Selasa, 22 April 2014

CLOUD COMPUTING

1.    In computer networking, cloud computing is computing that involves a large number of computers connected through a communication network such as the Internet, similar toutility computing. In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time. In common usage, the term "the cloud" is essentially a metaphor for the Internet. Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy-consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything. The major models of cloud computing service are known as software as a service, platform as a service, and infrastructure as a service. These cloud services may be offered in a public, private or hybrid network. Google, Amazon, IBM, Oracle Cloud, Rackspace, Salesforce, Zoho and Microsoft Azure are some well-known cloud vendors. Network-based services, which appear to be provided by real server hardware and are in fact served up by virtual hardware simulated by software running on one or more real machines, are often called cloud computing. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object.
2.     From the above explanation of cloud computing , there are many benefits that we can take from cloud computing , namely :\ Scalability , with cloud computing we can increase our storage capacity without having to purchase additional equipment , such as hard drives , etc. . We simply add the capacity provided by the cloud computing service providers .
-      Accessibility , we can access data whenever and wherever we are , as long as we are connected to the Internet , making it easier for us to access the data when important .
-      Security , we can be assured ydata its security by cloud computing service providers , so for IT based company , the data can be stored securely in the cloud computing provider . It also reduces the cost required to secure corporate data .
-      Creator , the user can do / develop their creations or projects without having to submit their projects directly to the company , but the user can send it through the cloud computing service providers .
-      Anxiety , when a natural disaster strikes our proprietary data stored safely in the cloud even though we damaged hard drive or gadget
3.     Here is how the data storage and replication of data on the use of cloud computing technology . With Cloud Computing is no longer a local computer should run the heavy computational work required to run the application , no need to install a software package for every computer , we only perform the installation of the operating system on application  . Computer networks that make up the cloud ( Internet ) handles them instead . This server will be running all applications ranging from e - mail , word processing , to complex data analysis programs . When users access the cloud ( internet ) for a popular website , many things can happen . Users of Internet Protocol ( IP ) for example can be used to determine where the user is located ( geolocation ) . Domain Name System ( DNS ) services can then redirect the user to a server cluster that is close to the users so that the site can be accessed quickly and in their local language . The user is not logged into the server , but they login to their services using a session id or cookie that has been obtained is stored in their browser . What users see in the browser usually comes from a web server . Webservers run the software and interface presents the user with the means used to collect orders or instructions from the user ( click , type, upload , etc. ) These commands are then interpreted by webservers or processed by the application server . Information is then stored in or retrieved from a database server or file server and the user is then presented with a page that has been updated . The data is synchronized across multiple servers around the world for global access quickly and also to prevent loss of data . Web service has provided a general mechanism for the delivery of services , it            makes the service-oriented architecture ( SOA ) is ideal to be applied . The goal of SOA is to address the requirements of loosely coupled , standards-based , and protocol - independent distributed computing . In SOA , software resources are packaged as a " service , " a well-defined , self-contained modules that provide standard business functionality and context of other services . Maturity web service has enabled the creation of robust services that can be accessed on demand , in a uniform way .

