Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application

Size: px
Start display at page:

Download "Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application"

Transcription

1 Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Ajab Maheshwari PG Scholar, IT Dept, IET-DAVV, Indore (M.P.), India. Dr. Pratosh Bansal Associate Professor, IT Dept, IET-DAVV, Indore (M.P.), India. Abstract-The concept of e-commerce has emerged as a revolution to execute business activities over internet. This architecture of e-commerce is developed on the foundation of client server model. As a result, reduced cost of production and unrestricted physical boundaries are the major benefits offered by e-commerce over traditional commerce. Though these benefits have attracted great number of users but still there are some drawbacks that have restricted to completely transfer traditional model to e-commerce model. One of the drawbacks is the large bandwidth requirement for an e- commerce application, deployed using client server model. Second is efficient information retrieval and autonomy in application are hard to achieve in client server model. To overcome these drawbacks Mobile Agent Technology has been proposed. Though mobile agent technology over comes the limitations of client server model but simultaneously use of mobile agent technology enhances the security requirement of an e- commerce application. In this paper a hybrid approach of client server model and mobile agent technology to develop an e-commerce application is proposed, to overcome the limitations of both the models. Keywords- Mobile Agents, E-Commerce, Client-Server, Bandwidth. I. INTRODUCTION Internet has evolved as a revolution in field of communication. It was developed to provide resource sharing and communication between two machines situated at remote locations. But today internet is not at all restricted to these functionalities; in fact it had lead to the development of a new way to conduct business activities over internet. In this new form of conducting business, the buying and selling of goods and services is done over the foundation of internet. This way of performing business is termed as e- commerce. E-commerce has enhanced the opportunities for both the sellers as well as the buyers. Today sellers are not at all restricted to physical boundaries to sell their product in fact they can easily reach the narrow market segments of the world. Even for the buyers there are wide range of options available to buy the product which best meets their requirement [1]. All these benefits offered by e- commerce have resulted in the expansion of internet to a great extent. Actually the concept of e-commerce exits in reality only because of client server model. The structure of an e-commerce application completely relies on client server model for its successful deployment. In client server model, client is a program which makes request for services and server is a program which offers this services. Users or buyers make use of this client program to request for a product or service where as sellers or buyers offer there product or services through server program. It is this interaction between client and server which transforms the concept of e-commerce to reality. The interaction between client and server is done through message passing over the network [2]. This communication between client and server demands large bandwidth requirement. But the increasing popularity of e- commerce created new challenges in terms of bandwidth requirement and network management. As a solution to above mentioned problem, Mobile Agent (MA) technology is a common approach used these days. As quoted by Mohammed Badrul Hasan and P.W.Chandana Prasad MA are software entities that can migrate across network i.e. has mobility, to perform desired task of user on his behalf hence called an agent [3]. The user programs the agent with his instructions and the agent performs the task accordingly. For example, in real life situation, mobile agent can be mapped to property broker agent who searches for commercial or residential area on 733

2 behalf of their client to satisfy client s requirement. Mobile agent operates local to the data and this is major reason for low bandwidth requirement. The other benefits offered by mobile agent technology include reduction in network load, continued execution even when disconnected from network, reliability and asynchronous communication [4]. In spite of the above mentioned benefits offered by mobile agent technology, the issue which hinders its implementation in e-commerce domain is security. The use of mobile agent technology has encountered new type of attacks which enhances the security requirement of an application. The section two of this paper explains the working of client server model. It also describes the limitations or problems encountered in this paradigm with respect to e-commerce domain. Section three explains the working of mobile agent technology and how it overcomes the limitations of client server model. It also briefly explains the issues which hinders its implementation in e-commerce. Section four explains about our proposed hybrid approach to meet all the requirements. Finally section five concludes the findings. II. CLIENT SERVER MODEL The concept of distributed computing is most successfully implemented using client server model. In client server model there are two fixed entities; one is regarded as server and the other one as client. The entity which offers the services is termed as server and the one which makes the request for these services is called client. The transaction or communication between client and server is done through message passing. If a client requires a set of services then it makes a request to the server, the server accepts the request, process it and reply the client with the response [2]. Following figure demonstrates the working of client server model [Fig 1]. Fig 1. Working of Client server model [2] Study of client server model by research community concluded that, one of the major drawbacks of client server is that the roles of client and server are fixed and this makes client fully dependent on server i.e. if a server does not provide a particular services then client has to find the other server which provides the required services. To identify the server which offers the required services, client has to make makes request to all the servers but the positive response is obtain only from the server which provides the required services. All other requested server replies with negative response. This is clearly an inefficient use of network bandwidth [5]. This completely scenario can be visualized through following diagram [Fig 2]: 734

