Andreas Schleicher presents at the launch of What does child empowerment mean...
Advances In Computer Science And Information Technology
1. I
Advances in Computer Science and Information Technology
(ACSIT)
Print ISSN: 2393-9907
Online ISSN: 2393-9915
Editor-In-Chief:
Mohamed M. Elammari, Ph. D.
Faculty of Information Technology,
University of Benghazi, Libya
Associate Editor:
Rabindra Kumar Jena, Ph. D.
Information Technology Management Department
IMT, Nagpur-440013, India
Editorial Board Members:
M. R. Tripathy, Ph. D.
Department of Electronics & Communication Engineering,
Amity School of Engineering and Technology
Amity University Campus, Sector-125, Noida (U.P.) – 201303, India
Shishir K. Shandilya, Ph. D.
Dean (Academics) & Head –Department of Computer Science & Engineering
BANSAL Institute of Research & Technology, Bhopal, M. P., India
Basant Kumar, Ph. D.
Computer Science and Mathematics Department
Modern College of Business & Sc
(Affiliated with University of Missouri, St.Louis, USA
& Franklin University, Ohio, USA), Muscat, Sultanate of Oman
Amit Choudhary, Ph. D.
Department of Computer Science
Maharaja Surajmal Institute
(an affiliate of G.G.S. Indraprastha University, Delhi, India)
Moirangthem Marjit Singh
Department of Computer Science & Engineering
North Eastern Regional Institute of Science & Technology (NERIST),
(Deemed University under MHRD, Govt. of India), Nirjuli-791109, Arunachal Pradesh
Published by:
Krishi Sanskriti Publications
E-47, Rajpur Khurd Extn., Post Office – I.G.N.O.U. (Maidangarhi)
New Delhi-110068, INDIA
Contact No. +91-8527006560; Website: http://www.krishisanskriti.org/acsit.html
3. III
Submission of Manuscripts
Please visit the journal’s home pages at http://www.krishisanskriti.org/acsit.html for details of aims and scope,
readership, instruction to authors and publishing procedure and table of contents. Use website to order a subscription,
reprints and individual articles.
Authors are requested to submit their papers electronically to editor.acsit@krishisanskriti.org and mention journal
title (ACSIT) in subject line.
Publication Fee:
The publication fee for this journal is $300 (International authors) and INR 3500 (India, Pakistan, Nepal and
Bangladesh), including taxes.
Subscription Information
Subscription orders may be directed to the publisher or contact your preferred subscription agents.
Regular Subscription price for the Journal
US$380/Libraries and US$360/Individual (Outside India)
Rs. 3500/Libraries and Rs. 1800/ Individual (Inside India)
The Bank details for subscription/publication payment through NEFT/Online Transfer/ DD:
Beneficiary Name : Krishi Sanskriti
Bank Name : Canara Bank
Bank Address : Jeet Singh Marg, New Delhi
Account No. : 1484101026988
Account Type : Savings
IFSC Code : CNRB0001484
Swift Code : CNRBINBBBID
Frequency of Publication
Quarterly (depending on the number of literature being accepted for publication, the volume will be split in numbers
as required).
All business correspondence enquires and subscription orders should be addressed to:
Editor-in-Chief
Editorial Office,
Advances in Computer Science and Information Technology (ACSIT),
Krishi Sanskriti Publications
E-47, Rajpur Khurd Extn.
Post Office- I.G.N.O.U. (Maidangarhi),
New Delhi -110 068, India
E-Mail: editor.acsit@krishisanskriti.org
4. IV
Author Guidelines
Please follow the Guide for Authors instructions carefully to ensure that the review and publication of your paper is
swift and efficient.
A manuscript may be returned for revision prior to final acceptance, the revised version must be submitted as soon as
possible after the author's receipt of the referee's reports. Revised manuscripts returned after the expiry of stipulated
time (as quoted during such a request) will be considered as new submissions subject to full re-review.
Paper categories:-
Contributions falling into the following categories will be considered for publication:
• Original high-quality research papers (preferably no more than 10 pages double-line-spaced manuscript, in
double column including tables and illustrations)
• Short communications or case studies for rapid publication (no more than 5 double-line-spaced manuscript, in
double column pages including tables and figures)
• Mini-Review on subjects of cutting-edge scientific developments, theories, hypotheses and concepts, which
could be of importance to the scientific community world-wide.
Ethics in publishing
Ethics in publishing and Ethical guidelines for journal publication, a standard operating procedure (SOP) can be
followed as applied to other publication systems. For reference, online versions of the same can be freely accessed
and information on the same may be sought by the publishing author(s).
Conflict of interest
Disclosure of actual or potential conflict of interest including financial by all the authors is mandatory for final
appearance of their article in the journal. The standard procedure of operation (SOP) in this regard will be as
followed by other publishing house and/or the laws governing such practices.
Submission declaration
Submission of an article implies that the work described has neither been published elsewhere (except in the form of
an abstract or as part of a published lecture or academic thesis or as an electronic preprint), nor is under consideration
for publication with other publishing house.
Results submitted for publication should refer to their previous findings in the same way as they would refer to
results from a different group. This applies not only to figures or tables, or parts of them, but has to be understood in
a wider sense.
Acknowledgements
The acknowledgement section should list (a) other contributors for whom authorship is not justified, e.g. technical
help; (b) financial and material support.
Changes to authorship
This policy concerns the addition, deletion, or rearrangement of author names in the authorship of accepted
manuscripts:
Before the publication of the accepted manuscript, requests to add or remove an author, or to rearrange the author
names, must be sent to the Journal Editorial Office through email from the corresponding author of the accepted
manuscript and must include: (a) the reason the name should be added or removed, or the author names rearranged
and (b) written confirmation (e-mail the scanned letter of consent or fax) from all authors that they agree with the
addition, removal or rearrangement. In the case of addition or removal of authors, this includes confirmation from the
author being added or removed. Requests that are not sent by the corresponding author will be forwarded by the
Editorial Office to the corresponding author, who must follow the procedure as described above. Note that the
publication of the accepted manuscript will be suspended or kept in abeyance until authorship has been agreed.
After the accepted manuscript is published, any request to add, delete, or rearrange author names in an article
published in any issue will follow the same policies as noted above and result in a corrigendum.
5. V
Copyright
This journal offers authors a choice in publishing their research Open Access.
For Open access articles please mention the role of the funding source or agency. You are requested to identify who
provided financial support for the conduct of the research and/or preparation of the article and to briefly describe the
role of the sponsor(s), if any, in study design; in the collection, analysis and interpretation of data; in the writing of
the report; and in the decision to submit the article for publication. If the funding source(s) had no such involvement
then this should be stated.
Informed consent and patient details
Studies on patients or volunteers require ethics committee approval and informed consent, which should be
documented in the paper. Appropriate consents, permissions and releases must be obtained where an author wishes to
include case details or other personal information or images of patients and any other individuals.
Unless a written permission from the patient (or, where applicable, the next of kin), the personal details of any patient
included in any part of the article and in any supplementary materials (including all illustrations) is obtained while
making submission of such an article, no article or manuscript of such type would be accepted for publication in this
journal.
Submission
Submission to this journal proceeds totally online and you will be guided stepwise through the creation and
uploading of your files. The system automatically converts source files to a single PDF file of the article, which is
used in the peer-review process. All correspondence, including notification of the Editor's decision and requests for
revision, will be effected by e-mail, thus removing the need for a paper trail.
Referees
Authors are requested to submit a minimum of four suitable potential reviewers (please provide their name, email
addresses, and institutional affiliation). When compiling this list of potential reviewers please consider the following
important criteria: they must be knowledgeable about the manuscript subject area; must not be from your own
institution; at least two of the suggested reviewers must be from another country than the authors'; and they should,
not have recent (less than four years) joint publications with any of the authors. However, the final choice of
reviewers is at the editors' discretion.
PREPARATION OF MANUSCRIPT
Use of word processing software:
It is important that the file be saved in the native format of the word processor used. The text should be in double
column format. Keep the layout of the text as simple as possible. Most formatting codes will be removed and
replaced on processing the article. However, do use bold face, italics, subscripts, superscripts etc. When preparing
tables, if you are using a table grid, use only one grid for each individual table and not a grid for each row. If no grid
is used, use tabs, not spaces, to align columns.
