SlideShare a Scribd company logo
1 of 139
Download to read offline
I
Advances in Computer Science and Information Technology
(ACSIT)
Print ISSN: 2393-9907
Online ISSN: 2393-9915
Editor-In-Chief:
Mohamed M. Elammari, Ph. D.
Faculty of Information Technology,
University of Benghazi, Libya
Associate Editor:
Rabindra Kumar Jena, Ph. D.
Information Technology Management Department
IMT, Nagpur-440013, India
Editorial Board Members:
M. R. Tripathy, Ph. D.
Department of Electronics & Communication Engineering,
Amity School of Engineering and Technology
Amity University Campus, Sector-125, Noida (U.P.) – 201303, India
Shishir K. Shandilya, Ph. D.
Dean (Academics) & Head –Department of Computer Science & Engineering
BANSAL Institute of Research & Technology, Bhopal, M. P., India
Basant Kumar, Ph. D.
Computer Science and Mathematics Department
Modern College of Business & Sc
(Affiliated with University of Missouri, St.Louis, USA
& Franklin University, Ohio, USA), Muscat, Sultanate of Oman
Amit Choudhary, Ph. D.
Department of Computer Science
Maharaja Surajmal Institute
(an affiliate of G.G.S. Indraprastha University, Delhi, India)
Moirangthem Marjit Singh
Department of Computer Science & Engineering
North Eastern Regional Institute of Science & Technology (NERIST),
(Deemed University under MHRD, Govt. of India), Nirjuli-791109, Arunachal Pradesh
Published by:
Krishi Sanskriti Publications
E-47, Rajpur Khurd Extn., Post Office – I.G.N.O.U. (Maidangarhi)
New Delhi-110068, INDIA
Contact No. +91-8527006560; Website: http://www.krishisanskriti.org/acsit.html
II
Advances in Computer Science and Information Technology (ACSIT)
Website: http://www.krishisanskriti.org/acsit.html
Aims and Scope:
Advances in Computer Science and Information Technology (ACSIT) (Print ISSN: 2393-9907; Online ISSN: 2393-
9915) is a quarterly international open access journal of the Krishi Sanskriti (http://www.krishisanskriti.org), a
non-governmental organization (NGO) registered under society registration act 1860 which is engaged in academic
and economic development of the society with special emphasis on integrating industry and academia. The journal
ACSIT is devoted to publication of original research on various aspects of computer science and information
technology including the scientific leads in the formative stage which has a promise for a pragmatic application. The
scopes of the journal include, but are not limited to, the following fields Programming Languages; Software
Development; Graphics for Science and Engineering; Solid, Surface and Wireframe Modelling; Animation; Data
Management and Display; Image Processing; Flight Simulation; VLSI Design; Process Simulation; Neural Networks
and their Applications; Fuzzy Systems Theory and Applications; Fault-Tolerant Systems; Visual Interactive
Modelling; Supercomputing; Optical Computing; Soft Computing; Computer Architecture Data Structures and
Network Algorithms; Genetic Algorithms and Evolutional Systems; Very Large Scale Scientific Computing;
Molecular Modelling; Scientific Computing in Emerging Critical Technologies; Computational Learning and
Cognition; Computational Methods in Geosciences-Oceanographic and Atmospheric Systems; Computational
Medicine; Artificial Intelligence; Cybernetics; Computer Security Issues; Information Security, Evolutionary and
Innovative Computing, Information Theory, Mathematical Linguistics, Automata Theory, Cognitive Science,
Theories of Qualitative Behaviour, Intelligent Systems, Genetic Algorithms and Modelling, Fuzzy Logic and
Approximate Reasoning, Artificial Neural Networks, Expert and Decision Support Systems, Learning and
Evolutionary Computing, Expert and Decision Support Systems, Learning and Evolutionary Computing, Biometrics,
Moleculoid Nanocomputing, Self-adaptation and Self-organisational Systems, Data Engineering, Data Fusion,
Information and Knowledge, applications of information science and so on. Publication is open to all researchers
from all over the world. Manuscripts to be submitted to the Journal must represent original research reports and has
not been submitted elsewhere prior to or after submission to this journal for publication. All the manuscripts
submitted for consideration in ACSIT is subject to peer-review for taking up final decision on acceptance for
publication, and decision of the editorial team will be final.
All papers will be reviewed by at least two referees who are peers in their field of research and by an Editor of the
Journal or as appointed by the Editor-in-Chief to be responsible for editing the manuscript.
The authors agree to automatically transfer the copyright to the publisher (Krishi Sanskriti Publications), if and when
the manuscript is accepted for publication.
© 2014 Krishi Sanskriti Publications, India
Printed in India
No part of this publication may be reproduced or transmitted in any form by any means, electronic or mechanical,
including photocopy, recording, or any information storage and retrieval system, without permission in writing from
the copyright owners.
DISCLAIMER
The authors are solely responsible for the contents of the papers compiled in this volume. The publishers or editors
do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and readers are
requested to communicate such errors to the editors or publishers to avoid discrepancies in future.
The journal may publish supplements to the journal in the form of monographs etc. also, but all costs related to the
production of supplements are to be paid by the orderer/author. The contacts in this regard may be made prior with
the Editor-in-Chief or the editorial office. Supplements will be treated in the same way as other submissions.
III
Submission of Manuscripts
Please visit the journal’s home pages at http://www.krishisanskriti.org/acsit.html for details of aims and scope,
readership, instruction to authors and publishing procedure and table of contents. Use website to order a subscription,
reprints and individual articles.
Authors are requested to submit their papers electronically to editor.acsit@krishisanskriti.org and mention journal
title (ACSIT) in subject line.
Publication Fee:
The publication fee for this journal is $300 (International authors) and INR 3500 (India, Pakistan, Nepal and
Bangladesh), including taxes.
Subscription Information
Subscription orders may be directed to the publisher or contact your preferred subscription agents.
Regular Subscription price for the Journal
US$380/Libraries and US$360/Individual (Outside India)
Rs. 3500/Libraries and Rs. 1800/ Individual (Inside India)
The Bank details for subscription/publication payment through NEFT/Online Transfer/ DD:
Beneficiary Name : Krishi Sanskriti
Bank Name : Canara Bank
Bank Address : Jeet Singh Marg, New Delhi
Account No. : 1484101026988
Account Type : Savings
IFSC Code : CNRB0001484
Swift Code : CNRBINBBBID
Frequency of Publication
Quarterly (depending on the number of literature being accepted for publication, the volume will be split in numbers
as required).
All business correspondence enquires and subscription orders should be addressed to:
Editor-in-Chief
Editorial Office,
Advances in Computer Science and Information Technology (ACSIT),
Krishi Sanskriti Publications
E-47, Rajpur Khurd Extn.
Post Office- I.G.N.O.U. (Maidangarhi),
New Delhi -110 068, India
E-Mail: editor.acsit@krishisanskriti.org
IV
Author Guidelines
Please follow the Guide for Authors instructions carefully to ensure that the review and publication of your paper is
swift and efficient.
A manuscript may be returned for revision prior to final acceptance, the revised version must be submitted as soon as
possible after the author's receipt of the referee's reports. Revised manuscripts returned after the expiry of stipulated
time (as quoted during such a request) will be considered as new submissions subject to full re-review.
Paper categories:-
Contributions falling into the following categories will be considered for publication:
• Original high-quality research papers (preferably no more than 10 pages double-line-spaced manuscript, in
double column including tables and illustrations)
• Short communications or case studies for rapid publication (no more than 5 double-line-spaced manuscript, in
double column pages including tables and figures)
• Mini-Review on subjects of cutting-edge scientific developments, theories, hypotheses and concepts, which
could be of importance to the scientific community world-wide.
Ethics in publishing
Ethics in publishing and Ethical guidelines for journal publication, a standard operating procedure (SOP) can be
followed as applied to other publication systems. For reference, online versions of the same can be freely accessed
and information on the same may be sought by the publishing author(s).
Conflict of interest
Disclosure of actual or potential conflict of interest including financial by all the authors is mandatory for final
appearance of their article in the journal. The standard procedure of operation (SOP) in this regard will be as
followed by other publishing house and/or the laws governing such practices.
Submission declaration
Submission of an article implies that the work described has neither been published elsewhere (except in the form of
an abstract or as part of a published lecture or academic thesis or as an electronic preprint), nor is under consideration
for publication with other publishing house.
Results submitted for publication should refer to their previous findings in the same way as they would refer to
results from a different group. This applies not only to figures or tables, or parts of them, but has to be understood in
a wider sense.
Acknowledgements
The acknowledgement section should list (a) other contributors for whom authorship is not justified, e.g. technical
help; (b) financial and material support.
Changes to authorship
This policy concerns the addition, deletion, or rearrangement of author names in the authorship of accepted
manuscripts:
Before the publication of the accepted manuscript, requests to add or remove an author, or to rearrange the author
names, must be sent to the Journal Editorial Office through email from the corresponding author of the accepted
manuscript and must include: (a) the reason the name should be added or removed, or the author names rearranged
and (b) written confirmation (e-mail the scanned letter of consent or fax) from all authors that they agree with the
addition, removal or rearrangement. In the case of addition or removal of authors, this includes confirmation from the
author being added or removed. Requests that are not sent by the corresponding author will be forwarded by the
Editorial Office to the corresponding author, who must follow the procedure as described above. Note that the
publication of the accepted manuscript will be suspended or kept in abeyance until authorship has been agreed.
After the accepted manuscript is published, any request to add, delete, or rearrange author names in an article
published in any issue will follow the same policies as noted above and result in a corrigendum.
V
Copyright
This journal offers authors a choice in publishing their research Open Access.
For Open access articles please mention the role of the funding source or agency. You are requested to identify who
provided financial support for the conduct of the research and/or preparation of the article and to briefly describe the
role of the sponsor(s), if any, in study design; in the collection, analysis and interpretation of data; in the writing of
the report; and in the decision to submit the article for publication. If the funding source(s) had no such involvement
then this should be stated.
Informed consent and patient details
Studies on patients or volunteers require ethics committee approval and informed consent, which should be
documented in the paper. Appropriate consents, permissions and releases must be obtained where an author wishes to
include case details or other personal information or images of patients and any other individuals.
Unless a written permission from the patient (or, where applicable, the next of kin), the personal details of any patient
included in any part of the article and in any supplementary materials (including all illustrations) is obtained while
making submission of such an article, no article or manuscript of such type would be accepted for publication in this
journal.
Submission
Submission to this journal proceeds totally online and you will be guided stepwise through the creation and
uploading of your files. The system automatically converts source files to a single PDF file of the article, which is
used in the peer-review process. All correspondence, including notification of the Editor's decision and requests for
revision, will be effected by e-mail, thus removing the need for a paper trail.
Referees
Authors are requested to submit a minimum of four suitable potential reviewers (please provide their name, email
addresses, and institutional affiliation). When compiling this list of potential reviewers please consider the following
important criteria: they must be knowledgeable about the manuscript subject area; must not be from your own
institution; at least two of the suggested reviewers must be from another country than the authors'; and they should,
not have recent (less than four years) joint publications with any of the authors. However, the final choice of
reviewers is at the editors' discretion.
PREPARATION OF MANUSCRIPT
Use of word processing software:
It is important that the file be saved in the native format of the word processor used. The text should be in double
column format. Keep the layout of the text as simple as possible. Most formatting codes will be removed and
replaced on processing the article. However, do use bold face, italics, subscripts, superscripts etc. When preparing
tables, if you are using a table grid, use only one grid for each individual table and not a grid for each row. If no grid
is used, use tabs, not spaces, to align columns.
Note that source files of figures, tables and text graphics will be required whether or not you embed your figures in
the text. To avoid unnecessary errors you are strongly advised to use the 'spell-check' and 'grammar-check' functions
of your word processor.
Article Structure
Authors should arrange their contribution in the following order:
1. The paper title should be short, specific and informative. All author's names and affiliations should be clearly
indicated. Please also indicate the author for correspondence and supply full postal address, telephone and fax
numbers, and e-mail address of such an author.
2. An abstract of approximately 250 words, outlining in a single paragraph the aims, scope and conclusions of the
paper.
3. Four keywords, for indexing purposes;
4. The text suitably divided under headings.
Subdivision - numbered sections
Divide your article into clearly defined and numbered sections. Subsections should be numbered 1.1 (then 1.1.1,
1.1.2, ...), 1.2, etc. (the abstract is not included in section numbering). Any subsection may be given a brief
heading. Each heading should appear on its own separate line.
5. Acknowledgments (if any).
VI
6. References (double spaced, and following the Oxford style).
7. Appendices (if any).
8. Tables (each on a separate sheet).
9. Captions to illustrations (grouped on a separate sheet or sheets).
10. Illustrations, each on a separate sheet containing no text, and clearly labeled with the journal title, author's name
and illustration number.
Essential title page information
• Title. Concise and informative. Titles are often used in information-retrieval systems. Avoid abbreviations and
formulae where possible.
• Author names and affiliations. Where the family name may be ambiguous (e.g., a double name), please indicate
this clearly. Present the authors' affiliation addresses (where the actual work was done) below the names. Indicate
all affiliations with a lower-case superscript letter immediately after the author's name and in front of the
appropriate address. Provide the full postal address of each affiliation, including the country name and, if
available, the e-mail address of each author.
• Corresponding author. Clearly indicate who will handle correspondence at all stages of refereeing and
publication, also post-publication. Ensure that phone numbers (with country and area code) are provided in
addition to the e-mail address and the complete postal address.
Contact details must be kept up to date by the corresponding author.
• Present/permanent address. If an author has moved since the work described in the article was done, or was
visiting at the time, a 'Present address' (or 'Permanent address') may be indicated as a footnote to that author's
name. The address at which the author actually did the work must be retained as the main, affiliation address.
Superscript Arabic numerals are used for such footnotes.
Submission checklist
Please ensure that the following items are present, while submitting the article for consideration:
One author has been designated as the corresponding author with contact details:
• E-mail address
• Full
• Postal address
• Phone numbers
All necessary files have been uploaded, and contain:
• Keywords
• All figure captions
• All tables (including title, description, footnotes)
• Manuscript has been 'spell-checked' and 'grammar-checked'
• References are in the correct format for this journal
• All references mentioned in the Reference list are cited in the text, and vice versa
• Permission has been obtained for use of copyrighted material from other sources (including the Web)
After Acceptance
Use of the Digital Object Identifier
The Digital Object Identifier (DOI) may be used to cite and link to electronic documents. The DOI will be assigned
as per standard protocol to the 'Articles in press'. For reference about the given DOI (in URL format; see here an
article in the journal Physics Letters B): http://dx.doi.org/10.1016/j.physletb.2010.09.059, is cited for your perusal.
Online proof correction
Corresponding authors will receive an e-mail with a link to our Submission System, which would allow them to
annotate and do correction of proofs online. In addition to editing text, the authors can also comment on
figures/tables and answer questions from the Copy Editor.
All instructions for proofing will be given in the e-mail to be sent to authors, we will ensure from our side to get your
article published quickly and accurately if all of your corrections are uploaded within two days and also, that all
corrections are performed in one session. Please check carefully before replying, as inclusion of any subsequent
corrections cannot be guaranteed. Proofreading is solely author’s responsibility. Note that publisher team may
proceed with the publication of your article if no response is received.
Advances in Computer Science and Information Technology
(ACSIT)
Volume 2, Number 3; January-March, 2015
Contents
Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 186-190
Rupa Basu
State of the Art of Spell Checker Design for Indian Languages: A Survey 191-195
Shivani and DharamVeer Sharma
Addressing Cloud Computing Security Concerns 196-200
Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda
Reduction of Load on Network using Compression Technique with Web Crawler 201-203
Sneha Tuteja, Naresh Kumar and Rajender Nath
Hospital Information Systems Integration Plan System Perespective 204-207
Qurat Ul Ain and Sumera Shafi
Secure Mining of Association Rule through Hash Key in Horizontally Distributed Database 208-210
Raunak Rathi, A.V. Deorankar and Roshani Sherkar
A Study on Mobile-Commerce 211-214
Seema Chaudhary and Gunjan Sharma
Data Base Management System in Cloud Computing Environment 215-220
Sudhanshu Maurya and Swati Kumari
Development of Distributed E-Healthcare System Using Service Oriented Architecture 221-228
Sudhanshu Maurya and Swati Kumari
Cloud based E-Learning–Using cloud to provide Learning as a Service 226-229
Tania Gaur and Nisha Kharb
Combination of Genetic Algorithm with Fuzzy Systems 230-232
Gaurav and Nidhika Yadav
Review of Techniques of Digital Video Forgery Detection 233-236
Mrs. J.D. Gavade and Mrs. S.R. Chougule
Fuzzy Rough Sets and Its Application in Data Mining Field 237-240
Megha Kumar and Nidhika Yadav
Contents
Web Information Retrieval System 241-244
NehaPrabhakar, Vasundhara Bhatia, SumatiManchanda and Nidhi Sharma
Review: Neural Network based Approach for Travel Time Prediction 245-248
P.K. Kharat, Sagar S. Gaikwad and S.V. Patil
Effect of the Core Selection Strategy in Determining Optimum BDMST in Multicast Networks 249-251
Sakshi Arora and Sunanda
Recommender System-A Close Look at Collaborative Filtering 252-257
Shivani Agrawal, PankhuriRastogi and Shubhi Agarwal
Proposed Methodology for Database Privacy in an Existing System Using Hippocratic Database 258-260
Sonali Ganguly and S.P. Singh
Role of ICTS in Education: Promises and Challenges ICT as a Change Agent 261-261
Prabha Sharma
A Study on Data Preprocessing, Classification and Clustering using WEKA Tool 262-266
Amit Gupta and Naganna Chetty
Offline Signature Verification with ANN using Shape Properties a Feasibility Report 267-271
K. Srivastava, Subhash Chandra and Sushila V. Maheshkar
Manual and Automation Analysis of Load Testing 272-275
Ritika
Encryption Techniques in Cloud Computing 276-280
Meena Kumari and Rajender Nath
Commerce: A Virtual Assistance Making Life Challenging Or Simpler 281-287
Ms. Shuchi Shukla and Ms. Prerna Singh
Improving GIS in Health Care 288-289
Kush Benara
Broadening the Scope of Rural Marketing by Internet Technology 290-294
Ms. Shraddha Singhal and Ms. Radhika Tomar
Big Data & Accounting Measurements 295-305
Mohammad Mehdi Nasrizar
Role & Significance of Information Technology in Enhancement of Business Management 306-312
Ms. Nalini K. Atkare, Ms. Priti S. Dharammali and Shrinivas Manekar
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 pp. 186-190
© Krishi Sanskriti Publications
http://www.krishisanskriti.org/acsit.html
Use of E-Portfolios in Higher Education:
Application of Constructivist Theory for
Effective Learning
Rupa Basu
Kamala Nehru College University of Delhi
E-mail: rupa.basu@knc.du.ac.in
Abstract—An e-portfoliois an electronic collection of evidence that
shows a student’s learning and accomplishments over time. The
portfolio may include writing samples, photos, videos, research
projects, and observations by mentors and peers. The student’s
reflection on the artifacts, and what he had learnt from the process of
developing the e-portfolio are also included.
According to the constructivist theory students learn from being
active learners in collaborative settings; and from constructing new
ideas and concepts based on their prior knowledge and experiences.
In a constructivist, technology-integrated classroom the activities are
interactive and the learning is student centered.
E-portfolios are being touted as the next biggest innovation in
educational technology. They indeed have the potential to become
lifelong learning tools.In this paper we look at how e-portfolio
integrates the principles of constructivism and can be an extremely
effective tool for learning and assessment in higher education.
1. HOW DO WE LEARN?
There are myriad ways in which people learn. This is what the
philosophers have called epistemology-the theory of
knowledge and learning. The earliest ideas about how humans
learn came from the ancient Greeks about two thousand four
hundred years ago. Psychologists have been studying the
nature of learning for more than a century. In the process they
have taken a variety of theoretical perspectives. The general
theoretical approaches to the study of learning are
behaviorism, social learning theory, information-processing
theory, constructivism and sociocultural theory.
The predominant theory on which most of the teaching and
learning processes since 1960s have been based is
behaviorism developed by J.B. Watson and B. F. Skinner.
Behaviorists argue that because thought processes cannot be
directly observed and measured, it is difficult to study thinking
objectively and scientifically. Instead, they focus on two
things that researchers can observe and measure: people’s
behaviors (responses) and the environmental events (stimuli,
reinforcement) that precede and follow those responses.
Watson andSkinner sought to prove that behavior could be
predicted and controlled. They were only concerned with how
behavior is affected by external forces. Skinner believed that
everything human beings do is controlled by their experience
[18]. They concluded that given the right environmental
influences, all learners acquire identical understanding and
that all students can learn. The implications of this for
instruction and learning have been emphasis on repetitions and
rote learning [20].
2. WHAT IS THE CONSTRUCTIVE APPROACH?
Unlike behaviourists, constructivists concern themselves with
internal aspects of learning that is explained by cognitive
learning theory. The latter explains how the brain forms the
most incredible network of information processing and
interpretation as we learn things. According to this theory
mental processes are influenced by both internal and external
factors. Cognitive learning theory posits that with effective
cognitive processes, learning is easier and new information
can be stored in the memory for a long time[7].
Jean Piaget and Lev Vygotsky are two eminent figures in the
development of constructivist theories. Constructivist learning
theory says that all knowledge is constructed from a base of
prior knowledge and people are better able to understand the
information that they have constructed by themselves. People,
or even children, are not a blank slate and knowledge cannot
be imparted without the child making sense of it according to
his or her current conceptions.
According to constructivism, knowledge is constructed from
(and shaped by) experiences and learning is an active process
and a personal interpretation of the world.The implications of
constructivism for instruction are: (1) Teaching is not merely
transmitting knowledge and information such as facts,
concepts and principles. Rather it should provide students with
relevant experiences from which they can construct their own
meaning. (2) Constructivism is anchored on the assumption
Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 187
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
that the assimilation of knowledge is personal and therefore no
two learners can build up the same meaning out of a given
situation.
Thus the constructivist approach shifts emphasis from
teaching to learning, individualizes and contextualizes
students’ learning experiences, helps students develop
processes, skills and attitudes, and focuses on knowledge
construction, not reproduction. Whereas in traditional
classrooms knowledge is inert, in constructivist classrooms it
is dynamic and changes with experiences [9].
In the constructivist classroom, students work primarily in
groups and learning and knowledge are dynamic and
interactive. There is a great focus and emphasis on social and
communication skills, as well as collaboration and exchange
of ideas. This is contrary to the traditional classroom in which
students work primarily alone, learning is achieved through
repetition, and the subjects are strictly adhered to and are
guided by a textbook. Some activities encouraged in
constructivist classrooms are: (1) Experimentation where
students individually perform an experiment and then come
together as a class to discuss the results. (2) Field trips allow
students to put the concepts and ideas discussed in class in a
real-world context. (3) Research projects in which students
research a topic and can present their findings to the class. (4)
Filmsprovide visual context and thus bring another dimension
into the learning experience. (5) Class discussions are used in
all of the methods described above. It is one of the most
important aspects of constructivist teaching methods [10].
Traditional pedagogical approaches often may not be the best
way to cater for the specific needs of learners in higher
education settings, particularly those of university students
with special expectations and professional
prospects.Traditionally, assessment in the classrooms is based
on testing. In this it is important for the student to produce the
correct answers. However, in constructivist teaching, the
process of gaining knowledge is viewed as being just as
important as the product. Thus, assessment is based not only
on tests, but also on observation of the student, the student’s
work, and the student’s points of view. Some assessment
strategies include oral discussions, mind-mapping, hands-on
activities and pre-testing [13].
Constructivist philosophy now has a reasonably long history
of application in education programs for young children in the
western world, but is used less frequently in adult learning
environments.
Learning environments for adults based on constructivist
philosophy include opportunities for students to make
meaningful connections between new material and previous
experience, through discovery. The importance of using these
types of strategies with adults contributes to critical learning
environments where instructors “embed” the skills they are
teaching in “authentic tasks that will arouse curiosity,
challenge students to rethink assumptions and examine their
mental modes of reality”[12].
3. WEB-BASED INSTRUCTION IN HIGHER
EDUCATION
There has been a widespread increase in the use of web-based
instruction in universities across the world but there is doubt
about the quality of instruction they impart. For example,
Boshier et al.[4] examined 127 courses and expressed concern
that many web-based subjects have not utilised the full
capability of the available technology and some sites actually
emulated the worst of face-to-face courses where learners are
constructed as passive recipients of information.
Behaviourist instructional strategies, with their inherent
limitations, and which rely on the development of a set of
instructional sequences with predetermined outcomes, have
also been followed in the designing ofmost of the web-based
instruction. There is a need for a shift in approaches to
pedagogy as well as a way of supporting alternate frameworks
for instruction within a web-based environment.Current
instructional design models do not provide effective strategies
for designing constructivist learning environments. In a web-
based environment this proves to be even more challenging
[11].
However, with advancing technologies many web-based
courses have moved to increasingly providing scope for
communication and interaction, through synchronous and
asynchronous discussion. Through the provision of real world
contexts and opportunity for collaboration, the learning
experience can be designed to provide opportunity for students
to take control of their own learning.
Studies have shown that educational institutions that have
embraced technology as part of their curriculum have
experienced an increase in student performance and academic
achievement. Learning ‘with’ technology is the aim for
successful integration of technology. Technology supports
exactly the kinds of changes in content, roles, and
organizational climate that are at the heart of constructivist
educational reform movements [17].
4. WHAT ISAN E-PORTFOLIOS?
An e-portfolio, basically an electronic or digital portfolio, is an
electronic collection of evidence that shows a student’s
learning and accomplishments over time. Evidence may
include writing samples, photos, videos, research projects,
observations by mentors and peers, the student’s reflection on
the artifacts, and what the student learned from the process of
developing the e-portfolio.
Rupa Basu
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
188
The term portfolio has long been associated with artists who
gather examples of their work together for exhibition or to
gain commissions. The term is also associated with financial
portfolios which can be a collection of investments or assets.
Similarly, an educational portfolio documents the learning
