Cloud Computing Security: Multilevel Classified Survey on Attacks and Security Concerns
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.155-159, Mar-2018
Abstract
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. Today, cloud computing generates a lot of hype; it’s both promising and scary. In cloud computing, clouds can be described at different layers, i.e., SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). Although applications for clouds are in development phase, however security requirements for the data and services on the clouds are getting attention of researchers and it has become necessary to consider each layer of a cloud for possible attacks. Thus, it is important to address the security issues and problems in cloud systems, and to find a solution for the widespread acceptance of these solutions. Current system provides the whole security solutions for each and every layer. It leads to waste of energy. We suggested a new mode of security after analysis. The Major idea behind our survey is to concentrate on the particular issues or attacks on the cloud layers instead of focusing whole efforts of security solutions for each and every action. It makes us to build a proper wall against the attackers. Instead of providing all security oriented solutions for all layers, we propose a dynamic security solution according to the corresponding attacks of related layers. It improves cloud service’s performance and saves energy of the resources, so that the same can be utilized for more services.
Key-Words / Index Term
Cloud computing security, Layers based Security in Cloud, SaaS, Iaas/Paas, Development Services
References
[1] S.S. Yeo, J.H. Park, Security considerations in cloud computingvirtualization environment, Grid Pervasive Comput. LectureNotesComput. Sci. 7861 (2013) 208–215.
[2] H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computingand security challenges, in: Proc of the 50th Annual SoutheastRegional Conference (ACM-SE12), ACM, New York, USA,2013, pp. 298–302.
[3] P. Arora, R.C. Wadhawan, E.S.P. Ahuja, Cloud computingsecurity issues in infrastructure as a service, Int. J. Adv. Res.Comput. Sci. Softw. Eng. 2 (1) (2012) 1–7.
[4] S. Bugiel, S. Nurnberger, T. Poppelmann, A.R. Sadeghi, T.Schneider, AmazonIA: when elasticity snaps back, in: Procofthe 18th ACM Conference on Computer and CommunicationsSecurity (CCS11), ACM, 2011, pp. 389–400.
[5]J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N.Gruschka, L.L. Iacono, All your clouds are belong to us:security analysis of cloud management interfaces, in: Proc. of the3rd ACM workshop on Cloud Computing Security Workshop(CCSW11), ACM, 2011, pp. 3–14.
[6] M. Hussain, H. Abdulsalam, SECaaS: security as a service forcloud-based applications, in: Proc. of the Second KuwaitConference on e-Services and e-Systems (KCESS11), ACM,2011, pp. 1–4.
[7] R. Laborde, F. Barre`re, A. Benzekri, Toward authorization as aservice: a study of the XACML standard, in: Proceedings of the16th Communications & Networking Symposium, Society forComputer Simulation International, 2013, pp. 1–7.
[8]G. Pek, L. Buttyan, B. Bencsath, A survey of security issues inhardware virtualization, ACM Comput. Surveys 45 (3) (2013) 1–34ACM.
[9]M. Pearce, S. Zeadally, R. Hunt, Virtualization: issues, securitythreats, and solutions, ACM Comput. Surveys 45 (2) (2013) 1–39ACM.
[10]L. Ponemon, Ponemon 2014 SSH security Vulnerability Report Retrieved from http://www.venafi.com/collateral/wp/ponemon-2014-ssh-security-vulnerability-report2014.
[11]Zeua, Zeus Botnet Controller Retrieved from http://aws.amazon.com/security/zeus-botnet-controller/2009.
[12]T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Get off of mycloud: exploring information leakage in third-party computeclouds, in: ACM Conference on Computer and CommunicationsSecurity, ACM, 2009.
[13]Zeua, Attacks on Virtual Machine Emulators, White Paper Symantec Corporation http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf2007.
[14]J. Idziorek, Exploiting Cloud Utility Models for Profit and RuinGraduate Theses and Dissertations, Lowa State University,2012.
[15]R.A. Popa, J.R. Lorch, D. Molnar, H.J. Wang, L. Zhuang,Enabling security in cloud storage SLAs with CloudProof, in:Proc. of the 2011 USENIX Conference on USENIX AnnualTechnical Conference, 2011, 31-31.
[16]J. Wei, X. Zhang, G. Ammons, V. Bala, P. Ning, Managingsecurity of virtual machine images in a cloud environment, in:ACM Cloud Computing Security Workshop (CCSW?09),ACM, 2009.
Citation
S.Hendry Leo Kanickam, L. Jayasimman, "Cloud Computing Security: Multilevel Classified Survey on Attacks and Security Concerns", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.155-159, 2018.