Note that source files of figures, tables and text graphics will be required whether or not you embed your figures in
the text. To avoid unnecessary errors you are strongly advised to use the 'spell-check' and 'grammar-check' functions
of your word processor.
Article Structure
Authors should arrange their contribution in the following order:
1. The paper title should be short, specific and informative. All author's names and affiliations should be clearly
indicated. Please also indicate the author for correspondence and supply full postal address, telephone and fax
numbers, and e-mail address of such an author.
2. An abstract of approximately 250 words, outlining in a single paragraph the aims, scope and conclusions of the
paper.
3. Four keywords, for indexing purposes;
4. The text suitably divided under headings.
Subdivision - numbered sections
Divide your article into clearly defined and numbered sections. Subsections should be numbered 1.1 (then 1.1.1,
1.1.2, ...), 1.2, etc. (the abstract is not included in section numbering). Any subsection may be given a brief
heading. Each heading should appear on its own separate line.
5. Acknowledgments (if any).
6. VI
6. References (double spaced, and following the Oxford style).
7. Appendices (if any).
8. Tables (each on a separate sheet).
9. Captions to illustrations (grouped on a separate sheet or sheets).
10. Illustrations, each on a separate sheet containing no text, and clearly labeled with the journal title, author's name
and illustration number.
Essential title page information
• Title. Concise and informative. Titles are often used in information-retrieval systems. Avoid abbreviations and
formulae where possible.
• Author names and affiliations. Where the family name may be ambiguous (e.g., a double name), please indicate
this clearly. Present the authors' affiliation addresses (where the actual work was done) below the names. Indicate
all affiliations with a lower-case superscript letter immediately after the author's name and in front of the
appropriate address. Provide the full postal address of each affiliation, including the country name and, if
available, the e-mail address of each author.
• Corresponding author. Clearly indicate who will handle correspondence at all stages of refereeing and
publication, also post-publication. Ensure that phone numbers (with country and area code) are provided in
addition to the e-mail address and the complete postal address.
Contact details must be kept up to date by the corresponding author.
• Present/permanent address. If an author has moved since the work described in the article was done, or was
visiting at the time, a 'Present address' (or 'Permanent address') may be indicated as a footnote to that author's
name. The address at which the author actually did the work must be retained as the main, affiliation address.
Superscript Arabic numerals are used for such footnotes.
Submission checklist
Please ensure that the following items are present, while submitting the article for consideration:
One author has been designated as the corresponding author with contact details:
• E-mail address
• Full
• Postal address
• Phone numbers
All necessary files have been uploaded, and contain:
• Keywords
• All figure captions
• All tables (including title, description, footnotes)
• Manuscript has been 'spell-checked' and 'grammar-checked'
• References are in the correct format for this journal
• All references mentioned in the Reference list are cited in the text, and vice versa
• Permission has been obtained for use of copyrighted material from other sources (including the Web)
After Acceptance
Use of the Digital Object Identifier
The Digital Object Identifier (DOI) may be used to cite and link to electronic documents. The DOI will be assigned
as per standard protocol to the 'Articles in press'. For reference about the given DOI (in URL format; see here an
article in the journal Physics Letters B): http://dx.doi.org/10.1016/j.physletb.2010.09.059, is cited for your perusal.
Online proof correction
Corresponding authors will receive an e-mail with a link to our Submission System, which would allow them to
annotate and do correction of proofs online. In addition to editing text, the authors can also comment on
figures/tables and answer questions from the Copy Editor.
All instructions for proofing will be given in the e-mail to be sent to authors, we will ensure from our side to get your
article published quickly and accurately if all of your corrections are uploaded within two days and also, that all
corrections are performed in one session. Please check carefully before replying, as inclusion of any subsequent
corrections cannot be guaranteed. Proofreading is solely author’s responsibility. Note that publisher team may
proceed with the publication of your article if no response is received.
7. Advances in Computer Science and Information Technology
(ACSIT)
Volume 2, Number 3; January-March, 2015
Contents
Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 186-190
Rupa Basu
State of the Art of Spell Checker Design for Indian Languages: A Survey 191-195
Shivani and DharamVeer Sharma
Addressing Cloud Computing Security Concerns 196-200
Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda
Reduction of Load on Network using Compression Technique with Web Crawler 201-203
Sneha Tuteja, Naresh Kumar and Rajender Nath
Hospital Information Systems Integration Plan System Perespective 204-207
Qurat Ul Ain and Sumera Shafi
Secure Mining of Association Rule through Hash Key in Horizontally Distributed Database 208-210
Raunak Rathi, A.V. Deorankar and Roshani Sherkar
A Study on Mobile-Commerce 211-214
Seema Chaudhary and Gunjan Sharma
Data Base Management System in Cloud Computing Environment 215-220
Sudhanshu Maurya and Swati Kumari
Development of Distributed E-Healthcare System Using Service Oriented Architecture 221-228
Sudhanshu Maurya and Swati Kumari
Cloud based E-Learning–Using cloud to provide Learning as a Service 226-229
Tania Gaur and Nisha Kharb
Combination of Genetic Algorithm with Fuzzy Systems 230-232
Gaurav and Nidhika Yadav
Review of Techniques of Digital Video Forgery Detection 233-236
Mrs. J.D. Gavade and Mrs. S.R. Chougule
Fuzzy Rough Sets and Its Application in Data Mining Field 237-240
Megha Kumar and Nidhika Yadav
8. Contents
Web Information Retrieval System 241-244
NehaPrabhakar, Vasundhara Bhatia, SumatiManchanda and Nidhi Sharma
Review: Neural Network based Approach for Travel Time Prediction 245-248
P.K. Kharat, Sagar S. Gaikwad and S.V. Patil
Effect of the Core Selection Strategy in Determining Optimum BDMST in Multicast Networks 249-251
Sakshi Arora and Sunanda
Recommender System-A Close Look at Collaborative Filtering 252-257
Shivani Agrawal, PankhuriRastogi and Shubhi Agarwal
Proposed Methodology for Database Privacy in an Existing System Using Hippocratic Database 258-260
Sonali Ganguly and S.P. Singh
Role of ICTS in Education: Promises and Challenges ICT as a Change Agent 261-261
Prabha Sharma
A Study on Data Preprocessing, Classification and Clustering using WEKA Tool 262-266
Amit Gupta and Naganna Chetty
Offline Signature Verification with ANN using Shape Properties a Feasibility Report 267-271
K. Srivastava, Subhash Chandra and Sushila V. Maheshkar
Manual and Automation Analysis of Load Testing 272-275
Ritika
Encryption Techniques in Cloud Computing 276-280
Meena Kumari and Rajender Nath
Commerce: A Virtual Assistance Making Life Challenging Or Simpler 281-287
Ms. Shuchi Shukla and Ms. Prerna Singh
Improving GIS in Health Care 288-289
Kush Benara
Broadening the Scope of Rural Marketing by Internet Technology 290-294
Ms. Shraddha Singhal and Ms. Radhika Tomar
Big Data & Accounting Measurements 295-305
Mohammad Mehdi Nasrizar
Role & Significance of Information Technology in Enhancement of Business Management 306-312
Ms. Nalini K. Atkare, Ms. Priti S. Dharammali and Shrinivas Manekar
10. Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 187
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
that the assimilation of knowledge is personal and therefore no
two learners can build up the same meaning out of a given
situation.
Thus the constructivist approach shifts emphasis from
teaching to learning, individualizes and contextualizes
students’ learning experiences, helps students develop
processes, skills and attitudes, and focuses on knowledge
construction, not reproduction. Whereas in traditional
classrooms knowledge is inert, in constructivist classrooms it
is dynamic and changes with experiences [9].
In the constructivist classroom, students work primarily in
groups and learning and knowledge are dynamic and
interactive. There is a great focus and emphasis on social and
communication skills, as well as collaboration and exchange
of ideas. This is contrary to the traditional classroom in which
students work primarily alone, learning is achieved through
repetition, and the subjects are strictly adhered to and are
guided by a textbook. Some activities encouraged in
constructivist classrooms are: (1) Experimentation where
students individually perform an experiment and then come
together as a class to discuss the results. (2) Field trips allow
students to put the concepts and ideas discussed in class in a
real-world context. (3) Research projects in which students
research a topic and can present their findings to the class. (4)
Filmsprovide visual context and thus bring another dimension
into the learning experience. (5) Class discussions are used in
all of the methods described above. It is one of the most
important aspects of constructivist teaching methods [10].
