Online Mobile Cloud Based Compiler

Size: px
Start display at page:

Download "Online Mobile Cloud Based Compiler"

Transcription

1 International Journal Of Engineering And Computer Science ISSN: Volume 4 Issue 2 February 2015, Page No Online Mobile Cloud Based Compiler Miss. Pooja D. Pawar, Miss. Sheetal S. Rai, Miss. Madhuri V. Sherawade NMIET,Talegaon Dabhade pooja93pawar@gmail.com NMIET, Talegaon Dabhade sheetu92rai@gmail.com NMIET,TalegaonDabhade madhu93sherwade@gmail.com ABSTRACT Now a days Cloud computing is a very popular and rising technology using which it is easy to access on-demand network resources in a convenient manner. Mobile cloud computing is the availability of cloud computing services in a mobile ecosystem. Mobile cloud computing means services are provided by a cloud and anyone can accessed through mobile platforms. This paper introduce C/C++/JAVA compilers which make it easy to compile and execute programs anytime anywhere by using their android smartphone. The main aim of this application is that their is no need to install any software/compilers in their phones. Anyone can access these C/C++/JAVA compilers remotely through network. General Terms AES algorithm, Compilers. Keywords Cloud computing, Mobile cloud computing, compilers, JSON, Mobile.web services. 1. INTRODUCTION Cloud computing is a good technology which provides flexibility for all educational institutions and the academic organization s needs, the platform and applications in cloud computing may be on the institution campus, off campus, or a combination of both. It fulfills the need of effective infrastructure and deployment model for their dynamic demands. In current scenarios for executing a program we need a machine in which C/C++/JAVA softwares must be installed saperately on each machine. So it is time consuming process as well as it requires more resources. Thats why we implement the "Online Mobile cloud based compilers". In which we are using mobile with cloud computing services. many public and private institutions are uses cloud computing for better delivery of resources even as they work with fewer resources. Now a days everyone has their own android smartphones by using which everyone can compile and execute C/C++ and JAVA programs.it is useful for students, teachers, faculty, and staff. Because of which teaching and learning can take place from different places and at whenever that require and at any time. Using any Internet connected device.students and teachers can access the content they need from home, train,park and library etc. 2. MOBILE CLOUD COMPUTING Fig. 1. Mobile Cloud computing Mobile devices are uses more processing power as well as battery life and it requires more storage. Cloud computing and mobile are two such things use of these two is changing our lives. Mobile cloud computing is useful in our day to day life. Cloud computing provides an infinite computing resources. So new technology Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10400

2 introduced called "Mobile Cloud Computing". Mobile cloud computing is a new platform combining the mobile devices and cloud computing to create a new infrastructure, whereby cloud performs the hard and heavy lifting of computing tasks and storing huge amounts of data which we can not perform in mobile. In this new architecture, data processing and data storage is done outside of mobile devices. Features of mobile cloud computing: 1. Automated backups,uptime,sla,maintenance. 2.Automated upgrades. 3.Web and mobile access from anywhere. 4.Modern web based integration. 5.Elastic,pay as you go scale up or down. 6.Multi-tenant solution provided by vendor. 3. SYSTEM ARCHITECTURE In system architecture there are three modules: Admin module. Cloud server. User module. 3.1 Admin: Fig.2 System Architecture User management: Manages user related data. Username and password. How many users uses which type of compiler from(c/c++/java). Validate users Report Management: Manages different types of reports. Audit reports. Tracking reports. Maintains records of which compiler is most uses by user Group Management: Manages group related information. Maintains size of the group Keeps track of which user exist in which group. 3.2 Cloud server: Compilers are hosted on to the cloud like C/C++/JAVA. Web services are also hosted on to the cloud. Which are used for interacting the mobile device with the cloud server on which compilers are installed. Database is for maintaining record of user, code, compilation and execution. 3.3 User: Users are android mobile users. Users are responsible for typing their program and upload that program on the server then server executes the program and display the result on user s screen. 4. WORKING OF SYSTEM The user will first select the language of the program that is C/C++/JAVA and then writes their program on editor or download the program which is available. Then upload the program on server by clicking on upload button. when user click on upload button an android java activity will be executed and the program file will get wrapped into JSON object. After that the program is send in JSON string format to the server program application the device.then program is save on the cloud server and returns the program ID on user mobile. After clicking on compile button the program is sent for compilation. A java application is hosted onto the server which will accept the program file data which is in JSON string format. Then it will retrieve the required data and make two files one for program code and other for its respective input file. Then the program file will its respective input file is compile on mingw compiler and the result is store in a file. If program contains errors then errors of the compile program file is wrapped in JSON format and transferred back to android device in JSON string format. And if program does not contain any errors then message "Compiled successfully" is displayed on the user's screen. Then user will click on execute button the respective program is executed on server and result is again wrapped into the JSON string format and received result is display on the device. We are used REST web service over SOAP. Restful web service having more architectural advantages than SOAP using which you can design web services that focus on systems resources including how resource states are transferred over HTTP by a multiple users written many programs in different languages. REST web service having following features: i. It is a light weight web service,so it can easy to access. ii. iii. REST uses HTTP methods like GET,POST,DO etc. It transfers XML,HTML, JavaScript Object Notation etc.where SOAP transfers only XML. 3.1 Flow of system: (a) Login (b) Authentication (c) Select language (d) Write or download the program from server (e) Upload program on server Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10401