4.     Cloud computing exhibits the following key characteristics:
·       Agility improves with users' ability to re-provision technological infrastructure resources.
·       Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers. Cloud computing systems typically use Representational State Transfer (REST)-based APIs.
·       Cost: cloud providers claim that computing costs reduce. A public-cloud delivery model converts capital expenditure to operational expenditure. This purportedly lowersbarriers to entry, as infrastructure is typically provided by a third party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained, with usage-based options and fewer IT skills are required for implementation (in-house). The e-FISCAL project's state-of-the-art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available in-house.
·       Device and location independence enable users to access systems using a web browser regardless of their location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.
·       Virtualization technology allows sharing of servers and storage devices and increased utilization. Applications can be easily migrated from one physical server to another.
·       Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for:
·       centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
·       peak-load capacity increases (users need not engineer for highest possible load-levels)
·       utilisation and efficiency improvements for systems that are often only 10–20% utilised.
·       Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
·       Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis in near real-time(Note, the VM startup time varies by VM type, location, os and cloud providers), without users having to engineer for peak loads.
·       Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.
·       Security can improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford to tackle. However, the complexity of security is greatly increased when data is distributed over a wider area or over a greater number of devices, as well as in multi-tenant systems shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security.
·       Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.
5.     Security in cloud computing
After exposure to the concept , technical , and architectural services builders in cloud computing , the next concern is in terms of network security information. Cloud Computing is one of the new technology remains to be seen what level of network security information. Based on the model of services in cloud computing can be seen , whether the information network security loopholes are in the service model of Software as a Service , and Platform as a Service , or , and nor does the Infrastructure as a Service .
Furthermore, the security of cloud computing can also be seen from its location on the protocols that govern data communication in the network . Protocol which is used as a reference in this paper is TCP / IP ( Transmission Control Protocol / Internet Protocol ) . 
There are many security issues surrounding cloud computing . With the technology that allows consumers to be able to access cloud services through a web browser or web services , there are three examples of security issues , namely : XML Signature Element Wrapping , Browser Security , Cloud Malware Injection Attack and Flooding Attacks.
From a research document issued by the Cloud Security Alliance 's titled Top Threats to Cloud Computing , the two security threats in cloud computing ie loss or data leakage and hijacking the account or service . Two of these threats is crucial because it affects the reputation , trust partners , employees , and customers also affecting business . Piracy accounts can also be bad if Attackers accessing a very important part of the cloud computing services , facilitate Attackers then to do things that can affect aspects of confidentiality, integrity , and availability of servicing existing service . To avoid the above types of security threats , identity management and access control are the main requirements for SaaS Cloud computing Company .
Identity Management in the cloud computing are also associated with the focus of discussion in this paper , the security of the cloud computing service model of Software as a Service it . With a detailed explanation of the components before forming a SaaS Cloud Computing is using Service Oriented Architecture ( SOA ) with Web Services standards ( XML language ) .

Identity management and access control in cloud computing Service Oriented Architecture

As defined earlier , the SOA has features that make loosely-coupled SOA is very open to security risks that can occur . Therefore, SOA must meet several key requirements to meet data security standards , among other things: service discovery , service authentication , user authentication , access control , confidentiality, integrity , availability , and privacy ( 17 ) . To ensure security in SOA development environment , which creates a community of open standards to build a web services security standard for Web services , which is known implementations of web services is the most widely used SOA . At the same time the identity management and access control in cloud computing has also arranged with the standard . 
As shown in the image above , for controlling access rights has been the adoption by the Security assertion markup language ( SAML ) and the eXtensible Access Control Markup Language ( XACML ) , meaning that when a user requests a service , the user must follow the security policies related to access control established .

SAML and Single Sign On
SAML is an XML standard for exchanging authentication and authorization of data between security domains. SAML features platform independent , and is mainly applied to the Single Sign -On ( SSO ) . Single Sign-On is one of the methods used in data security aspects of authentication and authorization on the application or cloud service . Technology Single - sign-on ( SSO ) is a technology that allows users to easily access network resources in a network using only one user account only. This technology is in high demand , especially in very large networks and heterogeneous ( in current operating systems and applications used by computers is derived from many vendors , and users are asked to fill in the information itself into each of the different platforms to be accessed by users ) . By using SSO , a user just simply attempt to authenticate only once to obtain permits access to all the services contained within the network .

SaaS Cloud Computing Security with Single Sign On in a layer Internet Protocol 

TCP / IP
From the description of the overall architecture of SaaS Cloud Computing can be mapped position SaaS Cloud Computing Security with Single Sign On in layer Internet protocol TCP / IP , so it is more clear understanding of network security information as part of a network of information science itself. Mapping architecture can be seen in the image below:

