Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Computing)
Conference Chair
Dr. Ahmed Masoud Al Kindi
Conference Co-Chair and Editor
Dr. Arockiasamy Soosaimanickam
Organized by
Department of Information Systems
College of Economics, Management and Information Systems
University of Nizwa
ii
iii
Committees
Chair:
Dr. Ahmed Masoud Al Kindi, Dean
Co-Chair: Dr. Arockiasamy Soosaimanickam, Head, Department of Information Systems
Preparatory Committee:
Dr. Ahmed Al-Kindi (Chair)
Ms. Amal Al-Ismaili (Member)
Dr. Arockiasamy Soosaimanickam (Co-Chair)
Dr. Hani Hadad (Member)
Dr. Said Younes (Member)
Mr. Mahmood Al-Rawahi (Member)
Dr. Nour Al-Deen Al-Shaiekh (Member)
Mr. Mohammed Al-Maawali (Member)
Mr. Hamed Al-Azri (Member)
Mr. Mohammed Al-Rawahi (Member)
Mr. Rashid Al-Amri (Member)
Scientific Committee:
Dr. Said Younes (Chair)
Dr. Saleh Al-Hatali (Member)
Dr. George Kastanian (Member)
Dr. Nour Al-Deen Al-Shaiekh (Member)
Plenary Sessions
Dr. Salim Sultan Al Ruzaiqi, Chief Executive Officer, ITA
As CEO of ITA, Dr. Salim is responsible for the implementation of the Digital Oman Strategy. Throughout
his 18-year career in the IT field, Dr. Salim held different technical and managerial roles in the Sultanate of
Oman. Dr. Salim joined the Ministry of Foreign Affairs in March 1987 and led the IT initiatives in the
ministry.
Dr. Salim had a diplomatic experience by joining the Sultanate's Diplomatic Corp as the First Secretary at the
Embassy of the Sultanate of Oman in Washington DC from 1998 to 2003. Dr. Salim Received Doctorate of
Science degree in Information Systems and Communications from Robert Morris University of Pittsburgh
Pennsylvania, Master of Science in Information Systems Technology from George Washington University of
Washington DC and Bachelor of Science in Computer Science and Mathematics from Lindenwood
University of St.Charles Missouri.
Sheikh Abdulla bin Issa Salim Al Rawahy, Chief Officer Alliances and Partnership, Ooredoo
Sheikh Abdulla bin Issa Al Rawahy was appointed as Corporate Advisor in March 2014, having been Chief
Strategy Officer of Ooredoo since 2008 and Chief Technical Adviser from 2004. With over 30 years of
experience in the telecommunications sector, Sheikh Abdulla has held several leading roles in network
planning, projects, strategy and corporate business development for both fixed and mobile
telecommunications. In his current role as Chief Strategy Officer, Sheikh Abdulla is responsible for the long
term strategy of Ooredoo, which has focused on the transformation of Ooredoo from a mobile operator to a
full service operator, able to serve customers (consumers as well as enterprises) with all their communication
needs as well as Business Development and the International Wholesale business.
Prior to joining Ooredoo, Sheikh Abdulla served as Technical Advisor to the Minister of Transport and
Communications, President of OmanTel and Chairman and founding Member of the Oman Fibre Optic
Company. He holds a Bachelor in Engineering Technology and Masters of Science in Electrical Engineering
from the University of Central Florida (USA).
Dr. Bader Al-Manthari, Director General of the Information Security Division, ITA
Dr. Bader holds a PhD in Computer Science from Queens University (Canada). He joined the Information
Technology Authority (ITA) beginning of 2010 and since then he has worked on many national projects in
Information Security. Dr. Bader is also a member of the Program Committee of the Intelligent Cloud
Computing Conference (ICC 2014) and a member of the Technical Program Committees in more than 10
highly ranked international conferences. In addition, he serves as a professional referee in more than 50
international conferences, journals and awards in the area of Information and Communication Technology
(ICT). Furthermore, Dr. Bader is certified ITIL, SABSA, and ILM Level 5 Award in Leadership and
Management.
Before joining ITA, Dr. Bader worked as a teaching assistant and a research associate at Queens University,
Canada, where he worked on various research projects particularly in enhancing the Quality of Service of
next generation communication networks. He has authored more than 20 refereed journal and conference
publications. He holds a patent in 3.5 G wireless cellular networks and WiMAX and another patent is
currently being prepared for 4G technologies.
Mr. Yahya Nasser Al-Hajri, Senior Specialist, Regulatory and Compliance Unit, TRA
Mr. Yahya is a computer engineering graduate engineer with 15 years experience in ICT sector. He works
for Telecommunications Regulatory Authority of Oman as a senior specialist in the technical standards and
numbering department of the regulatory and compliance unit. Mr. Yahya is responsible for the development
of ICT Technical Regulations & Guidelines. On international related matters, Mr. Yahya is acting also as corapporteur for Question 1 of Study Group 1 of the development bureau of the International
Telecommunication Union (ITU).
vi
Invited Researchers
vii
Table of Contents
1
Mohanaad T Shakir , Asmidar Bit Abu Bakar , Yunus Bin Yusoff, and Mustefa Talal
Sheker Al-Buraimi University College, Oman.