3 Fig 2. Bandwidth usage scenario Further, the uses of portable devices are increasing which depends on wireless network to access the internet. In wireless availability of bandwidth is critical issue and we cannot afford wastage of it. The other drawback of client server model is synchronous communication between client and server. If suppose client fails or server fails or suppose there is a network failure then the whole communication is to be restarted. The other limitations of client server model include lack of autonomy, inefficient information retrieval and lack of adaptability to dynamic situation. III. MOBILE AGENT TECHNOLOGY Literature study shows that most of the work has been done which compares client server model with mobile agent technology. The result of these comparisons concluded that in most of the scenarios mobile agent technology is found to be more efficient as compared to client server model in distribution information retrieval [6][7].Mobile agent technology is an alternate approach to client server model and is expected to be best suited in design and implementation of distributed application [8].Mobile agents are the software programs that have wheels to move in the network and operate autonomously. User defines the MA with its requirement or task to be performed and the MA executes accordingly. While doing so MA moves in the network from node to node and executes at the node where it finds the required resources. If during execution it requires additional resources which are not available at the node then it saves it state and moves to other node. Following figure demonstrate the working of mobile agent technology. 735

4 Fig 3. Working of Mobile Agent Technology [4] MA always executes local to the data and this is major reason for its low bandwidth requirement. This also results in reduction of network load. Further mobile agent technology follows asynchronous communication so even if the user machine crashes or there is failure in the network MA can continue its execution on remote host. Mobile agent technology is best suited to automate the repetitive and time consuming activities. They are also expected to efficiently retrieve information in distributed environment [9]. Irrespective of the benefits offered by mobile agent technology, it has not found its real life application in e-commerce domain. One of the major reasons is the security requirement associated with the mobile agent technology as well as e-commerce domain. As money is directly or in directly involve in an e- commerce application so security plays in its successful deployment. Further, the use of mobile agent technology results in new type of attacks which include host to host attack, host to MA attack, MA to host attack and MA to MA attack [10][11]. To deploy e-commerce application using mobile agent technology all the security requirements are to be fulfilled and this enhances the design complexity of application. IV. HYBRID APPROACH Security plays a key role in success or failure of an e- commerce application, but security is not the only issue which completely governs an e-commerce application. But apart from security, the success and failure of an e-commerce application depends on a broad range of other issues which include trust, reputation, payment mechanism, advertising, organizing of information, ease of user interaction etc. Now, the above mentioned issues do not equally participate in success or failure of e-commerce application. For example, if an e-commerce application is designed to implement the online services offered by a bank then trust and payment mechanism are the factors which will govern its success or failure. Also, if an e-commerce application is designed for online shopping then comparison based shopping is the feature which will attract users towards it. Further, if an e-commerce application is designed for reservation of trains, buses, flights etc then redundancy is the factor which decides its successful deployment. This shows that the goal and functioning varies from application to application in e-commerce domain. 736