achieved by a student. E-portfolios first made an appearance
in the 1990s.
The e-portfolio is an adaptation of the original paper-based
portfolio in digital format, is a more recent phenomenon that
not only provides students with a repository for collection and
presentation of their work but also a mechanism for
documenting growth and achievement of professional
knowledge and skills. Educators, especially in the USA, are
showing increasing interest in portfolios for assessment of
learning. The subject area has grown enormously in recent
times and has a huge potential to impact on higher education
[8].
There is a significant amount of learning that can take place
through the creation of e-portfolio. There is high student
involvement in putting together the contents of a portfolio,
often through discussion or negotiation with an academic
tutor. This is perhaps the most attractive feature of a portfolio,
from the point of view of an educator. The portfolio also
provides a more rounded and reliable assessment of learning
achieved than written examinations or essay assignments
alone. The emphasis on assessment still drives the curriculum
and dictates teaching methods at most places. Outdated tools
are still used to assess and measure student performance.
Educational institutions have yet to recognize and utilize
technology as an effective form of assessment in
schools.Because of the ownership of the portfolio by the
student, each portfolio is individual and unique. Teachers are
looking at e-portfolios as an alternative form of assessment in
which both standards and student performance are used. .
One of the most attractive features of e-portfolios is the
diversity and richness of artifacts that can be associated with
learning. Examples of such materials include word or text
documents; PowerPoint presentations; web-pages with
hyperlinks; Excel spreadsheets and graphs; scanned images;
digital photographs; multimedia audio and video files; and
results from interactive computer-assessment programs.
The pedagogy of e-portfolios has been studied and reviewed
by Barrett & Wilkerson [3]. An e-portfolio should provide a
dynamic environment for learners to document and celebrate
learning they have achieved.
E-portfolio development also about the “interactions” of
learning. Knowledge is distributed among people and artefacts
which is also an important aspect of learning in this
networking age. Most of the present day e-portfolio platforms
provide the option for inclusion of peer review, feedback and
discussion. Therefore e-portfolios have the potential to
become lifelong learning tools.
E-portfolios have a number of advantages over print based
portfolios including portability, the ability to store, organise
and reorder contents quickly and easily; provide opportunities
to integrate student course work; their ability to form the basis
for collaboration; the potential for development of information
management, self-organisation, planning, and presentation
skills. Some of the publicly available electronic portfolio
platforms are: Foliotek, LiveText, ePortfolio, TaskStream,
Tk20, TrueOutcomes and so on. These platforms support
student portfolios, faculty-controlled assessments, curriculum
records, and surveys, lesson plan building, and the delivery of
learning materials and resources.
E-portfolio has been used successfully for both learning and
assessment in a number of disciplines including the Arts,
Humanities and Social Sciences. In last few years computer
science and engineering education faculty and students have
been introduced to the concept of e-portfolios. Students have
found the advantages of e-portfolio to showcase their work
particularly for employment purposes.
A constructivist classroom using technology-based projects
provides authentic evidence of assessment as proof of student
learning. The very essence of constructivism, that learning
takes place in contexts where learners are engaged in critical
and reflective thinking, working in a collaborative and
cooperative environment intertwines with the implementation
of the e-portfolio system in higher education.E-portfolios have
been found to foster active learning, motivate learning and
empower students, which support the constructivist theory of
learning [15].
5. ISSUES IN THE IMPLEMENTATION OF
E-PORTFOLIOS
E -portfolios are not without their challenges. There are a
number of issues that include the time intensive nature of their
development; difficulties in mastering the use of the software;
and issues of privacy. Even more importantly, without a
central focus on reflection, e-portfolios may end up becoming
simply a collection of information rather than a mechanism for
the development of meaningful knowledge. Collaborative
activities and peer feedback should be made as integral part of
the e-portfolio.
Another challenge is to find e-portfolio strategies that meet the
needs of both the students, to support deep learning, and to
give the institution the information they need for grading and
accreditation purposes. Any assessment process requires the
aggregation of data for determining student quality, program
quality and continuous improvement. Since the fundamental
principle of a student-centered portfolio is to allow choice by
Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 189
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
the student in the collection of artifacts, aggregation of data
could be very difficult.
The difficulty lies on how to combine standards based
assessment with individualized assessment. According to Ahn
[1] e-portfolios do possess the potential to bridge these
conflictinggoals. The contents of the student’s portfolio can
demonstrate how the student has met the standards by using
hypertext links to connect the work to the standards it meets.
One of the critical aspects in this process is also the design and
development of the rubric for evaluation of e-portfolios [2].
Other issues facing schools or teachers who want to
implement portfolios are lack of availability of computers in
classrooms, blocked websites, software and hardware
problems, and time management.
When computers are not in the classroom the educational
institutions have computer labs to accommodate the needs of
the entire campus. The problems encountered when depending
on computer labs are availability, flexibility, and
dependability.
A number of technological barriers can also affect the
successful implementation of the electronic portfolio. E-
portfolios depend on the use of technology to contain its
contents and before beginning the portfolio process the
method of storage has to be considered. The issues with
integrating technology in an academic setting such as
accessibility and permission to enter certain websites and
adequate software and hardware can make things difficult for
the student and teacher [14].
6. CONCLUSION
An electronic portfolio is an extraordinary way for students to
learn technological skills, develop deep learning that requires
both critical and higher order thinking, with evidence of
learning through self-reflection. These are the valuable skills
sought after by universities and the workforce.
In the 21 century, e-Portfolios are becoming a prevalent way
to allow students to combine text, graphics, sound and video
to create a powerful multimedia demonstration of their
accomplishments [16]. Web-based e-Portfolios fit well with
the constructivist philosophy of education where students can
create their own meaning using platforms for student-authored
content and without being restricted by organizational
boundaries.
As the web-based e-portfolio are student-owned their
usefulness is expanded to include lifelong and life-wide
learning [6]. This career connection is also echoed in the
literature; for instance, the e-portfolio building process was
found to encourage students to think about their professional
knowledge, skills and abilities [5]. It would not be difficult to
believe that e-portfolio could someday be a requirement for
admission into a university and for getting a job.
E-portfolios are being touted as the biggest innovation in
educational technology since the introduction of course
management systems. Literature shows that electronic
portfolios, if done right can lead students to be life-long,
reflective and responsible learners [14].
7. ACKNOWLEDGEMENT
I wish to express my heartfelt gratitude to Dr. J.B. Singh,
Principal, Sri Guru Gobind Singh College of Commerce,
University of Delhi, for his encouragement and active support
in the writing of this paper.
REFERENCES
[1] Ahn, J. (2004). Electronic Portfolios: Blending Technology,
Accountability& Assessment. T H E Journal, 0192592X, Vol.
31, Issue 9
[2] Barrett, H. (2005). Researching electronic portfolios and learner
engagement. White Paper. Retrieved from
https://www.helenbarrett.com/reflect/whitepaper.pdf
[3] Barrett, H. & Wilkerson, Judy. (2004) Conflicting Paradigms in
Electronic Portfolio Approaches. Choosing an Electronic
Portfolio Strategy that Matches your Conceptual Framework.
Retrieved from
http://electronicportfolios.org/systems/paradigms.html
[4] Boshier, R., Mohapi, M., Moulton, G., Qayyum, A., Sadownik,
L., and Wilson, M., (1997) Best and worst dressed web courses:
Strutting into the 21st Century in comfort and style in Mitchell,
I., (Ed) Distance Education Vol 18, No 2. (pp 327 - 349)
[5] Buzzetto-More, N. (2010). Assessing the efficacy and
effectiveness of an ePortfolio used for summative assessment.
Interdisciplinary Journal of e-Learning and learning Objects, 6,
61-85. Retrieved from
http://www.ijello.org/Volume6/IJELLOv6p061-
085Buzzetto691.pdf
[6] Chen, H. L. (2009). Using ePortfolios to support lifelong and
lifewide learning. In Darren Cambridge, Barbara Cambridge,
and Kathleen Yancey (Eds.), Electronic portfolios 2.0:
Emergent research on implementationand impact (pp.29-35).
Sterling, VA: Stylus.
[7] Greeno, J. G., Collins, A. M., & Resnick, L. B. (1996).
Cognition and learning. Handbook of educational psychology.
Handbook of Educational Psychology. Retrieved from
http://psycnet.apa.org/psycinfo/1996-98614-001
[8] Gomez, S. (2004). Electronic portfolios in higher education.
Higher Education Academy Resources …. Retrieved from
http://www-
new1.heacademy.ac.uk/assets/Documents/resources/database/id
446_electronic_portfolios.pdf
[9] Husen, T. and Postlethwaite, T.N. (eds.) (1989); Constructivism
in Education. The International Encyclopedia of Education,
Supplement Vol.1. Oxford/New York: Pergamon Press, 162–
163. http://www.univie.ac.at/constructivism/EvG/papers/114.pdf
[10] Hussain, I. (2012). Use of Constructivist Approach in Higher
Education: An Instructors’ Observation. Creative Education,
03(2), 179–184. doi:10.4236/ce.2012.32028
[11] Jonassen, D. H., (1994). Thinking Technology: Toward a
constructivist design model. Educational Technology, 34(3), 34-
37.
Rupa Basu
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
190
[12] Kallio, E. (2012). Systematic constructivism applied to higher
education in Psychology. Pedagogy and the Human Sciences,
1(2), 56–58. Retrieved from
http://pedagogyandhumanscience.org/files/Kallio_PHSv2.pdf
[13] Lefoe, G. (1998). Creating Constructivist Learning
Environments on the Web:The Challenge in Higher Education.
Ascilite98, 453–464. Retrieved from
http://www.ascilite.org.au/conferences/wollongong98/asc98-
pdf/lefoe00162.pdf
[14] Lorenzo, G., & Ittelson, J. (2005). An overview of ePortfolios.
Boulder, CO: EDUCAUSE Learning Initiative. Retrieved from:
www.educause.edu/ir/library/pdf/ELI3001.pdf
[15] Mason, R., Pegler, C., & Weller, M. (2004). E-portfolios: An
assessment tool for online courses. British Journal of
Educational Technology, 35(6), 717–727. doi:10.1111/j.1467-
8535.2004.00429.x
[16] McWhorter, R. R., Delello, J. A., Roberts, P. B., Raisor, C. M.,
& Fowler, D. A. (2013). A cross-case analysis of the use of web-
based eportfolios in higher education. Journal of Information
Technology Education: Innovations in Practice, 12, 253-286.
Retrieved from:
http://www.jite.org/documents/Vol12/JITEv12IIPp253-
286McWhorter1238.pdf
[17] Means, B. (1995). Technology's role within constructivist
classrooms. Paper presented at the American Educational
Research Association. (ERIC Document Reproduction Service
No. ED383283)
[18] Skinner, B. F. (1948). Walden Two Indianapolis, IN: Hackett
Publishing Company.
[19] Smith, P. (2010, August 11). America’s best colleges: Catering
to the 21st
century learner. Forbes Online. Retrieved from:
http://www.forbes.com/2010/08/01/higher-education-college-
rankings-opinions-bestcolleges-10-smith.html
[20] Weegar, M. A., and Pacis, D. (2012). A Comparison of Two
Theories of Learning--Behaviorism and Constructivism as
applied to Face-to-Face and Online Learning. E-Leader Manila,
1–20. Retrieved from: http://www.g-
casa.com/conferences/manila/papers/Weegar.pdf
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 pp. 191-195
© Krishi Sanskriti Publications
http://www.krishisanskriti.org/acsit.html
State of the Art of Spell Checker Design for
Indian Languages: A Survey
Shivani1
and DharamVeer Sharma2
1
M. Tech, Department of Computer Science, Punjabi University Patiala, Punjab
2
Department of Computer Science, Punjabi University Patiala, Punjab
E-mail: 1
shivanigoyal95@gmail.com, 2
dveer72@hotmail.com
Abstract—For most of the common desktop applications, machine
translation systems, office Automation systems, Search engine etc.
spell checker plays a very important role. Commercially it is mainly
concerned with practical issues of fast response time, reduced
memory requirements and the user interface. Spell Checker is a basic
tool to identify misspelt words in the text and provides suggestions
for them from the database. The task of spell checker is vital in
providing correct and quality information through text. The Indian
languages are diverse and complex. Different Indian languages are
written in different scripts (Malay & English are in roman script,
Punjabi is in Arabic script, Hindi is in Devanagari script). Some
languages contain half characters, conjuncts which increases the
language complexity. Therefore, a large number of spell checker
systems (likeSUDHAAR[1], Annam[3], Shabdkosh.com etc.) have
been developed for different Indian languages. The user has difficulty
to understand, compare and select the most appropriate spell checker
due to this diversity. Thus, this survey paper provides a brief
overview on error detection and error correction techniques and
their capabilities and analysis of available spell checkers in Indian
languages and predicts the efficiency of the systems through their
ranking.
1. INTRODUCTION
Now days, Computer technology has become a part of human
life. Most of computer applications (like word processor,
email, blog writing, keyword searching) required a Spell
checker to detect incorrect words (due to mistyping or lack of
knowledge of language) and to reduce the effort and time of
user.
A Spell Checker is a program that checks the spelling of words
in a text document and provides suggestion for incorrectly
spelled words in a text document. The task of spell checker is
vital in providing correct and quality information through text.
Spell Checker follows basic Mechanisms[5]:-
1. Read a word as input from a text document.
2. Preprocess the word.
3. Check the word whether that word is available in
database.
4. If it is present then go to next one.
5. If word is not available then spell checker will check the
nearest matching pattern with it and add it in the form of
suggestions.
A Spell Checker has three component: An error detector that
detects misspelled words, a candidate spelling generator that
gives spelling suggestions for the detected misspelled words
and an error corrector that select the best correct spelling
suggestions out of the list of candidate spelling. Dictionary is
used as database in every Spell Checker.
The first spell checker was only designed for English and
languages similar to English. But, due to advancement in the
field of programming, there are many spell checkers for Indian
languages are developed besides the complexities found in
them. In this survey paper, various techniques of error
detection, error correction and available spell checkers in
Indian languages are discussed and efficiency of spell
checkers is evaluated through their ranks.
Error Analysis
Error is defined as a measure of the estimated difference
between the observed and calculated value. Most common
error occurs due to spelling or typing mistake. There are two
types of errors, Real word error and Non word error.
Further, According to Damerau[6] spelling errors are
classified as following:-
Typographic Error
These errors occur when the correct spelling of the word is
known, but the word is mistyped by mistake. These types of
errors are mostly related to the keyboard.
a. Insertion Error: Insertion error occurs due to insertion of
at least one extra letter in the desired word. For example: पखा
->पख
Shivani and DharamVeer Sharma
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
192
b. Deletion Error: Deletion error occurs due to deletion of at
least one letter from the desired word.
For example: सब->सेब
c. Substitution Error: Substitution error occurs when one or
more letters are replaced by some another letter. For example:
हस->हस, मु बई ->मुबई.
The substitution errors are mostly related to following reason:
• Different Way to Write Same Word. For example: िलये -
>िलए, बहुय ->बहुए
• Vowels with similar sounds. For example: ਿ◌◌ ->◌◌ੀ, ◌◌ੇ -
>◌◌ੈ, ◌ ->◌
• When a consonant set combines with the pancham Varna (ङ,
ञ, ण, न, म), Then it can be shown as an anuswar over the
consonant preceding it. For example: च चल -> चचल, क्गन -
>कगन.
d. Transposition Error: Transposition error occurs when two
adjacent letters are written in swapped way. For example:
कलम->कमल
e. Run- on Error [7]: Run-on errors occur when two or more
valid words are erroneously typed side by side without a space
in the middle of it. For example: इसक
े ->इसक
े , उसकी -
>उसकी.In the explained examples: इस, क
े , उस, कीare four
different words.
f. Split word Error [7]: These errors occur when there is
some additional space is embedded between the parts of the
word. For example: इसक
े ->इसक
े . In some cases, split word
errors may also give rise to real word errors.
2. PHONETICALLY SIMILAR CHARACTER ERROR
Phonetic error occurs when the correct spelling of the word is
known but the word is mistyped by mistake due to same
pronunciation. It can be categorized into following types:
 Class 1:ज->झ, ब->व, न->ण, ग ->घ
 Class 2: फ़ ->फ, ज़->ज, ग़ ->ग, ड़ ->ड
 Class 3:च चल -> चचल, पि डत->पिडत.
 Class 4: ◌ु-> ◌ू◌ਂ->◌, ◌ੇ->◌ੈ, ਿ◌->◌ੀ.
3. SPELL CHECKING STRATEGY
A. Error Detection
Error detection is a process of detecting the misspelt words in
the text with help of database. There are two efficiency
techniques for detection such type of errors.
1. N-gram Analysis Techniques[8]: N-gram is a method to
find incorrectly spelled words in a mass of text. N-gram is a
set of consecutive characters taken from a string with a length
of where n is a positive integer. N-gram tables can take on a
variety of forms. The easiest is a binary bi-gram array which
is 2D arrays whose elements represent all possible two letter
combinations of the alphabet. The value of each character in
the array is set to either 0 or 1 depending on whether that bi-
gram occurs in at least the word in a predefined lexicon or
dictionary .A binary tri-gram array would have three
dimensions. The above arrays are non-positional binary n-
gram arrays because they do not represent the position of the
n-gram within a word. The most of the structures of the
dictionary can be stored by a set of positional binary n-gram
array. For example, in a positional binary tri-gram array the
element at position a, b & c would have value 1 if only if there
exists at least one word in the dictionary with the letters l, m
and n in positions a, b and c. The trade-off for representing
more of the structure of the dictionary is the increase in
storage space required for the complete set of positional
arrays. Any word may be checked for errors by simply looking
up its corresponding entries in binary n-gram arrays to make
sure they are all 1’s(true).
2. Dictionary Lookup: A dictionary is a list of words that are
assumed to be correct. Dictionaries may be represented in
many forms, each with their own characteristics like speed and
storage requirements. The most common method of detecting
errors in a text is simply to look up every word in a dictionary.
The drawbacks of this method are to keep a dictionary up to
date, and sufficiently extensive to cover all the words in a text.
At the same time, response time also increases with the
increase in size of dictionary. Dictionary lookup and
construction techniques must be according to the purpose of
the dictionary. Too small a dictionary may give the user too
many false rejections of valid words, too large it may accept a
high number of valid low-frequency words. The most common
used technique to gain random and fast access to a dictionary
is Hash Table. To lookup Input string, one has to compute its
hash address and retrieve the word stored at that address in the
pre constructed hash table. If the word is different stored at the
hash address from the Input string or null, a misspelling is
indicated. For store a word in the dictionary first calculate
each hash function for the word and set the vector entries
State of the Art of Spell Checker Design for Indian Languages: A Survey 193
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
corresponding to the calculated values to 1(true). For find if a
word belongs to the dictionary or not, we calculate the hash
values for that word and look in the vector. If all entries
corresponding to the values are 1(true), then the word belongs
to the dictionary, otherwise not. The main disadvantage is the
need to devise a clever hash function that avoids collisions
without large hash table.
B. Error Correction
Error correction consists of two steps: the generation of
candidate corrections and the ranking of candidate corrections.
The candidate generation process usually makes use of a
precompiled table of legal n-grams to locate one or more
potential correction terms. The ranking process is used to
invoke some lexical similarity measure between the
misspelled word and the candidates or a probabilistic estimate
of the likelihood of the correction to rank order the candidates.
There are following techniques used for error correction:-
1. Morphological Analysis: The morphological analyzer
processes the word and delivers the root word, along with the
list of possible valid suffixes and prefixes. Out of these
affixes, the ones that closely match the affixes of the
misspelled word are selected and by attaching these affixes to
the root word a list of suggestions are arrived.
2. Soundex Method: The soundex code of the misspelled
word is generated, according to the devised coding scheme.
An approximate match is performed with the Soundex codes
of all the valid words present in the dictionary. A list
comprising of words Soundex codes of which closely match
those of misspelled word is built.
3. Edit Distance: Edit distance is a simple technique. It is
defined as the minimum number of editing operations (i.e.
insertions, deletions and substitutions) required to transform
one string into another. In other word, by applying the four
editing operations, which commonly generate typographic
errors i.e. addition, deletion, substitution and transposition of
letters, another list of suggestions are arrived. Edit distance is
useful for correcting errors resulting from keyboard input,
since these are often of the same kind as the allowed edit
operations. It is not quite as good for phonetic spelling error
correction, especially when the difference between spelling
and pronunciation is big as in English or French.
4. Rule Based Technique: Rule-based techniques are
algorithms or heuristic programs that represent knowledge of
common spelling error patterns in the form of rules for
converting misspellings into valid words. The candidate
generation process consists of applying all applicable rules to
a misspelled string and retaining every valid lexicon word
those results. Ranking is frequently done by assigning a
numerical score to each candidate based on a predefined
estimate of the probability of having made the particular error
that the invoked rule corrected.
5. N-gram Based Techniques: N-gram analysis has already
been described earlier in error detection module. Letter n-
grams, including trigrams, bigrams, and/or unigrams, have
been used in a variety of ways in text recognition and spelling
correction techniques. They have been used in OCR correctors
to capture the lexical syntax of a dictionary and to suggest
legal corrections.
4. ANALYSIS OF AVAILABLE SPELL CHECKERS
IN INDIAN LANGUAGES
The Indian languages are diverse and complex. Some
languages contain half characters, conjuncts which increases
the language complexity. Different Indian languages are
written in different scripts (like Malay & English are in roman
script, Punjabi &Urdu are in Arabic script, Hindi is in
Devanagari script). Therefore, a large number of spell checker
systems have been developed for different Indian languages
using above techniques. This section provides the analysis of
available spell checkers in Indian languages and predicts the
efficiency of the systems through their ranking.
A. Sanskrit Spell Checker
Sanskrit called the mother of all Indian languages. All the
Indian languages are expected to be derived from Sanskrit
language. Sanskrit is free ordering language (or syntax free
language) &there is no ambiguity in the form of the words
even if the order changes. A Morphological based spell
checker has been designed for Sanskrit. An algorithm has been
designed to check the validity of a word. If the word is not
found in the vocabulary, then the word is scanned from right
to left to identify a valid suffix string such that it occurs in at
least one rule. If such a rule is not found then the word is
rejected as invalid and the system proceeds further. After this,
at rear end of the word a transformation is carried out to obtain
a pruned word. If it is found in the vocabulary or any other
rule is applicable to the word obtained then the word is valid.
But if no rule is applicable then the word is declared as invalid
and a suggestion list is generated. The Spellchecker is
implemented in Java. For display, the documents are
converted into Unicode. The morphological analysis of a word
serves as a foundation for POS- tagging. Similarly, it is being
used in stemming for searching root words in Sanskrit
Wordnet.
B. NAAVI (Oriya Spell Checker)
It is online spell checker. It deals with the error detection and
either automatic or manual correction for the words that have
been misspelled. Some algorithms have been developed in
order to find the most accurate and appropriate results. The
searching techniques that have been employed are very fast in
Shivani and DharamVeer Sharma
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
194
processing such that it processes 170000 Oriya words for each
misspelled word. The words in the dictionary are stored
according to the word length for effective searching. It also
takes help of the Oriya Morphological Analyzer for
ascertaining the mistakes of inflection, derived and
compounding words. Oriya Spell Checker is being
successfully running embedded in a word processor. Using the
similar technique a Hindi Spell Checker with 270000 words
and an English Spell Checker with 20000 words has also been
designed for word processor. This software is designed using
Java and Java Swing for both the Windows-98/2000/NT and
the Linux O/S.
C. Malayalam Spell Checker
In Malayalam, a large number of words can be derived from a
root word, a purely dictionary based approach for Spell
Checking is not practical. Hence a ‘Rule cum Dictionary’
based approach is followed. The grammatical behavior of the
language, the formation of words with multiple suffixes and
the preparation of the language module are dealt with in detail.
The different modules in the Spell Checker Engine viz.
Morphological Analyzer, Morphological Generator, Error
detection and suggestion generation is done. It splits the input
word into root word, suffixes, post positions etc. and checks
the validity of each using the rule database. Finally it will
check the dictionary to find whether the root word is present in
the dictionary. If anything goes wrong in this checking it is
detected as an error and the error word is reprocessed to get 3
to 4 valid words, which are displayed as suggestion. This spell
checker is a subsystem developed by CDAC,
Tiruvananthpuram, which could be integrated in larger
applications like Microsoft word or any word processor as a
macro. While running as a macro in word, it functions as an
offline spell checker in the sense that one can use this software
with a previously typed text file only. Both off line and online
checking are possible when it is integrated with the text editor.
It generates suggestions for wrongly spelt words.
D. Annam (Tamil Spell Checker)
Tamil Spell checker helps the user to identify most of
mistyping error. It is available both offline and online. The
task implemented in Tamil Spell checker are Case marker,
postposition checking for nouns, Adjective checking for
nouns, Case ending and PNG marker checking for verbs,
Adverb checking, and Adjacent key errors checking. The
applications of the Tamil Spell checker are Word processors,
search engines, information filtering and extraction systems,
and machine translation systems. The modules extract the root
word from the given word (noun/verb) with the help of
Morphological Analyzer and the root word is checked in the
dictionary and if found, the word is termed as correct word.
Otherwise, the correction process is activated. The correction
process includes error handling and suggestion generation
modules. After finding the type of error, the right form of
suffixes; nouns or verbs are given as input to suggestion
generation module. With the help of Morphological Generator,
the correct word is generated. This module also handles the
operations like select, change or ignores the suggested word
and adding the word to the dictionary.
E. Akshara (Telugu Spell Checker)
A pure corpus based statistical stemming algorithm has been
developed for Telugu. The performance of this stemmer for
the spell checking application has been studied in various
combinations with dictionary and morphology based
approaches. Large scale spelling error data has been obtained
from 10 Million word Telugu corpus. The raw corpus as it was
typed has been compared with the final version after three
levels of proof reading and certification by qualified and
experienced proof readers. A number of tools have been
developed to prepare such a data. Since words are large and
complex and hence too numerous in Telugu and proper
morphological analysis is difficult, it would be useful to
perform studies at lower levels of linguistic units. The syllable
level is a natural choice since writing in Indian languages is
primarily syllabic in nature. N-gram models have been built at
syllable level.
F. Assamese Spell Checker
The Spell Checker exists in the form of separate modules for
error detection and correction, as well as a stand-alone system
in which all the spell checking routines have been integrated.
The non-words are detected by looking up text words in a
dictionary of valid words. The dictionary used is actually a
word list of around 72000 Assamese words. A hash table has
been used as a lexical lookup data structure. A Soundex
encoding scheme for Assamese has been designed based on
the encoding scheme for English which comprises of a set of
rules for encoding words and 14 numerical codes. The
Soundex code of the misspell word is computed, & the
dictionary is searched for words, which have similar codes.
For ranking the suggestions, the technique of Levenshtein edit
distance technique is used.
G. Marathi Spell Checker
