring expenses are much lower than traditional
computing

2.2.2 Technical Feasibility:


The Possibility that the organization can procure the necessary
resources [4] is available. This is demonstrated if the needed hardware
and software are available in the marketplace or can be developed by the
time of implementation. In this project we use normal Pentium IV
system. All other technical resources are available in the marketplace.
The cloud works in the ‘distributed mode’ environment. It shares
resources among users and tasks, while improving efficiency and agility
(responsiveness). Cloud is characterized by features such as platform,
location and device independency, which make it easily adoptable for all
sizes of businesses, in particular small and mid-sized.

2.2.3 Operational Feasibility:


The stakeholders include management, employees, customers, and
suppliers. The stakeholders are interested in systems that are easy to
operate, make few, if any, errors, produce the desired information, and
fall within the objectives of the organization [4]. Another important
characteristic of cloud is scalability, which is achieved through server
virtualization.

13
2.3 System Design:
2.3.1 Database Design:
A database is a collection of interrelated data stored with minimum
redundancy to serve many users quickly and efficiently. The general
objective of database design is to make the data access easy, inexpensive
and flexible to the user.
Database design is used to define and then specify the structure of

business used in the client/server system. A business object is nothing but

information that is visible to the users of the system. The database must

be normalized one.

Data Normalization:
The entities along with their attributes can be stored in many

different ways into a set of tables [1]. The methods of arranging these

attributes are called normal forms. The theory behind the arrangement of

attributes into table is known as normalization theory. It helps in,

• Minimization of duplication data.

• Providing flexibility to support different functional requirements.

• Enabling the model to be translated to database design.

All relations in a relational database are required to satisfy the

following condition, every value in a relation each attribute value is

atomic so far as system is concerned. Advantage of normalization is,

• Helps in reduction in the complexity of maintaining data integrity

by removing the redundant data.


14
• It reduces inconsistency of data

Table 2.1 Admin Table

Field Name Data Type-Size Description Constraint


Id AutoNumber(2) Admin id number Primary Key

Userid Text(10) User identification Not null

Dateofcreation Date Date of user Not null


creation
Table 2.2 Country Details

Field Data Type Description Constraint


Name
Cid AutoNumber Country identification number Primary Key
Cname Text(20) From admin new country name Not null

Ccode Number (20) Created country code of the branch Not null
Address Text (20) Created address of the country Not null
Area Text (20) Brach area of the created country Not null
City Text (15) City name of the branch in the country Not null
State Text (15) State name of the branch in the country Not null
CManager Text (15) Chief manager of the branch Not null
Manager Text (15) Manage of the branch in the country Not null
Cperson Text (15) Contact Person of the branch Not null

BranchAu Text (15) Branch created authentication person Not null

15
Table 2.3 Country Hacker

Field Name Data Type Description Constraint


Hid AutoNumber Hacker identification Number PrimaryKey
userID Text (10) User identification for identification Foreign Key
Userpwd Text (10) Tried Password from the other user Not null
Attacktime Text (10) Time of the attach from other user Not null
Attackdate Date Date of the attach from other user Not null
IP Text(10) Attackers system ip address Not null

Table 2.4 Transaction Details

Field Name Data Type Description Constraints


Tid AutoNumber AutoNumber Primary Key
Transid Number (16) Identification number Not null
FromAccno Number (16) From the account number transacted Not null
Fromaccmode Text From the account type transacted Not null
ToAccno Number (16) To the account number transacted Not null

Toaccmode Text To the account type transacted Not null


TransTime Number (10) Transacted time Not null
TransDate Date/Time Transacted date Not null
Transamount Number (16) Transacted Amount Notnull

16
Table 2.5 Customer Account Details
Field Name Data Type Description Constriant
Caid AutoNumber Customer account number Primay Key
CustomerID Text (10) Customer id number Not null
BranchCode Text (5) Branch code of the customer Not null
CardNum Number (16) Credit card number Not null
CRVNum Number (4) CRV number of the credit card Not null
Accno Number (12) Account number of the customer Not null
AccountType Text (10) Account type of the customer Not null
Debitbalance Number (10) balance in the debit account Not null
CreditBalance Number (10) balance of the credit account Not null
ExistAccount Number (15) Referred customer account number Not null
ExistBankName Text (15) Referred customer Bank name Not null
ExistOtherBank Text (15) Other banking details for customer Not null
ExistAcctype Text (10) Account type of the customer Not null
ReferalName Text (15) Name of the existing customer Not null
Dateofcreation Date/Time Date/Time of the account creation Not null
Username Text (15) Username of the existing customer Not null
Psw Text Password of the existing customer Not null