Traditional pedagogical approaches often may not be the best
way to cater for the specific needs of learners in higher
education settings, particularly those of university students
with special expectations and professional
prospects.Traditionally, assessment in the classrooms is based
on testing. In this it is important for the student to produce the
correct answers. However, in constructivist teaching, the
process of gaining knowledge is viewed as being just as
important as the product. Thus, assessment is based not only
on tests, but also on observation of the student, the student’s
work, and the student’s points of view. Some assessment
strategies include oral discussions, mind-mapping, hands-on
activities and pre-testing [13].
Constructivist philosophy now has a reasonably long history
of application in education programs for young children in the
western world, but is used less frequently in adult learning
environments.
Learning environments for adults based on constructivist
philosophy include opportunities for students to make
meaningful connections between new material and previous
experience, through discovery. The importance of using these
types of strategies with adults contributes to critical learning
environments where instructors “embed” the skills they are
teaching in “authentic tasks that will arouse curiosity,
challenge students to rethink assumptions and examine their
mental modes of reality”[12].
3. WEB-BASED INSTRUCTION IN HIGHER
EDUCATION
There has been a widespread increase in the use of web-based
instruction in universities across the world but there is doubt
about the quality of instruction they impart. For example,
Boshier et al.[4] examined 127 courses and expressed concern
that many web-based subjects have not utilised the full
capability of the available technology and some sites actually
emulated the worst of face-to-face courses where learners are
constructed as passive recipients of information.
Behaviourist instructional strategies, with their inherent
limitations, and which rely on the development of a set of
instructional sequences with predetermined outcomes, have
also been followed in the designing ofmost of the web-based
instruction. There is a need for a shift in approaches to
pedagogy as well as a way of supporting alternate frameworks
for instruction within a web-based environment.Current
instructional design models do not provide effective strategies
for designing constructivist learning environments. In a web-
based environment this proves to be even more challenging
[11].
However, with advancing technologies many web-based
courses have moved to increasingly providing scope for
communication and interaction, through synchronous and
asynchronous discussion. Through the provision of real world
contexts and opportunity for collaboration, the learning
experience can be designed to provide opportunity for students
to take control of their own learning.
Studies have shown that educational institutions that have
embraced technology as part of their curriculum have
experienced an increase in student performance and academic
achievement. Learning ‘with’ technology is the aim for
successful integration of technology. Technology supports
exactly the kinds of changes in content, roles, and
organizational climate that are at the heart of constructivist
educational reform movements [17].
4. WHAT ISAN E-PORTFOLIOS?
An e-portfolio, basically an electronic or digital portfolio, is an
electronic collection of evidence that shows a student’s
learning and accomplishments over time. Evidence may
include writing samples, photos, videos, research projects,
observations by mentors and peers, the student’s reflection on
the artifacts, and what the student learned from the process of
developing the e-portfolio.
11. Rupa Basu
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
188
The term portfolio has long been associated with artists who
gather examples of their work together for exhibition or to
gain commissions. The term is also associated with financial
portfolios which can be a collection of investments or assets.
Similarly, an educational portfolio documents the learning
achieved by a student. E-portfolios first made an appearance
in the 1990s.
The e-portfolio is an adaptation of the original paper-based
portfolio in digital format, is a more recent phenomenon that
not only provides students with a repository for collection and
presentation of their work but also a mechanism for
documenting growth and achievement of professional
knowledge and skills. Educators, especially in the USA, are
showing increasing interest in portfolios for assessment of
learning. The subject area has grown enormously in recent
times and has a huge potential to impact on higher education
[8].
There is a significant amount of learning that can take place
through the creation of e-portfolio. There is high student
involvement in putting together the contents of a portfolio,
often through discussion or negotiation with an academic
tutor. This is perhaps the most attractive feature of a portfolio,
from the point of view of an educator. The portfolio also
provides a more rounded and reliable assessment of learning
achieved than written examinations or essay assignments
alone. The emphasis on assessment still drives the curriculum
and dictates teaching methods at most places. Outdated tools
are still used to assess and measure student performance.
Educational institutions have yet to recognize and utilize
technology as an effective form of assessment in
schools.Because of the ownership of the portfolio by the
student, each portfolio is individual and unique. Teachers are
looking at e-portfolios as an alternative form of assessment in
which both standards and student performance are used. .
One of the most attractive features of e-portfolios is the
diversity and richness of artifacts that can be associated with
learning. Examples of such materials include word or text
documents; PowerPoint presentations; web-pages with
hyperlinks; Excel spreadsheets and graphs; scanned images;
digital photographs; multimedia audio and video files; and
results from interactive computer-assessment programs.
The pedagogy of e-portfolios has been studied and reviewed
by Barrett & Wilkerson [3]. An e-portfolio should provide a
dynamic environment for learners to document and celebrate
learning they have achieved.
E-portfolio development also about the “interactions” of
learning. Knowledge is distributed among people and artefacts
which is also an important aspect of learning in this
networking age. Most of the present day e-portfolio platforms
provide the option for inclusion of peer review, feedback and
discussion. Therefore e-portfolios have the potential to
become lifelong learning tools.
E-portfolios have a number of advantages over print based
portfolios including portability, the ability to store, organise
and reorder contents quickly and easily; provide opportunities
to integrate student course work; their ability to form the basis
for collaboration; the potential for development of information
management, self-organisation, planning, and presentation
skills. Some of the publicly available electronic portfolio
platforms are: Foliotek, LiveText, ePortfolio, TaskStream,
Tk20, TrueOutcomes and so on. These platforms support
student portfolios, faculty-controlled assessments, curriculum
records, and surveys, lesson plan building, and the delivery of
learning materials and resources.
E-portfolio has been used successfully for both learning and
assessment in a number of disciplines including the Arts,
Humanities and Social Sciences. In last few years computer
science and engineering education faculty and students have
been introduced to the concept of e-portfolios. Students have
found the advantages of e-portfolio to showcase their work
particularly for employment purposes.
A constructivist classroom using technology-based projects
provides authentic evidence of assessment as proof of student
learning. The very essence of constructivism, that learning
takes place in contexts where learners are engaged in critical
and reflective thinking, working in a collaborative and
cooperative environment intertwines with the implementation
of the e-portfolio system in higher education.E-portfolios have
been found to foster active learning, motivate learning and
empower students, which support the constructivist theory of
learning [15].
5. ISSUES IN THE IMPLEMENTATION OF
E-PORTFOLIOS
E -portfolios are not without their challenges. There are a
number of issues that include the time intensive nature of their
development; difficulties in mastering the use of the software;
and issues of privacy. Even more importantly, without a
central focus on reflection, e-portfolios may end up becoming
simply a collection of information rather than a mechanism for
the development of meaningful knowledge. Collaborative
activities and peer feedback should be made as integral part of
the e-portfolio.
Another challenge is to find e-portfolio strategies that meet the
needs of both the students, to support deep learning, and to
give the institution the information they need for grading and
accreditation purposes. Any assessment process requires the
aggregation of data for determining student quality, program
quality and continuous improvement. Since the fundamental
principle of a student-centered portfolio is to allow choice by
12. Use of E-Portfolios in Higher Education: Application of Constructivist Theory for Effective Learning 189
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
the student in the collection of artifacts, aggregation of data
could be very difficult.
The difficulty lies on how to combine standards based
assessment with individualized assessment. According to Ahn
[1] e-portfolios do possess the potential to bridge these
conflictinggoals. The contents of the student’s portfolio can
demonstrate how the student has met the standards by using
hypertext links to connect the work to the standards it meets.
One of the critical aspects in this process is also the design and
development of the rubric for evaluation of e-portfolios [2].
Other issues facing schools or teachers who want to
implement portfolios are lack of availability of computers in
classrooms, blocked websites, software and hardware
problems, and time management.
When computers are not in the classroom the educational
institutions have computer labs to accommodate the needs of
the entire campus. The problems encountered when depending
on computer labs are availability, flexibility, and
dependability.
A number of technological barriers can also affect the
successful implementation of the electronic portfolio. E-
portfolios depend on the use of technology to contain its
contents and before beginning the portfolio process the
method of storage has to be considered. The issues with
integrating technology in an academic setting such as
accessibility and permission to enter certain websites and
adequate software and hardware can make things difficult for
the student and teacher [14].
