This document is the table of contents for volume 15, number 4 of the July 2015 issue of the International Journal of Computer Science and Business Informatics. It lists three articles included in this issue:
1. An article on the impact of human capital development on the managerial workforce of small and medium enterprises (SMEs) in Sabah, Malaysia.
2. A survey article on mobile cloud computing that discusses the advantages, challenges, and approaches to mobile cloud computing.
3. An article on an efficient authentication protocol for mobile cloud environments using elliptic curve cryptography.
The document provides the titles, authors, and page numbers for each of the three articles in this issue of the journal. It identifies
IOSR Journal of Business and Management (IOSR-JBM) is an open access international journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The Effectiveness of Human Resource Management PracticesWaqas Tariq
An effective human resource management practices namely employee empowerment, training and development, appraisal system compensation are the main factor for the success of a firm on employee retention. In this study, we aim to study how employees regard importance of their empowerment, equity of compensation, job design through training and expectancy toward effective performance management on their retention. Quantitative data was collected using the non probability self administered questionnaire that consist of questions with 5-points Likert scales distributed to our samples of 278 individuals. By using a multiple regression analysis, it is found that a, training and development, appraisal system compensation are significant to employee retention except employee empowerment. Base on the results, training, compensation and appraisal is a fundamental consideration for University of Y lecturers¡¯ retention decision; while empowerment is less fundamental to lecturers¡¯ consideration as this can be attributed to the Asian culture characteristic of higher authority conformity.
Evaluation of Training and Development in Banking Sector of India: Perspectiv...AI Publications
Rapid progress and the abnormal profits of the private banking sector of India is the hot topic nowadays in India. This study aimed to explore the effect of training and development on employee attitude, turnover intention and job satisfaction of public and private banking sector of India. The employees of different banks of India were selected as sample. Mainly quota and purposive sampling technique were employed for sample selection. The result shows that perceptions on training and development program of the employees of the Indian public banks were rejected; it proves that employees of Indian public banks do not provide a good opportunity and enough training programs. On the other hand, the result shows that perceptions on training and development program of the employees of the Indian private banks were accepted, it proves that private banking sector provides their employees good opportunity and enough training programs. In addition, this study shows that the Indian public-sector banks employees’ turnover intention is proportionally higher. But in the other case, Indian private sector banks employees’ turnover intentions are quite low. This study also exposed that job satisfaction in public sector bank was comparatively lower than private sector bank. Additionally, this study also shows that public banks are very less interested in the general employees’ development programs. But, the private sectors banks employees of India believed that their banks are properly arranging employee’s good training and development programs every year as per their requirement. Finally, this research argues that employees of the public-sector banks of India got the training which was not good enough, unplanned and not systematically administered, but the training for employees of the private sector banks of India was well planned and systematically administered.
IOSR Journal of Business and Management (IOSR-JBM) is an open access international journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The Effectiveness of Human Resource Management PracticesWaqas Tariq
An effective human resource management practices namely employee empowerment, training and development, appraisal system compensation are the main factor for the success of a firm on employee retention. In this study, we aim to study how employees regard importance of their empowerment, equity of compensation, job design through training and expectancy toward effective performance management on their retention. Quantitative data was collected using the non probability self administered questionnaire that consist of questions with 5-points Likert scales distributed to our samples of 278 individuals. By using a multiple regression analysis, it is found that a, training and development, appraisal system compensation are significant to employee retention except employee empowerment. Base on the results, training, compensation and appraisal is a fundamental consideration for University of Y lecturers¡¯ retention decision; while empowerment is less fundamental to lecturers¡¯ consideration as this can be attributed to the Asian culture characteristic of higher authority conformity.
Evaluation of Training and Development in Banking Sector of India: Perspectiv...AI Publications
Rapid progress and the abnormal profits of the private banking sector of India is the hot topic nowadays in India. This study aimed to explore the effect of training and development on employee attitude, turnover intention and job satisfaction of public and private banking sector of India. The employees of different banks of India were selected as sample. Mainly quota and purposive sampling technique were employed for sample selection. The result shows that perceptions on training and development program of the employees of the Indian public banks were rejected; it proves that employees of Indian public banks do not provide a good opportunity and enough training programs. On the other hand, the result shows that perceptions on training and development program of the employees of the Indian private banks were accepted, it proves that private banking sector provides their employees good opportunity and enough training programs. In addition, this study shows that the Indian public-sector banks employees’ turnover intention is proportionally higher. But in the other case, Indian private sector banks employees’ turnover intentions are quite low. This study also exposed that job satisfaction in public sector bank was comparatively lower than private sector bank. Additionally, this study also shows that public banks are very less interested in the general employees’ development programs. But, the private sectors banks employees of India believed that their banks are properly arranging employee’s good training and development programs every year as per their requirement. Finally, this research argues that employees of the public-sector banks of India got the training which was not good enough, unplanned and not systematically administered, but the training for employees of the private sector banks of India was well planned and systematically administered.
State of Performance Management System in India 2017Varun Tandon
Research conducted by Salto Dee Fe sharing the state of PMS in India in 2017. The extract of the report has also been published in HT on November 14, 2017.
The digital transformation significantly changes
the traditional way of how organizations manage their
human resources. Besides the automation of HRM
processes, information technologies also have increasing
impact on the talent management process, such as
employee attraction, selection and hiring, workforce
planning, engagement and performance management,
training and development, health and safety, and retention
management, all prompting a focus on redesigning the
organization around teams, implementing analytics and
organizational network analysis and driving a global focus
on diversity, culture, learning, and careers. The aim of this
study is to get insights in the consequences of a digital
HRM solution for an organization and its business
performance. A structured questionnaire was used for the
study. Data was collected from 75 respondents. The
findings of the study conclude that on the 15 statements
which were identified the responses to majority of these
factors showed a significant difference.
Purpose – This study aims to analyze the relationship between Innovativeness to Firm
Performance, IT Capability to Innovativeness, IT Capability to Firm Performance. This study also tests whether
IT Capability can be an Innovativeness moderator of Firm Performance
The Effects of Motivation on Staff Productivity/Performance at the Francis Su...iosrjce
The paper examines the impact of motivation on staff performance and productivity in the university
library, using structured questionnaire and interview tools administered on 72 para-professional staff. The
study sought to know what their possible motivating factors are and to what extent they can be influenced for
higher performance and productivity. The result revealed both the factors and the degree of influence in the
following descending order, participation in decision making, job security, challenging work assignment,
monetary reward and job incentives. It was evident that their productivity was at its lowest ebb as further
inquiry revealed that apart from the mass retrenchment of staff in 2004, only three (4.2%) of the staff were
sponsored for training between 2004-2011.Recomendations were made for regular management and staff
dialogue in addition to training of staff on new information technologies as their level of backwardness was
appalling
This study was about competency in leadership Selection at the Ministry of Public Service Uganda
with an Expert Perspective. The main objectives were to identify the competencies that practitioner experts
recommend in the selection of leaders in the ministry of public service by the year 2040 and beyond and to
identify recommendations of what practitioner experts’ rate as the most important and feasible in the
recruitment of leaders in the ministry of public service by the year 2040 and beyond
IS/IT Capability and Strategic Information System Planning (SISP) SuccessIJMIT JOURNAL
Successful planning of Information Systems (SISP) is perhaps going to be more problematic in today’s world of rapid change and uncertainty. SISP is a cornerstone of the information system discipline and very little attention has been paid to its success based on the resource based view of the firm (RBV).This paper provides a model for IT capability and strategic information system planning success, by considering environmental and organizational factors that may influence this relationship in a contingency model. A review of existing IT capability and SISP literature is given to identify the opportunities in building successful SISP. A model is developed by hypothesizing IT capability as independent variable leads to SISP success as dependent variable; in which organizational & environmental influences are considered as moderating variables. The control variables are firm size, firm structure, and industry type. The study proposes a model to conceptualize the relationship between IT capabilities and SISP success and contingency factors moderating that relationship. This paper explains the ways of exploiting IT capabilities as specialized and integrated knowledge of the firm in IT area to create a more successful SISP. The researchers believe that the aim to build a model for SISP success based on RBV theory is important because this new perspective will be helpful for gaining a superior assessment and better underpinning of the SISP from a knowledge based perspective.
HUMAN RESOURCE MANAGEMENT CHALLENGES AND TECHNIQUES TO OVERCOME THEMIJMR Journal
This paper analysis the various challenges which are emerging in the field of HRM. The managers today face a whole new array of changes like globalization, technological advances and changes in political and legal environment changes in Information technology. This has lead to a paradigm shift in the of roles professional personnel. The great challenge of HRM is to attract, retain and nurture talented employees. This paper also analysis how to overcome with these challenges. These challenges can overcome through cross cultural training, technological and informational training of HR people and motivation of employees through various techniques.
KEY-WORDS: HRM techniques, environment changes, organisational climate, performance standards.
OBJECTIVE OF PAPER- To study the details of emerging challenges To find out the various methods and techniques through which HR can overcome the challenges of present business scenario
METHODOLOGY- All data is secondary collected from books, notes.
EXPLORING HUMAN RESOURCE MANAGEMENT PRACTICES IN SMALL AND MEDIUM SIZED ENTER...IAEME Publication
Human resource is required for an organization to conduct different business activities. Without the support of human resource the organization cannot exist or operate effectively. Success of any organization depends on the effective
use of human resources. This is true in the case of small industry where the owners have a close and more personal
association with their employees. Human resource management includes different practices such as Recruitment and Selection, Training and Development, Compensation and Rewards, Performance Appraisal and Welfare Measures. The
small and medium sector has emerged as a dynamic and vibrant sector of the Indian economy.
State of Performance Management System in India 2017Varun Tandon
Research conducted by Salto Dee Fe sharing the state of PMS in India in 2017. The extract of the report has also been published in HT on November 14, 2017.
The digital transformation significantly changes
the traditional way of how organizations manage their
human resources. Besides the automation of HRM
processes, information technologies also have increasing
impact on the talent management process, such as
employee attraction, selection and hiring, workforce
planning, engagement and performance management,
training and development, health and safety, and retention
management, all prompting a focus on redesigning the
organization around teams, implementing analytics and
organizational network analysis and driving a global focus
on diversity, culture, learning, and careers. The aim of this
study is to get insights in the consequences of a digital
HRM solution for an organization and its business
performance. A structured questionnaire was used for the
study. Data was collected from 75 respondents. The
findings of the study conclude that on the 15 statements
which were identified the responses to majority of these
factors showed a significant difference.
Purpose – This study aims to analyze the relationship between Innovativeness to Firm
Performance, IT Capability to Innovativeness, IT Capability to Firm Performance. This study also tests whether
IT Capability can be an Innovativeness moderator of Firm Performance
The Effects of Motivation on Staff Productivity/Performance at the Francis Su...iosrjce
The paper examines the impact of motivation on staff performance and productivity in the university
library, using structured questionnaire and interview tools administered on 72 para-professional staff. The
study sought to know what their possible motivating factors are and to what extent they can be influenced for
higher performance and productivity. The result revealed both the factors and the degree of influence in the
following descending order, participation in decision making, job security, challenging work assignment,
monetary reward and job incentives. It was evident that their productivity was at its lowest ebb as further
inquiry revealed that apart from the mass retrenchment of staff in 2004, only three (4.2%) of the staff were
sponsored for training between 2004-2011.Recomendations were made for regular management and staff
dialogue in addition to training of staff on new information technologies as their level of backwardness was
appalling
This study was about competency in leadership Selection at the Ministry of Public Service Uganda
with an Expert Perspective. The main objectives were to identify the competencies that practitioner experts
recommend in the selection of leaders in the ministry of public service by the year 2040 and beyond and to
identify recommendations of what practitioner experts’ rate as the most important and feasible in the
recruitment of leaders in the ministry of public service by the year 2040 and beyond
IS/IT Capability and Strategic Information System Planning (SISP) SuccessIJMIT JOURNAL
Successful planning of Information Systems (SISP) is perhaps going to be more problematic in today’s world of rapid change and uncertainty. SISP is a cornerstone of the information system discipline and very little attention has been paid to its success based on the resource based view of the firm (RBV).This paper provides a model for IT capability and strategic information system planning success, by considering environmental and organizational factors that may influence this relationship in a contingency model. A review of existing IT capability and SISP literature is given to identify the opportunities in building successful SISP. A model is developed by hypothesizing IT capability as independent variable leads to SISP success as dependent variable; in which organizational & environmental influences are considered as moderating variables. The control variables are firm size, firm structure, and industry type. The study proposes a model to conceptualize the relationship between IT capabilities and SISP success and contingency factors moderating that relationship. This paper explains the ways of exploiting IT capabilities as specialized and integrated knowledge of the firm in IT area to create a more successful SISP. The researchers believe that the aim to build a model for SISP success based on RBV theory is important because this new perspective will be helpful for gaining a superior assessment and better underpinning of the SISP from a knowledge based perspective.
HUMAN RESOURCE MANAGEMENT CHALLENGES AND TECHNIQUES TO OVERCOME THEMIJMR Journal
This paper analysis the various challenges which are emerging in the field of HRM. The managers today face a whole new array of changes like globalization, technological advances and changes in political and legal environment changes in Information technology. This has lead to a paradigm shift in the of roles professional personnel. The great challenge of HRM is to attract, retain and nurture talented employees. This paper also analysis how to overcome with these challenges. These challenges can overcome through cross cultural training, technological and informational training of HR people and motivation of employees through various techniques.
KEY-WORDS: HRM techniques, environment changes, organisational climate, performance standards.
OBJECTIVE OF PAPER- To study the details of emerging challenges To find out the various methods and techniques through which HR can overcome the challenges of present business scenario
METHODOLOGY- All data is secondary collected from books, notes.