5 The idea proposed here is to develop mobile agent only for some activities of e-commerce and not to drive the complete application. This will reduce the complexity of design as well as the number of parameters to be handled. Alternatively this can be viewed as a system developed by a hybrid approach of client-server model and mobile agent technology. This can be explained by an example, suppose we are developing an online shopping application. Today whenever a user wants to buy a product he/she is required to visit the different sites to gather the information about the product and analyze the information to find the product which best meets the user requirement. Followed by it the user again visits the sites to find the dealer which offers best deal on the product and finally purchase the product. This complete process of shopping is too much time consuming and complex. So we can use mobile agent technology to automate this activity of buying process while the rest activities can be implemented using client server model. This can be explained with the help of following diagram: Fig 4. Working of Hybrid Approach In the above figure user interacts with the local server using client server model. It submits the requirement for a product through request and response. At local server a MA is defined on basis of the criteria entered by user. This MA then travels to different sites to find the product which best meets the user s requirements. At last the MA returns to our local server from where the result is forwarded to the user through client server model. The rest of transaction is carried out using client server model. In this way hybrid approach explores the advantages as well as overcome the limitations of both the technologies. This hybrid model may vary from application to application and from activity to activity for which the mobile agent is to be designed. V. CONCLUSION The increasing use of internet created new challenges in terms of bandwidth requirement and network management. Further with the growth in technology there is demand for autonomy and efficient information retrieval in domain of e-commerce. Though these parameters can be achieved by mobile agent technology but it had not found its suitable real life application in e-commerce. The major obstacle is the security requirement associated with the use of mobile agent as well as with e-commerce domain. So a hybrid approach of client server model and mobile agent technology to drive an e-commerce application is proposed. This hybrid approach will be helpful to enhance the potential and productivity of an e- commerce application. 737

6 VI. REFERENCES [1] A. Sengupta, C. Mazumdar, and M. S. Barik, e- Commerce security - a life cycle approach, in Sadhana Journal, vol. 30, number 2-3, pp , on Problems of Global Security, Moscow, Russia, November, 1998, pp [13] Dejan Milojicic, Mobile agent applications, IEEE Concurrency, July September [2] E COMMERCE, a book by CH.DEEPTHI, Assistant Professor, Sree Chaithanya College of Engineering, Karimnagar. [3] Mohammed Badrul Hasan and P.W. Chandana Prasad, A Review of Security Implications and possible solutions for Mobile,Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009),2009. [4] Abdelkader Outtagarts, Mobile Agent-based Applications : a Survey, International Journal of Computer Science and Network Security, VOL.9 No.11, November [5] Syed Adnan, John Datuin, Pavana Yalamanchili, A thesis on A Survey of Mobile Agent Systems, University of California [6] Yousry El-Gamal, Khalid El-Gazzar, and Magdy Saeb, A Comparative Performance Evaluation Model of Mobile Agent Versus Remote Method Invocation for Information Retrieval, World Academy of Science, Engineering and Technology, [7] Rahul Jha, A Thesis on Mobile agents for e- commerce, at IIT Bombay. [8] Vu Anh Pham and Ahmed Karmouch, Mobile Software Agents: An Overview, IEEE Communications Magazine July [9] Stefan Pleisch, A report on State of the Art of Mobile Agent Computing Security, Fault Tolerance, and Transaction Support, IBM Research, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland [10] Michael S. Greenberg and Jennifer C. Byingfon, Mobile Agents and Security, IEEE Communications Magazine, July [11] Wayne Jansen, Tom Karygiannis, Mobile Agent Security, NIST Special Publication [12] Christoph Busch, Volker Roth and Ralph Meister, Perspectives on Electronic Commerce with Mobile Agents, Proc. XI Amaldi Conference 738

Retrieving Business Applications using Open Web API s Web Mining Executive Dashboard Application Case Study

Retrieving Business Applications using Open Web API s Web Mining Executive Dashboard Application Case Study ISSN:0975-9646 A.V.Krishna Prasad et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (3), 2010, 198-202 Retrieving Business Applications using Open Web API

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Fig. 2. Architecture of the Banking System. C lient E nd. Server End. Server End. Server End. Server End. Graphical User Panel

Fig. 2. Architecture of the Banking System. C lient E nd. Server End. Server End. Server End. Server End. Graphical User Panel Distributed Banking with Mobile Agents: An Approach for E-Commerce R.B. PATEL and K. GARG Department of Electronics & Computer Engineering India Institute of Technology Roorkee, Roorkee-247667, Uttaranchal,

More information

Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents

Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 67-72 International Research Publications House http://www. irphouse.com /ijict.htm Trust