An Efficient Survey on Cloud Security Algorithms
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.160-164, Mar-2018
Abstract
A cloud storing process, consisting of a gathering of storage servers, gives storage services larger than the Internet. Storing information in a third party’s cloud system makes severe anxiety over information privacy but they have a chance to retrieve the data from the cloud. General encryption techniques look after information confidentiality, but also boundary the functionality of the storage space system because a few operations are favored over encrypted data. Constructing a protected storage scheme that wires several functions is difficult when the storage space system is scattered and has no middle ability. In future, entry of proxy re-encryption (RSA is an algorithm used by encrypt and decrypt messages) technique and put together it with a decentralized removal code such that a protected circulated storage system is defined. ECC is used to generate the keys data confidentiality.ECC makes keys via the properties of the elliptic bend equation instead of the conventional functionality. The major technical participation is that the proxy re-encryption technique supports encryption operations over encrypted text as well as forwarding actions over encryption and encrypted text. Here, the process fully combines encryption, encoding, and forwarding. Examine and use appropriate parameters for the text dispatched to storage servers and the storing servers accessed by a key server. Extra flexible alteration between the number of storage servers and strength.
Key-Words / Index Term
Cloud computing, cyber security, advanced persistent threats, security metrics, and virtual machine (VM)
References
[1] W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” NIST Spec. Publ., pp. 800–144, 2011.
[2] P. Mell and T. Grance, “The NIST Definition of Cloud Computing.” NIST, 2011.
[3] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud Migration Research: A Systematic Review,” IEEE Transactions on Cloud Computing, vol. 1, no. 2, pp. 142–157, 2013.
[4] L. Vaquero, L. Rodero-Merino, and D. Morán, “Locking the sky: a survey on IaaS cloud security,” Computing, vol. 91, no. 1, pp. 93–118, Jan, 2011 .
[5] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in thirdparty compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 199–212.
[6] Sakshi kathuria, "A Survey on Security Provided by Multi-Clouds in Cloud Computing", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.23-27, 2018.
[7] B. Krekel, “Capability of the People’s Republic of China to conduct cyber warfare and computer network exploitation,” U.S.- China Economic and Security REview Commission, Northrop Grumman Corp., DTIC Document, 2009.
[8] FedRAMP Security Controls, Federal Chief Information Officer’s Council, [Online]. Available: http://cloud.cio.gov/document/fedramp-security-controls. [Accessed: 29-Oct-2014].
[9] S. Zevin, Standards for security categorization of federal information and information systems. DIANE Publishing, 2009.
[10] M. Walla, “Kerberos Explained,” May, 2000. [Online]. Available: http://technet.microsoft.com/en-us/library/bb742516.aspx. [Accessed: 12-Jan-2014].
Citation
M. Subhashini, P. Srivaramangai, "An Efficient Survey on Cloud Security Algorithms", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.160-164, 2018.
Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks
Research Paper | Journal Paper
Vol.06 , Issue.02 , pp.165-168, Mar-2018
Abstract
In particular wireless networks, IPv6 Low Power over wireless personal area networks is a specific network configuration frame- work with the low power wireless devices with limited processing capabilities. In this network, the malicious node attacks over at the network layer. Moreover it is an unstable network, the formation of the path of networks only through the AODV Routing Protocol. In the view of security aspects the existing techniques were proposed in MANET but these are more vulnerable in 6LoWPAN Networks. It is increased number of packet dropping attacks like Black Hole attacks may cause the undesired operations in the time of routing the packet transfer. Thus the existing cryptographic systems are not sufficient to protect and very difficult and defend the routing protocol RPL. Here a new data aggregation based mechanism for black hole attack detection has been proposed in efficient manner. In this mechanism, the black hole node is detected by frequent monitoring and trustworthy prediction of reply packets that are transmitted by the sensor nodes and it will be removed from the network. The implementation results show that the improved efficiency in the detection of black hole attacks with MANET. More experiments were discussed about the detection mechanism in MANET.
Key-Words / Index Term
6LoWPAN, Wireless Sensor Networks, Black Hole Attacks, Routing Protocol, AODV, Data Aggregation
References
[1] Chunnu L and A Shrivastava, “An Energy Preserving Detection Mechanism for Black Hole Attack in Wireless Sensor Networks”, Intl. Journal of Computer Applications Vo.115, No.16, April 2015.
[2] D Nitnaware and A Thakur, “Black Hole Attack Detection and Prevention Strategy in DYMO for MANET”, 3rd Intl., Conf. on Signale Processing and Integrated Networks”,2016.
[3] B Singh, D Srikanth and C.R.S Kumar, “Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks: Military Perspective”, IEEE Intl. Conf. on Engineering and Technology, March 2016.
[4] O Shivwanshi, R Patel and P Saxena, “ Cluster Based Secure WSN against the Balckhole and Grayhole Attack”, Intl. Journal of Computer Science and Information Technologies, Vol.6, No.6, 2015, pp.5470-5472.
