Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ahmed, Adeel
- Security Technique in Mobile Clouds to Ensure Malware Prevention
Abstract Views :207 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Faculty of C and IT, University of Gujrat, PK
1 Department of Computer Science, Faculty of C and IT, University of Gujrat, PK
Source
Indian Journal of Science and Technology, Vol 11, No 31 (2018), Pagination: 1-20Abstract
Objectives: Major privacy issues in Mobile Cloud Computing (MCC) environment such as security of data are focused in this research. Methods/Statistical Analysis: Two major issues relating to the MCC, first issue is that the owners have no full control over the infra-structure. Therefore, they set up their own methods to control data security and make it reliable. Secondly, the cloud owners have maximum rights because cloud owners can change and manage the user’s system and also make use of their data by implementing their rights. State the methodology adapted to meet your objectives. Findings: This study shows how data can be kept in confidentiality by maintaining necessary consistent relations in cloud. Prevention from Malware Technique is also being discussed that makes it probable for data to be compressed and encrypted by using a variety of keys prior to uploading on the cloud. It is uploaded in such a way that ending data could be decrypted and de compressed by a single key. Application/Improvements: The planed scheme empowers the user in performing utmost computation comprehensively and storage jobs which keep the users away from revealing the data guts and the personal/private information of users.References
- Hoang T, Chonho L, Dusit N. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing. 2013; 13(18):1587–611. https://doi.org/10.1002/wcm.1203.
- Fernando N, Seng W, Wenny R. Mobile cloud computing: A survey. Future Generation Computer Systems. 2013; 29(1):84–106. https://doi.org/10.1016/j.future.2012.05.023.
- Dipali S. Yadav H, Kanchan D. Mobile cloud computing issues and solution framework. International Research Journal of Engineering and Technology. 2016; 3(11):1115– 18.
- Ahmed E. Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges. Journal of Network and Computer Applications. 2015; 52(1):154–72. https://doi.org/10.1016/j.jnca.2015.03.001.
- Shiraz M, Abolfazli S, Abdul G. A study on virtual machine deployment for application outsourcing in mobile cloud computing. 2013; 63(1):946–64.
- Abid S, Mureed H. Security issues and challenges of mobile cloud computing. International Journal of Grid and Distributed Computing. 2013; 6(6):37–50. https://doi.org/10.14257/ijgdc.2013.6.6.04.
- Aminzadeh N, Zohreh S, Siti H. Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues. Simulation Modelling Practice and Theory. 2015; 50(1):96–108. https://doi.org/10.1016/j.simpat. 2014.05.009.
- Abolfazli S, Aasd E. Mobile cloud computing: The-stateofthe-art, challenges, and future research. Encyclopedia of Cloud Computing. 2015; 1(1):123–9.
- Chang J, Gao V, Gruhn J, Roussos G. Mobile cloud computing research – issues, challenges, and needs. IEEE Seventh International Symposium on Service-Oriented System Engineering; 2013. p. 442–53. https://doi.org/10.1109/ SOSE.2013.96.
- Zetta. Zetta: Enterprise cloud storage on demand [Internet]. [cited 2008 Mar]. Available from: http://www.zetta.net/.
- Wang X. Mobile cloud computing in 5g: Emerging trends, issues, and challenges. IEEE Network. 2015; 29(2):1234–40. https://doi.org/10.1109/MNET.2015.7064896.
- Ali M, Samee U, Vasilakos AV. Security in cloud computing: Opportunities and challenges. Information Sciences. 2015; 30(5):357–83. https://doi.org/10.1016/j.ins.2015.01.025.
- Liu J. Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions. Journal of Network and Computer Applications. 2015; 48(1):99–117. https://doi.org/10.1016/j.jnca.2014.09.009.
- Shant D, Pinku S. Computation offloading frameworks in mobile cloud computing: A survey. IEEE International Conference on Current Trends in Advanced Computing (ICCTAC); 2016. p. 123–30.
- Sujithra M, Sathya N. Mobile device data security: A cryptographic approach by outsourcing mobile data to cloud. Procedia Computer Science. 2015; 47(1):480–5. https://doi.org/10.1016/j.procs.2015.03.232.
- Anirudh P, Mohammad S, Mais N. Survey on three components of Mobile Cloud Computing: offloading, distribution and privacy. Scientific Research an Academic Publisher. 2017; 5(6):4236–43.
- Nurmi D, Wolski R, Grzegorczyk C, Obertelli G, Soman S, Youseff L, Zagorodnov D. The eucalyptus open-source cloud-computing system. 9th IEEE/ACM International Symposium on Cluster Computing and the Grid; 2009. p.124–31. https://doi.org/10.1109/CCGRID.2009.93
- Sun Microsystems Unveils Open Cloud Platform [Internet]. [cited 2009 Mar 18]. Available from: https:// www.businesswire.com/news/home/20090318005374/en/ Sun-Microsystems-Unveils-Open-Cloud-Platform. Date accessed: 18/03/2009.