17
Table 2.6 Customer Personal Information

Field Name Data Type Description Constriant


Cpid AutoNumber Customer personal id auto number PrimaryKey
Accno Number (15) Account number for the customer Foreign Key
CardNum Number (15) credit card number of the customer Not null
Customerid Number (15) Transaction id number Not null
CrvNum Number (15) Transaction CRV number Not null
Fname Text(20) First name of the customer Not null
Lname Text (20) last name of the customer Not null
Address Text (20) Full address of the customer Not null
Country Text (20) Country details of the customer Not null
Pcod Number (15) Pin code of the area of customer Not null

PhoneNum Number (15) phone number of the customer Not null


Voterid Number (15) Voter id number of the customer Not null
Did Text (15) Driving license no of the customer Not null
Pancard Text (15) Pancard number of the customer Not null
Passportid Text (20) Passport details of the customer Not null
PassportNum Number (20) Passport number of the customer Not null
Email Text (25) Valid email id of the customer Not null
SecurityQues Text (25) Security question Not null
SecureAnswer Text (15) Security answer Not null
Dateofcreation Date/Time Date/Time Not null
Gender Text (5) Gender of the customer Not null
Username Text (15) username of the customer Not null
Userpassword Text (15) password of the customer Not null

2.3.2 Dataflow Diagram:

Level 0: Login Process


ENTER AUTHENTICATION NAVIGATE
LOGI USERID, SUCCESSFUL HOME
N PASSWORD PAGE

CLOUD
18
SERVER ADMIN
(CLOUD TABLE
DATABASE)
Fig. 2.1 Login Process

Level 1: Cloud Formation

ENTER COUNTRY MAIN VALIDATION


ADMIN AND SUB BRANCH SUCCESSFUL
DETAILS

CLOUD
UPDATE SERVER
COUNTRY (CLOUD
TABLE DETAILS DATABASE)

Fig. 2.2 Cloud Formation

Level 2: User Creation

ENTER ACCOUNT AND VALIDATION


ADMIN SUCCESSFUL
PERSONAL DETAILS

CLOUD
UPDATE USER SERVER
(CLOUD
PERSONAL AND 19
DATABASE
ACCOUNT TABLE )
DETAILS
Fig. 2.3 User Creation

Level 3: Money Deposit

ENTER CUSTOMER NAME VALIDATION


ADMIN SUCCESSFUL
AND ACCOUNT NUMBER

CLOUD
UPDATE THE SERVER
AMOUNT TO (CLOUD
TRANSACTION DATABAS
AND CUSTOMER E)
TABLE

Fig. 2.4 Money Deposit

Level 4: Money Transfer

ENTER USER NAME VALIDATION


USER SUCCESSFUL
AND PASSWORD

UPDATE THE CLOUD


AMOUNT TO SERVER
TRANSACTION (CLOUD 20 VALIDATION
NAME AND ACCOUNT
DATABA NUMBER
AND SUCCESSFUL
SE) OF WHOM WE TRANSFER
CUSTOMER
TABLE
Fig. 2.5 Money Transfer

Level 5: Personal & Corporate Banking

VIEW AND CHANGE


ENTER USER NAME
USER ACCOUNT
CREATE AND
STATE
AND PASSWORD CREATE COUNTRY PERSONAL DETAILS
MAIN BRANCH

BRANCH CREATE SUB


AUTHORIZATION BRANCH

LOGIN
VIEW HACKER LIST
STORE
CLOUD COUNTRY
UPDATE THE SERVER DETAILS
CUSTOMER (CLOUD
CHANGE ADMIN PASSWORD
TABLE DATABASE)

HACKER
VIEW COUNTRY AND BRANCH LIST LIST

UPDATE
PASSWORD
CREATE USER

Fig. 2.6 Personal & Corporate Banking


MONEY DEPOSIT

Level 6: Overall DFD Diagram


STORE ADMIN
VIEW PERSONAL BANKING DEPOSIT TABLE

VIEW CORPORATE BANKING DEPOSIT

CLOUD SERVER
(CLOUD
UPDATION ON DATABASE)
ACCOUNT AND
CUSTOMER 21 PERSONAL
ACCOUT DETAILS
DETAILS
HOMEPAGE

LOGINPERSONALBANKING

LOGIN CORPORATE BANKING

VIEW PERSONAL BANKING


TRANSACTION DETAILS

LOGIN FOR MONEY


VIEW CORPORATEBANKDETAILS TRANSFER

Fig. 2.7 Overall DFD Diagram: Admin


ENTER MONEY TRANSFER
DETAILS

MONEY TRANSFER
SUCCESSFULLY

CLOUD
SERVERS 22 UPDATE
(CLOUD TRANSACTION DETAILS
DATABASES) TO DATA BASES
Fig. 2.8 Overall DFD Diagram: User