In this ongoing project, a standalone spell checker is being
built for Marathi. From the Central Institute of Indian
Language (CIIL) corpus 13000 distinct words approximately
have been listed. Similarly different Marathi texts are being
used to build up the Dictionary. Morphological Analyzing is
also being carried out on the words listed in the dictionary. For
example, an automatic grouping algorithm identified 3,975
groups out of 12,886 distinct words. First word is usually the
root word. Thus, there are approximately 4000 root words
from Marathi corpus. A manual proof reading will be done on
these results. Further enhancements of derivational morphology will
help in increasing the vocabulary. Besides enhancing word lists and
rules, enhancements for representing rules for ordering of multiple
State of the Art of Spell Checker Design for Indian Languages: A Survey 195
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
suffixes in all part of speech categories are required. More elaborate
orthographic rules need to be incorporated. Morphology based
spellchecker may be extended to include further syntactic and
semantic analysis. Besides spellchecking, the morphology based
analysis is currently being used in a few applications at the Center for
Indian Languages. A motivation behind the stand-alone spellchecker
is that it can be used without an editor through a packaged interface,
or it can be integrated with other compatible applications such as
OCR.
Table 1: Rank of Marathi Spell Checker
Name of Spell checker Khandbahale.com
Global rank 320,723
India rank 30,873
Daily page viewer per visitor 2.50
H. Bangla Spell checker
The first Bangla Spell Checker was designed by
BidyutBaranChaudhuri. The technique works in two stages.
The first stage takes care of phonetic similarity error. For that
the phonetically similar characters are mapped into single
units of character code. A phonetically similar but wrongly
spelt word can be easily corrected using this dictionary. The
second stage takes care of errors other than phonetic
similarity. It works in both online and offline mode. The spell
checker was embedded in a word processor. If there is only
single error in the misspelled word then the most appropriate
suggestion is found in the top four words of the suggestion
list. But suggestions cannot be given on some inflected words.
It also has a special feature to add words in the dictionary
against which spellings are checked. The basic purpose of the
spell checker is to detect the erroneous word and either
suggests correct alternatives or automatically replace it by the
appropriate word.
Table 2: Rank of Bangla Spell Checker
Name of Spell checker Shuddhoshabdo.com
Global rank 19,779,445
India rank N/A
Daily page viewer per visitor 1
I. Hindi Spell Checker
The important factors in the design of Hindi spell checker are:
the dictionary data structure, inclusion of the equivalent
English words, features of auto correction in the Hindi word in
case of wrong entry by the user. The wrong entry here means
spelling mistake of one character missing, matra mistakes
(more than one also), mistake in the usage of half consonant.
Table 3: Rank of Hindi Spell Checker
Name of Spell checker Shabdkosh.com
Global rank 3,497
India rank 296
Daily page viewer per visitor 4.62
J. Akhar (Punjabi Spell Checker)
Akhar is a Bilingual spell checker. It is available offline. It is a
language sensitive spell checker i.e., if text is entered in
English then English spell checker is invoked or if text is
entered in Punjabi then Punjabi Spell Checker is invoked. It is
a font independent spell checker and it can work on any
popular Punjabi fonts such as, Anantpur Sahib, Amritlipi,
Jasmine, Punjabi, Satluj etc. This removes the contrast on the
user to type the text in pre-defined font only.
5. CONCLUSION
This paper presents the area of Spell checking Strategy and
Analysis of errors. It has surveyed on various errors detection
and error correction techniques that are helpful in finding the
errors. This paper also mentioned the influence of Indian
languages and has surveyed on the available spell checker in
different Indian languages. In future, author will design and
implement new Spell Checker for Hindi language.
REFERENCES
[1] RupinderdeepKaur and Parteek Bhatia, “Design and Implementation of
SUDHAAR-Punjabi Spell Checker,” International Journal of
Information and Telecommunication Technology, Vol. 1, Issue 15,
pp.0976-5972 May, 2010.
[2] Daniel Jurafsky, James H. Martin, Speech and Language Processing,
PEARSON, 2nd ed, September 1999.
[3] T.V. Geeta, RajaniParthearath, “Tamil Spellchecker”, Resource centre
for Indian language Technology Solution, Tamil Internet, Chennai,
Tamil Nadu, India, 2003.
[4] Neha Gupta, PratisthaMathur, “Spell Checking Techniques in NLP: A
Survey,” International Journal of Advanced Research in Computer
Science and Software Engineering, Vol. 2, Issue 12, pp. 217-221,
December 2012.
[5] Gurpreet Singh Lehal, “Design and Implementation of Punjabi Spell
Checker”, International Journal of Systemics, Cybemetics and
Infomatics, pp.70-75, Jan. 2007.
[6] F.J. Damerau, "A technique for computer detection and correction of
spelling errors", Communication of ACM, pp. 171-176, 1964.
[7] P.Kundra, B.B.Charudhari (1999), “Error pattern in Bangla text”,
International Journal of Dravidian Linguistics, 28(2), 1999.
[8] E.M. Riseman, A. R. Hanson, "A Contextual Post Processing System for
Error Correction using binary n-grams", IEEE Transactions on
Computer, Volume. 23, Issue 5, pp. 480-493, May 1974.
[9] SanghamitraMohanty,“Analysis and Design of Oriya Morphological
Analyzer: Some Tests with OriNet”, TDIL Newsletter, March 2004.
[10] NamrataTapaswi, Suresh Jain, VaishaliChourey, “Morphological-based
Spellchecker for Sanskrit Sentences”, International Journal of Scientific
& Technology Research, Volume 1, Issue 3, pp. 1-4, April 2012.
[11] Monisha Das, S. Borgohain, JuliGogoi, S. B. Nair, "Design and
Implementation of a Spell Checker for Assamese", Language
Engineering Conference(LEC'02), pp.156, Dec. 2002.
[12] Veena Dixit, Satish Dethe, Rushikesh K. Joshi, “Design and
Implementation of a Morphology-based Spellchecker for Marathi”,
TDIL Newsletter, 2006.
[13] Santhosh. T. Varghese; R. Ravindra Kumar; K.G.Sulochana,
“Malayalam Spell Checker”, International Conference on Universal
Knowledge and Language, RCILTS-Malayalam. Goa, pp.5.3.38,
November.2002
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 pp. 196-200
© Krishi Sanskriti Publications
http://www.krishisanskriti.org/acsit.html
Addressing Cloud Computing Security Concerns
Vasundhara Bhatia1
, NehaPrabhakar2
and SumatiManchanda3
1,2,3
Amity School of Engg. and Technology Amity University, Noida, Uttar Pradesh
E-mail: 1
vasundhara.bhatia9@gmail.com, 2
nehaprabhakar91@gmail.com, 3
matimanchanda@gmail.com
Abstract—Cloud computing is an upcoming model which provides
various services over the network. One can share resources, request
for various services or store their data at another site very
conveniently. It is excessively used these days by a number of users.
Cloud has a number of advantages which makes it a widely used
model these days. Cloud computing offers the facility of paying for
only the amount of resources that are required by a particular user at
some time, thus, it provides cost saving. But cloud computing has
issues, which still makes many organizations to follow the old
traditional approach. We discover that security issue is one of the
major issues in cloud. Security has to be kept in mind in any field and
also in cloud computing. In this paper we discuss some of the security
issues which affect the cloud computing system. We analyse the
basics of cloud computing, characteristics, advantages, models and
most importantly the security issues that it faces.
1. INTRODUCTION
Cloud computing refers to using and utilizing services
provided by a third party. These services may be applications,
development environment, storage etc. Instead of storing
applications or documents on one’s own personal computer,
one can pay for cloud services where the data may be stored or
the required services may be provided through the cloud
vendor’s servers. The person has to pay for only what they use
and the resources can be minimized and expanded according
to the user’s needs. An application developer uses cloud
services to gain more processing power, development
environment or storage facility. An end user mostly uses
applications which are provided by a developer or storage
space. The major benefit is that the services are accessible
from wherever you are which removes any limitations that one
can only access their documents or applications only through
their personal computers or laptops. All one needs is an
internet connection and any device which connects to the
cloud server to provide the required services [1].
2. CHARACTERISTICS OF CLOUD COMPUTING
 Cloud computing offers an important facility in which the
cloud resources are demanded as and when they are
required. It gives user the authority to use the cloud
resources only when the user needs to use it.
 Cloud computing offers scalability services. It allows
users of cloud to request for some services as and when
they are required. These capabilities can be scaled out, i.e.
expanded or scaled in, i.e. some services can be released
quickly. This allows users to use only those services that
are essential to them or use the services which are
additionally required.
 The resources that are hosted by a cloud vendor can be
accessed from a wide range of locations and these
resources can be accessed through a variety of devices
such as laptops, computers, mobile phones etc. This
allows the cloud resources to be accessed from anywhere
at any time. So the services are always available to the
user.
 The cloud vendor provides shared resources to various
users which serves multiple users at the same time. It uses
the multi-tenant model which has consumers with
different virtual and physical addresses. Sharing allows
the utilization of resources that are provided by the
vendor.
 Cloud computing systems have a facility that tries to
measure and keep a track of storage or processing and
many more. The usage of the resource can be monitored
and controlled which provides transparency for both the
vendor and the user. This controlling allows the user and
vendor to be aware of the services that are used and that
are required [2].
3. ADVANTAGES OF CLOUD COMPUTING
 Providing the amount of storage required: When one
stores data or information in the cloud then one can get a
capacity of almost unlimited storage. It is the
responsibility of the cloud vendor to provide the amount
of storage necessary for the user. In the traditional system,
the users had to worry about increasing the storage
capacity according to the requirements, but cloud
facilitates the users to have as much as space needed for
storage. The users are charged for only what they use.
 Easy recovery and backup is provided: Since, all the data
is stored in the cloud so backing up the data that is stored
at the cloud vendor’s site is much easier than storing and
backing up on a physical device or your own device.
Cloud vendors ensure that backup is provided so a user
does not have to worry about constantly backing up their
data.
Addressing Cloud Computing Security Concerns 197
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
 Automatic integration of software: This allows the users
not to worry on how their cloud services should be
customized and integrated as per their requirements. One
can simply pick and carefully select only those services
and software applications that you think are suitable for
you. The user just has the responsibility to provide their
requirements to the cloud vendor and the cloud vendor
may automatically integrate the software according to the
desired requirements.
 Access to information is simple: The information can be
accessed from anywhere. This is because once a user
starts to use a cloud service then the user only needs an
internet connection, which are easily available these days.
The cloud computing services can be provided on smart
phones, laptops, tablets etc. Whenever a user wishes to
access some information from the cloud, the user only
needs an internet connection and a device to use it.
 Fast and easy deployment: Cloud computing provides you
the advantage and benefits of quickly deploying an
application. When cloud system is chosen then the system
which has to be deployed can be done in very few
minutes. But the time depends on the technology that is
needed for a particular user. The time of deployment
varies from one user to another. The user can easily
deploy the application that he/she wishes to deploy within
a very short duration. [3]
 Saving money: Cloud computing is very cost effective
method to use. It is also easy to maintain and upgrade
which helps to reduce the cost. When users are using the
earlier methods, more cost is required in them when
compared to cloud computing methods. This is because,
additional licensing fees is required for various software.
Various cloud vendors may provide different rates so a
user has the option to choose the vendor with the cheaper
rates and thus expenses are reduced.
 Globalization of workforce: Since all the data is stored on
cloud, people having a simple internet connection can
access the required resources. This helps in globalization
and employment of workforce globally, since employees
working in a different part of the world can have a quick
access to the required resources. [4]
4. SERVICE MODELS
There are three types of cloud services that are provided by a
cloud model [2,5,9]:
4.1 Software as a Service (SaaS)
This is the top most layers of the services which is provided
by the cloud. It provides the capability to the user to use the
vendor’s applications running on a cloud infrastructure
provided by the vendor. It provides the users with applications
and services which can be used directly by a user which can
easily be accessed from several client devices which provides
on-demand services.
4.1 Platform as a Service (PaaS)
It is the middle layer of the cloud services. A user can deploy
his applications on the cloud without installing any platform
on which the application is to be deployed. PaaS provides
platform layer resources, which includes the support of the
operating system and the frameworks which are used for
development of various services. These services control the
installed applications and available hosting environment
configuration.It provides user with the option to deploy on the
cloud, various technologies and applications which are
developed by a user or various other applications that may be
supported by the vendor.
4.2 Infrastructure as a Service (IaaS)
This layer is the bottom layer of the three layers and it
provides infrastructure services. These services may include
resources such as memory, CPU and storage. The service that
is provided to the user involves storage, processing, networks
and various other computing resources.
Fig. 1: Three Layers of Cloud Computing
All of these three services are related to each other but
understanding their relationships and dependencies is critical
to understanding the risks of cloud computing security [12].
IaaS is the bottom layer which forms the basic formation of all
the services. The PaaS builds upon IaaS and SaaS builds upon
PaaS. All these services are provided directly to the
user/client.
5. DEPLOYMENT MODELS
The major factor to provide a secure cloud computing is the
type of cloud to be implemented. The types of cloud
deployment models offered are[7,6,6,7]:
5.1 Private cloud
This type of cloud is only used for a particular organization or
a group of people. It may be managed by the organization
which is using it, which has the access to this cloud or third
party. It is can be also named as internal cloud. The
organization or the people are responsible for setting up the
Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
198
cloud according to their own needs and maintaining them.
Thus any organization can take better control of the services
and all the work done within their cloud. Since only the
organization has the access to this private cloud, so it is more
secure.
5.2 Community cloud
This type of cloud infrastructure is used by particular groups
of organizations or communities. It is a semi-private cloud
which is available to only those groups which have access to
it. The community cloud acts as a private cloud for a particular
community. Only the users that have access to this community
cloud can access the services and resources provided by it.
5.3 Public cloud
This type of cloud infrastructure is used to provide services to
a lot of public or large group people. Public cloud is the cloud
services which is provided by third parties and hosted and
managed by the service providers or the vendors. All the cloud
vendors have the responsibility to manage the installation,
maintaining and providing services to the user. There is a huge
potential for cost saving. Users are charged according the
services and the resources they use. Major drawback of this
type of model is the lack of security. This is because the
resources and services are provided by a cloud vendor who
also provides services to various unknown users. The public
cloud vendors often use the multi-tenancy model in which the
various users share the same resources. Since the resources are
shared and the separation is vulnerable, the data and
application of one organization may have a threat to be
exposed to another unknown user.
5.4 Hybrid cloud
Hybrid cloud is composed of a number of clouds. These
clouds could be private, public or community clouds. They
remain independent from each other but they remain together
by a technology that enables the user to access the data and the
application. The responsibilities of managing the cloud are
divided amongst the organizations using the cloud and the
public cloud vendors.
6. SECURITY CHALLENGES IN CLOUD
There was a survey which was conducted by International
Data Corporation (IDC) IT group in order to rate the cloud
services and know more about its issues in 2008 [2]. This
survey was conducted in 224 IT executives. The IT executives
were asked to rate which cloud computing issue is of the
maximum concern. The following Fig. shows the percentage
of the individual issues that are found in cloud.
Fig. 2: Survey of Issues in Cloud
This survey conveys that the percentage of cloud security
issues is found to be 74.6%, which is the highest percentage
amongst all the issues that are considered in the survey.
It can be concluded that that security is the major concern and
it comes with a lot of threats in cloud computing [13,19]. That
is the reason that cloud computing security issues are given a
huge attention so that they may be prevented. It is extremely
important to face these issues to make cloud computing a
better and safer environment which can be expanded and used
by various people.
7. EVALUATION OF SECURITY
Evaluating how secure is a particular cloud system is a crucial
task [14]. For evaluating the security of a cloud there are
certain objectives that could be taken into consideration. The
objectives that are considered an important part for a cloud to
be secure are [8]:
 Confidentiality: Confidentiality means that only
authorized people, parties or systems have the ability to
access any protected data. Every user or organization that
opts for the services of a cloud vendor always wants that
the information and the organizational data must remain
secure. This should be done only by providing access to
the users that the organization allows. Even the cloud
vendor must not have access to a cloud user’s private
data. Since cloud services are provided to multiple users
sharing the same resources, devices and applications, the
risk that the data is compromised is increased to a high
level.
 Integrity: Integrity means that the information or the
resources that belong to a particular user can be modified
only by the people who are authorized and in an
authorized way.It means that the data must be protected
from deletion, modification or addition to the existing
data by an unauthorized person. Data and services of an
organization must not be stolen or misused. Any change
in the data should only be done by the person who has an
authorized access provided by the cloud user itself. It is
Addressing Cloud Computing Security Concerns 199
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
essential to respect one’s privacy and this should also be
accepted in terms of cloud.
 Availability: Availability means that a system is
accessible and it can be used when it is in demand by the
authorized person. The cloud vendor must always keep a
backup of the resources and data to ensure that the cloud
user is always provided with the required services even
under difficult circumstances. Availability is not only
limited to data and software but also hardware being
available to authorized users when it is needed. The cloud
owner must ensure that the services are available to the
user as and when they are required.
8. WHY SECURITY IS A MAJOR CONCERN
 Lack of employee confidence and poor recruitment
practices: There are some cloud vendors who may not
perform background checks of their employeesor service
providers. It is possible that the person might misuse the
private data of an organization. The cloud vendors often
do not check personally on the people they hire who may
harm the vendor or the users later. Some special users
such as cloud administrators usually have unlimited
access to the data present in the cloud which may not be
acceptable to a cloud user.
 Lack of checking background of customers: Most cloud
vendors do not make the effort to check the background
of the customer they are providing. This gives a threat that
almost anyone can open an account that has a valid credit
card and an email. Some fake accounts can let attackers
perform any malicious activity without being identified
and tracked. One user may gain access to the resources
and data of the data which compromises the security of
another cloud user.
 Lack of education regarding security: People have been a
weak point in the knowledge about information security.
This case is true in any type of organization or company.
In the cloud there is more impact because there are more
number of people that have to use the cloud. These people
are cloud vendors, third party vendors, suppliers,
customers of organizations [2].
9. SECURITY ISSUES
The various security issues that are encountered when using
cloud computing are as follows.
9.1 Data Security
Data security is a major concern everywhere, but it is a major
problem when the users have to rely on the vendors for
providing proper and essential security. In traditional
application deployment, the data resides within the boundary
of the organization itself and it has physical and logical
security access policies. These type of data breaches and
issues in the data security often occur in cases of public cloud
because the cloud users have less control over the data and
resources that are present at the vendor’s site. Storing the data
at another site always has the risks that it can be accessed by
some other party [17]. It can be accessed by the vendor itself
or by another cloud user which the cloud vendor serves.It is an
extremely important responsibility of the vendor to apply
strong encryption techniques so that the data is secure and
only selective people can control and access the data [10]. The
cloud vendor should ensure that only the people who are
authorized by the cloud user can change, add, modify or delete
any information of the cloud user. The cloud vendor must not
have any control whatsoever to change any information that
belongs to the user. Backup and recovery of data is another
issue. There may be certain circumstances where the data at
the vendor’s site may be lost or compromised. In such a case,
the vendors often have a backup somewhere else to ensure that
the data is always available to the cloud user. But, keeping a
backup at different locations or sites may not ensure that the
data is in safe hands.
9.2 Multi-tenancy
In public cloud services the user shares the resources and
components with other users at the vendor’s site [7]. These
users may be unknown to them. In a multitenant environment,
many customers share the same application, which uses
similar operating system, on the same hardware, with the same
functionalities of data storage. The differentiation amongst the
data of a particular user is made on the application layer. Multi
tenancy allows for cost savings for the vendor and thus may
also provide cost saving for the cloud user. This is possible
because various resources are shared among various users so
the cloud vendor does not need to install additional
infrastructure for different users. Since the vendor saves
money so it is possible that the vendor offers these services to
the users for less cost. Using resources from a multitenant
environment poses risk to the resources and data of one user
from another. An attacker could simply be another cloud user
and may discover the vulnerabilities that the cloud
environment is having. The separation between the different
users may be have been overcome and the data and resources
of another user can be accessed by an attacker who poses as a
user to the vendor [11]. The risk of an attacker posing as a user
often increases because the vendors do not have background
checks on the users there are going to provide services.
Vendors simply think of their benefit and ignore the cause that
and if a user is not as he poses to be then he might cause loss
to the vendor.
9.3 Application Security
Applications are delivered and used via the Internet through a
Web browser. SaaS provides the software which is deployed
over the internet and is also deployed to run behind a firewall
in local area network or personal computer [10]. People who
attackers the applications they use the web to gain access of
user’s information and perform malicious activities such as
Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
200
steal sensitive data of a user etc. [5]. The threats that might be
present in a cloud based environment are generally more than
the traditional system. It is also possible that tenants using the
same SaaS infrastructure, gains access to the data of another
tenant through the vulnerability in the web layer.
9.4 Trusted Third-party
A trusted third party provides secure interaction between two
parties who trust a third party. These trusted third parties
provide various security services which are based on
standards. They are useful across various geographical areas,
domains and specialization sectors. These third parties provide
an assurance of trust between two parties by special
techniques and mechanisms [16]. So it becomes necessary to
choose the correct third party which provides appropriate
mechanism for the secure interaction between the two parties.
A high level of trust and reliability has to be established
because if the third party does not provide the correct means
then it may lead to the information and data of a party to be
insecure. The two parties rely on the third party to perform
various functions such as cryptographic separation of data
which encrypts the data and ensures that the data is not visible
to any outsider and server and client authentication in which
both the interaction parties require to certify their server and
network devices.
9.5 Service Level Agreement
Service level agreements are the contracts which are signed by
a cloud vendor provided by the cloud user. It specifies the
services that are to be provided by the cloud vendor to the
user.The service level agreements, also defines the terms and
conditions and period of service to be provided. If the service
provided by the vendor is to be discontinued by the user then
the conditions for termination are decided at the initial level
itself. In case the termination of the agreement between the
cloud user and vendor is to be performed then removal of the
user data from the vendor’s site after termination is to be done
[1]. This should be ensured that the data is removed after
termination of services otherwise the cloud vendor may
misuse the user’s data.The authentication and authorization is
specified to identify who can access the services. This is a
crucial part because it defines who can access the data and
services of the user. These conditions should be correctly
represented to ensure that the vendor or any third party may
not find something faulty in it and gains access to the user
data. The vendor has to clearly specify the services that will be
provided to the user. It also includes the measures that the
vendor will take to ensure security. Information about any
backup that is to be done in any scenarios is also to be given.
If a cloud vendor is unsatisfactory in any of the conditions that
are provided in these agreements then legal action may be
taken using these service level agreements. These ensure that
what user expects and what the vendor provides is clearly
specified in these agreements so that no expectation gaps
occur between the user and vendor. It represents clarity in the
understanding of the services to both the vendor and the user.
10. CONCLUSION
Thus, we can observe that even though cloud computing offers
enumerable advantages but at the same time one faces with a
variety of issues. It becomes the responsibility of every cloud
user to be aware of both the advantages and disadvantages of
the cloud services in order to use the cloud services efficiently
and securely.
REFERENCES
[1] National Institute Of Standard and technology.
csrc.nist.gov/groups/ SNS/cloud-computing/cloud-def-v15.doc,
2009
[2] Rajesh et al , International Journal of Advanced Research in
Computer Science and Software Engineering 2 (9), September-
2012, pp. 115-120
[3] http://mobiledevices.about.com/od/additionalresources/a/Cloud-
Computing-Is-It-Really-All-That-Beneficial.htm
[4] http://www.verio.com/resource-center/articles/cloud-computing-
benefits/
[5] Hashizume et al.: An analysis of security issues for cloud
computing. Journal of Internet Services and Applications 2013
4:5.
[6] Florin OGIGAU-NEAMTIU, CLOUD COMPUTING
SECURITY ISSUES,Journal of Defense Resource
Management,Vol. 3,Issue 2(5)/2012
[7] ABHA THAKRAL SACHDEV* et al ISSN: 2319 - 1163
Volume: 2 Issue: 2 126 – 130
[8] D. Zissis, D. Lekkas / Future Generation Computer Systems 28
(2012) 583–592
[9] Wayne A. Jansen, NIST, Proceedings of the 44th Hawaii
International Conference on System Sciences – 2011 Cloud
Hooks: Security and Privacy Issues in Cloud Computing
[10] S. Subashini, V. Kavitha / Journal of Network and Computer
Applications 34 (2011) 1–11
[11] National Institute of Standards and Technology Special
Publication 800-144 80 pages (December 2011)
[12] http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pd
f
[13] GregBoss, Padma Malladi, Dennis Quan, Linda Legregni and
Harold hall 2007. Cloud Computing.Available from
www.ibm.com/developerworks/websphere/zones/hipods/.
[14] Anthony T.Velte, Toby J.Velte and Robert Elsenpeter 2010.
Cloud Computing- A Practical Approach. Publishing of Tata
McGRAWHil.
[15] Mohamed Al Morsy, John Grundy and Ingo Müller, An
Analysis of The Cloud Computing Security Problem, In
Proceedings of APSEC 2010 Cloud Workshop, Sydney,
Australia, 30th Nov 2010.
[16] Kevin Hamlen et al.: Security Issues for Cloud Computing,
International Journal of Information Security and Privacy, 4(2),
39-51, April-June 2010
[17] 2009. Cloud Computing: An Overview, Pages 2 (June 2009), 2
pages. DOI=10.1145/1538947.1554608
http://doi.acm.org/10.1145/1538947.1554608
[18] Basta, A., &Halton, W. (2007). Computer Security and
Penetration Testing (1st ed.). Delmar Cengage Learning.
[19] NitashaHasteer ,AbhayBansal , B. K. Murthy, Pragmatic
assessment of research intensive areas in cloud: a systematic
review, ACM SIGSOFT Software Engineering Notes, v.38 n.3,
May 2013
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology
Advances In Computer Science And Information Technology

