BIJIT - Complete Issue 13 PDF
BIJIT - Complete Issue 13 PDF
BIJIT - BVICAM's International Journal of Information Technology is a half yearly publication of Bharati Vidyapeeth’s
Institute of Computer Applications and Management (BVICAM), A-4, Paschim Vihar, Rohtak Road, New Delhi – 110063
(INDIA).
Editor- in-Chief Editor
Prof. M. N. Hoda Dr. Anurag Mishra
Director, BVICAM, New Delhi (INDIA) DDU College, University of Delhi
E-Mail: [email protected] Delhi (INDIA)
Associate Editors
Soft Computing
Prof. K. S. Ravichandran
Professor and Associate Dean, Dept. of Information and Communication Technologies, Sastra University Thanjavur – 613401,
Tamil Nadu (INDIA)
AI and Innovative Learning Technologies
Dr. Mohamed Hamada
Senior Associate Professor, Dept. of Computer Science, The University of Aizu, Aizu (JAPAN)
Data Mining, Analytics and Big Data
Dr. Girija Chetty
Associate Professor, Faculty of Information Technology and Engg, University of Canberra (AUSTRALIA)
Image Processing
Dr. Pradeep K. Atrey
Associate Professor, Dept. of Applied Computer Science, The University of Winnipeg (CANADA)
Information Security, High Speed Networks and Cloud Computing
Prof. D. K. Lobiyal
Associate Professor, School of Computer and Information Sciences, Jawaharlal Nehru University (JNU) New Delhi (INDIA)
Information Systems and e-Learning
Prof. Mohammad Yamin
Dept. of MIS, King Abdul Aziz University, Jeddah-21589, Saudi Arabia (KSA)
Resident Editorial Team
Dr. Anupam Baliyan Vishal Jain Ritika Wason
Associate Professor, BVICAM Asstt. Professor, BVICAM Asstt. Professor, BVICAM
New Delhi (INDIA) New Delhi (INDIA) New Delhi (INDIA)
Published and printed by Prof. M. N. Hoda, Editor-in-Chief, BIJIT and Director, Bharati Vidyapeeth’s Institute of Computer
Applications and Management (BVICAM), A-4, Paschim Vihar, New Delhi – 110063 (INDIA). Tel.: +91 – 11 – 25275055,
Fax: +91 – 11 – 25255056. E-Mail: [email protected]; [email protected]; Visit us at www.bvicam.ac.in/bijit
Our Major Indexing at International Level
The INSPEC, IET (UK), formerly IEE (UK), database is an invaluable information resource
for all scientists and engineers, that contains 13 million abstracts and specialized
indexing to the world's quality research literature in the fields of physics and
engineering. For further details, click at http://www.theiet.org/resources/inspec/
ProQuest (UK) connects people with vetted, reliable information. Key to serious
research, the company has forged a 70-year reputation as a gateway to the world’s
knowledge – from dissertations to governmental and cultural archives to news, in all its
forms. For further details, click at http://www.proquest.co.uk/en-UK/default.shtml
DOAJ aims at increasing the visibility and ease of use of open access scientific and
scholarly journals, thereby promoting their increased usage and impact. For further
details, click at
http://www.doaj.org/doaj?func=issues&jId=87529&uiLanguage=en
Google Scholar provides a simple way to broadly search for scholarly literature and
repositories from across different parts of the world. For further details, click at
http://scholar.google.com/scholar?hl=en&q=BIJIT%2BBVICAM&btnG=
Indian Citation Index (ICI) is an abstracts and citation database, with multidisciplinary
objective information/knowledge contents from about 1000 top Indian scholarly
journals For further details, click at
http://www.indiancitationindex.com/htms/release_notes.htm
It is a matter of both honor and pleasure for us to put forth the thirteenth issue
also been included in this issue, hoping that usage of these would further enrich
the knowledge base and facilitate the overall economic growth. This issue again
comparable to the best in the field and finally become a symbol of quality”.
As a matter of policy of the Journal, all the manuscripts received and considered
for the Journal, by the editorial board, are double blind peer reviewed
Finalizing the constitution of the panel of referees, for double blind peer
us to ensure that the best of the considered manuscripts are showcased and that
The twelve papers, that were finally published, were chosen out of eighty nine
papers that we received from all over the world for this issue. We understand
sometime is delayed, but we also hope that you concur with us in the fact that
quality review is a time taking process and is further delayed if the reviewers
are senior researchers in their respective fields and hence, are hard pressed for
time.
We further take pride in informing our authors, contributors, subscribers and
reviewers that the journal has been indexed with some of the world’s leading
indexing / bibliographic agencies like INSPEC of IET (UK) formerly IEE (UK),
EBSCO (USA), Open J-Gate (USA), DOAJ (Sweden), Google Scholar, WorldCat
Index, etc. and listed in the libraries of the world’s leading Universities like
the year 2012, its Impact Factor was found to be 0.605. These encouraging results
will certainly further increase the citations of the papers published in this
We wish to express our sincere gratitude to our panel of experts in steering the
considered manuscripts through multiple cycles of review and bringing out the
best from the contributing authors. We thank our esteemed authors for having
their original research work. We would also wish to thank the authors whose
papers were not published in this issue of the Journal, probably because of the
activities that, we hope, went a long way in ensuring the quality of the
publication. Still, there is always a scope for improvement, and so, we request
the contributors and readers to kindly mail us their criticism, suggestions and
forthcoming issues.
Editors
CONTENTS
1. Health Management in Crowded Events: Hajj and Kumbh 791
Mohammad Yamin
3. Design of a GSM Based Electronic Voting Machine with Voter Tracking 799
Vaibhav Bhatia and Rahul Gupta
10. A Novel Model for Security and Data Access for Jointly Accessing the Cloud 841
Service
Bansi Khimani and Kuntal Patel
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 791
BIJIT - BVICAM’s International Journal of Information Technology
1.2 The Kumbh Mela implemented. In the last decade or so, many technological
Kumbh Mela is a pilgrimage, a festival and a fair which is the advances have produced tools and gadgets which can be
largest gathering of people in the world. In 2013 an estimated utilised to remarkably improve the crowd management’s
one hundred million pilgrims visited Kumbh (Kumbh Mela) abilities to respond to emergencies. In particular sensor and
[11]. Kumbh is organised periodically every three years in four biometric technology, tools and gadgets can be immensely
different cities of India along the banks of scared rivers helpful in improving the crowd management. Some of the
namely, Ganga (Ganges) in Haridwar and Allahabad, Yamuna intensely crowded events like the Hajj and Kumbh often
(Jamuna) and Saraswati in Allahabad, Godawari at Nasik and involve simultaneous on-foot movement of very large
Shipra in Ujjain. The largest of the Kumbh Mella, known as congregations, which creates possibilities of stampedes and
full Kumbh takes place every twelve years in Allahabad and contamination of contagious viruses and diseases. In such
the Ardha Kumbh (Half Kumbh) takes place every six years in situations, tracking, accessibility and identification of pilgrims
Haridwar. The duration of Kumbh is about six weeks during is critically important. Many of the sensor and wireless devices
which pilgrims come and go back after performing their available today, including Radio Frequency Identification
pilgrimage for a few days. One of the main rituals of Kumbh is (RFID) as shown in Pic 3, also see [12, 13, 14 and 15], can be
a dip in the scared river wherever it takes place. The pinnacle used for controlling and monitoring the movement of crowds.
of the rituals is known as Shahi Snanam on a particular day These technologies are already proving to be very beneficial in
known as Mauni Amavasya when a large number of pilgrims in securing and managing various aspects of daily life. A
dip in the river. In 2014 Kumbh at Allahabad about thirty description of ubiquitous technologies including RFID, sensor
million pilgrims made it to Shahi Snanam. Most of the Kumbh networks, biometric and scanning devices can be found in [14].
pilgrims come from within India itself. The event does,
however, welcomes and facilitates pilgrims from any country. 3.0 CROWDS AND HEALTH RISKS
Focus of the management is local population which usually Recent spread of EBOLA and other highly contagious viruses
travels with land routes including rail, road and on foot. and diseases has served an alarm to the crowd managers around
the world. Various Strands of flu viruses have already caused
2.0 AN OVERVIEW CROWD MANAGEMENT ISSUES havocs in various societies in the recent years. Re-emergence
One of the most worrying aspects of the Hajj and Kumbh of these viruses has discouraged many people from
managements is to control the number of pilgrims. The number participating in crowded events like Hajj and Kumbh. In Saudi
of permits issued every year for performing Hajj is less than Arabia, the country where the Hajj pilgrimage takes place, has
two million. However, the number of unauthorised pilgrims in been working very hard to contain the spread of the Middle
some years had nearly equalled the number of authorised Eastern Respiratory Syndrome (MERS), which has taken
pilgrims. For example, during 2012 Hajj, more than 3.65 hundreds of lives in the Middle East. Fortunately, this virus
million people performed Hajj [7]. As for the Kumbh, there are hasn’t so far affected the Hajj pilgrims. However, the Hajj and
no restrictions on the number of pilgrims as long as they Kumbh pilgrims suffer from various other health issues due to
comply with very basic health checks and undergo required unhygienic conditions as a result of crowding and
vaccinations. To minimise the chances of spread of diseases mismanagement. Usually, the lack of cleaning results in the
and other catastrophes like stampedes, drowning and fires, the growth of dangerous bacteria, which has already been
size of crowds must be contained to manageable limits. For, it witnessed in some cases [16 and 17]. Another serious health
is desirable to have some binding international standards for risk is from the inability of preventing infected illegal pilgrims
limiting the number of people which should be permitted to from entering to the crowded events like the Hajj and Kumbh.
gather in a specified space or area. Organisation of crowded Due to intense crowding and lack of infrastructure, it is not
events, in particular of those having millions of participants feasible to check and process all pilgrims within realistic
like Hajj and Kumbh, would become relatively easier to timeframe. The Hajj procedures, as can be seen in Fig 1,
administer if such standards were agreed upon and require pilgrims to undergo a medical check-up, which is a
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 792
Health Management in Crowded Events: Hajj and Kumbh
precondition to the grant of hajj permit. As for the illegal which are difficult to contain, until a satisfactory way of
pilgrims, boarders of Makkah can be sealed off to prevent the preventing their spread is available. However, people infected
entry of illegal pilgrims. The biometric scans at all the major with HIV and Hepatitis viruses are capable of being managed
air and sea ports of Saudi Arabia are capable of identifying and hence could be allowed under supervision. The
management shouldn’t neglect disabled and elderly pilgrims
and should make adequate arrangements for their well being
during their participation in the event.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 793
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 794
BIJIT -BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 795
Adopting SCRUM Agile Project Management for Managing Academic Institutions
Figure 1, explains the process of SCRUM agile methodology. productivity of the team, is usually measured by the ‘Velocity’
At the beginning of the project, a draft task list is generated by (how many stories they completed/time); calculated based on
the business in collaboration with the Product Owner. These the total productivity of the team and not individual
tasks may change during the project, due to changes in the productivity. The key idea behind self-managed teams is that
business environment, or for other reasons. These tasks are that if a team member does not perform well, then the team will
prioritised and divided to releases forming the Product put pressure and provide assistance to bring this team member
Backlog. up to speed. This SCRUM dependence towards the team is also
SCRUM delivers products or services that add value in its biggest drawback, because if they majority of the team
incremental releases, called ‘Sprints’. Usually, each release has members are focused on the benefits of the organization the
duration of 2 weeks to 1 month, but this can change to fit the team will fail. Aligning all the team members that may also
project needs. Each release must produce product/services or have their personal agenda can be proven a big challenge for
complete a number of tasks that add value to the organization. their SCRUM Master. However, once a team starts, it is like a
The Sprint starts with the Sprint meeting. In this meeting, the well-oiled machine. Another, potential drawback of the method
Product Owner brings the prioritized tasks, desired to be lies within the principles of the agile manifesto [5]. Because the
included in the next release. These tasks are called Stories, and team, focuses of the tasks that have add value directly, they
are organizational requirements. During the Sprint meeting, the may pay less attention to supportive activities such as
team will review each story and estimate it, by using an agile documentation. This may lead to future problems, in terms of
estimation approach, for example, story points [8] and initially, maintainability and extensibility of the system or process. This
assign it to a team member. Later on during the Sprint, a story however, does not mean that if there is a high priority story for
may be reassigned to another member, in case that the original producing documentation or any support document, it will be
owner of the story is overloaded with tasks while other ignored. Instead, it will be treated like any other story.
members have still capacity to take more, or if another member According to the author this is the best way for inserting this
is more qualified for this task. If the team is overloaded with type of activities to a Sprint. The next section will show, how
stories, they may refuse to take on stories with lower SCRUM can be applied for managing academic institutions.
organizational value. On the other side, if they still have
capacity, they may ask for more stories. So stories original 3.0 ORGANISATIONAL STRUCTURE OF A COLLEGE
intended for a release, may be moved to another release. At the This section will illustrate how the process of SCRUM can be
end of the Sprint meeting, the Sprint Backlog will be created. adopted and optimized for managing an academic institution at
During the Sprint, the SCRUM master will call for daily Stand- a college level. Focus is given on this level because it is more
Up meetings. These meetings are five to fifteen minutes long. close to the main function of the institution but the same
During the meeting, the SCRUM master will ask every member approach can be extended to cover the whole organization.
three questions; Figure 2, shows a generic organizational structure of a college.
• What they did yesterday? The aim of this structure is aid the illustration of SCRUM,
An overview of the work completed over the last working however the same logic can be applied to colleges with small
day. variations in their organizational structure.
• If there are any problems?
If they are still any problems that impended the progress.
In case of a positive response to this question, the SCRUM
master should help the team members to solve the
problem, either directly or by associating the member with
the required resources for solving the problem.
• What they will do today?
Tasks, actions that they will do today.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 796
BIJIT -BVICAM’s International Journal of Information Technology
some other cases it may vary, depending on the size of the structure, will have less complex but precise tasks. It is the
college. The Vice Deanship of Academic Affairs is responsible belief of the author that by using this type of recursive
for the academic issues of the college and the academic approach, SCRUM but be used to manage an academic
departments. Each academic department has a number of institution.
committees, for example committee for curriculum
development, examination committee and so on. Each 5.0 LIMITATIONS
committee has six to eight academics from the department. The Applying this approach for managing the institution, may be
Vice Deanship of Research is responsible for managing the difficult at the beginning as the Heads and Chairmen, may fell
research activities of the college. The Directory of that applying the SCRUM methodology aims to take away their
Administration, is responsible for the various units within the powers. This maybe be true in some extend, but the real aim of
college. For example maintenance and IT support. applying the approach is to create a high performance, less
Management entities are managed by council/committee that bureaucratic working environment [9]. In order to manage their
consist of the head and a secretary from the entity, and the head resistance, they can be allowed to keep their titles, for example,
of the heads of the entities that are under this entity in the Head of the IT support unit and so on, as long as they do the
organizational structure. For example the Vice Deanship of tasks required by the role of the Product Owner. The second
Academic Affairs is managed by the Vice Dean of Academic limitation is that it adds some complexity to the management
Affairs and the Head of the Departments. Each Department is process as the members will be involved with more than one
managed by the head of the committees accordingly. teams. They will be members in one team and Product Owners
in the other team, so daily they have to attend two Stand-Up
4.0 APPLYING SCRUM TO ACADEMIC INSTITUSION meetings. In general, more close to the bottom of the
MANAGMENT organizational structure, there is a need for daily meetings.