6. CONCLUSION
An electronic portfolio is an extraordinary way for students to
learn technological skills, develop deep learning that requires
both critical and higher order thinking, with evidence of
learning through self-reflection. These are the valuable skills
sought after by universities and the workforce.
In the 21 century, e-Portfolios are becoming a prevalent way
to allow students to combine text, graphics, sound and video
to create a powerful multimedia demonstration of their
accomplishments [16]. Web-based e-Portfolios fit well with
the constructivist philosophy of education where students can
create their own meaning using platforms for student-authored
content and without being restricted by organizational
boundaries.
As the web-based e-portfolio are student-owned their
usefulness is expanded to include lifelong and life-wide
learning [6]. This career connection is also echoed in the
literature; for instance, the e-portfolio building process was
found to encourage students to think about their professional
knowledge, skills and abilities [5]. It would not be difficult to
believe that e-portfolio could someday be a requirement for
admission into a university and for getting a job.
E-portfolios are being touted as the biggest innovation in
educational technology since the introduction of course
management systems. Literature shows that electronic
portfolios, if done right can lead students to be life-long,
reflective and responsible learners [14].
7. ACKNOWLEDGEMENT
I wish to express my heartfelt gratitude to Dr. J.B. Singh,
Principal, Sri Guru Gobind Singh College of Commerce,
University of Delhi, for his encouragement and active support
in the writing of this paper.
REFERENCES
[1] Ahn, J. (2004). Electronic Portfolios: Blending Technology,
Accountability& Assessment. T H E Journal, 0192592X, Vol.
31, Issue 9
[2] Barrett, H. (2005). Researching electronic portfolios and learner
engagement. White Paper. Retrieved from
https://www.helenbarrett.com/reflect/whitepaper.pdf
[3] Barrett, H. & Wilkerson, Judy. (2004) Conflicting Paradigms in
Electronic Portfolio Approaches. Choosing an Electronic
Portfolio Strategy that Matches your Conceptual Framework.
Retrieved from
http://electronicportfolios.org/systems/paradigms.html
[4] Boshier, R., Mohapi, M., Moulton, G., Qayyum, A., Sadownik,
L., and Wilson, M., (1997) Best and worst dressed web courses:
Strutting into the 21st Century in comfort and style in Mitchell,
I., (Ed) Distance Education Vol 18, No 2. (pp 327 - 349)
[5] Buzzetto-More, N. (2010). Assessing the efficacy and
effectiveness of an ePortfolio used for summative assessment.
Interdisciplinary Journal of e-Learning and learning Objects, 6,
61-85. Retrieved from
http://www.ijello.org/Volume6/IJELLOv6p061-
085Buzzetto691.pdf
[6] Chen, H. L. (2009). Using ePortfolios to support lifelong and
lifewide learning. In Darren Cambridge, Barbara Cambridge,
and Kathleen Yancey (Eds.), Electronic portfolios 2.0:
Emergent research on implementationand impact (pp.29-35).
Sterling, VA: Stylus.
[7] Greeno, J. G., Collins, A. M., & Resnick, L. B. (1996).
Cognition and learning. Handbook of educational psychology.
Handbook of Educational Psychology. Retrieved from
http://psycnet.apa.org/psycinfo/1996-98614-001
[8] Gomez, S. (2004). Electronic portfolios in higher education.
Higher Education Academy Resources …. Retrieved from
http://www-
new1.heacademy.ac.uk/assets/Documents/resources/database/id
446_electronic_portfolios.pdf
[9] Husen, T. and Postlethwaite, T.N. (eds.) (1989); Constructivism
in Education. The International Encyclopedia of Education,
Supplement Vol.1. Oxford/New York: Pergamon Press, 162–
163. http://www.univie.ac.at/constructivism/EvG/papers/114.pdf
[10] Hussain, I. (2012). Use of Constructivist Approach in Higher
Education: An Instructors’ Observation. Creative Education,
03(2), 179–184. doi:10.4236/ce.2012.32028
[11] Jonassen, D. H., (1994). Thinking Technology: Toward a
constructivist design model. Educational Technology, 34(3), 34-
37.
13. Rupa Basu
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
190
[12] Kallio, E. (2012). Systematic constructivism applied to higher
education in Psychology. Pedagogy and the Human Sciences,
1(2), 56–58. Retrieved from
http://pedagogyandhumanscience.org/files/Kallio_PHSv2.pdf
[13] Lefoe, G. (1998). Creating Constructivist Learning
Environments on the Web:The Challenge in Higher Education.
Ascilite98, 453–464. Retrieved from
http://www.ascilite.org.au/conferences/wollongong98/asc98-
pdf/lefoe00162.pdf
[14] Lorenzo, G., & Ittelson, J. (2005). An overview of ePortfolios.
Boulder, CO: EDUCAUSE Learning Initiative. Retrieved from:
www.educause.edu/ir/library/pdf/ELI3001.pdf
[15] Mason, R., Pegler, C., & Weller, M. (2004). E-portfolios: An
assessment tool for online courses. British Journal of
Educational Technology, 35(6), 717–727. doi:10.1111/j.1467-
8535.2004.00429.x
[16] McWhorter, R. R., Delello, J. A., Roberts, P. B., Raisor, C. M.,
& Fowler, D. A. (2013). A cross-case analysis of the use of web-
based eportfolios in higher education. Journal of Information
Technology Education: Innovations in Practice, 12, 253-286.
Retrieved from:
http://www.jite.org/documents/Vol12/JITEv12IIPp253-
286McWhorter1238.pdf
[17] Means, B. (1995). Technology's role within constructivist
classrooms. Paper presented at the American Educational
Research Association. (ERIC Document Reproduction Service
No. ED383283)
[18] Skinner, B. F. (1948). Walden Two Indianapolis, IN: Hackett
Publishing Company.
[19] Smith, P. (2010, August 11). America’s best colleges: Catering
to the 21st
century learner. Forbes Online. Retrieved from:
http://www.forbes.com/2010/08/01/higher-education-college-
rankings-opinions-bestcolleges-10-smith.html
[20] Weegar, M. A., and Pacis, D. (2012). A Comparison of Two
Theories of Learning--Behaviorism and Constructivism as
applied to Face-to-Face and Online Learning. E-Leader Manila,
1–20. Retrieved from: http://www.g-
casa.com/conferences/manila/papers/Weegar.pdf
15. Shivani and DharamVeer Sharma
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
192
b. Deletion Error: Deletion error occurs due to deletion of at
least one letter from the desired word.
For example: सब->सेब
c. Substitution Error: Substitution error occurs when one or
more letters are replaced by some another letter. For example:
हस->हस, मु बई ->मुबई.
The substitution errors are mostly related to following reason:
• Different Way to Write Same Word. For example: िलये -
>िलए, बहुय ->बहुए
• Vowels with similar sounds. For example: ਿ◌◌ ->◌◌ੀ, ◌◌ੇ -
>◌◌ੈ, ◌ ->◌
• When a consonant set combines with the pancham Varna (ङ,
ञ, ण, न, म), Then it can be shown as an anuswar over the
consonant preceding it. For example: च चल -> चचल, क्गन -
>कगन.
d. Transposition Error: Transposition error occurs when two
adjacent letters are written in swapped way. For example:
कलम->कमल
e. Run- on Error [7]: Run-on errors occur when two or more
valid words are erroneously typed side by side without a space
in the middle of it. For example: इसक
े ->इसक
े , उसकी -
>उसकी.In the explained examples: इस, क
े , उस, कीare four
different words.
f. Split word Error [7]: These errors occur when there is
some additional space is embedded between the parts of the
word. For example: इसक
े ->इसक
े . In some cases, split word
errors may also give rise to real word errors.
2. PHONETICALLY SIMILAR CHARACTER ERROR
Phonetic error occurs when the correct spelling of the word is
known but the word is mistyped by mistake due to same
pronunciation. It can be categorized into following types:
Class 1:ज->झ, ब->व, न->ण, ग ->घ
Class 2: फ़ ->फ, ज़->ज, ग़ ->ग, ड़ ->ड
Class 3:च चल -> चचल, पि डत->पिडत.
Class 4: ◌ु-> ◌ू◌ਂ->◌, ◌ੇ->◌ੈ, ਿ◌->◌ੀ.