6.     Cloud Computing is the result of evolution and adoption of existing technologies and paradigms. The goal of cloud computing is to allow users to take beneļ¬t from all of these technologies, without the need for deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles.
The main enabling technology for cloud computing is virtualization. Virtualization generalizes the physical infrastructure, which is the most rigid component, and makes it available as a soft component that is easy to use and manage. By doing so, virtualization provides the agility required to speed up IT operations, and reduces cost by increasing infrastructure utilization. On the other hand, autonomic computing automates the process through which the user can provision resources on-demand. By minimizing user involvement, automation speeds up the process and reduces the possibility of human errors.
Users face difficult business problems every day. Cloud computing adopts concepts from Service-oriented Architecture (SOA) that can help the user break these problems intoservices that can be integrated to provide a solution. Cloud computing provides all of its resources as services, and makes use of the well-established standards and best practices gained in the domain of SOA to allow global and easy access to cloud services in a standardized way.
Cloud computing also leverages concepts from utility computing in order to provide metrics for the services used. Such metrics are at the core of the public cloud pay-per-use models. In addition, measured services are an essential part of the feedback loop in autonomic computing, allowing services to scale on-demand and to perform automatic failure recovery.
Cloud computing is a kind of grid computing; it has evolved by addressing the QoS (quality of service) and reliability problems. Cloud computing provides the tools and technologies to build data/compute intensive parallel applications with much more affordable prices compared to traditional parallel computing techniques.[35]
Cloud computing shares characteristics with:
·       Client–server model — Client–server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requestors (clients).[36]
·       Grid computing — "A form of distributed and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks."
·       Mainframe computer — Powerful computers used mainly by large organizations for critical applications, typically bulk data processing such as: census; industry and consumer statistics; police and secret intelligence services; enterprise resource planning; and financial transaction processing.[37]
·       Utility computing — The "packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity."[38][39]
·       Peer-to-peer — A distributed architecture without the need for central coordination. Participants are both suppliers and consumers of resources (in contrast to the traditional client–server model).
·       Cloud gaming — Also known as on-demand gaming, is a way of delivering games to computers. Gaming data is stored in the provider's server, so that gaming is independent of client computers used to play the game. One such current example, would be a service by OnLive which allows users a certain space to save game data, and load games within the OnLive server.
















Referensi :
http://en.wikipedia.org/wiki/Cloud_computing
   http://id.wikipedia.org/wiki/Komputasi_awan
http://royanafwani.wordpress.com/2011/12/22/keamanan-pada-cloud-computing/

Minggu, 13 April 2014

Penyimpanan dan Pengambilan Data Multimedia

MAKALAH

Penyimpanan dan Pengambilan Data Multimedia
Submateri
Basis data multimedia
Diajukan untuk memenuhi tugas salah satu matakuliah
Sistem Multimedia

Disususn oleh Kelompok 4 :
1.      Adji Aditya Warman
2.      Derry Priyando
3.      Nikki Oktivany Putri
4.      Yogi Fernandes
Kelas 4IA10

UNIVERSITAS GUNADARMA
2013/2014













BAB 1
PENDAHULUAN

Database adalah Representasi kumpulan fakta yang saling berhubungan disimpan secara bersama sedemikian rupa dan tanpa pengulangan (redudansi) yang tidak perlu, untuk memenuhi berbagai kebutuhan. Data perlu disimpan dalam basis data untuk keperluan penyediaan informasi lebih lanjut.
Database tersusun atas bagian yang disebut field dan record yang tersimpan dalam sebuah file. Sebuah field merupakan kesatuan terkecil dari informasi dalam sebuah database. Sekumpulan field yang saling berkaitan akan membentuk record.
Tidak dapat dipungkiri bahwa database merupakan media penyimpanan data yang paling banyak digunakan oleh aplikasi-aplikasi yang ada saat ini. Namun, semakin banyaknya aplikasi yang berhubungan dengan data multimedia maka database melakukan perkembangan dari multimedia database. Dalam makalah ini, akan dibahas tentang multimedia database.


