They key idea behind applying SCRUM for managing However, teams at a more high level in the organizational
academic institutions is that each management entity will be structure may not be required to have daily Stand-Up meetings.
consider as a SCRUM team. The head of the management unit Instead, they could limit them to two times per week. Also the
will be the Product Owner, and the secretary or one of the other duration of the Sprint could be adopted accordingly as long as
members the SCRUM master. Any member of the team can be it does not cause co-ordination problems between various
a SCRUM master as long as fulfils the criteria and is willing to teams.
do it. However, due to the workload involved, it is
recommended that secretary can be appointed for this role. The 6.0 CONCLUSION AND FUTURE SCOPE
Stand-Up meetings can be replaced by daily conference calls, This paper illustrated how the SCRUM methodology can be
where each member has to answer, what it was done the day used to manage academic institutions. The method was applied
before, if there were any problems and what it will be done to “generic Organizational Structure” of a college. While this
today. An electronic version of the Story Board will be structure may not be the same with some academic institutions,
required for managing the team. The members of each team the author believes that the method presented in this paper, can
will be also the Product Owners of their teams. So the Head of be easily tailored to map most academic institutions. The key
the Departments, will be members of the Vice Deanship of idea, is that each managing entity will be considered as a
Academic affairs, team but they will also be Product Owners, SCRUM team. The head of the entity will be the Product
in their Departments. The committee members of each Owner, the secretary the SCRUM master and rest of the team
department, will be members in the Department council team will be the members. Each member of a team will be the
but Product Owners in their Committees. At the beginning of Product Owner of its own team, so recursively the tasks will be
the Sprint, the Product Owner of a management entity will passed to the teams, lower in the organizational structure.
bring the tasks that need to be completed during this sprint, like Further to the main limitations of applying SCRUM to manage
any Sprint Meeting. During the meeting, the tasks are academic institutions is that people who hold manager
estimated, accepted and allocated to different members. positions may fell threaten if their title is changed to Product
However, unlike a normal SCRUM team, the tasks are not Owner. The approach allows them to keep their current titles as
going to be completed by the individual person but by the long as they also deal with the tasks of the Product Owner.
member’s team. The member as a Product Owner in his own Another limitation of this approach is that it adds some
team, will be responsible for braking down the work to be done overhead, as some members will belong to two teams and may
in prioritized stories and supply these stories to its own team, in not even be in the same locality. To solve this problem, Story
their Sprint meeting. After the end of the Sprint Meeting, the Boards can be replaced with electronic boards and Stand-Up
member will take all these tasks to its own team, where the meetings with conference calls. The frequency of the Stand-Up
member will now be the Product Owner. The same process will meetings can be also be reduced and the duration of the Sprint
be repeated until tasks reach individual persons. It is worth to can be modified to fit the organizational needs. Following this
be noted that the tasks are not going to be the same. The teams approach, this paper demonstrated how SCRUM can be used to
closer to the leadership, will have higher level goals and manage academic institutions.
objectives, while the teams at the bottom of the organizational
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 797
Adopting SCRUM Agile Project Management for Managing Academic Institutions
7.0 ACKNOWLEDGEMENT
This work would have not been possible with the support of
King Abdulaziz University and the Faculty of Economics and
Management.
8.0 REFERENCES
[1]. C.Maree. 'Defining administrators and new
professionals.' PERSPECTIVES, VOLUME 4,
NUMBER 1, 2000: pp. 4-5.
[2]. N. Martindale, (2011). "Leadership Styles: How to
handle the different personas". Strategic Communication
Management 15 (8): 32–35.
[3]. K.Schwaber, J. Sutherland, “The Scrum Guide”,
SCRUM.ORG, 2013,
http://www.scrumguides.org/docs/scrumguide/v1/Scrum
-Guide-US.pdf, last accessed 3/12/2014
[4]. SCRUMstudy, “A Guide to the SCRUM BODY OF
KNOWLEDGE (SBOK™ GUIDE), 2013 Edition,
ISBN: 978-0-9899252-0-4
[5]. The Agile Manifesto.
http://agilemanifesto.org/, last accessed 3/12/2014
[6]. N. Brede Moe, T.Dingsøyr , T.Dybå, “A teamwork
model for understanding an agile team: A case study of a
Scrum project”, Elsevier Information and Software
Technology, Volume 52, Issue 5, May 2010, Pages 480–
491
[7]. http://www.successfulprojectmanager.com/agile/scrum/,
last accessed 3/12/2014
[8]. J.Choudharia, U.Suman, “Story Points Based Effort
Estimation Model for Software Maintenance”, Elsevier
Procedia Technology, Volume 4, 2012, Pages 761–765.
[9]. T. ErlendFægria, T. Dybåa, T. Dingsøyra, “Introducing
knowledge redundancy practice in software
development: Experiences with job rotation in support
work”, ElsevierInformation and Software Technology,
Volume 52, Issue 10, October 2010, Pages 1118–1132.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 798
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 799
BIJIT - BVICAM’s International Journal of Information Technology
3.0 BLOCK DIAGRAM OF THE SYSTEM entering the correct password, thus making the system more
For the development of the system, PIC16F877A secured and less prone to mistakes.
microcontroller based on the modified Harvard architecture
developed by microchip technology has been used. Fig.2 shows 3.5. GSM Module
the block diagram of the system. Various sensors and devices
GSM Module is used in the system to send the polling results to
interfaced with the microcontroller are shown. The machine
design consists of: the monitoring station via mobile network. In this way a more
The machine design consists of: secured system is presented and the chances of anomalies are
3.1. Crystal Oscillator reduced.
It is an oscillator circuit that deploys the property of
mechanical resonance of the piezoelectric crystals for creating 4. 0 POWER SUPPLY
an accurate electrical signal. The frequency of the crystal by Five volts power supply w.r.t ground is required for the
keeping a track of time, provides clock signal to the operation of the microcontroller. Fig. 3 shows the circuit for the
microcontroller. Quartz crystal of frequency 4 MHz is used in power supply used in the system.
the proposed system. Quartz crystals are used in wrist watches,
calculators, counters, signal generators, and oscilloscopes.
The step down transformer steps down the ac supply from the
mains and bridge rectifier converts it into dc. This dc is passed
Figure 2: Block Diagram of the System through filter circuit to get a more smoothened waveform.
Voltage regulator produces a fixed output voltage that remains
3.2. Infrared Sensors constant irrespective of changes in its input voltage and load
Infrared (IR) sensor is an electronic device consisting of conditions. 7805 voltage regulator is used here, which gives +5
transmitter and receiver LED. The transmitter LED V output which is then given to microcontroller for its
continuously emits IR rays and when an object is close to the operation.
sensor, the rays bounce off the object and received into the
receiver LED. Infrared sensors are generally used in IR 5.0 DEVELOPMENT TOOLS
imaging devices, gas analyzers, and radiation thermometers. IR The software of the machine is written in Embedded C
sensors are used in this system to track the voter count which is language and the simulation of the system is done on Proteus
used at later stage for analysis of polling results. Professional Software v8.0. MPLAB Integrated Development
Environment has been used for programming the
3.3. Liquid Crystal Display microcontroller.
A Liquid Crystal Display is dot matrix display that displays
alphanumeric characters and symbols. Liquid crystal displays 6.0 CIRCUIT SIMULATION
are used in battery-powered devices, such as digital watches, A GSM based design of an electronic voting machine with
calculators, digital thermometers etc. 16X2 LCD has been used voter tracking is presented in this paper, Fig. 4 shows the
in the modeled system to display the candidate information and simulation schematic of the machine design and snapshot of
polling results. voter count is also included (see Fig. 5). To enable the polling
results to be displayed, an LCD having two by sixteen display
3.4. Polling Switches is used. The LCD is connected to the PORT B of the
Polling Switches are used in the system to cast votes to the microcontroller which is declared as the output port. The
candidates. By pressing the switch, vote can be given to the operation of the LCD is shown in Fig. 6.
desired candidate. Six switches have been used in modeled Polling switches are used to give votes to the candidates. The
system to cast votes and one switch is for vote rejection. The design is proposed for four candidates representing different
polling results are displayed by pressing the last switch after
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 800
Design of a GSM Based Electronic Voting Machine with Voter Tracking
parties, a switch is used to show the polling results after [3]. A. Drumea, P. Svasta, "Universal electronic module for
entering the correct password. There is rejection button industrial control based on system on chip device," 30th
available in the machine, which is pressed if voter does not International Spring Seminar on Electronics Technology,
want to choose a candidate. Infrared sensors are used for ISSE 2007, Cluj-Napoca, Romania, pp. 232-235, May
tracking the number of voters at the polling booth. After the 2007.
voting process has been over, the results are sent to the [4]. Vaibhav Bhatia, Gavish Bhatia, “Room Temperature
monitoring station via GSM using mobile network. There is an Based Fan Speed Control System using Pulse Width
added advantage of using GSM that the results data cannot be Modulation Technology”, International Journal of
tampered as it is directly sent to the base station for analysis Computer Applications, Vol. 81, no. 5, pp.35-40,
and results declaration. All the data consisting of number of November 2013
voters present at the polling booth, number of votes rejected [5]. A. Villafiorita, K. Weldemariam, and R. Tiella,
and number of votes given to the candidates is also sent to “Development, Formal Verification, and Evaluation of
monitoring station for verification. This system is appropriate an E-Voting System with VVPAT,” IEEE Transactions
and the chances of mistakes are reduced. The final results are on Information Forensics and Security, vol. 4, no. 4,
also displayed on the LCD after entering the correct password, 2009.
thus making the system highly secured. [6]. S.Lavanya."Trusted secure electronic voting machine"
International Conference on Nanoscience, Engineering
7.0 RESULTS AND CONCLUSIONS and Technology (ICONSET), pp.505 – 507, 2011
A GSM based voting machine design with voter tracking has [7]. D. Chaum , P. Y. Ryan and S. Schneider S. De Capitani
been proposed in this system which is found to be appropriate. di Vimercati , P. Syverson and D. Gollmann "A
The software of the system has been written in Embedded C practical voter-verifiable election scheme", Proc.
language and Proteus Professional Software has been used for Comput. Security (ESORICS 2005), vol. 3679, pp. 118
simulating the behavior of the machine. The simulation of the -139, 2005.
machine is working properly under normal conditions. Polling [8]. Vaibhav Bhatia, Rahul Gupta, “A Novel Electronic
switches are used to give votes to the candidates and infrared Voting Machine Design with Voter Information Facility
sensors have been used to track the voter entries. The count of using Microcontroller” International Conference on
the voter entries previously stored in the register is matched Computing for Sustainable Global Development , pp:
with the total votes casted and votes rejected to avoid any 311-313, March 5th- 7th , 2014.
mistakes thus making the system more protected. After the [9]. A. Hasti, “Study of Impact of Mobile Ad – Hoc
voting process has been over, the results are displayed on the Networking and its Future Applications”, BIJIT – 2012,
machine LCD by entering the correct password and sent to the January - June, 2012, Vol. 4 No. 1, ISSN 0973 – 5658.
monitoring station via GSM for analysis and the declaration of [10]. Kusam, P. Abrol and Devanand, “Digital Tampering
the final verdict. Table 1 shows the comparative study of Detection Techniques: A Review”, BIJIT-2009, July –
different voting systems. The design presented here is cost December, 2009, Vol. 1 No. 2, ISSN 0973 – 5658.
effective, highly secured and appropriate according to the [11]. V. Otsason, A. Varshavsky, A. LaMarca, E. de Lara,
modern day requirements. "Accurate GSM indoor localization," in Proceedings of
the 7th International Conference on Ubiquitous
8.0 FUTURE SCOPE Computing, pp.141-158, Tokyo, Japan, September 2005.
The design of the GSM based electronic voting machine with [12]. J. Cai, D.J. Goodman, “General Packet Radio Service in
voter tracking proposed in this paper is accurate and it can be GSM", IEEE Communication magazine, October 1997.
further improved in terms of power consumption using
advanced VLSI applications. Table 1: Comparative study with existing voting systems
Parameters Other Systems Our System
9.0 REFERENCES
[1]. Douglas W. Jones, “Early Requirements for Mechanical Control Unit Microcontroller Microcontroller
Voting Systems”, International Workshop on Security Less secured More Secured
Requirements Engineering for E-voting Systems, Aug.
31, 2009. Comparatively less
Accuracy More accurate
[2]. Vaibhav Bhatia, Pawan Whig, “Performance Analysis of accurate
Multi Functional Bot System Design using
Microcontroller”, International Journal of Intelligent Cost High Cost Low Cost
Systems and Applications, Vol. 6, no. 2, pp. 69-75,
January 2014.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 801
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 802
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 803
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 804
SMITHA: Scalable Modular Interconnect for Three Dimensional High Performance Applications - A New 3D Topology for NoC
Based Systems
W s (1,n) = WL s (1,n) = 2n – log 2 (n+2) – 1 ≈ 2n address (1, 2, 0) represents a node in level one layer two and
position zero. This is depicted in the figure (Fig 2)
3.0 Three Dimension Topology
The proposed three dimension topology is made by placing the 3.2 Routing Algorithm
above discussed base substrate one over the other and by This section presents a routing algorithm for the proposed
interconnecting the adjacent levels as follows. topology in three dimension. Whenever the source and
• The interconnections between odd level and an even are destination nodes are in the same level, the routing algorithm
done by interconnecting the even layers through the right presented in case of two dimension applies. The algorithm
and odd layers though the left. For example presented below routes a packet which is in two distinct levels.
interconnection between level one and two. For clarity in explanation and understandability, we divide the
• Similarly the connections between even level and an odd topology vertically into two as shown in the figure (Fig 3)
are done by connecting the odd layers though the right and
even layers through the left. For example interconnection
between level two and three.
This way makes the proposed topology more scalable by
placing one layer over the other. The interconnection discussed
above is depicted in the figure (Fig 2) below for a configuration
of three levels and each level having three layers.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 805
BIJIT - BVICAM’s International Journal of Information Technology
Case 2: Current node on the left and destination on the right where L is the number of levels and HC s(Max) (1,n) is the
Step 3: Move right when current node and destination maximum hop in case of two dimension topology with n
is in the same layer or when the current node is greater nodes.
than the destination
Step 4: Move down when destination is less than Similarly maximum hop for all source and destination was
current node tabulated and simple arithmetic mean for recorded. The effect
was the same as observed in the case of two dimension.
Case 3: Current node and destination on the right
Step 3: Move right when current node and destination 3.3.2 Number of Wire Segments & Wire length: In case of
is in the same layer the three dimensional structure, the wires used to interconnect
Step 4: Move top right when destination is greater within layers and between the different levels contribute to the
than current node wire length and number of wire segments. Considering a unit
Step 5: Move down when destination is less than length of wire for interconnecting the node within the layer and
current node between the layers, the parameters can be expressed as
Case 4: Current node on the right and destination on the left W s (L,n) = WL s (L,n) = L ( 2n – log 2 (n+2) – 1) + ( L -1)
Step 3: Move left when current node and destination (log 2 (n+2) – 1)
is in the same layer or when the current node is greater
than the destination Where n is the number of nodes in each level and L is the
Step 4: Move down when destination is less than number of levels. The first term quantifies the parameters for
current node interconnecting nodes in single level and the second term
quantifies the same for interconnecting two successive levels. It
The current node checks the destination address in the packet. should be noted that as the number of levels increases, the
The next node of transit is decided by the routing algorithm parameters for interconnecting the successive levels increases
depending on the position of destination and current node. The only in logarithmic order. This is very advantageous in case of
routing algorithm routes the packet to the nearest node towards the proposed three dimension topology.
the periphery in the same level of the current node and then to
the level of the destination node. Now the packet is in same 4.0 COMPARISON OF PERFORMANCE PARAMETERS
level as destination node, will follows the two dimensional WITH EXISTING TOPOLOGIES
routing algorithm to reach the destination node. For example, This session compares the above discussed performance
consider a packet currently in node (1,2,1) to be transferred to parameters with two dimensional and three dimensional mesh
(2,2,1). Since both the nodes are on the right topology, the and torus, the popular existing topologies in this concept.
packet is routed towards the periphery through the right to
(1,2,0), then to the level of the destination to (2,2,0) and then to 4.1 Comparison with Two Dimension Topologies:
the destination (2,2,1). Similarly the proposed routing This session compares the performance parameters in case of
algorithm routes packet to all source destination pairs. two dimension with popular existing topologies – mesh and
torus
3.3 Performance Parameters The tables ( Table 2,3) below tabulate the parameter maximum
This session discusses the different parameters in case of the hop and average hop for different number of nodes per layer
proposed three dimension topology. The parameters discussed for levels one, two and three
are same as those of two dimension. From the tables 2 and 3, it is quite evident that the maximum
hop and average hop parameters are good for the proposed
3.3.1 Maximum & Average Hop: As discussed in the case of topology when it is compared to mesh and torus. Also it should
two dimensional, the performance of the systems will be given be noted that the performance parameters for the proposed
by this parameter. As per the routing algorithm presented topology when scaled does not grow drastically when
above, the packet moves towards the node at the periphery compared with mesh and torus This implies that the packets
which is at most HC s(Max) (1,n). Then it should travel vertically reach the destination in less time and the output generation is
up through (L – 1) nodes to reach the level of the destination faster increasing the throughput of the system in the proposed
node. Now it takes another HC s(Max) (1,n) to reach the topology and a system implemented using the proposed
destination node. Summing the values above, the parameter can topology in any dimension performs better. This has an
be bounded as implication of power consumption also.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 806
SMITHA: Scalable Modular Interconnect for Three Dimensional High Performance Applications - A New 3D Topology for NoC
Based Systems
The following tables (Table 4,5) quantify the parameters 6.0 REFERENCES
related to area of the systems. The tables below tabulate [1]. William J. Dally , Brian Towles, Route Packets Not
number of wire segments and wire length for the same. Wires : on chip interconnection network, DAC 2001
From the above tables, it is quite clear that the area requirement June 2001.
