

Secured Federated Data Management in Distributed Mobile Cloud Computing |
Pages: 27-35 (9) | [Full Text] PDF (432 KB) |
AU OTHMAN, MB ABDULLAHI, M TIMOTHY, MB IBRAHIM, U MUSA |
Department of Computer Science, Federal University of Technology Minna, NigeriaDepartment of Computer Science, Federal University Wukari, Nigeria |
Abstract - With the development of wireless access technologies such as 3G/4G, mobile devices and sensors are used as information collection nodes for cloud which offers immense benefit for mobile users. Federating two or more cloud service providers and caching frequently accessed data drive is an effective way to seamlessly access data in mobile cloud computing environment thereby overcoming server failover, frequent disconnection of database server, lock-in by single service provider and data location management issues. Privacy and security of mobile users data however, remain the challenges that outweigh the colossal success factor of a federated data management in Mobile Cloud Computing. This is owing to the fact that data are hosted on public clouds owned by commercial service providers. Thus, new secured service architecture is required to provide security to the federated data in the distributed mobile cloud computing environment. This work proposes an efficient and secured federated data management to ensure the privacy, confidentiality and integrity of mobile user data in a distributed mobile cloud computing. |
Index Terms - Cloud Computing, Data Management, Distributed, Federated, Mobile Cloud, Mobile Support Station |
C itation - AU OTHMAN, MB ABDULLAHI, M TIMOTHY, MB IBRAHIM, U MUSA. "Secured Federated Data Management in Distributed Mobile Cloud Computing." International Journal of Computer Science and Software Engineering 6, no. 2 (2017): 27-35. |
Fostering New Computer Science Graduates Capabilities through Software Engineering Class |
Pages: 36-40 (5) | [Full Text] PDF (452 KB) |
W Titthasiri |
Department of Computer Science, Rangsit University, PathumThani, 90112, Thailand |
Abstract - The growth of Asian Economic Community (AEC) and software market survey in Thailand are widely acknowledged that higher educations have to improve their ICT students with skills that will give them the best capabilities to the work place. A CS department as the importance of the logistic pillar of ICT, strives to provide the best possible ICT graduates in self-evidence. It is found that employers tend to be dissatisfied with the communication skills of new CS graduates. This study is to include communication skills into CS studies through a software engineering class. Researcher implemented software project-based practices under the real-world problems in software engineering class. Twenty nine students in a class were divided into three groups. At the end of course, the students views were solicited through informal interviews and by survey. Most of the outcomes confirmed that an agile methodology and close collaboration with communication skills practices under the real-world problem project in software engineering class could be a short cut to foster CS capabilities. |
Index Terms - Agile Methodology, Communication Skills, CS Graduates |
C itation - W Titthasiri. "Fostering New Computer Science Graduates Capabilities through Software Engineering Class." International Journal of Computer Science and Software Engineering 6, no. 2 (2017): 36-40. |
Analysis of Polyalphabetic Transposition Cipher Techniques used for Encryption and Decryption |
Pages: 41-46 (6) | [Full Text] PDF (494 KB) |
SA Hannan, AMAM Asif |
Assistant Professor, Department of CS & IT, Albaha University, Albaha, Saudi ArabiaAssistant Professor, I.M.S.I.T., Aurangabad, India |
Abstract - Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable set of cryptographic schemes persist in which each of it has its own affirmative and feeble characteristics. In this paper we present a perspective on Polyalphabetic Transposition Cipher Techniques which are currently used for encryption and decryption purpose. This paper mainly focuses on practically use of the Polyalphabetic Transposition Cipher Techniques for encryption and decryption purpose. A brief discussion about types of polyalphabetic transposition cipher techniques. |
Index Terms - Polyalphabetic, Encryption, Vigenere cipher, Vernam cipher, One-time pad, Decryption |
C itation - SA Hannan, AMAM Asif. "Analysis of Polyalphabetic Transposition Cipher Techniques used for Encryption and Decryption ." International Journal of Computer Science and Software Engineering 6, no. 2 (2017): 41-46. |