University Tenaga National(UNITEN), Malaysia.
12
Mohamed Yasin, Dr.P.Sujatha, Dr. A.Mohamed Abbas, and Dr. M.S.Saleem Basha
Pondicherry University, India.
Mazoon University College, Muscat, Oman.
17
25
31
Dr. S. Benson Edwin Raj, Mr. N. Senthil Kumar, and Mrs. Revathi
IT Department, Rustaq College of Applied Sciences, Sultanate of Oman
MCA Department, St. Joseph College, Trichy, India.
37
Boumedyen Shannaq
Ministry of Regional Municipalities Water Resources (MRMWR), Directorate General of
Planning and Studies ,Oman
viii
41
I. INTRODUCTION
Cloud computing is defined as a network-based
environment that provides on demand resources and services to
clients over the Internet [7]. It allows developers to write and
run applications in the cloud itself. This makes it an attractive
and smart solution to enterprises as it doesnt entail major
capital investments to suffice their needs. Moreover, they can
retrieve their data from anyplace with an internet connection
[2]. If security procedures are not offered suitably for data
operations and transmissions then there will be high data risk
[11].
2)
Platform-as-a-Service (PaaS): A computing platform
permitting the creation of online applications effortlessly
without the complication of purchasing and/or maintaining the
software or its infrastructure is termed as PaaS. It is the
distribution of an architecture or framework. PaaS is
equivalent to SaaS with the difference that, instead of the
software being provided over the web, it is the platform that
creates the software, provided over the World Wide Web [12].
Apart from offering an area to store and organise applications,
PaaS also offers an IDE that provisions a complete life cycle
for developing applications that can be presented on the
internet with ease. This provides development and delivery
tools as a service. A platform has to be established to
effectively influence the increasing number of services made
available in the cloud.
A. Types of Cloud
There are three different kinds of cloud [2]: Private Cloud: It is owned and maintained by a single
firm, making it more flexible and providing better
control.
A. Flexibility and Scalability:Cloud computing lets the users to be more flexible, i.e.,
they can access the data both in and out of the workplace with
the help of a web-enabled device. Sharing of documents and
files can be done simultaneously, facilitating collaboration. The
scalability factor enables the business to upscale or downscale
the IT supplies effortlessly upon requirement [14].
B. Scope of Network Access:Cloud computing offers the consistent procedure to access
network through various media, for example, laptops, mobile
phones, tablets, etc.
C. Location Independence:As cloud computing offers virtualized resources that can be
accessed from anywhere, at any time, it creates a perception of
location independence. This adds up to the reasons why
companies opt for cloud computing.
B. Data Breaches:A virtual machine could use side channel timing information
to extract private cryptographic keys being used in other
virtual machines on the same physical server. However, in
many cases an attacker wouldnt even need to go to such
lengths. If a multitenant cloud service database is not properly
designed, a flaw in one clients application could allow an
attacker access not only to that clients data, but every other
clients data as well. Unfortunately, the steps taken to alleviate
one of the serious threats, data leakage and data loss, can
worsen the other. In order to reduce the impact of a data
breach the data can encrypted. However, if the encryption key
is lost, so will be the data. On the contrary, there can be offline
backups of the data which will reduce the impact of data loss,
but exposes it to breaching.
CONCLUSION
Cloud computing is recognized as an advanced technology
which drastically transforms the manner in which the Internet
is put to use, granting considerable advantages to those who
utilize it. Nevertheless, the limitations and insecurities while
making use of this technology must be thoroughly analyzed.
Apprehending what vulnerabilities occur in Cloud Computing
will help organizations to make the move towards this
technology. Several techniques are applied in Cloud computing
to improve application performance in a way that is reliable
and cost effective. The basis of cloud applications are network
appliance software whose operating systems run in a virtual
machine in a virtualized environment. Virtualization lets
multiple users to share a physical server and is one of the major
concerns for cloud users. The various types of virtualization
technologies may undertake security procedures in different
ways. Critical differences between cloud security and virtual
machine security that are left out in presumptions formulated in
cloud-security research, lead to major disparity between cloud
security practice and cloud security research. An equilibrium
between business profits and covert probable threats that may
affect success must be reached for productive cloud computing.
Analogous to other Internet-based technology, cloud, too, is
at a prominent risk despite the cloud suppliers being in
possession of effective servers and capital in order to present
proper services for their users. If the virtual environment is not
secure, a reliable cloud is unfeasible. A process which informs
whether the virtual machines in the cloud are patched properly
would be a functional part of the framework such as in the case
where one section of the framework is developing a method to
observe the clouds management software, and another section
is developing a secluded handling for a particular clients
applications.
Users response to cloud, for instance, whether they permit
automated patching software to run, upgrade anti-virus
software, or whether they comprehend how to harden their
virtual machines in the cloud, can be followed and monitored.