for the proposed is almost same in lower configuration / levels [2]. Tobias Bjerregaard And Shankar Mahadevan, A Survey
but as the system scales to higher levels the wire requirement is of Research and Practices of Network_on_Chip, ACM
comparatively very high when compared to the proposed Computing Survey March 2006.
topology. This effect is not only on the area requirement but [3]. Ville Rantala, Teijo Lehtonen, Juha Plosila, Network On
also on the power dissipation of the system.Summing the above Chip Routing Algorithms, TUCS Technical Report No
two results it is evident and clear that the proposed architecture 779, August 2006.
performs better with lesser area / power requirement. Apart [4]. Ahmed Hemani, Axel Jantsch, Shashi Kumar, Adam
from the analysis above, the proposed topology was subjected Postula, Johnny berg, Mikael Millberg,Dan Lindqvist,
to real time scenarios under different buffer and load / traffic Network on a Chip: An architecture for billion transistor
conditions to test the strength of the topology which also gave era, DAC 2001.
positive results. [5]. Radu Marculescu, IEEE, Natalie Enright Jerger, Yatin
Hoskote, Umit Y. Ogras and Li Shiuan Peh, Outstanding
5.0 CONCLUSION Research Problems in NoC Design: System, Micro
This paper introduces a new three dimensional topology architecture, and Circuit Perspectives, IEEE
SMITHA (Scalable Modular Interconnect for Three Transactions on computer aided design of integrated
dimensional High performance Applications). The discussion circuits and systems, vol. 28, no. 1, January 2009.
starts with the two dimension variant and extends it to three [6]. J. Nurmi: Network on Chip: A New Paradigm for
dimension. The proposed architecture is structured and System on Chip Design. Proceedings 2005 International
scalable. The paper quantifies the different performance / area Symposium on System on Chip, 15 17 November 2005.
parameters namely maximum hop, average hop. wirelength, [7]. L. Benini, G. De Micheli. Networks on chips: A new
number of wire segments in both two / three. dimension. This SoC paradigm. IEEE Computer.35(1), 2002
is compared with those of the current popular topologies [8]. S. Kumar, A. Jantsch, J. Soininen, M. Forsell,
namely mesh and torus. The growth of these parameters is M.Millberg, J. Oberg, K. Tiensyrja, and A. Hemani, A
found to be slow in case of the proposed topology implying Network on Chip Architecture and Design Methodology,
that a system implemented performs better with smaller die Proceedings International Symposium VLSI (ISVLSI),
area / power consumption. pp. 117-124, 2002.
[9]. Sanju V, Niranjan Chiplunkar, Mohd Khalid, P Venkata
Patent Information Krishna, Performance Analysis Through Simulation For
The architecture discussed in this paper is applied for patent Three Dimension Network Of Chip Based System,
with the following details Anusandhana – Journal Of Science, Engineering And
Type : India Management, Vol No 01, Issue No 02, Dec 2012, Pg.
Number : 1598/CHE/2014 18 – 29.
Date : 26/03/2014
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 807
BIJIT - BVICAM’s International Journal of Information Technology
No Of Topology
Nodes Number of Levels
Mesh Torus SMITHA Mesh Torus SMITHA Mesh Torus SMITHA
1 1 1 2 2 2 3 3 3
4 2 2 1 3 3 3 4 4 5
8 4 3 3 5 4 4 6 5 6
16 6 4 5 7 5 6 8 6 8
32 10 6 7 11 7 8 12 8 10
64 14 8 9 15 9 10 16 10 12
128 22 12 11 23 13 12 24 14 14
256 30 16 13 31 17 14 32 18 16
512 46 24 15 47 25 16 48 26 18
1024 62 32 17 63 33 18 64 34 20
2048 94 48 19 95 49 20 96 49 22
Topology
No Of Nodes Number of Levels
Mesh Torus SMITHA Mesh Torus SMITHA Mesh Torus SMITHA
1 1 1 2 2 2 3 3 3
4 1.00 1.00 0.50 6.00 6.00 1.25 17.00 15.00 1.94
8 1.75 1.50 1.20 9.00 8.00 2.03 23.75 19.50 2.65
16 2.50 2.00 2.17 12.00 10.00 3.06 30.50 24.00 3.71
32 3.87 3.00 3.29 17.50 14.00 4.35 42.88 33.00 5.05
64 5.25 4.00 4.65 23.00 18.00 5.87 55.25 42.00 6.61
128 7.93 6.00 6.21 33.75 26.00 7.55 79.44 60.00 8.33
256 10.63 8.00 7.90 44.50 34.00 9.35 103.63 78.00 10.16
512 15.96 12.00 9.75 65.88 50.00 11.23 151.72 114.00 12.06
1024 21.31 16.00 11.64 87.25 66.00 13.16 199.81 150.00 14.00
2048 31.98 24.00 13.50 129.94 98.00 15.12 295.86 222.00 15.96
No Of Topology
Nodes Number of Levels
Mesh Torus SMITHA Mesh Torus SMITHA Mesh Torus SMITHA
1 1 1 2 2 2 3 3 3
4 4 8 1 12 24 3 20 36 5
8 10 16 8 28 48 18 46 72 28
16 24 32 23 64 96 49 104 144 75
32 52 64 54 136 192 112 220 288 170
64 112 128 117 288 384 239 464 576 361
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 808
SMITHA: Scalable Modular Interconnect for Three Dimensional High Performance Applications - A New 3D Topology for NoC
Based Systems
No Of Topology
Nodes Number of Levels
Mesh Torus SMITHA Mesh Torus SMITHA Mesh Torus SMITHA
1 1 1 2 2 2 3 3 3
128 232 256 244 592 768 494 952 1152 744
256 480 512 499 1216 1536 1005 1952 2304 1511
512 976 1024 1010 2464 3072 2028 3952 4608 3046
1024 1984 2048 2033 4992 6144 4075 8000 9216 6117
2048 4000 4096 4080 10048 12288 8170 16096 18432 12260
No Of Topology
Nodes Number of Levels
Mesh Torus SMITHA Mesh Torus SMITHA Mesh Torus SMITHA
1 1 1 2 2 2 3 3 3
4 4 8 1 12 48 3 20 72 5
8 10 20 8 28 96 18 46 144 28
16 24 48 23 64 192 49 104 288 75
32 52 104 54 136 384 112 220 576 170
64 112 224 117 288 768 239 464 1152 361
128 232 464 244 592 1536 494 952 2304 744
256 480 960 499 1216 3072 1005 1952 4608 1511
512 976 1952 1010 2464 6144 2028 3952 9216 3046
1024 1984 3968 2033 4992 12288 4075 8000 18432 6117
2048 4000 8000 4080 10048 24576 8170 16096 36864 12260
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 809
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 810
BIJIT - BVICAM’s International Journal of Information Technology
Community Cloud -Face book [4] users by the cloud providers. Other concern is related to the
Hybrid Cloud -Amazon Web Services (AWS). [4] accessing of data and resources. Cloud provider must keep eye
on who is accessing data, from where this activity is taking
place and what type of control are applied. Data must be
classified for efficient accessing of data.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 811
A Compendium Over Cloud Computing Cryptographic Algorithms and Security Issues
3.1.1 DES –DES is a symmetric algorithm for data encryption Brute force attack. Because it uses 128 bit block size it more
by using 56 bit key size. It uses balanced feistal structure. It is secure than any other algorithm.[9,10]
designed by IBM in 1977.DES uses 64 bit block. Feistal
function for this are – expansion, substitution, key mixing and 3.1.4 RC-5-RC-5 encryption technique is Designed by Ronald
permutation and for the encryption process of DES there are Rivest in 1994.This symmetric algorithm uses Keysize of 0-
two permutations, one is initial and the other is final 2040bit and uses variable block size (32, 64 or 128 bits), key
permutation and sixteen Feistel rounds are used to generate the size (0 to 2040 bits) and number of rounds (0 to 255).It is
key, for each round 48-bit keyis generated from the cipher susceptible to 64-bit blocks differential attack using 244 chosen
key.[9,10]. plaintexts. [9,10]
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 812
BIJIT - BVICAM’s International Journal of Information Technology
3.2.1 RSA- RSA is a public key cryptographic algorithm for Larger the block size means greater security but decreases the
data security. This is a most common encryption algorithm encryption/decryption speed. AES has larger block size among
used by people to encrypt message with two keys. RSA the entire algorithms and has greater security capability than
algorithm encryption and decryption is based on the modular other.
exponential and has two exponents, a and b, where a is used for Table 1: Comparison of Cryptographic Asymmetric
public and b is used for private. Let the plaintext is M and C is encryption algorithms
cipher text, then at encryption.[9,10]
C =Ma mod n ASYMMETRIC ALGORITHM
And at decryption side
M = Cb mod n.
DESIGN
FEATURE DIFFIE-
RSA ElGamal ECC
HELLMAN
Based on
Based on
the Vulnerable
Bases on difficulty to
problem and secure
the determine
SECURITY of against
discrete secret key k
factoring eavesdroppin
logarithm given kP
large g
and p
Numbers
Free for
all,
STANDAR FIPS186- IEEE P1363
Patented ANSI X9.42
D 3
only in
US
Used for
confident
iality and Used for Implementin
key Used for Key both g algorithm
USAGE
exchange exchange encryption such as
as well as and DSA DSA
for digital
sign.
Figure 6: RSA algorithm
NO. OF
3.2.2 Diffie-Helman Key Exchange- This is created by the KEYS
2 2 2 2
Whitfield Diffie and Martin Hellman In 1976.This algorithm
depends on the complexity of discrete logarithm. Diffi-hellman
2013,224
basically used for key exchange between two users.[9,10]. KEY 512 to bits for q and 112 bit to
ALGORITHM: 2048 bit
LENGTH 15,360 2048 bits for 512 bit
p
Timing or
Brute
Chosen simple and
forced
Denial of cipher text differential
and
ATTACKS service and power attack
oracle
attack malleabilit (side
attack
y channel 0r
etc.
fault)
Larger the key size means greater security but decreases the
encryption/decryption speed .Blowfish has larger key length
3.2.3 ElGamal- This is an asymmetric algorithm used for among other algorithm.
transmitting digital signatures as well as for key exchange. El No. of rounds, multiple rounds offers greater security. Blowfish
Gamal is based on the applicability of discrete logarithms. It is has 16 rounds which is typically a standard number of rounds.
rely on the logarithmic number’s characteristics or calculations The most important thing no attack is known to be successful
of these numbers. [9,10] against Blowfish. Hence Blowfish is superior to other
algorithms.
4.0 COMPARISON AND RESULT Different asymmetric algorithms are compared below on the
Different symmetric algorithms are compared below on the basis of design feature. Analysis and performance Comparison
basis of design feature. Analysis and performance Comparison Table of symmetric encryption algorithm-[9,10,12].
Table of Asymmetric encryption algorithm-[9,10,12]
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 813
A Compendium Over Cloud Computing Cryptographic Algorithms and Security Issues
Table 2: Comparison of cryptographic symmetric AES effective in both software and hardware.3DES and DES
encryption algorithms are slow in software. Blow fish is more efficient in software.
DESIGN FEATURE
AES is excellent in security rate and execution time than RSA.
This paper encompasses a theoretical performance analysis of
SYMM symmetric or asymmetric encryption algorithm.
ETRIC
ALGOR NO. In the future, our research will be extend by providing
POSSIB
ITHM BLOCK
SIZE
KEY SIZE
OF
ROUN
NETW
ORK
ATTACK LE implementation of algorithm.
KEYS
DS
6.0 REFERENCES
10,12,1 Non- 2128,2192, [1]. Vanya Diwan, Shubhra Malhotra, Rachna Jain, “Cloud
AES 128 128,192,256 BruteForce
4 Feistal 2256
Security Solutions: Comparison among Various
Theoretical 2168 Cryptographic Algorithms”,IJARCSSE , April 2014.
168,112 or
3DES 64 48 Feistal meet-in-the 2112
56
middle attack 256 [2]. [Gartner Inc, “Gartner identifies the Top 10 strategic
Lai- technologies for 2011”. Online Available:
Narrow-
IDEA 64 128 8.5 massey 2128 http://www.gartner.com.
biclique
scheme
32,64,12
[3]. David G Rosado2, Eduardo Fernández-Medina2 and
1-255
8
(64
0-2040
(128
(12
Feistal Differential 2128
Eduardo B Fernandez, “An analysis of security issues
RC-5
suggets
suggeste suggested)
ed) for cloud computing Keiko Hashizume1”.
d)
No attack is [4]. .M. Vijayapriya, “SECURITY ALGORITHM IN
Variable
BLOWF known but
ISH
64 length 16 Feistal
suffering from
232,2448 CLOUD COMPUTING: OVERVIEW”, International
(32-448)
weak key Journal of Computer Science & Engineering Technology
ECC have advantage over RSA i.e.: requirement of less (IJCSET),2013.
memory and computation time. Advantages of ECC compared [5]. "4 Cloud Computing Security Policies You Must
to RSA increases abruptly because of length of the key. While Know". Cloud Computing Sec. 2011.
RSA need to double its key size, ECC requires few Bit to
[6]. Gartner, “Seven cloud-computing security risks".
obtain the same level of security. The RSA currently changes
[7]. Cloud Security Alliance. 2011, "Security Guidance for
its key size to 2048 Bit and ECC only need to increase its key
Critical Areas of Focus in Cloud Computing”.
size to 192 Bit.ECC devices occupies less storage, less power,
[8]. "Cloud Security Front and Center". Forrester Research.
less memory, and less bandwidth in compare to other systems.
2009-11-18.
Thus ECC has computational advantages with shorter key size
[9]. Hashizume , “An analysis of security issues for cloud
than SA.RSA is most widely used algorithm for encryption and
computing”, Journal of Internet Services and
key exchange. ElGamal is extended and updated version of
DH. Applications 2013.
[10]. Rashmi, “A Survey of Cryptographic Algorithms for
5. 0 CONCLUSION Cloud Computing”. International Journal of Emerging
Cloud computing is an innovative computing trend and many Technologies in Computational and Applied Sciences
organizations and business are shifting towards the cloud but (IJETCAS),2013.
there are certain barrier to adopt the services. The major reason [11]. EloffM.M, Smith E., “The management of security in
to avert the usage of cloud is security. There are many Cloud computing”, Univ. of South Africa, Pretoria,
cryptographic algorithms that can be deployed over the cloud South Africa,2013.
to provide the security. [12]. Maulik P. Chaudhari and Sanjay R. Patel, “A Survey on
DH and ElGamal accept the variants of elliptic curve.RSA is Cryptography Algorithms”, IJARCSMS, 2014.
faster in encryption and slower in decryption to ElGmal and
half of DH. Hence RSA is efficient among all other asymmetric
algorithms.
RSA and Diffie-Hellman Key Exchange both are asymmetric
algorithms. In cloud computing both RSA and Diffie-Hellman
Key Exchange algorithms generate encryption keys for
symmetric algorithms.