- Dipayan D, Krishna L. A review and research towards mobile cloud computing. 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering; 2014. p. 1–5.
- Mascolo C. The power of mobile computing in a social era. IEEE Internet Computing. 2010; 14(6):76–9. https://doi.org/10.1109/MIC.2010.150
- Fernandes E, Crispo B, Conti M. FM 99.9, Radio Virus: Exploiting FM radio broadcasts for malware deployment. IEEE Transactions on Information Forensics & Security. 2013; 8(6):1027–37. https://doi.org/10.1109/ TIFS.2013.2259818.
- Xing T, Huang D, Ata S, Medhi D. Mobicloud: A geodistributed mobile cloud computing platform. Network and Service Management (CNSM). 8th International Conference on Network and Service Management (CNSM) and, Workshop on Systems Virtualiztion Management (SVM); 2012. p. 164–8.
- Li J, Gu D, Luo Y. Android Malware Forensics: Reconstruction of malicious events. 32nd International Conference on Distributed Computing Systems Workshops. 2012, pp. 552558. https://doi.org/10.1109/ICDCSW.2012.33.
- Lijun M, Chan K, Tse H. A tale of clouds: Paradigm comparisons and some thoughts on research issues. IEEE Asia-Pacific Services Computing Conference; 2008. p. 464–9.
- Siani P, Yun S, Miranda M. A privacy manager for cloud computing. HP Labs. Long Down Avenue, Stoke Gifford, Bristol BS34 8QZ, UK; 2009. p. 90–106.
- Rastogi V, Chen Y, Jiangy X. DroidChameleon: Evaluating android anti-malware against transformation attacks. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security; 2013. p. 329–34. https://doi.org/10.1145/2484313.2484355.
- Jeffrey D, Sanjay G. MapReduce: A flexible data processing tool. Communications of the ACM. 2010; 53(1): 12–19.
- Bo P, Bin C, Xiaoming L. Implementation issues of a cloud computing platform. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 2009; 8:59–66.
- Jiawei Y, Shucheng Y. Proofs of retrievability with public verifiability and constant communication cost in cloud. Cloud Computing. 2013; 4(2):1234–50.
- Jo M. Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. IEEE Wireless Communications. 2015; 22(3):50–8. https://doi.org/10.1109/MWC.2015.7143326.
- Satyanarayanan M, Bahl P, Caceres R, Davies N. The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing. 2009; 8(4):14–23. https://doi.org/10.1109/ MPRV.2009.82.
- Giuseppe A, Roberto D. Scalable and efficient provable data possession; 2008. p. 1–11.
- Shiraz M and Gani A. Mobile cloud computing: Critical analysis of application deployment in virtual machines. Proceedings, International Conference Information and Computer Networks (ICICN'12). 2012; 27(1):123–30.
- Sikorski M, Honig A. Practical Malware Analysis - The hands-on guide to dissecting malicious software; 2012.
- Jon O, Evan C, Farnam J. CloudAV: N-version antivirus in the network cloud. Proceedings of the USENIX security symposium; 2008. PMCid:PMC3131111
- OPAS:A Trusted Web-Based Online Property Advertising System
Abstract Views :215 |
PDF Views:0
Authors
Sijjad Ali khuhro
1,
Muhammad Aamir Panhwar
2,
Attaullah Buriro
3,
Adeel Ahmed
1,
Suhail Ahmed Khuhawar
4,
Ngin Kimlong
1
Affiliations
1 University of Science and Technology of China, CN
2 Beijing University of Posts and Telecommunications, CN
3 Khwaja Fareed University of Engineering & Information Technology, Rahim Yar Khan, PK
4 Quaid-i-Azam University, Islamabad, PK
1 University of Science and Technology of China, CN
2 Beijing University of Posts and Telecommunications, CN
3 Khwaja Fareed University of Engineering & Information Technology, Rahim Yar Khan, PK
4 Quaid-i-Azam University, Islamabad, PK
Source
Indian Journal of Science and Technology, Vol 11, No 40 (2018), Pagination: 1-5Abstract
Objectives: Property advertising system has been one of the major issues in Pakistan, because buyers and seller can’t trust each other so quickly. In existing systems, the mechanism of direct property buying and selling is very difficult, because property buyers and sellers can advertise in newspaper or hire an agent which sells their property or buys for them. This process is very lengthy and difficult. Methods/Statistical Analysis: Our proposed system is based on the web-based online property advertising system. Our system can be deployed in Government and Non-Government Sectors in regard of to selling and buying property, because it’s easy to use, trusted, and secure system for each user’s party. Other main benefit is to save money and time. Findings: This study proposes a web-based Online Property Advertisement Solution (OPAS) for Pakistan. The area of focus includes, Access Home Page of Web System, Favorite Property, User Management, Property Management, and Contact information. Application/Improvements: We develop a trusted web-based system in which user can buy and sell their property online in Pakistan. The user will be able to see the property on the map, which would it, can save the extra time required to visit that place. In our system user can create their account in secure manner which is also free of cost, in that account user can add their favorite property in their list and if someone sells their property then he or she can post the picture, video and complete details of their property. Security of our system is verified at tasted in different phases.References
- Chen YM, Tsaoa TH, A structure methodology for implementing engineering data management, Robotics and Computer-Integrated Manufacturing. 1998; 14(4):275−96. https://doi.org/10.1016/S0736-5845(98)00013-1.