More Related Content

Similar to Advances In Computer Science And Information Technology

Similar to Advances In Computer Science And Information Technology (20)

Journal of Structural Engineering and Management vol 3 issue 3
Journal of Structural Engineering and Management vol 3 issue 3Journal of Structural Engineering and Management vol 3 issue 3
Journal of Structural Engineering and Management vol 3 issue 3
 
Journal of Mechatronics and Automation vol 3 issue 3
Journal of Mechatronics and Automation vol 3 issue 3Journal of Mechatronics and Automation vol 3 issue 3
Journal of Mechatronics and Automation vol 3 issue 3
 
Journal of NanoScience , NanoEngineering & Applications vol 6 issue 3
Journal of NanoScience , NanoEngineering & Applications vol 6 issue 3Journal of NanoScience , NanoEngineering & Applications vol 6 issue 3
Journal of NanoScience , NanoEngineering & Applications vol 6 issue 3
 
Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3
 
Trends in Mechanical Engineering & Technology vol 6 issue 3
Trends in Mechanical Engineering & Technology vol 6 issue 3Trends in Mechanical Engineering & Technology vol 6 issue 3
Trends in Mechanical Engineering & Technology vol 6 issue 3
 
International Journal of Distributed Computing and Technology vol 2 issue 1
International Journal of Distributed Computing and Technology vol 2 issue 1International Journal of Distributed Computing and Technology vol 2 issue 1
International Journal of Distributed Computing and Technology vol 2 issue 1
 
Research & Reviews: Journal of Medical Science and Technology vol 5 issue 3
Research & Reviews: Journal of Medical Science and Technology vol 5 issue 3Research & Reviews: Journal of Medical Science and Technology vol 5 issue 3
Research & Reviews: Journal of Medical Science and Technology vol 5 issue 3
 
Research & Reviews A Journal of Immunology vol 6 issue 3
Research & Reviews A Journal of Immunology vol 6 issue 3Research & Reviews A Journal of Immunology vol 6 issue 3
Research & Reviews A Journal of Immunology vol 6 issue 3
 
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
 
Research & Reviews A Journal of Biotechnology vol 6 issue 3
Research & Reviews A Journal of Biotechnology vol 6 issue 3Research & Reviews A Journal of Biotechnology vol 6 issue 3
Research & Reviews A Journal of Biotechnology vol 6 issue 3
 
Journal of Water Pollution & Purification Research vol 3 issue 3
Journal of Water Pollution & Purification Research vol 3 issue 3Journal of Water Pollution & Purification Research vol 3 issue 3
Journal of Water Pollution & Purification Research vol 3 issue 3
 
Journal of Industrial Safety Engineering vol 3 issue 3
Journal of Industrial Safety Engineering vol 3 issue 3Journal of Industrial Safety Engineering vol 3 issue 3
Journal of Industrial Safety Engineering vol 3 issue 3
 
Journal of Nursing science & practice vol 6 issue 3
Journal of Nursing science & practice vol 6 issue 3Journal of Nursing science & practice vol 6 issue 3
Journal of Nursing science & practice vol 6 issue 3
 
Research & Reviews: Journal of Surgery vol 5 issue 3
Research & Reviews: Journal of Surgery vol 5 issue 3Research & Reviews: Journal of Surgery vol 5 issue 3
Research & Reviews: Journal of Surgery vol 5 issue 3
 
Journal of Materials and Metallurgical Engineering vol 6 issue 3
Journal of Materials and Metallurgical Engineering vol 6 issue 3Journal of Materials and Metallurgical Engineering vol 6 issue 3
Journal of Materials and Metallurgical Engineering vol 6 issue 3
 
Research & Reviews Journal of Food Science & Technology vol 5 issue 3
Research & Reviews Journal of Food Science & Technology vol 5 issue 3Research & Reviews Journal of Food Science & Technology vol 5 issue 3
Research & Reviews Journal of Food Science & Technology vol 5 issue 3
 
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
 
Research & Reviews: Journal of Oncology and Hematology vol 5 issue 3
Research & Reviews: Journal of Oncology and Hematology  vol 5 issue 3Research & Reviews: Journal of Oncology and Hematology  vol 5 issue 3
Research & Reviews: Journal of Oncology and Hematology vol 5 issue 3
 
Trends in Opto Electro & Optical Communication vol 6 issue 3
Trends in Opto Electro & Optical Communication vol 6 issue 3Trends in Opto Electro & Optical Communication vol 6 issue 3
Trends in Opto Electro & Optical Communication vol 6 issue 3
 
Research & Reviews: Journal of Medicine vol 6 issue 3
Research & Reviews: Journal of Medicine vol 6 issue 3Research & Reviews: Journal of Medicine vol 6 issue 3
Research & Reviews: Journal of Medicine vol 6 issue 3
 

More from Sandra Long

More from Sandra Long (20)

Essay On Teachers Day (2023) In English Short, Simple Best
Essay On Teachers Day (2023) In English Short, Simple BestEssay On Teachers Day (2023) In English Short, Simple Best
Essay On Teachers Day (2023) In English Short, Simple Best
 
10 Best Printable Handwriting Paper Template PDF For Free At Printablee
10 Best Printable Handwriting Paper Template PDF For Free At Printablee10 Best Printable Handwriting Paper Template PDF For Free At Printablee
10 Best Printable Handwriting Paper Template PDF For Free At Printablee
 
Buy College Application Essay. Online assignment writing service.
Buy College Application Essay. Online assignment writing service.Buy College Application Essay. Online assignment writing service.
Buy College Application Essay. Online assignment writing service.
 
FREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS WordFREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS Word
 
Small Essay On Education. Small Essay On The Educ
Small Essay On Education. Small Essay On The EducSmall Essay On Education. Small Essay On The Educ
Small Essay On Education. Small Essay On The Educ
 
Where Can I Buy A Persuasive Essay, Buy Per
Where Can I Buy A Persuasive Essay, Buy PerWhere Can I Buy A Persuasive Essay, Buy Per
Where Can I Buy A Persuasive Essay, Buy Per
 
Chinese Writing Practice Paper With Pinyin Goodnot
Chinese Writing Practice Paper With Pinyin GoodnotChinese Writing Practice Paper With Pinyin Goodnot
Chinese Writing Practice Paper With Pinyin Goodnot
 
Elephant Story Writing Sample - Aus - Elephant W
Elephant Story Writing Sample - Aus - Elephant WElephant Story Writing Sample - Aus - Elephant W
Elephant Story Writing Sample - Aus - Elephant W
 
391505 Paragraph-Writ. Online assignment writing service.
391505 Paragraph-Writ. Online assignment writing service.391505 Paragraph-Writ. Online assignment writing service.
391505 Paragraph-Writ. Online assignment writing service.
 
Get Essay Writing Assignment Help Writing Assignments, Essay Writing
Get Essay Writing Assignment Help Writing Assignments, Essay WritingGet Essay Writing Assignment Help Writing Assignments, Essay Writing
Get Essay Writing Assignment Help Writing Assignments, Essay Writing
 
Ampad EZ Flag Writing Pad, LegalWide, 8 12 X 11, Whi
Ampad EZ Flag Writing Pad, LegalWide, 8 12 X 11, WhiAmpad EZ Flag Writing Pad, LegalWide, 8 12 X 11, Whi
Ampad EZ Flag Writing Pad, LegalWide, 8 12 X 11, Whi
 
The Federalist Papers Writers Nozna.Net. Online assignment writing service.
The Federalist Papers Writers Nozna.Net. Online assignment writing service.The Federalist Papers Writers Nozna.Net. Online assignment writing service.
The Federalist Papers Writers Nozna.Net. Online assignment writing service.
 
Whoever Said That Money CanT Buy Happiness, Simply DidnT
Whoever Said That Money CanT Buy Happiness, Simply DidnTWhoever Said That Money CanT Buy Happiness, Simply DidnT
Whoever Said That Money CanT Buy Happiness, Simply DidnT
 
How To Write An Essay In College Odessa Howtowrit
How To Write An Essay In College Odessa HowtowritHow To Write An Essay In College Odessa Howtowrit
How To Write An Essay In College Odessa Howtowrit
 
How To Write A Career Research Paper. Online assignment writing service.
How To Write A Career Research Paper. Online assignment writing service.How To Write A Career Research Paper. Online assignment writing service.
How To Write A Career Research Paper. Online assignment writing service.
 
Columbia College Chicago Notable Alumni - INFOLEARNERS
Columbia College Chicago Notable Alumni - INFOLEARNERSColumbia College Chicago Notable Alumni - INFOLEARNERS
Columbia College Chicago Notable Alumni - INFOLEARNERS
 
001 P1 Accounting Essay Thatsnotus. Online assignment writing service.
001 P1 Accounting Essay Thatsnotus. Online assignment writing service.001 P1 Accounting Essay Thatsnotus. Online assignment writing service.
001 P1 Accounting Essay Thatsnotus. Online assignment writing service.
 
Essay Writing Tips That Will Make Col. Online assignment writing service.
Essay Writing Tips That Will Make Col. Online assignment writing service.Essay Writing Tips That Will Make Col. Online assignment writing service.
Essay Writing Tips That Will Make Col. Online assignment writing service.
 
Pin On Essay Writer Box. Online assignment writing service.
Pin On Essay Writer Box. Online assignment writing service.Pin On Essay Writer Box. Online assignment writing service.
Pin On Essay Writer Box. Online assignment writing service.
 
How To Write A Funny Essay For College - Ai
How To Write A Funny Essay For College - AiHow To Write A Funny Essay For College - Ai
How To Write A Funny Essay For College - Ai
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 