DES and AES are frequently used symmetric algorithms.DES
algorithm is easy to implement then AES. In terms of Security
of data, Flexibility, Memory usage, and performance AES
(Rijndael) is best among all.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 814
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 815
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 816
Comparative Study of Cross Browser Compatibility as Design Issue in Various Websites
e-monitoring, e-meeting e-delivery, e-PRC, e-grievance levels of compatibility conflicts to various levels when
re-addressal etc. regarding the implementation of ICT websites are opened on distinct web browsers or their
and different user’s access information from different versions. These features are the basis for categorizing websites
browsing platforms. The continuous evolution of the Internet for their cross browser compatibility capabilities.
has opened unimaginable opportunities and challenges in web
based education and learning [12]. Each and every person 3.2 Online tool for testing web pages
these days is getting all his work done by the use of web based The automated tool designed and developed by the author for
system which is accessible through one oir the other browsing testing various categories of the websites in order to study the
platforms. Only Workplace (office, school, college etc) was deviation from design standards by the designer includes five
different parameters. For testing browser compatibility
found to be the most common place for internet access. Most
parameter the features (or measures) which are considered by
offices and schools provide internet (broadband) access;
automated tool in determining the compatibility of a website
therefore people indulge in internet activities at work, only
on various commonly used browsers like Internet Explorer,
22% of the respondents did not have internet facility at work Google Chrome etc. are:
[13]. So attention needs to be paid to the design of the 1) Blinking
websites in order to make uniform behaviors of all the 2) ActiveX Controls
websites in different widely used browsers. 3) Website Resolution
4) Image Formats
S. No Web Browsers Compatibility for Blink 5) HTML Tag Error
Tag The test for various websites is carried out on the basis of the
1. Internet Not Supported above features to determine compatibility conflicts. This
Explorer[7,8,9] online web diagnostic tool provides a complete statistics of the
2. Chrome Not Supported browser compatibility based on the features which are
3. Safari Not Supported considered for the purpose.
4. Fire fox Supported
3.3 Sample Data
Table 1: Browsers compatibility with blinking tags The Sample of data undertaken to study Browser compatibility
as design and development issue in various websites is given
below in table 2. the five different categories of the websites
3.0 METHODOLOGY
3.1 Problem Identification which are widely used and accessed by the users were selected
A good web design aims to give a uniform look to the website, which includes government websites, commercial websites,
viewed from any web browser. Thus, a good website should job portals, social networking and educational websites. The
be viewable in its full functionality on any web browser. different category of the websites undertaken by the author
Since every webpage is built up of various components with helps the designer to understand about diversity in website
their own characteristics and these characteristics affect the design in a better and efficient way. Total 100 websites
performance of a webpage in different contexts. Like other belonging to different categories was taken for testing which
measures of performance evaluation the browser compatibility includes 20 websites from each categories mentioned above.
feature of websites is also affected by the various components The different websites are designed in consideration with
of a webpage either directly or indirectly. It is also dependent different design constraints and they are applying specifically
on the type of technology used in building websites like AJAX to each category undertaken for testing. Moreover, it helps a
as already discussed in literature review. Different lot to study diverse nature of the website design as far as
technologies sometimes also create the compatibility problem. browser compatibility on different browsing platform is
So during the design phase of the websites they must be tested concerned.
rigorously for its compatibility at different browsing platforms
As already discussed in literature review, different 3.4 Results and Discussions
components of web pages like blinking, active X controls, The Sample data undertaken to study cross browser
resolution, image formats and HTML tag error (like video compatibility as website design issue in various websites is
tag), Ajax, Flash, and event-handling for dynamic HTML etc. shown in below given Table 2 and the results obtained are
have a direct effect on the cross browser compatibility of a shown by framing the analysis into a graph shown in below
website. These features are supported to different levels by given figure A.
various types of popularly known web browsers or their Based on the graph shown in fig.(A) above, it can be analyzed
versions. The compatibility of blink tag by various popularly that the website categories that have maximum support in
known browsers is already in table discussed in literature percentage for various types of commonly used browsers
review. belong to e-government websites, e-commerce websites and
Similarly, the other features described above offer different job portals and the websites which shows least compliance to
the different browsing platforms belongs to social networking
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 817
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 818
Comparative Study of Cross Browser Compatibility as Design Issue in Various Websites
Bharati Vidyapeeth’s Institute of Computer BIJIT – 2011; July – December, 2011; Vol. 3 No. 2;
Applications and Management (BVICAM), New Delhi ISSN 0973
(INDIA) Copy Right © BIJIT – 2013; July-December,
2013; Vol. 5 No. 2; ISSN 0973 – 5658 589. Jatinder Manhas. The author’s educational
[11]. V. S. Rana, “An Innovative use of Information & background includes masters in computer
Communication Technology (ICT) in Trade Facilitation application from the university of Jammu,
in India” BIJIT - BVICAM’s International Journal of Jammu (J&K), India in the year 2004. The
Information Technology Bharati Vidyapeeth’s Institute author also qualified the state level
of Computer Applications and Management eligibility test for lectureship in the year
(BVICAM), New Delhi, Copy Right © BIJIT – 2012; 2005 conducted by UGC. The Authors is
July - December, 2012; Vol. 4 No. 2; ISSN 0973 – likely to obtain PhD degree in the field of
5658 492. computer sciences and IT from university of Jammu (J&K).
[12]. Rajiv and Manohar Lal , “Web 3.0 in Education & The author’s major field of study is website Design and
Research” BIJIT - BVICAM’s International Journal of Development issues. He has represented 10 research papers in
Information Technology Bharati Vidyapeeth’s Institute different national and international conferences within India
of Computer Applications and Management and abroad. He has also published 8 research papers in
(BVICAM), New Delhi, Copy Right © BIJIT – 2011; different peer reviewed and indexed journals of international
July – December, 2011; Vol. 3 No. 2; ISSN 0973 – repute. The author is working as Sr. Assistant Professor in the
5658 335. Department of Computer Sciences & IT, University of Jammu
[13]. Preeti Dubey , Jeevan Jyoti and Devanand, “A Study to (J&K), India since 2006. The author was also awarded with
Examine the Digital Divide Factors: Jammu and the UGC teacher fellowship under the faculty improvement
Kashmir Perspective” BIJIT - BVICAM’s International programme to complete his PhD in the year 2012. The author
Journal of Information Technology Bharati is also an acting and life member of Computer society of India
Vidyapeeth’s Institute of Computer Applications and and IACSIT (International Association of Computer Science
Management (BVICAM), New Delhi Copy Right © & Information Technology).
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 819
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 820
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 821
BIJIT -BVICAM’s International Journal of Information Technology
globe, but it also increases the risk to the maximum. According choose the best intrusion detection. The framework consists of
to Symantec report, around 1, 00,000 websites are available logical steps and which when followed revealed the desires
online and some of them share the critical information and intrusion detection system. The steps which are involved in
valuable data. In order to steal the critical data or important and choosing best intrusion detection are as:
relevant information without having legitimate access to the • Risk Analysis.
resources, the person on longer need not to be a hacking gem, • Detection Rate
just download and run the hacking program, make some • False Alarm Rate
settings and you are done [9][16]. In order to secure the • Cost Benefit analysis
companies or individual’s data/ information, firewalls are being • Updates or patches ratio.
installed, but they alone do not serve the purpose of defending When the above mentioned steps are followed in a manner
the data from attacks or intruders. The main aim of the firewall shown in figure below (cc), yield the results based on the
is to filter the traffic but they cannot block all the traffic. Also mathematical formulas. The accepted criteria must be decided
once the traffic passed through the firewall there is no such by the security professionals to choose best intrusion detection
mechanism available that traffic will be monitored inside the system.
network for rest processing. Also firewall only detects external
traffic coming to it, but doesn’t detect the internal attacks. By Identify Risk
using intrusion detection system, we can monitor or do the
following things:
• Monitors network traffic. Pick IDS
• Continuously monitors servers/ network for misuse actions
or abuse policy.
• Attack / breach alerting, response and reporting. Detection Rate
• Countermeasures.
Thus it became very much important for an organization to
install both firewall and intrusion detection system to secure True Alarm
their assets / information for hackers / attackers. Also for
securing this particular data and information from the attackers,
there are lots of intrusion detection mechanisms currently Select another Cost Benefit
available in the market. Every intrusion detection Choice of
manufacturing organization highlights his qualities of making IDS
secure the information, but none of the organization or research Updates Available
community describes the guidelines for picking the most
appropriate and good suitable intrusion detection system for
any company or individual. Thus it became very much
important to provide some guidelines either through some
model or through some mathematical formula to suggest the If
company which intrusion detection system is most suited for Satisfied Yours
them and under which norms. We have taken a step towards the
development of guidelines for choosing the right intrusion
detection in accordance to their requirements and importance’s. Figure 1: Frame Work for choosing right intrusion
In this chapter we have presented guidelines for choosing right detection system
most intrusion detection system for company or individual
under required condition. The guidelines will be discussed in 3.1 Risk Analysis
next section of this chapter. The Risk analysis step is the first step towards the choosing of
intrusion detection and prevention system for an individual or
3.0 FRAME WORK FOR CHOOSING INTRUSION an organization. This step is most important and critical
DETECTION SYSTEM towards the picking of right most intrusion detection system.
Choosing an intrusion detection system is a delicate task, as the The risk calculation is very big thing to do because it deals
whole company security responsibility lies on the shoulders of with the overall security of the organization. The risk analysis
the intrusion detection system i.e.to detect the attack made on can be considered as a tool for risk management, which is
the organization system, to mitigate them if possible or to alert helpful for identifying security issues i.e. vulnerabilities,
the administrator about the attack happened [4]. Currently there threats and unauthorized access. Also as per the general
are many intrusion detection systems available within the definition of risk on different blogs and websites, the risk can
market but it is difficult to choose the best intrusion detection be calculated as:
system for an organization[17]. In order to choose the same, we “Risk = Threats x Vulnerabilities x Impact”
have devised a framework that will help an organization to
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 822
Framework for Choosing Best Intrusion Detection System
But we have devised the risk in accordance to our own IDs etc. Before going for any products, the company should
formulas. The formula will depend upon the following factors. consider all the available resources for basic system operation
i. Summation of threats. and maintenance. Thus should be able to pick the appropriate
ii. Value / impact of threats IDS which will meet the needs within the constraints laid down
iii. Total Impact of assets under risk by company. This task is very difficult, As there is no industry
iv. Total assets of the organization. standard against which we will compare IDS. Hence there is a
Before enforcing the formula, The RAG (Risk Analysis Group) need of providing a standard benchmark for IDS. The new
will find two important aspects used in making the formula product cycle for commercial IDSs is rapid, and information
which are [10] [11] [12] [13]: and systems quickly become obsolete. Steven Northcutt
• Identifying important information and their Values recommends the use of product guides that are updated at least
• Identifying threats and Vulnerabilities for the assets monthly. Relatively little objective third party evaluation of
Identifying important information and their Values – IDSs is available, while trade press reports are generally spotty
Identifying the values of the organization’s important and superficial. Setting up a facility to objectively compare
information is the very first step for risk analysis. In this step IDSs will be prohibitively expensive for all but the largest
the risk assessment group will point out / identify the most potential users, and some third-party or industry sponsored
important assets of organization and will estimate the cost effort is needed. Marketing literature rarely describes how well
associated and damage resulted if some intrusion/ attack a given IDS finds intruders and how much work is required to
happed on an organization or we can say the group will analyze use and maintain that system in a fully functioning network
the loss made by losing the information to some other with significant daily traffic. IDS vendors usually specify
company. While identifying the assets following things must be which prototypical attacks their systems can find, but without
kept in consideration. access to deployment environments, they cannot describe how
• Cost of assets/ information that may be lost if intrusion well their systems detect real attacks while avoiding false
happen. alarms. Edward Amoroso and Richard Kwapniewski recently
• Role and usage of assets / information. provided guidance in selecting IDS [14] by making some
questionnaires, upon the receiving the answers from the users,
Identifying threats and Vulnerabilities –After pointing out they will choose the intrusion detection system. These
the important information/assets, the responsibility of the group guidelines have impact of bias towards a particular intrusion
is to identify the vulnerabilities and threats for assets/ important detection system. This step is very important, as it is concern
information as identified in the prior step. Also they have to with the security of overall system. The step choice based and
keep an order of threats i.e. which threat may damage/ theft will not be entertained in the conditions which are going to
more information according to the percentage of damage done decide that is the picked intrusion detection system the right
by these threats and vulnerabilities. Thus in general, the RAG most intrusion detection for their organization. The decision of
will gather the information about the loss of assets / this step lies on the shoulders of the Risk analysis group. They
information in total at the initial stage, if not prevented and are the security professionals which will decide the most suited
total threats and vulnerabilities that can cause these losses. as per the threats and vulnerability of the organizations.
After acquiring the above two steps, we have derived a formula
which we are going to use to calculate the risk is as under: 3.3 Detection Rate
The step is very much important as the decision is concerned.
The detection rate for a particular intrusion detection system
will be available in the literature and papers available in
different research journals. Let us make an example, in one of
our experiment, the snort has detection rate of 99.4 % which
means that 99.4% of attacks are being detected by the snort
coming towards the system. Similarly all intrusion detection
By calculating the estimated risk, we can have idea about how has the documentation, which shows the rate of detection for
much it will affect our assets. Therefore the overall percentage that intrusion detection system. Rate of detection can be
of the risk can be calculated with the help of the following calculated as:
formula.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 823
BIJIT -BVICAM’s International Journal of Information Technology
TP = amount of attack when it actually attack Before a company or an organization decides on exactly which
TN = amount of normal detect when it actually normal IDS that organization or company should opt, it is very
Also rate of detection can be calculated using the above important to perform cost/ benefit analysis. As it is very
formula. The detection rate is very much important as per obvious and important that cost/benefit analysis is very real and
selection is concerned. It shows the overall rate. If the detection important factor in decision making of all the process related to
rate is greater than 90 %, the system is partially accepted. an organization. There funds allocated to the security or other
Which means the system will be evaluated for the next section. solutions have to have a good reason why such funds are
i.e. True alarm Rate . allocated to the said solution. This analysis can be performed
effectively once the organizations risk analysis has been
3.4 True Alarm Rate performed. This risk analysis will give the organization a very
The step is much important as per the decision is concerned. As real sense of the costs associated company assets. The
we are calculating the rate of false positive alarm rate which estimated cost/ benefit of the company can be evaluated with
can be calculated as the ratio of in-correct classified intrusions the following formulas as shown under:
to the total number of normal records. Therefore false positive
rate (FPR) can be calculated as:
But we have to calculate the True Positive alarm rate which can
be derived as from the above formula, which can be derived as
below:
True Positive Rate = 100- false Positive Rate
Let us assume we got the false positive rate as 3.06% , then we
can easily get the true positive rate as 96.77% which means that
the system is accurately identifying 96.77 % of the intrusions
that of total available in the dataset. Upon partial accepted from The equation of cost has been designed to evaluate the total
previous sections. If the true alarm rate is less than 95 %, it is cost of the security solution for an organization. The cost
partially accepted. consists of all the man power which can be used to incorporate
the security solution in accordance to the requirement of the
3.5 Cost Benefit Analysis. organization for the purpose of securing the critical data. Also
There is a variety of approaches to cost analysis, the suitability the benefit is as important as determine the cost of security
of any of which depends upon the purpose of an assessment solution. The benefit will give us figures that whether the
and the availability of data and other resources. It is rarely solution will be beneficial to the company. It will give us the
possible or necessary to identify and quantify all costs and all impact of the benefits using the big budget for the security
benefits (or outcomes), and the units used to quantify these solution. The formula helps us to estimate the benefits from the
may differ. security solution, which is usually the cost of assets which are
Main types of cost analysis include the following. currently under threat and future assets. The formulas for
• Cost-of-illness analysis: a determination of the economic benefits are as under:
impact of an illness or condition (typically on a given
population, region, or country) e.g., of smoking, arthritis or
bedsores, including associated treatment costs
• Cost-minimization analysis: a determination of the least
costly among alternative interventions that are assumed to
produce equivalent outcomes. Where n is the number of Assets
• Cost-effectiveness analysis (CEA): a comparison of costs The Net Cost-Benefit will be retrieved from the difference of
in monetary units with outcomes in quantitative non- cost from benefits. The Net-cost benefit analysis will be
monetary units, e.g., reduced mortality or morbidity. derived as under:
• Cost-utility analysis (CUA): a form of cost-effectiveness
analysis that compares costs in monetary units with
outcomes in terms of their utility, usually to the patient, This section will be critical as far as the decision will be is
measured, e.g., in QALYs. concerned. If partially accepted from last sections, if the Net-
• Cost-consequence analysis: a form of cost-effectiveness Cost Benefits is greater than Zero (>0), it is again partially
analysis that presents costs and outcomes in discrete accepted.
categories, without aggregating or weighting them. 3.6 Decision Phase
• Cost-benefit analysis (CBA): compares costs and benefits, This is one of the most important phases of our framework, if
both of which are quantified in common monetary units. the system is already partially accepted; it will go to the next
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 824
Framework for Choosing Best Intrusion Detection System
phase of detection. The final selection results will be based on Table1: Detection Rate for evaluation
the following points:
Name of IDS Benefits Name of IDS Detection Rate
Snort 62,00,000 Snort 98.3 %
Bro 94.4 %
Bro 62,00,000
NIDS 97.3%
NIDS 62,00,000
As per the statistics available in the literature, Snort has highest
1. Highest rate of detection under consideration. detection rate while on the second number NIDS is there and
2. Lowest False alarm Rate. Bro is at the third number.
3. Highest Net-Cost Benefit. False Rate: As per the literature available, we have collected
It is considered that if the one security solution has high Net the respective false rate of the all the three intrusion detection
Cost-Benefits rate and rest two options are low and other system available mentioned above. The False rate is as under:
solution have also been partially accepted but does not have Table 2: False alarm Rate for evaluation
Net Cost-Benefits but have very good statistics high in
detection rate and true positive rate, the security solutions Name of IDS False Rate
which have high detection rate and true positive rate will be Snort 2.3%
considered for selection. Bro 7.5%
NIDS 2.1%
4.0 EVALUATION OF FRAMEWORK FOR CHOOSING
INTRUSION DETECTION SYSTEM As per the statistics available in the literature, NIDS have least
The evaluation of frame work for choosing Intrusion detection false rate, on second number Snort is there and last is Bro.
system was done on the statistics provided by the Kashmir Cost-Benefit:
university IT&SS department. The department provided the The benefit of all the three is as follows:
statistics only meant for the research meant in this thesis. The
figures provided are as : Table3: Cost Benefit for evaluation
Risk Analysis: As per the departmental report, total cost of The costs of all the three are:
assets which are under risk (attacks). The risk figures are Cost of Snort = Cost of Deployment + Cost of updating +
calculated by using the above mentioned formulas. Cost Maintenance.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 825
BIJIT -BVICAM’s International Journal of Information Technology
Name of IDS Net Cost-Benefit [7]. Beigh, B. M., & Peer, M. A. (2011). Intrusion Detection
Snort 62,00,000-1,30,000 = and Prevention System: Classification and Quick.
