Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application
|
|
- Ronald Hunter
- 8 years ago
- Views:
Transcription
1 Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Ajab Maheshwari PG Scholar, IT Dept, IET-DAVV, Indore (M.P.), India. Dr. Pratosh Bansal Associate Professor, IT Dept, IET-DAVV, Indore (M.P.), India. Abstract-The concept of e-commerce has emerged as a revolution to execute business activities over internet. This architecture of e-commerce is developed on the foundation of client server model. As a result, reduced cost of production and unrestricted physical boundaries are the major benefits offered by e-commerce over traditional commerce. Though these benefits have attracted great number of users but still there are some drawbacks that have restricted to completely transfer traditional model to e-commerce model. One of the drawbacks is the large bandwidth requirement for an e- commerce application, deployed using client server model. Second is efficient information retrieval and autonomy in application are hard to achieve in client server model. To overcome these drawbacks Mobile Agent Technology has been proposed. Though mobile agent technology over comes the limitations of client server model but simultaneously use of mobile agent technology enhances the security requirement of an e- commerce application. In this paper a hybrid approach of client server model and mobile agent technology to develop an e-commerce application is proposed, to overcome the limitations of both the models. Keywords- Mobile Agents, E-Commerce, Client-Server, Bandwidth. I. INTRODUCTION Internet has evolved as a revolution in field of communication. It was developed to provide resource sharing and communication between two machines situated at remote locations. But today internet is not at all restricted to these functionalities; in fact it had lead to the development of a new way to conduct business activities over internet. In this new form of conducting business, the buying and selling of goods and services is done over the foundation of internet. This way of performing business is termed as e- commerce. E-commerce has enhanced the opportunities for both the sellers as well as the buyers. Today sellers are not at all restricted to physical boundaries to sell their product in fact they can easily reach the narrow market segments of the world. Even for the buyers there are wide range of options available to buy the product which best meets their requirement [1]. All these benefits offered by e- commerce have resulted in the expansion of internet to a great extent. Actually the concept of e-commerce exits in reality only because of client server model. The structure of an e-commerce application completely relies on client server model for its successful deployment. In client server model, client is a program which makes request for services and server is a program which offers this services. Users or buyers make use of this client program to request for a product or service where as sellers or buyers offer there product or services through server program. It is this interaction between client and server which transforms the concept of e-commerce to reality. The interaction between client and server is done through message passing over the network [2]. This communication between client and server demands large bandwidth requirement. But the increasing popularity of e- commerce created new challenges in terms of bandwidth requirement and network management. As a solution to above mentioned problem, Mobile Agent (MA) technology is a common approach used these days. As quoted by Mohammed Badrul Hasan and P.W.Chandana Prasad MA are software entities that can migrate across network i.e. has mobility, to perform desired task of user on his behalf hence called an agent [3]. The user programs the agent with his instructions and the agent performs the task accordingly. For example, in real life situation, mobile agent can be mapped to property broker agent who searches for commercial or residential area on 733
2 behalf of their client to satisfy client s requirement. Mobile agent operates local to the data and this is major reason for low bandwidth requirement. The other benefits offered by mobile agent technology include reduction in network load, continued execution even when disconnected from network, reliability and asynchronous communication [4]. In spite of the above mentioned benefits offered by mobile agent technology, the issue which hinders its implementation in e-commerce domain is security. The use of mobile agent technology has encountered new type of attacks which enhances the security requirement of an application. The section two of this paper explains the working of client server model. It also describes the limitations or problems encountered in this paradigm with respect to e-commerce domain. Section three explains the working of mobile agent technology and how it overcomes the limitations of client server model. It also briefly explains the issues which hinders its implementation in e-commerce. Section four explains about our proposed hybrid approach to meet all the requirements. Finally section five concludes the findings. II. CLIENT SERVER MODEL The concept of distributed computing is most successfully implemented using client server model. In client server model there are two fixed entities; one is regarded as server and the other one as client. The entity which offers the services is termed as server and the one which makes the request for these services is called client. The transaction or communication between client and server is done through message passing. If a client requires a set of services then it makes a request to the server, the server accepts the request, process it and reply the client with the response [2]. Following figure demonstrates the working of client server model [Fig 1]. Fig 1. Working of Client server model [2] Study of client server model by research community concluded that, one of the major drawbacks of client server is that the roles of client and server are fixed and this makes client fully dependent on server i.e. if a server does not provide a particular services then client has to find the other server which provides the required services. To identify the server which offers the required services, client has to make makes request to all the servers but the positive response is obtain only from the server which provides the required services. All other requested server replies with negative response. This is clearly an inefficient use of network bandwidth [5]. This completely scenario can be visualized through following diagram [Fig 2]: 734