BAB II

PEMBAHASAN


A.    Pengertian Database
Database adalah Representasi kumpulan fakta yang saling berhubungan disimpan secara bersama sedemikian rupa dan tanpa pengulangan (redudansi) yang tidak perlu, untuk memenuhi berbagai kebutuhan. Data perlu disimpan dalam basis data untuk keperluan penyediaan informasi lebih lanjut.
Database tersusun atas bagian yang disebut field dan record yang tersimpan dalam sebuah file. Sebuah field merupakan kesatuan terkecil dari informasi dalam sebuah database. Sekumpulan field yang saling berkaitan akan membentuk record.
Tidak dapat dipungkiri bahwa database merupakan media penyimpanan data yang paling banyak digunakan oleh aplikasi-aplikasi yang ada saat ini. Namun, semakin banyaknya aplikasi yang berhubungan dengan data multimedia maka database melakukan perkembangan dari multimedia database. Dalam makalah ini, akan dibahas tentang multimedia database.
a)      Definisi Multimedia Database
Sebelum membahas multimedia database, kita harus mengetahui apa saja yang termasuk kedalam data multimedia. Data multimedia diantaranya adalah:
·         Citra.
Format Data: Data citra disimpan dalam format JPEG (Joint Picture Experts Group)
·         Audio.
·         Video.
Format Data: Data audio & video dalam format MPEG (Moving Picture Experts Group)
·         MPEG-1 menyimpan 1 menit video/audio dalam 12.5 megabytes
·         MPEG-2 menyimpan 1 menit video/audio dalam 17 megabytes.
Multimedia Database merupakan perluasan kemampuan basis data yang dapat menyimpan data tidak hanya text akan tetapi dapat berupa suara, gambar, animasi maupun data multimedia lainnya. Database Multimedia sendiri terdiri dari dua type, yaitu static dan dynamic media.
·         Static media : Text, Graphic, Image.
·         Dynamic media : Animation, Music, Video, Audio.
Hal-hal yang mempengaruhi perkembangan multimedia database adalah sebagai berikut :
1.      Penggunaan komputer semakin luas dan kemampuan komputer semakin meningkat. Selain itu berkembangnya alat alat teknologi yang bisa menangkap display multimedia seperti handicam,kamera digital, scaner dan lainnya. Ditambah lagi media penyimpanan data yang semakin besar.
2.      Jaringan komunikasi data dengan kecepatan tinggi yang sudah tersedia saat ini.
3.      Semakin banyaknya aplikasi yang berhubungan dengan data multimedia.

b)     Isi dari Multimedia Database
Sebuah MMDB harus mengatur beberapa tipe informasi yang berbeda, berkaitan dengan data multimedia yang sebenarnya. Data-data tersebut adalah:
1.      Media Data : Aktual data, dapat berupa gambar, audio, vidio yang dicapture, didigitalisasi, diproses, dikompress dan disimpan.
2.      Metadata, mendeskripsikan beberapa aspek yang berbeda dari media data:
·         Media Format Data : Berisi informasi tentang format dari media data setelah ditambah, diproses dan diencoding. Sebagai contoh, media format data terdiri dari sampling rate, resolusi, frame rate, skema encoding dan lain-lain.
·          Media keyword data : Berisi deskripsi keyword, biasanya berhubungan dengan pembuatan media data. Contohnya sebuah vidio, biasanya memiliki tanggal, waktu dan tempat merekam. Biasanya disebut juga Content Descriptive Data.
·         Media feature Data : berisi fitur jadi dari media data. Suatu fitur menenetukan media content. sebagai contoh informasi tentang distribusi warna, jenis-jenis tekstur dan perbedaan bentuk yang ditampilkan pada gambar, sering disebut disebut juga content dependent data.

c)      Struktur Multimedia Database
·         Data Analysis Multimedia
Data disimpan ke dalam database sebagai raw,registering dan descriptive data type. Raw data umumnya direpresentasikan dengan pixel dalam bentuk byte dan bit.
Contoh : dalam image dapat direpresentasikan pixel dan untukmendapatkan image ini perlu diketahui ukuran dari image.
·         Data Modeling.
Data model dikhususkan dalam konseptual design dari multimedia database untuk meng-execute operasi khusus, seperti media object selection, insertion, querying dan retrieval.
·         Data Storage Multimedia.
Data object disimpan ke dalam sebuah database. Ada dua type media, yaitu continuous media (dynamic media) dan non-continuous media (static media). Continuous media memiliki real time property dan disimpan menggunakan storage server yang terpisah sedangkan non-continuous tidak memiliki real time property dan disimpan dalam database dengan meta-information.
·          Data Retrieval
Sasaran terakhir dari MMDB adalah bagaimana mengakses informasi multimedia secara efektif. Berdasarkan tanggapan dalam pengaksesan, object mulitmedia dibagi menjadi dua yaitu object aktif dan pasif. Object aktif adalah object yang berpartisipasi dalam proses retrieval, sedangkan object pasif tidak. Dalam kenyataannya semua object MMDB seharusnya menjadi object aktif.
·         Query Language
Dalam proses DBMS query user diproses dengan mendefinisikan query language sebagai bagian dari DBMS. Multimedia query language harus memiliki kemampuan untuk meng-handle complex, spatial dan temporal relationship. Multimedia query dapat dibagi menjadi sub-group,yaitu keyword querying, semantic querying, dan visual querying.
·         Multimedia communication
Komunikasi merupakan tujuan utama dari sistem informasi.Penyebaran multimedia memungkinkan multi-user untuk berkomunikasi satu sama lain.