[5] Anitta Vincent, Fincy Francis and Ayyappadas P.S, “Security Aspects in 6lowpan Networks”, IOSR Journal of Electronics and Communication Engineering, 2012.
[6] Kalaiselvan.K and Gurpreet Singh, “Detection and Isolation of Black Hole Attacks in Wireless Sensor Networks”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.4, No.5, May 2015.
[7] R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh and K Wehrle, “6LoWPAN Fragmentation Attacks and Mitigation Mechanisms”, Hungary, April, 2013.
[8] A Rghioui, A Khannous and M Bouhorma, “Denial of server attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition”, Journal of Advanced Computer Science and Technology, Vol.3, No.2, pp.143-153, 2014.
[9] K Chugh, A Lasebae and J Loo, “Case Study of a Black Hole Attack on 6LoWPAN-RPL”, Securware 2012: The 6th Intl. Conf. on Emerging Security Information, Systems and Technologies, UK, 2012.
[10] Luis M.L. Oliveria, Joel.J.P.C Rodrigues, Amaro F.Sousa and Victor M.Denisov, “Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms”, IEEE Trans. on Industrial Informatics, Vol.12, No.6, December 2016.
[11] Yue Qie and Maode Ma, “A Mutual Authenticaticaton and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks”, IEEE Trans. on Industrial Informatics, Vol.12, No.6, Decemeber 2016.
[12] F Ahmed and Young-Bae Ko, “Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks”, Article in Research Gate, October 2016.
[13] J Deny, A Sivaneshkumar, M. Sundarajan and V.Khanna, “Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach”, Intl. Conf. on Algorithms and Applications in Emerging Technologies, December 2017.
[14] R.Sujatha, Dr.P.Srivaramangai, ”Enhancing security in Manets Communication Issues and Mechanisms”, International Journal of Computer Techniques – Vol. 4 – Issues 3 (79 - 83) May – June 2017, ISSN: 2394–2231.
[15] R.Sujatha , Dr.P.Srivaramangai, “A Survey on Network Layer Attack Detection And Isolation Techniques in Manet” International Journal Of Modern Engineering Research (IJMER), vol. 07, no.12 , Dec - 2017, pp. 01 – 04.
Citation
R.Sujatha, P. Srivaramangai, "Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.165-168, 2018.
Survey on Enhancing Cloud Storage Using Deduplication Technique
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.169-171, Mar-2018
Abstract
Today we are in a highly informative and digital era, comparatively large amount of data are generated simultaneously day to day. All these data must be stored for processing the result and for future references. As the availability of data increases, we have to invest more amounts in maintaining the storage devices. To meet the cost on storage devices and to enhance storage efficiency. It is mandatory use a creative technique to store maximum data within the available storage devices. This can be achieved by data deduplication method. It eliminates redundant copies of data in order to minimize the storage requirement and achieves cost efficiency on storage devices. This paper will analyze various deduplication methods and give an ample survey.
Key-Words / Index Term
Keywords— Deduplication, genetic algorithm, Hash algorithm, bandwidth, chunking, compression, Jenkins hash function, file similarity
References
[1] Young Chan Moon1, Ho Min Jung1, Chuck Yoo2, and Young Woong Ko1 “Data Deduplication Using Dynamic Chunking Algorithm”, Springer ICCI 2012.
[2] RavikanthM*1,Dr.D.Vasumathi*2, B.Mallikarjuna Reddy*3, ”Enhanced Duplicate Detection Using Genetic Algorithm With Particle Swarm Optimization”, IJCSIET— International Journal of Computer Science information and Engg., Technologies ISSN 2277- 4408
[3] R.Supriya1, K. Sathyaseelan2,” Secure Deduplication Using Jenkins Hash Function” Ncraccess -2015.
[4] Sunita Sarawagi, Anuradha Bhamidipaty,” Interactive Deduplication using Active Learning”
[5] Amanpreet Kaur, 2Sonia Sharma “An Efficient Framework and Techniques of Data Deduplication in Cloud Computing ”, IJCST Vol. 8, Iss ue 2, April - June 2017.
[6] Lalitha. L1, Maheswari.B2,Dr.Karthik.S3, “A Detailed Survey on Various Record Deduplication Methods”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)Volume 1, Issue 8, October 2012
[7] R.Supriya1, K. Sathyaseelan2,” Secure Deduplication Using Jenkins Hash Function” Ncraccess -2015.
[8] Amanpreet Kaur, 2Sonia Sharma “An Efficient Framework and Techniques of Data Deduplication in Cloud Computing ”, IJCST Vol. 8, Iss ue 2, April - June 2017.
[9] Lalitha. L1, Maheswari.B2,Dr.Karthik.S3, “A Detailed Survey on Various Record Deduplication Methods”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)Volume 1, Issue 8, October 2012.