EXPLORING HUMAN RESOURCE MANAGEMENT PRACTICES IN SMALL AND MEDIUM SIZED ENTER...IAEME Publication
Human resource is required for an organization to conduct different business activities. Without the support of human resource the organization cannot exist or operate effectively. Success of any organization depends on the effective
use of human resources. This is true in the case of small industry where the owners have a close and more personal
association with their employees. Human resource management includes different practices such as Recruitment and Selection, Training and Development, Compensation and Rewards, Performance Appraisal and Welfare Measures. The
small and medium sector has emerged as a dynamic and vibrant sector of the Indian economy.
KNOWLEDGE MANAGEMENT AND ORGANIZATIONAL PERFORMANCE IN ENGINEERING ORGANIZATIONIAEME Publication
The purpose of this study is to identify and understand the various knowledge management practices (KMP) and its influence on Organisational Performance (OP) in the engineering organization. The study has been undertaken with an aim to examine the role of knowledge management practices in enhancing the performance of an organization. A sample of 125 engineers were drawn using structured questionnaire. The responses were analysed using a statistical technique viz., Partial Least Square -Path Modelling (PLS-PM). The results of the analysis revealed that Knowledge Management Practices such as Knowledge Diagnosing, Knowledge Acquisition, Knowledge Generation, Knowledge Sharing, Knowledge Storing, Knowledge Application, have significant effect on financial, non-financial and operational performance of the organization.
STARTUPS AND CLIENTS PERSPECTIVE ON TECHNOLOGY BUSINESS INCUBATORS PERFORMANCEIAEME Publication
Technology and entrepreneurship often push national economies towards their developmental destinations.
Technology business incubators have become popular because of economic development strategies like promoting
technology/knowledge-based businesses, culture of techno-preneurship, creation of value added new jobs, Technology
commercialization, interfacing and networking of academic – R&D – industries and financial institutions, value added
services to its tenants as well as to the existing technology dominated Small and Medium Enterprises (SME) and also
technology upgradation activities.
Evaluation of Human Resource Management Practices on the Productivity and Per...IOSR Journals
The objective of any organization or firm is to achieve higher productivity. The concept of Human Resources within organizations is very vital in the management and survival of any organization; this is because their performance is influenced by a set of human resource practices. The main focus of this study is to determine if human resources management practices (Human resources (HR) Planning, training and development) affect productivity and performance of Transport Organizations. The human resource management practices or HRM practices have to be addressed in this position, in order to examine productivity and performance of the organization. In analyzing the data, both descriptive and inferential statistics were used. A total of 75 questionnaires was distributed out of which 60 was returned. Result of analysis showed that training and development enhances productivity of transport organizations and also adequate human resources planning promotes employee productivity and organizational performance. It is therefore recommended that all level of employees receive adequate training and proper human resource planning should be in place to promote productivity and performance of the Transport industry in Nigeria.
Influence of Knowledge Management Processes on Organizational Performance in ...inventionjournals
This research attempts to establish a link between knowledge management processes and organizational performance in knowledge intensive service sectors. The key dimensions of knowledge management processes have been identified which could influence the organizational performance. Metric has been developed for the empirical investigation of the relationships between these research constructs. Structural Equation Modelling (SEM) using partial least square techniques has been used to test these hypotheses with a sample size of 491 knowledge workers (330 - Higher educational institutions and 161 from the IT companies) to investigate the empirical relationships between the factors. All the four hypotheses were supported. The testing of the hypotheses justified the identification of the key dimensions of KM as the critical success factors in terms of the organizational performance. Implications of the study would enable the strategic planning managers to make their knowledge management processes more effective so as to enhance the organizational performance
THE IMPACT OF KNOWLEDGE MANAGEMENT ON THE FUNCTION OF EMPLOYEE PERFORMANCE AP...IJMIT JOURNAL
The study aimed at identifying the impact of knowledge management on the function of employee performance appraisals (it is one of the most important functions of human resources management) in Jordanian industrial public shareholding companies, relying on the descriptive analytical approach. A questionnaire has been developed and distributed on individuals of the study sample consisting of managers of departments and sections of human resources in each company. The number of questionnaire retrieved and valid for statistical analysis (294) representing (86.5%) of the distributed questionnaires. In order to analyze the study sample, reliance was placed on descriptive statistics, represented in the
arithmetic means and standard deviations, in addition to the multiple linear regression analysis in hypothesis testing. The study reached a number of findings, most importantly, the presence of statistically significant impact at the level of (α=0.05) for the knowledge management including its dimensions (knowledge generation, knowledge storage, knowledge sharing, knowledge application) on the function of
employee performance appraisals in Jordanian industrial public shareholding companies. The study has recommended that the Jordanian industrial public shareholding companies should follow an efficient evaluationsystem capable of identifying the employees’ weaknesses
Double Performance Prism: innovation performance Measurement systems for manu...AM Publications
No performance measurement system currently takes into account the innovator dilemma which consists of the necessity of balancing between the exploratory and exploitative innovation activities. This balance remains a major challenge in innovation management. Although small and medium enterprises account for 95% of firms in developed countries, according to Web of Science database, only 1.5% of research papers on innovation and 0.5% of research papers on performance measurement focus on small and medium enterprises. Drawing on the Performance Prism of Andy Neely, this paper develops an innovation performance measurement system for manufacturing small and medium enterprises in order to achieve a balance of exploration and exploitation activities. This model, known as the Double Performance Prism, is based on stakeholder theory. It considers innovation as a solution to customers’ expressed and observed needs. It has been implemented in two manufacturing small and medium enterprises. As key results, an innovation success map and a 10-indicator Innovation Scoreboard emerged from the research and implementation. The aim of these results is to foster the development of an ambidextrous organization. Further quantitative studies will be necessary to validate the proposed innovation map.
TECHNOPRENEOURSHIP CONTRIBUTION ON SMALL MEDIUM INDUSTRY BUSINESS PERFOMANCE ...indexPub
The purpose of this study was to analyze the role of technopreneurs in supporting the productivity of small and medium industry (SMIs). The effect of innovation on small and medium industry business performance, the influence of Information Technology on business performance, and the role of Information Technology in mediating innovation on business performance were tested in this study. Data were collected using an online questionnaire. A total of 347 questionnaires were sent to the business owner of SMIs in Bali province. This study used structural equation modeling analysis with partial least square (PLS) software to analyze three research problems.
Role of Pre-Employment Training in Enhancing Employability of Diploma EngineersINFOGAIN PUBLICATION
This paper presents an empirical study conducted to find out the role of pre-employment training in enhancement of employability. The study was specifically focused upon the automobile cluster employing the fresh engineering diploma holders. The universe of the study consisted of 26 such industries. Stratified random sampling technique was employed for drawing the sample classified into two groups: - 1) Managerial level and 2) Supervisory level consisting of engineering diploma holders. Standardized scales were administered to 572 Ss out of which 12 responses were dropped down, and 560 Ss were retained in the final sample put to experimentation. Descriptive and analytical research techniques were applied for the analysis of the data collected during the experiment. Statistical tools like ‘Cronbach alpha coefficient’, ‘Pearson correlation coefficient’, ‘Analysis of variance (ANOVA)’ etc were employed for treatment of the collected data for drawing the useful conclusions and testing of the hypotheses. From the experimental analysis the employability of diploma engineers was found to be associated with pre-employment training. Such a study focused on the fresh engineering diploma holders employable by the industries has yet not been reported in the literature.
Entrepreneurial Competencies as a Tool for Improve the Enterprise Growth and ...ijtsrd
Entrepreneurial competencies are important to entrepreneurship growth and enterprise development of the success. The purpose of this paper has to undertake a conceptual review of research on entrepreneurial competencies in order to functional and operational areas provide an included description of contributions relating to entrepreneurial competencies. The article research work towards review of the evaluation of the concept of competencies through particular reference to its use in the context of competencies for entrepreneur needs. Conceptual research draws together views on competence of an entrepreneur before exploring and summarizing research on the relationship between entrepreneurial competencies and business performance and growth. This report presents the state of the art on the topic of entrepreneurship competence identifying and comparing different theoretical and practical approaches from the academic and entrepreneurial world. Finally, the different perspectives adopted by researchers to the measurement of performance through entrepreneurial competencies are reviewed. Rajendra Prasad G R | Dr. Manjunath, K. R "Entrepreneurial Competencies as a Tool for Improve the Enterprise Growth and Entrepreneurial Activities: A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38250.pdf Paper Url: https://www.ijtsrd.com/management/management-development/38250/entrepreneurial-competencies-as-a-tool-for-improve-the-enterprise-growth-and-entrepreneurial-activities-a-study/rajendra-prasad-g-r
ONTOLOGY DRIVEN KNOWLEDGE MAP FOR ENHANCING BUSINESS PROCESS REENGINEERINGcseij
It has been a constant human desire to be dissatisfied with the status quo as there is always need to
improve upon the way business is being done. As a result, Business process reengineering is introduced
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of
problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving
much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use
knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of
business process reengineering.
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1
Yiming WU, Siyong CAI
Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13
M Sudha
Household Power Optimisation and Monitoring System ...................................................................23
John Batani, Silence Dzambo, Israel Magodi
Development and Exploitation of Software Complex of Virtual Community Life Cycle Organization ....1
Olha Trach and Solomia Fedushko
Systematic Review of Persuasive Health Technology Design and Evaluation Models..........................12
Kasali Funmilayo, Kuyoro Afolashade and Awodele Oludele
Designing Condition-based Maintenance Management Systems for High-Speed Fleet .......................28
Gopalakrishna Palem
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
Various Common Control Channel Assignment Schemes in CRNs: A Survey .........................................1
Jagsir Singh, Inderdeep Kaur Aulakh and Roopali Garg
Framework for Threat Modelling for a Power Utility: Case of Zimbabwe Power Utility Company.......... 8
Samuel Musungwini, Gilbert Mahlangu, Beauty Mugoniwa, and Samuel Simbarashe Furusa
Enhanced-bandwidth Compact Printed Inverted F Antenna Suitable for LTE/GSM Mobile Phone ....... 24
S. Jesse Jackson and T. Thomas
Implementation of e-Government Services using Java Technologies: A Methodological Guide in
Improving an e-Police Management System in Zimbabwe ...................................................................... 32
Mahlangu Gilbert, Chikonye Musafare, Furusa Samuel Simbarashe and Mugoniwa Beauty
Onto Tagger: Ontology Focused Image Tagging System Incorporating Semantic Deviation Computing
and Strategic Set Expansion ...................................................................................................................... 44
Gerard Deepak and Sheeba Priyadarshini J
Design of Industrial Robot Sorting System Based on A * Search Algorithm...........................................1
Wang Hongmei, Zhao Xueliang and Du Haitao Zhang Lanhua
Digitizing Traditional Filmmaking Process for Education and Industry.................................................... 14
Zeeshan Jawed and Dr Nandita Sengupta
The Socio-Economic Impact of Identity Thefts and Cybercrime: Preventive Measures and Solutions . 32
Dr. Nabie Y. Conteh and Quinnesha N. Staton
Synthetic Vision Systems – Terrain Database, Symbology and Display Requirements...........................1
Srikanth K P and Dr Abhay A Pashilkar
A Conjoint Analysis of Customer Preferences for VoIP Service in Pakistan............................................. 22
Amir Manzoor
A Hybrid Algorithm for Improvement of XML Documents Clustering ...................................................1
Somayeh Ghazanfari and Hassan Naderi
A Novel Collaborative Filtering Friendship Recommendation Based on Smartphones ......................... 16
Dhananjaya G. M., Sachin C. Raykar and Mushtaq Ahmed D. M
Efficient Computational Tools for Nonlinear Flight Dynamic Analysis in the Full Envelope .................. 26
P. Lathasree and Abhay A. Pashilkar
Quantitative Aspects of Knowledge Knowledge Potential and Utility..................................................... 45
Syed V. Ahamed
A Novel Approach for Recommending Items based on Association Rule Mining ................................... 60
Vasundhara M. S.and Gururaj K. S.