Since the time companies first delivered online services for
customers and organizations, a multitude of these issues have
been dealt with. Numerous companies privacy principles, and
overall business practices have been determined by the extent
of practical knowledge and skill. Owing to the fact that cloud
computing is composite and ever-changing in nature, standard
solutions are not convenient for the cloud domain. Modern
virtualization-aware security solutions that are self-defending,
deliver real-time discovery and aversion of unknown threats
should be furnished so as to make the overall system
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Q2:
Age
20-25
25-30
30-35
35-40
40-50
Ove
r 50
2
Q3:
12
Location
14
16
10
KSA
3
Jordan
2
Iraq
USA
7
10
UAE
Canada
3
3
Oman
2
Q4:
Australia
7
Turkey
5
Malaysia
9
India
2
Germany
3
Position
3.1 PARTICIPANTS
The participants of this study were organizations that use cloud
computing. This study focused on the experts as participants
such as Professor, Lecturer, IT Professionals, and researchers
who had interests in security in cloud computing. In this study,
medium organization samples from twelve (12) countries (as
shown in Table 1) were selected to ensure a wider scope of data
collection which helped in diagnosing the problems selected.
The total of samples collected was one hundred twenty five
(125), the related samples was fifty six (56) from various
organizations. Based on the results of this survey most of the
organizations that used cloud computing suffered from security
problems.
1. DATA COLLECTION INSTRUMENT
In this section, we present the questionnaire that were
distributed and the feedback from the organizations on all
questions (via email, and, field visits) within a period of six
months. The organizations that did not use cloud computing
were not included as part of the data of this study. In addition,
this research consists of two parts, the first part is about
information and background about the samples while the second
part is about cloud computing security as shown in the questions
below:
Table 1. Questionnaire distribution
Title of qualification awarded
High
School
Associate's
degree
Bachelor's
degree
Master's
degree
Doctorate'
s degree
21
22
10
8
2
Years of experience in the aforementioned
position
0-2
2-5
5-10
35
Q6:
Work sector
19
Education
Bank
Computer/IT
27
7
Q7:
Over 10
Insurance
Government agencies
Part 1
Q1:
16
Q5:
Healthcare
6
Other
1
0 till 100
101till 299
21
Over 600
22
Part 2: Confidentiality
1:
I am concerned with the improvement features of
security in cloud computing.
Strongly Agree
2:
Disa
gree
I often face problems in the authority model of
cloud computing.
Strongly Agree
3:
Agree Neither
Disa
gree
Data differ based on the level of security in the
cloud computing.
Strongly Agree
5:
Neither
Disa
gree
I prefer the authority of cloud computing that has
Multi-level security.
Strongly Agree
4:
Agree
Agree Neither
Agree Neither
Disa
gree
Data need various sizes of key encryption
according to the level of security.
Strongly Agree
6:
Agre Neither
Disa
e
gree
Timing of encryption and decryption is vital.
Strongly Agree
7:
Agree
Neither
Disa
gree
The legality of data which upload on cloud
computing is important.
Rang
Minim
Max
um
imu
Sum
Mean
m
Statistic
Std.
Error
Strongly Agree
8:
Disa
gree
I prefer the process of recognizing and notifying
the illegal data.
Strongly Agree
Agree
Agree
Neither
Neither
Dis
agre
e
Q1
56
3.0
1.0
4.00
92.0
1.6429
.13100
Q5
56
2.0
1.0
3.00
74.0
1.3214
.07256
Q2
56
3.0
1.0
4.00
80.0
1.4286
.12183
Q3
56
2.0
1.0
3.00
72.0
1.2857
.07942
Q4
56
2.0
1.0
3.00
72.0
1.2857
.07942
Q6
56
2.0
1.0
3.00
71.0
1.2679
.07425
Q7
56
2.0
1.0
3.00
66.0
1.1786
.05759
Q8
56
2.0
1.0
3.00
66.0
1.1786
.06297
Val
56
Std. Deviation
Variance
Statistic
Statistic
Q1
.98033
.961
Q5
.54296
.295
Q2
.91168
.831
Q3
.59435
.353
Q4
.59435
.353
Q6
.55567
.309
Q7
.43095
.186
Q8
.47125
.222
Valid N
(listwise)
Df
Mean
Diffe
rence
55
Sig
.
(2tail
ed)
.00
1.643
1.3803
1.9054
N
Q1
12.54
95% Confidence
Interval of the
Difference
Lower
Upper
Q2
11.73
55
.00
1.429
1.1844
1.6727
Q3
16.19
55
.00
1.286
1.1265
1.4449
Q4
16.19
55
.00
1.286
1.1265
1.4449
Q5
18.21
55
.00
1.321
1.1760
1.4668
Q6
17.07
55
.00
1.268
1.1190
1.4167
Q7
20.47
55
.00
1.179
1.0632
1.2940
Q8
18.71
55
.00
1.179
1.0524
1.3048
[1]
[2]
[3]
[4]
[5]
[6]
[7]
10
VII. REFERENCES
M. Boroujerdi and S. Nazem, Cloud Computing: Changing
Cogitation about Computing, World Academy of Science,
Engineering and Technology, 2009.
L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner,
A Break in the Clouds: Towards a Cloud Definition, ACM
SIGCOMM Computer Communication
Review, Volume 39 Issue 1, pages 50-55, January 2009.