3. SPELL CHECKING STRATEGY
A. Error Detection
Error detection is a process of detecting the misspelt words in
the text with help of database. There are two efficiency
techniques for detection such type of errors.
1. N-gram Analysis Techniques[8]: N-gram is a method to
find incorrectly spelled words in a mass of text. N-gram is a
set of consecutive characters taken from a string with a length
of where n is a positive integer. N-gram tables can take on a
variety of forms. The easiest is a binary bi-gram array which
is 2D arrays whose elements represent all possible two letter
combinations of the alphabet. The value of each character in
the array is set to either 0 or 1 depending on whether that bi-
gram occurs in at least the word in a predefined lexicon or
dictionary .A binary tri-gram array would have three
dimensions. The above arrays are non-positional binary n-
gram arrays because they do not represent the position of the
n-gram within a word. The most of the structures of the
dictionary can be stored by a set of positional binary n-gram
array. For example, in a positional binary tri-gram array the
element at position a, b & c would have value 1 if only if there
exists at least one word in the dictionary with the letters l, m
and n in positions a, b and c. The trade-off for representing
more of the structure of the dictionary is the increase in
storage space required for the complete set of positional
arrays. Any word may be checked for errors by simply looking
up its corresponding entries in binary n-gram arrays to make
sure they are all 1’s(true).
2. Dictionary Lookup: A dictionary is a list of words that are
assumed to be correct. Dictionaries may be represented in
many forms, each with their own characteristics like speed and
storage requirements. The most common method of detecting
errors in a text is simply to look up every word in a dictionary.
The drawbacks of this method are to keep a dictionary up to
date, and sufficiently extensive to cover all the words in a text.
At the same time, response time also increases with the
increase in size of dictionary. Dictionary lookup and
construction techniques must be according to the purpose of
the dictionary. Too small a dictionary may give the user too
many false rejections of valid words, too large it may accept a
high number of valid low-frequency words. The most common
used technique to gain random and fast access to a dictionary
is Hash Table. To lookup Input string, one has to compute its
hash address and retrieve the word stored at that address in the
pre constructed hash table. If the word is different stored at the
hash address from the Input string or null, a misspelling is
indicated. For store a word in the dictionary first calculate
each hash function for the word and set the vector entries
16. State of the Art of Spell Checker Design for Indian Languages: A Survey 193
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
corresponding to the calculated values to 1(true). For find if a
word belongs to the dictionary or not, we calculate the hash
values for that word and look in the vector. If all entries
corresponding to the values are 1(true), then the word belongs
to the dictionary, otherwise not. The main disadvantage is the
need to devise a clever hash function that avoids collisions
without large hash table.
B. Error Correction
Error correction consists of two steps: the generation of
candidate corrections and the ranking of candidate corrections.
The candidate generation process usually makes use of a
precompiled table of legal n-grams to locate one or more
potential correction terms. The ranking process is used to
invoke some lexical similarity measure between the
misspelled word and the candidates or a probabilistic estimate
of the likelihood of the correction to rank order the candidates.
There are following techniques used for error correction:-
1. Morphological Analysis: The morphological analyzer
processes the word and delivers the root word, along with the
list of possible valid suffixes and prefixes. Out of these
affixes, the ones that closely match the affixes of the
misspelled word are selected and by attaching these affixes to
the root word a list of suggestions are arrived.
2. Soundex Method: The soundex code of the misspelled
word is generated, according to the devised coding scheme.
An approximate match is performed with the Soundex codes
of all the valid words present in the dictionary. A list
comprising of words Soundex codes of which closely match
those of misspelled word is built.
3. Edit Distance: Edit distance is a simple technique. It is
defined as the minimum number of editing operations (i.e.
insertions, deletions and substitutions) required to transform
one string into another. In other word, by applying the four
editing operations, which commonly generate typographic
errors i.e. addition, deletion, substitution and transposition of
letters, another list of suggestions are arrived. Edit distance is
useful for correcting errors resulting from keyboard input,
since these are often of the same kind as the allowed edit
operations. It is not quite as good for phonetic spelling error
correction, especially when the difference between spelling
and pronunciation is big as in English or French.
4. Rule Based Technique: Rule-based techniques are
algorithms or heuristic programs that represent knowledge of
common spelling error patterns in the form of rules for
converting misspellings into valid words. The candidate
generation process consists of applying all applicable rules to
a misspelled string and retaining every valid lexicon word
those results. Ranking is frequently done by assigning a
numerical score to each candidate based on a predefined
estimate of the probability of having made the particular error
that the invoked rule corrected.
5. N-gram Based Techniques: N-gram analysis has already
been described earlier in error detection module. Letter n-
grams, including trigrams, bigrams, and/or unigrams, have
been used in a variety of ways in text recognition and spelling
correction techniques. They have been used in OCR correctors
to capture the lexical syntax of a dictionary and to suggest
legal corrections.
4. ANALYSIS OF AVAILABLE SPELL CHECKERS
IN INDIAN LANGUAGES
The Indian languages are diverse and complex. Some
languages contain half characters, conjuncts which increases
the language complexity. Different Indian languages are
written in different scripts (like Malay & English are in roman
script, Punjabi &Urdu are in Arabic script, Hindi is in
Devanagari script). Therefore, a large number of spell checker
systems have been developed for different Indian languages
using above techniques. This section provides the analysis of
available spell checkers in Indian languages and predicts the
efficiency of the systems through their ranking.
A. Sanskrit Spell Checker
Sanskrit called the mother of all Indian languages. All the
Indian languages are expected to be derived from Sanskrit
language. Sanskrit is free ordering language (or syntax free
language) &there is no ambiguity in the form of the words
even if the order changes. A Morphological based spell
checker has been designed for Sanskrit. An algorithm has been
designed to check the validity of a word. If the word is not
found in the vocabulary, then the word is scanned from right
to left to identify a valid suffix string such that it occurs in at
least one rule. If such a rule is not found then the word is
rejected as invalid and the system proceeds further. After this,
at rear end of the word a transformation is carried out to obtain
a pruned word. If it is found in the vocabulary or any other
rule is applicable to the word obtained then the word is valid.
But if no rule is applicable then the word is declared as invalid
and a suggestion list is generated. The Spellchecker is
implemented in Java. For display, the documents are
converted into Unicode. The morphological analysis of a word
serves as a foundation for POS- tagging. Similarly, it is being
used in stemming for searching root words in Sanskrit
Wordnet.
B. NAAVI (Oriya Spell Checker)
It is online spell checker. It deals with the error detection and
either automatic or manual correction for the words that have
been misspelled. Some algorithms have been developed in
order to find the most accurate and appropriate results. The
searching techniques that have been employed are very fast in
17. Shivani and DharamVeer Sharma
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
194
processing such that it processes 170000 Oriya words for each
misspelled word. The words in the dictionary are stored
according to the word length for effective searching. It also
takes help of the Oriya Morphological Analyzer for
ascertaining the mistakes of inflection, derived and
compounding words. Oriya Spell Checker is being
successfully running embedded in a word processor. Using the
similar technique a Hindi Spell Checker with 270000 words
and an English Spell Checker with 20000 words has also been
designed for word processor. This software is designed using
Java and Java Swing for both the Windows-98/2000/NT and
the Linux O/S.
C. Malayalam Spell Checker
In Malayalam, a large number of words can be derived from a
root word, a purely dictionary based approach for Spell
Checking is not practical. Hence a ‘Rule cum Dictionary’
based approach is followed. The grammatical behavior of the
language, the formation of words with multiple suffixes and
the preparation of the language module are dealt with in detail.
The different modules in the Spell Checker Engine viz.
Morphological Analyzer, Morphological Generator, Error
detection and suggestion generation is done. It splits the input
word into root word, suffixes, post positions etc. and checks
the validity of each using the rule database. Finally it will
check the dictionary to find whether the root word is present in
the dictionary. If anything goes wrong in this checking it is
detected as an error and the error word is reprocessed to get 3
to 4 valid words, which are displayed as suggestion. This spell
checker is a subsystem developed by CDAC,
Tiruvananthpuram, which could be integrated in larger
applications like Microsoft word or any word processor as a
macro. While running as a macro in word, it functions as an
offline spell checker in the sense that one can use this software
with a previously typed text file only. Both off line and online
checking are possible when it is integrated with the text editor.
It generates suggestions for wrongly spelt words.