[10] Poonam R. Wagh, Amol D. Potgantwar, "Providing Security to Data Stored on HDFS Using Security Protocol", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.20-25, 2017.
Citation
A. Vijayakumar, A. Nisha Jebaseeli, "Survey on Enhancing Cloud Storage Using Deduplication Technique", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.169-171, 2018.
Towards Efficient Resource Allocation for Distributed Networks in Cloud Computing
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.172-177, Mar-2018
Abstract
Cloud computing is a dispensed computing version which allows customers to lease sources from the cloud issuer. In a cloud environment, more than one cloud users request is based at the on-demand resource provisioning with a pay-consistent with-utilization price model. Hence it`s far supported by infrastructure called net records center. Resource allocation technique is complicated issues in cloud computing using multiple resources. The resource allocation mainly affected on cloud server and increase the response time and delay also. To propose a singular structure and two algorithms for unified spatial and temporal resource allocation and optimal resource scheduling algorithm. Rigorous evaluation shows that our algorithms have a low computational complexity, require a at ease accuracy in electricity charge estimation, and guarantee a provider final touch time for person requests. The proposed spatial-temporal resource allocation technique drastically reduces power value for dispensed IDCs.
Key-Words / Index Term
Cloud, Resource allocation, Servers, Nodes, Resources, Cloud, optimal resource scheduling algorithm, Servers, Nodes, Resources
References
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, pp. 50–58, April 2010.
[2] Zhang Youhui, Qu Peng, Jiang Cihang, and Zheng Weimin, “A Cloud Gaming System Based on User-level Virtualization and Its Resource Scheduling”, IEEE Transactions on Parallel and Distributed Systems, Volume 27, No 5, May 2016
[3] Peyman Teymoori, Khosrow Sohraby, and Kiseon Kim, “A Fair and Efficient Resource Allocation Scheme for Multi-Server Distributed Systems and Networks”, IEEE Transactions on Mobile Computing, Volume 15, No 9, September 2016
[4] Anitya Kumar Gupta, Srishti Gupta, "Security Issues in Big Data with Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.27-32, 2017
[5] Shuangcheng Niu, Jidong Zhai, Xiaosong Ma, Xiongchao Tang, Wenguang Chen, Weimin Zheng, “Building Semi-Elastic Virtual Clusters for Cost-Effective HPC Cloud Resource Provisioning “,IEEE Transactions on Parallel and Distributed Systems, Volume 27, No 7, July 2016
[6] Sheng Zhang, Zhuzhong Qian, Zhaoyi Luo, Jie Wu, Sanglu Lu, “Burstiness-Aware Resource Reservation for Server Consolidation in Computing Clouds”,Volume 27, No 4, April 2016
[7] J. Hamilton, “Cooperative expendable micro-slice servers (cems): Low cost, low power servers for internet-scale services,” Jan. 2009.
[8] K. Le, R. Bianchini, T. Nguyen, O. Bilgir, and M. Martonosi, “Capping the brown energy consumption of internet services at low cost,” in Green Computing Conference, 2010 International, aug. 2010, pp. 3 –14.
[9] Mohammad Aazam, Eui-Nam Huh, Marc St-Hilaire, Chung-Horng Lung, Ioannis Lambadaris,” Cloud Customer’s Historical Record Based Resource Pricing”, IEEE Transactions on Parallel and Distributed Systems, Volume 27, No 7, July 2016
[10] Dan Li, Congjie Chen, Junjie Guan, Ying Zhang, Jing Zhu, “DCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs “,IEEE Transactions on Parallel and Distributed Systems, Volume 27, No 8, August 2016
[11] S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013
[12] Xiaolong Xu, Wanchun Dou, Xuyun Zhang, and Jinjun Chen, “EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment “,IEEE Transactions on Cloud computing, Volume 4,No 2, April-June 2016
[13] Jiyan Wu, Chau Yuen, Bo Cheng, Yanlei Shang, and Junliang Chen,” Good put-Aware Load Distribution for Real-time Traffic over Multipath Networks”, IEEE Transactions on Parallel and Distributed Systems, Volume 26, No 8, August 2016
[14] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013
[15] Guangyan Zhang, Jigang Wang, Keqin Li, Jiwu Shu,” Redistribute Data to Regain Load Balance during RAID-4 Scaling”, IEEE Transactions on Parallel and Distributed Systems, Volume 26, No 1, January 2016
[16] Andreas Wolke, Martin Bichler, Thomas Setzer, “Planning vs. dynamic control: Resource allocation in corporate clouds”, IEEE Transactions on Cloud Computing, Volume 4, No 3, July-Sept 2016
[17] Anitha H M, P. Jayarekha , "Security Challenges of Virtualization in Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.37-43, 2018
[18] Rui Zhang, Kui Wu, Jianping Wang,” Online Resource Scheduling under Concave Pricing for Cloud Computing”, International symposium of Quality of service 2014.