3 (f) Compile the program (g) Execute the program (h) End 5. AES Algorithm Steps in the AES Encryption Process Here AES algorithm is used for security purpose. AES algorithm uses 128-bit key for encryption and decryption.the encryption process uses a set of specially derived keys called round keys. These round keys are applied, along with a particular operations, on an array of data that holds exactly one block of data the data to be encrypted. This array is call state array. Final Round In final Round,MixColumns step is not performed. SubBytes ShiftRows AddRoundKey. 6. ACKNOWLEDGMENT Our Software, which we are going to develop,is the result of many peoples dedication. It is the cumulative efforts of many minds working together day and night that gave us the contentment of designing the software. Special thanks to, the Project-coordinator Prof. Ashwini Jadhav of computer Department, for her great support. We express our gratitude to our project guide and also H.O.D of computer department Prof. Shyamsundar Ingle for guidance and who kept the things on track and also to all other faculty members who helped us directly or indirectly. Last but not least our acknowledgement goes to all the well wishers of our project and to all our class mates for their excellent support in all aspects. Fig.3.AES Algorithm KeyExpansions AES requires a separate 128-bit round key block for each round plus one more. InitialRound AddRoundKey In this AddRoundKey step each byte of the state is combined with a block of the round key by using bitwise xor. Rounds SubBytes In this substitution step according to a lookup table each byte is replaced with another ShiftRows It is also called transposition step where the last three rows of the state are shifted cyclically a certain number of steps. MixColumns As name suggest this operation is performed on columnsby of the state, combining the four bytes in each column. 7. CONCLUSION In this paper we have introduced three online mobile cloud based compilers C, C++ and JAVA. Because now a days to run and execute any simple programs their is need of computer and different compilers a must be installed on it. It is time consuming process and also number of resources are required. Therefore to avoid the dependency on computer and reduce installation time we are developed an "online mobile cloud based compilers" using which users can run and execute there programs anytime anywhere using their android smartphones and can store the codes at the centralized cloud server as well as each students record is maintained for future references. This application is helpful for students, teachers, programmers as well as developers.the ability to use compiler application on mobile devices is that a programmer can easily access the code and provides most convenient tool to compile the code and remove the errors. 8. REFERENCES [1]. Mell, P., & Grance, T. The NIST Definition of Cloud Computing ( Draft )Recommendations of the National Institute of Standards and Technology. Nist Special, 145(6),7. National Institute of Standards and Technology, Information Technology Laboratory.Retrievedfromhttp://csrc.nist.gov/publication s/drafts/800145/draft-sp _ cloud definition. pdf (2011). [2]. A.P. Miettinen and J.K. Nurminen, Energy efficiency of mobile clients in cloud computing, HotCloud 2nd USENIX Workshop on Hot Topics in Cloud Computing, AddRoundKey Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10402

