Global Journal of Science and Technology: B Cloud and Distributed Volume 19 Issue 1 Version 1.0 Year 2019 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online ISSN: 0975-4172 | Print ISSN: 0975-4350 | DOI: 10.17406

Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage By Faisal Khalil-Ur-Rehman & Muhammad Farooq Limkokwing University of Creative Technology Abstract- The research explained the reason why we need personal cloud storage. This research will show steps on how to build a personal cloud storage by using credit card size Raspberry Pi (minicomputer), which will help the user to enable cloud storage mode to their external hard drive. However, other cloud storage services like Dropbox, Google Drive, and iCloud gives limited amount of storage. This research will help the users to use (1TB) or above size external hard drive to be use and have access anywhere from any device over . Also the second part of this research focus on replace the laptops to raspberry pi that lecturers use in the classroom to play PowerPoint slides, and videos at university. Keywords: raspberry Pi, cloud storage, cost benefit-analysis, low cost-computing, university classrooms. GJCST-B Classification : H.3.m

Cloud-basedArchitectureofRaspberryPiPersonalCloudStorage

Strictly as per the compliance and regulations of:

© 2019. Faisal Khalil-Ur-Rehman & Muhammad Farooq. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creative commons.org/licenses/by-nc/3.0/), permitting all non- commercial use, distribution, and reproduction inany medium, provided the original work is properly cited. Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage

Faisal Khalil-Ur-Rehman α & Muhammad Farooq σ

Abstract- The research explained the reason why we need Laptops that the lecturers are using for slides personal cloud storage. This research will show steps on how provided by Limkokwing University are limited in quantity to build a personal cloud storage by using credit card size and most of them are not working (requires Raspberry Pi (minicomputer), which will help the user to maintenance). Replace all the laptops with the

enable cloud storage mode to their external hard drive. 2 01 Raspberry Pi, which only cost $35 and does not require However, other cloud storage services like Dropbox, Google maintenance (low maintenance). The laptop cost is

Drive, and iCloud gives limited amount of storage. This Year

above $300 and need maintenance but the Raspberry Pi research will help the users to use (1TB) or above size external hard drive to be use and have access anywhere from any cost is $35 and does not need any maintenance. 1 device over internet. Also the second part of this research Raspberry Pi will reduce the cost and effort for lecturers, focus on replace the laptops to raspberry pi that lecturers use also it is easy to carry. in the classroom to play PowerPoint slides, and videos at Most of the services are university. providing limited storage to the users, at the same time Universities use laptops to plug and play their the risk of your data to store at third party is a big issue. educational slides and videos. All these laptops price and Example is the recent incident of exposed nude pictures maintenance cost lot to the university, if we look deeply just for play slides we do not have to buy a laptop which cost $300 of the celebrities from iCloud. Which is a clear example and also the lecturer have to carry the laptops all the times that our data is not safe, to overcome these problems from the faculty to classes, moreover most of the times the this research will come up with the perfect solution with laptops are not available. Overcome above statement, all the unlimited cloud data storage by the help of laptops can be replaced to “Raspberry Pi” which cost $35 and “Raspberry Pi”. it does not need any maintenance. Rather than store all our media and files on a ) Keywords: raspberry Pi, cloud storage, cost benefit- B cloud in an unknown location, we can keep a ( analysis, low cost-computing, university classrooms. cloud at our home and make it personal. I. Introduction The objectives for this research are • The primary object of this research is to develop a he aim of this research is to develop a cloud cloud storage, whereby all the users can connect computing project, where the users can use their their external hard drives to raspberry pi and have Texternal hard drive’s connected to Raspberry Pi access everywhere over internet. through internet they can have access to anywhere from • To develop a raspberry pi which can connect to any device. According to (Jon Brodkin, 2008) Even projector and run the slides, videos and also web though Security, Privacy and Trust issues exists since browsing as well. the evolution of Internet, the reason why they are widely • To save the cost for the university by replacing the spoken these days is because of the Cloud Computing laptops to raspberry pi, whereby the university can scenario. Any client/small organization/enterprise that save money and maintenance time as well. Also it processes data in the cloud is subjected to an inherent will be easy for the lecturers to carry the raspberry pi level of risk because outsourced services bypass the to classes rather than laptops. The university can "physical, logical and personnel controls" of the user. save roughly up to RM 200, 000. To develop a cloud computing project where • To compare the current cloud computing to the Pi users can have large amount of storage with the help of cloud computing. In term of storage because all the Raspberry Pi. Most of the user have external hard drive 1 cloud computing services provide only limited TB (Terabyte) or more but the users cannot carry the number of storage to the users or the users have to Global Journal of Computer Science and Technology Volume XIX Issue I Version external hard drives all the time, whereby this project will buy extra storage if they require more space. benefit the users connect to personal cloud storage over • To help the lecturers retrieve files (chapter’s slides) internet. The new technology which will be affordable to from Pi cloud in the classroom. By using raspberry everyone and also it will enable the user to use their pi in the classrooms will represent the student’s external hard drives over internet possible. creativity and the education level at Limkokwing