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid

More information

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

Load Testing on Web Application using Automated Testing Tool: Load Complete

Load Testing on Web Application using Automated Testing Tool: Load Complete Load Testing on Web Application using Automated Testing Tool: Load Complete Neha Thakur, Dr. K.L. Bansal Research Scholar, Department of Computer Science, Himachal Pradesh University, Shimla, India Professor,

More information

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

Deploying a distributed data storage system on the UK National Grid Service using federated SRB

Deploying a distributed data storage system on the UK National Grid Service using federated SRB Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications

More information

A Survey Paper: Cloud Computing and Virtual Machine Migration

A Survey Paper: Cloud Computing and Virtual Machine Migration 577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one

More information

E-commerce refers to paperless exchange of business information using following ways.

E-commerce refers to paperless exchange of business information using following ways. E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods

More information

A Satellite Network Management Architecture based on Mobile Agents and SNMP

A Satellite Network Management Architecture based on Mobile Agents and SNMP 2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli

More information

An Overview of Distributed Databases

An Overview of Distributed Databases International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

Cloud Computing : Concepts, Types and Research Methodology

Cloud Computing : Concepts, Types and Research Methodology Cloud Computing : Concepts, Types and Research Methodology S. Muthulakshmi Bangalore,Karnataka India- 560068 Abstract: Cloud -computing is a very popular term in this modern and computer world in IT solution

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Distribution transparency. Degree of transparency. Openness of distributed systems

Distribution transparency. Degree of transparency. Openness of distributed systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed

More information

Offline Data Synchronization in Order Management System

Offline Data Synchronization in Order Management System Offline Data Synchronization in Order Management System Abstract: We live in an increasingly connected world. However, in many cases we cannot rely on connectivity 100 percent of the time. Your users may

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Cloud Based E-Learning Platform Using Dynamic Chunk Size

Cloud Based E-Learning Platform Using Dynamic Chunk Size Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Logical Data Models for Cloud Computing Architectures

Logical Data Models for Cloud Computing Architectures Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps

More information

The Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World

The Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World The Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World Marcia Kaufman, COO and Principal Analyst Sponsored by CloudTran The Challenge of Managing On-line Transaction

More information

Filling the consistency and reliability gap in elastic cloud an IaaS approach

Filling the consistency and reliability gap in elastic cloud an IaaS approach International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 2 (February 2014), PP. 16-21 Filling the consistency and reliability gap

More information

EVOLUTION OF NETWORKED STORAGE

EVOLUTION OF NETWORKED STORAGE EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. sonika_manoj@yahoo.com 2 Lecturer, Deptt

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

Fault Tolerance Techniques in Big Data Tools: A Survey

Fault Tolerance Techniques in Big Data Tools: A Survey on 21 st & 22 nd April 2014, Organized by Fault Tolerance Techniques in Big Data Tools: A Survey Manjula Dyavanur 1, Kavita Kori 2 Asst. Professor, Dept. of CSE, SKSVMACET, Laxmeshwar-582116, India 1,2

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Survey on software testing techniques in cloud computing

Survey on software testing techniques in cloud computing Survey on software testing techniques in cloud computing V.Priyadharshini #1, Dr. A. Malathi *2 # PhD Research Scholar PG & Research Department of CS Government Arts College (Autonomous) Coimbatore 18.

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Chintan Bhatt 1, Asha Koshti 2,Hemant Agrawal 3, Zakiya Malek 4, Dr Bhushan Trivedi 5 MCA Dept.,GLS Institute of Computer

More information

Raghavendra Reddy D 1, G Kumara Swamy 2

Raghavendra Reddy D 1, G Kumara Swamy 2 Car Accident Detection, Communication And Tracking Using ARM7 Controller Raghavendra Reddy D 1, G Kumara Swamy 2 1 PG Scholar, Dept of ECE, Malla Reddy Engineering College (Autonomous), Hyderabad, India.