4 [3]. Hoang T. Dinh, Chonho Lee, DusitNiyato, and Ping Wang, A survey of mobile cloud computing: architecture, applications, and approaches, Publishedonline in Wiley Online Library (wileyonlinelibrary.com),online ISSN: , DOI: /wcm.1203, 11 OCT [4]. G. Roessling, H. Baer, C. Trompler, and C.M. Choi, Mobile computing in education, ITiCSE, [6]. Robert Rieger and Geraldine Gay Interactive Media Group, Department of Communication, Cornell University. [7]. Xinwen Zhang. Anugeetha Kunjithapatham Sangoh Jeong Simon Gibbs, Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing. [5]. Federal Cloud Computing Strategy, Computing-Strategy.pdf Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10403

5 Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10404

Enhancing the Mobile Cloud Server security by MAC Address

Enhancing the Mobile Cloud Server security by MAC Address Enhancing the Mobile Cloud Server security by MAC Address Kamalpreet Kaur 1, Navpreet Kaur Walia 2 1 Department of Computer Science and Engineering, SGGSW University, Fatehgarh Sahib, Punjab, India 140406

More information

SeChat: An AES Encrypted Chat

SeChat: An AES Encrypted Chat Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful

More information

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh

More information

Data Integrity by Aes Algorithm ISSN 2319-9725

Data Integrity by Aes Algorithm ISSN 2319-9725 Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will

More information

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION 1 PRIYANKA DUKLE, 2 TRISHALA PAWAR, 3 SNEH BHAT 1,2,3 Computer, Amrutvahini College of Engineering, Sangamner Email: bhatsneh@gmail.com 1, pawar.trishala@gmail.com

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

(C) Global Journal of Engineering Science and Research Management

(C) Global Journal of Engineering Science and Research Management DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.

More information

Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm

Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm , pp. 35-42 http://dx.doi.org/10.14257/ijsia.2015.9.6.04 Design of Distributed Pharmaceutical Retail System Based on Advanced Encryption Standard Algorithm Jingjing Yang, Yuanqiang Wang and Xiao Zhang*

More information

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,

More information

Efficient Software Implementation of AES on 32-bit Platforms

Efficient Software Implementation of AES on 32-bit Platforms Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate

More information

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University

More information

A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL

A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL *Hung-Ming Chen, Chuan-Chien Hou, and Tsung-Hsi Lin Department of Construction Engineering National Taiwan University

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing

Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing Suhasini Kalki 1, Jayashree Agarkhed 2 1 PG Student, Computer Science & Engg Department, P.D.A College

More information

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

Step by Step. Use the Cloud Login Website

Step by Step. Use the Cloud Login Website Step by Step HOW TO Use the Cloud Login Website This How To article will show you how to use the Cloud Login Website to upload and download your files from the cloud. For a complete list of available How

More information

SYSPRO App Store: Registration Guide

SYSPRO App Store: Registration Guide SYSPRO App Store: Registration Guide SYSPRO App Store Registration Guide 2 Table of Contents What is the SYSPRO App Store?... 3 The SYSPRO App Store URL... 3 Who can use it?... 3 Register as a customer...

More information

Healthcare Documentation Fundamental and Practice Transcription Exercise Students Module Users Guide

Healthcare Documentation Fundamental and Practice Transcription Exercise Students Module Users Guide Healthcare Documentation Fundamental and Practice Transcription Exercise Students Module Users Guide Contents Introduction... 1 Overview... 1 Key Terms... 2 Installation... 4 Updates... 4 Getting Started...

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Team 23 Design Document. Customer Loyalty Program for Small Businesses

Team 23 Design Document. Customer Loyalty Program for Small Businesses Team 23 Design Document Customer Loyalty Program for Small Businesses Clients - Jay Namboor Adviser - Dr. Govindarasu Members: Christopher Waters Van Nguyen William Tran 1 Loyalty Program Contents System

More information

Anchor End-User Guide

Anchor End-User Guide Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Mobile Hybrid Cloud Computing Issues and Solutions

Mobile Hybrid Cloud Computing Issues and Solutions , pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University

More information

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONSAND TECHNOLOGY. An Online Application for Programming Languages

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONSAND TECHNOLOGY. An Online Application for Programming Languages IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONSAND TECHNOLOGY An Online Application for Programming Languages Megha R. Kute Department of Computer Engineering,Sinhgad Academy Of Engineering,Kondhwa,Pune

More information

Cloud Computing with Azure PaaS for Educational Institutions

Cloud Computing with Azure PaaS for Educational Institutions International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 139-144 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Abstract AES is an encryption algorithm which can be easily implemented on fine grain many core systems.