[19] Sakshi kathuria, "A Survey on Security Provided by Multi-Clouds in Cloud Computing", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.23-27, 2018.
Citation
P. Nithya L. Jayasimman, "Towards Efficient Resource Allocation for Distributed Networks in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.172-177, 2018.
A Survey on Impact of IoT Enabled E – Learning Services
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.178-183, Mar-2018
Abstract
Technical skills and knowledge gaining are taken care in today’s learning scenario. Internet of Things (IoT) refers, to technological advancements in the networking with the help of which real-world entities can be connected to communicate with each other over the internet. In general, replacing the teacher or giving quick instruction is not the goal nowadays. To do so, academic institutes should investigate the future technologies that comes out. An IoTs enabled lecture hall, or Personal Computer is beyond question that is capable of serving custom-made training for learners with personal demands, connected with learning exposure, active evaluation, trouble-free right to take advantage mutually by both learners and teachers for the smooth progress of remote learning. From the managerial aspect the effectiveness and payback is also high. This paper, discuss about the study on impact and model of IoT based e-Learning system with technological advancements in the networking with the help of which real-world objects can be connected to communicate with each other over the internet and also conclude how machine learning algorithms enhance the performance of IoT enabled E-learning system.
Key-Words / Index Term
IoT, applications of IoT, e-learning, IoT architecture, ubiquitous learning
References
[1] David Gil, Antonio Ferrández, Higinio Mora-Mora, Jesús Peral. “Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services.” Published by MDPI AG, Basel, Switzerland. 11 July 2016.
[2] M. Selinger, A. Sepulveda, J. Buchan, “Education and the Internet of Everything”, Cisco 2013.
[3] Understanding the Internet of Things (IoT), GSM Association 2014
[4] Xue Ru, Liang Wang, and Jie Chen. "Using the IOT to construct ubiquitous learning environment."Mechanic Automation and Control Engineering (MACE), 2011 Second International Conference on.IEEE, 2011.
[5] Gómez, Jorge, et al. "Interaction system based on internet of things as support for education." Procedia Computer Science 21 (2013): 132-139
[6] Theodoridis, Evangelos, Georgios Mylonas, and Ioannis Chatzigiannakis. "Developing an iot smart city framework."Information, intelligence, systems and applications (iisa), 2013 fourth international conference on. IEEE, 2013.
[7] Noel, Adam, et al. "Structural Health Monitoring using Wireless Sensor Networks: A Comprehensive Survey."IEEE Communications Surveys & Tutorials(2017).
[8] Majumder, AKM Jahangir A., et al. "A wireless IoT system towards gait detection in stroke patients." Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, 2017.
[9] Ozger, Mustafa, Oktay Cetinkaya, and Ozgur B. Akan. "Energy Harvesting Cognitive Radio Networking for IoT-enabled Smart Grid."Mobile Networks and Applications(2017): 1-11.
[10] Jeyasheeli, P. Golda, and JV Johnson Selva. "An IOT design for smart lighting in green buildings based on environmental factors."Advanced Computing and Communication Systems (ICACCS), 2017 4th International Conference on. IEEE, 2017.
[11] Keerthana, B., et al. "Internet of Bins: Trash Management in India."Computing and Communications Technologies (ICCCT), 2017 2nd International Conference on. IEEE, 2017.
[12] Shaikh, Faisal Karim, Sherali Zeadally, and Ernesto Exposito. "Enabling technologies for green internet of things."IEEE Systems Journal11.2 (2017): 983-994.
[13] Obara, Kazushige, et al. "A densely distributed high-sensitivity seismograph network in Japan: Hi-net by National Research Institute for Earth Science and DisasterPrevention."Review of scientific instruments 76.2 (2005): 021301.
[14] Weidhaas, Jennifer, Lian-Shin Lin, and Karen Buzby. "A case study for orphaned chemicals: 4-methylcyclohexanemethanol (MCHM) and propylene glycol phenyl ether (PPH) in riverine sediment and water treatment processes."Science of The Total Environment574 (2017): 1396-1404.
[15] Gupta, Shikha Pranesh, and Umesh Kumar Pandey. "Automatic and Intelligent Integrated System for Leakage Detection in Pipes for Water Distribution Network Using Internet of Things. "International Conference on Information and Communication Technology for Intelligent Systems. Springer, Cham, 2017.
[16] El-Din, Hemdan Ezz, and D. H. Manjaiah. "Internet of Nano Things and Industrial Internet of Things."Internet of Things: Novel Advances and Envisioned Applications. Springer International Publishing, 2017. 109-123.
[17] Tsai, Yao-Te, et al. "Precise Positioning of Marketing and Behavior Intentions of Location-Based Mobile Commerce in the Internet of Things."Symmetry9.8 (2017): 139.