Cluster Integrated Self Forming Wireless Sensor Based System for Intrusion Detection and Perimeter
Defense Applications ................................................................................................................................. 70
A. Inigo Mathew, M. Raj Kumar, S. R. Boselin Prabhu and Dr. S. Sophia
Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET.......................................1
Ei Ei Khin and Thandar Phyu
Adaptive Search Information Technology in the University Library ........................................................ 15
Andriy Andrukhiv and Dmytro Tarasov
Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using
WEKA Platform........................................................................................................................................... 26
Ritika Saxena
Hamiltonian cycle in graphs 흈4 ≥ ퟐn....................................................................................................... 38
Nguyen Huu Xuan Truong and Vu Dinh Hoa
Determination of the Account Personal Data Adequacy of Web Community Member .............................. 1
Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn and Korzh Roman
Layered Defense Approach: Towards Total Network Security............................................................13
Kalaivani Chellappan, Ahmed Shamil Mustafa, Mohammed Jabbar Mohammed and Aqeel Mezher
Thajeel
Millennials: Entitled Networking Business Leaders............................................................................23
Dr. Caroline Akhras
Modeling of Citizen Claims Processing by Means of Queuing System ................................................36
Oleksandr Markovets and Andriy Peleschychyn
Suggestions for Informational Influence on a Virtual Community ......................................................47
R. V. Huminskyi, A. M. Peleshchyshyn and Z. Holub
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission ...............66
Uchenna P. Daniel Ani and Mohammed Mustapha
A Review of Efficient Information Delivery and Clustering for Drip Irrigation Management using WSN.1
S. R. Boselin Prabhu, Dr. S. Sophia and A. Inigo Mathew
Dual Hybrid Algorithm for Job Shop Scheduling Problem ........................................................................ 14
Do Tuan Hanh, Vu Dinh Hoa and Nguyen Huu Mui
CThe Comparative Analysis of Power Optimization in Clustered Sleep Transistors................................ 25
M. Divya Sree, Y. Kranthi Kiran and Vijaya Vardhan Kancharla
Cyber Crimes Incidents in Financial Institutions of Tanzania ................................................................... 37
Edison Wazoel Lubua (PhD)
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an
Apparel Production Plant of Sri Lanka.................................................................................................1
Z. A. M. S. Juman and W. B. Daundasekara
Analysis of BT and SMS based Mobile Malware Propagation ................................................................. 16
Prof. R. S. Sonar and Sonal Mohite
Behavioral Pattern of Internet Use among University Students of Pakistan........................................... 25
Amir Manzoor
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
.................................................................................................................................................................... 37
Faisal Rasheed Lone and Sanjay Sharma
Harnessing Mobile Technology (MT) to Enhancy the Sustainable Livelihood of Rural Women in
Zimbabwe: Case of Mobile Money Transfer (MMT) ................................................................................ 46
Samuel Musungwini, Tinashe Gwendolyn Zhou, Munyaradzi Zhou, Caroline Ruvinga and Raviro Gumbo
Design and Evaluation of a Comprehensive e-Learning System using the Tools on Web 2.0 ................ 58
Maria Dominic, Anthony Philomenraj and Sagayaraj Francis
Critical Success Factors for the Adoption of School Administration and Management System in South
African Schools ...............................................................................................................................74
Mokwena Nicolas Sello
Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN ................................... 93
Symmetric Image Encryption Algorithm Using 3D Rossler System........................................................1
Vishnu G. Kamat and Madhu Sharma
Node Monitoring with Fellowship Model against Black Hole Attacks in MANET.................................... 14
Rutuja Shah, M.Tech (I.T.-Networking), Lakshmi Rani, M.Tech (I.T.-Networking) and S. Sumathy, AP [SG]
Load Balancing using Peers in an E-Learning Environment ...................................................................... 22
Maria Dominic and Sagayaraj Francis
E-Transparency and Information Sharing in the Public Sector ................................................................ 30
Edison Lubua (PhD)
A Survey of Frequent Subgraphs and Subtree Mining Methods ............................................................. 39
Hamed Dinari and Hassan Naderi
A Model for Implementation of IT Service Management in Zimbabwean State Universities ................ 58
Munyaradzi Zhou, Caroline Ruvinga, Samuel Musungwini and Tinashe Gwendolyn Zhou
Present a Way to Find Frequent Tree Patterns using Inverted Index ..................................................... 66
Saeid Tajedi and Hasan Naderi
An Approach for Customer Satisfaction: Evaluation and Validation ....................................................... 79
Amina El Kebbaj and A. Namir
Spam Detection in Twitter – A Review...................................................................................................... 92
C. Divya Gowri and Professor V. Mohanraj
A Novel Facial Recognition Method using Discrete Wavelet Transform Multiresolution Pyramid..........1
G. Preethi
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing Concepts ................. 9
Sheetalrani R. Kawale
DNS: Dynamic Network Selection Scheme for Vertical Handover in Heterogeneous Wireless Networks
.................................................................................................................................................................... 19
M. Deva Priya, D. Prithviraj and Dr. M. L Valarmathi
Implementation of Image based Flower Classification System................................................................ 35
Tanvi Kulkarni and Nilesh. J. Uke
A Survey on Knowledge Analytics of Text from Social Media .................................................................. 45
Dr. J. Akilandeswari and K. Rajalakshm
Progression of String Matching Practices in Web Mining – A Survey ..................................................... 62
Kaladevi A. C. and Nivetha S. M.
Virtualizing the Inter Communication of Clouds ...............................................................................72
Subho Roy Chowdhury, Sambit Kumar Patel, Ankita Vinod Mandekar and G. Usha Devi
Tracing the Adversaries using Packet Marking and Packet Logging ....................................................... 86
A. Santhosh and Dr. J. Senthil Kumar
An Improved Energy Efficient Clustering Algorithm for Non Availability of Spectrum in Cognitive Radio
Users ....................................................................................................................................................... 101
Improving Ranking Web Documents using User’s Feedbacks...............................................................1
Fatemeh Ehsanifar and Hasan Naderi
A Survey on Sparse Representation based Image Restoration ............................................................... 11
Dr. S. Sakthivel and M. Parameswari
Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs
.................................................................................................................................................................... 25
Sajad Bolhasani and Hasan Naderi
A Survey on Prioritization Methodologies to Prioritize Non-Functional Requirements ........................ 32
Saranya. B., Subha. R and Dr. Palaniswami. S.
A Review on Various Visual Cryptography Schemes ................................................................................ 45
Nagesh Soradge and Prof. K. S. Thakare
Web Page Access Prediction based on an Integrated Approach ............................................................. 55
Phyu Thwe
A Survey on Bi-Clustering and its Applications ..................................................................................65
K. Sathish Kumar, M. Ramalingam and Dr. V. Thiagarasu
Pixel Level Image Fusion: A Neuro-Fuzzy Approach ................................................................................ 71
Swathy Nair, Bindu Elias and VPS Naidu
A Comparative Analysis on Visualization of Microarray Gene Expression Data...................................... 87
Poornima. S and Dr. J. Jeba Emilyn
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Cloud Architecture for Search Engine Application ...............................................................................1
A. L. Saranya and B. Senthil Murugan
Efficient Numerical Integration and Table Lookup Techniques for Real Time Flight Simulation.............. 8
P. Lathasree and Abhay A. Pashilkar
A Review of Literature on Cloud Brokerage Services................................................................................ 25
Dr. J. Akilandeswari and C. Sushanth
Improving Recommendation Quality with Enhanced Correlation Similarity in Modified Weighted Sum
.................................................................................................................................................................... 41
Khin Nila Win and Thiri Haymar Kyaw
Bounded Area Estimation of Internet Traffic Share Curve ...................................................................... 54
Dr. Sharad Gangele, Kapil Verma and Dr. Diwakar Shukla
Information Systems Projects for Sustainable Development and Social Change ................................... 68
James K. Ho and Isha Shah
Software Architectural Pattern to Improve the Performance and Reliability of a Business Application
using the Model View Controller .............................................................................................................. 83
G. Manjula and Dr. G. Mahadevan
A Predictive Stock Data Analysis with SVM-PCA Model .......................................................................1
Divya Joseph and Vinai George Biju
HOV-kNN: A New Algorithm to Nearest Neighbor Search in Dynamic Space.......................................... 12
Mohammad Reza Abbasifard, Hassan Naderi and Mohadese Mirjalili
A Survey on Mobile Malware: A War without End................................................................................... 23
Sonal Mohite and Prof. R. S. Sonar
An Efficient Design Tool to Detect Inconsistencies in UML Design Models............................................. 36
Mythili Thirugnanam and Sumathy Subramaniam
An Integrated Procedure for Resolving Portfolio Optimization Problems using Data Envelopment
Analysis, Ant Colony Optimization and Gene Expression Programming ................................................. 45
Chih-Ming Hsu
Emerging Technologies: LTE vs. WiMAX ................................................................................................... 66
Mohammad Arifin Rahman Khan and Md. Sadiq Iqbal
Introducing E-Maintenance 2.0 ................................................................................................................. 80
Abdessamad Mouzoune and Saoudi Taibi
Detection of Clones in Digital Images........................................................................................................ 91
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
The Significance of Genetic Algorithms in Search, Evolution, Optimization and Hybridization: A Short
Review ...................................................................................................................................................... 103
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1
S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi
An Efficient Connection between Statistical Software and Database Management System ................... 1
Sunghae Jun
Pragmatic Approach to Component Based Software Metrics Based on Static Methods ......................... 1
S. Sagayaraj and M. Poovizhi
SDI System with Scalable Filtering of XML Documents for Mobile Clients ............................................... 1
Yi Yi Myint and Hninn Aye Thant
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography .................................... 1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
Minimizing the Time of Detection of Large (Probably) Prime Numbers ................................................... 1
Dragan Vidakovic, Dusko Parezanovic and Zoran Vucetic
Design of ATL Rules for TransformingUML 2 Sequence Diagrams into Petri Nets..................................... 1
Elkamel Merah, Nabil Messaoudi, Dalal Bardou and Allaoua Chaoui
A Hybrid Approach for Supervised Twitter Sentiment Classification ....................................................1
K. Revathy and Dr. B. Sathiyabhama
A Survey of Dynamic Duty Cycle Scheduling Scheme at Media Access Control Layer for Energy
Conservation .....................................................................................................................................1
Prof. M. V. Nimbalkar and Sampada Khandare
A Survey on Privacy Preserving Data Mining Techniques ....................................................................1
A. K. Ilavarasi, B. Sathiyabhama and S. Poorani
An Ontology Based System for Predicting Disease using SWRL Rules ...................................................1
Mythili Thirugnanam, Tamizharasi Thirugnanam and R. Mangayarkarasi
Performance Evaluation of Web Services in C#, JAVA, and PHP ..........................................................1
Dr. S. Sagayaraj and M. Santhosh Kumar
Semi-Automated Polyhouse Cultivation Using LabVIEW......................................................................1
Prathiba Jonnala and Sivaji Satrasupalli
Performance of Biometric Palm Print Personal Identification Security System Using Ordinal Measures 1
V. K. Narendira Kumar and Dr. B. Srinivasan
MIMO System for Next Generation Wireless Communication..............................................................1
Sharif, Mohammad Emdadul Haq and Md. Arif Rana
An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining
Techniques:A Survey..........................................................................................................................1
Subaira A. S. and Anitha P.
Automated Biometric Verification: A Survey on Multimodal Biometrics ..............................................1
Rupali L. Telgad, Almas M. N. Siddiqui and Dr. Prapti D. Deshmukh
Design and Implementation of Intelligence Car Parking Systems ........................................................1
Ogunlere Samson, Maitanmi Olusola and Gregory Onwodi
Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks..............................1
Rakesh Sharma, V. A. Athavale and Pinki Sharma
Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset ...........1
G.Vinodhini and R M. Chandrasekaran
Demosaicing and Super-resolution for Color Filter Array via Residual Image Reconstruction and Sparse
Representation..................................................................................................................................1
Jie Yin, Guangling Sun and Xiaofei Zhou
Determining Weight of Known Evaluation Criteria in the Field of Mehr Housing using ANP Approach ..1
Saeed Safari, Mohammad Shojaee, Mohammad Tavakolian and Majid Assarian
Application of the Collaboration Facets of the Reference Model in Design Science Paradigm ...............1
Lukasz Ostrowski and Markus Helfert
Personalizing Education News Articles Using Interest Term and Category Based Recommender
Approaches .......................................................................................................................................1
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. ISSN: 1694-2507 (Print)
ISSN: 1694-2108 (Online)
International Journal of Computer Science
and Business Informatics
(IJCSBI.ORG)
VOL 15, NO 4
JULY 2015
2. Table of Contents VOL 15, NO 4 JULY 2015
Impact of Human Capital Development on the Managerial Workforce of SMEs in Sabah, Malaysia ......1
Noraini Abdullah and Nurul Fatihah Rosli
A Survey of Mobile Cloud Computing: Advantages, Challenges and Approaches ................................14
Mohammad Rasoul Momeni
An Efficient Authentication Protocol for Mobile Cloud Environments using ECC.................................29
Mohammad Rasoul Momeni
IJCSBI.ORG
3. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 1
Impact of Human Capital
Development on the Managerial
Workforce of SMEs in Sabah,
Malaysia
Noraini Abdullah
Mathematics with Economics Programme
Faculty of Science and Natural Resources
Universiti Malaysia Sabah, Malaysia
Nurul Fatihah Rosli
Department of Mathematics with Economics
Centre of Postgraduate Studies
Universiti Malaysia Sabah, Malaysia
ABSTRACT
Globalisation and entrepreneurship expansion have led to the emergence of Small and
Medium Enterprises (SMEs) in economic development. These would contribute to a
country’s national income, poverty reduction, and thus increase the standard of living in
underdeveloped, rural and urban areas. However, restrictions on SMEs performances,
capital flows and entrepreneurship activities have not been studied extensively. The goal of
this study is thus to investigate the factors affecting the performances of these SMEs.
Factors under study were Entrepreneurship Orientation (EO), Human Resource
Management (HRM), Marketing Orientation (MO), and Information and Communication
Technology (ICT). Data were collected from 200 questionnaires distributed to the SME’s
services sector in Kota Kinabalu, in Sabah, Malaysia where only 129 were usable; hence, a
successful response rate of 64.5%. Structural equation modelling (SEM) using partial least
squares (PLS) method is conceptualized and executed. The data were analyzed and
interpreted using the Statistical Package for Social Science (SPSS) version 20.0 and
SmartPLS 3.0. The results found that male entrepreneurs constituted 61.2% with a low
women participation of 38.8% in the SMEs managerial workforce. Potential human capital
development can be focused based on age and education. Human resources management
(HRM) had highly contributed to the SMEs performances with 0.928 (composite reliability)
and 0.773 (path coefficient), and then followed by MO and EO. ICT was found to have a
significant impact, but its hypothesis was not supported. This study thus suggested that
entrepreneurial investment in ICT could further help the SME’s owners or managers
managed their businesses effectively and efficiently.
Keywords
Small and Medium Enterprises (SMEs), Partial Least Squares (PLS), Structural Equation
Modelling (SEM), human capital development, managerial workforce.
4. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 2
1. INTRODUCTION
One of the most important role in generating national income is through
Small and Medium Enterprises (SMEs). Despite the competitive business
environment, the performances of Malaysian SMEs remained encouraging.
[1] recorded that SMEs had contributed 6.3% to the GDP growth compared
to 2012 with only 6%. Besides, SMEs had largely contributed by the
services sector, and further supported by the construction sector. It was also
recorded in 2013 that there was a growth of 6.8% value-added of SMEs in
the services sector compared with only 5.9%. in 2012. Thus, this strong
performance was driven by the overall services sector as well as related
services sub-sectors namely, telecommunications, private education, health
care, finance, insurance, professional and business services. In today’s
competitive business environment the economy is constantly evolving,
therefore it is necessary to develop the human capital in order to face these
challenges. The shortage of skilled workers in SMEs and the characteristics
of SME’s owners-managers might restrict them to expand their businesses.