3 Fig 2. Bandwidth usage scenario Further, the uses of portable devices are increasing which depends on wireless network to access the internet. In wireless availability of bandwidth is critical issue and we cannot afford wastage of it. The other drawback of client server model is synchronous communication between client and server. If suppose client fails or server fails or suppose there is a network failure then the whole communication is to be restarted. The other limitations of client server model include lack of autonomy, inefficient information retrieval and lack of adaptability to dynamic situation. III. MOBILE AGENT TECHNOLOGY Literature study shows that most of the work has been done which compares client server model with mobile agent technology. The result of these comparisons concluded that in most of the scenarios mobile agent technology is found to be more efficient as compared to client server model in distribution information retrieval [6][7].Mobile agent technology is an alternate approach to client server model and is expected to be best suited in design and implementation of distributed application [8].Mobile agents are the software programs that have wheels to move in the network and operate autonomously. User defines the MA with its requirement or task to be performed and the MA executes accordingly. While doing so MA moves in the network from node to node and executes at the node where it finds the required resources. If during execution it requires additional resources which are not available at the node then it saves it state and moves to other node. Following figure demonstrate the working of mobile agent technology. 735
4 Fig 3. Working of Mobile Agent Technology [4] MA always executes local to the data and this is major reason for its low bandwidth requirement. This also results in reduction of network load. Further mobile agent technology follows asynchronous communication so even if the user machine crashes or there is failure in the network MA can continue its execution on remote host. Mobile agent technology is best suited to automate the repetitive and time consuming activities. They are also expected to efficiently retrieve information in distributed environment [9]. Irrespective of the benefits offered by mobile agent technology, it has not found its real life application in e-commerce domain. One of the major reasons is the security requirement associated with the mobile agent technology as well as e-commerce domain. As money is directly or in directly involve in an e- commerce application so security plays in its successful deployment. Further, the use of mobile agent technology results in new type of attacks which include host to host attack, host to MA attack, MA to host attack and MA to MA attack [10][11]. To deploy e-commerce application using mobile agent technology all the security requirements are to be fulfilled and this enhances the design complexity of application. IV. HYBRID APPROACH Security plays a key role in success or failure of an e- commerce application, but security is not the only issue which completely governs an e-commerce application. But apart from security, the success and failure of an e-commerce application depends on a broad range of other issues which include trust, reputation, payment mechanism, advertising, organizing of information, ease of user interaction etc. Now, the above mentioned issues do not equally participate in success or failure of e-commerce application. For example, if an e-commerce application is designed to implement the online services offered by a bank then trust and payment mechanism are the factors which will govern its success or failure. Also, if an e-commerce application is designed for online shopping then comparison based shopping is the feature which will attract users towards it. Further, if an e-commerce application is designed for reservation of trains, buses, flights etc then redundancy is the factor which decides its successful deployment. This shows that the goal and functioning varies from application to application in e-commerce domain. 736
5 The idea proposed here is to develop mobile agent only for some activities of e-commerce and not to drive the complete application. This will reduce the complexity of design as well as the number of parameters to be handled. Alternatively this can be viewed as a system developed by a hybrid approach of client-server model and mobile agent technology. This can be explained by an example, suppose we are developing an online shopping application. Today whenever a user wants to buy a product he/she is required to visit the different sites to gather the information about the product and analyze the information to find the product which best meets the user requirement. Followed by it the user again visits the sites to find the dealer which offers best deal on the product and finally purchase the product. This complete process of shopping is too much time consuming and complex. So we can use mobile agent technology to automate this activity of buying process while