Author α: Postgraduate Centre, Limkokwing University of Creative University. Technology, Malaysia. e-mail: [email protected]

© 2019 Global Journals Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage

II. Literature Review lowest service model is called Infrastructure as a Service (IaaS), which follows by Platform as a Service (PaaS) According to William (2014), in order to do and last, but not least Software as a Service (SaaS). effective way of computation, Cloud Computing offers Each service model helps to add more functionality and IaaS, PaaS and SaaS levels of service models. The abstraction to the technical details.

201 Year

2

Figure 1: Cloud Computing Stack (Schuller, 2010)

The National Institutes of Standards and a) Cloud Computing Deployment Models Technology (NIST) definition runs to several hundred There are four deployment models for cloud

) words but essentially says that: computing, depending on the owners requirement, the B

( “Cloud Computing is a model for enabling security issues starts from here. convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be

rapidly provisioned” and released with minimal management effort or service provider interaction.” Armbrust (2009) defined clouds as are being able to network anywhere in the world by per- per-use way to pay for used clouds, the actual meaning

of this idea is that the resources that are being used will be paid only. Below will be introduces types of clouds. The first one is the Public Clouds. Armbrust (2009) mentioned that public cloud is the traditional cloud computing that will have the opportunity to access to the computing resources from anywhere of the world. The pay-per-use manner will be used in clouds, as defined the only resources that are being used will be paid by transaction fees. On a superficial level, my findings may seem self-evident: a technology company tells its users

Global Journal of Computer Science and Technology Volume XIX Issue I Version what it expects of them and users for the most part agree, so long as the technology holds up. However, if we dig deeper, we can extract some important implications from this research. Following the work of

other scholars who look at trust in information and communications technologies, I believe that trust is a

more useful concept for studying the implications of new technologies than simply looking at privacy.

© 2019 Global Journals Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage

2 01 Year

3

Figure 2: Image representing the clear idea of Cloud Computing Deployment Models i. The Public Cloud relations) are hidden and become a durable Public cloud computing is based on large-scale technological entity. Users of this black boxed offering to general public, the infrastructure is located at technology must not understand, follow or even be premises of provider. The provider owns and manages aware of the internal workings and associations but only the cloud infrastructure. need to understand how to use the black box as a ii. The Private Cloud whole; they only need to follow the user scripts and interact with the technology’s user interface. ) In this case the infrastructure is provisioned for B