A survey which had been conducted by SME Corporation showed
that generally the respondents did not much emphasis on human capital
development [2]. There were various human capital development
programmes that had been implemented, such as the followings:
National Dual Training System (NDTS)
SME Training Needs Analysis
HR Capabilities Building Programme for SMEs
Entrepreneurship Development for Orang Asli Community
Inkubator Keusahawanan Ibu Tunggal (I-KIT)
SME Human Capital Development.
Thus, the objective of this study would be to investigate the factors
affecting the human capital development and their impacts on SMEs in
Sabah, Malaysia. This paper is divided into five sections. The first section is
the overview on the importance of SMEs, section two is on the background
study related to the determinants of SMEs performance. The third section is
on past researches on similar studies, while the fourth section is on the
methodology and the fifth section is on the research findings. The last
section is the conclusions of the study.
2. BACKGROUND STUDY
Management practice is defined in terms of funding, marketing, operations
and human resource [3] where sales, profit, business stability, business
growth, increase in the number of employees, customers’ satisfaction,
increase in the value of assets and business networking were some the
5. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 3
SMEs business performance indicators. On the other hand, other indicators
on business performances were such as Entrepreneurship Orientation (EO),
Marketing Orientation (MO), Human Resource Management (HRM) and
Information and Communication Technology (ICT).
Entrepreneurial Orientation (EO) was defined by [4] as a managerial
attitude oriented toward the strategy-making processes that would provide
organizations with a basis for entrepreneurial decisions and actions, while
[5] stated that Marketing Orientation (MO) was one of the important tools in
measuring SMEs business performances. However, on Human Resource
Management (HRM) [6] claimed that it was important to note that unlike
other resources in organization, human resources were potentially be non-
obsolete, and their skills could be transferable. A research also had been
done in Malaysia regarding HRM practices enhanced organizational
performance of SMEs by [7]. The research had found that improved SMEs
performance could be gained through HRM practices and organizational
innovative capability. [8] further had found out that organizational
effectiveness was enhanced through the technology adoption in SMEs
where the use of technology would help SMEs to compete globally.
Meanwhile, [9] found that there was a positive relationship between ICT
adoption and SME’s performance.
3. LITERATURE REVIEW
In recent studies, [3] had identified that entrepreneurial characteristics and
management practices were important attributes for the performance of
enterprises. The sample comprised of a total of 158 small enterprises under
Tunas Mekar programme that operated in Terengganu and Kelantan,
Malaysia. Of the total population, only 62 respondents responded to the
survey. From the multiple regression analysis, the findings showed that
there were several determinants on the performance of small enterprises.
However, only three variables indicated significant relationships with the
enterprise’s performance, viz. entrepreneur characteristics, management
practice, training and guidance. This study claimed that the relationship
between entrepreneur characteristics and small businesses indirectly
supported the Theory of Economic Development. Furthermore, the
evidences clearly indicated that management practices especially on
financial, accounting, marketing and operations were very important factors
in determining the performance. Besides,this study also found that the more
training programmes and guidance undertaken by an enterprise, the better
would be the performance.
A study which was conducted in Bangladesh by [6] discussed the
significance on Human Resources Management (HRM) of the SMEs. This
study suggested that human resources were potentially be non-obsolete and
6. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 4
their skills were transferable across varieties of products, technologies and
markets. In addition, HRM practices focused on human element activities
for sustainability of an organization. Thus, it was recommended that more
research on managing human resource in SMEs would be conducted.
Meanwhile, [10] analyzed the strategic human resource management
practices in Iranian international sector performance. Human resources
planning, managing change, performance of employee, compensation,
health, safety, legality, labor and industrial relations were the basic criteria
which every firm had to follow. The research found that the proposed
variables namely, recruitment, performance appraisal, compensation and
training had a considerable positive association with the international sector
performance.
Most of the SMEs were found not being able to sustain in recent
competitive environment. This was due to the lack of preparedness and too
dependable on government support [7]. Hence, SMEs need to implement
appropriate strategies, especially on human resources management (HRM).
In the Malaysian context, five basic HRM practices had been selected,
namely training and development, reward system, performance appraisal, as
well as communication and information sharing. In addition, [7] had
highlighted that SMEs were able to obtain better performances by an
effective use of their organizational resources and capabilities.This was
supported by [11] where HRM practices were systematically designed
towards improving the effectiveness of SME’s performances.
The role of ICT can be seen its vitality via the social media where it
was found to be one of the alternatives which gave direct influence in
business success [12]. A case study carried out in Zimbabwe had highlighted
on the several advantages to promote any business activities through the
social media, namely:
a) Gain better understanding of customer needs
b) Increase brand awareness
c) Create relationships between customers and suppliers
d) Create business network
e) Low cost of marketing strategy
On top of that, women were mentioned by [12] as the dominant group
influenced the most by the social media in the buying behaviour. Hence, in
today’s environment, business entrepreneurs should consider to take this
opportunity as one of their business strategies for success.
A practical approach was developed by [13] to improve customer’s
satisfaction. This was because customer’s dissatisfaction could give a bad
impression on an organization’s image as well as its performance. There
were three systems in the approach, viz. decision system, effective system
7. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 5
and information system. Hence, this approach could reduce any action that
might lead to the loss of customer’s interest, and consequently, leading to
losses in profit and sales.
4. METHODOLOGY
For this study, a survey questionnaire (closed-questions) served as an
instrument for data collection. A total of 200 SMEs services sector in Kota
Kinabalu, Sabah were selected from SME Corporation of Malaysia. Out of
200 questionnaires distributed to the owners or managers, only 129
questionnaires were usable. This produced a response rate of 64.5%.
The data were then analyzed and interpreted using the Statistical
Package for Social Science (SPSS) 20.0 and SmartPLS 3.0 software
program [14]. SPSS was used to analyze the demographic profiles of the
respondents, while the partial least squares-structural equation modelling
(PLS-SEM) was used to investigate the factors affecting the performances
of the SMEs.
The dependent and independent variables of the study were adopted
and modified from previous literatures. There were seven items measured
under entrepreneur orientation (EO) which were adopted from [15].
Similarly, seven items were measured under human resource management
(HRM) from [16]. For market orientation (MO), following [17], only six
items were measured. In addition, five information technology (ICT)’s
measurements were used with single item measure for SMEs’ performance
had been adopted from [18].
Figure 1: The Framework of Relationships between IVs and DV [19].
Figure 1 shows the framework of relationships between independent
variables (IVs): Entrepreneurship Orientation (EO), Human Resource
8. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 6
Management (HRM), Marketing Orientation (MO), Information and
Communication Technology (ICT) towards the dependent variable (DV):
the SMEs Performance. The following hypotheses were obtained:
H1: Entrepreneur Orientation is positively related to SMEs performance.
H2: Market Orientation positively related to SMEs performance.
H3: Human Resource Management is positively related to SMEs
performance.
H4: Information and Communication Technology is positively related to
SMEsperformance.
Data Analysis Using PLS-SEM
Structural equation modeling (SEM) was a well-known research tool for
theory development especially in the social and marketing studies. [20]
stated that SEM was a general term to describe the validity of substantive
theories with multivariate statistical models and empirical data. SEM
comprised of two main approaches, namely, a co-variance based (CB-SEM)
and variance-based such as partial least square (PLS-SEM). This study
employed PLS-SEM for data analysis.
According to [21], PLS were defined using two sets of linear
equations: inner model (structural) and outer model (measurement). The
measurement discussed the relationships between latent variables. In
contrast, the structural model specifies the relationships between a latent
variable and its manifest variables. Moreover, the structural model can only
be analyzed after the measurement model. The PLS path modeling
characteristics are summarized as follows [21];
PLS delivers latent variable scores, i.e proxies of constructs which are
measured by one or several indicators.
PLS path modeling avoids small sample sizes problems and therefore
can be applied in some situations when other methods unable to do so.
PLS path modeling can predict very complex models with several latent
and manifest variables.
PLS can handle both reflective and formative measurement models.
Table 1 summarized the validity guidelines for measurement and
structural model. For this study, the measurement model was evaluated
using the following analyses: internal consistency reliability, indicator
reliability, convergent reliability and discriminant validity. Next, the
coefficient of determination (R²) and path coefficients were evaluated in
structural model assessment. Higher (R²) indicated the higher predictive
ability and the variance explained by the independent variables.
9. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 7
Table 1: Validity Guidelines for PLS-SEM Analysis [22]
5. RESULTS AND DISCUSSIONS
Table 2: Demographic Profiles of the Sabah Respondents on SMEs
Sabah
Category N Percentage %
Gender
Male 79 61.2
Female 50 38.8
Age
21 - 35 44 34.1
36 - 45 44 34.1
46 and Above 41 31.8
Education Level
Primary School 19 14.7
Secondary School 68 52.7
Diploma / Degree 37 28.7
Other 5 3.9
Table 2 depicted the demographic profiles of the respondents which
showed that 61.2% of the owners/manager of SMEs in Kota Kinabalu,
Sabah were males, while 38.8% were females. This revealed that there was
10. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 8
still a low participation by the women workforce eventhough great efforts to
increase women participation in entrepreneurship had been made. However,
recent trends had indicated that the women entrepreneurs were seemed
trying to catch up with the male entrepreneurs due to their change in
attitudes and paradigm shift. Hence, there was an increase from the more
urbanized state of Selangor [21] where the females entrepreneurs formed
only 14.4% of the managerial workforce and the males were still in
dominance at 86%. This has thus indicated a dynamic participative role of
women entrepreneurship since the SME annual report of [2] on the
economic and human capital development of small and medium enterprises
(SMEs) between Malaysia’s urban (Selangor) and sub-urban areas (Sabah).
Next, this study considered the age of the SMEs respondents. In
Kota Kinabalu, 34.1% of the owner-mangers were between 21-35 years and
between 36-45 years, while about 31.8% of them were above 46 years and
above. This study revealed that most of the SME’s owners in sub-urban area
were dominated by younger entrepreneurs. Besides, 14.7% of the owners
were having educational qualification of primary school, with 52.7% were
found with secondary school’s qualification and 28.7% with
Diploma/Degree qualifications. Only 3.9% with other qualifications. Thus,
it can be clearly suggested that in Sabah, more initiatives and activities
should be implemented especially on the human capital development.
As mentioned earlier, there were 7 items of EO, 7 items of HRM, 6
items of MO and 5 items measured under ICT. Items with indicator loadings
of greater than 0.5 and significant levels of more than 0.05 would remain in
the model. Hence, it could be seen from Table 3 that the items which had
remained in the model were three items of EO (E3, E4, E5), four items of
HRM (H4, H5, H6, H7), three items of MO ( MO2, MO4, MO5) and two
items of ICT (ICT4 and ICT5) that had achieved satisfaction level.
A measurement model has satisfactory internal consistency
reliability when the composite reliability (CR) of each construct exceeds the
threshold value of 0.7. Table 3 showed that the CR of each construct for
these SMEs ranged from 0.860 to 0.928. This indicated that the items used
had satisfactory internal consistency reliability.
Next, the indicator reliability was measured by examining the item
loadings. A measurement model is said to have satisfactory indicator
reliability when each item’s loading is at least 0.7 and significant at least at
the 0.05 level. As shown in Table 3, each item loading ranged from 0.790 to
0.923 except for item E5. Convergent validity is then assessed by its
average variance extracted (AVE) value. Convergent validity is adequate
when the constructs have AVE value of at least 0.50. From Table 3, it could
be seen that all constructs had AVE ranging from 0.607 to 0.775
respectively, hence greater than 0.50.
11. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 9
Table 3: Internal Consistency, Indicator Reliability and Consistency Reliability
Model Construct Measurement
Items
Loadings CR AVE
Entrepreneurs Orientation
(EO)
E3
E4
E5
0.834
0.790
0.692
0.860 0.607
Human Resources
Management (HRM)
H4
H5
H6
H7
0.894
0.918
0.885
0.898
0.928 0.684
Marketing Orientation (MO) MO2
MO4
MO5
0.820
0.870
0.808
0.906 0.707
Information &
Communication Technology
(ICT)
ICT4
ICT5
0.802
0.923 0.911 0.775
The discriminant validity is assessed by using Fornell and Larcker’s
criterion [24]. The square root of AVE should exceed the correlations
between the measure and all the other measures, and the indicators’ loadings
are higher against their respective construct compared to the other
constructs. These results were tabulated in Table 4. The item loadings of
each indicator could be seen to be highest for its designated constructs.
Hence, this study had proven that all the reliability and validity tests
conducted for the measurement model had achieved satisfactory level.
Table 4: Discriminant Validity
EO HRM ICT MO SME
EO 0.774
HRM 0.469 0.899
ICT 0.200 0.487 0.865
MO 0.424 0.544 0.451 0.833
SME 0.500 0.870 0.544 0.527 0.890
The structural model was assessed using the coefficient of
determination (R²) and the path coefficients. The R² value indicated the
amount of variance in the dependent variable that would be explained by the
independent variables. Higher (R²) would indicate the higher predictive
ability. For this study, SmartPLS algorithm was used to obtain the R²
12. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 10
values, while SmartPLS bootstrapping was used to generate the t-statistics
values [15]. The bootstrapping generated 500 sub-samples from 300
maximum iterations. The R² value for model was 0.986. Each path
connecting two latent variables represented a hypothesis. Based on the t-
statistics output in Table 5, the significant level of each relationship was
examined with at least 0.1, positive sign direction and consist of a path
coefficient value (β) ranging from 0.061 to 0.773 [25; 26]. Assessment of
the path coefficients for the model showed that all the proposed hypothesis
were supported except for H4, i.e. Information and Communication
Technology (ICT) on the performance of SMEs in Sabah. This was
expected since Sabah is still a developing state whereby there is room for
improvement in the infrastructural facilities, physical development and
internet accessability. Human Resource Management (HRM) was the most
significant on the SMEs performance with a path coefficient of 0.773.