the rest activities can be implemented using client server model. This can be explained with the help of following diagram: Fig 4. Working of Hybrid Approach In the above figure user interacts with the local server using client server model. It submits the requirement for a product through request and response. At local server a MA is defined on basis of the criteria entered by user. This MA then travels to different sites to find the product which best meets the user s requirements. At last the MA returns to our local server from where the result is forwarded to the user through client server model. The rest of transaction is carried out using client server model. In this way hybrid approach explores the advantages as well as overcome the limitations of both the technologies. This hybrid model may vary from application to application and from activity to activity for which the mobile agent is to be designed. V. CONCLUSION The increasing use of internet created new challenges in terms of bandwidth requirement and network management. Further with the growth in technology there is demand for autonomy and efficient information retrieval in domain of e-commerce. Though these parameters can be achieved by mobile agent technology but it had not found its suitable real life application in e-commerce. The major obstacle is the security requirement associated with the use of mobile agent as well as with e-commerce domain. So a hybrid approach of client server model and mobile agent technology to drive an e-commerce application is proposed. This hybrid approach will be helpful to enhance the potential and productivity of an e- commerce application. 737
6 VI. REFERENCES [1] A. Sengupta, C. Mazumdar, and M. S. Barik, e- Commerce security - a life cycle approach, in Sadhana Journal, vol. 30, number 2-3, pp , on Problems of Global Security, Moscow, Russia, November, 1998, pp [13] Dejan Milojicic, Mobile agent applications, IEEE Concurrency, July September [2] E COMMERCE, a book by CH.DEEPTHI, Assistant Professor, Sree Chaithanya College of Engineering, Karimnagar. [3] Mohammed Badrul Hasan and P.W. Chandana Prasad, A Review of Security Implications and possible solutions for Mobile,Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009),2009. [4] Abdelkader Outtagarts, Mobile Agent-based Applications : a Survey, International Journal of Computer Science and Network Security, VOL.9 No.11, November [5] Syed Adnan, John Datuin, Pavana Yalamanchili, A thesis on A Survey of Mobile Agent Systems, University of California [6] Yousry El-Gamal, Khalid El-Gazzar, and Magdy Saeb, A Comparative Performance Evaluation Model of Mobile Agent Versus Remote Method Invocation for Information Retrieval, World Academy of Science, Engineering and Technology, [7] Rahul Jha, A Thesis on Mobile agents for e- commerce, at IIT Bombay. [8] Vu Anh Pham and Ahmed Karmouch, Mobile Software Agents: An Overview, IEEE Communications Magazine July [9] Stefan Pleisch, A report on State of the Art of Mobile Agent Computing Security, Fault Tolerance, and Transaction Support, IBM Research, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland [10] Michael S. Greenberg and Jennifer C. Byingfon, Mobile Agents and Security, IEEE Communications Magazine, July [11] Wayne Jansen, Tom Karygiannis, Mobile Agent Security, NIST Special Publication [12] Christoph Busch, Volker Roth and Ralph Meister, Perspectives on Electronic Commerce with Mobile Agents, Proc. XI Amaldi Conference 738
Retrieving Business Applications using Open Web API s Web Mining Executive Dashboard Application Case Study
ISSN:0975-9646 A.V.Krishna Prasad et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (3), 2010, 198-202 Retrieving Business Applications using Open Web API
More informationADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
More informationFig. 2. Architecture of the Banking System. C lient E nd. Server End. Server End. Server End. Server End. Graphical User Panel
Distributed Banking with Mobile Agents: An Approach for E-Commerce R.B. PATEL and K. GARG Department of Electronics & Computer Engineering India Institute of Technology Roorkee, Roorkee-247667, Uttaranchal,
More informationTrust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 67-72 International Research Publications House http://www. irphouse.com /ijict.htm Trust
More informationMobile Cloud Computing In Business
Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud
More informationAdvanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
More informationImplementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid
More informationA Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents
A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,
More informationA Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu
More informationA Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationLoad Testing on Web Application using Automated Testing Tool: Load Complete
Load Testing on Web Application using Automated Testing Tool: Load Complete Neha Thakur, Dr. K.L. Bansal Research Scholar, Department of Computer Science, Himachal Pradesh University, Shimla, India Professor,
More informationA Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System
A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,
More informationA QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
More informationMobile Software Agents: an Overview
Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile
More informationDeploying a distributed data storage system on the UK National Grid Service using federated SRB
Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications
More informationA Survey Paper: Cloud Computing and Virtual Machine Migration
577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one
More informationE-commerce refers to paperless exchange of business information using following ways.
