INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY https://cirworld.com/index.php/ijct IJCT is scientific, open access, scholarly, peer-reviewed, fully referred international journal with DOI, ISSN, ICV and IF. CIRWORLD en-US INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2277-3061 <p>Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the&nbsp;<a href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License</a>, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.</p> <p>The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations. The submitting author is responsible for securing any permissions needed for the reuse of copyrighted materials included in the manuscript.</p> <p>While the advice and information in this journal are believed to be true and accurate on the date of its going to press, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.</p> Impact of Ransomware on Cybersecurity https://cirworld.com/index.php/ijct/article/view/6750 <p>This paper attempts to discover ransomware exposing the lack of cyber-security. It intends to elicit attention with regards to ransomware, a newly emerged cyber threat and to help organizations; IT practitioners understand the need for cyber security knowledge and awareness plus types of tools used. The paper also discusses methodologies trends and research recommendation on cyber-security threats and provides probative strategic strategy.</p> YAYA ITAI Emmanuel Onwubiko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 2018-01-16 2018-01-16 17 1 7077 7080 DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT https://cirworld.com/index.php/ijct/article/view/6930 <p>Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using AES encrypted OTP and enhanced the security of data using Cloud Broker and AES. When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.</p> Jaspreet Kaur Navdeep Kaler ##submission.copyrightStatement## 2018-01-12 2018-01-12 17 1 7081 7091 The Analysis on the Key Factors of Fire Rescue Course Content Design – A Case Study of Miaoli County https://cirworld.com/index.php/ijct/article/view/6832 <p>This study discussed the factors affecting the design of the fire rescue and training courses for firefighters in Miaoli County. A questionnaire survey was conducted on firefighters. The content of the fire rescue courses held by Miaoli County Fire Bureau was discussed. Based on literature review and expert opinions upon Delphi method, this study analyzed the indicators of influencing factors. A hierarchical architecture was established. The weights affecting the design factor indicators affecting the fire rescue courses were obtained with the survey and analytic hierarchy process, and then were summarized and analyzed to establish a weight system.</p> Hung-Teng Chang Chih-Yao Lo Wen-Chia kevin Tu ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 2018-01-18 2018-01-18 17 1 7092 7102 A NOVEL APPROACH OF JOB ALLOCATION USING MULTIPLE PARAMETERS IN IN CLOUD ENVIRONMENT https://cirworld.com/index.php/ijct/article/view/7004 <p>Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. This research deals with the balancing of work load in cloud environment. Load balancing is one of the essential factors to enhance the working performance of the cloud service provider. Grid computing utilizes the distributed heterogeneous resources in order to support complicated computing problems. Grid can be classified into two types: computing grid and data grid. We propose an improved load balancing algorithm for job scheduling in the Grid environment.&nbsp; Hence, in this research work, a multi-objective load balancing algorithm has been proposed to avoid deadlocks and to provide proper utilization of all the virtual machines (VMs) while processing the requests received from the users by VM classification. The capacity of virtual machine is computed based on multiple parameters like MIPS, RAM and bandwidth. Heterogeneous virtual machines of different MIPS and processing power in multiple data centers with different hosts have been created in cloud simulator. The VM’s are divided into 2 clusters using K-Means clustering mechanism in terms of processor MIPS, memory and bandwidth. The cloudlets are divided into two categories like High QOS and Low QOS based on the instruction size. The cloudlet whose task size is greater than the threshold value will enter into High QOS and cloudlet whose task size is lesser than the threshold value will enter into Low QOS. Submit the job of the user to the datacenter broker. The job of the user is submitted to the broker and it will first find the suitable VM according to the requirements of the cloudlet and will match VM depending upon its availability. Multiple parameters have been evaluated like waiting time, turnaround time, execution time and processing cost. This modified algorithm has an edge over the original approach in which each cloudlet build their own individual result set and it is later on built into a complete solution.</p> Ashima Ashima Vikramjit Singh ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 2018-01-16 2018-01-16 17 1 7103 7110