[18] Tao, Fei, et al. "Internet of Things in product life-cycle energy management."Journal of Industrial Information Integration1 (2016): 26-39.
[19] Veeramanickam, M. R. M., and M. Mohanapriya. "IOT enabled Futurus Smart Campus with effective E-Learning: i-Campus."GSTF Journal of Engineering Technology (JET)3.4 (2016): 81.
[20] Auer, Michael E., and Danilo G. Zutin, eds.Online Engineering & Internet of Things: Proceedings of the 14th International Conference on Remote Engineering and Virtual Instrumentation REV 2017, held 15-17 March 2017, Columbia University, New York, USA. Vol. 22. Springer, 2017.
[21] Introduction of open e-learning system as a factor of regional development / T. Yu. Bystrova, V. A. Larionova, M. Osborne, A. M. Platonov // R-Economy. — 2015. — Vol. 1, Iss. 4. — P. 587-596.
[22] Islam, Nurul, Martin Beer, and Frances Slack. "E-learning challenges faced by academics in higher education: a literature review."Journal of Education and Training Studies3.5 (2015): 102-112.
[23] Kong, Siu Cheung, et al. "E-learning in School Education in the Coming 10 Years for Developing 21st Century Skills: Critical Research Issues and Policy Implications."Journal of Educational Technology & Society 17.1 (2014).
[24] Ruth C. Clark, Richard E. Mayer. “E-Learning and the Science of Instruction: Proven Guidelines for Consumers and Designers of Multimedia Learning.” John Wiley & Sons, 2016.
[25] Charmonman, Srisakdi, et al. "Applications of internet of things in e-learning." International Journal of the Computer, the Internet and Management 23.3 (2015): 1-4.
[26] Zou, Han, et al. "A fast and precise indoor localization algorithm based on an online sequential extreme learning machine."Sensors15.1 (2015): 1804-1824.
[27] Lane, Nicholas D., et al. "An early resource characterization of deep learning on wearables, smartphones and internet-of-things devices."Proceedings of the 2015 International Workshop on Internet of Things towards Applications. ACM, 2015.
[28] Zou, Han, et al. "An online sequential extreme learning machine approach to WiFi based indoor positioning."Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE, 2014.
[29] Alsheikh, Mohammad Abu, et al. "Machine learning in wireless sensor networks: Algorithms, strategies, and applications."IEEE Communications Surveys & Tutorials 16.4 (2014): 1996-2018.
[30] Lane, Nicholas D., et al. "An early resource characterization of deep learning on wearables, smartphones and internet-of-things devices."Proceedings of the 2015 International Workshop on Internet of Things towards Applications. ACM, 2015.
Citation
R. Vijayalakshmi, L. Jayasimman, "A Survey on Impact of IoT Enabled E – Learning Services", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.178-183, 2018.
Discriminating the Factors Influencing Stress Among the School Teachers – A Pragmatic Analysis
Research Paper | Journal Paper
Vol.06 , Issue.02 , pp.184-188, Mar-2018
Abstract
Now-a-days everyone seems to be talking about stress. The term is discussed not only in our daily conversation, but also on radio, television, in newspapers, magazines, and in conferences etc. Different people think about this term in different ways as stress is experienced from a variety of sources. Stress is a part of day-to-day living. Stress is an unavoidable phenomenon in human life. Stress is physical, mental and chemical reasons to circumstances that frighten confuse and irritate. Job-related stress is an important factor in teacher’s motivation and retention. Teachers are the real builders of the nation. Teaching is one of the most significant and visible profession in the world. In the present complex and competitive environment stress level is increased among school teachers due to various reasons. Besides that, the large number of students in a classroom, packed timetable, uneven duties, uncomfortable working conditions, co-curriculum activities, meetings, in-house trainings, courses to attend extra classes and the unnecessary amounted paper work are some of the main contributions to the increased causes of stress among teachers. In short, in almost all human activities, people experience stressful situations and sometimes feel that their own occupation is most stressful. Samples are collected from 150 respondents of teachers working in school. The reliability and validity of the scale was tested using the Cronbach’s alpha coefficient test shows that 0.87 is highly reliable. Present study is an empirical study and is exploratory in nature. Collected data were arranged in logical of sequential order to analysis the data, percentage analysis, Friedman rank test and correlation test has been applied. The study can be taken as a guide for further improvement and strategies can be changed and developed as the environment is dynamic. Keeping ready well ahead, taking rest, avoiding strenuous posture, taking balanced diet, walking, using sleeping pills and hot water therapy were practiced by the teachers when they were physically stressed. Offering prayer, positive thinking, working in-group, avoiding painful reminders, delegating the tasks and listening songs were practiced when they were mentally stressed.