More information

Mobile Field Service Engineer Application

Mobile Field Service Engineer Application International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-04, Issue-02 E-ISSN: 2347-2693 Mobile Field Service Engineer Application Akash Budholia 1, Rishit Mehta 2*,

More information

Protect Integrity of Data in Cloud Assisted Privacy Preserving Mobile Health Monitoring

Protect Integrity of Data in Cloud Assisted Privacy Preserving Mobile Health Monitoring International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1329-1334 International Research Publications House http://www. irphouse.com Protect Integrity

More information

HarePoint Workflow Extensions for Office 365. Quick Start Guide

HarePoint Workflow Extensions for Office 365. Quick Start Guide HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 10, October 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Study of Cloud

More information

Cloud Based Collaboration Tool Rohini C. Ekghare*, Prof. Manish Hadap**

Cloud Based Collaboration Tool Rohini C. Ekghare*, Prof. Manish Hadap** RESEARCH ARTICLE OPEN ACCESS Cloud Based Collaboration Tool Rohini C. Ekghare*, Prof. Manish Hadap** *Department of Information Technology, Yeshwantrao Chavan College of Engineering, Nagpur-441110, India.

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Wadala, Mumbai-037, India Wadala, Mumbai-037, India Wadala, Mumbai-037, India

Wadala, Mumbai-037, India Wadala, Mumbai-037, India Wadala, Mumbai-037, India Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Interactive

More information

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment , pp.18-22 http://dx.doi.org/10.14257/astl.2013.42.05 Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment Changhee Cho 1, Sanghyun Park 2, Jadhav Yogiraj

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok

More information

Remote Desktop Access Through Android Mobile Phones and Reverse

Remote Desktop Access Through Android Mobile Phones and Reverse Reviewed Paper Volume 2 Issue 8 April 2015 Paper International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Remote Desktop Access Through Android Mobile Phones and Reverse Paper

More information

THIRD PARTY AUDITING SYSTEM FOR CLOUD STORAGE

THIRD PARTY AUDITING SYSTEM FOR CLOUD STORAGE THIRD PARTY AUDITING SYSTEM FOR CLOUD STORAGE 1 PRAJAKTA R. AMRUTKAR, 2 HEMLATA R. GOSAVI, 3 SAGAR A. KATHE, 4 ROMA G. SHEHA, 5 TEJASWINI R. SHINDE 1,2,3,4,5 Department of Information Technology, MET s

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Cloud Computing For Distributed University Campus: A Prototype Suggestion

Cloud Computing For Distributed University Campus: A Prototype Suggestion Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract

More information

The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow

More information

Cloud Data Protection for the Masses

Cloud Data Protection for the Masses Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing

More information

A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing

A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing I.J. Wireless and Microwave Technologies, 2016, 1, 23-33 Published Online January 2016 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2016.01.03 Available online at http://www.mecs-press.net/ijwmt

More information

Credibly secure cloud storage with elfcloud

Credibly secure cloud storage with elfcloud Credibly secure cloud storage with elfcloud Privacy of private clouds with the cost of the public cloud Datacenter IaaS workshop 2014 / 12.9.2014 Tuomas Tonteri Founder and CEO Abstract elfcloud is a Finland

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Android Application for Online Admission Process

Android Application for Online Admission Process International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 114-118 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Android Application for Online Admission

More information

In the proposed work, cloud mobile media which is a centric multimedia streaming system. Aim of the proposed

In the proposed work, cloud mobile media which is a centric multimedia streaming system. Aim of the proposed ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com CLOUD BASED JAVA COMPILER FOR ANDROID SMARTPHONES Dr P. Jeyanthi 1, Nishant Rao 2, Ketan Ketu 3 Department of

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

Out of Harms Reach -A Whitepaper on Online Backup

Out of Harms Reach -A Whitepaper on Online Backup Out of Harms Reach -A Whitepaper on Online Backup Introduction: The world is an unpredictable place, one day your data is there, but the second day they aren t, due to viruses, system crash, and human