( exclusive use by a single organization. It can be owned, III. Methodology managed, and operated by the organization themselves, a supplier as a third party, or some Maxwell (2012) has stated that ‘the strengths of combination of them. Additionally it can exist on or off qualitative research derive primarily from its inductive premises of the organization (Mell/Grance, 2011). approach’. The reason why the inductive approach was Therefore special forms, can be also considered as a used in this research due to the newness of the idea to private Clouds. These are listed by some researchers as create your own cloud with Raspberry Pi. A deductive e.g. virtual private Clouds (e.g. Ried et al. 2011), where ‘approach to this subject would risk restricting the the cloud is hosted on dedicated, virtual machines in the potential avenues of investigation. The inductive data center of the Cloud provider, as well as managed approach necessitated attempting to understand the private clouds, where the cloud is hosted by a third meaning and the context of people‘s responses to the party in the data center of the customer. adoption of Cloud Computing. It attempted to uncover unforeseen trends and detect linkages between Cloud However, what makes this analysis different Computing and Raspberry Pi. than other literature on trust – and what this project is ultimately about on a theoretical level is the nexus of a) Data Collection technology, objectivity and trust. A word about each and The focus is on using qualitative data collection how they relate is necessary. My analysis and techniques. Qualitative data is data that is focusing on understanding of technology rests on many of the delivering information that can be described with terms assumptions of actor-network theory, and particularly and theories. It is not like quantitative research that Global Journal of Computer Science and Technology Volume XIX Issue I Version Bruno Latour’s (1991) quip: “Technology is society focuses on the numbers behind a survey or something made durable.” I have extensively used the metaphor of similar. It focuses on delivering numbers and information the black box to exemplify this principle and stay faithful in terms of quantity. Qualitative research can be to the central tenets of Raspberry Pi Cloud Storage. The interviews or observations where the research is done black box represents a network of associated humans on the behaviour or theories (Saunders et.al.2010). and non-humans that has stabilized such that its Our research will consist of both primary and heterogeneity is reduced and it appears as a secondary data. Primary data is data collected by the homogenous whole. Its associations (i.e., its social researcher using different methods . The primary data

© 2019 Global Journals Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage

that is collected are often more reliable due to that you Secondary data is easier to obtain and cheaper to get know where the data comes from and been following also. Some examples of secondary data (Kelly 2010): the progression all the way. Primary data sources could  Magazines, Newspapers and Reviews be (Kelly 2010):  Research articles  Observation when observing a system or a research There is a third data source called tertiary data object to see the details that is important to a that is the search tools for obtaining secondary and research. Requires a lot of resources and time. primary data such as encyclopaedias and indexes. Secondary data are data that is collected from Often it is used in literature search when not knowing external sources that already exist. The only thing that where to start searching for a specific topic (Saunders has to be done is to look for the data you need. et.al. 2012). Our primary data collection will consist Secondary data has the upside compared to primary observation in different forms and the secondary data that it is cheaper to collect but the reliability, validity and collection will be recent articles in the area of cloud accuracy is not as great. You do not know where the computing and raspberry Pi, internet sources and 201 data actually comes from and cannot fully trust is literature that is within our field of research.

Year against primary data where you have more control.

4 Primary Secondary Tertiary

Reports Catalogs

Theses Book s Encyclopedias Journals Some government Dictionaries publications Newspapers Citation indexes Company Reports Bibliographies

) B

( Figure 3: The different literature sources (Saunders et.al. 2009)

IV. Results From these characteristics of cloud computing, two ideas are of sociological significance. First, the idea Cloud computing is defined by the United of “convenient, on-demand” (National Institute of States National Institute of Standards and Technology Standards and Technology 2011) services fits into the (NIST) as: “A model for enabling convenient, on- idea of what some authors have called a ‘convenience demand network access to a shared pool of culture.’ For example, Tierney (1993) argues that one of configurable computing resources (e.g., networks, the defining features of modernity is the consumption of servers, storage, applications, and services) that can be ‘conveniences.’ He defines convenience as an “ability to rapidly provisioned and released with minimal mitigate the effects of bodily limits”; for something to be management effort or service provider interaction.” convenient it must make easy and simple an action that (National Institute of Standards and Technology 2011). was previously difficult, impossible or troublesome. In a similar vein, Mather, Kumaraswamy and

Latif (2009) add that there are five common attributes of all cloud computing services: shared resources,

massive scalability, elasticity, pay as you go and the self-provisioning of resources. While these definitions are technical and bureaucratic, they do provide some Global Journal of Computer Science and Technology Volume XIX Issue I Version starting points to discuss what cloud computing is and

how it can be analyzed sociologically. In simpler terms, cloud computing broadly refers to computing services,

software and platforms that are not owned individually

by users and installed locally on their personal computer, but rather accessed via an Internet connection.