6070000 [8]. Kovacich, G. L. (2003). The Information Systems
Bro 62,00,000- 1,50,000 = Security Officer's Guide: Establishing and managing an
6050000 information protection program. Butterworth-
NIDS 62,00,000 -1,70,000 = Heinemann.
6030000 [9]. Huang, Y. A., & Lee, W. (2003, October). A
cooperative intrusion detection system for ad hoc
Decision: networks. In Proceedings of the 1st ACM workshop on
As the Net Cost-Benefit analysis for all are almost same, Security of ad hoc and sensor networks (pp. 135-147).
therefore the deciding factor is now detection rate and false ACM.
alarm rate. As per the calculation Snort has highest detection [10]. Cavusoglu, H., Mishra, B., &Raghunathan, S. (2004). A
rate from the three and rate of false alarm rate for snort is 2.3 model for evaluating IT security investments.
and NIDS is 2.1. Therefore after seeing the results, the Communications of the ACM, 47(7), 87-92.
detection rate of Snort is high and false rate is almost same in [11]. Banerjee, U., & Arya, K. V. (2013). Optimizing
NIDS and Snort, so we choose Snort from all the three Operating Cost of an Intrusion Detection System.
intrusion detection system. International Journal of Communications, Network and
System Sciences, 6(1).
4.0 CONCLUSION [12]. Cohen, G., Meiseles, M., &Reshef, E. (2012). U.S.
The current research is focused on choosing intrusion detection Patent No. 8,099,760. Washington, DC: U.S. Patent and
and prevention system. The selection of the Intrusion detection Trademark Office
System is a very tough job. The thesis chapter provide [13]. Amoroso, E., &Kwapniewski, R. (1998, December). A
framework for choosing best intrusion detection system for an selection criteria for intrusion detection systems. In
organization. The framework is the form of flow diagram, Computer Security Applications Conference, 1998.
when followed strictly will yield a solution for choosing best Proceedings. 14th Annual (pp. 280-288). IEEE.
intrusion detection and prevention system for an organization. [14]. Chaudhary, A., V. N. Tiwari, and A. Kumar. "Analysis
The steps mentioned in framework appears to be a simple of fuzzy logic based intrusion detection systems in
exercise but are basically important/ critical steps for getting mobile adhoc networks." BIJIT – BVICAM’s
best of ID&PS for an organization . But ultimately the choice International Journal of Information Technology, 6.1
depends upon company. The researcher had made an attempt to (2014): 690-696.
provide certain guidelines in terms of frame work for choosing [15]. Beigh, Bilal Maqbool. "One-stop: A novel hybrid model
or selecting right most intrusion detection for an organization. for intrusion detection system." INDIACom - 2014,
2014 IEEE International Conference on Computing for
5.0 ACKNOWLEDGEMENT Sustainable Global Development, Bharati Vidyapeeth’s
I would like to thank Prof. S. M. K. Quadri, Head, Department Institute of Computer Applications and Management
of Computer Sciences, University of Kashmir for helping me (BVICAM). New Delhi, 2014.
throughout the course- Thank you Sir [16]. Mitra, Sulata, and Arkadeep Goswami. "Load Balancing
in Integrated MANET, WLAN and Cellular Network."
6.0 REFERENCES BIJIT – BVICAM’s International Journal of
[1]. CONNOLLY, P. J., 2001. Security protects bottom line. Information Technology, (2011): 304.
InfoWorld, Vol. 23, No. 15, p. 47
[2]. SAKURAI, K., & Kim, T. H. (2008). A Trend in IDS
researches. (Journal of Security Engineering), 5(4), 8.
[3]. Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., &
Srivastava, J. (2003). A comparative study of anomaly
detection schemes in network intrusion detection. Proc.
SIAM.
[4]. Mathew, D. (2002). Choosing an intrusion detection
system that best suits your organization. GSEC Practical
v1. 4b, available at: www. Sans.
org/reading_room/whitepapers/detection
[5]. Brown, D. J., Suckow, B., & Wang, T. (2002). A survey
of intrusion detection systems. Department of Computer
Science, University of California, San Diego.
[6]. Grandison, T., &Terzi, E. (2009). Intrusion Detection
Technology.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 826
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 827
BIJIT - BVICAM’s International Journal of Information Technology
which can be generated by scanning all transactions of database methodology of Srikant and Agarwal gets fail when applied to
D against all items of set N for a given minimum support. interval data where separation between data values has some
Prerequisite for the Apriori algorithm are: A set of transactions meaning [15].
(D), minimum support (minsup) and 1-frequent itemsets (F 1 ). Table 1: Apriori Algorithm
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 828
A Novel Pruning Approach for Association Rule Mining
5 5
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 829
BIJIT - BVICAM’s International Journal of Information Technology
Table 4: 2-Frequent Itemsets Frequencies Frequency of the 3-frequent potential itemsets, shown in Table
Potential 2- Frequency Potential 2- Frequency 1.5, is compared with given minimum support and following 3-
Frequent Frequent frequent itemsets are generated.
Itemsets Itemsets
It is again worth
4 8
11 12 mentioning here that following itemsets
are not 3-frequent because
5 4
frequency of these itemsets is less than minimum support.
9 2 Similarly, in third iteration, following 4-frequent candidate
6 2 itemsets ; followed by 4-
6 3
frequent potential itemsets ; and then
11 5
followed by 4-frequent itemsets are
{1,10} 4 2
generated by first, second and third step respectively. At this
7 4 point again, the significance of making the following 4-
2 5 frequent candidate itemsets bold faced
will be discussed in part 3.2 of this section. Frequency of 4-
5 9
frequent potential itemsets is shown in Table 1.6. There will be
4 2 no more 5-frequent candidate itemsets generated by Apriori
algorithm for this example because none of two itemsets from
f6 5 following 4-frequent itemsets are possible
6 5 to join using joining operation in next iteration and therefore,
Apriori algorithm terminates.
2 1
2 8 4.2 Alternate to apriori’s pruning step
In section3.1, it is observed that large k-frequent itemsets can
12 3 be generated by modifying the second step of apriori
algorithm. For this, not only k-frequent but k-infrequent
5 4 itemsets are also generated in the third step of Apriori
algorithm. Then, the output of the first step is filtered by taking
In the second iteration, following 3-frequent candidate itemsets help of all infrequent itemsets generated so far. It is obvious
and following 3-frequent potential itemsets are generated by that this modification is applicable from second iteration
first and second step respectively. onwards.
Continuing the discussion from part 3.1 of this section, in the
first step of second iteration, bold faced 3-frequent candidate
itemsets and and in the first step of third
iteration, bold faced 4-frequent candidate itemset are
useless to generate because itemset is not 2-frequent.
Similarly, are useless to
generate because , are not 2-frequent.By
eliminating
and itemsets
from 3-frequent candidate itemsets following 3-frequent
At this point, it is to be noted here that 3-frequent candidate potential itemsets are generated.
itemsets and are bold
faced. The reason for making itemsets bold faced will be
discussed in part 3.2 of this section.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 830
A Novel Pruning Approach for Association Rule Mining
Similarly, bold faced itemsets Lemma: if any itemset Z is infrequent then none of it superset
from the 4-frequent candidate itemsets are useless to generate can be frequent.
because 3-frequent itemsets are not 3- Proof: Let Y be an itemset containing all the items of set Z and
frequent. This process will result the following set as a 4- number of items in set Y is more than number of items in set Z,
frequent potential itemsets i.e., Z ⊂ Y. As if Z is infrequent, it can be stated that:-
. This method of pruning (1)
advocates an alternative to pruning step of apriori algorithm. In
It is obvious that support of itemset Y can’t be greater than
this paper, this process of eliminating some or all itemsets from
support of any of its subset in a given database because
k-frequent candidate itemsets, using infrequent itemsets
cardinality of set Y is more than cardinality of set Z, i.e.,
generated, is expressed as a “filtration” for first step of Apriori
. It can be said that:-
algorithm.
(2)
Using property of associativity from equation “(1)” and “(2)” it
Table 5: 3-Frequent Itemsets Frequencies
can be stated that:-
Potential Frequency Potential Frequency (3)
3- 3- In other words set Y can’t be frequent if it is superset of any set
Frequent Frequent Z which is infrequent.
Itemsets Itemsets Table 7: Modified Apriori Algorithm
9 6 Apriori_Filter (D, minsup, F1)
5 4 // Dis a set of Transactions, minsup is the given //minimum
support, F1is the collection of 1-//frequent itemset.
4 5 1.
//Step 1: (Joining) - is the collection of k-//frequent
8 4
candidate itemsets.
4 5 2.
3.
3 10 4.
7 3
5.
4 4 //Z is the new itemset of size k.
6.
5 6 7.
6 5 //Step 2: (Filtration) - is the collection of k-frequent
potential itemsets and is the collection of k-infrequent
5 4 itemset
8.
5
9. ;
10.
Table 6: 4-Frequent Itemsets Frequencies )
Potential 4-Frequent Frequency 11.
Itemsets 12.
13.
5
//Step 3:(Verification) - is the collection of k-frequent
5 itemset.
14.
5
15.
16.
4.3 Modified apriori algorithm 17.
A modified Apriori algorithm is proposed in Table 7. Filtration //Value of k is increased to find large frequent itemsets.
step is an alternate to the pruning step used in Apriori 18.
algorithm. Prerequisite for modified Apriori algorithm are same 19. ;
as with the Apriori algorithm.
This new pruning method is based upon following lemma.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 831
BIJIT - BVICAM’s International Journal of Information Technology
5.0 Experimental Results of minimum support is taken6%, 9%, 12%, 15%, 20%, and
Five experiments are performed on synthetic datasets generated 25%. Results of this experiment are plotted in Figure5.
as described by [2]. Each experiment is executed three times 700
for both Apriori and proposed algorithm. Average time taken Apriori
(in seconds) by both algorithm in each experiment is shown 600
Time in Seconds
Proposed
below in respect to minimum support value. Following 500
parameters are set for each experiment.
1. Number of total transactions in database are 100000, i.e., 400
, numbers of items are 100, i.e., 300
,average size of transactions is 5, i.e., , average 200
size of maximal potentially large itemsets is 2,i.e., ,
100
value of correlation level is set to 0.5, number of maximal
potentially large itemsets are 200,i.e., ,and value 0
of minimum support is changed from 4% to 10%with a 4% 5% 6% 7% 8% 9% 10%
step increment of 1%. Results of this experiment are
Support
plotted in Figure 1.
Figure 1: Apriori algorithm vs.Proposedalgorithm for
2. Number of total transactions in database are 100000,
i.e., , numbers of items are 100, i.e., ,
average size of transactions is 5, i.e., , average size
of maximal potentially large itemsets is 2, i.e., , 500
value of correlation level is set to 0.5, number of maximal Apriori
400 Proposed
potentially large itemsets are 200, i.e., , and value
of minimum support is changed from 10% to 20% with a
300
step increment of 1%. Results of this experiment are
plotted in Figure2. 200
3. Number of total transactions in database are 100000,
i.e., , numbers of items are 100, i.e., , 100
average size of transactions is 5, i.e., , average size
of maximal potentially large itemsets is 4, i.e., , 0
value of correlation level is set to 0.5, number of maximal 10%11%12%13%14%15%16%17%18%19%20%
potentially large itemsets are 200, i.e., , and value
of minimum support is changed from 10% to 20% with a
step increment of 1%. Results of this experiment are Figure 2: Apriori algorithm vs. Proposed algorithm for
plotted in Figure3.
4. Number of total transactions in database are 100000,
i.e., , numbers of items are 100, i.e., , 360
average size of transactions is 5, i.e., , average size 320 Apriori
of maximal potentially large itemsets is 4, i.e., , 280
Proposed
value of correlation level is set to 0.5, number of maximal 240
potentially large itemsets are 200, i.e., , and value 200
plotted in Figure4. 80
average size of transactions is 5, i.e., , average size 10% 11% 12% 13% 14% 15% 16% 17% 18% 19% 20%
of maximal potentially large itemsets is 6, i.e., , Figure 3 Apriori algorithm vs. Proposed algorithm for
value of correlation level is set to 0.5, number of maximal
potentially large itemsets are 200, i.e., , and value
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 832
A Novel Pruning Approach for Association Rule Mining
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 833
BIJIT - BVICAM’s International Journal of Information Technology
principle of data mining and knowledge discovery [27]. V. Sharma, M. M. S. Beg.,“A Probabilistic Approach to
(PKDD’00), Lyon, France, pp. 13–23, 2000. AprioriAlgorithm”,International Journal of Granular
[15]. Ji X, Bailey J, Dong G.,“Mining minimal distinguishing Computing, Rough Sets and Intelligent Systems
subsequence patterns with gap constraints”. In (IJGCRSIS), Inderscience Publishers, ISSN (Online):
Proceeding of the international conference on data 1757-2711 - ISSN (Print): 1757-2703, vol. 2, no. 3,
mining (ICDM’05), Houston, TX, pp. 194–201, 2005. 2012, pp. 225-243, 2012.
[16]. M. M. S. Beg, C. P. Ravi Kumar,“Application of [28]. V. Sharma, M. M. S. Beg,“A Probabilistic Approach to
Parallel and Distributed Data Mining in e-Commerce”, Apriori Algorithm”, IEEE International Conference on
J.IETE Technical Review special issue on e-Commerce, Granular Computing (GrC 2010), Silicon Valley, USA,
vol. 17, no. 4, pp. 189-195, 2000. August 14-16, IEEE Computer Society Press, pp. 402-
[17]. Mannila H, Toivonen H, VerkamoAI.,“Efficient 408, 2010.
algorithms for discovering association rules”. In: [29]. Yan X, Zhou XJ, Han J.,“Mining closed relational
Proceeding of the AAAI’94 workshop knowledge graphs with connectivity constraints”, In Proceeding of
discovery in databases (KDD’94), Seattle,WA, pp. 181– the ACM SIGKDD international conference on
192, 1994. knowledge discovery in databases (KDD’05), Chicago,
[18]. Miller RJ, Yang Y.,“Association rules over interval IL, pp. 324–333, 2005.
data”,InProceeding of the ACMSIGMOD international [30]. Yan X, Zhu F, Han J, Yu PS., “Searching substructures
conference on management of data with superimposed distance”, In Proceeding of the
(SIGMOD’97),Tucson, AZ, pp. 452–461, 1997. international conference on data engineering
[19]. Mueller A., “Fast sequential and parallel algorithms for (ICDE’06), Atlanta, 2006.
association rule mining: A comparison”,Technical CS-
TR-3515, University of Maryland, College Park, August
1995, pp. 1-5, 1995.
[20]. N. Gangal, M. M. S. Beg, “Finding the Interesting
Rules” First.Proc. International Conference on Data
Mining (DMIN'08) - a track at the 2008 World Congress
in Computer Science, Computer Engineering and
Applied Computing (WORLDCOMP’08), Las Vegas,
USA, July 14-17, 2008, pp. 689-694, 2008.
[21]. Park J S, Chen M S, Yu P S.,“An effective hash-based
algorithm for mining association rules”, In Proceeding
of the ACM-SIGMOD international conference on
management of data (SIGMOD’95), San Jose, CA, pp.
175–186, 1995.
[22]. Piatetsky-Shapiro G.,“Notes ofAAAI’91 workshop
knowledge discovery in databases (KDD’91)”,
AAAI/MIT Press, Anaheim, CA, 1991.
[23]. Savasere A, Omiecinski E, Navathe S.,“An efficient
algorithm for mining association rules in large
databases”, In Proceeding of the 1995 international
conference on very large data bases (VLDB’95), Zurich,
Switzerland, pp. 432–443, 1995.
[24]. Srikant R, Agrawal R.,“Mining sequential patterns:
generalizations and performance improvements”,In:
Proceeding of the 5th international conference on
extending database technology (EDBT’96), Avignon,
France, pp. 3–17, 1996.