E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods
More informationA Satellite Network Management Architecture based on Mobile Agents and SNMP
2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli
More informationAn Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
More informationCLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali
More informationCloud Computing : Concepts, Types and Research Methodology
Cloud Computing : Concepts, Types and Research Methodology S. Muthulakshmi Bangalore,Karnataka India- 560068 Abstract: Cloud -computing is a very popular term in this modern and computer world in IT solution
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationDistribution transparency. Degree of transparency. Openness of distributed systems
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed
More informationOffline Data Synchronization in Order Management System
Offline Data Synchronization in Order Management System Abstract: We live in an increasingly connected world. However, in many cases we cannot rely on connectivity 100 percent of the time. Your users may
More informationKeywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationCloud Based E-Learning Platform Using Dynamic Chunk Size
Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential
More informationEMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationA distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
More informationLogical Data Models for Cloud Computing Architectures
Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps
More informationThe Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World
The Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World Marcia Kaufman, COO and Principal Analyst Sponsored by CloudTran The Challenge of Managing On-line Transaction
More informationFilling the consistency and reliability gap in elastic cloud an IaaS approach
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 2 (February 2014), PP. 16-21 Filling the consistency and reliability gap
More informationEVOLUTION OF NETWORKED STORAGE
EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. sonika_manoj@yahoo.com 2 Lecturer, Deptt
More informationRole of Cloud Computing in Education
Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic
More informationFault Tolerance Techniques in Big Data Tools: A Survey
on 21 st & 22 nd April 2014, Organized by Fault Tolerance Techniques in Big Data Tools: A Survey Manjula Dyavanur 1, Kavita Kori 2 Asst. Professor, Dept. of CSE, SKSVMACET, Laxmeshwar-582116, India 1,2
More informationAn Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
More informationCollaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationSurvey on software testing techniques in cloud computing
Survey on software testing techniques in cloud computing V.Priyadharshini #1, Dr. A. Malathi *2 # PhD Research Scholar PG & Research Department of CS Government Arts College (Autonomous) Coimbatore 18.
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationArchitecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Chintan Bhatt 1, Asha Koshti 2,Hemant Agrawal 3, Zakiya Malek 4, Dr Bhushan Trivedi 5 MCA Dept.,GLS Institute of Computer
More informationRaghavendra Reddy D 1, G Kumara Swamy 2
Car Accident Detection, Communication And Tracking Using ARM7 Controller Raghavendra Reddy D 1, G Kumara Swamy 2 1 PG Scholar, Dept of ECE, Malla Reddy Engineering College (Autonomous), Hyderabad, India.
More informationREVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES
REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant
More informationMobile Agent System for Web Services Integration in Pervasive Networks
Mobile Agent System for Web Services Integration in Pervasive Networks Fuyuki Ishikawa 1, Nobukazu Yoshioka 2, Yasuyuki Tahara 2, Shinichi Honiden 2,1 1 Graduate School of Information Science and Technology
More informationRexjournal ISSN 2321-1067 Renewable Research Journal
Digital Marketing: Opportunities and Threats Rima Dinesh Puri Abstract Internet has become part of our daily lives. It plays role in various fields, may be to make friend or let friendship last, watching
More informationAn Approach to Automate Power Meter Reading & Billing System
Global Journal of Management and Business Studies. ISSN 2248-9878 Volume 3, Number 9 (2013), pp. 943-948 Research India Publications http://www.ripublication.com/gjmbs.htm An Approach to Automate Power
More informationOnline Trading and Negotiation
Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -
More informationAuthentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
More informationEfficient Service Broker Policy For Large-Scale Cloud Environments
www.ijcsi.org 85 Efficient Service Broker Policy For Large-Scale Cloud Environments Mohammed Radi Computer Science Department, Faculty of Applied Science Alaqsa University, Gaza Palestine Abstract Algorithms,
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationA platform independent approach for Mobile Agents to monitor Network Vulnerabilities
A platform independent approach for Mobile Agents to monitor Network Vulnerabilities GHULAM ALI MALLAH, DR. ZUBAIR A. SHAIKH National University of Computer & Emerging Sciences Shah Latif Town, National
More informationEmbedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing
International Journal of Information Science and Intelligent System, Vol. 2, No.4, 2013 Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing Achin Mishra 1 1 Department
More informationAgent Based Negotiation using Cloud - an Approach in E-Commerce
Agent Based Negotiation using Cloud - an Approach in E-Commerce Amruta More 1, Sheetal Vij 1, Debajyoti Mukhopadhyay 2, 1 Department of Computer Engineering, 2 Department of Information Technology, Maharashtra
More informationAnalysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
More informationCloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
More informationFEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
More informationHigh Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
More informationInvestigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
More informationResearch on Mobile Agent-based E-Commerce System Framework
440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 wenal@sina.com, 2 somdyang@dlut.edu.cn ABSTRACT
More informationA Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
More informationTowards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain
Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,
More informationPrivate Cloud in Educational Institutions: An Implementation using UEC
Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,
More informationExperimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT
Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT S. Gobinath, S. Saravanan PG Scholar, CSE Dept, M.Kumarasamy College of Engineering, Karur, India 1 Assistant Professor,
More informationINTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS
INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS P.Shanthi Bala Lecturer, Department of Computer Science, Pondicherry University, Puducherry. Abstract Cloud computing
More informationA Survey on Cloud Computing Security, Challenges and Threats
A Survey on Cloud Computing Security, Challenges and Threats Rajnish Choubey 1, Rajshree Dubey 2, Joy Bhattacharjee 3 1 Assistant Professor, Dept. of CSE, TCT, Bhopal, India 2. Assistant Professor, Dept.