Key-Words / Index Term
Stress, Causes of Stress, Physiological, Psychological, Work Environment, Coping mechanism to overcome stress
References
[1]. Abdul Abid, Jabbar, Ambreen, Naveed and Javed (2013) Problem faced by working women in banking sector of Bahawalpur, Interdisciplinary Journal of Contemporary Research in Business, Vol-5,N0-1,pp(490-503).
[2]. Rani. V(2014) “Job stress among women teachers in Ponniah Higher secondary School Tiruchirappalli” Indian journal of Applied Research, Vol.4,Issue.no.12 ,Pp(65-67).
[3]. Anbu.A (2015), “Professional stress of Higher secondary school teachers in Nagercoil Region”, International Journal of multidisciplinary Research and Development , Vol.2, Issue.no.1,Pp (1-3).
[4]. Dr. Manisha & Reena.K.S(2016)Problems faced by working women in Banking sector, International Journal of emerging Research in Management & Technology, Vol.5, issue-2,pp(41-47).
[5]. M. Muthuchitra(2017),”Work place stress: causes, effect and coping strategies “,Shanlax International Journal of Management,Vol.5, Issue.no.1, Pp(34-37).
[6]. Jyothi Narayanakkutty and Rajagopala Nair (2017),”Stress strategies among school teachers”, Shanlax International Journal of Management,Vol.3, Issue.no.1, Pp(89-94).
Citation
D. Ramya, N. Savithri , "Discriminating the Factors Influencing Stress Among the School Teachers – A Pragmatic Analysis", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.184-188, 2018.
CRM with Technology in Banking Industry
Research Paper | Journal Paper
Vol.06 , Issue.02 , pp.193-196, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si2.193196
Abstract
Customer satisfaction is the primary objective in the banking industry. Unless all the banking needs of the customers are not taken care of adequately by the bank, it is not likely that the bank grow to any extent.1 Customer relations is the process and manner by which a business develops, establishes, and maintains relationships with its customers. Businesses rise and fall through the support of their customer bases. Consequently, it is absolutely essential that you develop effective customer relations.2 In this descriptive research paper, the researcher is involved in giving the best structure of CRM practices in the banking industry and also focused on the technological issues on CRM.
Key-Words / Index Term
CRM, Banking industry
References
[1]. Customer Relationship Management- Antony Lawrence-Himalaya Publishing house-2008
[2]. https://study.com/academy/lesson/customer-relations-definition-lesson-quiz.html
[3]. https://www.mbaknol.com
[4]. Mohd Junaid Ahmad (2017), “Customer Relationship Management in Banking Sector”
Citation
R. Sorna priya, M. Sathiya, "CRM with Technology in Banking Industry", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.193-196, 2018.
The Impact of Electronic Human Resource Management (E-Hrm) on Organizational Development of Scientific Research Solution at Piratiyur
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.194-199, Mar-2018
Abstract
The massive technological change has been resulted in wider integration of technology in different sectors and fields of work .The use of these applications /technology solutions in the human resource area is major trend that change ways how Human Resource functions are carried out. E-HRM facilitates the HR function to create dynamic and operational capabilities and contributes greatly on HRM effectiveness. This paper elaborates on E-HRM in detail on the following aspects: Introduction of E-HRM, types of E-HRM, Functions of E-HRM ,role of E-HRM, level, nature of E-HRM, advantages and disadvantages E-HRM of determinants of attitude towards and it is expected to help people understand E-HRM more comprehensively and systematically. Great changes have been brought to our economy, society, and culture with the rapid development of science and technology, especially the usage of Internet and computer technology.
Key-Words / Index Term
Human Resource Management, Challenges, Digital Era
References
[1]. Abu Ammouneh, Y.( 2009),The reality of Electronic Human Resource Management (e-HRM) at the Palestinian universities in the Gaza strip .Master Thesis.
[2]. Bemus, C., Henle, C. & Hogler, R. L. (1998), “Internet Recruiting and Employment Discrimination: A Legal Perspective”, Human Resource Management Review, 8.
[3]. Dileep K M and Ramesh M (2009), “E-Recruitment: Leveraging Technology towards Business Excellence”, Business Review, Vol. 4, No. 1 & 2.
[4]. Gupta C.B. (2010),”Human Resource Management”, 1st Edition, Sultan Chand & Sons. New Delhi
[5]. Kluemper, D., Rosen, P. (2009), ―Future employment selection methods: evaluating social networking web sites‖, Journal of Managerial Psychology, 24(6) pp. 567-580
[6]. Lepak, D.P. & Snell, S.A. (1998). Virtual HR: Strategic human resource management in the 21st Century. Human Resource Management Review. 8(3), 215-234.
[7]. Mathis, R. L., & Jackson, J. H. (2010). Human resource management 12th ed, Joseph Sabatino South-Western, Cengage Learning.