© 2019 Global Journals Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage

2 01

Year

5

Figure 4: Checkout operator computer with Raspberry Pi installation ) B

( a) Raspberry Pi Setup with Owncloud Step 0. This is the second installment of the guide to Plug in your USB HDD / Drive to Raspberry Pi install Owncloud on Raspberry Pi. If you are using a NTFS formatted drive, install There has been certain changes with the latest the following version of Owncloud 7, and this guide should be able to sudo apt -get install ntfs-3g help you to sail through smooth. Without much ado Step 1. about what is Owncloud (which you already know) let's Log on pi using ssh terminal and execute: dive deep into tech details. ls -l /dev/disk/by-uuid/ Setup admin account You will see something like the following: While setting up the admin account you should lrwxrwxrwx 1 root root 10 Jan 1 1970 provide the path to your data folder. You can ideally set 0AC4D607C4D5F543 -> ../../sda1 this to your NAS drive or external drive, which you may Note down the value of the UUID --> have mounted. Owncloud will complain and not proceed 0AC4D607C4D5F543 with admin account if the data directory path is not Step 2. readable & writable by the user www-data. Also it should Create a location for mount point: not be readable by "others". sudomkdir /media/NASDRIVE Give proper permission: b) Setup Mount / Auto Mount USB Hard Drive on Raspberry Pi sudochmod 770 /media/NASDRIVE Global Journal of Computer Science and Technology Volume XIX Issue I Version Follow the simple steps in the order mentioned Step 3. below to have your USB drive mounted on your Get the uid, gid for pi user and group with id

Raspberry Pi every time you boot it. command (usually 1000)

These steps are required especially if you are Step 4. setting up a Samba share, or a 24x7 torrent downloader, Mount the USB Drive and then check if it is or alike where your Raspberry Pi must have your accessible at /media/NASDRIVE external storage already mounted and ready for access sudo mount -t ntfs-3g -o uid=1000, gid=1000, by the services / daemons. umask=007 /dev/sda1 /media/NASDRIVE

© 2019 Global Journals Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage

Note: allows you to log on to a system and control it over the ntfs-3g for NTFS Drives network, even using the GUI, just as if you were sat in vfat for FAT32 Drives front of it. The default installation of Linux on your ext4 for ext4 Drives Raspberry Pi should have “SSH daemon” running. This

Step 5. means that your Raspberry Pi is listening on port 22 for Now, we will configure RasPi to do this after a remote computer asking to make a connection to it. In every reboot: your case, this will probably mean your normal desktop Take a backup of current fstab and then edit or laptop computer. sudocp /etc/fstab /etc/fstab.backup In Chapter Two, I found that there is a dearth of

sudonano /etc/fstab existing literature on Raspberry Pi personal cloud

Add the mount information in the fstab file storage and data privacy that examines the role of user

(replace UUID with your own): agency and that trust is one conceptual tool to avoid this problem. In Chapter Three, I outlined how using 201 UUID=0AC4D607C4D5F543 /media/NASDRIVE ntfs-3g uid=1000, gid=1000, umask=007 0 0 principles from Raspberry Pi and bring it in a shape to

Year personal cloud storage, theory one could study trust Step 6.

and reimagine the role of user agency in discussing

Reboot 6 cloud computing. In particular, I outlined the sudo reboot methodological principles of Akrich’s (1992; Akrich and Step 8. (Optional, required if using as data storage for Latour 1992) user scripts and description and the Owncloud) principle of co-production to look at how users and If you are configuring ownCloud’s data directory technologies are mutually working on each other. In on your NAS drive, it should be having a 770 permission applying these principles to my case study in Chapters for www-data user. You can simply add user www-data Four and Five, I found that Raspberry Pi personal cloud to pi group, since it’s already having 770 as permission storage, prescribed trust and privacy protection on its as set above in fstab. users, while maintaining security as its domain. Users, sudousermod -a -G pi www-data. for the most part, accepted this script; however, some In studies of black boxed technologies, varying levels of trust were observed in users. What was objectivity is always implicit but rarely explicitly noteworthy about the analysis in Chapter Five, however,