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

Mobile Agent System for Web Services Integration in Pervasive Networks

Mobile Agent System for Web Services Integration in Pervasive Networks Mobile Agent System for Web Services Integration in Pervasive Networks Fuyuki Ishikawa 1, Nobukazu Yoshioka 2, Yasuyuki Tahara 2, Shinichi Honiden 2,1 1 Graduate School of Information Science and Technology

More information

Rexjournal ISSN 2321-1067 Renewable Research Journal

Rexjournal ISSN 2321-1067 Renewable Research Journal Digital Marketing: Opportunities and Threats Rima Dinesh Puri Abstract Internet has become part of our daily lives. It plays role in various fields, may be to make friend or let friendship last, watching

More information

An Approach to Automate Power Meter Reading & Billing System

An Approach to Automate Power Meter Reading & Billing System Global Journal of Management and Business Studies. ISSN 2248-9878 Volume 3, Number 9 (2013), pp. 943-948 Research India Publications http://www.ripublication.com/gjmbs.htm An Approach to Automate Power

More information

Online Trading and Negotiation

Online Trading and Negotiation Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Efficient Service Broker Policy For Large-Scale Cloud Environments

Efficient Service Broker Policy For Large-Scale Cloud Environments www.ijcsi.org 85 Efficient Service Broker Policy For Large-Scale Cloud Environments Mohammed Radi Computer Science Department, Faculty of Applied Science Alaqsa University, Gaza Palestine Abstract Algorithms,

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

A platform independent approach for Mobile Agents to monitor Network Vulnerabilities

A platform independent approach for Mobile Agents to monitor Network Vulnerabilities A platform independent approach for Mobile Agents to monitor Network Vulnerabilities GHULAM ALI MALLAH, DR. ZUBAIR A. SHAIKH National University of Computer & Emerging Sciences Shah Latif Town, National

More information

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing International Journal of Information Science and Intelligent System, Vol. 2, No.4, 2013 Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing Achin Mishra 1 1 Department

More information

Agent Based Negotiation using Cloud - an Approach in E-Commerce

Agent Based Negotiation using Cloud - an Approach in E-Commerce Agent Based Negotiation using Cloud - an Approach in E-Commerce Amruta More 1, Sheetal Vij 1, Debajyoti Mukhopadhyay 2, 1 Department of Computer Engineering, 2 Department of Information Technology, Maharashtra

More information

Analysis of E-Commerce Security Protocols SSL and SET

Analysis of E-Commerce Security Protocols SSL and SET Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

Research on Mobile Agent-based E-Commerce System Framework

Research on Mobile Agent-based E-Commerce System Framework 440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 wenal@sina.com, 2 somdyang@dlut.edu.cn ABSTRACT

More information

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval , pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Private Cloud in Educational Institutions: An Implementation using UEC

Private Cloud in Educational Institutions: An Implementation using UEC Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,

More information

Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT

Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT S. Gobinath, S. Saravanan PG Scholar, CSE Dept, M.Kumarasamy College of Engineering, Karur, India 1 Assistant Professor,

More information

INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS

INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS P.Shanthi Bala Lecturer, Department of Computer Science, Pondicherry University, Puducherry. Abstract Cloud computing

More information

A Survey on Cloud Computing Security, Challenges and Threats

A Survey on Cloud Computing Security, Challenges and Threats A Survey on Cloud Computing Security, Challenges and Threats Rajnish Choubey 1, Rajshree Dubey 2, Joy Bhattacharjee 3 1 Assistant Professor, Dept. of CSE, TCT, Bhopal, India 2. Assistant Professor, Dept.

More information

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,

More information

Appendix A Core Concepts in SQL Server High Availability and Replication

Appendix A Core Concepts in SQL Server High Availability and Replication Appendix A Core Concepts in SQL Server High Availability and Replication Appendix Overview Core Concepts in High Availability Core Concepts in Replication 1 Lesson 1: Core Concepts in High Availability

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of

More information

E-Commerce: From Converging 'B2B versus B2C' Segments to Solutions for Different Product Groups

E-Commerce: From Converging 'B2B versus B2C' Segments to Solutions for Different Product Groups E-Commerce: From Converging 'B2B versus B2C' Segments to Solutions for Different Product Groups Prof. Dr. Claudia Loebbecke, M.B.A. Chaired Professor of Media Management University of Cologne Pohligstr.