Table 5: Path Coefficients
Path
Coefficients
(β)
Standard
Error
(STERR)
t-
Statistics
Supported Hypotheses
EO => SME’s
Performance
0.264 0.104 2.555 YES H1
HRM => SME’s
Performance
0.773 0.113 5.439 YES H2
MO => SME’s
Performance
0.328 0.129 2.001 YES H3
ICT => SME’s
Performance
0.061 0.327 0.616 NO H4
6. CONCLUSIONS
The results obtained in this study show that human capital development
involving Human Resources Management (HRM) has the highest
significant relationship on the SMEs performance compared to the other
determinants. This is supported by [7] who also claimed that improved
SMEs performance can be gained from human resource management. For
Malaysia to transform to the new Malaysian economic model, SMEs need to
seek opportunities to upgrade themselves besides developing their
organizational capabilities. This is in line with the Malaysian economic
strategies to become a high-income, developed country by 2020 [1]. Women
entrepreneurs in Sabah are found to have played a more promising role in
managerial activities as compared to Selangor [23]. From the PLS-SEM
analyses, there are positive relationships between entrepreneur orientation,
human resource management and marketing orientation with respect to the
performance of SMEs, except for information and communication
13. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 11
technology. ICT is identified as an entrepreneurial investment for SMEs to
gain and exploit the positive outcomes in productivity growth, organization
expansion, efficiency, effectiveness, competitiveness, etc. as confirmed by
[27]. The structural model obtained demonstrated achievable satisfactory
validity and reliability of the performance indicators. This study thus
concludes that the SME’s owners or managers are able to manage their
businesses effectively and efficiently. However, there are several limitations
encountered in the study. Firstly, the study is merely carried out on the
service sectors only. Hence, more studies should be devoted on different
sectors of the SMEs in Malaysia. Secondly, this study had used four specific
independent variables only. Further research can thus be suggested to be
carried out on more independent variables and/or with the inclusion of
moderating variables. Finally, biasedness in answering the distributed
questionnaires may occur due to the respondents’different background and
managerial experience.
7. ACKNOWLEDGMENTS
This research would not have been possible without the funding provided by
Universiti Malaysia Sabah under the grant number SBK0159-SS-2014 which the
authors would greatly like to thank for.
REFERENCES
[1] SME Annual Report. 2013/2014. Small and Medium Enterprise (SME) Annual Report
2014. [Retrieved from http://www.smecorp.gov.my/vn2/.
[2] SME Annual Report. 2012/2013. Small and Medium Enterprise (SME) Annual Report
2014. [Retrieved from http://www.smecorp.gov.my/vn2/
[3] Yaacob, Najihah M., Mahmood, R., Mat Zin, S., & Puteh, M. An Investigation of the
Small Business Start-Ups’ Performance. Journal of Basic and Applied Scientific
Research, 4(3s), pp.10-17. (2014).
[4] Jawad, H., Kamariah, I. & C. Shoaib, A. Linking Entrepreneurial Orientation with
Organizational Performance of Small and Medium Sized Enterprises: A Conceptual
Approach. Asian Social Science, 11(7), pp.1-10. (2015).
[5] Aliyu, M. S. & Rosli, M. Market Orientation and Organizational culture’s impacton
SME Performance: A SEM approach. International Affairs and Global
Strategy,24,pp.1-10. (2014).
[6] Mohammad, A. A. & Ezaz, A. Managing Human Resources in Small and Medium
Enterprises (SMEs) in Developing Countries: A Research Agenda for Bangladesh
SMEs. International Proceedings of Economics Development and Research (IPEDR),
55, 2012, pp.215-219.
[7] Nazlina, K. Enhancing Organizational Performance of Malaysian SMEs Through
Human Resource Management (HRM) Practices and Organizational Innovative
Capability: A Proposed Framework. Proceedings of the 3rd
International Conference
on Management, 10th
- 11th
June, 2013, Penang, Malaysia.
14. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 12
[8] Abdullah, N.H., Wahab, E., & Shamsudin, A. Exploring the Common Technology
Adoption Enablers among Malaysian SMEs: Qualitative Findings. Journal of
Management and Sustainability, 3(4), pp.78-91. (2013)
[9] Bayo-Moriones, A., Billon, M., & Lera-Lopez, F. Perceived performance effects of
ICT in manufacturing SMEs. Industrial Management& Data Systems, 113(1), 117–
135. (2013).
[10] Shila, S., & Choi, S. L. An Examination of Strategic Human Resource Management
Practices in Iranian International Sector Performance. Journal of Applied Sciences,
Engineering and Technology, 8 (23), pp.2363-2368. (2014).
[11] Agarwala, T. Innovative human resource practices and organizational commitment: an
empirical investigation. International Journal of Human Resource Management, 14(2),
pp.175-197. (2003).
[12] Samuel, M., Gwendolyn, Z. T., Muyaradzi, Z. & Caroline, R. Harnessing Social
Media for Business Success. Case Study of Zimbabwe. International Journal of
Computer Science and Business Information, 11 (1), pp.80 - 89. (2014).
[13]Amina, E. K. & A. Namir. An Approach for Customer Satisfaction, Evaluation and
Validation. International Journal of Computer Science and Business Information, 14
(1), pp.79 - 92. (2014).
[14] Ringle, C., Wende, S., & Will, A. SmartPLS 2.0.M3. [Retrieved from
http://www.smartpls.de. (2004).
[15] Rosli, M. & Norshafizah, H. Entrepreneurial Orientation and Business Performance of
Women-Owned Small and Medium Enterprises in Malaysia: Competitive Advantage
as a Mediator. International Journal of Business and Social Science, 4(1), pp.82-90.
(2013).
[16] Ahmad, S. & Schroeder, R. G. The Impact of Human Resource Management Practices
on Operational Performance; Recognizing Country and Industry Differences. Journal
of Operations Management, 21, pp.19-43. (2003).
[17] Tomaska, I. E. The Current Methods of Measurement of Market Orientation.
European Research Studies, 12 (3), pp.135-150. (2009).
[18] Chinomona, R. The Fostering Role of Information Technology on SMEs’s Strategic
Purchasing, Logistics Intergration and Business Performance. Southern African
Business Review, 17 (1), pp. 76-97. (2013).
[19] Moorthy, M., Annie T., Caroline C., Chang S. W., Jonathan T. Y. P. & Tan K. L.A
Study on Factors Affecting the Performance of SMEs in Malaysia. International
Journal of Academic Research in Business and Social Sciences, 2(4), pp.224-239.
(2012)
[20] Lei, P-W. & Wu, Q. Introduction to Structural Equation Modeling: Issues and
Practical Considerations. Instructional Topics in Educational Measurement, 33-43.
(2007).
[21] Henseler, J., Ringle, C.M., & Sinkovics, R. The use of Partial Least Squares path
modeling in International Marketing. International Marketing, 20, pp. 277-319. (2009).
[22] Kamarul, F. H. PhD. Thesis. Understanding the determinants of continuous knowledge
sharing intention within business online communities, Auckland University of
Technology.(2012).
[23] Noraini Abdullah & Nurul Fatihah Rosli. Gender Managerial Workforce and Partial
Least Squares On Small and Medium Enterprises (SMEs) in Selangor, Malaysia.
International Journal of Business & Management, 3(3), pp. 185-192. (March 2015).
15. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 13
[24] Fornell, C. & Larcker, D.F. Evaluating structural equation models with unobservable
and measurement error. Journal of Marketing Research, 34(2), pp. 161-188. (1981).
[25] Hair, J.F., Ringle, C.M. & Sarstedt, M. PLS-SEM: Indeed a silver bullet. Journal of
Marketing Theory and Practice, 19(2), pp.139-151. (2011).
[26] Wetzels, M., Odekerken-Schroder, G. & van Oppen, C. Using PLS path modeling for
assessing hiererchical construct models: Guidelines and empirical illustration. MIS
Quarterly, 33(1), pp.177-195. (2009).
[27] Tarute, A. & Gatautis, R. ICT Impact on SMEs Performance. Procedia-Social and
Behavioural Sciences, 110, pp. 1218-1225. (2014).
This paper may be cited as:
Noraini A. and Nurul, F. R., 2015. Impact of Human Capital Development
on the Managerial Workforce of SMEs in Sabah, Malaysia. International
Journal of Computer Science and Business Informatics, Special Issue: Vol.
15, No. 4, pp. 1-13.
16. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 14
A Survey of Mobile Cloud
Computing: Advantages,
Challenges and Approaches
Mohammad Rasoul Momeni
Department of Computer Engineering, Faculty of Electrical and Computer Engineering,
Imam Reza International University of Mashhad, Mashhad, Iran
ABSTRACT
Despite explosive growth of mobile computing and its popularity, full exploiting from it, is
difficult due to lack of sufficient processing power, storage, also problems such as mobility,
frequent disconnections and so on. With exploiting cloud computing along mobile
computing a new technology appears called mobile cloud computing. It can overcome these
obstacles by executing mobile applications on the cloud instead of mobile devices. Mobile
cloud is a new and applicable technology that covers many fields such as: healthcare,
vehicular, gaming, commerce and so on. The ABI Research believes that the number of
mobile cloud computing users is expected to grow from 43 million (1.1% of total mobile
users) in 2008 to 998 million (19% of total mobile users) in 2015. This paper presents a
comprehensive survey of mobile cloud computing and explains its advantages, challenges
and approaches. Also the future research directions are given.
Key words:
Mobile cloud computing, mobile applications, mobile computing, mobility.
1. INTRODUCTION
By increasing usage of mobile computing, mobile devices play an important
role in human life as most effective communication tools are ready in every
place and time. Mobile users utilize various services from mobile
applications such as Google apps which run on mobile devices locally or are
offloaded to remote servers for remote execution.
Mobile devices are facing many problems about their resources (e.g. battery
life, storage and bandwidth) and communications (e.g. mobility and
security) [1], Hence QoS is not satisfying. Mobile devices cannot run
resource-intensive applications due to lack of sufficient processing power
and storage, hence mobile users prefer to utilize more powerful devices like
PCs and laptops about resource scarcity problems.
To overcome these obstacles we can support mobile computing by cloud
computing. Cloud computing can be defined as “the aggregation of
17. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 15
computing as a utility and software as a service” [2], also called pay-as-you-
go-computing. Cloud service providers offer Infrastructure as a Service
(IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
Offloading heavy computing can help mobile devices to save energy and
mobile users to faster and more efficient execution. There are some
resource-intensive applications that mobile devices never can run but with
help of cloud computing, running them is easily, because cloud service
providers have many powerful resources. As a result, with supporting of
cloud computing for mobile users, mobile cloud- computing is introduced as
combination of cloud computing by mobile computing and network
technology, hence resource-intensive applications can be executed on
resource-constraint mobile devices.
The reminder of this paper is as follows: Section 2 provides a brief overview
of cloud computing including definitions, architecture and advantages.
Section 3 describes mobile cloud computing, including its definitions,
architecture, and motivation for developing, advantages, challenges and
future research directions. Finally section 4 is conclusions.
2. CLOUD COMPUTING CONCEPT
For better understanding of mobile cloud computing, we need to understand
cloud computing, because it is infrastructure of mobile cloud concept. The
best definition for cloud computing is provided by NIST. NIST defines
Cloud computing as “a model for enabling ubiquitous, convenient on
demand network access to a shared computing resources that can be
delivered with minimal managerial effort” [3]. It uses a simple “pay as you
go” model which allows organizations or users to pay for the services they
use. Hence we do not need to maintain datacenters and use expensive
hardware and software, only we use when we need them. Cost reduction is
the main factor to use cloud computing by small and large organizations.
91% of organizations in US and Europe said that cost reduction is the major
reason for them to use cloud computing technology [4].
The cloud computing model can be considered as combination of three
delivery models and four deployment models as follows.
The four deployment models are public, private, community and hybrid.
Public: all users can access to cloud services.
Private: cloud services are accessible for special group of users.
Community: cloud services are shared among user groups,
enterprises and etc.
Hybrid: cloud services are composed of any combination of public,
private and hybrid.
18. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 16
Three delivery models are IaaS, PaaS and SaaS.
Infrastructure as a Service (IaaS): IaaS enables provision of key
components such as hardware, storage and network devices.
Amazon EC2 (Elastic cloud computing) and S3 (Simple storage
service) are examples of IaaS.
Platform as a Service (PaaS): It is the framework for building,
testing and deploying applications. Examples of PaaS are Google
App Engine and Microsoft Azure.
Software as a Service (SaaS): It enables subscribers to use
applications on pay-as- you-go basis. Examples of SaaS are
Salesforce and Microsoft Live Mesh.
2.1 Advantages of Cloud computing
Cloud computing moves us from a traditional technology to a dynamic and
flexible one. “Cloud computing refers to both the applications delivered as
services over the Internet and the hardware and systems software in the
datacenters that provide those services” [5].
In following some advantages of cloud computing discussed [6].
On-demand services: service providers can configure services per
subscriber requirements and they can access and use prepared
services on-demand.
Low cost: there is no need to prepare infrastructure, hardware and
software. In fact, subscribers connect to the cloud and use from the
infrastructure supplied by the service provider.
Robustness and flexibility: we need robustness and flexibility for
fast fault recovery and to adapt to non-deterministic nature of user
behavior and service access pattern.
3. OVERVIEW OF MOBILE CLOUD COMPUTING
3.1 Definition
“Mobile cloud computing at its simplest, refers to an infrastructure where
both the data storage and data processing occur outside of the mobile
device” [7]. Alternatively mobile cloud computing can be defined as an
integration of mobile web and cloud- computing [8], [9].
With mobile cloud computing technology, mobile devices do not need
powerful configuration, because data processing and storage happen in the
cloud instead of in the mobile devices.
3.2 Mobile cloud computing architecture
19. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 17
Figure 1. Architecture of mobile cloud computing [11].