) discussed. Part of this is likely due to the self-evidence was how in instances of breakdown, these user scripts B

of the objectivity of black boxed technologies. ( and trust fall to pieces. This has led me to the Technological entities are objective in multiple senses of conclusion that only when trust is shattered does privacy the word: one, they are objects; and two, they behave and the trade-off of personal privacy for use become consistently. Users of a black boxed technology who contested and negotiable. behave in accordance with the user scripts should My example of cloud computing, and more expect the technology to behave the same way every specifically Raspberry Pi cloud storage, can highlight time. Its internal workings and associations are reduced this principle. As discussed in the introduction, cloud such that users provide an input and expect consistent computin g is a great example of a heterogeneous outputs from the black box. The objectivity of assemblage. It is not a simple technological artefact but technologies is, in this sense, very self -explanatory. is rather an idea that encompasses a wide range of Nevertheless, using the metaphor of the black box computing programs, hardware and human actors in highlights a key point about the nexus between order to be realized. Through my analysis of users of objectivity and technology: objectivity is an effect of a Raspberry Pi cloud storage, I have found that many of network or association’s durability and stabilization. It is these users simply accept the user scripts of this precisely when a network becomes black boxed that it program; they interact with Raspberry Pi cloud storage becomes seen as objective. It is when those contingent as a black boxed technology. They do not need to associations and subjective actors are reduced (in other question or understand how Raspberry Pi cloud storage. words, when the social has been reduced) that a Or how cloud computing more generally functions, they technology that behaves consistently and objectively just need to know how to interact with Raspberry Pi

Global Journal of Computer Science and Technology Volume XIX Issue I Version appears. cloud storage’s user interface. To them, Raspberry Pi cloud storage is a program to store and synchronize V. onclusion C files to be accessed at a later date, not a heterogeneous What are some repercussions of this analysis of network of associated human and non-human actants. Raspberry Pi ownCloud storage, users, cloud When exploring technology and objectivity in

computing, and data privacy? OpenSSH is an this way, it is possible to conceptualize the application that allows you to securely access Linux understanding of trust I have put forth in this analysis. systems remotely over the network. You can use Trust simply becomes a necessary by-product of the OpenSSH simply for secure file sharing. But it also stabilization and reduction of heterogeneous

© 2019 Global Journals Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage associations, and the perceived objectivity of a 7. Christodorescu, M., R. Sailer, D. L. Schales, D. technological entity. Technologies, here understood as Sgandurra, and D. Zamboni (2009). Cloud security stabilized networks, objectivity and trust all necessitate is not (just) virtualization security. In Proceedings of one another. Black boxed technologies are trusted to the ACM Cloud Computing Security Workshop behave as expected, to behave objectively. If there is (CCSW), pp. 97–102. distrust in the technology, it is not perceived as 8. Cisco. (2013). Cisco Packet Tracer. Available: completely objective; there is room for error. If the http://www.packettracernetwork.com/. Last heterogeneity of a network is not completely reduced, accessed 2018th November 2014. there is more room for distrust as users must now trust 9. Cloud Security Alliance, “Top Threat to Cloud each of the heterogeneous associations and not simply Computing V1.0,” March 2010. [Online]. Available: the homogenous black boxed technology. https://cloudsecurityalliance.org/topthreats/csathrea Thus, technology, objectivity and trust go hand ts.v1.0.pdf in hand; they all appear simultaneously as a 10. CN VR. (17 September 2014). The Raspberry Pi B. 2 01 heterogeneous network is reduced, stabilized and made Available: http://www.ebay.com/itm/CN-Ver-

durable. My findings, in Chapter Four and particularly Raspberry-Pi-2-0-Model-B-512MB-ARM11-Linux- Year