Advances In Computer Science And Information Technology

  • 1. I Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907 Online ISSN: 2393-9915 Editor-In-Chief: Mohamed M. Elammari, Ph. D. Faculty of Information Technology, University of Benghazi, Libya Associate Editor: Rabindra Kumar Jena, Ph. D. Information Technology Management Department IMT, Nagpur-440013, India Editorial Board Members: M. R. Tripathy, Ph. D. Department of Electronics & Communication Engineering, Amity School of Engineering and Technology Amity University Campus, Sector-125, Noida (U.P.) – 201303, India Shishir K. Shandilya, Ph. D. Dean (Academics) & Head –Department of Computer Science & Engineering BANSAL Institute of Research & Technology, Bhopal, M. P., India Basant Kumar, Ph. D. Computer Science and Mathematics Department Modern College of Business & Sc (Affiliated with University of Missouri, St.Louis, USA & Franklin University, Ohio, USA), Muscat, Sultanate of Oman Amit Choudhary, Ph. D. Department of Computer Science Maharaja Surajmal Institute (an affiliate of G.G.S. Indraprastha University, Delhi, India) Moirangthem Marjit Singh Department of Computer Science & Engineering North Eastern Regional Institute of Science & Technology (NERIST), (Deemed University under MHRD, Govt. of India), Nirjuli-791109, Arunachal Pradesh Published by: Krishi Sanskriti Publications E-47, Rajpur Khurd Extn., Post Office – I.G.N.O.U. (Maidangarhi) New Delhi-110068, INDIA Contact No. +91-8527006560; Website: http://www.krishisanskriti.org/acsit.html
  • 2. II Advances in Computer Science and Information Technology (ACSIT) Website: http://www.krishisanskriti.org/acsit.html Aims and Scope: Advances in Computer Science and Information Technology (ACSIT) (Print ISSN: 2393-9907; Online ISSN: 2393- 9915) is a quarterly international open access journal of the Krishi Sanskriti (http://www.krishisanskriti.org), a non-governmental organization (NGO) registered under society registration act 1860 which is engaged in academic and economic development of the society with special emphasis on integrating industry and academia. The journal ACSIT is devoted to publication of original research on various aspects of computer science and information technology including the scientific leads in the formative stage which has a promise for a pragmatic application. The scopes of the journal include, but are not limited to, the following fields Programming Languages; Software Development; Graphics for Science and Engineering; Solid, Surface and Wireframe Modelling; Animation; Data Management and Display; Image Processing; Flight Simulation; VLSI Design; Process Simulation; Neural Networks and their Applications; Fuzzy Systems Theory and Applications; Fault-Tolerant Systems; Visual Interactive Modelling; Supercomputing; Optical Computing; Soft Computing; Computer Architecture Data Structures and Network Algorithms; Genetic Algorithms and Evolutional Systems; Very Large Scale Scientific Computing; Molecular Modelling; Scientific Computing in Emerging Critical Technologies; Computational Learning and Cognition; Computational Methods in Geosciences-Oceanographic and Atmospheric Systems; Computational Medicine; Artificial Intelligence; Cybernetics; Computer Security Issues; Information Security, Evolutionary and Innovative Computing, Information Theory, Mathematical Linguistics, Automata Theory, Cognitive Science, Theories of Qualitative Behaviour, Intelligent Systems, Genetic Algorithms and Modelling, Fuzzy Logic and Approximate Reasoning, Artificial Neural Networks, Expert and Decision Support Systems, Learning and Evolutionary Computing, Expert and Decision Support Systems, Learning and Evolutionary Computing, Biometrics, Moleculoid Nanocomputing, Self-adaptation and Self-organisational Systems, Data Engineering, Data Fusion, Information and Knowledge, applications of information science and so on. Publication is open to all researchers from all over the world. Manuscripts to be submitted to the Journal must represent original research reports and has not been submitted elsewhere prior to or after submission to this journal for publication. All the manuscripts submitted for consideration in ACSIT is subject to peer-review for taking up final decision on acceptance for publication, and decision of the editorial team will be final. All papers will be reviewed by at least two referees who are peers in their field of research and by an Editor of the Journal or as appointed by the Editor-in-Chief to be responsible for editing the manuscript. The authors agree to automatically transfer the copyright to the publisher (Krishi Sanskriti Publications), if and when the manuscript is accepted for publication. © 2014 Krishi Sanskriti Publications, India Printed in India No part of this publication may be reproduced or transmitted in any form by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the copyright owners. DISCLAIMER The authors are solely responsible for the contents of the papers compiled in this volume. The publishers or editors do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and readers are requested to communicate such errors to the editors or publishers to avoid discrepancies in future. The journal may publish supplements to the journal in the form of monographs etc. also, but all costs related to the production of supplements are to be paid by the orderer/author. The contacts in this regard may be made prior with the Editor-in-Chief or the editorial office. Supplements will be treated in the same way as other submissions.
  • 3. III Submission of Manuscripts Please visit the journal’s home pages at http://www.krishisanskriti.org/acsit.html for details of aims and scope, readership, instruction to authors and publishing procedure and table of contents. Use website to order a subscription, reprints and individual articles. Authors are requested to submit their papers electronically to editor.acsit@krishisanskriti.org and mention journal title (ACSIT) in subject line. Publication Fee: The publication fee for this journal is $300 (International authors) and INR 3500 (India, Pakistan, Nepal and Bangladesh), including taxes. Subscription Information Subscription orders may be directed to the publisher or contact your preferred subscription agents. Regular Subscription price for the Journal US$380/Libraries and US$360/Individual (Outside India) Rs. 3500/Libraries and Rs. 1800/ Individual (Inside India) The Bank details for subscription/publication payment through NEFT/Online Transfer/ DD: Beneficiary Name : Krishi Sanskriti Bank Name : Canara Bank Bank Address : Jeet Singh Marg, New Delhi Account No. : 1484101026988 Account Type : Savings IFSC Code : CNRB0001484 Swift Code : CNRBINBBBID Frequency of Publication Quarterly (depending on the number of literature being accepted for publication, the volume will be split in numbers as required). All business correspondence enquires and subscription orders should be addressed to: Editor-in-Chief Editorial Office, Advances in Computer Science and Information Technology (ACSIT), Krishi Sanskriti Publications E-47, Rajpur Khurd Extn. Post Office- I.G.N.O.U. (Maidangarhi), New Delhi -110 068, India E-Mail: editor.acsit@krishisanskriti.org
  • 4. IV Author Guidelines Please follow the Guide for Authors instructions carefully to ensure that the review and publication of your paper is swift and efficient. A manuscript may be returned for revision prior to final acceptance, the revised version must be submitted as soon as possible after the author's receipt of the referee's reports. Revised manuscripts returned after the expiry of stipulated time (as quoted during such a request) will be considered as new submissions subject to full re-review. Paper categories:- Contributions falling into the following categories will be considered for publication: • Original high-quality research papers (preferably no more than 10 pages double-line-spaced manuscript, in double column including tables and illustrations) • Short communications or case studies for rapid publication (no more than 5 double-line-spaced manuscript, in double column pages including tables and figures) • Mini-Review on subjects of cutting-edge scientific developments, theories, hypotheses and concepts, which could be of importance to the scientific community world-wide. Ethics in publishing Ethics in publishing and Ethical guidelines for journal publication, a standard operating procedure (SOP) can be followed as applied to other publication systems. For reference, online versions of the same can be freely accessed and information on the same may be sought by the publishing author(s). Conflict of interest Disclosure of actual or potential conflict of interest including financial by all the authors is mandatory for final appearance of their article in the journal. The standard procedure of operation (SOP) in this regard will be as followed by other publishing house and/or the laws governing such practices. Submission declaration Submission of an article implies that the work described has neither been published elsewhere (except in the form of an abstract or as part of a published lecture or academic thesis or as an electronic preprint), nor is under consideration for publication with other publishing house. Results submitted for publication should refer to their previous findings in the same way as they would refer to results from a different group. This applies not only to figures or tables, or parts of them, but has to be understood in a wider sense. Acknowledgements The acknowledgement section should list (a) other contributors for whom authorship is not justified, e.g. technical help; (b) financial and material support. Changes to authorship This policy concerns the addition, deletion, or rearrangement of author names in the authorship of accepted manuscripts: Before the publication of the accepted manuscript, requests to add or remove an author, or to rearrange the author names, must be sent to the Journal Editorial Office through email from the corresponding author of the accepted manuscript and must include: (a) the reason the name should be added or removed, or the author names rearranged and (b) written confirmation (e-mail the scanned letter of consent or fax) from all authors that they agree with the addition, removal or rearrangement. In the case of addition or removal of authors, this includes confirmation from the author being added or removed. Requests that are not sent by the corresponding author will be forwarded by the Editorial Office to the corresponding author, who must follow the procedure as described above. Note that the publication of the accepted manuscript will be suspended or kept in abeyance until authorship has been agreed. After the accepted manuscript is published, any request to add, delete, or rearrange author names in an article published in any issue will follow the same policies as noted above and result in a corrigendum.
  • 5. V Copyright This journal offers authors a choice in publishing their research Open Access. For Open access articles please mention the role of the funding source or agency. You are requested to identify who provided financial support for the conduct of the research and/or preparation of the article and to briefly describe the role of the sponsor(s), if any, in study design; in the collection, analysis and interpretation of data; in the writing of the report; and in the decision to submit the article for publication. If the funding source(s) had no such involvement then this should be stated. Informed consent and patient details Studies on patients or volunteers require ethics committee approval and informed consent, which should be documented in the paper. Appropriate consents, permissions and releases must be obtained where an author wishes to include case details or other personal information or images of patients and any other individuals. Unless a written permission from the patient (or, where applicable, the next of kin), the personal details of any patient included in any part of the article and in any supplementary materials (including all illustrations) is obtained while making submission of such an article, no article or manuscript of such type would be accepted for publication in this journal. Submission Submission to this journal proceeds totally online and you will be guided stepwise through the creation and uploading of your files. The system automatically converts source files to a single PDF file of the article, which is used in the peer-review process. All correspondence, including notification of the Editor's decision and requests for revision, will be effected by e-mail, thus removing the need for a paper trail. Referees Authors are requested to submit a minimum of four suitable potential reviewers (please provide their name, email addresses, and institutional affiliation). When compiling this list of potential reviewers please consider the following important criteria: they must be knowledgeable about the manuscript subject area; must not be from your own institution; at least two of the suggested reviewers must be from another country than the authors'; and they should, not have recent (less than four years) joint publications with any of the authors. However, the final choice of reviewers is at the editors' discretion. PREPARATION OF MANUSCRIPT Use of word processing software: It is important that the file be saved in the native format of the word processor used. The text should be in double column format. Keep the layout of the text as simple as possible. Most formatting codes will be removed and replaced on processing the article. However, do use bold face, italics, subscripts, superscripts etc. When preparing tables, if you are using a table grid, use only one grid for each individual table and not a grid for each row. If no grid is used, use tabs, not spaces, to align columns. Note that source files of figures, tables and text graphics will be required whether or not you embed your figures in the text. To avoid unnecessary errors you are strongly advised to use the 'spell-check' and 'grammar-check' functions of your word processor. Article Structure Authors should arrange their contribution in the following order: 1. The paper title should be short, specific and informative. All author's names and affiliations should be clearly indicated. Please also indicate the author for correspondence and supply full postal address, telephone and fax numbers, and e-mail address of such an author. 2. An abstract of approximately 250 words, outlining in a single paragraph the aims, scope and conclusions of the paper. 3. Four keywords, for indexing purposes; 4. The text suitably divided under headings. Subdivision - numbered sections Divide your article into clearly defined and numbered sections. Subsections should be numbered 1.1 (then 1.1.1, 1.1.2, ...), 1.2, etc. (the abstract is not included in section numbering). Any subsection may be given a brief heading. Each heading should appear on its own separate line. 5. Acknowledgments (if any).
  • 6. VI 6. References (double spaced, and following the Oxford style). 7. Appendices (if any). 8. Tables (each on a separate sheet). 9. Captions to illustrations (grouped on a separate sheet or sheets). 10. Illustrations, each on a separate sheet containing no text, and clearly labeled with the journal title, author's name and illustration number. Essential title page information • Title. Concise and informative. Titles are often used in information-retrieval systems. Avoid abbreviations and formulae where possible. • Author names and affiliations. Where the family name may be ambiguous (e.g., a double name), please indicate this clearly. Present the authors' affiliation addresses (where the actual work was done) below the names. Indicate all affiliations with a lower-case superscript letter immediately after the author's name and in front of the appropriate address. Provide the full postal address of each affiliation, including the country name and, if available, the e-mail address of each author. • Corresponding author. Clearly indicate who will handle correspondence at all stages of refereeing and publication, also post-publication. Ensure that phone numbers (with country and area code) are provided in addition to the e-mail address and the complete postal address. Contact details must be kept up to date by the corresponding author. • Present/permanent address. If an author has moved since the work described in the article was done, or was visiting at the time, a 'Present address' (or 'Permanent address') may be indicated as a footnote to that author's name. The address at which the author actually did the work must be retained as the main, affiliation address. Superscript Arabic numerals are used for such footnotes. Submission checklist Please ensure that the following items are present, while submitting the article for consideration: One author has been designated as the corresponding author with contact details: • E-mail address • Full • Postal address • Phone numbers All necessary files have been uploaded, and contain: • Keywords • All figure captions • All tables (including title, description, footnotes) • Manuscript has been 'spell-checked' and 'grammar-checked' • References are in the correct format for this journal • All references mentioned in the Reference list are cited in the text, and vice versa • Permission has been obtained for use of copyrighted material from other sources (including the Web) After Acceptance Use of the Digital Object Identifier The Digital Object Identifier (DOI) may be used to cite and link to electronic documents. The DOI will be assigned as per standard protocol to the 'Articles in press'. For reference about the given DOI (in URL format; see here an article in the journal Physics Letters B): http://dx.doi.org/10.1016/j.physletb.2010.09.059, is cited for your perusal. Online proof correction Corresponding authors will receive an e-mail with a link to our Submission System, which would allow them to annotate and do correction of proofs online. In addition to editing text, the authors can also comment on figures/tables and answer questions from the Copy Editor. All instructions for proofing will be given in the e-mail to be sent to authors, we will ensure from our side to get your article published quickly and accurately if all of your corrections are uploaded within two days and also, that all corrections are performed in one session. Please check carefully before replying, as inclusion of any subsequent corrections cannot be guaranteed. Proofreading is solely author’s responsibility. Note that publisher team may proceed with the publication of your article if no response is received.
  • 7. Advances in Computer Science and Information Technology (ACSIT) Volume 2, Number 3; January-March, 2015 Contents Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 186-190 Rupa Basu State of the Art of Spell Checker Design for Indian Languages: A Survey 191-195 Shivani and DharamVeer Sharma Addressing Cloud Computing Security Concerns 196-200 Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda Reduction of Load on Network using Compression Technique with Web Crawler 201-203 Sneha Tuteja, Naresh Kumar and Rajender Nath Hospital Information Systems Integration Plan System Perespective 204-207 Qurat Ul Ain and Sumera Shafi Secure Mining of Association Rule through Hash Key in Horizontally Distributed Database 208-210 Raunak Rathi, A.V. Deorankar and Roshani Sherkar A Study on Mobile-Commerce 211-214 Seema Chaudhary and Gunjan Sharma Data Base Management System in Cloud Computing Environment 215-220 Sudhanshu Maurya and Swati Kumari Development of Distributed E-Healthcare System Using Service Oriented Architecture 221-228 Sudhanshu Maurya and Swati Kumari Cloud based E-Learning–Using cloud to provide Learning as a Service 226-229 Tania Gaur and Nisha Kharb Combination of Genetic Algorithm with Fuzzy Systems 230-232 Gaurav and Nidhika Yadav Review of Techniques of Digital Video Forgery Detection 233-236 Mrs. J.D. Gavade and Mrs. S.R. Chougule Fuzzy Rough Sets and Its Application in Data Mining Field 237-240 Megha Kumar and Nidhika Yadav
  • 8. Contents Web Information Retrieval System 241-244 NehaPrabhakar, Vasundhara Bhatia, SumatiManchanda and Nidhi Sharma Review: Neural Network based Approach for Travel Time Prediction 245-248 P.K. Kharat, Sagar S. Gaikwad and S.V. Patil Effect of the Core Selection Strategy in Determining Optimum BDMST in Multicast Networks 249-251 Sakshi Arora and Sunanda Recommender System-A Close Look at Collaborative Filtering 252-257 Shivani Agrawal, PankhuriRastogi and Shubhi Agarwal Proposed Methodology for Database Privacy in an Existing System Using Hippocratic Database 258-260 Sonali Ganguly and S.P. Singh Role of ICTS in Education: Promises and Challenges ICT as a Change Agent 261-261 Prabha Sharma A Study on Data Preprocessing, Classification and Clustering using WEKA Tool 262-266 Amit Gupta and Naganna Chetty Offline Signature Verification with ANN using Shape Properties a Feasibility Report 267-271 K. Srivastava, Subhash Chandra and Sushila V. Maheshkar Manual and Automation Analysis of Load Testing 272-275 Ritika Encryption Techniques in Cloud Computing 276-280 Meena Kumari and Rajender Nath Commerce: A Virtual Assistance Making Life Challenging Or Simpler 281-287 Ms. Shuchi Shukla and Ms. Prerna Singh Improving GIS in Health Care 288-289 Kush Benara Broadening the Scope of Rural Marketing by Internet Technology 290-294 Ms. Shraddha Singhal and Ms. Radhika Tomar Big Data & Accounting Measurements 295-305 Mohammad Mehdi Nasrizar Role & Significance of Information Technology in Enhancement of Business Management 306-312 Ms. Nalini K. Atkare, Ms. Priti S. Dharammali and Shrinivas Manekar
  • 9. Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 pp. 186-190 © Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning Rupa Basu Kamala Nehru College University of Delhi E-mail: rupa.basu@knc.du.ac.in Abstract—An e-portfoliois an electronic collection of evidence that shows a student’s learning and accomplishments over time. The portfolio may include writing samples, photos, videos, research projects, and observations by mentors and peers. The student’s reflection on the artifacts, and what he had learnt from the process of developing the e-portfolio are also included. According to the constructivist theory students learn from being active learners in collaborative settings; and from constructing new ideas and concepts based on their prior knowledge and experiences. In a constructivist, technology-integrated classroom the activities are interactive and the learning is student centered. E-portfolios are being touted as the next biggest innovation in educational technology. They indeed have the potential to become lifelong learning tools.In this paper we look at how e-portfolio integrates the principles of constructivism and can be an extremely effective tool for learning and assessment in higher education. 1. HOW DO WE LEARN? There are myriad ways in which people learn. This is what the philosophers have called epistemology-the theory of knowledge and learning. The earliest ideas about how humans learn came from the ancient Greeks about two thousand four hundred years ago. Psychologists have been studying the nature of learning for more than a century. In the process they have taken a variety of theoretical perspectives. The general theoretical approaches to the study of learning are behaviorism, social learning theory, information-processing theory, constructivism and sociocultural theory. The predominant theory on which most of the teaching and learning processes since 1960s have been based is behaviorism developed by J.B. Watson and B. F. Skinner. Behaviorists argue that because thought processes cannot be directly observed and measured, it is difficult to study thinking objectively and scientifically. Instead, they focus on two things that researchers can observe and measure: people’s behaviors (responses) and the environmental events (stimuli, reinforcement) that precede and follow those responses. Watson andSkinner sought to prove that behavior could be predicted and controlled. They were only concerned with how behavior is affected by external forces. Skinner believed that everything human beings do is controlled by their experience [18]. They concluded that given the right environmental influences, all learners acquire identical understanding and that all students can learn. The implications of this for instruction and learning have been emphasis on repetitions and rote learning [20]. 2. WHAT IS THE CONSTRUCTIVE APPROACH? Unlike behaviourists, constructivists concern themselves with internal aspects of learning that is explained by cognitive learning theory. The latter explains how the brain forms the most incredible network of information processing and interpretation as we learn things. According to this theory mental processes are influenced by both internal and external factors. Cognitive learning theory posits that with effective cognitive processes, learning is easier and new information can be stored in the memory for a long time[7]. Jean Piaget and Lev Vygotsky are two eminent figures in the development of constructivist theories. Constructivist learning theory says that all knowledge is constructed from a base of prior knowledge and people are better able to understand the information that they have constructed by themselves. People, or even children, are not a blank slate and knowledge cannot be imparted without the child making sense of it according to his or her current conceptions. According to constructivism, knowledge is constructed from (and shaped by) experiences and learning is an active process and a personal interpretation of the world.The implications of constructivism for instruction are: (1) Teaching is not merely transmitting knowledge and information such as facts, concepts and principles. Rather it should provide students with relevant experiences from which they can construct their own meaning. (2) Constructivism is anchored on the assumption
  • 10. Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 187 Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 that the assimilation of knowledge is personal and therefore no two learners can build up the same meaning out of a given situation. Thus the constructivist approach shifts emphasis from teaching to learning, individualizes and contextualizes students’ learning experiences, helps students develop processes, skills and attitudes, and focuses on knowledge construction, not reproduction. Whereas in traditional classrooms knowledge is inert, in constructivist classrooms it is dynamic and changes with experiences [9]. In the constructivist classroom, students work primarily in groups and learning and knowledge are dynamic and interactive. There is a great focus and emphasis on social and communication skills, as well as collaboration and exchange of ideas. This is contrary to the traditional classroom in which students work primarily alone, learning is achieved through repetition, and the subjects are strictly adhered to and are guided by a textbook. Some activities encouraged in constructivist classrooms are: (1) Experimentation where students individually perform an experiment and then come together as a class to discuss the results. (2) Field trips allow students to put the concepts and ideas discussed in class in a real-world context. (3) Research projects in which students research a topic and can present their findings to the class. (4) Filmsprovide visual context and thus bring another dimension into the learning experience. (5) Class discussions are used in all of the methods described above. It is one of the most important aspects of constructivist teaching methods [10]. Traditional pedagogical approaches often may not be the best way to cater for the specific needs of learners in higher education settings, particularly those of university students with special expectations and professional prospects.Traditionally, assessment in the classrooms is based on testing. In this it is important for the student to produce the correct answers. However, in constructivist teaching, the process of gaining knowledge is viewed as being just as important as the product. Thus, assessment is based not only on tests, but also on observation of the student, the student’s work, and the student’s points of view. Some assessment strategies include oral discussions, mind-mapping, hands-on activities and pre-testing [13]. Constructivist philosophy now has a reasonably long history of application in education programs for young children in the western world, but is used less frequently in adult learning environments. Learning environments for adults based on constructivist philosophy include opportunities for students to make meaningful connections between new material and previous experience, through discovery. The importance of using these types of strategies with adults contributes to critical learning environments where instructors “embed” the skills they are teaching in “authentic tasks that will arouse curiosity, challenge students to rethink assumptions and examine their mental modes of reality”[12]. 3. WEB-BASED INSTRUCTION IN HIGHER EDUCATION There has been a widespread increase in the use of web-based instruction in universities across the world but there is doubt about the quality of instruction they impart. For example, Boshier et al.[4] examined 127 courses and expressed concern that many web-based subjects have not utilised the full capability of the available technology and some sites actually emulated the worst of face-to-face courses where learners are constructed as passive recipients of information. Behaviourist instructional strategies, with their inherent limitations, and which rely on the development of a set of instructional sequences with predetermined outcomes, have also been followed in the designing ofmost of the web-based instruction. There is a need for a shift in approaches to pedagogy as well as a way of supporting alternate frameworks for instruction within a web-based environment.Current instructional design models do not provide effective strategies for designing constructivist learning environments. In a web- based environment this proves to be even more challenging [11]. However, with advancing technologies many web-based courses have moved to increasingly providing scope for communication and interaction, through synchronous and asynchronous discussion. Through the provision of real world contexts and opportunity for collaboration, the learning experience can be designed to provide opportunity for students to take control of their own learning. Studies have shown that educational institutions that have embraced technology as part of their curriculum have experienced an increase in student performance and academic achievement. Learning ‘with’ technology is the aim for successful integration of technology. Technology supports exactly the kinds of changes in content, roles, and organizational climate that are at the heart of constructivist educational reform movements [17]. 4. WHAT ISAN E-PORTFOLIOS? An e-portfolio, basically an electronic or digital portfolio, is an electronic collection of evidence that shows a student’s learning and accomplishments over time. Evidence may include writing samples, photos, videos, research projects, observations by mentors and peers, the student’s reflection on the artifacts, and what the student learned from the process of developing the e-portfolio.