General architecture of mobile cloud computing depicted in Figure 1.
According to this figure mobile devices connect to mobile networks via
BTS, access point or satellites. First request are forwarding to central
processors that are connected to servers. The cloud controller receives and
processes mobile user request for using cloud services. It uses the datacenter
to provide different services for mobile users. In Figure 2. We see cloud
computing architecture. It follows a bottom-top approach. Cloud services
extensively defined in section 2. The server layer consists of virtual and
physical servers and switches. This layer is responsible to allocate hardware
resources to mobile client. On top of stack, client utilizes services and only
pay for his/her usage. There is no concerns about hardware and software
maintenance.
20. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 18
Figure 2. Cloud computing architecture [12].
3.3 Motivations for developing mobile cloud computing
Mobile devices have recently gained significant role in human life in many
areas such as governmental agencies, social service providers (e.g.
insurance, police), healthcare, education, and engineering organizations
[13]-[15]. Despite of significant improvement in mobile devices technology,
computing capabilities still is low. As mentioned mobile devices are
resource-constraint devices and we need to augment them for better user
experience. There are different ways to augment mobile devices mentioned
in [16].
Hardware
Researchers aim to augment mobile devices by exploiting powerful
processors, large screen and long lasting battery [17]. In this approach main
focus is on CPU, Memory, Storage, Screen and Battery. This approach is
low and expensive.
Software
Software approaches are categorized into six groups, which are remote
execution, remote storage, multi-tier programming, live cloud-streaming,
resource-aware computing and fidelity adaptation.
- Remote execution:
21. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 19
Some components of mobile applications are migrated from mobile devices
to resource rich computing device(s), hence mobile devices can save energy.
Remote execution (offloading or cyber foraging) is a popular option and
there are many researches in this field. The efficiency of this approach is
highly depends on partitioning concept.
- Remote storage:
In this approach applications and dada are kept outside the mobile devices
and storage space improves significantly. By using cloud resources such as
Jupiter [18] and SmartBox [19] instead of traditional resources, we have
more efficiency.
- Multi-tier programming:
In this approach, we develop applications which need to less native
resources. Heavy components of applications migrate from device and
lightweight components remain inside the device.
- Live cloud-streaming:
In this approach [20] execution process entirely occur in the cloud and then
results are transmitting to the mobile devices. There are some problems like
latency, bandwidth and network traffic congestion.
- Resource-aware computing:
In these approaches [21]-[23], researchers utilize application-level resource
management methods (with using software such as compiler and OS) thus
requirements of mobile applications are reduced. Resource conservation is
performed well via efficient selection of available execution approaches
[24].
- Fidelity adaptation:
When remote resources and online connectivity are not available, this
approach is an option to perform. Main idea is to decrease quality of
application execution that lead to resource conservation. For better
performance, researchers [25], [26] combined cyber foraging by fidelity
adaptation.
Cloud computing enables virtualization technology that facilitates access to
cloud services for users. Virtualization is needed for improving scalability
and resource utilization ratio. It enables the illusion of infinite resources to
the cloud subscribers [27].
3.4 Advantages
Before discussing advantages of mobile cloud computing in this section, in
order to better understanding mobile cloud computing concept, we examine
the definitions of mobile computing, cloud computing and network
22. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 20
technology. Because mobile cloud computing consists of these three main
concepts.
- Mobile computing:
“Information at fingertips anywhere, anytime” [28]. Or “The mobile
computing no longer requires users to maintain a fix and universally known
position in the network and enables almost unrestricted mobility” [29].
- Cloud computing:
NIST defines Cloud computing as a “model for enabling ubiquitous,
convenient on demand network access to a shared computing resources that
can be rapidly delivered with minimal managerial effort” [3].
- Network technology:
Majority of communications occur in wireless environments.
Advantages of mobile cloud computing are:
- Improving processing power:
Resource-intensive mobile applications offload to cloud for execution,
because cloud resources (specially its processors) are powerful. Thus mobile
devices can virtually perform and actually deliver the results of heavy
transactions that usually cannot perform [16].
- Expanded storage capacity:
Mobile applications are constrained by storage capacity on mobile devices.
Due to handiness, size and price issues, Mobile devices cannot have large
storage capacity. A common solution is to use infinite storage capacity of
cloud resources. Amazon S3 prepares file storage service [30]. Another
example is Image Exchange which utilizes large storage capacity for mobile
users [31]. Also Flicker is the mobile photo sharing applications based on
mobile cloud computing [32].
- Improving battery lifetime:
Long time application execution and giant processing entities lead to large
amount of power consumption. A solution is to utilize offloading methods
and remote application execution that significantly extend battery lifetime.
In the other words, offloading heavy and energy-intensive applications to
the cloud for execution can save energy. For example researchers believe
offloading a compiler optimization for Image processing can reduce 41% for
energy consumption in a mobile device [33].
- Improving reliability:
Due to resource scarcity in the mobile devices, providing complex
encryption provisions and sufficient security services is not feasible. By
storing data in the cloud storage [34], [35] mobile users ensure data
protection and availability. Also cloud can provide security services such as
23. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 21
authentication, virus scanning and malicious code detection for mobile users
[36]. To deal with data lost on mobile devices, offloading data to the cloud
is efficient because cloud can backup data on a group of computers.
- Easy content and resource sharing:
By storing data and applications in the cloud, mobile users can access to
contents every time, in the other words cloud service providers facilitate
content and resource sharing among authorized users.
3.5 Challenges in mobile cloud computing
- Service availability:
Service availability is a big concern in mobile cloud computing, because
majority of communications occur in wireless environments and wireless
communications are not confident. Mobile users are faced with problems
such as network traffic, network congestion and out-of-signal.
- Heterogeneity:
As mentioned in [10]. Heterogeneity in the mobile cloud computing refers
to existence of differentiated hardware, architectures, infrastructure and
technologies of mobile devices, clouds and wireless networks.
Intelligent Radio Network Access (IRNA [37]) is a model to deal with
dynamics and heterogeneity of networks. In order to utilize IRNA in the
mobile cloud computing, in [38] authors propose a context management
architecture for acquire, management
And distribution a context Information.
- Offloading:
As mentioned in previous section, computing offloading and then remote
execution is one way to improve battery lifetime. Note that offloading is not
always the optimal solution to save energy, because it might consume more
energy than local execution especially when the size of content is small.
Methods of offloading are classified into three main directions: client-server
communication methods, virtualization and mobile agents [27]. The
decision of when to offload and which partitions of application need to be
offloaded are important issues that need to be considered.
- Security and privacy:
Security and privacy issues are too complex in mobile cloud computing due
to inherent challenges of wireless communications such as insecure nature
and problems related to heterogeneity. Due to energy constraints in mobile
devices, mobile users need to lightweight security algorithms. Security
issues are classified into mobile application security framework and data
security framework.
- Mobile application security framework:
24. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 22
Mobile devices are resource-constraint devices and cannot running heavy
security software such as: anti-virus, intrusion detection and firewall, thus
applications can be offloaded to the cloud for a detailed security assessment.
For example [38] presents a method to offload the threat detection
capabilities to the cloud instead of executing in the mobile device, that lead
to save energy significantly. Evaluation parameters for application security
frameworks are: application type, security features, assumption and
scalability [39]. Also in [57] authors proposed a security framework for
analyzing the security of mobile application and detecting mobile malwares.
The cloud –based security approach provides strong security for mobile
devices.
- Data security framework:
Data security is very important because mobile users don’t have direct
control on stored data on the cloud. Two important aspects of data security
are:
- Data integrity:
Data integrity is a big issue for mobile users. Several solutions proposed in
this area are such as [40], [41], and [43]. [42] Considers energy
consumption unlike the two methods. Proposed scheme in [42] includes
three main components: mobile client, cloud storage service and trusted
third party and has three phases namely initialization, update and
verification. Researchers used Message Authentication Code (MAC) in this
method. Significant improvement in this method is this idea that checking
and verification are performed on trusted third party and Mobile users only
comparison the results. This improvement lead to save energy and
bandwidth significantly.
- Authentication:
Authentication is an important initial step to guarantee the security of user
data and files stored on cloud. In [43] authors proposed an authentication
mechanism to authenticate the owner of the uploaded file on cloud and also
integrity of mobile users’ data stored on cloud. The proposed scheme
includes four components namely mobile device, cloud service provider,
certification authority and telecommunication module depicted in Figure 3.
25. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 23
Figure 3. Proposed scheme [43]
The certification authority performs authentication of mobile devices in this
scheme. [44] Proposes a framework that combines TrustCube [45] and
implicit authentication [46], [47] to authenticate mobile users. Implicit
authentication or behavioral authentication uses habits to authenticate users
and maps mobile user behaviors to score. TrustCube is a policy-based cloud
authentication and supports the integration of various authentication
methods. Also authors in [58] proposed asymmetric encryption for
providing better security. They utilized user location for providing a rigid
authentication, but we know that asymmetric encryption has high power
consumption and bandwidth. In [59] authors utilized secret sharing concept
to propose a rigid data security framework. Their security framework is
robust against related security attacks. Finally in [60] Momeni proposed a
lightweight and efficient authentication protocol for mobile cloud
environments. His proposed scheme is enough strong against related attacks
and it is according to real communication scenarios.
- Privacy:
In [49] the authors showed that following requirements is necessary to
ensure users’ Privacy: protection against misuse, adjustment of laws (for
more security in special circumstances), ease of use and identification of
pirated datasets. Anonymous routing such as onion routing can be used to
prepare privacy for mobile nodes in a decentralized mobile cloud [40].
Examples in P2P domain are [49], [50] and [51].
- Seamless communication:
26. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 24
Due to heterogeneity of wireless communications, maintaining a seamless
communication between mobile users and mobile service provider is
difficult. Mobility and frequent disconnections decrease resource utilization
ratio [16]. One solution after disconnection is local execution. Note that
Results obtained before disconnection is not sufficient and execution must
be resumed.
- Improving the efficiency of data access:
Handling the data resources on cloud is difficult due to some problems such
as low bandwidth, mobility and limitation of resource capacity of mobile
devices. One easy solution to improve the efficiency of data access is a local
storage cache [11]. For example [52] addresses three issues: maintaining
seamless communication among subscribers and cloud, handling cache
consistency and supporting data privacy. Proposed scheme has two main
functional blocks namely RFS client on the mobile device and RFS server
on cloud. In proposed scheme authors using RESTful web service [53] for
service provider and HTTP for communication protocol. Also it addresses
issues such as wireless connectivity and data privacy.
3.6 Future research directions
Some problems may occur when mobile users try to use cloud resources,
such as disconnection, congestion and signal attenuation. These problems
lead to user dissatisfaction and decreasing quality of service. Instead of
communicating with a remote cloud, a better solution is to connect to
Cloudlet [54]. A cloudlet is resource rich computer or cluster of computers
which is Connected to the Internet and available for use by close mobile
devices [11]. This approach enables mobile devices to bypass latency and
bandwidth issues caused by connecting to remote cloud. In the absence of
close cloudlets mobile users may using local execution or connection to
remote cloud server.
- Security, trust and privacy:
With the development of cyber-crime applying security, trust and privacy is
required to protect mobile user contents and success of mobile cloud
computing. Indeed, how cloud service providers ensure confidentiality of
user content is a critical factor. Trust establishment based on the service
provider’s reputation and aggregation of trust from each service node would
be a valuable approach that requires future research [10].
- Low bandwidth:
Due to inherent problems of wireless environment, still bandwidth is a big
problem for mobile users. One solution is to use 4G networks that improve
bandwidth capacity for mobile users. Advantages of 4G networks are:
broading mobile coverage area, differed services, etc. [55]. [56] Discusses
27. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 25
about 4G wireless network issues such as architecture, quality of service,
etc.
4. CONCLUSIONS
Mobile cloud computing aims to augment the resource-constraint mobile
devices, but currently it is like a baby that requires attention. The ABI
research believes more than 240 million business will use services provided
by cloud service providers through mobile devices by 2015. Mobile cloud
computing is a growing technology that includes both cloud computing and
mobile computing benefits. Also it is highly applicable for mobile devices.
This paper has given an extensive and survey of mobile cloud computing
technology including its definitions, architecture, motivation for developing,
advantages, challenges and future research directions. For better
understanding of mobile cloud computing before describing it, cloud
computing is described.
REFERENCES
[1] M. Satyanarayanan, 1996. “Fundamental challenges in mobile computing,” in
Proceedings of the 5th annual ACM symposium on Principles of distributed computing,
pp. 1-7.
[2] W. Vogels, A head in the clouds the power of infrastructure as a service, in: Proceedings
of the1st Workshop on Cloud Computing and Applications, CCA’08.
[3] Mell P, Grance T (2011) the nist definition of cloud computing (draft).
http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf.
[4] Ponemon (2011) Security of cloud computing providers study.
http://www.ca.com/~/media/Files/ IndustryResearch/security-of-cloud-computing-
providers-final-april-2011.pdf
[5] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D.
Patterson, A. Rabkin and I. Stoica, . 2009. above the clouds: a Berkeley view of cloud
computing, Technical Report UCB/EECS-2009-28.
[6] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, 2010. A. Konwinski, et al., A
view of Cloud computing, Communication ACM. Vol.53, pp. 50–58.
[7] http://www.mobilecloudcomputingforum.com/
[8] Jacson H. Christensen, 2009. “Using RESTful web-services and cloud computing to
create next generation mobile applications,” in Proceedings of the 24th ACM SIGPLAN
conference companion on Object oriented programming systems languages and
applications (OOPSLA), pp. 627-634.
[9] L. Liu, R. Moulic, and D. Shea, 2011. “Cloud Service Portal for Mobile Device
Management,” in Proceedings of IEEE 7th International Conference on e-Business
Engineering (ICEBE), pp. 474.
[10]Z. Sanaei, S. Abolfazli, A. Gani, and R. K. Buyya, 2013. “Heterogeneity in Mobile
Cloud Computing: Taxonomy and Open Challenges,” IEEE Communications Surveys
& Tutorials, Vol.16, pp. 369-392.