[8]. Mondy, R & Noe, R 2005, Human resource management, 9th edn, Person Education nternational, New Jersey, USA
[9]. Mondy, R. W. (2008). Human Resource Management (10th ed). New Jersey: Pearson Prentice Hall Inc.
[10]. Varma,S.( 2010),The Implications of Implementing Electronic-Human Resource Management (e-HRM) Systems in Companies
[11]. Voermans, M. & Van Veldhoven, M. (2007). Attitude towards E-HRM: An empirical study at Philips. Personnel Review. (36)6, 887-902.
[12]. Wei, L. Q., & Lau, C. M. (2005). Market Orientation, HRM Importance and Competency: Determinants of strategic HRM in Chinese firms. The International Journal of Human Resource Management, 16 (10), 1901 – 1918.
[13]. Wilson, J 2005, Human resource development: learning & training for individuals and organizations, 2nd edn, Kogan Page.
[14]. Wood, S., Holman, D., & Stride, C. (2006). Human resource management and performance in UK Call Centres. British Journal of Industrial Relations, 44(1), 99 – 124.
[15]. Zafar J.,Shaukat M.,&Mat N. (2010). An Analysis of E-Human Resource Management Practices: A Case Study of State Bank of Pakistan.
[16]. www.wikepedia.org
[17]. www.gijms.org
[18]. www.sympiaox.org
[19]. www.ijarcms.com
Citation
M. Manimekalai, S. Thanigaimani, "The Impact of Electronic Human Resource Management (E-Hrm) on Organizational Development of Scientific Research Solution at Piratiyur", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.194-199, 2018.
CONSUMERS’ ATTITUDE TOWARDS ONLINE SHOPPING - A STUDY WITH REFERENCE TO TIRUCHIRAPPALLI CITY, TAMILNADU – INDIA
Research Paper | Journal Paper
Vol.06 , Issue.02 , pp.200-203, Mar-2018
Abstract
The internet is being developed rapidly since last two decades, and with relevant digital economy driven by information technology also being developed worldwide. After a long term development of internet, which rapidly increased web users and high speed internet connection, and some new technology also developed and used for web developing, firms can now promote and enhance images of products and services through web site. Therefore, detailed product information and improved service attracts more and more people who have changed their consumer behaviour from the traditional mode to rely more on the internet shopping. Today Internet is not only a networking media, but also a transaction medium for consumers at global market in the world, and will become dominant retailers in the future. The most necessary element of e-retail offers a direct interactive channel as well as no time definition, people and place. To shop on Internet becomes an alternative for consumers since it is more comfortable than conventional shopping which is usually attributed with anxious, crowded, traffic jam, limited time, scarce parking space etc. The purpose of this study is to analyze factors affecting online shopping behaviour of consumers that might be one of the most important issues of e-commerce and marketing field. The population of this study consists of online shoppers in Tiruchirappalli City. Respondents were selected from different genders, age groups and occupations having internet shopping experience.
Key-Words / Index Term
Internet shopping, Consumer behaviour, E-commerce, Shopping behaviour, Consumer attitudes, online shopping
References
[1]. Banerjee, N., Dutta, A., & Dasgupta, T.(2010). “A study on customers attitude towards online shopping- an Indian perspective”. Indian journal of marketing, Vol. 40, No.11, P. 43 -52.
[2]. Chung-Hoon Park, Young-Gul Kim, (2003) "Identifying key factors affecting consumer purchase behavior in an online shopping context", International Journal of Retail & Distribution Management, Vol. 31 Issue: 1, pp.16 - 29
[3]. Jayendra Sinha, Factors Affecting Online Shopping Behavior Of Indian Consumers”, Atlantic Publishers & Distributors
[4]. Kotler, P., & Armstrong, G (2004). Principles of marketing (10th ED.) USA: Prentice Hall
[5]. Murugaiah,V., & Vishvas, R.(2008). “Women and shopping an Empirical study of Banglore city”. Indian journal of marketing, Vol.38 ,No.7, P.47 -55.
[6]. Prasad, J.S., & Aryasri, A.R. (2009). “Determinats of shopper behavior in E-tailing: An empirical analysis”. Paradigm,13(1),73.
[7]. Rao,S.A., & Mehdi,M.M. (2010). “Online user behavior in Delhi A Factor Analysis”. Indian journal of marketing, Vol.40 No.7, P.29, 46.
[8]. www.comscore.com
[9]. www.emeraldinsight.com
[10]. www.academia.edu
[11]. www.safaribooksonline.com
[12]. www.iacquire.com
[13]. www.csestrategies.com
Citation
S.Shilpa A. Talreja, S. Praveena , "CONSUMERS’ ATTITUDE TOWARDS ONLINE SHOPPING - A STUDY WITH REFERENCE TO TIRUCHIRAPPALLI CITY, TAMILNADU – INDIA", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.200-203, 2018.