[25]. Srikant R, Agrawal R.,“Mining generalized association
rules”, In Proceeding of the international conference on
very large data bases (VLDB’95), Zurich, Switzerland,
pp. 407–419, 1995.
[26]. Toivonen H.,“Sampling large databases for association
rules”, In Proceeding of the international conference on
very large data bases (VLDB’96), Bombay, India, pp.
134–145, 1996.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 834
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 835
BIJIT - BVICAM’s International Journal of Information Technology
provides good control over the transition bandwidth; however, 3.0 PROBLEM FORMULATION
the approximation error is zero exactly at the sampling The frequency response of a linear-phase FIR filter is given
frequencies. by:
Recently, the design methods based on optimization N
conclusion and future scope are discussed in Section 7. In practice, the discretized version of integral scalar error used
in L 2 norm is approximated by a finite sum given by:
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 836
Design of Linear-Phase Digital FIR Filter Using Differential Evolution Optimization with an Improved Ripple Constraint
Handling Method
1 2
between two randomly selected distinct population vectors,
( ) K
2
Xi = G (18)
FIR digital filter, hence a single difference of vectors is
G +1 i
X , otherwise .
utilized. In DE/best/1/bin, a mutant vector V i is generated for The process of mutation, crossover and selection is executed
G
each target vector X by adding a weighted difference
i for all target vector index i and new population is created till
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 837
BIJIT - BVICAM’s International Journal of Information Technology
the optimal solution is achieved. The procedure is terminated if problem into an unconstrained one as shown by Lampinen [3].
maximum number of generations has been executed. This is seen from Equation (20) where, objective
function J 2 ( X ) is used instead of L2 ( X ) .
4.2 Bounce Back Technique for Handling Bounds on In this subsection an improved version of constraint handling
Parameters of Mutant Vector: method used by Lampinen [3] is described. It allows to get rid
In the process of generating mutant vector, some of the of setting of the weight parameters for individual constraints.
components of this vector may cross the lower or upper In this method, only the selection operation of the basic
bounds. In such cases bounce back mechanism [17] is adopted Differential Evolution algorithm is modified, for handling the
to bring such elements of the mutant vector within limit. In this ripple constraints. The selection criteria of Equation (18) to
method the element, which has violated the limits, is replaced G +1 G
select either trial vector T i or, target vector X i for the next
by a new element whose value lies within the best vector value G +1
and the bound being violated. The following relations are used generation vector X i is changed as follows:
for violated mutant vector elements: • If both solution vectors satisfy all ripple constraints,
G +1
x + rand ⋅ ( x Lj − x best , j ), if v ijG +1 ≤ x Lj (19) then the one with lower objective function value is
v = best , j
x best , j + rand ⋅ ( x j − x best , j ),
if v ijG +1 > x Uj selected, OR,
ij U
J 2 ( X ) = cL L2 ( X ) + c pδ p ( X ) + csδ s ( X ), (20) 5.1 Specifications of The Digital Low Pass FIR Filter
with cL + c p + cs = 1. Designed:
Type-I linear phase FIR filter is designed with the filter length
Where, cL , c p and cs are suitable weight parameters for L2 ( X ) , taken as N+1 = 31, and the grid of digital angular frequencies
δ p ( X ) and δ s ( X ) respectively. δ p ( X ) and δ s ( X ) are the as K = 180. The cut-off frequency of the pass band is ω p =
0.3π and cut-off frequency of the stop band is ω s = 0.4π. The
maximum pass band and stop band ripples given as follows:
desired ideal frequency response D(ω) has unity gain in the
δ ( X ) = max 1 − A(ω ) (21)
p
ωi∈Passband
i pass band and zero gain in the stop band and is given by:
(22) 1, 0 ≤ ω ≤ 0.3π (23)
δs (X ) = max [ A(ωi )] D(ω ) =
ωi∈Stopband
0, 0.4π ≤ ω ≤ π
Where, A(ωi ) is the magnitude of the frequency response For passband attenuation δ p = 0.06 and stopband attenuation δ s
of the filter, defined earlier in (3), for the suitable set of = 0.06, the weighting function W (ω ) used, is given by:
frequencies ωi . (δ / δ p ) = 1, in the passband (24)
W (ω ) = s
4.3.2 Method # 2: Method Based on Modified Selection 1, in the stopband
Rule of DE:
The penalty function method uses additional control 5.2 Design Parameters of Differential Evolution Algorithm
parameters, which are termed as the weight parameters. Setting with Ripple Constraint for Method # 1:
For applying DE with ripple constraint for obtaining the
the weight (or, penalty) parameters for getting their appropriate
values by trial and error method, is a laborious task. The coefficients of the filter, a (k ) ; the size of each solution
penalty function method effectively converts a constrained vector, X , is taken as D = M + 1 = 16. The scaling factor F
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 838
Design of Linear-Phase Digital FIR Filter Using Differential Evolution Optimization with an Improved Ripple Constraint
Handling Method
and crossover constant CR used are taken as, F = 0.5 and CR = however, the value of standard deviation obtained for Method
0.7. The population size is taken as NP = 50. The numbers of # 2 is larger.
generations used are 200. The weight parameters cL , c p and Table 2: Frequency-Domain Parameters
cs used in the objective function of (20) are arbitrarily set as
DE with ripple constraint DE with ripple
0.0006, 0.2894 and 0.71respectively so as to reject larger Parameter Method # 1 constraint Method# 2
values of objective function for larger size of ripples. It is
observed that the amplitudes of the ripples are larger in the
stop band, so more weight is assigned to cs as compared to c p . Pass Stop Stop
Pass Band
Band Band Band
Lower Band
5.3 Design Parameters of Differential Evolution Algorithm 0.0000 0.4000 π 0.0000 0.400 π
Edge
with Ripple Constraint for Method # 2:
There is no specific parameter used for ripple constraint
Upper Band
handling Method # 2. All other parameters of DE algorithm are 0.3500 π 1.0000 π 0.3500 π 1.000 π
Edge
kept same as mentioned in the subsection 5.2.
Desired
6.0 SIMULATION RESULTS AND ANALYSIS 1.0000 0.0000 1.0000 0.0000
Value: D(ω)
The summary of the parameters obtained for the best of 30
runs, for Type-I FIR low pass filter (LPF) design, using DE Maximum
0.0243 0.0231 0.0229 0.0226
with ripple constraint Method # 1 and Method # 2, is shown in ripple
the TABLE-1 and TABLE-2 for the time-domain and the Maximum
frequency domain respectively. In TABLE-3, the statistical 0.2087 − 32.70 0.1972 − 32.88
ripple (dB)
parameters obtained for the two cases are compared.
In Fig. 1, the error plots for the best run of the two cases are Minimum
0.0010 0.0057 0.0010 0.0022
ripple
shown. The frequency responses obtained for the filter design
using DE with ripple constraint methods are compared in Fig. Minimum
0.0094 − 44.78 0.0091 − 52.81
2. It is observed from Fig. 1, that the absolute value of error ripple (dB)
obtained for Method # 2 is lower than that obtained for Method
# 1. This fact is also exhibited in TABLE-3.
By comparing the frequency responses in Fig. 2, it is observed Table 3: Statistical Parameters of DE With Ripple
that ripple constraint handling Method # 2 shows a better Constraint Method # 1 And
frequency response as compared to Method # 1. It is also obse- Method # 2 for the Low Pass Filter
(Number of runs = 30; Number of generations = 200;
Population Size = 50.)
Table 1: Time-Domain Parameters Sr. Parameters DE with DE with
No. ripple ripple
DE with ripple constraint DE with ripple Constraint constraint constrai
Method # 1 Method # 2 Method # 1 nt
Impulse response h(n) Impulse response h(n) Method
#2
h(0) = − 0.0033 = h(30) h(0) = − 0.0058 = h(30)
h(1) = 0.0081 = h(29) h(1) = 0.0025 = h(29) 1 Best fitness value of error of all 0.2711 0.1552
h(2) = 0.0170 = h(28) h(2) = 0.0104 = h(28) runs
h(3) = 0.0090 = h(27) h(3) = 0.0071 = h(27)
2 Average value of minimum error 0.4599 0.3174
h(4) = − 0.0080 = h(26) h(4) = − 0.0051 = h(26) of all runs
h(5) = − 0.0226 = h(25) h(5) = − 0.0201 = h(25)
h(6) = − 0.0104 = h(24) h(6) = − 0.0136 = h(24) 3 Worst minimum value of all 0.9015 0.7021
h(7) = 0.0229 = h(23) h(7) = 0.0154 = h(23) runs
h(8) = 0.0356 = h(22) h(8) = 0.0367 = h(22) 4 Standard deviation of minimum 0.1389 0.1440
h(9) = 0.0120 = h(21) h(9) = 0.0195 = h(21) error from average
h(10) = − 0.0412 = h(20) h(10) = − 0.0385 = h(20)
h(11) = − 0.0708 = h(19) h(11) = − 0.0717 = h(19) 5 Frequency of convergence* 0.5000 0.6000
h(12) = − 0.0167 = h(18) h(12) = − 0.0195 = h(18) *(Frequency of convergence = number of better fitness values than
h(13) = 0.1316 = h(17) h(13) = 0.1250 = h(17) mean out of all runs / total no. of runs)
h(14) = 0.2804 = h(16) h(14) = 0.2839 = h(16)
h(15) = 0.3493 h(15) = 0.3535
-rved that the stop band attenuation is decreased further with
the increase in frequencies in the case of Method # 2. Finally,
from the TABLE-3 it is observed that the frequency of
convergence of Method # 2 is higher than that of Method # 1;
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 839
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 840
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
A Novel Model for Security and Data Access for Jointly Accessing the Cloud Service
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 841
BIJIT - BVICAM’s International Journal of Information Technology
2.1 Examples of Cloud Service Providers choose your password unhackable. Unhackable password is
There are many features of cloud computing. Cloud storage combination of Alpha-numeric characters, special symbols and
providers like Amazon S3, Microsoft SkyDrive, and DropBox difficult to imagine by intruder too. It is also known as one
permit consumers to access data online. Second feature is, it factor authentication.
provides computation resources for users such as amazon EC2.
Third, Google apps or versioning repositories for source code 3.2 Two Factor Authentication
are examples of online collaboration tools. Username and passwords are not enough to secure your online
Cloud service providers should ensure the security of their data. Two factor authentications must have feature for any
customer’s data and should be responsible if any security risk successful and popular service to protect it against password
affects their customers’ service infrastructure. [5]Cloud phishing, hacking and account hijacking. [3] There are several
providers must ensure that the information Security Systems solutions i.e. One Time Password (OTP), Authenticator app,
they provide are responsive to customer requirements and the SMS and email codes, Security questions, Device recognition
data, both primary and secondary, must be preserved as etc. which are not costly and secure enough too.
authentic and reliable [11].
• Several vendors with cloud offerings stand to benefit from 3.3 Biometrics Verification
this trend. Many of these vendors – Amazon, IBM, Biometric Verification enables identification based on “who
Microsoft etc. have established cloud products and have you are”. Every person has distinguishing and measurable
been active in this space for number of years. physical traits. Personal recognition based on unique physical
attributes forms a powerful tool for identity management. Other
ways of verifying authorization include “what you have” (a
key, a swipe card) and “what you know” (a password, your
mother’s maiden name).Biometrics is the only mode of
authentication that uses “who you are” for verification. [4]
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 842
A Novel Model for Security and Data Access for Jointly Accessing the Cloud Service
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 843
BIJIT - BVICAM’s International Journal of Information Technology
6.0 ACKNOWLEDGEMENT
We would like to thank Mr. Raghu Khimani – Cyber Crime
Expert - for their valuable suggestions.
7.0 REFERENCES
[1]. http://www.nist.gov/itl/cloud/ US: Department of
Commerce.: viewed on 14-November-2014
[2]. http://searchcloudprovider.techtarget.com/definition/clo
ud-services/:viewed on 15- November-2014
[3]. http://www.secureauth.com/blog/cloud-storage-2-factor-
authentication-review/:viewed on 10-December-2014
[4]. “Benefits of Methode Biometric Verification
Technology” Article of “Methode Electronics,
Inc.”http://www.methode.com/Documents/TechnicalLib
rary/Methode_Biometrics_-_Benefits_&_FAQs.pdf
viewed on:18-November-2014
[5]. A Mohammed, P Eric, S Ben, T Hanes, “Cloud
computing security: From single to Multi – Clouds”,
2012 45th Hawaii International Conference on System
sciences, pp.5490-5499, 2012
[6]. S Hemalatha, R Manickachezian, “Present and Future of
cloud computing: A collaborated survey report”, IJITEE,
Vol 1, Issue 2, pp. 216-223, July 2012
[7]. H Ashema , “Study of Impact of Mobile Ad – hoc
networking and its future Applications”, BIJIT –
BVICAM’s International Journal of Information
Technology , Vol 4, Issue 7, pp. 439- 444, January –
June 2011
[8]. R Vaibhav, “Innovative Use of cloud computing in
Smart Phone Technology”, BIJIT – BVICAM’s
International Journal of Information Technology, Vol 5
No 2, pp. 640-648
[9]. S Sirsendu , K Sunil, “Applications of Public Key
Watermarking for Authentication of Job-Card in
MGNREGA”, BIJIT – BVICAM’s International Journal
of Information Technology, Vol 4 No 1, pp. 435 – 438 ,
January – June 2012
[10]. S Dilbag, S Ajit , “ An Effective Technique for Data
Security in Modern Cryptosystem” , BIJIT – BVICAM’s
International Journal of Information Technology, Vol 2
No 1, pp. 189- 194, January – June 2010
[11]. D Meenu, D Mikku, Y.S.Shishodia, “Cloud Computing
and Knowledge Management as a Service: A
Collaborative Approch to Harness and Manage the
Plethora of Knowledge”, BIJIT – BVICAM’s
International Journal of Information Technology, Vol 5
No2, pp. 619-622, July – December 2013.
[12]. http://www.pcadvisor.co.uk/features/internet/3506734/b
est-cloud-storage-dropbox-google-drive-onedrive-
icloud/: visited on 15/02/2015
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 844
BIJIT - BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 845
BIJIT - BVICAM’s International Journal of Information Technology
intelligence which defines it as the capability to reason with, intelligence which helps us solve the problems of life
and concerning emotions. For them, emotional intelligence significance and value the concept of our action and life. The
combines feelings with thinking, and thinking with feeling. theory of positive disintegration having relevance to spiritual
Goleman5 described the five main components of emotional intelligence illustrated it as the one’s capability to discard the
intelligence as self-awareness, self-regulation, empathy, social normal ways of thinking and behaving for want of compassion,
skills and motivation that further assented that “a learned integrity and altruism, however the theory on self-actualization
capability based on emotional intelligence those results in emphasized the values such as justice, truth & beauty,
outstanding performance at work. Our emotional intelligence wholeness, and uniqueness. On the similar lines the humanist
determines our potential for learning the practical skills based psychology emphasized the central point of the individual’s
on the five elements: self-awareness, motivation, self- instinctive drive to be a better person through values of
regulation, empathy, and adeptness in relationships. Mayer and openness, caring, and the desire for entirety of life, body, mind
Salovey[4] coined the theory of emotional intelligence which and spirit. The theory of flow i.e. when a person’s entire being
defines emotional intelligence as the capability to reason with, is stretched in full functioning of body and mind all doings of
and concerning emotions. For them, emotional intelligence the individual become worth doing for its own sake
combines feelings with thinking, and thinking with feeling. (Dabrowski’s[9];Maslow[10];Rogers[11];and Csíkszentmihályi
Accordingly emotional intelligence is the ability to perceive [12]). The researches carried out in recent years have fostered
emotions, to access and generate emotions so as to assist increasing awareness to the study of spiritual intelligence and
thought, to understand emotions and emotional knowledge, and its application in various fields specially in working places.
to reflectively regulate emotions so as to promote emotional King [13] is defined spiritual intelligence such as:” Spiritual
and intellectual growth. intelligence is as a set of intellectual capacity that contributes to
The mix model by Goleman [6] of emotional intelligence is the integration and knowledge and adaptive application of
most widely used and accepted by people. It occupies a variety spiritual and supernatural aspects of personal existence and
of competencies which are divided in two different skills sets. lead to critical existential thinking, increased meaning, identify
Figure-2 summarized Goleman’s model. of superior universe and dominated of spiritual. In this study
four dimensions as explained in Figure-3 have been used to
Self awareness Self management measure spiritual intelligence.
Critical Existential Refers to the ability to critically
Emotional self Self control, Trustworthiness, Thinking think about the reality of
awareness, Accurate Conscientiousness, Adaptability, (CET) existence, being, universe, time,
self assessment, Self Achievement orientation, death, and other beyond
confidence Initiative normal and existential issues.