Chapter Five thus suggest that Raspberry Pi cloud System-Development-Board-Kit-/261189408347. 7 storage as a case study of cloud computing is not a Last accessed 11 October 2014. completely stabilized technology, though it is well on its 11. David Oven. (2013). Ethernet Tutorial - Part I: way. It is stable enough that users for the most part trust Networking Basics. Available: http://www.lantronix. the technology and behave in accordance with its user com/resources/net-tutor-etntba.html. Last accessed scripts. However, there is still a concerted effort on the 2018th November 2014. part of Raspberry Pi cloud storage to communicate its 12. Foster, I., Zhao, Y., Raicu, I. & Lu, S. (2008). Cloud objectivity and trustworthiness and to further reduce its Computing and Grid Computing 360-Degree heterogeneity and the marginality of some users. Compared, University of Chicago, 10-56. 13. ICO. (2013, Jul.) “Privacy impact assessment Acknowledgement handbook,” v2.0, Information Commissioner’s The author would like to thank Mohammed Office, UK. [Online]. Available: http: Mahmud for his technical support of the cloud. This //www.ico.org.uk/pia handbook html v2/files/ work is supported by FICT, Limkokwing University. )

PIAhandbookV2.pdf B

( References Références Referencias 14. ipv6launch.org. 2012. IPV6launch. [ONLINE] Available at: http://www.worldipv6launch.org/

1. Abraham, (2009). Autonomic Clouds on the Grid. support/. [Accessed 09 April 2018].

Journal of Grid Computing, 1-18. 15. jaipa.or.jp. 2011. Current status and the future

2. Aderemi A. Atayero*, Oluwaseyi Feyisetan**. direction of IPv6 in Japan. [ONLINE] Available at: (October 2011). Journal of Emerging Trends in http://www.jaipa.or.jp/ipv6day/data/111121_iaetf. Computing and Information Sciences. Security pdf. [Accessed 09 April 2018]. Issues in Cloud Computing: The Potentials of 16. James Hilton. (June, 2013). Designing and Building

Homomorphic Encryption. VOL. 2 (NO. 10), p the Best Small Office Network From the Ground Up.

547-550. Available: http://www.networkcomputing.com/

3. Andrew Tabona. (2013). The Top 20 Free Network netdesign/soho1.html. Last accessed 2018th

Monitoring and Analysis Tools for Sys Admins. November 2014. Available: http://www.gfi.com/blog/the-top-20-free- 17. Jhony Jackson. (2012). What is a -monitoring-and-analysis-tools-for-sys- Network.....?. Available: http://www.e-tutes.com/.

admins/. Last accessed 2nd November 2014. Last accessed 2018th November 2014.

4. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, 18. Lantronix. (2014). Networking Tutorials. Available: R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., http://www.lantronix.com/resources/networking. Stoica, I. and Zaharia, M. (2009). Above the Clouds: html. Last accessed 2018th November 2014. A Berkeley View of Cloud Computing. Technical 19. Marianthi (2013), “Data protection jurisdiction and

Global Journal of Computer Science and Technology Volume XIX Issue I Version Report. University of California at Berkeley. cloud computing when cloud users and providers

5. Bessie. (December 2012). Ouya vs Raspberry Pi. subject to eu data protection law are? the cloud of Available: http://ouyaforum.com/showthread.php? unknowing, Part 3,” International Review of Law, 755-Ouya-vs-Raspberry-Pi. Last accessed 11 Computers & Technology, vol. 26, pp. 2–3, 2012

October 2014. 20. Meetings.apnic.net. 2012. IPV6 deployement of 6. Boniface, M., Nasser, B., Papay, J., Phillips, S., KDDI. [ONLINE] Available at:http://meetings.apnic.

Servin, A., Yang, X., et al. (2009). Platform-as-a- net/__data/assets/pdf_file/0003/44976/ipv6_deploy Service Architecture for Real-time Quality of Service ment.pdf. [Accessed 09 April 2018].

Management in Clouds.

© 2019 Global Journals