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Internet Address: cloud.ndcl.org

Internet Address: cloud.ndcl.org NDCL Cloud Virtual access to NDCL s computer network Internet Address: cloud.ndcl.org Accept and install certificate if prompted to do so. Note: Do not put www in the address. Log into the cloud using

More information

Granule based File Storage System with Secure Transparent Availability

Granule based File Storage System with Secure Transparent Availability Granule based File Storage System with Secure Transparent Availability 1 A. Suthan and 2 D. Kesavaraja 1 HoD / Department of Computer Applications, 2 Lecturer,Department of CSE Dr.Sivanthi Aditanar College

More information

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved

Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved Analysis Web enabled cloud library system: a conceptual

More information

A Monitored Student Testing Application Using Cloud Computing

A Monitored Student Testing Application Using Cloud Computing A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA r.mullapudi@spartans.nsu.edu, ghsieh@nsu.edu

More information

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/

More information

Configuring Nex-Gen Web Load Balancer

Configuring Nex-Gen Web Load Balancer Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting

More information

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY 1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

LAN Monitoring Using Android Phone

LAN Monitoring Using Android Phone LAN Monitoring Using Android Phone Prof. Rakhi Bhardwaj 1, Sandesh S. Jangam 2, Prashant N. Shinde 3, Abhijit B. Raut 4, Rajesh S. Trigune 5 Professor, Dept. of Computer Engg., KJEI s Trinity College of

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

Living Requirements Document: Sniffit

Living Requirements Document: Sniffit Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 TABLE OF CONTENTS Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 Introduction Our world is more Mobile now than ever. In 2013

More information

DCH File Transfer Application User Manual

DCH File Transfer Application User Manual DCH File Transfer Application User Manual Table of Contents HIPAA Compliancy Statement 3 Overview 4 General.4 Getting Started 4 Screen Basics...4 Accessing the File Transfer application...5 Single Sign

More information

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code. Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Spring 2014 Urban Affairs network computers and computer labs Mapping your H:\ drive using Microsoft Windows 7

Spring 2014 Urban Affairs network computers and computer labs Mapping your H:\ drive using Microsoft Windows 7 Spring 2014 Urban Affairs network computers and computer labs Mapping your H:\ drive using Microsoft Windows 7 You have been provided with a secure, backed-up location to store your files. This location

More information

itunes Store Publisher User Guide Version 1.1

itunes Store Publisher User Guide Version 1.1 itunes Store Publisher User Guide Version 1.1 Version Date Author 1.1 10/09/13 William Goff Table of Contents Table of Contents... 2 Introduction... 3 itunes Console Advantages... 3 Getting Started...

More information

Virtual Code Authentication User s Guide. June 25, 2015

Virtual Code Authentication User s Guide. June 25, 2015 Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune

More information

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO: INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software

More information

Cloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers

Cloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers Cloud Computing Security Practices for General User T he cloud is composed of an extensive bulk of computers owned by a third-party in remote location(s). The Internet provides a bridge between personal

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Design and Implementation of Asymmetric Cryptography Using AES Algorithm Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,

More information

AVLOR SERVER CLOUD RECOVERY

AVLOR SERVER CLOUD RECOVERY AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

MICROSOFT OFFICE 365 MIGRATION 2013/05/13 MICROSOFT OFFICE 365 MIGRATION 2013/05/13 WHAT IS OFFICE 365 Office 365 provides virtually anywhere access to familiar Office tools Word WEB App Excel WEB App PowerPoint WEB App Enterprise-grade email

More information

Database Migration over Network

Database Migration over Network Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,

More information

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application K. Akhila 1 B. Prathyusha 2 M. PavanKumar 3 M. Amrutha 4 Research Scholar Research Scholar Research Scholar

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

A Survey on Software as a Service (Saas) Cloud for Programming Language Computing

A Survey on Software as a Service (Saas) Cloud for Programming Language Computing A Survey on Software as a Service (Saas) Cloud for Programming Language Computing Prof. Balamurugan E Sujith Jayapraksh Dominic Owusu Assoc. Prof of ICT Sr. Lecturer of ICT Lecturer BlueCrest College BlueCrest

More information