NIST, http://www.nist.gov/itl/cloud/index.cfm
P. Mell and T. Grance, The NIST Definition of Cloud
Computing Recommendation of NIST, Special Publication
800-145, 2011.
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145
.pdf
http://whatis.techtarget.com/defi nition/Conf
identiality-integrity-andavailability-CIA
GTSI Group, Cloud Computing Building a Framework for
Successful Transition, White Paper, GTSI Corporation, 2009.
W. Jansen and T.Grance Guidelines on Security and Privacy
in Public Cloud Computing, NIST Draft Special Publication
800-144, 2011.
http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800144_cloud-computing.pdf
[8]
[9]
[10]
[11]
[12]
[13]
[14]
'[15]
[16]
[17]
[18]
http://en.wikipedia.org/wiki/Two-factor_authentication
[19]
[20]
[21]
[22]
https://www.mathsisfun.com/definitions/range-statistics-.htm
l
Ahmed E. Youssef and Manal Alageel," A forA Framework
for SSSSeeeeccccure Cloudure Cloud Computing" IJCSI
International Journal of Computer Science Issues, Vol. 9,
Issue 4, No 3, July 2012 ISSN (Online): 1694-0814
11
I. INTRODUCTION
The networks which holds the capability to interface
with this real world which is physical in nature with the
virtual world in a vast manner and provides reasonable
uses and causes for developing application in large
number which results in Internet of Things, sixth sense
technology, habitat monitoring, sensor based agriculture,
etc,.Though it gives enormous benefits, it results in
challenge in terms of deployment. Recent advances in
communication and computing Wireless Sensor Network
gathered high range of attention in terms of research
oriented proposals. This inexpensive deployment of
sensors makes the researchers to deploy it and uses nature
as their test bed to prove the efficiency of their proposed
work. At first, this WSN has been designed and deployed
for military purposes for sensing and reporting of climate
and physical changes in their target area. Later due to its
advanced techniques, it has been deployed throughout the
country for commercial and personal purposes.
The main problem occur during the node
deployment and while the communication between nodes
12
E. Objectives
C. Disadvantages
B. Advantages
C. Disadvantages
13
C. Disadvantages
E. Objectives
D. Techniques to overcome
E. Objectives
14
A. Theme
A new routing protocol new cluster-based Route
Optimization and Load-balancing protocol
(ROL) which satisfies various QoS metrics.
An optimization tool New cluster based route
optimization which provides the QoS metrics
like, solution to prolong network life, provide
timely message delivery and improve network
robustness.
Uses a combination of routing metrics that can
be configured according to the priorities of userlevel applications to improve overall network
performance.
For Load-balancing a new network-flow-based
Distributed Clustering (NDC) is proposed.
ROL protocol provides high performance in all
aspects of QoS metrics when compared with
LEACH and Mires++.
ROL improves the robustness by providing
multiple paths to Cluster Head (CD) and by
electing CH backup node.
Metrics like Data delivery ratio, Timeliness,
Energy Efficiency are compared with LEACH
and Mires++ protocol and proves higher
performance.
1.
B. Advantages
C. Disadvantages
B. Advantages
D. Techniques to overcome
C. Disadvantages
E. Objectives
D. Techniques to overcome
15
E. Objectives
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
REFERENCES
[1]
[2]
16
ABSTRACT
Sultanate into the constantly evolving spheres for
applying knowledge.(H.M Sultan Qaboos ,2008) .
Keywords
ICT, Electronic banking, Mobile banking,
banking sector, Higher College of Technology
INTRODUCTION
In one of the speeches of his Majesty Sultan Qaboos
in ICT field he stated that: Information technology
and communications have now become the main
elements that move forward the development process
in this third millennium; therefore, we have accorded
our attention to finding a national strategy to develop
the skills and abilities of citizens in this domain with
the aim of further developing e-government services.
We are closely following the important steps that we
have made in this regard. We call upon on all
government institutions to speedily enhance their
performance, and to facilitate their services, by
applying digital technology in order to usher the
In Oman almost all the banks offer some type of Mbanking. However, a percentage of the facilitated
methodology must be embraced by the
administrations and interchanges suppliers and
budgetary organizations, with the goal that they can
execute the M- banking administrations. However,
*16J121388@stu.hct.edu.om,
**ashish.rastogi@hct.edu.om (corresponding author)
17
LITERATURE REVIEW
The study was aimed to verify factors influencing
continuance intentions of the early adopters of MBanking services. An elaborative review of existing
and available literature in this context was conducted
to narrow down the research area and to clearly
define the research objective. Majority of studies
about intention to adopt were conducted based on
research models and frameworks traditionally used
within the information system literature. Among
the different models that have been proposed, the
Technology Acceptance Model (TAM) [ 1 1 ] ,
adapted from the Theory of Reasoned Action
(TRA) [ 2] and its variations were widely used by
various scholars for explaining technology adoption
intentions [ 1 2 ] [ 2 0 ] [ 1 7 ] [13][7].
18
prevails affecting on the swift adoption of Mcommerce services offered in Oman. According to
the researchers there is a need to educate and create
more awareness among the users on the services
offered and address their concerns.