  • 11. Rupa Basu Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 188 The term portfolio has long been associated with artists who gather examples of their work together for exhibition or to gain commissions. The term is also associated with financial portfolios which can be a collection of investments or assets. Similarly, an educational portfolio documents the learning achieved by a student. E-portfolios first made an appearance in the 1990s. The e-portfolio is an adaptation of the original paper-based portfolio in digital format, is a more recent phenomenon that not only provides students with a repository for collection and presentation of their work but also a mechanism for documenting growth and achievement of professional knowledge and skills. Educators, especially in the USA, are showing increasing interest in portfolios for assessment of learning. The subject area has grown enormously in recent times and has a huge potential to impact on higher education [8]. There is a significant amount of learning that can take place through the creation of e-portfolio. There is high student involvement in putting together the contents of a portfolio, often through discussion or negotiation with an academic tutor. This is perhaps the most attractive feature of a portfolio, from the point of view of an educator. The portfolio also provides a more rounded and reliable assessment of learning achieved than written examinations or essay assignments alone. The emphasis on assessment still drives the curriculum and dictates teaching methods at most places. Outdated tools are still used to assess and measure student performance. Educational institutions have yet to recognize and utilize technology as an effective form of assessment in schools.Because of the ownership of the portfolio by the student, each portfolio is individual and unique. Teachers are looking at e-portfolios as an alternative form of assessment in which both standards and student performance are used. . One of the most attractive features of e-portfolios is the diversity and richness of artifacts that can be associated with learning. Examples of such materials include word or text documents; PowerPoint presentations; web-pages with hyperlinks; Excel spreadsheets and graphs; scanned images; digital photographs; multimedia audio and video files; and results from interactive computer-assessment programs. The pedagogy of e-portfolios has been studied and reviewed by Barrett & Wilkerson [3]. An e-portfolio should provide a dynamic environment for learners to document and celebrate learning they have achieved. E-portfolio development also about the “interactions” of learning. Knowledge is distributed among people and artefacts which is also an important aspect of learning in this networking age. Most of the present day e-portfolio platforms provide the option for inclusion of peer review, feedback and discussion. Therefore e-portfolios have the potential to become lifelong learning tools. E-portfolios have a number of advantages over print based portfolios including portability, the ability to store, organise and reorder contents quickly and easily; provide opportunities to integrate student course work; their ability to form the basis for collaboration; the potential for development of information management, self-organisation, planning, and presentation skills. Some of the publicly available electronic portfolio platforms are: Foliotek, LiveText, ePortfolio, TaskStream, Tk20, TrueOutcomes and so on. These platforms support student portfolios, faculty-controlled assessments, curriculum records, and surveys, lesson plan building, and the delivery of learning materials and resources. E-portfolio has been used successfully for both learning and assessment in a number of disciplines including the Arts, Humanities and Social Sciences. In last few years computer science and engineering education faculty and students have been introduced to the concept of e-portfolios. Students have found the advantages of e-portfolio to showcase their work particularly for employment purposes. A constructivist classroom using technology-based projects provides authentic evidence of assessment as proof of student learning. The very essence of constructivism, that learning takes place in contexts where learners are engaged in critical and reflective thinking, working in a collaborative and cooperative environment intertwines with the implementation of the e-portfolio system in higher education.E-portfolios have been found to foster active learning, motivate learning and empower students, which support the constructivist theory of learning [15]. 5. ISSUES IN THE IMPLEMENTATION OF E-PORTFOLIOS E -portfolios are not without their challenges. There are a number of issues that include the time intensive nature of their development; difficulties in mastering the use of the software; and issues of privacy. Even more importantly, without a central focus on reflection, e-portfolios may end up becoming simply a collection of information rather than a mechanism for the development of meaningful knowledge. Collaborative activities and peer feedback should be made as integral part of the e-portfolio. Another challenge is to find e-portfolio strategies that meet the needs of both the students, to support deep learning, and to give the institution the information they need for grading and accreditation purposes. Any assessment process requires the aggregation of data for determining student quality, program quality and continuous improvement. Since the fundamental principle of a student-centered portfolio is to allow choice by
  • 12. Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 189 Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 the student in the collection of artifacts, aggregation of data could be very difficult. The difficulty lies on how to combine standards based assessment with individualized assessment. According to Ahn [1] e-portfolios do possess the potential to bridge these conflictinggoals. The contents of the student’s portfolio can demonstrate how the student has met the standards by using hypertext links to connect the work to the standards it meets. One of the critical aspects in this process is also the design and development of the rubric for evaluation of e-portfolios [2]. Other issues facing schools or teachers who want to implement portfolios are lack of availability of computers in classrooms, blocked websites, software and hardware problems, and time management. When computers are not in the classroom the educational institutions have computer labs to accommodate the needs of the entire campus. The problems encountered when depending on computer labs are availability, flexibility, and dependability. A number of technological barriers can also affect the successful implementation of the electronic portfolio. E- portfolios depend on the use of technology to contain its contents and before beginning the portfolio process the method of storage has to be considered. The issues with integrating technology in an academic setting such as accessibility and permission to enter certain websites and adequate software and hardware can make things difficult for the student and teacher [14]. 6. CONCLUSION An electronic portfolio is an extraordinary way for students to learn technological skills, develop deep learning that requires both critical and higher order thinking, with evidence of learning through self-reflection. These are the valuable skills sought after by universities and the workforce. In the 21 century, e-Portfolios are becoming a prevalent way to allow students to combine text, graphics, sound and video to create a powerful multimedia demonstration of their accomplishments [16]. Web-based e-Portfolios fit well with the constructivist philosophy of education where students can create their own meaning using platforms for student-authored content and without being restricted by organizational boundaries. As the web-based e-portfolio are student-owned their usefulness is expanded to include lifelong and life-wide learning [6]. This career connection is also echoed in the literature; for instance, the e-portfolio building process was found to encourage students to think about their professional knowledge, skills and abilities [5]. It would not be difficult to believe that e-portfolio could someday be a requirement for admission into a university and for getting a job. E-portfolios are being touted as the biggest innovation in educational technology since the introduction of course management systems. Literature shows that electronic portfolios, if done right can lead students to be life-long, reflective and responsible learners [14]. 7. ACKNOWLEDGEMENT I wish to express my heartfelt gratitude to Dr. J.B. Singh, Principal, Sri Guru Gobind Singh College of Commerce, University of Delhi, for his encouragement and active support in the writing of this paper. REFERENCES [1] Ahn, J. (2004). Electronic Portfolios: Blending Technology, Accountability& Assessment. T H E Journal, 0192592X, Vol. 31, Issue 9 [2] Barrett, H. (2005). Researching electronic portfolios and learner engagement. White Paper. Retrieved from https://www.helenbarrett.com/reflect/whitepaper.pdf [3] Barrett, H. & Wilkerson, Judy. (2004) Conflicting Paradigms in Electronic Portfolio Approaches. Choosing an Electronic Portfolio Strategy that Matches your Conceptual Framework. Retrieved from http://electronicportfolios.org/systems/paradigms.html [4] Boshier, R., Mohapi, M., Moulton, G., Qayyum, A., Sadownik, L., and Wilson, M., (1997) Best and worst dressed web courses: Strutting into the 21st Century in comfort and style in Mitchell, I., (Ed) Distance Education Vol 18, No 2. (pp 327 - 349) [5] Buzzetto-More, N. (2010). Assessing the efficacy and effectiveness of an ePortfolio used for summative assessment. Interdisciplinary Journal of e-Learning and learning Objects, 6, 61-85. Retrieved from http://www.ijello.org/Volume6/IJELLOv6p061- 085Buzzetto691.pdf [6] Chen, H. L. (2009). Using ePortfolios to support lifelong and lifewide learning. In Darren Cambridge, Barbara Cambridge, and Kathleen Yancey (Eds.), Electronic portfolios 2.0: Emergent research on implementationand impact (pp.29-35). Sterling, VA: Stylus. [7] Greeno, J. G., Collins, A. M., & Resnick, L. B. (1996). Cognition and learning. Handbook of educational psychology. Handbook of Educational Psychology. Retrieved from http://psycnet.apa.org/psycinfo/1996-98614-001 [8] Gomez, S. (2004). Electronic portfolios in higher education. Higher Education Academy Resources …. Retrieved from http://www- new1.heacademy.ac.uk/assets/Documents/resources/database/id 446_electronic_portfolios.pdf [9] Husen, T. and Postlethwaite, T.N. (eds.) (1989); Constructivism in Education. The International Encyclopedia of Education, Supplement Vol.1. Oxford/New York: Pergamon Press, 162– 163. http://www.univie.ac.at/constructivism/EvG/papers/114.pdf [10] Hussain, I. (2012). Use of Constructivist Approach in Higher Education: An Instructors’ Observation. Creative Education, 03(2), 179–184. doi:10.4236/ce.2012.32028 [11] Jonassen, D. H., (1994). Thinking Technology: Toward a constructivist design model. Educational Technology, 34(3), 34- 37.
  • 13. Rupa Basu Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 190 [12] Kallio, E. (2012). Systematic constructivism applied to higher education in Psychology. Pedagogy and the Human Sciences, 1(2), 56–58. Retrieved from http://pedagogyandhumanscience.org/files/Kallio_PHSv2.pdf [13] Lefoe, G. (1998). Creating Constructivist Learning Environments on the Web:The Challenge in Higher Education. Ascilite98, 453–464. Retrieved from http://www.ascilite.org.au/conferences/wollongong98/asc98- pdf/lefoe00162.pdf [14] Lorenzo, G., & Ittelson, J. (2005). An overview of ePortfolios. Boulder, CO: EDUCAUSE Learning Initiative. Retrieved from: www.educause.edu/ir/library/pdf/ELI3001.pdf [15] Mason, R., Pegler, C., & Weller, M. (2004). E-portfolios: An assessment tool for online courses. British Journal of Educational Technology, 35(6), 717–727. doi:10.1111/j.1467- 8535.2004.00429.x [16] McWhorter, R. R., Delello, J. A., Roberts, P. B., Raisor, C. M., & Fowler, D. A. (2013). A cross-case analysis of the use of web- based eportfolios in higher education. Journal of Information Technology Education: Innovations in Practice, 12, 253-286. Retrieved from: http://www.jite.org/documents/Vol12/JITEv12IIPp253- 286McWhorter1238.pdf [17] Means, B. (1995). Technology's role within constructivist classrooms. Paper presented at the American Educational Research Association. (ERIC Document Reproduction Service No. ED383283) [18] Skinner, B. F. (1948). Walden Two Indianapolis, IN: Hackett Publishing Company. [19] Smith, P. (2010, August 11). America’s best colleges: Catering to the 21st century learner. Forbes Online. Retrieved from: http://www.forbes.com/2010/08/01/higher-education-college- rankings-opinions-bestcolleges-10-smith.html [20] Weegar, M. A., and Pacis, D. (2012). A Comparison of Two Theories of Learning--Behaviorism and Constructivism as applied to Face-to-Face and Online Learning. E-Leader Manila, 1–20. Retrieved from: http://www.g- casa.com/conferences/manila/papers/Weegar.pdf
  • 14. Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 pp. 191-195 © Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html State of the Art of Spell Checker Design for Indian Languages: A Survey Shivani1 and DharamVeer Sharma2 1 M. Tech, Department of Computer Science, Punjabi University Patiala, Punjab 2 Department of Computer Science, Punjabi University Patiala, Punjab E-mail: 1 shivanigoyal95@gmail.com, 2 dveer72@hotmail.com Abstract—For most of the common desktop applications, machine translation systems, office Automation systems, Search engine etc. spell checker plays a very important role. Commercially it is mainly concerned with practical issues of fast response time, reduced memory requirements and the user interface. Spell Checker is a basic tool to identify misspelt words in the text and provides suggestions for them from the database. The task of spell checker is vital in providing correct and quality information through text. The Indian languages are diverse and complex. Different Indian languages are written in different scripts (Malay & English are in roman script, Punjabi is in Arabic script, Hindi is in Devanagari script). Some languages contain half characters, conjuncts which increases the language complexity. Therefore, a large number of spell checker systems (likeSUDHAAR[1], Annam[3], Shabdkosh.com etc.) have been developed for different Indian languages. The user has difficulty to understand, compare and select the most appropriate spell checker due to this diversity. Thus, this survey paper provides a brief overview on error detection and error correction techniques and their capabilities and analysis of available spell checkers in Indian languages and predicts the efficiency of the systems through their ranking. 1. INTRODUCTION Now days, Computer technology has become a part of human life. Most of computer applications (like word processor, email, blog writing, keyword searching) required a Spell checker to detect incorrect words (due to mistyping or lack of knowledge of language) and to reduce the effort and time of user. A Spell Checker is a program that checks the spelling of words in a text document and provides suggestion for incorrectly spelled words in a text document. The task of spell checker is vital in providing correct and quality information through text. Spell Checker follows basic Mechanisms[5]:- 1. Read a word as input from a text document. 2. Preprocess the word. 3. Check the word whether that word is available in database. 4. If it is present then go to next one. 5. If word is not available then spell checker will check the nearest matching pattern with it and add it in the form of suggestions. A Spell Checker has three component: An error detector that detects misspelled words, a candidate spelling generator that gives spelling suggestions for the detected misspelled words and an error corrector that select the best correct spelling suggestions out of the list of candidate spelling. Dictionary is used as database in every Spell Checker. The first spell checker was only designed for English and languages similar to English. But, due to advancement in the field of programming, there are many spell checkers for Indian languages are developed besides the complexities found in them. In this survey paper, various techniques of error detection, error correction and available spell checkers in Indian languages are discussed and efficiency of spell checkers is evaluated through their ranks. Error Analysis Error is defined as a measure of the estimated difference between the observed and calculated value. Most common error occurs due to spelling or typing mistake. There are two types of errors, Real word error and Non word error. Further, According to Damerau[6] spelling errors are classified as following:- Typographic Error These errors occur when the correct spelling of the word is known, but the word is mistyped by mistake. These types of errors are mostly related to the keyboard. a. Insertion Error: Insertion error occurs due to insertion of at least one extra letter in the desired word. For example: पखा ->पख
  • 15. Shivani and DharamVeer Sharma Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 192 b. Deletion Error: Deletion error occurs due to deletion of at least one letter from the desired word. For example: सब->सेब c. Substitution Error: Substitution error occurs when one or more letters are replaced by some another letter. For example: हस->हस, मु बई ->मुबई. The substitution errors are mostly related to following reason: • Different Way to Write Same Word. For example: िलये - >िलए, बहुय ->बहुए • Vowels with similar sounds. For example: ਿ◌◌ ->◌◌ੀ, ◌◌ੇ - >◌◌ੈ, ◌ ->◌ • When a consonant set combines with the pancham Varna (ङ, ञ, ण, न, म), Then it can be shown as an anuswar over the consonant preceding it. For example: च चल -> चचल, क्गन - >कगन. d. Transposition Error: Transposition error occurs when two adjacent letters are written in swapped way. For example: कलम->कमल e. Run- on Error [7]: Run-on errors occur when two or more valid words are erroneously typed side by side without a space in the middle of it. For example: इसक े ->इसक े , उसकी - >उसकी.In the explained examples: इस, क े , उस, कीare four different words. f. Split word Error [7]: These errors occur when there is some additional space is embedded between the parts of the word. For example: इसक े ->इसक े . In some cases, split word errors may also give rise to real word errors. 2. PHONETICALLY SIMILAR CHARACTER ERROR Phonetic error occurs when the correct spelling of the word is known but the word is mistyped by mistake due to same pronunciation. It can be categorized into following types:  Class 1:ज->झ, ब->व, न->ण, ग ->घ  Class 2: फ़ ->फ, ज़->ज, ग़ ->ग, ड़ ->ड  Class 3:च चल -> चचल, पि डत->पिडत.  Class 4: ◌ु-> ◌ू◌ਂ->◌, ◌ੇ->◌ੈ, ਿ◌->◌ੀ. 3. SPELL CHECKING STRATEGY A. Error Detection Error detection is a process of detecting the misspelt words in the text with help of database. There are two efficiency techniques for detection such type of errors. 1. N-gram Analysis Techniques[8]: N-gram is a method to find incorrectly spelled words in a mass of text. N-gram is a set of consecutive characters taken from a string with a length of where n is a positive integer. N-gram tables can take on a variety of forms. The easiest is a binary bi-gram array which is 2D arrays whose elements represent all possible two letter combinations of the alphabet. The value of each character in the array is set to either 0 or 1 depending on whether that bi- gram occurs in at least the word in a predefined lexicon or dictionary .A binary tri-gram array would have three dimensions. The above arrays are non-positional binary n- gram arrays because they do not represent the position of the n-gram within a word. The most of the structures of the dictionary can be stored by a set of positional binary n-gram array. For example, in a positional binary tri-gram array the element at position a, b & c would have value 1 if only if there exists at least one word in the dictionary with the letters l, m and n in positions a, b and c. The trade-off for representing more of the structure of the dictionary is the increase in storage space required for the complete set of positional arrays. Any word may be checked for errors by simply looking up its corresponding entries in binary n-gram arrays to make sure they are all 1’s(true). 2. Dictionary Lookup: A dictionary is a list of words that are assumed to be correct. Dictionaries may be represented in many forms, each with their own characteristics like speed and storage requirements. The most common method of detecting errors in a text is simply to look up every word in a dictionary. The drawbacks of this method are to keep a dictionary up to date, and sufficiently extensive to cover all the words in a text. At the same time, response time also increases with the increase in size of dictionary. Dictionary lookup and construction techniques must be according to the purpose of the dictionary. Too small a dictionary may give the user too many false rejections of valid words, too large it may accept a high number of valid low-frequency words. The most common used technique to gain random and fast access to a dictionary is Hash Table. To lookup Input string, one has to compute its hash address and retrieve the word stored at that address in the pre constructed hash table. If the word is different stored at the hash address from the Input string or null, a misspelling is indicated. For store a word in the dictionary first calculate each hash function for the word and set the vector entries
  • 16. State of the Art of Spell Checker Design for Indian Languages: A Survey 193 Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 corresponding to the calculated values to 1(true). For find if a word belongs to the dictionary or not, we calculate the hash values for that word and look in the vector. If all entries corresponding to the values are 1(true), then the word belongs to the dictionary, otherwise not. The main disadvantage is the need to devise a clever hash function that avoids collisions without large hash table. B. Error Correction Error correction consists of two steps: the generation of candidate corrections and the ranking of candidate corrections. The candidate generation process usually makes use of a precompiled table of legal n-grams to locate one or more potential correction terms. The ranking process is used to invoke some lexical similarity measure between the misspelled word and the candidates or a probabilistic estimate of the likelihood of the correction to rank order the candidates. There are following techniques used for error correction:- 1. Morphological Analysis: The morphological analyzer processes the word and delivers the root word, along with the list of possible valid suffixes and prefixes. Out of these affixes, the ones that closely match the affixes of the misspelled word are selected and by attaching these affixes to the root word a list of suggestions are arrived. 2. Soundex Method: The soundex code of the misspelled word is generated, according to the devised coding scheme. An approximate match is performed with the Soundex codes of all the valid words present in the dictionary. A list comprising of words Soundex codes of which closely match those of misspelled word is built. 3. Edit Distance: Edit distance is a simple technique. It is defined as the minimum number of editing operations (i.e. insertions, deletions and substitutions) required to transform one string into another. In other word, by applying the four editing operations, which commonly generate typographic errors i.e. addition, deletion, substitution and transposition of letters, another list of suggestions are arrived. Edit distance is useful for correcting errors resulting from keyboard input, since these are often of the same kind as the allowed edit operations. It is not quite as good for phonetic spelling error correction, especially when the difference between spelling and pronunciation is big as in English or French. 4. Rule Based Technique: Rule-based techniques are algorithms or heuristic programs that represent knowledge of common spelling error patterns in the form of rules for converting misspellings into valid words. The candidate generation process consists of applying all applicable rules to a misspelled string and retaining every valid lexicon word those results. Ranking is frequently done by assigning a numerical score to each candidate based on a predefined estimate of the probability of having made the particular error that the invoked rule corrected. 5. N-gram Based Techniques: N-gram analysis has already been described earlier in error detection module. Letter n- grams, including trigrams, bigrams, and/or unigrams, have been used in a variety of ways in text recognition and spelling correction techniques. They have been used in OCR correctors to capture the lexical syntax of a dictionary and to suggest legal corrections. 4. ANALYSIS OF AVAILABLE SPELL CHECKERS IN INDIAN LANGUAGES The Indian languages are diverse and complex. Some languages contain half characters, conjuncts which increases the language complexity. Different Indian languages are written in different scripts (like Malay & English are in roman script, Punjabi &Urdu are in Arabic script, Hindi is in Devanagari script). Therefore, a large number of spell checker systems have been developed for different Indian languages using above techniques. This section provides the analysis of available spell checkers in Indian languages and predicts the efficiency of the systems through their ranking. A. Sanskrit Spell Checker Sanskrit called the mother of all Indian languages. All the Indian languages are expected to be derived from Sanskrit language. Sanskrit is free ordering language (or syntax free language) &there is no ambiguity in the form of the words even if the order changes. A Morphological based spell checker has been designed for Sanskrit. An algorithm has been designed to check the validity of a word. If the word is not found in the vocabulary, then the word is scanned from right to left to identify a valid suffix string such that it occurs in at least one rule. If such a rule is not found then the word is rejected as invalid and the system proceeds further. After this, at rear end of the word a transformation is carried out to obtain a pruned word. If it is found in the vocabulary or any other rule is applicable to the word obtained then the word is valid. But if no rule is applicable then the word is declared as invalid and a suggestion list is generated. The Spellchecker is implemented in Java. For display, the documents are converted into Unicode. The morphological analysis of a word serves as a foundation for POS- tagging. Similarly, it is being used in stemming for searching root words in Sanskrit Wordnet. B. NAAVI (Oriya Spell Checker) It is online spell checker. It deals with the error detection and either automatic or manual correction for the words that have been misspelled. Some algorithms have been developed in order to find the most accurate and appropriate results. The searching techniques that have been employed are very fast in
  • 17. Shivani and DharamVeer Sharma Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 194 processing such that it processes 170000 Oriya words for each misspelled word. The words in the dictionary are stored according to the word length for effective searching. It also takes help of the Oriya Morphological Analyzer for ascertaining the mistakes of inflection, derived and compounding words. Oriya Spell Checker is being successfully running embedded in a word processor. Using the similar technique a Hindi Spell Checker with 270000 words and an English Spell Checker with 20000 words has also been designed for word processor. This software is designed using Java and Java Swing for both the Windows-98/2000/NT and the Linux O/S. C. Malayalam Spell Checker In Malayalam, a large number of words can be derived from a root word, a purely dictionary based approach for Spell Checking is not practical. Hence a ‘Rule cum Dictionary’ based approach is followed. The grammatical behavior of the language, the formation of words with multiple suffixes and the preparation of the language module are dealt with in detail. The different modules in the Spell Checker Engine viz. Morphological Analyzer, Morphological Generator, Error detection and suggestion generation is done. It splits the input word into root word, suffixes, post positions etc. and checks the validity of each using the rule database. Finally it will check the dictionary to find whether the root word is present in the dictionary. If anything goes wrong in this checking it is detected as an error and the error word is reprocessed to get 3 to 4 valid words, which are displayed as suggestion. This spell checker is a subsystem developed by CDAC, Tiruvananthpuram, which could be integrated in larger applications like Microsoft word or any word processor as a macro. While running as a macro in word, it functions as an offline spell checker in the sense that one can use this software with a previously typed text file only. Both off line and online checking are possible when it is integrated with the text editor. It generates suggestions for wrongly spelt words. D. Annam (Tamil Spell Checker) Tamil Spell checker helps the user to identify most of mistyping error. It is available both offline and online. The task implemented in Tamil Spell checker are Case marker, postposition checking for nouns, Adjective checking for nouns, Case ending and PNG marker checking for verbs, Adverb checking, and Adjacent key errors checking. The applications of the Tamil Spell checker are Word processors, search engines, information filtering and extraction systems, and machine translation systems. The modules extract the root word from the given word (noun/verb) with the help of Morphological Analyzer and the root word is checked in the dictionary and if found, the word is termed as correct word. Otherwise, the correction process is activated. The correction process includes error handling and suggestion generation modules. After finding the type of error, the right form of suffixes; nouns or verbs are given as input to suggestion generation module. With the help of Morphological Generator, the correct word is generated. This module also handles the operations like select, change or ignores the suggested word and adding the word to the dictionary. E. Akshara (Telugu Spell Checker) A pure corpus based statistical stemming algorithm has been developed for Telugu. The performance of this stemmer for the spell checking application has been studied in various combinations with dictionary and morphology based approaches. Large scale spelling error data has been obtained from 10 Million word Telugu corpus. The raw corpus as it was typed has been compared with the final version after three levels of proof reading and certification by qualified and experienced proof readers. A number of tools have been developed to prepare such a data. Since words are large and complex and hence too numerous in Telugu and proper morphological analysis is difficult, it would be useful to perform studies at lower levels of linguistic units. The syllable level is a natural choice since writing in Indian languages is primarily syllabic in nature. N-gram models have been built at syllable level. F. Assamese Spell Checker The Spell Checker exists in the form of separate modules for error detection and correction, as well as a stand-alone system in which all the spell checking routines have been integrated. The non-words are detected by looking up text words in a dictionary of valid words. The dictionary used is actually a word list of around 72000 Assamese words. A hash table has been used as a lexical lookup data structure. A Soundex encoding scheme for Assamese has been designed based on the encoding scheme for English which comprises of a set of rules for encoding words and 14 numerical codes. The Soundex code of the misspell word is computed, & the dictionary is searched for words, which have similar codes. For ranking the suggestions, the technique of Levenshtein edit distance technique is used. G. Marathi Spell Checker In this ongoing project, a standalone spell checker is being built for Marathi. From the Central Institute of Indian Language (CIIL) corpus 13000 distinct words approximately have been listed. Similarly different Marathi texts are being used to build up the Dictionary. Morphological Analyzing is also being carried out on the words listed in the dictionary. For example, an automatic grouping algorithm identified 3,975 groups out of 12,886 distinct words. First word is usually the root word. Thus, there are approximately 4000 root words from Marathi corpus. A manual proof reading will be done on these results. Further enhancements of derivational morphology will help in increasing the vocabulary. Besides enhancing word lists and rules, enhancements for representing rules for ordering of multiple