More information

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic

More information

Selection of Web Services for Composition Using Location of Provider Hosts Criterion

Selection of Web Services for Composition Using Location of Provider Hosts Criterion Selection of Web Services for Composition Using Location of Provider Hosts Criterion Zakaria Maamar 1, Quan Z. Sheng 2, and Boualem Benatallah 2 1 College of Information Systems Zayed University, Dubai,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Next Generation Mobile Care Solution Jithesh Sathyan and Manesh Sadasivan Infosys Technologies Limited ( jithesh_sathyan; smanesh ) @infosys.

Next Generation Mobile Care Solution Jithesh Sathyan and Manesh Sadasivan Infosys Technologies Limited ( jithesh_sathyan; smanesh ) @infosys. Next Generation Mobile Care Solution Jithesh Sathyan and Manesh Sadasivan Infosys Technologies Limited ( jithesh_sathyan; smanesh ) @infosys.com Abstract Customer care has evolved over the years. In the

More information

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri

More information

Framework to detect and repair distributed intrusions based on mobile agent in hybrid cloud

Framework to detect and repair distributed intrusions based on mobile agent in hybrid cloud Framework to detect and repair distributed intrusions based on mobile agent in hybrid cloud Abir KHALDI 1, Kamel KAROUI 1, Henda BEN GHEZALA 1 1 RIADI Laboratory ENSI, University of Manouba, Manouba, Tunisia

More information

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India adgaonkarbhavana@yahoo.in

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

Distributed Systems and Recent Innovations: Challenges and Benefits

Distributed Systems and Recent Innovations: Challenges and Benefits Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department

More information

Private Vs Public Cloud

Private Vs Public Cloud Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India solankevs@mmpolytechnic.com

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 0 INFORMATION TECHNOLOGY TUTORIAL QUESTION BANK Name : Cloud computing Code : A60519 Class : III B. Tech II Semester Branch

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Cloud Computing: A General User s Perceptions and Security Issues at Universities of Faisalabad, Pakistan

Cloud Computing: A General User s Perceptions and Security Issues at Universities of Faisalabad, Pakistan www.ijcsi.org 375 Cloud Computing: A General User s Perceptions and Security Issues at Universities of Faisalabad, Pakistan Muhammad Haris Abid 1, Fahad Jan 2, Tasleem Mustafa 3, Muhammad Shakeel Faridi

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

Cloud Computing: Issues Related with Cloud Service Providers

Cloud Computing: Issues Related with Cloud Service Providers Cloud Computing: Issues Related with Cloud Service Providers Nikhil Ranjan Assistant Professor Tula s Institute, Dehradun (An Engineering & Management College) Abstract- The Cloud Computing and the storage

More information

Cloud Computing in Higher Education: Impact and Challenges

Cloud Computing in Higher Education: Impact and Challenges Cloud Computing in Higher Education: Impact and Challenges Anju Gautam Research Scholar, Jagannath University, Jaipur Abstract: Cloud computing is a slogan at present days. It has altered the entire state

More information

A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING

A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING Grozdalina Grozeva 1, Yordan Dimitrov 2 1 Department of Management, Technical University, Bulgaria, E-mail: grozeva77@abv.bg 2 Department of Management, Technical

More information

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which

More information

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm Performance Evaluation of Mobile -based Dynamic Load Balancing Algorithm MAGDY SAEB, CHERINE FATHY Computer Engineering Department Arab Academy for Science, Technology & Maritime Transport Alexandria,

More information

Implementing & Developing Cloud Computing on Web Application

Implementing & Developing Cloud Computing on Web Application Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing

OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing K. Satheeshkumar PG Scholar K. Senthilkumar PG Scholar A. Selvakumar Assistant Professor Abstract- Cloud computing is a large-scale

More information

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

A STUDY ON CLOUD STORAGE

A STUDY ON CLOUD STORAGE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966

More information

E-learning Using Cloud Computing

E-learning Using Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 41-46 International Research Publications House http://www. irphouse.com /ijict.htm E-learning

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information