International Journal of Computer Networks and Communications Security

Volume 6, Issue 2, February 2017

 

 

Secured Federated Data Management in Distributed Mobile Cloud Computing
 

Secured Federated Data Management in Distributed Mobile Cloud Computing

Pages: 27-35 (9) | [Full Text] PDF (432 KB)
AU OTHMAN, MB ABDULLAHI, M TIMOTHY, MB IBRAHIM, U MUSA
Department of Computer Science, Federal University of Technology Minna, Nigeria
Department of Computer Science, Federal University Wukari, Nigeria

Abstract -
With the development of wireless access technologies such as 3G/4G, mobile devices and sensors are used as information collection nodes for cloud which offers immense benefit for mobile users. Federating two or more cloud service providers and caching frequently accessed data drive is an effective way to seamlessly access data in mobile cloud computing environment thereby overcoming server failover, frequent disconnection of database server, lock-in by single service provider and data location management issues. Privacy and security of mobile users data however, remain the challenges that outweigh the colossal success factor of a federated data management in Mobile Cloud Computing. This is owing to the fact that data are hosted on public clouds owned by commercial service providers. Thus, new secured service architecture is required to provide security to the federated data in the distributed mobile cloud computing environment. This work proposes an efficient and secured federated data management to ensure the privacy, confidentiality and integrity of mobile user data in a distributed mobile cloud computing.
 
Index Terms - Cloud Computing, Data Management, Distributed, Federated, Mobile Cloud, Mobile Support Station

Citation - AU OTHMAN, MB ABDULLAHI, M TIMOTHY, MB IBRAHIM, U MUSA. "Secured Federated Data Management in Distributed Mobile Cloud Computing." International Journal of Computer Science and Software Engineering 6, no. 2 (2017): 27-35.

Fostering New Computer Science Graduates Capabilities through Software Engineering Class
 

Fostering New Computer Science Graduates Capabilities through Software Engineering Class

Pages: 36-40 (5) | [Full Text] PDF (452 KB)
W Titthasiri
Department of Computer Science, Rangsit University, PathumThani, 90112, Thailand

Abstract -
The growth of Asian Economic Community (AEC) and software market survey in Thailand are widely acknowledged that higher educations have to improve their ICT students with skills that will give them the best capabilities to the work place. A CS department as the importance of the logistic pillar of ICT, strives to provide the best possible ICT graduates in self-evidence. It is found that employers tend to be dissatisfied with the communication skills of new CS graduates. This study is to include communication skills into CS studies through a software engineering class. Researcher implemented software project-based practices under the real-world problems in software engineering class. Twenty nine students in a class were divided into three groups. At the end of course, the students views were solicited through informal interviews and by survey. Most of the outcomes confirmed that an agile methodology and close collaboration with communication skills practices under the real-world problem project in software engineering class could be a short cut to foster CS capabilities.
 
Index Terms - Agile Methodology, Communication Skills, CS Graduates

Citation - W Titthasiri. "Fostering New Computer Science Graduates Capabilities through Software Engineering Class." International Journal of Computer Science and Software Engineering 6, no. 2 (2017): 36-40.

Analysis of Polyalphabetic Transposition Cipher Techniques used for Encryption and Decryption
 

Analysis of Polyalphabetic Transposition Cipher Techniques used for Encryption and Decryption

Pages: 41-46 (6) | [Full Text] PDF (494 KB)
SA Hannan, AMAM Asif
Assistant Professor, Department of CS & IT, Albaha University, Albaha, Saudi Arabia
Assistant Professor, I.M.S.I.T., Aurangabad, India

Abstract -
Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable set of cryptographic schemes persist in which each of it has its own affirmative and feeble characteristics. In this paper we present a perspective on Polyalphabetic Transposition Cipher Techniques which are currently used for encryption and decryption purpose. This paper mainly focuses on practically use of the Polyalphabetic Transposition Cipher Techniques for encryption and decryption purpose. A brief discussion about types of polyalphabetic transposition cipher techniques.
 
Index Terms - Polyalphabetic, Encryption, Vigenere cipher, Vernam cipher, One-time pad, Decryption

Citation - SA Hannan, AMAM Asif. "Analysis of Polyalphabetic Transposition Cipher Techniques used for Encryption and Decryption ." International Journal of Computer Science and Software Engineering 6, no. 2 (2017): 41-46.