Adewoye, J. O (2013)
The mobile banking services provided by commercial
banks in Nigeria generally cover information-push
where customers can access banking information and
make transaction such as Account information,
Payments, transfers and Investments using mobile
phone as terminal. The results of his findings and the
hypotheses showed that Mobile banking improve
banks service delivery in a form of transactional
convenience, saving of time, quick transaction alert
and cost saving. Also the introduction of electronic
payment products such as M-banking, ATM, Internet,
etc. has increased the level of economic activities. it
also reveal that commercial banks in Nigeria that
have implemented mobile banking are chalking-up
some successes even with the problems that come
with it. These challenges include network problem
and Security which are major contributory factors
that hinder the effectiveness of mobile banking
service in the Nigeria banking sector. Finally their
research finding indicates that mobile banking
positively influence service delivery of commercial
banks in Nigeria.
METHODOLOGY
To meet the aim of this research paper the
questionnaires has been distributed to the various
19
Nationality
Age<30
Age(30-40)
Omani
Age>40
Non-Omani
47
%
53
%
22
%
AGE
17
%
61
%
20
GENDER
Male
Female
47
%
INTERNET
Int Yes
Int No
53
%
BANK
A
11
%
3%
86
%
Instrument Reliability
The reliability analysis is conducted in order to
check the internal validity and consistency of the
items used for each factors using SPSS as the
analysis tool. The Result of Reliability analysis are
presented in Table 1.
According to [23]
questionnaire for the various factors of Mobile
Banking Applications were judged to be well
reliable measurement instrument, with the
Cronbachs alpha scores were all above 0.8.
21
H2
H3
H4
satisfaction
in
the M-Banking
context
There
exist
significant
relation
between
Perceived ease
of use and
satisfaction in
the M-Banking
context
There
exist
significant
relation between
Perceived
Service Quality
and satisfaction
in
the
MBanking
context
There
exist
significant
relation between
Perceived
Credibility and
satisfaction
in
the M-Banking
context
Not
Supported
(=-.076,
p<.001)
Not
Supported
(=.215,
p<.001)
Supported
(=.38,
p<.001)
CONCLUSION
The objective of this study is to analyze the factors
affecting bank customers decisions to adopt Mobile
banking. This study identifies some factors that are
more influential than others in Internet banking
adoption in the Oman banking market. The empirical
results show that the PU and PC of the organization
have significant impact on user satisfaction to use MBanking. The study also shows that there is no
significant relation between PEOU and PSQ on user
satisfaction. An important finding of this study is that,
among early adopters, convenience was a more
important indicator of intentions to adopt mobile
banking. It is observed that ICT plays strong role in
banking industry.
Specification
There
exist
significant
relation between
Perceived
Usefulness and
Results
Supported
(=.911,
p<.001)
22
REFERENCES
[11] F.D. Davis, "Perceived usefulness, perceived
ease of use, and user acceptance of information
technology" MIS Quarterly, vol. 13, no.3, pp. 319340, 1989.
23
[22] S.J. Naqvi and H. Al-Shihi, Practicing MApplication Services Opportunities with special
reference to Oman Journal of Issues in Informing
Sciences
and
Information
Technology,
(IISIT),Vol(10), ISSN 1547-5840 [Published by
Informing Science Institute Press, USA]. 2013
Web Resources
[25] Riyadh, Akter and Islam, The Adoption of Ebanking in Developing Countries: A Theoretical
Model for SMEs International Review of Business
Research Papers, Vol. 5 No. 6 November 2009,
Pp.212-230, 2009.
24
AbstractThe world is experiencing a technological and social evolution as the concept of smart
cities finally makes its leap from white pages to
reality. Since, smart cities are based on technologies
like IoT (Internet of things), ubiquitous computing
and grid computing etc the system security is quite
vulnerable. In a scenario where the intelligence
of a city has been elevated to that of a smart
city, one of its important components has been
majorly neglected, that is the cyber-security system
of the city. In this highly automated and integrated
environment of a smart city where every system is
said to be intelligent and is inspired by the existing
natural processes, why should the security domain
be denied of its intelligence especially when there
exists a natural mechanism that complements its
characters perfectly, which is none other than the
mechanism of the biological immune system. In this
paper, a new computer security system model for the
smart cities is proposed based on the mechanism of
the human immune system.
KeywordsSmart City Cyber-security, Human Immune System, Computer System, IoT
I.
I NTRODUCTION
L ITERATURE S URVEY
The immune system is responsible for protecting the body against possibly harmful substances
by recognizing and responding to the antigens. The
immune response is how your body recognizes
and defends itself against bacteria, viruses, and
substances that appear foreign and harmful. There
are different types of immunity which are listed as
follows:
1)
2)
Innate Immunity
Adaptive Immunity/Acquired Immunity
a) Passive Immunity
b) Active Immunity
Innate Immunity: Innate or non-specific immunity is a defence system that exists since birth.
Main components of this defense system include
barriers which are referred to as front line in
immune response. Pattern recognition receptors
identifying microbes belonging to a broad group
and damaged, injured or stressed cells that send out
alarms,usually trigger the innate response. This is
the first level of security provided by the immune
26
Fig. 1.