D. Annam (Tamil Spell Checker)
Tamil Spell checker helps the user to identify most of
mistyping error. It is available both offline and online. The
task implemented in Tamil Spell checker are Case marker,
postposition checking for nouns, Adjective checking for
nouns, Case ending and PNG marker checking for verbs,
Adverb checking, and Adjacent key errors checking. The
applications of the Tamil Spell checker are Word processors,
search engines, information filtering and extraction systems,
and machine translation systems. The modules extract the root
word from the given word (noun/verb) with the help of
Morphological Analyzer and the root word is checked in the
dictionary and if found, the word is termed as correct word.
Otherwise, the correction process is activated. The correction
process includes error handling and suggestion generation
modules. After finding the type of error, the right form of
suffixes; nouns or verbs are given as input to suggestion
generation module. With the help of Morphological Generator,
the correct word is generated. This module also handles the
operations like select, change or ignores the suggested word
and adding the word to the dictionary.
E. Akshara (Telugu Spell Checker)
A pure corpus based statistical stemming algorithm has been
developed for Telugu. The performance of this stemmer for
the spell checking application has been studied in various
combinations with dictionary and morphology based
approaches. Large scale spelling error data has been obtained
from 10 Million word Telugu corpus. The raw corpus as it was
typed has been compared with the final version after three
levels of proof reading and certification by qualified and
experienced proof readers. A number of tools have been
developed to prepare such a data. Since words are large and
complex and hence too numerous in Telugu and proper
morphological analysis is difficult, it would be useful to
perform studies at lower levels of linguistic units. The syllable
level is a natural choice since writing in Indian languages is
primarily syllabic in nature. N-gram models have been built at
syllable level.
F. Assamese Spell Checker
The Spell Checker exists in the form of separate modules for
error detection and correction, as well as a stand-alone system
in which all the spell checking routines have been integrated.
The non-words are detected by looking up text words in a
dictionary of valid words. The dictionary used is actually a
word list of around 72000 Assamese words. A hash table has
been used as a lexical lookup data structure. A Soundex
encoding scheme for Assamese has been designed based on
the encoding scheme for English which comprises of a set of
rules for encoding words and 14 numerical codes. The
Soundex code of the misspell word is computed, & the
dictionary is searched for words, which have similar codes.
For ranking the suggestions, the technique of Levenshtein edit
distance technique is used.
G. Marathi Spell Checker
In this ongoing project, a standalone spell checker is being
built for Marathi. From the Central Institute of Indian
Language (CIIL) corpus 13000 distinct words approximately
have been listed. Similarly different Marathi texts are being
used to build up the Dictionary. Morphological Analyzing is
also being carried out on the words listed in the dictionary. For
example, an automatic grouping algorithm identified 3,975
groups out of 12,886 distinct words. First word is usually the
root word. Thus, there are approximately 4000 root words
from Marathi corpus. A manual proof reading will be done on
these results. Further enhancements of derivational morphology will
help in increasing the vocabulary. Besides enhancing word lists and
rules, enhancements for representing rules for ordering of multiple
18. State of the Art of Spell Checker Design for Indian Languages: A Survey 195
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
suffixes in all part of speech categories are required. More elaborate
orthographic rules need to be incorporated. Morphology based
spellchecker may be extended to include further syntactic and
semantic analysis. Besides spellchecking, the morphology based
analysis is currently being used in a few applications at the Center for
Indian Languages. A motivation behind the stand-alone spellchecker
is that it can be used without an editor through a packaged interface,
or it can be integrated with other compatible applications such as
OCR.
Table 1: Rank of Marathi Spell Checker
Name of Spell checker Khandbahale.com
Global rank 320,723
India rank 30,873
Daily page viewer per visitor 2.50
H. Bangla Spell checker
The first Bangla Spell Checker was designed by
BidyutBaranChaudhuri. The technique works in two stages.
The first stage takes care of phonetic similarity error. For that
the phonetically similar characters are mapped into single
units of character code. A phonetically similar but wrongly
spelt word can be easily corrected using this dictionary. The
second stage takes care of errors other than phonetic
similarity. It works in both online and offline mode. The spell
checker was embedded in a word processor. If there is only
single error in the misspelled word then the most appropriate
suggestion is found in the top four words of the suggestion
list. But suggestions cannot be given on some inflected words.
It also has a special feature to add words in the dictionary
against which spellings are checked. The basic purpose of the
spell checker is to detect the erroneous word and either
suggests correct alternatives or automatically replace it by the
appropriate word.
Table 2: Rank of Bangla Spell Checker
Name of Spell checker Shuddhoshabdo.com
Global rank 19,779,445
India rank N/A
Daily page viewer per visitor 1
I. Hindi Spell Checker
The important factors in the design of Hindi spell checker are:
the dictionary data structure, inclusion of the equivalent
English words, features of auto correction in the Hindi word in
case of wrong entry by the user. The wrong entry here means
spelling mistake of one character missing, matra mistakes
(more than one also), mistake in the usage of half consonant.
Table 3: Rank of Hindi Spell Checker
Name of Spell checker Shabdkosh.com
Global rank 3,497
India rank 296
Daily page viewer per visitor 4.62
J. Akhar (Punjabi Spell Checker)
Akhar is a Bilingual spell checker. It is available offline. It is a
language sensitive spell checker i.e., if text is entered in
English then English spell checker is invoked or if text is
entered in Punjabi then Punjabi Spell Checker is invoked. It is
a font independent spell checker and it can work on any
popular Punjabi fonts such as, Anantpur Sahib, Amritlipi,
Jasmine, Punjabi, Satluj etc. This removes the contrast on the
user to type the text in pre-defined font only.
5. CONCLUSION
This paper presents the area of Spell checking Strategy and
Analysis of errors. It has surveyed on various errors detection
and error correction techniques that are helpful in finding the
errors. This paper also mentioned the influence of Indian
languages and has surveyed on the available spell checker in
different Indian languages. In future, author will design and
implement new Spell Checker for Hindi language.
REFERENCES
[1] RupinderdeepKaur and Parteek Bhatia, “Design and Implementation of
SUDHAAR-Punjabi Spell Checker,” International Journal of
Information and Telecommunication Technology, Vol. 1, Issue 15,
pp.0976-5972 May, 2010.
[2] Daniel Jurafsky, James H. Martin, Speech and Language Processing,
PEARSON, 2nd ed, September 1999.
[3] T.V. Geeta, RajaniParthearath, “Tamil Spellchecker”, Resource centre
for Indian language Technology Solution, Tamil Internet, Chennai,
Tamil Nadu, India, 2003.
[4] Neha Gupta, PratisthaMathur, “Spell Checking Techniques in NLP: A
Survey,” International Journal of Advanced Research in Computer
Science and Software Engineering, Vol. 2, Issue 12, pp. 217-221,
December 2012.
[5] Gurpreet Singh Lehal, “Design and Implementation of Punjabi Spell
Checker”, International Journal of Systemics, Cybemetics and
Infomatics, pp.70-75, Jan. 2007.
[6] F.J. Damerau, "A technique for computer detection and correction of
spelling errors", Communication of ACM, pp. 171-176, 1964.
[7] P.Kundra, B.B.Charudhari (1999), “Error pattern in Bangla text”,
International Journal of Dravidian Linguistics, 28(2), 1999.
[8] E.M. Riseman, A. R. Hanson, "A Contextual Post Processing System for
Error Correction using binary n-grams", IEEE Transactions on
Computer, Volume. 23, Issue 5, pp. 480-493, May 1974.
[9] SanghamitraMohanty,“Analysis and Design of Oriya Morphological
Analyzer: Some Tests with OriNet”, TDIL Newsletter, March 2004.
[10] NamrataTapaswi, Suresh Jain, VaishaliChourey, “Morphological-based
Spellchecker for Sanskrit Sentences”, International Journal of Scientific
& Technology Research, Volume 1, Issue 3, pp. 1-4, April 2012.
[11] Monisha Das, S. Borgohain, JuliGogoi, S. B. Nair, "Design and
Implementation of a Spell Checker for Assamese", Language
Engineering Conference(LEC'02), pp.156, Dec. 2002.
[12] Veena Dixit, Satish Dethe, Rushikesh K. Joshi, “Design and
Implementation of a Morphology-based Spellchecker for Marathi”,
TDIL Newsletter, 2006.
