https://cirworld.com/index.php/ijct/issue/feed INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2018-01-22T10:18:17+00:00 Chief Editor ijct@cirworld.com Open Journal Systems IJCT is scientific, open access, scholarly, peer-reviewed, fully referred international journal with DOI, ISSN, ICV and IF. https://cirworld.com/index.php/ijct/article/view/6750 Impact of Ransomware on Cybersecurity 2018-01-17T10:17:32+00:00 YAYA ITAI yaya591@yahoo.com Emmanuel Onwubiko emmadesaint@yahoo.co.uk <p>This paper attempts to discover ransomware exposing the lack of cyber-security. It intends to elicit attention with regards to ransomware, a newly emerged cyber threat and to help organizations; IT practitioners understand the need for cyber security knowledge and awareness plus types of tools used. The paper also discusses methodologies trends and research recommendation on cyber-security threats and provides probative strategic strategy.</p> 2018-01-16T15:59:22+00:00 ##submission.copyrightStatement## https://cirworld.com/index.php/ijct/article/view/6930 DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT 2018-01-17T17:21:41+00:00 Jaspreet Kaur jaspreetcse.dtc@gmail.com Navdeep Kaler navdeep.kaler@gmail.com <p>Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using AES encrypted OTP and enhanced the security of data using Cloud Broker and AES. When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.</p> 2018-01-12T00:00:00+00:00 ##submission.copyrightStatement## https://cirworld.com/index.php/ijct/article/view/6832 The Analysis on the Key Factors of Fire Rescue Course Content Design – A Case Study of Miaoli County 2018-01-18T10:17:41+00:00 Hung-Teng Chang cht@ydu.edu.tw Chih-Yao Lo cylo@mail.fgu.edu.tw Wen-Chia kevin Tu kevin10309@yahoo.com.tw <p>This study discussed the factors affecting the design of the fire rescue and training courses for firefighters in Miaoli County. A questionnaire survey was conducted on firefighters. The content of the fire rescue courses held by Miaoli County Fire Bureau was discussed. Based on literature review and expert opinions upon Delphi method, this study analyzed the indicators of influencing factors. A hierarchical architecture was established. The weights affecting the design factor indicators affecting the fire rescue courses were obtained with the survey and analytic hierarchy process, and then were summarized and analyzed to establish a weight system.</p> 2018-01-18T08:32:51+00:00 ##submission.copyrightStatement## https://cirworld.com/index.php/ijct/article/view/7004 A NOVEL APPROACH OF JOB ALLOCATION USING MULTIPLE PARAMETERS IN IN CLOUD ENVIRONMENT 2018-01-22T10:18:17+00:00 Ashima Ashima roohashima@gmail.com Vikramjit Singh vikram_cse@northwest.ac.in <p>Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. This research deals with the balancing of work load in cloud environment. Load balancing is one of the essential factors to enhance the working performance of the cloud service provider. Grid computing utilizes the distributed heterogeneous resources in order to support complicated computing problems. Grid can be classified into two types: computing grid and data grid. We propose an improved load balancing algorithm for job scheduling in the Grid environment.&nbsp; Hence, in this research work, a multi-objective load balancing algorithm has been proposed to avoid deadlocks and to provide proper utilization of all the virtual machines (VMs) while processing the requests received from the users by VM classification. The capacity of virtual machine is computed based on multiple parameters like MIPS, RAM and bandwidth. Heterogeneous virtual machines of different MIPS and processing power in multiple data centers with different hosts have been created in cloud simulator. The VM’s are divided into 2 clusters using K-Means clustering mechanism in terms of processor MIPS, memory and bandwidth. The cloudlets are divided into two categories like High QOS and Low QOS based on the instruction size. The cloudlet whose task size is greater than the threshold value will enter into High QOS and cloudlet whose task size is lesser than the threshold value will enter into Low QOS. Submit the job of the user to the datacenter broker. The job of the user is submitted to the broker and it will first find the suitable VM according to the requirements of the cloudlet and will match VM depending upon its availability. Multiple parameters have been evaluated like waiting time, turnaround time, execution time and processing cost. This modified algorithm has an edge over the original approach in which each cloudlet build their own individual result set and it is later on built into a complete solution.</p> 2018-01-16T00:00:00+00:00 ##submission.copyrightStatement##