Online Mobile Cloud Based Compiler



Similar documents
Enhancing the Mobile Cloud Server security by MAC Address

SeChat: An AES Encrypted Chat

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Data Integrity by Aes Algorithm ISSN

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

(C) Global Journal of Engineering Science and Research Management

Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Security Issues In Cloud Computing and Countermeasures

Implementation of Full -Parallelism AES Encryption and Decryption

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Efficient Software Implementation of AES on 32-bit Platforms

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL

Security Considerations for Public Mobile Cloud Computing

IJESRT. [Padama, 2(5): May, 2013] ISSN:

A Comparative Study of cloud and mcloud Computing

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

How To Make A Secure Storage On A Mobile Device Secure

Step by Step. Use the Cloud Login Website

SYSPRO App Store: Registration Guide

Healthcare Documentation Fundamental and Practice Transcription Exercise Students Module Users Guide

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

Team 23 Design Document. Customer Loyalty Program for Small Businesses

Anchor End-User Guide

Management, Logging and Troubleshooting

Mobile Hybrid Cloud Computing Issues and Solutions

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONSAND TECHNOLOGY. An Online Application for Programming Languages

Cloud Computing with Azure PaaS for Educational Institutions

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan

Mobile Field Service Engineer Application

Protect Integrity of Data in Cloud Assisted Privacy Preserving Mobile Health Monitoring

HarePoint Workflow Extensions for Office 365. Quick Start Guide

International Journal of Advanced Research in Computer Science and Software Engineering

Cloud Based Collaboration Tool Rohini C. Ekghare*, Prof. Manish Hadap**

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Wadala, Mumbai-037, India Wadala, Mumbai-037, India Wadala, Mumbai-037, India

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Remote Desktop Access Through Android Mobile Phones and Reverse

THIRD PARTY AUDITING SYSTEM FOR CLOUD STORAGE

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

Cloud Computing For Distributed University Campus: A Prototype Suggestion

The Advanced Encryption Standard (AES)

Cloud Data Protection for the Masses

A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing

Credibly secure cloud storage with elfcloud

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Overview. Timeline Cloud Features and Technology

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Android Application for Online Admission Process

In the proposed work, cloud mobile media which is a centric multimedia streaming system. Aim of the proposed

Fast remote data access for control of TCP/IP network using android Mobile device

Out of Harms Reach -A Whitepaper on Online Backup

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Internet Address: cloud.ndcl.org

Granule based File Storage System with Secure Transparent Availability

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

Indian Journal of Science International Weekly Journal for Science ISSN EISSN Discovery Publication. All Rights Reserved

A Monitored Student Testing Application Using Cloud Computing

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

Configuring Nex-Gen Web Load Balancer

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY

Final Year Project Interim Report

LAN Monitoring Using Android Phone

Trend Micro KASEYA INTEGRATION GUIDE

Living Requirements Document: Sniffit

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

DCH File Transfer Application User Manual

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

SECURITY DOCUMENT. BetterTranslationTechnology

Spring 2014 Urban Affairs network computers and computer labs Mapping your H:\ drive using Microsoft Windows 7

itunes Store Publisher User Guide Version 1.1

Virtual Code Authentication User s Guide. June 25, 2015

ABSTRACT I. INTRODUCTION

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

Cloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Privacy Preserving Public Auditing for Data in Cloud Storage

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

AVLOR SERVER CLOUD RECOVERY

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

Database Migration over Network

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Dashlane Security Whitepaper

Journal of Electronic Banking Systems

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

A Survey on Software as a Service (Saas) Cloud for Programming Language Computing

Transcription:

www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10400-10403 Online Mobile Cloud Based Compiler Miss. Pooja D. Pawar, Miss. Sheetal S. Rai, Miss. Madhuri V. Sherawade NMIET,Talegaon Dabhade pooja93pawar@gmail.com NMIET, Talegaon Dabhade sheetu92rai@gmail.com NMIET,TalegaonDabhade madhu93sherwade@gmail.com ABSTRACT Now a days Cloud computing is a very popular and rising technology using which it is easy to access on-demand network resources in a convenient manner. Mobile cloud computing is the availability of cloud computing services in a mobile ecosystem. Mobile cloud computing means services are provided by a cloud and anyone can accessed through mobile platforms. This paper introduce C/C++/JAVA compilers which make it easy to compile and execute programs anytime anywhere by using their android smartphone. The main aim of this application is that their is no need to install any software/compilers in their phones. Anyone can access these C/C++/JAVA compilers remotely through network. General Terms AES algorithm, Compilers. Keywords Cloud computing, Mobile cloud computing, compilers, JSON, Mobile.web services. 1. INTRODUCTION Cloud computing is a good technology which provides flexibility for all educational institutions and the academic organization s needs, the platform and applications in cloud computing may be on the institution campus, off campus, or a combination of both. It fulfills the need of effective infrastructure and deployment model for their dynamic demands. In current scenarios for executing a program we need a machine in which C/C++/JAVA softwares must be installed saperately on each machine. So it is time consuming process as well as it requires more resources. Thats why we implement the "Online Mobile cloud based compilers". In which we are using mobile with cloud computing services. many public and private institutions are uses cloud computing for better delivery of resources even as they work with fewer resources. Now a days everyone has their own android smartphones by using which everyone can compile and execute C/C++ and JAVA programs.it is useful for students, teachers, faculty, and staff. Because of which teaching and learning can take place from different places and at whenever that require and at any time. Using any Internet connected device.students and teachers can access the content they need from home, train,park and library etc. 2. MOBILE CLOUD COMPUTING Fig. 1. Mobile Cloud computing Mobile devices are uses more processing power as well as battery life and it requires more storage. Cloud computing and mobile are two such things use of these two is changing our lives. Mobile cloud computing is useful in our day to day life. Cloud computing provides an infinite computing resources. So new technology Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No.10400-10403 Page 10400

introduced called "Mobile Cloud Computing". Mobile cloud computing is a new platform combining the mobile devices and cloud computing to create a new infrastructure, whereby cloud performs the hard and heavy lifting of computing tasks and storing huge amounts of data which we can not perform in mobile. In this new architecture, data processing and data storage is done outside of mobile devices. Features of mobile cloud computing: 1. Automated backups,uptime,sla,maintenance. 2.Automated upgrades. 3.Web and mobile access from anywhere. 4.Modern web based integration. 5.Elastic,pay as you go scale up or down. 6.Multi-tenant solution provided by vendor. 3. SYSTEM ARCHITECTURE In system architecture there are three modules: Admin module. Cloud server. User module. 3.1 Admin: Fig.2 System Architecture 3.1.1 User management: Manages user related data. Username and password. How many users uses which type of compiler from(c/c++/java). Validate users. 3.1.2 Report Management: Manages different types of reports. Audit reports. Tracking reports. Maintains records of which compiler is most uses by user. 3.1.3 Group Management: Manages group related information. Maintains size of the group Keeps track of which user exist in which group. 3.2 Cloud server: Compilers are hosted on to the cloud like C/C++/JAVA. Web services are also hosted on to the cloud. Which are used for interacting the mobile device with the cloud server on which compilers are installed. Database is for maintaining record of user, code, compilation and execution. 3.3 User: Users are android mobile users. Users are responsible for typing their program and upload that program on the server then server executes the program and display the result on user s screen. 4. WORKING OF SYSTEM The user will first select the language of the program that is C/C++/JAVA and then writes their program on editor or download the program which is available. Then upload the program on server by clicking on upload button. when user click on upload button an android java activity will be executed and the program file will get wrapped into JSON object. After that the program is send in JSON string format to the server program application the device.then program is save on the cloud server and returns the program ID on user mobile. After clicking on compile button the program is sent for compilation. A java application is hosted onto the server which will accept the program file data which is in JSON string format. Then it will retrieve the required data and make two files one for program code and other for its respective input file. Then the program file will its respective input file is compile on mingw compiler and the result is store in a file. If program contains errors then errors of the compile program file is wrapped in JSON format and transferred back to android device in JSON string format. And if program does not contain any errors then message "Compiled successfully" is displayed on the user's screen. Then user will click on execute button the respective program is executed on server and result is again wrapped into the JSON string format and received result is display on the device. We are used REST web service over SOAP. Restful web service having more architectural advantages than SOAP using which you can design web services that focus on systems resources including how resource states are transferred over HTTP by a multiple users written many programs in different languages. REST web service having following features: i. It is a light weight web service,so it can easy to access. ii. iii. REST uses HTTP methods like GET,POST,DO etc. It transfers XML,HTML, JavaScript Object Notation etc.where SOAP transfers only XML. 3.1 Flow of system: (a) Login (b) Authentication (c) Select language (d) Write or download the program from server (e) Upload program on server Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No.10400-10403 Page 10401