More informationPeer-to-Peer: an Enabling Technology for Next-Generation E-learning
Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,
More informationAppendix A Core Concepts in SQL Server High Availability and Replication
Appendix A Core Concepts in SQL Server High Availability and Replication Appendix Overview Core Concepts in High Availability Core Concepts in Replication 1 Lesson 1: Core Concepts in High Availability
More informationCHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
More informationENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationE-Commerce: From Converging 'B2B versus B2C' Segments to Solutions for Different Product Groups
E-Commerce: From Converging 'B2B versus B2C' Segments to Solutions for Different Product Groups Prof. Dr. Claudia Loebbecke, M.B.A. Chaired Professor of Media Management University of Cologne Pohligstr.
More informationFair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing
Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic
More informationSelection of Web Services for Composition Using Location of Provider Hosts Criterion
Selection of Web Services for Composition Using Location of Provider Hosts Criterion Zakaria Maamar 1, Quan Z. Sheng 2, and Boualem Benatallah 2 1 College of Information Systems Zayed University, Dubai,
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationNext Generation Mobile Care Solution Jithesh Sathyan and Manesh Sadasivan Infosys Technologies Limited ( jithesh_sathyan; smanesh ) @infosys.
Next Generation Mobile Care Solution Jithesh Sathyan and Manesh Sadasivan Infosys Technologies Limited ( jithesh_sathyan; smanesh ) @infosys.com Abstract Customer care has evolved over the years. In the
More informationA FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
More informationFramework to detect and repair distributed intrusions based on mobile agent in hybrid cloud
Framework to detect and repair distributed intrusions based on mobile agent in hybrid cloud Abir KHALDI 1, Kamel KAROUI 1, Henda BEN GHEZALA 1 1 RIADI Laboratory ENSI, University of Manouba, Manouba, Tunisia
More informationAutomating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology
Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India adgaonkarbhavana@yahoo.in
More informationPERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department
More informationDistributed Systems and Recent Innovations: Challenges and Benefits
Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department
More informationPrivate Vs Public Cloud
Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India solankevs@mmpolytechnic.com
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 0 INFORMATION TECHNOLOGY TUTORIAL QUESTION BANK Name : Cloud computing Code : A60519 Class : III B. Tech II Semester Branch
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationCloud Computing: A General User s Perceptions and Security Issues at Universities of Faisalabad, Pakistan
www.ijcsi.org 375 Cloud Computing: A General User s Perceptions and Security Issues at Universities of Faisalabad, Pakistan Muhammad Haris Abid 1, Fahad Jan 2, Tasleem Mustafa 3, Muhammad Shakeel Faridi
More informationCloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
More informationCloud Computing: Issues Related with Cloud Service Providers
Cloud Computing: Issues Related with Cloud Service Providers Nikhil Ranjan Assistant Professor Tula s Institute, Dehradun (An Engineering & Management College) Abstract- The Cloud Computing and the storage
More informationCloud Computing in Higher Education: Impact and Challenges
Cloud Computing in Higher Education: Impact and Challenges Anju Gautam Research Scholar, Jagannath University, Jaipur Abstract: Cloud computing is a slogan at present days. It has altered the entire state
More informationA STUDY OF OPEN INNOVATION IN CLOUD COMPUTING
A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING Grozdalina Grozeva 1, Yordan Dimitrov 2 1 Department of Management, Technical University, Bulgaria, E-mail: grozeva77@abv.bg 2 Department of Management, Technical
More informationAEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha
Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which
More informationCLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
More informationA STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
More informationPerformance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm
Performance Evaluation of Mobile -based Dynamic Load Balancing Algorithm MAGDY SAEB, CHERINE FATHY Computer Engineering Department Arab Academy for Science, Technology & Maritime Transport Alexandria,
More informationImplementing & Developing Cloud Computing on Web Application
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationOCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing K. Satheeshkumar PG Scholar K. Senthilkumar PG Scholar A. Selvakumar Assistant Professor Abstract- Cloud computing is a large-scale
More informationSelf-organized Multi-agent System for Service Management in the Next Generation Networks
PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek
More informationA STUDY ON CLOUD STORAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966
More informationE-learning Using Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 41-46 International Research Publications House http://www. irphouse.com /ijict.htm E-learning
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More information