HISCS Model
8)
9)
10)
2)
3)
2)
3)
4)
5)
6)
7)
C ASE S TUDY
4)
5)
6)
28
7)
29
Currently there are five major domains identified in a smart city. However, this is a generic
classification. Further research possibilities include
a detailed classification of these domains, comprehensive study of each domain, its functionalities,
issues and the immunity model adopted, developing the technologies and mechanisms used in
different types of immunity systems etc. Every city
in existence is aiming to be a smart city, hence
developing a smart security system that efficiently
protects the security and privacy of the citizens is
a necessity for any application that is designed to
cater to a smart city crowd.
R EFERENCES
[1]
[2]
[3]
C ONCLUSION
[4]
[5]
[6]
[7]
30
Mrs. Revathi
IT Department
Rustaq College of Applied Sciences
Sultanate of Oman
bensonedwin@gmail.com
IT Department
Rustaq College of Applied Sciences
Sultanate of Oman
senthilgnd@gmail.com
MCA Department
St. Joseph College
Trichy, India
aruldossrevathi@yahoo.co.in
I. INTRODUCTION
The Internet owes much of its historic success and growth
to its openness to new applications. New applications can be
designed, implemented and come into widespread use much
more quickly, if they do not need to wait for key features to be
added to the underlying network. Perversely, this has happened
as a rational response of network and system administrators
needing to cope with the consequences of the Internets
openness. The Internet architecture is vulnerable to Denial-of
Service (DoS) attacks, where any collection of hosts with
enough bandwidth can disrupt legitimate communication
31
Referral Architecture
Picture Based CAPTCHA
Application
32
33
3.
4.
5.
6.
PicCAPTCHA
Tokenc
IV. EXPERIMENTATION AND RESULT ANALYSIS
H(Tokenc) Token Digest
IPc
IPTRS
TS1, TS2
Timestamps
2.
34
V. CONCLUSION
Experimental setup
35
REFERENCES
1.
36
technology,
Distributed
I. INTRODUCTION
37
B. Platform
as
a
Service
(PaaS)
-PaaS Provides access to software platform. users can create
and publish their own applications based on this platform, they
have access to resource management of lower level (operating
system, data warehouse, etc.). Due to significant differences in
each
API
Platform-specific migration of applications from one PaaS
solutions is usually impossible. This fact has led some internet
service providers (ISPs) to reflect the development of a
universal interface of PaaS. The main effect to benefit the
customer in selecting this model is cost savings ,related to the
maintenance of physical infrastructure and hardware computer
network, as well as system and server software, such service
can be found in (Google app engine ,Azure )
Fig. 6 Virtualization
Thus, this work assume that the grid and cloud computing
complement each other. Grid Interfaces and protocols can
provide interaction between the cloud resources or cloud
platforms to provide the union. A higher level of abstraction
provided by the cloud platform, can help users in organizing
the Grid systems transparent and easy provisioning of Grid
platforms and to attract new user groups to the use of such
resources.
38
A. Research Methods
Research methods based on modern principles of parallel
and distributed processing, data transmission in computer
systems, the protection of computer systems on modern
technologies of software design on the reliability of
information systems theory.
B. Purpose of this Work
The aim of this work is to improve the efficiency of distributed
computing in the cloud system, by creating the operating
environment for the organization of secure user access and the
development of principles that support to run demanding
applications in distributed computing environment based on
cloud computing technology.
To achieve this goal, the following task have been developed .
1. A methodology for running applications in the cloud,
allowing to increase the overall performance of heterogeneous
software and hardware systems.
III. SCHEMES FOR DISTRIBUTED COMPUTING
To increased scalability and overall performance of distributed
computing environment in the cloud , a problem appears to
affect the performance ; load balancing.
Balancing can be static and dynamic, to start the task, even
during work tasks. Dynamic balancing used to redistribute the
task that already running. In this instance the migration process
can move a process from one machine to another without
having to restart the process from the beginning. In fact,
applications designed to process large amounts of data, need to
use methods of load balancing by migrating data processing.
Based on several experiments developed in the literatures [14]
that compare the execution time when multiplying matrices and
compare latency of messages. Using migration processes and
without it, the obtained results allow to compare the execution
of the actual processes for high-performance matrix
multiplication framed PVM in a heterogeneous environment,
as well as to compare the effectiveness of the interaction of
multiple processes within the MPI virtual cluster. It was shown
that the performance of various tests using PVM and MPI
without migration process was significantly lower than their
performance to the migration process. These results clearly
demonstrate the benefits of using the priority migration
process.
39
[2]
[3]
[4]
[5]
[6]
[7]
[8] www.cloudreviews.com
[9] ref: www.mbuguanjihia.com
[10] www. dzone.com
[11] S. Hashemi, A.Bardsir, Cloud Computing Vs. Grid Computing ,ARPN
Journal of Systems and Software,2012.
[12] How Grid Computing Works - computer.howstuffworks.com
[13] Virtualization - I. T. Works -www.itworksite.com
IV. CONCLUSION
The main directions of improvement of computer systems is
to improve their performance, increase reliability and decrease
price / performance. A new approach designed to create the
operating environment of cloud computing ,will improve
overall performance of heterogeneous software and hardware
systems in the average order by adapting the architecture of
each individual virtual machine for a specific user application.