(f) Compile the program (g) Execute the program (h) End 5. AES Algorithm Steps in the AES Encryption Process Here AES algorithm is used for security purpose. AES algorithm uses 128-bit key for encryption and decryption.the encryption process uses a set of specially derived keys called round keys. These round keys are applied, along with a particular operations, on an array of data that holds exactly one block of data the data to be encrypted. This array is call state array. Final Round In final Round,MixColumns step is not performed. SubBytes ShiftRows AddRoundKey. 6. ACKNOWLEDGMENT Our Software, which we are going to develop,is the result of many peoples dedication. It is the cumulative efforts of many minds working together day and night that gave us the contentment of designing the software. Special thanks to, the Project-coordinator Prof. Ashwini Jadhav of computer Department, for her great support. We express our gratitude to our project guide and also H.O.D of computer department Prof. Shyamsundar Ingle for guidance and who kept the things on track and also to all other faculty members who helped us directly or indirectly. Last but not least our acknowledgement goes to all the well wishers of our project and to all our class mates for their excellent support in all aspects. Fig.3.AES Algorithm KeyExpansions AES requires a separate 128-bit round key block for each round plus one more. InitialRound AddRoundKey In this AddRoundKey step each byte of the state is combined with a block of the round key by using bitwise xor. Rounds SubBytes In this substitution step according to a lookup table each byte is replaced with another ShiftRows It is also called transposition step where the last three rows of the state are shifted cyclically a certain number of steps. MixColumns As name suggest this operation is performed on columnsby of the state, combining the four bytes in each column. 7. CONCLUSION In this paper we have introduced three online mobile cloud based compilers C, C++ and JAVA. Because now a days to run and execute any simple programs their is need of computer and different compilers a must be installed on it. It is time consuming process and also number of resources are required. Therefore to avoid the dependency on computer and reduce installation time we are developed an "online mobile cloud based compilers" using which users can run and execute there programs anytime anywhere using their android smartphones and can store the codes at the centralized cloud server as well as each students record is maintained for future references. This application is helpful for students, teachers, programmers as well as developers.the ability to use compiler application on mobile devices is that a programmer can easily access the code and provides most convenient tool to compile the code and remove the errors. 8. REFERENCES [1]. Mell, P., & Grance, T. The NIST Definition of Cloud Computing ( Draft )Recommendations of the National Institute of Standards and Technology. Nist Special, 145(6),7. National Institute of Standards and Technology, Information Technology Laboratory.Retrievedfromhttp://csrc.nist.gov/publication s/drafts/800145/draft-sp 800145_ cloud definition. pdf (2011). [2]. A.P. Miettinen and J.K. Nurminen, Energy efficiency of mobile clients in cloud computing, HotCloud 2nd USENIX Workshop on Hot Topics in Cloud Computing, 2010. AddRoundKey Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No.10400-10403 Page 10402

[3]. Hoang T. Dinh, Chonho Lee, DusitNiyato, and Ping Wang, A survey of mobile cloud computing: architecture, applications, and approaches, Publishedonline in Wiley Online Library (wileyonlinelibrary.com),online ISSN: 1530-8677, DOI: 10.1002/wcm.1203, 11 OCT 2011. [4]. G. Roessling, H. Baer, C. Trompler, and C.M. Choi, Mobile computing in education, ITiCSE, 2003. [6]. Robert Rieger and Geraldine Gay Interactive Media Group, Department of Communication, Cornell University. [7]. Xinwen Zhang. Anugeetha Kunjithapatham Sangoh Jeong Simon Gibbs, Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing. [5]. Federal Cloud Computing Strategy, http://www.cio.gov/documents/federal-cloud- Computing-Strategy.pdf Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No.10400-10403 Page 10403

Miss. Pooja D. Pawar, IJECS Volume 4 Issue 2 February, 2015 Page No.10400-10403 Page 10404