Personal Meaning It is the ability to create personal
Social awareness Social skill Production purpose and the goal existed in
(PMP) all mental and physical
Empathy, Developing others, experiments, including the ability
Organizational Communication, Change catalyst, to create and to dominate over
awareness, Service Influence, Leadership, Building the goal of life
orientation bonds, Teamwork Transcendental TA is the ability to understand
Figure 2: Goleman’s Emotional Intelligence competencies Awareness transcendental aspects in
Source: Goleman (2010) (TA) ourselves, others and the physical
world, when you are alert and
Spiritual intelligence means recognizing the work life principle awake.
and the seasons of life and may be termed as the expression of Conscious State Refers the ability to enter into
innate spiritual qualities through ones thoughts, actions and Expansion the levels and states of
attitude which expands ones capacity to understand others at spirituality and beyond
(CSE)
the deepest level. Spiritual understanding allows distinguishing consciousness and also coming
both the 'true cause' of behavior without judgment, and serve out of it when you intend.
the 'true needs' of others until they themselves learn to meet
their own needs. This capacity is developed by first learning to Figure 3: Dimensions of Spiritual Intelligence
free you from attachment and neediness and being able to meet Source: King (2008)
our own inner needs. The word spirituality has its roots in spirit 2.0 RELATED STUDIES
which means “nature of mind or outlook”, “a mental The relationships of biographical information with emotional
disposition characterized by firmness or forcefulness” Covey7. intelligence in two opposite professions of social work and
Zohar and Marshal8 define spiritual intelligence as the software was examined by Singh14 which revealed that there is
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 846
Predictive Estimates of Employees’ Intelligence at Workplace with Special Reference to Emotional and Spiritual Intelligence
no significant difference in emotional intelligence of social Sarlak [26]; Modassir & Singh [27]; Chin, Anantharaman, &
work and software professionals. The study by Naghari & Tong [28]; Yunus[29]; Salarzehi, et al. [30]; and Yoghoubi et
Radzum [15] examined that boys are less emotional intelligent al. [31] (as cited in Yadav and Punia [32]) highlighted that the
in comparison to girls and also emphasis that high emotional five aspects of emotional intelligence had significant positive
intelligence in boys enhance their achievement. The research impact on employees’ organizational citizenship behaviour.
by Akintayo [16] found that managerial effectiveness was Emotional intelligence was significantly correlated with
appreciably predicted by emotional intelligence. Emotional conscientiousness, civic virtue and altruism and also mentioned
intelligence has been found linked with job performance and that emotional intelligence of leader enhance followers’
also individuals’ high emotional intelligence reported a more organizational citizenship behaviour. Results also showed that
positive experience. However the relationship of employees’ level of emotional intelligence varies from industries to
perceptions of supervisor’s emotional intelligence with a industries because of their unique characteristics of individuals.
number of important organizational outcomes pointed out those Gender plays a significant role in emotional intelligence and
organizations in the UAE which might be benefited by organizational citizenship behaviour of supervisors and their
developing emotional intelligence skills in their leaders (Gupta subordinates and three dimensions of emotional intelligence i.e.
[17]; Whiteoak and Rana [18]). The study by Vakola, et al. [19] self control, self motivation and empathy have major effect on
explored that the “big five” dimensions of personality in organizational citizenship behaviour.
association with emotional intelligence can smooth the Gardner [33] acknowledged that there was some neurological
progress of organizational change at an individual level. The evidence for “spirituality” in patients with temporal lobe
study by Singh, Punia and Kumar [20] conducted on epilepsy as far as spiritual intelligence is concerned and they
supervisory personnel proposed the cultivation of an emotional tend to become contemplative and develop and increasingly
quotient and the desired organizational climate to enhance the tending toward the study of philosophy and religion and the
employees' mental health vis-à-vis the organizational persistent evaluation of deep questions. However Persinger34
effectiveness. The findings of the study highlighted that some and Ramachandran et al. [35] established a relationship
of the dimensions of organizational climate (performance between heightened temporal lobe activity and the spirituality
standards, reward system, decision-making process etc.) and wherein the ideas on spirituality were apparent in different
emotional competency (adequate depth of feeling, belief systems of ancient civilizations, religions, and the
encouragement of positive emotions etc.) have meaningful indigenous cultures. This entire phenomenon led to exhibit the
relationships with the anxiety level of the personnel. Khatri and connectedness or the belief that everything is part of one
Duggal [21] investigated the role of transformational leadership cosmic whole which is also acknowledged by contemporary
and explored that the factors like its effectiveness, society of the inherent wisdom and spirituality of indigenous
innovativeness & quality improvement and the transactional people within the Australian Aboriginal communities. The
leadership have direct linage with each other through the connection of the society to the land and values that place
relationship was not very strong. The result further indicated collective needs above those of the individual was apparent and
that for maximum satisfaction and performance from for many indigenous cultures, adolescence is a significant time
employees, the leader must exhibit charisma and intellectually in the spiritual life cycle and rites of channel guide people in
strong motivation. Anari [22] investigated the inter-relationship the journey from childhood to adulthood (Kerr & Mcalister
of emotional intelligence, job satisfaction, and organizational [36]). Doostar et al. [37]; Sara Piroozfar [38]; Chen & Yang
commitment, among high-school English teachers. The role of [39]; and Rastgar, et al. [40] (as cited in Yadav and Punia [32])
gender and age in emotional intelligence, the study went in highlighted spirituality as a predictor of organizational
support of gender differences, with females reporting higher citizenship behaviour and showed that there are significant
emotional intelligence same as a resulted by Punia [23] who differences between different levels of workplace spatiality and
glimpsed that women have more emotional intelligence due to organizational citizenship behaviour. Values, attitudes, and
their high score on the dimensions of emotional intelligence, on behaviors of leaders have positive effects on spirituality of the
the other hand in relation to their age Punia [23] reveals a employees and relationship among workplace spirituality,
parabolic trend with emotional intelligence whereas Anari22 organizational citizenship behaviour and job performance of
results revealed no differences among the participants employees was positive and workplace spirituality had a
according to their age. Emotional intelligence is also related to significant positive influence. The studies as reviewed above
other important work outcomes namely family-work conflict, specify that emotional and spiritual intelligence is not only an
goal conflict, frustration and readiness to create and innovate. important predictor of employees’ success but also
Significant differences with regard to the perception of organizational success. The relationship and prediction of
emotional intelligence, conflict, readiness to create and employees’ emotional and spiritual intelligence is also a
innovate have been established across the background of significant factor for job performances. Hence keeping this and
participants discovered employee’s with higher levels of the added significance of emotional and spiritual intelligence in
emotional intelligence reported to lower levels of conflict and view, the current research has been carried.
higher levels of readiness to create and innovate (Hess &
Bacigalupo [24]; Suliman & Al-Shaikh [25]). Sahafi, Danaee &
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 847
BIJIT - BVICAM’s International Journal of Information Technology
3.0 OBJECTIVES AND METHODOLOGY only emotional intelligence, can explain 51.6 % of it. That
The present study aims to predict the employees’ emotional means other 48.4 % part of spiritual intelligence can be
and spiritual intelligence and also find out the relationship explained/predicted by some other factors but approximately
between these two intelligences. The incidental objectives half of spiritual intelligence predicted by only emotional
which contributed to the prime objective have been given as intelligence. The value of f- ratio is 38.35 and significant value
under: is 0.000* which is significant at 5 % level of significance that
1. To study the relationship between employees’ emotional means our regression model result is significantly better
and spiritual intelligence vis-à-vis their dimensions. predictor of spiritual intelligence.
2. To explore the predictive estimates of emotional and The Table-3 depicts the results of regression analysis with
spiritual intelligence of employees’ while taking them spiritual intelligence as independent variable and the emotional
dependent and independent variables on reversal basis. intelligence as the dependent variable.
This research is based on sample size of 149 employees which It can be seen from the Table-3 wherein emotional intelligence
encompass 90 male and 59 female respondents from different is taken as a dependent variable and spiritual intelligence as
organizations. The present study is based on primary data independent variable, results of regression analysis revealed
collected through well-structured research instruments that that spiritual intelligence dimensions predict 80% (R square =
measures the related variables of emotional and spiritual 0.0800) of the emotional intelligence. There might be many
intelligence. The scale designed by Goleman1 has been used to factors that can explain emotional intelligence of the employees
examine the emotional intelligence of employees which consist but as per the present study only spiritual intelligence, can
of 32 statements and represent its four different dimensions. explain up to 80.0 % of it. It denotes that means 80.00 % part
The inventory on spiritual intelligence developed by King13 has of emotional intelligence can be explained/predicted by one’s
been used which consist of 24 statements representing four spiritual intelligence only and rest of the 20 percent emotional
different dimensions. The collected data was analyzed using intelligence is predicted by other factors. The value of f- ratio is
relevant statistical techniques like mean score, standard 144.32 and significant value is again 0.000* which is also
deviations (SD) and Pearson’s correlation coefficients (r) and significant at 5 % level of significance. In short, the results
regression analysis as per the requirements of the study. pointed that 80 % of emotional intelligence of employees is
explained by spiritual intelligence. While giving a summative
4.0 RESULTS AND DISCUSSION note it can be viewed that if an individual is spiritually
Objective-1: To study the relationship between employees’ intelligent his chances of being emotionally intelligent are 80
emotional and spiritual intelligence vis-à-vis their dimensions. percent. However one’s being emotionally intelligent his
To study the relationship between employees’ emotional and spiritual intelligence can be only approximately 50 percent
spiritual intelligence, correlation analysis has done and the (51.6%). Therefore, spiritual intelligence carries more weight
results have been shown as per the Table-1. As shown in Table- as compared to emotional intelligence.
1, out of four dimensions of spiritual intelligence only one When we compare the findings of the present study with
dimension i.e. Critical Existential Thinking (CET) was not previous studies of the nature some similar and interesting
found correlated with self-awareness dimension of emotional findings have emerged. The result of present study showed
intelligence. However all the dimensions of spiritual that emotional and spiritual intelligence were highly correlated
intelligence except the one mentioned above have been found which replicate the findings of pervious researches of Kaur et
positively correlated with the all dimension of emotional al. [41], Koohbanani et al. [42], King et al. [43], and Harmer
intelligence. It signifies that both these intelligences are [44] who also found the positive and significant relationship
significantly and positively correlated to each other. between emotional and spiritual intelligence. The employees
Objective-2: To explore the predictive estimates of emotional having the knowledge of their divine, inner sense, critical
and spiritual intelligence of employees’ while taking them thinking about the reality, time and death, creating goal in
dependent and independent variables on reversal basis. mental and physical experiments, ability to enter and exist in
To estimate the effect of one’s spiritual intelligence on consciousness i.e. awareness of something and responding to
emotional intelligence and vice-a-versa regression analysis has one’s surroundings and construct a life purpose is possible only
been done while taking the two intelligences dependent and when he knows about himself or herself, about his emotions or
independent variables alternatively and the results of the same other’s emotions and feelings. All emotions are important on
have been shown as per Tables-2&3. The Table-2 depicts the the job, not just fear or worry. The answer is that emotions
results of regression analysis wherein emotional intelligence express information which you need to be effective in your
has been taken as independent variable and the spiritual work. Another major finding of present study is about
intelligence as the dependent variable. predictive estimates of emotional and spiritual intelligence of
It can be witnessed from the Table-2 that the value of R square employees’ which is in consonance with the finding by David
is 0.516, which denotes that four dimensions of emotional [45] who also found that emotional intelligence is not only the
intelligence can predict 51.6 % of the spiritual intelligence. individual predictor of workplace success also spirituality that
There might be many factors that can explain spiritual means knowing the things other than emotional awareness is
intelligence of the employees but our model, which includes also important.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 848
Predictive Estimates of Employees’ Intelligence at Workplace with Special Reference to Emotional and Spiritual Intelligence
7. Covey, S. R. (2009). The Leader in me: How Schools 20. Singh, S., Punia, B. K. and Kumar, R. (2006).
and Parents around the World are Inspiringgreantness, “Emotional Competence and Organisational Climate
one Child at a time, New York, NY: Frankline covey in Relation to Anxiety among the Supervisory
Co. Personnel: An Inter-Correlational Analysis,” The IUP
Journal of Organisational Behaviour, V (3), 74-83.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 849
BIJIT - BVICAM’s International Journal of Information Technology
21. Khatri, P. & Duggal, S. (2012) “A Test of Intelligence (EI)”, Modern Applied Science, 5(2), 119-
Transactional and Transformational Leadership 123.
Behaviour of Salesman on Customer Relationship
Marketing Behaviour: A Study of the Indian Banking 32. Yadav, P. & Punia, B.K. (2012). “Organisational
Sector”, BIJIT-BVICAM’s International Journal of Citizenship Behavior: A Review of Antecedent,
Information Technology, 4(1), 427-434. Correlates, Outcomes and Future Research
22. Anari, N. N. (2012). “Teachers: Emotional Directions”, International Journal of Human
Intelligence, Job Satisfaction, and Organisational Potential Development, 2(2), 01-19.
Commitment”, Journal of Workplace Learning, 24(4), 33. Gardner, H., (1983). Frames of Mind, New York:
256-269. Basic Books.
23. Punia, B. K., (2005). “Impact of Demographic 34. Persinger, M. A. (1996). “Feelings of past lives as
Variables on Emotional Intelligence and Leadership Expected Perturbations within the Neurocognitive
Behaviour of Corporate Executives”, The IUP Journal Processes that Generate the Sense of Self:
of Organisational Behaviour, IV(2), 7-22. Contributions from limbic lability and Vectorial
24. Habibollah, S., Yaghoubi, N. M., Naroei, M. and Sin, Hemisphericity”. Perceptual and Motor Skills, 83(3),
L. G. (2011). “A Survey of Relationship between 1107-1121.
Emotional Intelligence and Organisational 35. Ramachandran, V. S. and Blakeslee, S. (1998).
Citizenship Behaviour in Iran”, International Business Phantoms in the Brain, New York: William Morrow,
and Management, 3(1), 130-135. pp. 1-328.
25. Suliman, A.M. and Al-Shaikh, F. (2007). “Emotional 36. Kerr, B. and McAlister, J. (2002). Letters to the
Intelligence at Work: Links to Conflict and Medicine Man: An Apprenticeship in Spiritual
Innovation”, Employee Relations, 29(2), 208-220. Intelligence, Cresskill, NJ: Hampton Press.
26. Sahafi, E., Danaee, H. and Sarlak, M. A. (2011), “The 37. Doostar, M., Chegini, M. G. and Pourabbasi, S.
Impact of Emotional Intelligence on Citizenship (2012). “Survey of Relationship between Spiritual
Behaviour of Physicians (With Emphasis on Infertility Intelligence and Organisational Citizenship
Specialists)”, Journal of Family and Reproductive Behaviour”, Interdisciplinary Journal Of
Health, 5(4), 109-115. Contemporary Research In Business, 3(1)1, 54-61.
27. Modassir, A. and Singh, T. (2008). “Relationship of 38. Piroozfar, S. (2013). “The Influence Spirituality in
Emotional Intelligence with Transformational Workplace on Employee’s Organisational
Leadership and Organisational Citizenship Citizenship Behaviour”, Trends in Social Science, 6
Behaviour”, International Journal of Leadership (1), 26-29.
Studies, 4(1), 3-21.
39. Chen, C. and Yang, C. (2012). “The Impact of
28. Chin, S., Anantharaman, R. N., and Tong, D. (2011). Spiritual Leadership on Organisational Citizenship
“Emotional Intelligence and Organisational Behaviour: A Multi-Sample Analysis”, Journal of
Citizenship Behaviour of Manufacturing Sector Business Ethics, 105(1), 107-114.
Employees: An Analysis”, Management, 6(2), 107-
125. 40. Rastgar, A., Zarei, A., Davoudi, S.M. and Fartash, K.
(2012). “The Link between Workplace Spirituality,
29. Yunus, Noorlaila, H. (2010). “The Influence of Organisational Citizenship Behaviour and Job
Supervisors’ Emotional Intelligence on Non Bank Performance in Iran”, A Journal of Economics and
Supervisory Employees’ Organisational Citizenship Management, 1(6), 51-67.
Behaviour”, Paper Presented in International
Conference (CSSR) on 5-7 December. 2010, 663-667. 41. Kaur, H., Singh, V. and Singh, P. (2012). “Emotional
Intelligence: Significance of Psychology and
30. Salarzehi et al., (2011). “A Survey of Relationship Between Spirituality”. Pakistan Journal of Social and Clinical
Emotional intelligence and Organizational Citizenship Psychology, 9(2), 32-36.