40
Meaning is explicit.
Meaning is human and computer readable.
Ease of updating, no need to find terms in free text and
change them.
Data transfer possible without loss of meaning.
41
used, users are still often faced with the daunting task of
sifting through multiple pages of results, many of which are
irrelevant. Surveys indicate that almost 25% of Web
searchers are unable to find useful results in the first set of
URLs that are returned.
A. AIRS: Ontology Design of IBRI-CASEng
Design is considered as a significant phase for developing
any system. Our IBRI-CASEng is designed based on
different phases as it is illustrated in Figure 1. In the
following, we describe how each phase or step is
implemented to generate our efficient and scalable
ontological graph.
First step, we determine the domain and scope of our
ontology. We suggest the Ibri CAS (College of Applied
Science) to be our domain of interest and highlight the
academic department to serve our ontology specifically as a
prototype of the system.
Second step, determine the ontology representation
language and the editor. We use the OWL to develop our
ontology that is more compatible with the World Wide Web.
In addition, OWL is based on the main elements of RDF in
order to add more vocabularies to describe classes and
properties.
The OWL can define some relationship between classes such
as:
V. PERFORMANCE ANALYSIS
The Semantic Web is the representation of data on the
World Wide Web. It is a collaborative effort led by W3C
with participation from a large number of researchers and
industrial partners.
TABLE I
Kngine
WolframAlpha
Retrieved
Relevant
12
Retrieved
IrRelevant
Total
Retrieved
12
15
15
Not
Retrieved
Relevant
Not
Retrieved
IrRelevant
%
Precision
100
55.56
46.47
53.3
% Recall
100
45.45
100
100
%
Accuracy
100
33.3
46.47
53.3
3. Cities in Oman
4. Cities in Sultanate of Oman
5. Regions in Sultanate of Oman
6. Governorates in Sultanate of Oman
7. Number of Regions in Oman
8. Number of Governorates in Oman
9. Number of Regions in Sultanate of Oman
10. Number of Governorates in Sultanate of Oman
11. Cities in Muscat
12. Number of Cities in Al Dakhiliya
13. Oman President
14. Oman Colleges
15. Squ dean
REFERENCES
[1] David Beckett, The design and implementation of the redland RDF
application framework, WWW 01: Proceedings of the 10th international
conference on World Wide Web,New York, NY, USA,2001.
[2] Alberto Reggiori, Rdfstore Perl API for RDF Storage , 2002.
[3] R.
V. Guha , , rdfDB
http://www.guha.com/rdfdb/,2000.
An
RDF
Database
Column-store support for RDF Data Management: not all swans are
white, In Proc. VLDB, pp. 15531563, 2008.
[12] Andreas Harth , Stefan Decker, Optimized Index Structures for Querying
RDF from the Web, LA-WEB 05: Proceedings of the Third Latin
American Web Congress, Washington, DC, USA, 2005.
[14] Ontogenesis. (2010, January 22). Retrieved 3 19, 2015, from Referance and
application ontologies: http://ontogenesis.knowledgblog.org/295
[17] Open semantic framework. (2014, November 18). Retrieved 4 16, 2015,
from
Ontology
Tools:
http://wiki.opensemanticframework.org/index.php/Ontology_Tools
45
Appendix
Invited Speakers:
Dr. Salim Sultan Al Ruzaiqi
Chief Executive Officer, ITA
As CEO of ITA, Dr. Salim is responsible for the implementation of the Digital Oman Strategy. Throughout his 18-year career
in the IT field, Dr. Salim held different technical and managerial roles in the Sultanate of Oman. Dr. Salim joined the Ministry of
Foreign Affairs in March 1987 and led the IT initiatives in the ministry.
Dr. Salim had a diplomatic experience by joining the Sultanate's Diplomatic Corp as the First Secretary at the Embassy of the
Sultanate of Oman in Washington DC from 1998 to 2003. Dr. Salim Received Doctorate of Science degree in Information
Systems and Communications from Robert Morris University of Pittsburgh Pennsylvania, Master of Science in Information
Systems Technology from George Washington University of Washington DC and Bachelor of Science in Computer Science and
Mathematics from Lindenwood University of St.Charles Missouri.
Sheikh Abdulla bin Issa Al Rawahy was appointed as Corporate Advisor in March 2014, having been Chief Strategy Officer of
Ooredoo since 2008 and Chief Technical Adviser from 2004. With over 30 years of experience in the telecommunications
sector, Sheikh Abdulla has held several leading roles in network planning, projects, strategy and corporate business development
for both fixed and mobile telecommunications. In his current role as Chief Strategy Officer, Sheikh Abdulla is responsible for
the long term strategy of Ooredoo, which has focused on the transformation of Ooredoo from a mobile operator to a full
service operator, able to serve customers (consumers as well as enterprises) with all their communication needs as well as
Business Development and the International Wholesale business.