2.4 Module Description:

Cloud Computing Modules

• Cloud Formation

• Create customer

• Money integrity

23
• Money transfer

• Personal Banking through cloud

• Corporate Banking through cloud

2.4.1 Cloud Formation:


In Cloud Formation Module it will take us to create country zone.
While creating the country we need to specify the unique country code
and code number for each and every state. According to this project we
put some limits such as country can have only 10 branches. If we try to
insert more than 10 branches it will provide a message about the limits. If
the same country code was used create a new country it will provide a
message as country code already exists error message. When proper data
was entered for the branch, bank will be creates in that particular country
successfully and an acknowledgement will be received.

2.4.2 Create Customer:


While creating the customer we need to specify various
information’s such as name, address, id proof, pan card number, passport
number, branch code, If the customer has any existing account or not, if
they have an existing account details of those account. And the referral
account holder information has to be specified. After providing all those
information when we click create customer, in the background process
we are creating the customer account number, Customer ID, Card
number, and the crv num.

2.4.3 Money Integrity:


In the Money integrity form we need to pass the account number,
name of the account holder, branch code, account mode such as credit or
debit of the person we are going to deposit. When those information’s are

24
passed successfully and we click the deposit amount button the amount
will be deposited to that account number, a message will appear for the
conformation of the deposited amount. Particular account holder bank
details will be displayed in the form.

2.4.4 Money Transfer:


In the money transfer form we need to specify the both customers
information such as account number, name of the account holder, branch
code, account mode credit or debit, and the sender has to specify the
amount of transfer. When user click transfer in the background process
the customer account balance will be checked with the transfer amount. If
the customer balance is lower than the amount specified for transfer
means an error message is specified for the user and the transaction will
be incomplete. When the user has the sufficient balance the transaction
will take place successfully the transfer amount will be reduced from the
sender amount and that amount will be added to the receiver amount.
After those process completed successfully a message will be displayed
to the user about the transaction.

2.4.5 Personal Banking through cloud:


In the personal banking the saving account holders can check there
account balance, list of transaction done by the customer, account
personal information can be edited efficiently, Each account holder will
be provided by a unique user id and password, By using their user id and
password they can view their account details as well as personal
information’s . Change password rights are provided to the customer to
make their own security password.

2.4.6 Corporate Banking through cloud:

25
In the Corporate bank the current account holder has the rights to
check there account information, list of transaction done in their account,
Account balance, Account holders personal information’s. The account
holder can view that information only with the unique user id and
password provided by the bank. The account holder has the rights to
change their password according to their wish to maintain their security.
If the account holder provides the wrong user ID or Password it will
provide an error

2.5 Testing:

Once the program exists, we must test it to see if it is free of bugs.


High quality products must meet user’s needs and expectations.
Furthermore the product should attain this with minimal or no defects, the
focus being on improving products prior to delivery rather than correcting
them after delivery [4]. The ultimate goal of building high quality
software is user’s satisfaction.

In Cloud System’s [8] we are using two familiar testing tools HP’s
LOAD RUNNER, IBM’S RATIONAL PERFORMANCE TESTER.

26
2.5.1 Testing Methodologies:

SOASTA Cloud Test is the first product [8] to be incorporated into


this methodology and extend traditional approaches to address the new
opportunities and challenges presented by cloud testing.

These include:

• Testing live web-based applications in production


• Leveraging the Cloud to test at both typical and peak traffic levels,
from hundreds of users to millions
• Responding to the acceleration of development cycle times by
making agile performance testing a realistic alternative
• Generating geographically dispersed load to most accurately
represent real-world traffic

2.5.2. Stress Testing:

This is the test of handling characteristics of the system [4]. Peak


time usage is simulated and the system is subjected to extreme conditions
to check for its vulnerability to load of operations. It verifies that the
solution delivered is capable of coping with the workload which it is
required to undertake? Load or Stress testing can be used to prove.
By using test techniques and tools which are capable of
applying huge amounts of load on the solution the Cloud can be
accurately measured and its capacity verified. The tools used for this
testing is HP’s QUICK PRO, IBM’s RATIONAL ROBOT [8].

27
2.5.3. Security Testing:

Security testing can provide the assurance that business critical


data is stored and transported safely. Techniques such as penetration
Testing can prove, that the mechanisms, which have been developed
security will remain intact during potential attempts to compromise the
cloud solutions.