[13] Santhosh. T. Varghese; R. Ravindra Kumar; K.G.Sulochana,
“Malayalam Spell Checker”, International Conference on Universal
Knowledge and Language, RCILTS-Malayalam. Goa, pp.5.3.38,
November.2002
20. Addressing Cloud Computing Security Concerns 197
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
Automatic integration of software: This allows the users
not to worry on how their cloud services should be
customized and integrated as per their requirements. One
can simply pick and carefully select only those services
and software applications that you think are suitable for
you. The user just has the responsibility to provide their
requirements to the cloud vendor and the cloud vendor
may automatically integrate the software according to the
desired requirements.
Access to information is simple: The information can be
accessed from anywhere. This is because once a user
starts to use a cloud service then the user only needs an
internet connection, which are easily available these days.
The cloud computing services can be provided on smart
phones, laptops, tablets etc. Whenever a user wishes to
access some information from the cloud, the user only
needs an internet connection and a device to use it.
Fast and easy deployment: Cloud computing provides you
the advantage and benefits of quickly deploying an
application. When cloud system is chosen then the system
which has to be deployed can be done in very few
minutes. But the time depends on the technology that is
needed for a particular user. The time of deployment
varies from one user to another. The user can easily
deploy the application that he/she wishes to deploy within
a very short duration. [3]
Saving money: Cloud computing is very cost effective
method to use. It is also easy to maintain and upgrade
which helps to reduce the cost. When users are using the
earlier methods, more cost is required in them when
compared to cloud computing methods. This is because,
additional licensing fees is required for various software.
Various cloud vendors may provide different rates so a
user has the option to choose the vendor with the cheaper
rates and thus expenses are reduced.
Globalization of workforce: Since all the data is stored on
cloud, people having a simple internet connection can
access the required resources. This helps in globalization
and employment of workforce globally, since employees
working in a different part of the world can have a quick
access to the required resources. [4]
4. SERVICE MODELS
There are three types of cloud services that are provided by a
cloud model [2,5,9]:
4.1 Software as a Service (SaaS)
This is the top most layers of the services which is provided
by the cloud. It provides the capability to the user to use the
vendor’s applications running on a cloud infrastructure
provided by the vendor. It provides the users with applications
and services which can be used directly by a user which can
easily be accessed from several client devices which provides
on-demand services.
4.1 Platform as a Service (PaaS)
It is the middle layer of the cloud services. A user can deploy
his applications on the cloud without installing any platform
on which the application is to be deployed. PaaS provides
platform layer resources, which includes the support of the
operating system and the frameworks which are used for
development of various services. These services control the
installed applications and available hosting environment
configuration.It provides user with the option to deploy on the
cloud, various technologies and applications which are
developed by a user or various other applications that may be
supported by the vendor.
4.2 Infrastructure as a Service (IaaS)
This layer is the bottom layer of the three layers and it
provides infrastructure services. These services may include
resources such as memory, CPU and storage. The service that
is provided to the user involves storage, processing, networks
and various other computing resources.
Fig. 1: Three Layers of Cloud Computing
All of these three services are related to each other but
understanding their relationships and dependencies is critical
to understanding the risks of cloud computing security [12].
IaaS is the bottom layer which forms the basic formation of all
the services. The PaaS builds upon IaaS and SaaS builds upon
PaaS. All these services are provided directly to the
user/client.
5. DEPLOYMENT MODELS
The major factor to provide a secure cloud computing is the
type of cloud to be implemented. The types of cloud
deployment models offered are[7,6,6,7]:
5.1 Private cloud
This type of cloud is only used for a particular organization or
a group of people. It may be managed by the organization
which is using it, which has the access to this cloud or third
party. It is can be also named as internal cloud. The
organization or the people are responsible for setting up the
21. Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
198
cloud according to their own needs and maintaining them.
Thus any organization can take better control of the services
and all the work done within their cloud. Since only the
organization has the access to this private cloud, so it is more
secure.
5.2 Community cloud
This type of cloud infrastructure is used by particular groups
of organizations or communities. It is a semi-private cloud
which is available to only those groups which have access to
it. The community cloud acts as a private cloud for a particular
community. Only the users that have access to this community
cloud can access the services and resources provided by it.
5.3 Public cloud
This type of cloud infrastructure is used to provide services to
a lot of public or large group people. Public cloud is the cloud
services which is provided by third parties and hosted and
managed by the service providers or the vendors. All the cloud
vendors have the responsibility to manage the installation,
maintaining and providing services to the user. There is a huge
potential for cost saving. Users are charged according the
services and the resources they use. Major drawback of this
type of model is the lack of security. This is because the
resources and services are provided by a cloud vendor who
also provides services to various unknown users. The public
cloud vendors often use the multi-tenancy model in which the
various users share the same resources. Since the resources are
shared and the separation is vulnerable, the data and
application of one organization may have a threat to be
exposed to another unknown user.
5.4 Hybrid cloud
Hybrid cloud is composed of a number of clouds. These
clouds could be private, public or community clouds. They
remain independent from each other but they remain together
by a technology that enables the user to access the data and the
application. The responsibilities of managing the cloud are
divided amongst the organizations using the cloud and the
public cloud vendors.
6. SECURITY CHALLENGES IN CLOUD
There was a survey which was conducted by International
Data Corporation (IDC) IT group in order to rate the cloud
services and know more about its issues in 2008 [2]. This
survey was conducted in 224 IT executives. The IT executives
were asked to rate which cloud computing issue is of the
maximum concern. The following Fig. shows the percentage
of the individual issues that are found in cloud.
Fig. 2: Survey of Issues in Cloud
This survey conveys that the percentage of cloud security
issues is found to be 74.6%, which is the highest percentage
amongst all the issues that are considered in the survey.
It can be concluded that that security is the major concern and
it comes with a lot of threats in cloud computing [13,19]. That
is the reason that cloud computing security issues are given a
huge attention so that they may be prevented. It is extremely
important to face these issues to make cloud computing a
better and safer environment which can be expanded and used
by various people.
7. EVALUATION OF SECURITY
Evaluating how secure is a particular cloud system is a crucial
task [14]. For evaluating the security of a cloud there are
certain objectives that could be taken into consideration. The
objectives that are considered an important part for a cloud to
be secure are [8]:
Confidentiality: Confidentiality means that only
authorized people, parties or systems have the ability to
access any protected data. Every user or organization that
opts for the services of a cloud vendor always wants that
the information and the organizational data must remain
secure. This should be done only by providing access to
the users that the organization allows. Even the cloud
vendor must not have access to a cloud user’s private
data. Since cloud services are provided to multiple users
sharing the same resources, devices and applications, the
risk that the data is compromised is increased to a high
level.
Integrity: Integrity means that the information or the
resources that belong to a particular user can be modified
only by the people who are authorized and in an
authorized way.It means that the data must be protected
from deletion, modification or addition to the existing
data by an unauthorized person. Data and services of an
organization must not be stolen or misused. Any change
in the data should only be done by the person who has an
authorized access provided by the cloud user itself. It is
22. Addressing Cloud Computing Security Concerns 199
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
essential to respect one’s privacy and this should also be
accepted in terms of cloud.
Availability: Availability means that a system is
accessible and it can be used when it is in demand by the
authorized person. The cloud vendor must always keep a
backup of the resources and data to ensure that the cloud
user is always provided with the required services even
under difficult circumstances. Availability is not only
limited to data and software but also hardware being
available to authorized users when it is needed. The cloud
owner must ensure that the services are available to the
user as and when they are required.
8. WHY SECURITY IS A MAJOR CONCERN
Lack of employee confidence and poor recruitment
practices: There are some cloud vendors who may not
perform background checks of their employeesor service
providers. It is possible that the person might misuse the
private data of an organization. The cloud vendors often
do not check personally on the people they hire who may
harm the vendor or the users later. Some special users
such as cloud administrators usually have unlimited
access to the data present in the cloud which may not be
acceptable to a cloud user.
Lack of checking background of customers: Most cloud
vendors do not make the effort to check the background
of the customer they are providing. This gives a threat that
almost anyone can open an account that has a valid credit
card and an email. Some fake accounts can let attackers
perform any malicious activity without being identified
and tracked. One user may gain access to the resources
and data of the data which compromises the security of
another cloud user.
Lack of education regarding security: People have been a
weak point in the knowledge about information security.