Prior to joining Ooredoo, Sheikh Abdulla served as Technical Advisor to the Minister of Transport and Communications,
President of OmanTel and Chairman and founding Member of the Oman Fibre Optic Company. He holds a Bachelor in
Engineering Technology and Masters of Science in Electrical Engineering from the University of Central Florida (USA).
Prof. Youcef Baghdadi received his HDR in Computer Science from University Paris 1 Pantheon-Sorbonne and his PhD from
University of Toulouse 1, France. His is currently an Full Professor with the Department of Computer Science at Sultan Qaboos
University in Oman. His research aims at bridging the gap between business and information technology (IT), namely in the
areas of cooperative information systems (IS), web technologies, e-business, service-oriented computing, and methods for
service-oriented software engineering. He is an expert in Service-Oriented Architecture (SOA). He has published many papers in
journals such as the Information Systems Frontiers, Information Systems and E-Business, Service-Oriented Computing and
Applications, Business Information Systems, Electronic Research and Applications, Web Grids and Services, and others.
Dr. Bader holds a PhD in Computer Science from Queens University (Canada). He joined the Information Technology
Authority (ITA) beginning of 2010 and since then he has worked on many national projects in Information Security. Dr. Bader
is also a member of the Program Committee of the Intelligent Cloud Computing Conference (ICC 2014) and a member of the
Technical Program Committees in more than 10 highly ranked international conferences. In addition, he serves as a professional
referee in more than 50 international conferences, journals and awards in the area of Information and Communication
Technology (ICT). Furthermore, Dr. Bader is certified ITIL, SABSA, and ILM Level 5 Award in Leadership and Management.
Before joining ITA, Dr. Bader worked as a teaching assistant and a research associate at Queens University, Canada, where he
worked on various research projects particularly in enhancing the Quality of Service of next generation communication
networks. He has authored more than 20 refereed journal and conference publications. He holds a patent in 3.5 G wireless
cellular networks and WiMAX and another patent is currently being prepared for 4G technologies.
Mr. Yahya is a computer engineering graduate engineer with 15 years experience in ICT sector. He works for
Telecommunications Regulatory Authority of Oman as a senior specialist in the technical standards and numbering department
of the regulatory and compliance unit. Mr. Yahya is responsible for the development of ICT Technical Regulations &
Guidelines. On international related matters, Mr. Yahya is acting also as co-rapporteur for Question 1 of Study Group 1 of the
development bureau of the International Telecommunication Union (ITU).
Abderezak Touzene received the BS degree in Computer Science from University of Algiers in 1987, M.Sc. degree in Computer
Science from Paris-Sud University in 1988 and Ph.D. degree in Computer Science from Institut polytechnique de Grenobe
(France) in 1992. He is an Associate Professor in the Department of Computer Science at Sultan Qaboos University in Oman.
His research interests include Cloud Computing, Parallel and Distributed Computing, Wireless and Mobile Networks, Network
On Ship (NoC), Cryptography and Network Security, Interconnection Networks, Performance Evaluation, Numerical Methods.
Dr. Touzene is a member of the IEEE, and the IEEE Computer Society.
08:30 - 09:00 AM
Registration
09:00 - 09:20 AM
Inauguration
09:20 - 10:15 AM
10:15 - 10:45 AM
10:45 11:05 AM
11:05 12:35 PM
Paper
Code
Author(s)
Affiliation
Invited
Researcher
Relationship
of Cloud
Computing to SOA
Department of Computer
Science, College of Science,
Sultan Qaboos University.
Paper 110
Cloud
Department of Computer
Science, Waljat College of
Applied Sciences, Oman.
Paper 111
Mohanaad T Shakir,
Asmidar Bit Abu Bakar,
Yunus Bin Yusoff, and
Mustefa Talal Sheker
Diagnosis
Information Technology
Department, Al-Buraimi
University College, Oman.
College of Information
Technology, University
Tenaga National, Malaysia.
Paper 109
Paper 115
12:35 01:45 PM
Mohamed Yasin,
Dr. P. Sujatha,
Dr. A. Mohammed Abbas,
Dr. M.S. Saleem Basha
Lunch Break
An
IT Department, Higher
College of Technology, Oman.
Analysis of User
Satisfaction of Mobile Banking
Application in Oman
01:45 - 02:30 PM
02:30 - 03:00 PM
Paper
Code
Author(s)
Affiliation
Invited
Researcher
Mobile
Paper 101
Ansu George,
Mahata Sudeshna,
Sonia Soans, and
K Chandrasekaran
Human
Department of Computer
Science and Engineering,
National Institute of
Technology, Surathkal,
Karnataka, India.
Paper 104
Defense-in-Depth
Architecture
for Mitigation of DDoS
Attacks on Cloud Servers
IT Department, Rustaq
College of Applied Sciences,
Oman.
Cloud An overview
Department of Computer
Science, College of Science,
Sultan Qaboos University.
Paper 105
Distributed
Computing
Environment Based on Cloud
Computing Technology for
MRMWR
Ministry of Regional
Municipalities Water
Resources (MRMWR),
Directorate General of
Planning & Studies, Oman.
Paper 113
AIRS:
04:30 05:00 PM
Valedictory Function
05:30 05:30 PM
A Search Engine
Performance Visualization with
Ontology