- Miller E. PDM in the forefront. Computer-Aided Engineering; 1998. p. 30−42.
- Miller E. PDM heads for the web. Machine Design; 1997.
- Papandreoua CA, Adamopoulos DX. Architecture of a multimedia communication system for technical documentation in a modern factory, Computers in Industry. 1998; 36(1-2):83−93.
- Lebovitz PP. Design data management for the small engineering shop. Machine Design. 1997.
- Pelton H, Pitkanen O, Sulonen R. Process-based view of product data management, Computer Industry. 1996; 31(3): 195−203. https://doi.org/10.1016/S0166-3615(96)00051-6.
- FGEHF:Authenticated Web Based Application for Human Resource Management System
Abstract Views :278 |
PDF Views:0
Authors
Sijjad Ali khuhro
1,
Muhammad Aamir Panhwar
2,
Attaullah Buriro
3,
Adeel Ahmed
1,
Suhail Ahmed Khuhawar
4,
Shoukat Hayat
4
Affiliations
1 University of Science and Technology of China, Anhui, CN
2 Beijing University of Posts and Telecommunications, CN
3 Khwaja Fareed University of Engineering and IT, Rahim Yar Khan, PK
4 Quaid-i-Azam University, Islamabad, PK
1 University of Science and Technology of China, Anhui, CN
2 Beijing University of Posts and Telecommunications, CN
3 Khwaja Fareed University of Engineering and IT, Rahim Yar Khan, PK
4 Quaid-i-Azam University, Islamabad, PK
Source
Indian Journal of Science and Technology, Vol 11, No 43 (2018), Pagination: 1-12Abstract
Objectives: HRM systems have faced a lot of challenges in recent years because their working is dependent on manual/ files system. Manual management of an organization and its employees’ information along with their payroll processing, file management, report generation and leave management is really time-consuming. Data may also involve human errors which increases the risk factor. These kinds of problems rise in all kind of organizations, especially in the absence of Electronic Web-based system. Methods/Statistical Analysis: Our proposed method -Authenticated web-based application for the human resources management system is beneficial for Federal Government Employee Housing Foundation (FGEHF), because this organization is working manually since 1988. It makes difficult for the HR to manage all those data records without any system, so we have tried to solve this problem by proposing a web-based state-of-the-art solution. Findings: The underlying approach of our work is to facilitate the staff of FGEHF, by delivering an automatic system, to make their working easier and effective. Additionally, the utilization of the proposed HRM system could save time, cost and easier maintenance of error-free data. All registered users and their completed record are maintained on the database server in a secure manner. All data is promised to be secure and would not be possible for an intruder to access the private information of others employees. Application/Improvements: The efficiency of the proposed technique is validatedByASP.Net and C#.NET is used as programming languages for developing HRM web-based system.References
- Panhwar MA. Mobile based Healthcare Application Model for Hyderabad, Pakistan. Indian Journal of Science and Technology. 2018; 11(32):1–4. https://doi.org/10.17485/ijst/2018/v11i32/131050
- What is jQuery? Available from http://www.webhost-designpost.com/website/whatisjqueryandwhy.html
- Pressman RS. Software engineering: A practitioner’s approach. 5th ed. McGraw-Hill Series in Computer Science; 2001. p. 1–860.
- Somerville I. Software engineering. 9th ed. Addison-Wesley Publishing Company Inc; 2010.
- Yadav M. Project report on human resource management; 2014. p. 1–86. PMCid:PMC5598519
- Microsoft. SQL Server Management Studio (SSMS). Available from: http://msdn.microsoft.com/en-us/library/ms174173.aspx
- Code project. 3-tier architecture in C#. Available from: http://www.codeproject.com/Articles/11128/3-tier-architecture-in-C