  • 18. State of the Art of Spell Checker Design for Indian Languages: A Survey 195 Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 suffixes in all part of speech categories are required. More elaborate orthographic rules need to be incorporated. Morphology based spellchecker may be extended to include further syntactic and semantic analysis. Besides spellchecking, the morphology based analysis is currently being used in a few applications at the Center for Indian Languages. A motivation behind the stand-alone spellchecker is that it can be used without an editor through a packaged interface, or it can be integrated with other compatible applications such as OCR. Table 1: Rank of Marathi Spell Checker Name of Spell checker Khandbahale.com Global rank 320,723 India rank 30,873 Daily page viewer per visitor 2.50 H. Bangla Spell checker The first Bangla Spell Checker was designed by BidyutBaranChaudhuri. The technique works in two stages. The first stage takes care of phonetic similarity error. For that the phonetically similar characters are mapped into single units of character code. A phonetically similar but wrongly spelt word can be easily corrected using this dictionary. The second stage takes care of errors other than phonetic similarity. It works in both online and offline mode. The spell checker was embedded in a word processor. If there is only single error in the misspelled word then the most appropriate suggestion is found in the top four words of the suggestion list. But suggestions cannot be given on some inflected words. It also has a special feature to add words in the dictionary against which spellings are checked. The basic purpose of the spell checker is to detect the erroneous word and either suggests correct alternatives or automatically replace it by the appropriate word. Table 2: Rank of Bangla Spell Checker Name of Spell checker Shuddhoshabdo.com Global rank 19,779,445 India rank N/A Daily page viewer per visitor 1 I. Hindi Spell Checker The important factors in the design of Hindi spell checker are: the dictionary data structure, inclusion of the equivalent English words, features of auto correction in the Hindi word in case of wrong entry by the user. The wrong entry here means spelling mistake of one character missing, matra mistakes (more than one also), mistake in the usage of half consonant. Table 3: Rank of Hindi Spell Checker Name of Spell checker Shabdkosh.com Global rank 3,497 India rank 296 Daily page viewer per visitor 4.62 J. Akhar (Punjabi Spell Checker) Akhar is a Bilingual spell checker. It is available offline. It is a language sensitive spell checker i.e., if text is entered in English then English spell checker is invoked or if text is entered in Punjabi then Punjabi Spell Checker is invoked. It is a font independent spell checker and it can work on any popular Punjabi fonts such as, Anantpur Sahib, Amritlipi, Jasmine, Punjabi, Satluj etc. This removes the contrast on the user to type the text in pre-defined font only. 5. CONCLUSION This paper presents the area of Spell checking Strategy and Analysis of errors. It has surveyed on various errors detection and error correction techniques that are helpful in finding the errors. This paper also mentioned the influence of Indian languages and has surveyed on the available spell checker in different Indian languages. In future, author will design and implement new Spell Checker for Hindi language. REFERENCES [1] RupinderdeepKaur and Parteek Bhatia, “Design and Implementation of SUDHAAR-Punjabi Spell Checker,” International Journal of Information and Telecommunication Technology, Vol. 1, Issue 15, pp.0976-5972 May, 2010. [2] Daniel Jurafsky, James H. Martin, Speech and Language Processing, PEARSON, 2nd ed, September 1999. [3] T.V. Geeta, RajaniParthearath, “Tamil Spellchecker”, Resource centre for Indian language Technology Solution, Tamil Internet, Chennai, Tamil Nadu, India, 2003. [4] Neha Gupta, PratisthaMathur, “Spell Checking Techniques in NLP: A Survey,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 12, pp. 217-221, December 2012. [5] Gurpreet Singh Lehal, “Design and Implementation of Punjabi Spell Checker”, International Journal of Systemics, Cybemetics and Infomatics, pp.70-75, Jan. 2007. [6] F.J. Damerau, "A technique for computer detection and correction of spelling errors", Communication of ACM, pp. 171-176, 1964. [7] P.Kundra, B.B.Charudhari (1999), “Error pattern in Bangla text”, International Journal of Dravidian Linguistics, 28(2), 1999. [8] E.M. Riseman, A. R. Hanson, "A Contextual Post Processing System for Error Correction using binary n-grams", IEEE Transactions on Computer, Volume. 23, Issue 5, pp. 480-493, May 1974. [9] SanghamitraMohanty,“Analysis and Design of Oriya Morphological Analyzer: Some Tests with OriNet”, TDIL Newsletter, March 2004. [10] NamrataTapaswi, Suresh Jain, VaishaliChourey, “Morphological-based Spellchecker for Sanskrit Sentences”, International Journal of Scientific & Technology Research, Volume 1, Issue 3, pp. 1-4, April 2012. [11] Monisha Das, S. Borgohain, JuliGogoi, S. B. Nair, "Design and Implementation of a Spell Checker for Assamese", Language Engineering Conference(LEC'02), pp.156, Dec. 2002. [12] Veena Dixit, Satish Dethe, Rushikesh K. Joshi, “Design and Implementation of a Morphology-based Spellchecker for Marathi”, TDIL Newsletter, 2006. [13] Santhosh. T. Varghese; R. Ravindra Kumar; K.G.Sulochana, “Malayalam Spell Checker”, International Conference on Universal Knowledge and Language, RCILTS-Malayalam. Goa, pp.5.3.38, November.2002
  • 19. Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 pp. 196-200 © Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Addressing Cloud Computing Security Concerns Vasundhara Bhatia1 , NehaPrabhakar2 and SumatiManchanda3 1,2,3 Amity School of Engg. and Technology Amity University, Noida, Uttar Pradesh E-mail: 1 vasundhara.bhatia9@gmail.com, 2 nehaprabhakar91@gmail.com, 3 matimanchanda@gmail.com Abstract—Cloud computing is an upcoming model which provides various services over the network. One can share resources, request for various services or store their data at another site very conveniently. It is excessively used these days by a number of users. Cloud has a number of advantages which makes it a widely used model these days. Cloud computing offers the facility of paying for only the amount of resources that are required by a particular user at some time, thus, it provides cost saving. But cloud computing has issues, which still makes many organizations to follow the old traditional approach. We discover that security issue is one of the major issues in cloud. Security has to be kept in mind in any field and also in cloud computing. In this paper we discuss some of the security issues which affect the cloud computing system. We analyse the basics of cloud computing, characteristics, advantages, models and most importantly the security issues that it faces. 1. INTRODUCTION Cloud computing refers to using and utilizing services provided by a third party. These services may be applications, development environment, storage etc. Instead of storing applications or documents on one’s own personal computer, one can pay for cloud services where the data may be stored or the required services may be provided through the cloud vendor’s servers. The person has to pay for only what they use and the resources can be minimized and expanded according to the user’s needs. An application developer uses cloud services to gain more processing power, development environment or storage facility. An end user mostly uses applications which are provided by a developer or storage space. The major benefit is that the services are accessible from wherever you are which removes any limitations that one can only access their documents or applications only through their personal computers or laptops. All one needs is an internet connection and any device which connects to the cloud server to provide the required services [1]. 2. CHARACTERISTICS OF CLOUD COMPUTING  Cloud computing offers an important facility in which the cloud resources are demanded as and when they are required. It gives user the authority to use the cloud resources only when the user needs to use it.  Cloud computing offers scalability services. It allows users of cloud to request for some services as and when they are required. These capabilities can be scaled out, i.e. expanded or scaled in, i.e. some services can be released quickly. This allows users to use only those services that are essential to them or use the services which are additionally required.  The resources that are hosted by a cloud vendor can be accessed from a wide range of locations and these resources can be accessed through a variety of devices such as laptops, computers, mobile phones etc. This allows the cloud resources to be accessed from anywhere at any time. So the services are always available to the user.  The cloud vendor provides shared resources to various users which serves multiple users at the same time. It uses the multi-tenant model which has consumers with different virtual and physical addresses. Sharing allows the utilization of resources that are provided by the vendor.  Cloud computing systems have a facility that tries to measure and keep a track of storage or processing and many more. The usage of the resource can be monitored and controlled which provides transparency for both the vendor and the user. This controlling allows the user and vendor to be aware of the services that are used and that are required [2]. 3. ADVANTAGES OF CLOUD COMPUTING  Providing the amount of storage required: When one stores data or information in the cloud then one can get a capacity of almost unlimited storage. It is the responsibility of the cloud vendor to provide the amount of storage necessary for the user. In the traditional system, the users had to worry about increasing the storage capacity according to the requirements, but cloud facilitates the users to have as much as space needed for storage. The users are charged for only what they use.  Easy recovery and backup is provided: Since, all the data is stored in the cloud so backing up the data that is stored at the cloud vendor’s site is much easier than storing and backing up on a physical device or your own device. Cloud vendors ensure that backup is provided so a user does not have to worry about constantly backing up their data.
  • 20. Addressing Cloud Computing Security Concerns 197 Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015  Automatic integration of software: This allows the users not to worry on how their cloud services should be customized and integrated as per their requirements. One can simply pick and carefully select only those services and software applications that you think are suitable for you. The user just has the responsibility to provide their requirements to the cloud vendor and the cloud vendor may automatically integrate the software according to the desired requirements.  Access to information is simple: The information can be accessed from anywhere. This is because once a user starts to use a cloud service then the user only needs an internet connection, which are easily available these days. The cloud computing services can be provided on smart phones, laptops, tablets etc. Whenever a user wishes to access some information from the cloud, the user only needs an internet connection and a device to use it.  Fast and easy deployment: Cloud computing provides you the advantage and benefits of quickly deploying an application. When cloud system is chosen then the system which has to be deployed can be done in very few minutes. But the time depends on the technology that is needed for a particular user. The time of deployment varies from one user to another. The user can easily deploy the application that he/she wishes to deploy within a very short duration. [3]  Saving money: Cloud computing is very cost effective method to use. It is also easy to maintain and upgrade which helps to reduce the cost. When users are using the earlier methods, more cost is required in them when compared to cloud computing methods. This is because, additional licensing fees is required for various software. Various cloud vendors may provide different rates so a user has the option to choose the vendor with the cheaper rates and thus expenses are reduced.  Globalization of workforce: Since all the data is stored on cloud, people having a simple internet connection can access the required resources. This helps in globalization and employment of workforce globally, since employees working in a different part of the world can have a quick access to the required resources. [4] 4. SERVICE MODELS There are three types of cloud services that are provided by a cloud model [2,5,9]: 4.1 Software as a Service (SaaS) This is the top most layers of the services which is provided by the cloud. It provides the capability to the user to use the vendor’s applications running on a cloud infrastructure provided by the vendor. It provides the users with applications and services which can be used directly by a user which can easily be accessed from several client devices which provides on-demand services. 4.1 Platform as a Service (PaaS) It is the middle layer of the cloud services. A user can deploy his applications on the cloud without installing any platform on which the application is to be deployed. PaaS provides platform layer resources, which includes the support of the operating system and the frameworks which are used for development of various services. These services control the installed applications and available hosting environment configuration.It provides user with the option to deploy on the cloud, various technologies and applications which are developed by a user or various other applications that may be supported by the vendor. 4.2 Infrastructure as a Service (IaaS) This layer is the bottom layer of the three layers and it provides infrastructure services. These services may include resources such as memory, CPU and storage. The service that is provided to the user involves storage, processing, networks and various other computing resources. Fig. 1: Three Layers of Cloud Computing All of these three services are related to each other but understanding their relationships and dependencies is critical to understanding the risks of cloud computing security [12]. IaaS is the bottom layer which forms the basic formation of all the services. The PaaS builds upon IaaS and SaaS builds upon PaaS. All these services are provided directly to the user/client. 5. DEPLOYMENT MODELS The major factor to provide a secure cloud computing is the type of cloud to be implemented. The types of cloud deployment models offered are[7,6,6,7]: 5.1 Private cloud This type of cloud is only used for a particular organization or a group of people. It may be managed by the organization which is using it, which has the access to this cloud or third party. It is can be also named as internal cloud. The organization or the people are responsible for setting up the
  • 21. Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 198 cloud according to their own needs and maintaining them. Thus any organization can take better control of the services and all the work done within their cloud. Since only the organization has the access to this private cloud, so it is more secure. 5.2 Community cloud This type of cloud infrastructure is used by particular groups of organizations or communities. It is a semi-private cloud which is available to only those groups which have access to it. The community cloud acts as a private cloud for a particular community. Only the users that have access to this community cloud can access the services and resources provided by it. 5.3 Public cloud This type of cloud infrastructure is used to provide services to a lot of public or large group people. Public cloud is the cloud services which is provided by third parties and hosted and managed by the service providers or the vendors. All the cloud vendors have the responsibility to manage the installation, maintaining and providing services to the user. There is a huge potential for cost saving. Users are charged according the services and the resources they use. Major drawback of this type of model is the lack of security. This is because the resources and services are provided by a cloud vendor who also provides services to various unknown users. The public cloud vendors often use the multi-tenancy model in which the various users share the same resources. Since the resources are shared and the separation is vulnerable, the data and application of one organization may have a threat to be exposed to another unknown user. 5.4 Hybrid cloud Hybrid cloud is composed of a number of clouds. These clouds could be private, public or community clouds. They remain independent from each other but they remain together by a technology that enables the user to access the data and the application. The responsibilities of managing the cloud are divided amongst the organizations using the cloud and the public cloud vendors. 6. SECURITY CHALLENGES IN CLOUD There was a survey which was conducted by International Data Corporation (IDC) IT group in order to rate the cloud services and know more about its issues in 2008 [2]. This survey was conducted in 224 IT executives. The IT executives were asked to rate which cloud computing issue is of the maximum concern. The following Fig. shows the percentage of the individual issues that are found in cloud. Fig. 2: Survey of Issues in Cloud This survey conveys that the percentage of cloud security issues is found to be 74.6%, which is the highest percentage amongst all the issues that are considered in the survey. It can be concluded that that security is the major concern and it comes with a lot of threats in cloud computing [13,19]. That is the reason that cloud computing security issues are given a huge attention so that they may be prevented. It is extremely important to face these issues to make cloud computing a better and safer environment which can be expanded and used by various people. 7. EVALUATION OF SECURITY Evaluating how secure is a particular cloud system is a crucial task [14]. For evaluating the security of a cloud there are certain objectives that could be taken into consideration. The objectives that are considered an important part for a cloud to be secure are [8]:  Confidentiality: Confidentiality means that only authorized people, parties or systems have the ability to access any protected data. Every user or organization that opts for the services of a cloud vendor always wants that the information and the organizational data must remain secure. This should be done only by providing access to the users that the organization allows. Even the cloud vendor must not have access to a cloud user’s private data. Since cloud services are provided to multiple users sharing the same resources, devices and applications, the risk that the data is compromised is increased to a high level.  Integrity: Integrity means that the information or the resources that belong to a particular user can be modified only by the people who are authorized and in an authorized way.It means that the data must be protected from deletion, modification or addition to the existing data by an unauthorized person. Data and services of an organization must not be stolen or misused. Any change in the data should only be done by the person who has an authorized access provided by the cloud user itself. It is
  • 22. Addressing Cloud Computing Security Concerns 199 Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 essential to respect one’s privacy and this should also be accepted in terms of cloud.  Availability: Availability means that a system is accessible and it can be used when it is in demand by the authorized person. The cloud vendor must always keep a backup of the resources and data to ensure that the cloud user is always provided with the required services even under difficult circumstances. Availability is not only limited to data and software but also hardware being available to authorized users when it is needed. The cloud owner must ensure that the services are available to the user as and when they are required. 8. WHY SECURITY IS A MAJOR CONCERN  Lack of employee confidence and poor recruitment practices: There are some cloud vendors who may not perform background checks of their employeesor service providers. It is possible that the person might misuse the private data of an organization. The cloud vendors often do not check personally on the people they hire who may harm the vendor or the users later. Some special users such as cloud administrators usually have unlimited access to the data present in the cloud which may not be acceptable to a cloud user.  Lack of checking background of customers: Most cloud vendors do not make the effort to check the background of the customer they are providing. This gives a threat that almost anyone can open an account that has a valid credit card and an email. Some fake accounts can let attackers perform any malicious activity without being identified and tracked. One user may gain access to the resources and data of the data which compromises the security of another cloud user.  Lack of education regarding security: People have been a weak point in the knowledge about information security. This case is true in any type of organization or company. In the cloud there is more impact because there are more number of people that have to use the cloud. These people are cloud vendors, third party vendors, suppliers, customers of organizations [2]. 9. SECURITY ISSUES The various security issues that are encountered when using cloud computing are as follows. 9.1 Data Security Data security is a major concern everywhere, but it is a major problem when the users have to rely on the vendors for providing proper and essential security. In traditional application deployment, the data resides within the boundary of the organization itself and it has physical and logical security access policies. These type of data breaches and issues in the data security often occur in cases of public cloud because the cloud users have less control over the data and resources that are present at the vendor’s site. Storing the data at another site always has the risks that it can be accessed by some other party [17]. It can be accessed by the vendor itself or by another cloud user which the cloud vendor serves.It is an extremely important responsibility of the vendor to apply strong encryption techniques so that the data is secure and only selective people can control and access the data [10]. The cloud vendor should ensure that only the people who are authorized by the cloud user can change, add, modify or delete any information of the cloud user. The cloud vendor must not have any control whatsoever to change any information that belongs to the user. Backup and recovery of data is another issue. There may be certain circumstances where the data at the vendor’s site may be lost or compromised. In such a case, the vendors often have a backup somewhere else to ensure that the data is always available to the cloud user. But, keeping a backup at different locations or sites may not ensure that the data is in safe hands. 9.2 Multi-tenancy In public cloud services the user shares the resources and components with other users at the vendor’s site [7]. These users may be unknown to them. In a multitenant environment, many customers share the same application, which uses similar operating system, on the same hardware, with the same functionalities of data storage. The differentiation amongst the data of a particular user is made on the application layer. Multi tenancy allows for cost savings for the vendor and thus may also provide cost saving for the cloud user. This is possible because various resources are shared among various users so the cloud vendor does not need to install additional infrastructure for different users. Since the vendor saves money so it is possible that the vendor offers these services to the users for less cost. Using resources from a multitenant environment poses risk to the resources and data of one user from another. An attacker could simply be another cloud user and may discover the vulnerabilities that the cloud environment is having. The separation between the different users may be have been overcome and the data and resources of another user can be accessed by an attacker who poses as a user to the vendor [11]. The risk of an attacker posing as a user often increases because the vendors do not have background checks on the users there are going to provide services. Vendors simply think of their benefit and ignore the cause that and if a user is not as he poses to be then he might cause loss to the vendor. 9.3 Application Security Applications are delivered and used via the Internet through a Web browser. SaaS provides the software which is deployed over the internet and is also deployed to run behind a firewall in local area network or personal computer [10]. People who attackers the applications they use the web to gain access of user’s information and perform malicious activities such as
  • 23. Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015 200 steal sensitive data of a user etc. [5]. The threats that might be present in a cloud based environment are generally more than the traditional system. It is also possible that tenants using the same SaaS infrastructure, gains access to the data of another tenant through the vulnerability in the web layer. 9.4 Trusted Third-party A trusted third party provides secure interaction between two parties who trust a third party. These trusted third parties provide various security services which are based on standards. They are useful across various geographical areas, domains and specialization sectors. These third parties provide an assurance of trust between two parties by special techniques and mechanisms [16]. So it becomes necessary to choose the correct third party which provides appropriate mechanism for the secure interaction between the two parties. A high level of trust and reliability has to be established because if the third party does not provide the correct means then it may lead to the information and data of a party to be insecure. The two parties rely on the third party to perform various functions such as cryptographic separation of data which encrypts the data and ensures that the data is not visible to any outsider and server and client authentication in which both the interaction parties require to certify their server and network devices. 9.5 Service Level Agreement Service level agreements are the contracts which are signed by a cloud vendor provided by the cloud user. It specifies the services that are to be provided by the cloud vendor to the user.The service level agreements, also defines the terms and conditions and period of service to be provided. If the service provided by the vendor is to be discontinued by the user then the conditions for termination are decided at the initial level itself. In case the termination of the agreement between the cloud user and vendor is to be performed then removal of the user data from the vendor’s site after termination is to be done [1]. This should be ensured that the data is removed after termination of services otherwise the cloud vendor may misuse the user’s data.The authentication and authorization is specified to identify who can access the services. This is a crucial part because it defines who can access the data and services of the user. These conditions should be correctly represented to ensure that the vendor or any third party may not find something faulty in it and gains access to the user data. The vendor has to clearly specify the services that will be provided to the user. It also includes the measures that the vendor will take to ensure security. Information about any backup that is to be done in any scenarios is also to be given. If a cloud vendor is unsatisfactory in any of the conditions that are provided in these agreements then legal action may be taken using these service level agreements. These ensure that what user expects and what the vendor provides is clearly specified in these agreements so that no expectation gaps occur between the user and vendor. It represents clarity in the understanding of the services to both the vendor and the user. 10. CONCLUSION Thus, we can observe that even though cloud computing offers enumerable advantages but at the same time one faces with a variety of issues. It becomes the responsibility of every cloud user to be aware of both the advantages and disadvantages of the cloud services in order to use the cloud services efficiently and securely. REFERENCES [1] National Institute Of Standard and technology. csrc.nist.gov/groups/ SNS/cloud-computing/cloud-def-v15.doc, 2009 [2] Rajesh et al , International Journal of Advanced Research in Computer Science and Software Engineering 2 (9), September- 2012, pp. 115-120 [3] http://mobiledevices.about.com/od/additionalresources/a/Cloud- Computing-Is-It-Really-All-That-Beneficial.htm [4] http://www.verio.com/resource-center/articles/cloud-computing- benefits/ [5] Hashizume et al.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 2013 4:5. [6] Florin OGIGAU-NEAMTIU, CLOUD COMPUTING SECURITY ISSUES,Journal of Defense Resource Management,Vol. 3,Issue 2(5)/2012 [7] ABHA THAKRAL SACHDEV* et al ISSN: 2319 - 1163 Volume: 2 Issue: 2 126 – 130 [8] D. Zissis, D. Lekkas / Future Generation Computer Systems 28 (2012) 583–592 [9] Wayne A. Jansen, NIST, Proceedings of the 44th Hawaii International Conference on System Sciences – 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing [10] S. Subashini, V. Kavitha / Journal of Network and Computer Applications 34 (2011) 1–11 [11] National Institute of Standards and Technology Special Publication 800-144 80 pages (December 2011) [12] http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pd f [13] GregBoss, Padma Malladi, Dennis Quan, Linda Legregni and Harold hall 2007. Cloud Computing.Available from www.ibm.com/developerworks/websphere/zones/hipods/. [14] Anthony T.Velte, Toby J.Velte and Robert Elsenpeter 2010. Cloud Computing- A Practical Approach. Publishing of Tata McGRAWHil. [15] Mohamed Al Morsy, John Grundy and Ingo Müller, An Analysis of The Cloud Computing Security Problem, In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010. [16] Kevin Hamlen et al.: Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010 [17] 2009. Cloud Computing: An Overview, Pages 2 (June 2009), 2 pages. DOI=10.1145/1538947.1554608 http://doi.acm.org/10.1145/1538947.1554608 [18] Basta, A., &Halton, W. (2007). Computer Security and Penetration Testing (1st ed.). Delmar Cengage Learning. [19] NitashaHasteer ,AbhayBansal , B. K. Murthy, Pragmatic assessment of research intensive areas in cloud: a systematic review, ACM SIGSOFT Software Engineering Notes, v.38 n.3, May 2013