d)     Mendesign Multimedia Database
·         Mengatur perpedaan tipe input, output dan media penyimpanan
Input:
·         Images : scaner, digital kamera
Audio : microphon, midi
Vidio : vidio kamera
Output:
·         Images : monitor, printer
Audio : speake
Video : monitor dan speaker
·         Menangani banyaknya model kompresi data dan format penyimpanan.
Images : bmp,jpeg,
Audio : midi, mp3
Vidio : mpeg, dat, avi
·         Mendukung perbedaan platform dan sistem operasi.
Walaupun user dapat menggunakan sistem operasi yang berbeda, tetapi butuh user-level view database yang sama.
·         Mengintegrasikan perbedaan data model.
Beberapa data seperti numerik dan text dapat di tangani dengan menggunakan Relasional database model. Tetapi untuk data seperti image dan video lebih baik jika ditangani dengan menggunakan Objek Oriented Data Model. Keduanya digabungkan dalam Multimedia Database.
·         Memberikan sistem query yang user friendly untuk beberapa data media yang berbeda.
Contoh : query untuk menampilkan frame sample video , menampilkan klip yang sesuai dengan suatu track audio, deskripsi textual mengunakan keyword.

e)      Tipe Multimedia Database
1.      Linked Multimedia Database
Elemen data multimedia tidak disimpan secara langsung, namun yang disimpan hanya link elemen data tersebut, sehingga ukurannya relative kecil.
2.      Embeded Multimedia Database
Elemen data multimedia disertakan dalam database, sehinggaukurannya relative berat, namun retrival data akan lebih cepatkarna waktu akses data lebih singkat.

f)       Arsitektur Multimedia Database
1.      Berbasis pada Principle of Autonomy :
·         Setiap tipe media dikelola dengan cara khusus sesuai dengan tipe media
·         Dapat melakukan join antara struktur data berbeda
·         Pemrosesan query yang relatif cepat dikarenakan struktur yang khusus
·         Satu-satunya pilihan untuk bank data yang legal

2.      Principle of Uniformity.
·         Struktur abstrak tunggal untuk mengindeks semua tipe media
·         Abstrak di luar dari bagian yang umum dari tipe media berbeda – metadata
·         Struktur hanya satu – implementasi mudah
·         Anotasi untuk tipe media berbeda

3.      Principle of Hybrid Organization
·         Hybrid dari dua yg pertama. Tipe media tertentu menggunakan indeks mereka sendiri, sedangkan yang lain menggunakan indeks ‘diseragamkan’
·         Mendapatkan keuntungan dari dua yang pertama
·         Join melalui sumber data yang multipel menggunakan indeks mereka sendiri.

g)      Kelebihan dan Kekurangan  Multimedia Database
Kelebihan
1.      MMDB ( multimedia database ) dapat menangani object multimedia dalam jumlah besar dimana Relational Database tidak dapat melakukannya secara efektif.
2.      Lebih lengkap karna dilengkapi dengan data bukan hanya tulisan tetapi gambar, video, audio, dan lain – lain.
3.      MMDB sangat membantu dalam pengembangan aplikasi multimedia.

Kekurangan
1.      Pengaksesan yang relatif memakan waktu dibandingkan dengan data berupa text.

Contoh Kasus :
Polisi melakukan investigasi menggunakan multimedia database. Tipe data yang didapat oleh polisi antara lain:
·         Data video, diambil dari kamera pemantau yang merekam semua aktifitas pada beberapa lokasi.
·         Data audio diambil secara legal melalui telepon.
·         Data citra terdiri atas foto2 yang diambil oleh penyelidik
·         Data dokumen ditahan polisi pada saat pengeledahan di beberapa tempat.
·         Data relasional yang terstruktur terdiri informasi mengenai latarbelakang, catatan hitam, dll dari orang yang dicurigai .
·         Data GIS mengenai data geografis yang relevan dengan investigasi narkoba



DAFTAR PUSTAKA