This case is true in any type of organization or company.
In the cloud there is more impact because there are more
number of people that have to use the cloud. These people
are cloud vendors, third party vendors, suppliers,
customers of organizations [2].
9. SECURITY ISSUES
The various security issues that are encountered when using
cloud computing are as follows.
9.1 Data Security
Data security is a major concern everywhere, but it is a major
problem when the users have to rely on the vendors for
providing proper and essential security. In traditional
application deployment, the data resides within the boundary
of the organization itself and it has physical and logical
security access policies. These type of data breaches and
issues in the data security often occur in cases of public cloud
because the cloud users have less control over the data and
resources that are present at the vendor’s site. Storing the data
at another site always has the risks that it can be accessed by
some other party [17]. It can be accessed by the vendor itself
or by another cloud user which the cloud vendor serves.It is an
extremely important responsibility of the vendor to apply
strong encryption techniques so that the data is secure and
only selective people can control and access the data [10]. The
cloud vendor should ensure that only the people who are
authorized by the cloud user can change, add, modify or delete
any information of the cloud user. The cloud vendor must not
have any control whatsoever to change any information that
belongs to the user. Backup and recovery of data is another
issue. There may be certain circumstances where the data at
the vendor’s site may be lost or compromised. In such a case,
the vendors often have a backup somewhere else to ensure that
the data is always available to the cloud user. But, keeping a
backup at different locations or sites may not ensure that the
data is in safe hands.
9.2 Multi-tenancy
In public cloud services the user shares the resources and
components with other users at the vendor’s site [7]. These
users may be unknown to them. In a multitenant environment,
many customers share the same application, which uses
similar operating system, on the same hardware, with the same
functionalities of data storage. The differentiation amongst the
data of a particular user is made on the application layer. Multi
tenancy allows for cost savings for the vendor and thus may
also provide cost saving for the cloud user. This is possible
because various resources are shared among various users so
the cloud vendor does not need to install additional
infrastructure for different users. Since the vendor saves
money so it is possible that the vendor offers these services to
the users for less cost. Using resources from a multitenant
environment poses risk to the resources and data of one user
from another. An attacker could simply be another cloud user
and may discover the vulnerabilities that the cloud
environment is having. The separation between the different
users may be have been overcome and the data and resources
of another user can be accessed by an attacker who poses as a
user to the vendor [11]. The risk of an attacker posing as a user
often increases because the vendors do not have background
checks on the users there are going to provide services.
Vendors simply think of their benefit and ignore the cause that
and if a user is not as he poses to be then he might cause loss
to the vendor.
9.3 Application Security
Applications are delivered and used via the Internet through a
Web browser. SaaS provides the software which is deployed
over the internet and is also deployed to run behind a firewall
in local area network or personal computer [10]. People who
attackers the applications they use the web to gain access of
user’s information and perform malicious activities such as
23. Vasundhara Bhatia, NehaPrabhakar and SumatiManchanda
Advances in Computer Science and Information Technology (ACSIT)
Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 3; January-March, 2015
200
steal sensitive data of a user etc. [5]. The threats that might be
present in a cloud based environment are generally more than
the traditional system. It is also possible that tenants using the
same SaaS infrastructure, gains access to the data of another
tenant through the vulnerability in the web layer.
9.4 Trusted Third-party
A trusted third party provides secure interaction between two
parties who trust a third party. These trusted third parties
provide various security services which are based on
standards. They are useful across various geographical areas,
domains and specialization sectors. These third parties provide
an assurance of trust between two parties by special
techniques and mechanisms [16]. So it becomes necessary to
choose the correct third party which provides appropriate
mechanism for the secure interaction between the two parties.
A high level of trust and reliability has to be established
because if the third party does not provide the correct means
then it may lead to the information and data of a party to be
insecure. The two parties rely on the third party to perform
various functions such as cryptographic separation of data
which encrypts the data and ensures that the data is not visible
to any outsider and server and client authentication in which
both the interaction parties require to certify their server and
network devices.
9.5 Service Level Agreement
Service level agreements are the contracts which are signed by
a cloud vendor provided by the cloud user. It specifies the
services that are to be provided by the cloud vendor to the
user.The service level agreements, also defines the terms and
conditions and period of service to be provided. If the service
provided by the vendor is to be discontinued by the user then
the conditions for termination are decided at the initial level
itself. In case the termination of the agreement between the
cloud user and vendor is to be performed then removal of the
user data from the vendor’s site after termination is to be done
[1]. This should be ensured that the data is removed after
termination of services otherwise the cloud vendor may
misuse the user’s data.The authentication and authorization is
specified to identify who can access the services. This is a
crucial part because it defines who can access the data and
services of the user. These conditions should be correctly
represented to ensure that the vendor or any third party may
not find something faulty in it and gains access to the user
data. The vendor has to clearly specify the services that will be
provided to the user. It also includes the measures that the
vendor will take to ensure security. Information about any
backup that is to be done in any scenarios is also to be given.
If a cloud vendor is unsatisfactory in any of the conditions that
are provided in these agreements then legal action may be
taken using these service level agreements. These ensure that
what user expects and what the vendor provides is clearly
specified in these agreements so that no expectation gaps
occur between the user and vendor. It represents clarity in the
understanding of the services to both the vendor and the user.
10. CONCLUSION
Thus, we can observe that even though cloud computing offers
enumerable advantages but at the same time one faces with a
variety of issues. It becomes the responsibility of every cloud
user to be aware of both the advantages and disadvantages of
the cloud services in order to use the cloud services efficiently
and securely.
REFERENCES
[1] National Institute Of Standard and technology.
csrc.nist.gov/groups/ SNS/cloud-computing/cloud-def-v15.doc,
2009
[2] Rajesh et al , International Journal of Advanced Research in
Computer Science and Software Engineering 2 (9), September-
2012, pp. 115-120
[3] http://mobiledevices.about.com/od/additionalresources/a/Cloud-
Computing-Is-It-Really-All-That-Beneficial.htm
[4] http://www.verio.com/resource-center/articles/cloud-computing-
benefits/
[5] Hashizume et al.: An analysis of security issues for cloud
computing. Journal of Internet Services and Applications 2013
4:5.
[6] Florin OGIGAU-NEAMTIU, CLOUD COMPUTING
SECURITY ISSUES,Journal of Defense Resource
Management,Vol. 3,Issue 2(5)/2012
[7] ABHA THAKRAL SACHDEV* et al ISSN: 2319 - 1163
Volume: 2 Issue: 2 126 – 130
[8] D. Zissis, D. Lekkas / Future Generation Computer Systems 28
(2012) 583–592
[9] Wayne A. Jansen, NIST, Proceedings of the 44th Hawaii
International Conference on System Sciences – 2011 Cloud
Hooks: Security and Privacy Issues in Cloud Computing
[10] S. Subashini, V. Kavitha / Journal of Network and Computer
Applications 34 (2011) 1–11
[11] National Institute of Standards and Technology Special
Publication 800-144 80 pages (December 2011)
[12] http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pd
f
[13] GregBoss, Padma Malladi, Dennis Quan, Linda Legregni and
Harold hall 2007. Cloud Computing.Available from
www.ibm.com/developerworks/websphere/zones/hipods/.
[14] Anthony T.Velte, Toby J.Velte and Robert Elsenpeter 2010.
Cloud Computing- A Practical Approach. Publishing of Tata
McGRAWHil.
[15] Mohamed Al Morsy, John Grundy and Ingo Müller, An
Analysis of The Cloud Computing Security Problem, In
Proceedings of APSEC 2010 Cloud Workshop, Sydney,
Australia, 30th Nov 2010.
[16] Kevin Hamlen et al.: Security Issues for Cloud Computing,
International Journal of Information Security and Privacy, 4(2),
39-51, April-June 2010
[17] 2009. Cloud Computing: An Overview, Pages 2 (June 2009), 2
pages. DOI=10.1145/1538947.1554608
http://doi.acm.org/10.1145/1538947.1554608
[18] Basta, A., &Halton, W. (2007). Computer Security and
Penetration Testing (1st ed.). Delmar Cengage Learning.
[19] NitashaHasteer ,AbhayBansal , B. K. Murthy, Pragmatic
assessment of research intensive areas in cloud: a systematic
review, ACM SIGSOFT Software Engineering Notes, v.38 n.3,
May 2013