Behavior in Iran”, International Business and Management,
3(1),130-135. 42. Koohbanani, S. E., Dastjerdi, R., Vahidi, T. and Far,
M., H., G. (2013). “The Relationship Between
31. Yaghoubi, E., Mashinchi, S. A. and Hadi, A. (2011). Spiritual Intelligence and Emotional Intelligence with
“An Analysis of Correlation between Organisational Life Satisfaction Among Birjand Gifted Female High
Citizenship Behaviour (OCB) and Emotional School Students ”. Procedia - Social and Behavioral
Sciences 84(2013), 314-320.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 850
Predictive Estimates of Employees’ Intelligence at Workplace with Special Reference to Emotional and Spiritual Intelligence
43. King, D., Mara, C. A. and Decicco, T., L. (2012). What’s the relationship?” Paper presented at the 7th
“Connecting the Spiritual and Emotional Industrial and Organisational Psychology Conference
Intelligences: Confirming an Intelligence Criterion (IOP) of the APS/1st Asia Pacific Congress on Work
and Assessing the Role of Empathy”. International and Organisational Psychology (APCWOP), 2007.
Journal of Transpersonal Studies, 3(1), 1
45. David, A. (1999). "A Proper Mentality for
44. Harmer, R. (2007). “Organisational Citizenship Benchmarking," Public Administration Review, 59 (2),
Behaviour, Emotional Intelligence and Spirituality: 105-109.
Figure 1: The Concept of Emotional Intelligence Source: Salovey & Mayer (1990)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 851
BIJIT - BVICAM’s International Journal of Information Technology
Table 2: Regression analysis while Emotional Intelligence is Independent Variable and Spiritual Intelligence is the
Dependent Variable
Un-standardized Standard T value P value R Adj. R f- ratio P
Variables Coefficient beta error square square value
Self Awareness
0.292 0.100 2.916 0.004*
Social
0.111 0.079 1.418 0.158
Awareness
Self
0.237 0.093 2.562 0.011* 0.516 0.502 38.35 0.000*
Management
Social
0.191 0.085 2.249 0.026*
Skills
*= Significant at 5 percent level of significance.
Table 3: Regression analysis while Spiritual Intelligence is Independent Variable and Emotional Intelligence is the
Dependent Variable
variables Un- Standard T value P value R Adj. R f- ratio P
standardized error square square value
Coefficient
beta
CET 0.004 0.024 0.163 0.870
PMP 0.057 0.028 2.056 0.042*
TA 0.550 0.040 13.710 0.000* 0.800 0.795 144.32 0.000*
CSE 0.232 0.045 5.122 0.000*
*= Significant at 5 percent level of significance.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 852
BIJIT -BVICAM’s International Journal of Information Technology
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 853
BIJIT - BVICAM’s International Journal of Information Technology
we have surveyed eighty businesses, whose analysis will be Having realised the importance of SMEs, the Saudi Arabian
presented in this article. government has endorsed some attractive ways to finance the
SMEs, details of these ways can be found [17] and [18]. These
1.3 Role of SMEs in World Economy measures are expected to lower the unemployment rate of the
According to a major study conducted by Sweden’s Kingdom, and provide highly needed support to the
Globalisation Council [12], “One main conclusion is that development of the local economy. Once this happens, the
changes by globalization will affect the SMEs and Kingdom of Saudi Arabia may find itself a step closer to be
entrepreneurs in different type of economies both on a national classified as a developed country.
and regional perspective. The world is globalized so is the
world for entrepreneurs and innovations. All type of companies 2.0 CLOUD COMPUTING
will be affected by the changes that one nowadays could Cloud computing is a disruptive innovation and technology of
observe, not only SMEs or innovative entrepreneurship but of the 21st century. It has affected the industrial world in the same
course also the behaviour of multinationals and large firms, and manner as outsourcing, E-Business and E-Learning did in the
the relations between large and small firms”. In another major 20th century. Cloud computing has created opportunities to
study conducted by UNU World Institute for Development new and existing businesses, especially the entrepreneurs to
Economics Research [13], from a theoretical perspective, setup and realise their dream businesses without much of the
SMEs have several advantages over both SOEs and large infrastructure and capital of their own, as the technology
privatized SOEs (PSOEs). In SMEs the incentives for both provides much of these on a rental basis.
managers and workers tend to be clearer and stronger than in
larger organizations. Governance problems are less significant 2.1 Models and Characteristics
since in many cases the managers and owners are the same To be able to comprehend cloud computing, a well-organized
people. The small size of many of the SME firms allows definition is essential. As described in [19], The National
owners easily to monitor the performance of managers while Institute of Standards and Technology (NIST) has defined
the cost of monitoring labour is also lower. Table 1 shows SME cloud computing as a model for enabling ubiquitous,
employment as a percentage of total employment and convenient, on-demand network access to a shared pool of
manufacturing employment in various countries. For details, configurable computing resources (e.g., networks, servers,
see [13]. storage, applications, and services) that can be rapidly
Table 1: SMESs share in employment provisioned and released with minimal management effort or
Country Year Country Year service provider interaction. The NST definition as
EU 69 Japan 33
France 69 Croatia 30
Germany 64 Romania 27
Belgium 72 Hungary 24
Italy 80 Poland 23
Georgia 58 Slovenia 19
US 53 Russian Fed 10
Estonia 43 Belarus 6
Czech Rep 37 Kyrgyz Rep 3
SMEs in Saudi Arabia represent almost 93 percent of total
enterprises and account for about 24.7 percent of total
employment, which is fairly low as compared to many of the
developed countries listed in Table 1, see [13]. Moreover, Figure 1: Cloud Computing Definition
Saudi Arabia’s businesses contribute about 33% of the national seen in Fig 2 includes four characteristics namely, Broad
GDP whereas the figures for some developed countries are as Network Access, Rapid elasticity, Measured Service and On-
follows: US (50%), France (56%), Spain (57%) and Japan Demand Self-Service. The service models for cloud computing
(64%), for details see [14]. As can be seen, the GDP share of can be Software as a Service (SaaS), Platform as a service
SMEs of Saudi Arabia is much lower as compared to the (PaaS), and Information as a service (IaaS), and can be
countries of G20. A detailed analysis of SMEs and their socio- deployed as Public, Private, Hybrid or Community. Many other
economic contribution can be found in [15]. However, people have defined and described cloud computing. For
investment in small and medium enterprises in Saudi Arabia is example, in [20], cloud computing is referred to as both the
expected to grow to more than USD 70 billion by the end of delivery of applications as services over Internet, and the
2015, with the government and banks providing much-needed hardware and systems software in the data centres that provide
funding, according to industry data compiled by Zawya [16]. services (SaaS).
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 854
Cloud Computing in SMEs: Case of Saudi Arabia
There have been concerns about the security of data in the its model. On the other hand, many organisations, with the help
custody of the cloud providers. Initially, there were serious of local IT support, may resort to cloud computing in place of
concerns and many organisations, especially the government outsourcing; hence the outsourcing activity might decline.
owned businesses and corporations were very reluctant to make Initially the cloud providers, and hence the large corporations
use of the cloud computing platforms. Considerations of data of the developed countries and their economies may benefit in
security and privacy would assume a very high priority when the way of providing systems, infrastructure and other
trans-border data sharing was involved. As discussed in resources need by the cloud providers. However, once the
Security and Resilience in Governmental Clouds (2009), this saturation point occurs, the developing countries might make
has significant implications for the use of cloud databases to significant gains due to picking up the lost business of
manage private and sensitive data. Thus, one of the main outsourcing. It is expected that the use of cloud computing will
considerations for many corporate and government increase in Saudi Arabia, which currently has only some
organizations, especially in the industrial world where security businesses making use of it. In this paper we shall analyse the
and privacy is paramount, is whether to make the sensitive (e.g. result of a survey conducted in 2014 of several businesses in
defence, national security) personal data available to cloud Saudi Arabia to measure the usage and impact of cloud
providers. However applications used in periodic processing computing. An economic impact of cloud computing, known as
and those involving activities like database development and Cloud Economy, was presented by Mohammad Yamin in [21].
testing, data mining, database backups and off-site disaster
recovery are regarded as safe and can be managed and stored 2.3 Cloud Computing and Small Businesses
through clouds. These considerations have been quite critical With the help of cloud computing, many SMEs can start their
for many government corporations including those of the Saudi businesses with little capital. Cloud computing can be used by
government sector, where cloud computing is slowly and existing firms as well, where they can reorganize their way of
gradually taking its share in the government and privately doing business. With the implementation of cloud computing
owned businesses. For example, the webmail system of the services, many services can be achieved such as rent data
King Abdulaziz University is hosted on cloud. storage, software and systems, maintenance and services for a
From these and other numerous descriptions, cloud computing fee. Moreover, it's well known that offshore and onshore
has emerged as an easy to acquire and use infrastructure, outsourcing enables organization to do their business with less
software, systems, memory and maintenance in a variety of capital and infrastructure. As for when both cloud computing
ways to all kinds of organisations and individuals. This has and outsourcing join together to save capital for organizations,
allowed new starters of businesses to benefit from these it is expected that many existing businesses which outsource
facilities. some of their work process, would reorganize their ways of
doing business to benefit from cloud computing services, and
2.2 Impact of Cloud Computing on Economy that would maximize their efficiency. For details, see [22].
With the prospects of eliminating a need for a large capital According to a survey, conducted by Janet Kourik [23], by
investment, the economy of many countries, especially the 2020, over 70% of users will use internet-based (cloud)
developing countries, is significantly improving the financial software to perform work." Moreover, the usage of cloud
abilities of the organisations and businesses. This trend is likely computing would grow at an astonishing rate. According to the
to continue and is expected to affect the economies of a large survey, about 69% of the Americans use cloud computing
number of countries, getting deeper into the poor nations of services such as online backup, webmail, and other services.
Africa and Asia. Cloud computing is redefining methods and People in developed countries are not the only users of cloud
models, reducing the burden of having huge capital to start a computing services. Moreover, there are about one thousand
new or sustain and expand an established business. Many and five hundred Indian companies who use cloud computing.
entrepreneurs, who would otherwise find it impossible to start In [23], it was remarked that senior decision-makers in SMEs
their dream business due to lack of resources and capital for often are not aware of cloud computing.In view of [24] and
investing in IT infrastructure and systems technology, would [25], further benefits to SMEs are in the form of: friendliness,
now be in a position to fulfil their aspirations and expectations. lower cost of organisational ownership,better return on
The most attractive feature of cloud computing is its
affordability, an aspect that SMEs are expected to benefit from.
It is expected that many bonuses in poor and developing
countries would be able to enhance and strengthen their
business activity for many new IT organizations.. In the last
two decades, many leading organizations of the western world
have resorted to outsourcing, especially offshore outsourcing.
This model of business has so far benefited countries both in
the developing and the developed world. However, with the
advent of Cloud Computing, outsourcing is likely to undergo
structural changes and is likely to involve cloud computing in Figure 2: Gartner Hyper Cycle EmergingTechnologies
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 855
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 856
Cloud Computing in SMEs: Case of Saudi Arabia
Saudi Arabian SMEs. The main objective of the survey was to 3.2 Sample of the Survey
guide the direction of this and future research related with A suitable sample size was estimated using industry standards,
SMEs and cloud computing. The success of business firms were selected with the help their publications and public
unquestionably depends on information systems. records related to the selected demographic for the research,
SMEs and cloud computing. It is a forgone conclusion that and were contacted either by email or in person. Once an
most of the modern enterprises today depend on information organisation agreed to take part in the survey, the questionnaire
systems for their effective, efficient and smooth functioning. was emailed or handed personally to the nominated
Business intelligence is driving businesses to be increasingly representatives of the SMEs; they were asked to return the
dependent on IT solutions. However, information systems survey within a two-week period. Unfortunately, many
require an IT environment and facilities for their operation and organisations declined to receive the questionnaire despite
the cost of the IT infrastructure for operating such systems has agreeing to participate, and three organisations did not return
traditionally been very costly. With the availability and the questionnaire. One organisation was late with its responses
advancement of cloud computing paradigm, many companies and was therefore not included in the research data. Although
now can lease cloud computing services as an alternative to more than one hundred organisations were contacted as
upfront payment for setting up the needed infrastructure. As described above, only eighty of them provided the data.
discussed earlier, cloud computing provides IT infrastructure,
systems, software, tools, services and services on a rental basis 3.3 Ethical Considerations
for a specified time or by a meter system of usage. For many The aim of this survey was only to measure the extent of usage
entrepreneurs, cloud computing is an economical way to start of cloud computing SME enterprises in Saudi Arabia.
their businesses. Therefore, seeking highly personal and sensitive information
Saudi Arabia has many small enterprises that are still looking was not required. Only general questions were asked like name
for ways to reduce their cost of setting up a business and of the officer, the name of the company, contact details, name
running it efficiently - cloud computing is cost-effective and of the Cloud Computing provider used by the company and the
easy to acquire. To measure the extent of cloud computing location of the company. Moreover, they were assured that this
usage in Saudi Arabian small enterprises, a survey was information would be used purely for the use of the researcher
conducted of eighty companies in Jeddah. Due to the small size and would not be made public. In keeping up with established
of Saudi population and a relatively small number of norms, information provided by the participants was treated
companies in the Kingdom, it was concluded that a sample of confidentially and used for the sole purpose of this research.
eighty companies was sufficiently robust to enable Ethical considerations related to the research study were
generalisations to be made about SMEs in the emergent primarily based on anonymity. The data collected, as published
economy. here, does not identify the organisations or individuals who
provided the date. The respondents knew that their answers
3.1 Choice of Method would not be linked to their identity. As a result the
This research paper aims to develop a research model which respondents did not show any anxiety or fear on account of
would determine the extent of the use of cloud computing their participation. For example, if an organisation admitted to
amongst Saudi SMEs. One of the major challenges in not knowing anything about cloud computing, linking their
conducting our survey was to determine and select suitable organisation to such a response would have rendered their
SMEs to obtain the relevant data from.. Another challenge was brand or business being labelled ‘old-fashioned’ or ‘out-of-
to educate officials of some of the SMEs who had never heard date’. That would have affected their reputation, sales,
of Cloud Computing. Under the circumstances, the research investment, and partners. So, confidentiality was a key element
methodology and questionnaire, used for the survey, were kept in ensuring that the study followed an ethical code of conduct.
very simple. For relevant literature, publications and studies
were reviewed in order to get in-depth information on the use 4.0 SURVEY CONTENTAND RESULTS
of cloud computing in Saudi Arabian SMEs. The survey was The survey questionnaire contained thirteen questioners, with a
selected as a suitable tool for gathering the relevant data purpose of asking simple questions. Participants were asked to
because it was capable to collect first-hand information from provide their responses on a scale of seven indicators as
actual companies within the demographic region under follows: 1 = completely disagree, 2 = disagree, 3 = somewhat
consideration. Only the selected SMEs in Jeddah were disagree, 4 = neutral, 5 = somewhat agree, 6 = agree, 7 =
surveyed through a simple questionnaire. We acknowledge that absolutely agree. Our choice of the scale of seven choices was
there are some limitations to quantitative research methods. to allow the respondents with greater flexibility. The questioner
However, the strengths of such methods, related to the research is presented in Table 8, and the results of the survey are
aim, render a quantitative survey and the potential scope of presented in Table 9.
such a survey preferable over a qualitative alternative. While
interviews could perhaps produce more detailed responses, they
are not suited for determining widespread usage because of
their smaller size.
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 857
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 858
Cloud Computing in SMEs: Case of Saudi Arabia
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 859
BIJIT - BVICAM’s International Journal of Information Technology
Copy Right © BIJIT – 2015; January - June, 2015; Vol. 7 No. 1; ISSN 0973 – 5658 860
BIJIT - BVICAM’s International Journal of Information Technology
(A Half Yearly Publication; ISSN 0973 - 5658)
Subscription Details
Name and Designation ________________________________________________________
Organization ________________________________________________________________
Mailing Address _____________________________________________________________
_______________________________________ PIN/ZIP ____________________________
Phone (with STD/ISD Code)_____________________________FAX___________________
E-Mail (in Capital Letters)______________________________________________________
Date: Signature
Place: (with official seal)
Filled in Subscription Order Form along with the required Demand Draft should be sent to the
following address:-
Prof. M. N. Hoda
Editor-in- Chief, BIJIT
Director, Bharati Vidyapeeth’s
Institute of Computer Applications & Management (BVICAM)
A-4, Paschim Vihar, Rohtak Road, New Delhi-110063 (INDIA).
Tel.: +91 – 11 – 25275055 Fax: +91 – 11 – 25255056 E-Mail: [email protected]
Visit us at: www.bvicam.ac.in/bijit