2.5.4. System Testing:

Generally, testing is performed [4] to ensure that the software does


not fail and it is carried out with the explicit intention of finding errors in
the program. After the development of the system, the next step would be
test the system. So that the system could be subjected to different test to
determine the reliability of the system.

SOASTA CLOUDTEST [8] is the test tool for testing the cloud
systems entirely. This tool will work effectively under cloud
environments.

28
2.5.5 Test Cases:

Table 2.7 Test Cases for Unit Testing

TEST Test cases Input Obtained Expected


CASE
Output output
ID
1 In country creation Country code, Country already Country
module admin try Country name exist error created
to create already message will be successfully
created country displayed
branch
2 In money deposit Account number Error message Transaction
and money transfer and amount will be displayed completed
the user enter successfully
wrong account
number
3 In personal Userid,Password Error message All user
banking current will be displayed details will be
account holder try displayed
to enter

2.6 Implementation Issues:

29
While implementing cloud system main issue is security. While
using public clouds there is no security for our data. But we are using
private cloud. It is purely for a single organization purpose.

In our banking system we are using private clouds. Private clouds


are secured than public clouds but implementing this we want to form our
own clouds. Usually the cost is high. But compare to traditional banking
implementation it will be less.

` We are in internet banking so there is one main problem. Stealing


or hacking of our account. Cloud servers are effective in transferring the
data more secured way. One of the main features of Cloud computing is
secure transformation. So the data will be transferred securely and
correctly. So there is no hacking of account numbers and crv numbers.

If somebody trying to open our account their ip address and time


and date will be notified to the administrator.

CHAPTER 3

30
CONCLUSION

3.1 Conclusion:
Cloud computing (‘cloud’) is an evolving term that describes the
development of many existing technologies and approaches to computing
into something different. Cloud separates application and information
resources from the underlying infrastructure, and the mechanisms used to
deliver them.
Cloud computing brings significant promise in terms of scalability,
reliability, competitive advantage, cost reductions, simplified
maintenance and management of applications across the enterprise, along
with high availability and automation. Rated as one of the key area of
innovative implementation for enterprises, by experts and analysts, it is
expected to bring ample change in the way computing is approached in
today’s world.

Cloud computing technologies can provide banks competitive


advantage in the market, cost reductions, higher margins, simplified
maintenance and management of applications across the enterprise,
greatly extended scalability, agility, high availability, automation, large
data storages and reliable backup mechanisms.

Banks may explore use of cloud computing initially for better


performance through peak demand Though the current adoption of cloud
computing at banks is low, the benefits it assures will result in cloud
computing gaining prominence and the years ahead will see a higher
adoption rate.

3.2 Future Enhancement:

31
The system can be further enhanced by adding new features and
facilities. Abstract the hosting platform as set of virtual resources (i.e.
compute, storage, and network). Manage those resources based on
scalability and availability needs. So we can implement the Cloud
Infrastructure Services (IaaS) further. Ensure the token provisioning
identity federation and claims transformation for Security data
transformation.
Software as a service (SaaS) computing can implement the
supporting service based data integrity for huge data transformation with
secured way. More security features will be added in the system for
effective transmission.
The system will be further enhanced to provide loan facilities to the
customers.

32
APPENDIX
Screen Layouts

33
34
35
36
37
38
39
40
41
42
43
44
45
46
REFERENCES

1. Bill Hamilton (2006), “Programming SQL server 2005”,


O'REILLY.
2. Jesse Liberty, Dan Hurwitz (2006), “Programming ASP.NET”,
O'REILLY.
3. John Rittenhouse (2009), “Cloud computing: implementation,
management, and security”, CRC press.
4. Roger. S. Pressman (2006), “Software Engineering: A
Practitioner's Approach” Third (Asia) Edition by TATA McGraw HILL.
5. Tim Mather, subra Kumarasamy and shahed latif (2009),
“Cloud Security and Privacy. An Enterprise Perspective on Risks and

Compliance”, O’REILLY.
6. Toby velte, Antony Velte, Robert Elsenpeter (2009), “Cloud
computing: A practical Approach” , TATA McGraw HILL.
7. http://www.docstoc.com/docs/6533575/What-Is-Cloud.
8. http://www.docstoc.com/docs/5852681/Testing-the-cloud .
9. http://www.docstoc.com/docs/34803287/Cloud-Computing.
10. www.infosys.com/finacle/finacle-connect/Tech_Watch.doc.
11. www.w3schools.com/aspnet/default.asp.

47

You might also like