[11]Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang., 2013. “A Survey of Mobile
28. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 26
Cloud Computing: Architecture, Applications, and Approaches” Wiley wireless
communications and mobile computing, Vol.13, pp. 1587-1611.
[12]Modi, C., Patel, D., Borisaniya, B., Patel, B., Rajarajan, M., 2013. “A survey on security
issues and solutions at different layers of Cloud computing” springer Journal of
Supercomput, Vol.63, pp. 561–592.
[13]K. Bent. (2012, May) Obama: Government Agencies Have One Year To Deploy
Smartphone-Friendly Services.
[14]T. Khalifa, K. Naik, and A. Nayak., 2011. “A Survey of Communication Protocols for
Automatic Meter Reading Applications,” IEEE Communications Surveys & Tutorials,
Vol. 13, No. 2, pp. 168–182.
[15]R. Buyya, C. Vecchiola, and T. Selvi, 2013. Mastering Cloud Computing. Morgan
Kaufmann, USA.
[16]S. Abolfazli, Z. Sanaei, Ejaz Ahmed, Abdullah Gani, Rajkumar Buyya, 2013. “Cloud-
Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open
Challenges” IEEE Communications Surveys & Tutorials, Vol.16, pp. 337-368.
[17]K. Jackson. (2009) Missouri University Researchers Create Smaller and More Efficient
Nuclear Battery.
[18]Y. Guo, L. Zhang, J. Kong, J. Sun, T. Feng, and X. Chen, 2011. “Jupiter: transparent
augmentation of smartphone capabilities through cloud computing,” in Proc. ACM
MobiHeld ’11, Cascais, Portugal.
[19]W. Zheng, P. Xu, X. Huang, and N. Wu, 2010. “Design a cloud storage platform for
pervasive computing environments,” Cluster Computing, vol. 13, no. 2, pp. 141–151.
[20]G. Lawton, “Cloud Streaming Brings Video to Mobile Devices, 2012.” IEEE Computer,
vol. 45, no. 2, pp. 14–16.
[21]B. Seshasayee, R. Nathuji, and K. Schwan, 2007. “Energy-aware mobile service
overlays: Cooperative dynamic power management in distributed mobile systems,” in
Proc. IEEE ICAC’07, Jacksonville, Florida, USA, p. 6.
[22]Y. J. Hong, K. Kumar, and Y. H. Lu, 2009. “Energy efficient content-based image
retrieval for mobile systems” in Proc. IEEE ISCAS ’09, Taipei, Taiwan, pp. 1673–1676.
[23]Kremer, J. Hicks, and J. Rehg, 2003. “A compilation framework for power and energy
management on mobile computers,” Languages and Compilers for Parallel Computing,
pp. 115–131.
[24]S. Gurun and C. Krintz, 2003. “Addressing the energy crisis in mobile computing with
developing power aware software,” vol. 8, no. 64.
[25]J. Flinn and M. Satyanarayanan, 1999. “Energy-aware adaptation for mobile
applications,” in Proc. ACM SOSP’ 99, vol. 33, pp. 48–63.
[26]E. D. Lara, D. S. Wallach, and W. Zwaenepoel, 2001. “Puppeteer: Component-based
adaptation for mobile computing,” in Proc. USENIX USITS, pp. 14–25.
[27]Niroshinie Fernando, Seng W. Loke, Wenny Rahayu, 2013. “Mobile cloud computing:
A survey” Elsevier Future Generation Computer Systems, Vol.29, pp. 84–106.
[28]M. Satyanarayanan, 2011. “Mobile computing: the next decade,” ACM SIGMOBILE
Mobile Computing and Communications Review, vol. 15, no. 2, pp. 2–10.
[29]T. Imielinski and H. Korth, 1996. Introduction to Mobile Computing, ser. The Springer
International Series in Engineering and Computer Science, vol. 353, pp. 1–43.
[30]http://aws.amazon.com/s3/
[31]E. Vartiainen, and K. V. -V. Mattila, 2010. “User experience of mobile photo sharing in
29. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 27
the cloud,” in Proceedings of the 9th International Conference on Mobile and
Ubiquitous Multimedia (MUM).
[32]http://www.flickr.com/
[33]U. Kremer, J. Hicks, and J. Rehg, 2001. “A Compilation Framework for Power and
Energy Management on Mobile Computers,” in Proceedings of the 14th International
Conference on Languages and Compliers for Parallel Computing, pp. 115 - 131, August.
[34]W. Zheng, P. Xu, X. Huang, and N. Wu, 2010. “Design a cloud storage platform for
pervasive computing environments,” Cluster Computing, vol. 13, no. 2, pp. 141–151.
[35]W. Zeng, Y. Zhao, K. Ou, and W. Song, 2009. “Research on cloud storage architecture
and key technologies,” in Proc. ACM ICIS ’09, Seoul, Republic of Korea, pp. 1044–
1048.
[36]J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. 2008. “Virtualized
in-cloud security services for mobile devices,” in Proceedings of the 1st Workshop on
Virtualization in Mobile Computing, pp. 31-35.
[37]A. Klein, C. Mannweiler, and H. D. Schotten, 2009. “A Framework for Intelligent
Radio Network Access Based on Context Models,” in Proceedings of the 22nd WWRF
meeting 2009.
[38]A. Klein, C. Mannweiler, J. Schneider, and D. Hans, 2010. “Access Schemes for Mobile
Cloud Computing,” in Proceedings of the 11th
International Conference on Mobile Data
Management (MDM), pp. 387.
[39]Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan, Sajjad A. Madani, 2013. “Towards
secure mobile cloud computing: A survey” Elsevier Future Generation Computer
Systems Vol.29, pp.1278–1299.
[40]A. Tanenbaum and M. Van Steen, 2007. “Distributed Systems: Principles and
Paradigms,” Pearson Prentice Hall.
[41]W. Wang, Z. Li, R. Owens, and B. Bhargava, 2009. “Secure and efficient access to
outsourced data,” in ACM Cloud Computing Security Workshop (CCSW), pp. 55 - 66.
[42]W. Itani, A. Kayssi, and A. Chehab, 2011. “Energy-efficient incremental integrity for
securing storage in mobile cloud computing,” International Conference on Energy
Aware Computing (ICEAC), pp. 1.
[43]S.C. Hsueh, J.Y. Lin, M.Y. Lin, 2011. Secure cloud storage for conventional data
archive of smart phones, in: Proc. 15th IEEE Int. Symposium on Consumer Electronics,
ISCE ’11, Singapore.
[44]R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song,
2010.“Authentication in the clouds: a framework and its application to mobile users,” in
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
(CCSW), pp. 1 - 6.
[45]Z. Song, J. Molina, S. Lee, S. Kotani, and R. Masuoka. 2009. “TrustCube: An
Infrastructure that Builds Trust in Client,” in Proceedings of the 1st International
Conference on Future of Trust in Computing.
[46]M. Jakobsson, E. Shi, P. Golle, and R.Chow, 2009. “Implicit Authentication for Mobile
Devices,” in Processing of the 4th USENIX Workshop on Hot Topics in Security
(HotSec).
[47]E. Shi, Y. Niu, M. Jakobsson, and R. Chow. 2010. “Implicit Authentication through
Learning User Behavior,” in Proceedings of the implicit authentication Security
Conference (ISC).
[48]M. Fahrmair, W. Sitou, B. Spanfelner, 2011. Security and privacy rights management
for mobile and ubiquitous computing, in: Workshop on UbiComp Privacy, pp. 97–08.
30. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 28
[49]J. Han, Y. Zhu, Y. Liu, J. Cai, L. Hu, 2005. Provide privacy for mobile p2p systems, in:
25th IEEE International Conference on Distributed Computing Systems Workshops, pp.
829–834.
[50]J. Han, Y. Liu, Rumor, 2006. Riding: anonymizing unstructured peer-to-peer systems,
in: Proceedings of the 2006 14th IEEE International Conference on Network Protocols,
2006, ICNP’06, pp. 22–31.
[51]G. Ghinita, P. Kalnis, S. Skiadopoulos, 2007. Prive: anonymous location-based queries
in distributed mobile systems, in: Proceedings of the 16th
International Conference on
World Wide Web , ACM, New York, USA, pp. 371–380.
[52]Y. Dong, J. Peng, D. Wang, H. Zhu, F. Wang, Sun C. Chan, and Michael P. Mesnier,
2011. “RFS: a network file system for mobile devices and the cloud,” ACM SIGOPS
Operating Systems Review, vol. 45, no. 1, pp. 101-111.
[53]Jacson H. Christensen, 2009. “Using RESTful web-services and cloud computing to
create next generation mobile applications,” in Proceedings of the 24th ACM SIGPLAN
conference companion on Object oriented programming systems languages and
applications (OOPSLA), pp. 627-634.
[54]M. Satyanarayanan, P. Bahl, R. Caceres, N. Davies, 2009. The case for VM-based
cloudlets in mobile computing, IEEE Pervasive Computing Vol.8, pp. 14–23.
[55]M. Rahman and F. A. M. Mir, 2007. “Fourth Generation (4G) Mobile Networks -
Features, Technologies & Issues,” in Proceedings of the 6th IEEE International
Conference on 3G and Beyond, pp. 1.
[56]U. Varshney and R. Jain, 2002. “Issues in emerging 4G wireless networks,” Computer,
vol. 34, no. 6, pp. 94 – 96.
[57]S. Zonouz, A. Houmansadr, R. Berthier, N. Borisov, W. Sanders, 2013.” Secloud: A
cloud-based comprehensive and lightweight security solution for smartphones“; Proc:
Elsevier.
[58]Md. AI-Hasan, Kaushik Deb, Mohammad Obaidur Rahman, 2013. “User Authentication
Approach for Data Security between Smartphone and Cloud”; Strategic Technology
(IFOST), 8th
International Forum on, Publisher: IEEE.
[59]Hong gang Wang, Shaoen Wu, Min Chen, Wei Wang, 2014. “Security Protection
between Users and the Mobile Media Cloud”, IEEE Communications Magazine.
[60]60. Momeni, M. R., 2014. A Lightweight Authentication Scheme for Mobile Cloud
Computing. International Journal of Computer Science and Business Informatics,
Vol. 14, No. 2, pp. 153-160.
This paper may be cited as:
Momeni, M. R., 2015. A Survey of Mobile Cloud Computing: Advantages,
Challenges and Approaches. International Journal of Computer Science and
Business Informatics, Special Issue: Vol. 15, No. 4, pp. 14-28.
31. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 29
An Efficient Authentication Protocol for
Mobile Cloud Environments using ECC
Mohammad Rasoul Momeni
Department of Computer Engineering, Faculty of Electrical and Computer Engineering,
Imam Reza International University of Mashhad, Iran
ABSTRACT
The growth of mobile cloud computing users is rapid and now many mobile users utilize
from mobile cloud computing technology. This technology makes mobile users stronger
beyond the mobile computing capabilities. The security risks have become a hurdle in the
rapid adaptability of the mobile cloud computing technology. Significant efforts have been
devoted in research organizations and academia to securing the mobile cloud computing
technology. In this paper we proposed a lightweight and efficient authentication protocol
for mobile cloud environment. According to significant advantages of ECC (elliptic curve
cryptosystem), it has been adopted through this paper. Our proposed protocol has many
advantages such as: supporting user anonymity, identity management and also resistance
against related attacks such as replay attack, stolen verifier attack, modification attack,
server spoofing attack and so on.
Key words
Mobile cloud computing, lightweight authentication, ECC, user anonymity, security risks.
1. INTRODUCTION
Mobile cloud computing is a technology that aims to augment mobile
devices beyond their capabilities. Mobile devices have limited processing
and storage capabilities and their battery lifetime will exhaust soon [1].
Authentication is the most important factor to protect systems against
attacks. If this mechanism works well other mechanisms can be lightweight.
Authentication methods are grouped to four classes. 1. What you are (E.g.
fingerprint), 2.what you have (E.g. smart cards), 3.what you know (E.g.
passwords) and 4.what you do or implicit authentication. Due to inherent
challenges of wireless communications such as insecure nature and
problems related to heterogeneity, security and privacy issues are too
complex in mobile cloud computing. ECC based schemes with smaller key
size, strict security and high efficiency are the best choice for securing the
mobile cloud computing technology. For example ECC with 160 bits key
size and RSA with 1024 bits key size have the same security level. ECC is
good for environments with these properties: low bandwidth, limited
processing power and storage capacity, battery lifetime limitation. Firstly
32. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 30
lamport in 1981 proposed an authentication scheme over an open channel
[2]. His scheme was resistance against impersonation attack and server’s
data eavesdropping attack but vulnerable to replay attack. Peyravian and
Zunic proposed an authentication scheme without encryption techniques [3].
It only used hash function. Lee et al. demonstrated that this scheme is
vulnerable to offline password guessing attack and then improved it [4].
Later ku et al showed lee et al scheme is vulnerable to attacks such as denial
of service, offline password guessing and stolen verifier [5]. Yoon et al then
improved lee et al scheme in the year 2004 [6], but ku et al demonstrated
this scheme is vulnerable to offline password guessing attack and stolen
verifier attack [7]. Later hwang and yeh demonstrated Peyravian and
Zunic’s scheme is vulnerable to password guessing attack and server
spoofing attack [8]. Then they improved it with public key cryptosystem.
Their scheme satisfies mutual authentication, but ku et al mentioned it is
vulnerable to replay attack [9]. Lin and hwang demonstrated denial of
service attack is applicable to hwang and yeh scheme [10]. Also they
mentioned hwang and yeh scheme cannot satisfy perfect forward secrecy.
