International Journal of Computer Networks and Communications Security

Volume 5, Issue 3, March 2016

 

 

 

An Improved Genetic-based Approach to Task Scheduling in Inter-Cloud Environment

Pages: 28-35 (8) | [Full Text] PDF (528 KB)
H Ma, M Zhang
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 10083, China

Abstract -
With the development of cloud computing, the number of cloud computing service providers has arisen rapidly. The research of task scheduling in cloud computing environment nearly enters a mature stage. But when there is a sharp increase in the amount of user tasks, a single cloud provider cannot meet users needs. This phenomenon prompted the generation of Inter-cloud, and the task scheduling in which gradually gets everyones attention. In this paper, we improve the genetic algorithm by adopting Gene Space Balance Strategy (GSBS), which optimizes the generation of initial population. On the basis of improved algorithm, we propose the multi-objective optimization task scheduling method in Inter-cloud. The scheduling goal is to minimize the completion time and cost. We can complete task scheduling according to the different QoS requirements of users. By performing simulation on Cloud-Sim, we demonstrate the effectiveness of improved algorithm. At the same time, we compare the scheduling results of single-cloud and Inter-cloud.
 
Index Terms - Genetic Algorithm, Task Scheduling, Inter-cloud, Gene Space Balance Strategy

Citation - H Ma, M Zhang. "An Improved Genetic-based Approach to Task Scheduling in Inter-Cloud Environment." International Journal of Computer Science and Software Engineering 5, no. 3 (2016): 28-35.

 

Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services

Pages: 36-4 (39) | [Full Text] PDF (338 KB)
Neethu T.D.P, A Ajith
Department of Computer Science and Engineering, Vidya Academy of Science and technology, Thrissur, Kerala, India

Abstract -
Now a days security of the web based services has become serious concern. Traditional authentication processes rely on username and password, formulated as a “single shot”, providing user verification only during login phase .Once the users identity has been verified, the system resources are available for a fixed period of time or until explicit logout from the user. The active user allow impostors to impersonate the user and access the personal data and can be misused easily. A basic solution is to use very short session timeouts and periodically request the user to input his credentials over and over, but this is not a good solution. This paper explores promising alternatives offered by applying biometrics in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. The use of biometric authentication allows credentials to be acquired transparently i.e. without explicitly notifying the user or requiring his interaction, which is essential to guarantee better service usability.
 
Index Terms - Security, Continuous user verification, Biometric Authentication

Citation - Neethu T.D.P, A Ajith. "Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services." International Journal of Computer Science and Software Engineering 5, no. 3 (2016): 36-4.

 

Peer Review in Software Development: A Survey

Pages: 40-44 (5) | [Full Text] PDF (462 KB)
A GUZEL, O AKTAS, KU BIRANT
Dokuz Eylül University, Computer Engineering Department Tınaztepe Campus, Buca İzmir Turkey

Abstract -
Analysis, decision making, detecting defects and correcting mistakes is important in software development process. Defects in the code reduce the quality of the software. Peer review is simple but has a huge impact on software quality. Also, peer review destroy defects early, easily, low-cost and efficiently. Code defects must be examined for better quality, high-performance, low-cost, re-use, modification and easy development of software. In this paper, the questions of what peer review is, why it is necessary for software development process and importance of peer review are told briefly by investigating in the literature.
 
Index Terms - Peer review, Quality of feedback, Software, Open source software

Citation - A GUZEL, O AKTAS, KU BIRANT. "Peer Review in Software Development: A Survey." International Journal of Computer Science and Software Engineering 5, no. 3 (2016): 40-44.