Peyravian and Jeffries improved Peyravian and Zunic’s scheme [11], but
shim claimed that their scheme is vulnerable to offline password guessing
attack and denial of service attack [12]. Zhu et al mentioned that Hwang and
Yeh’s scheme still vulnerable to replay attack, stolen verifier attack and
impersonation attack and then proposed an improved scheme to eliminate
the weaknesses of Hwang and Yeh’s scheme [13]. Their scheme is based on
timestamp and salting techniques. Momeni proposed a lightweight
authentication scheme [14]. His protocol has little processing and
communication overhead and is enough strong against related attacks. The
rest of the paper is organized as follows: in Section 2, we propose our
authentication protocol. Section 3 and 4 describe the security and
performance analysis respectively. And finally section 5 concludes the
paper. The notations to be used in this paper are in Table 1.
33. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 31
Table 1. Notations
Symbols Description
IDU User identity
PWU Password
S Private key (server)
Q = S.P Public key (server)
AKU = S.ZU Authentication key
ZU = PWU.P Password verifier
DIDU Dynamic identity of user
P Base point
|| Concatenation operator
H( ) Hash function
r1 , r2 Random numbers
EAK( ) Symmetric encryption function
2. PROPOSED SCHEME
In this section our protocol is presented. Our proposed protocol consists of
four phases namely: registration phase, mutual authentication and session
key agreement phase, password change phase and finally user eviction
phase. Now we describe the registration phase.
2.1 Registration Phase
In this phase mobile user performs registration phase via secure channel as
follows. Note that registration phase is done only once.
1. Mobile user sends his identity and password verifier to authentication
server through secure channel.
2. Now the server checks this identity and if already exists in the server
database rejects it, Mobile user must prepares unique identity. It is clear to
see that in this step identity management is provided. Now server can
compute authentication key as AKU = S.ZU. In this step authentication server
stores user identity, password verifier and status bit in the users table.
3. Finally the server returns authentication key to mobile user.
When mobile user login to system, status bit sets to one and in the other
words it sets to zero. In the following we show a sample of users table.
34. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 32
Table 2. Users table
Identity Password Verifier Status bit
IDA ZA = PWA.P 0-1
IDB ZB = PWB.P 0-1
IDC ZC = PWC.P 0-1
Registration phase has shown in figure 1.
Figure 1. Registration phase
2.2 Mutual authentication and session key agreement phase
After registration whenever mobile user wants to use cloud services, he/she
must be authenticated. Hence he/she sends a login request message to the
server and then server verifies the authenticity of the login request message
as follows.
1. Mobile user generates a random number r1 and calculates R = r1.Q and
also M = r1.PWU.P. Next mobile user generates dynamic identity to protect
his real identity as follows: DIDU = IDU ⊕ H(AKU || R). Mobile user sends
M1 = (DIDU, EAK (R, M), H(DIDU, EAK (R, M))) to the server.
2. After receiving M1, the server computes H*
(DIDU, EAK (R, M)), then
checks H = H*
for detecting modification attack. If H is not equal to H*
,
server aborts the current session. Hence denial of service can be eliminated.
35. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 33
Then server obtains R and M by decrypting the message. Also in this step
server calculates the real identity from dynamic identity as follows: IDU =
DIDU ⊕ H(AKU || R). Then validates it according to identities that exists in
the users table. Now the server generates r2 and calculates N = r2.Q. Finally
the server sends message M2 = ((M+N), H(N)) to mobile user.
3. After receiving M2, mobile user calculates N from M+N-M and then
computes H*
(N) and compares it by received H(N) to detect modification
attack. If H is not equal to H*
mobile user aborts the current session, Hence
denial of service can be eliminated. Mobile user computes message M3 =
(H(M || N), DIDU) and sends it to the server. Also he/she computes the
session key SK = r1.PWU.N = r1.PWU.r2.S.P = r1.r2.S.P.PWU in this step.
4. After receiving M3, the server computes H*
(M || N) and then compares it
by received H(M || N) to detect modification attack. If H is not equal to H*
the server aborts the current session, Hence denial of service can be
eliminated. Now the server computes session key as follows: SK = r2.S.M =
r2.S.r1.PWU.P = r1.r2.S.P.PWU. Note that SK is valid only for this session.
Mutual authentication and session key agreement phase has shown in
following.
36. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 34
Mobile User
Authentication
Server
r1, R = r1.Q
M = r1.PWU.P
IDU⊕H(AKU || R)DIDU =
H*
(DIDU, EAK (R, M))
Obtaining R, M
DIDU⊕H(AKU || R)IDU =
R2, N = r2.Q
M+N-M = N, H*
(N)
H(M || N)
SK = r1.PWU.N = r1.PWU.r2.S.P
= r1.r2.S.P.PWU
H*
(M || N)
SK = r2.S.M = r2.S.r1.PWU.P =
r1.r2.S.P.PWU
1
3
2
4
M2 = ((M+N), H(N))
M1 = (DIDU, EAK (R, M), H(DIDU, EAK (R, M)))
M3 = (H(M || N), DIDU)
37. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 35
2.3 Password change phase
In this phase mobile user can change his/her password without any
intervention from server. This property brings high security and user
friendly for our proposed scheme. After choosing new password and
computing password verifier for it, only password verifier transmits to the
server. The channel in this phase is secure. The steps of this phase are as
follows.
1. Mobile user sends his/her identity and password verifier with a password
change request to the server.
2. After verifying the received identity if he/she is a legitimate mobile user,
the server computes H(IDU || SK) and sends it to mobile user.
3. Then mobile user computes H*
(IDU || SK) and compares it with received
H(IDU || SK). If H*
is equal by H then mobile user selects new password and
computes password verifier for it as follows: ZU
*
= PWU
*
.P. Finally only
password verifier will send to the server.
Figure 2. Password change request
38. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 36
2.4 User eviction phase
In the proposed protocol server can evict malicious users. In order to evict
malicious users, the server should remove related tuples from users table. If
an evicted user tries to login to the system, he/she will fail because in the
second phase of the mutual authentication and session key agreement
identity management will be conducted. Thus the server will know this
identity does not exist in the users table. As a result evicted users cannot
login to the system and use cloud resources.
3. SECURITY ANALYSIS
In this section security features of our proposed protocol is presented and
we demonstrate proposed protocol can withstand against related security
attacks.
3.1 Stolen verifier attack resistance
Our proposed protocol is robust against stolen verifier attack because server
does not keep any secret table or any pre-shared secret key. Hence adversary
cannot gain any valuable information from this attack.
3.2 Server spoofing attack resistance
Our proposed protocol provides mutual authentication for both participants.
Mobile user authenticates the server and also server can authenticate the
mobile user. Hence sever spoofing attack is ineffective.
3.3 Modification attack resistance
In order to avoid modification attack we used a collision free one way hash
function. If an adversary sends a modified message, soon mobile user will
know that the received message is not valid because two hash results are not
equal.
3.4 Replay attack resistance
Proposed scheme uses random numbers to avoid replay attack. It is hard for
adversary to guess the random numbers, because they change in each
session and every time of authentication. Thus this attack is not applicable
to our scheme.
3.5 Insider attack resistance
A client CL may register with some servers S1, S2 and so on using a
common password pw and the identity id for his convenience, and if the
privileged-insider U1 of S1 has the knowledge of CL’s pw and id, then U1
may try to access other servers S2, S3, and so on by using the same pw and
id. In our proposed protocol the server only stores password verifier and
39. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 37
extraction of password from it is very hard due to hardness of elliptic curve
discrete logarithm problem (ECDLP).
3.6 Many logged-in users attack resistance
Consider the password PWA and the login-id IDA of a client A, are leaked to
many adversaries. In the proposed protocol only one adversary can login the
server at the same time out of all who know the valid password PWA and
login-id IDA. When an adversary logged-in by using the valid password
PWA and login-id IDA, then the server sets the status bit to one and
meanwhile if other adversaries try to login the server at the same time with
same password PWA and login-id IDA, the server denies all the received
requests because the status bit mechanism indicates still someone is logged
in.
3.7 User anonymity
User anonymity means protecting real identity of user against public, no
server [15]. Our proposed scheme satisfies user anonymity, because in the
registration and password change phases that real identity transmits, the
channel is secure and in the mutual authentication and session key
agreement phase that channel is not secure instead of real identity, dynamic
identity transmits.
3.8 No clock synchronization problem
Many proposed authentication protocols use timestamps to avoid replay
attacks but timestamp mechanism is difficult and expensive in wireless
mobile communications [16] and distributed networks [17,18,19]. Our
proposed protocol is nonce-based and does not have clock synchronization
problem.
3.9 Session key agreement
In our proposed protocol a session key is generated which uses random
numbers like r1 and r2. This session key provides secure communications
over open channel by encrypting the exchanged messages.
3.10 Password change phase
Our proposed protocol supports Password change phase, hence our protocol
is more secure than other authentication protocols. In addition mobile user
can change his/her password without any intervention from server. This
property brings high security and user friendly for our proposed scheme.
4. PERFORMANCE ANALYSIS
In this section we evaluate the performance of our proposed protocol. Note
that a good authentication scheme for mobile cloud computing must have
low computation cost. We compared our proposed protocol with a new
proposed scheme in terms of computation cost. Table 3 shows that our
proposed protocol is more efficient, especially in the mobile user side. This
improvement makes less power consumption in the mobile devices which
are faced with battery lifetime limitation.
40. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 38
Hafizful & Biswas [20] Proposed Protocol
Client: 7EM + 2EA + 1sym
Server: 3EM + 2EA + 1sym
Client: 5EM + 1EA + 1sym
Server: 3EM + 1EA + 1sym
5. CONCLUSIONS
In this paper we proposed a lightweight authentication protocol for mobile
cloud computing. In the proposed protocol we used elliptic curve
cryptosystem which has many advantages includes smaller key size, strict
security and high efficiency. Also our proposed protocol satisfies user
anonymity, mutual authentication, session key agreement and so on. In
terms of resistance against related attacks, our proposed protocol is robust
against replay attack, stolen verifier attack, modification attack, server
spoofing attack and so on. It is important to note that proposed protocol is
according to real communication scenarios.
REFERENCES
[1]. Momeni, M. R., 2015. A Survey of Mobile Cloud Computing: Advantages,
Challenges and Approaches. International Journal of Computer Science and Business
Informatics, special issue: Vol. 15, No. 4, pp. 14-28.
[2]. L. Lamport, Password authentication with insecure communication,
Communications of the ACM 24 (11) (1981) 770–772.
[3]. M. Peyravian, N. Zunic, Methods for protecting password transmission, Computers
and Security 19 (5) (2000) 466–469.
[4]. C.C. Lee, L.H. Li, M.S. Hwang, A remote user authentication scheme using hash
functions, ACM Operating Systems Review 36 (4) (2002) 23–29.
[5]. W.C. Ku, C.M. Chen, H.L. Lee, Weaknesses of Lee–Li–Hwang’s Hash-based
password authentication scheme, ACM Operating Systems Review 37 (4) (2003) 19–25.
[6]. E.J. Yoon, E.K. Ruy, K.Y. Roo, A secure user authentication scheme using hash
functions, ACM Operating Systems Review 38 (2) (2004) 62–68.
[7]. W.C. Ku, M.H. Chaing, S.T. Chang, Weaknesses of Yoon–Ryu–Yoo’s hash-based
password authentication scheme, ACM Operating Systems Review 39 (1) (2005) 85–89.
[8]. J.J. Hwang, T.C. Yeh, Improvement on Peyravian–Zunic’s password authentication
schemes, IEICE Transactions on Communications E85-B (4) (2002) 823–825.
41. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 4. JULY 2015 39
[9]. W.C. Ku, C.M. Chen, L. Hui, Cryptanalysis of a variant of Peyravian–Zunic’s
password authentication scheme, IEICE Transactions on Communications E86-B (5)
(2002) 1682–1684.
[10]. C.L. Lin, T. Hwang, A password authentication scheme with secure password
updating, Computers and Security 22 (1) (2003) 68–72.
[11]. M. Peyravian, C. Jeffries, Secure remote user access over insecure networks,
Computer Communications 29 (5) (2006) 660–667.
[12]. K.A. Shim, Security flaws of remote user access over insecure networks, Computer
communications 30 (1) (2006) 117–121.
[13]. L. Zhu, S. Yu, X. Zhang, Improvement upon mutual password authentication
scheme, International seminar on business and information management, 2008, pp. 400–
403.
[14]. Momeni, M. R., 2014. A Lightweight Authentication Scheme for Mobile Cloud
Computing. International Journal of Computer Science and Business Informatics,
Vol. 14, No. 2, pp. 153-160.
[15]. D. Wanga, Chun-guang, Cryptanalysis of a remote user authentication scheme for
mobile client–server environment based on ECC, Information Fusion 14 (2013) 498–
503.
[16]. Giridhar, P. Kumar, Distributed clock synchronization over wireless networks:
algorithms and analysis, in: Proceedings of the 45th IEEE Conference on Decision and
Control, IEEE, 2006, pp. 4915–4920.
[17]. D. Mills, Internet time synchronization: the network time protocol, IEEE
Transactions on Communications 39 (10) (1991) 1393–1482.
[18]. J. Han, D. Jeong, A practical implementation of IEEE 1588–2008 transparent clock
for distributed measurement and control systems, IEEE Transactions on Instrumentation
and Measurement 59 (2) (2010) 433–439.
[19]. R. Baldoni, A. Corsaro, L. Querzoni, S. Scipioni, S. Piergiovanni, Coupling-based
internal clock synchronization for large-scale dynamic distributed systems, IEEE
Transactions on Parallel and Distributed Systems 21 (5) (2010) 607–619.
[20]. SK Hafizul Islam, G.P. Biswas, Design of improved password authentication and
update scheme based on elliptic curve cryptography, Mathematical and Computer
Modelling 57 (2013) 2703–2717.
This paper may be cited as:
Momeni, M. R., 2015. An Efficient Authentication Protocol for Mobile
Cloud Environments using ECC. International Journal of Computer Science
and Business Informatics, Special Issue: Vol. 15, No. 4, pp. 29-39.