VISVESVARAYA TECHNOLOGICAL UNIVERSITY
BELAGAVI, KARNATAKA
A Project Report on
“DEVELOPING ERP FOR TORQUE CALIBRATION FOR FLUTECH
ENGINEERING PVT.LTD”
Submitted in the partial fulfillment for the requirements for the conferment of Degree of
BACHELOR OF ENGINEERING
in
INFORMATION SCIENCE AND ENGINEERING
By
Mr. ADITYA BHAT USN: 1BY13IS003
Mr. DHEERAJ A S USN: 1BY13IS015
Mr. MOHAMMED ZAID USN: 1BY13IS028
Under the guidance of
Mrs. Ashwini N Assistant Professor
Department of ISE, BMSIT&M.
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING
BMS INSTITUTE OF TECHNOLOGY & MANAGEMNT YELAHANKA, BENGALURU-560064
2016-2017
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
BELAGAVI, KARNATAKA
BMS INSTITUTE OF TECHNOLOGY & MANAGEMENT YELAHANKA, BENGALURU-560064
DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
This is to certify that the project work entitled “Developing ERP for Torque calibration for
Flutech Engineering Pvt.ltd” is a bonafide work carried out by Mr.Aditya Bhat (1BY13IS003),
Mr.Dheeraj A S (1BY13IS015), Mr.Mohammed Zaid (1BY13IS028) in partial fulfillment for
the award of Bachelor of Engineering Degree in Information Science and Engineering of the
Visvesvaraya Technological University, Belagavi during the year 2016-17. It is certified that all
corrections/suggestions indicated for Internal Assessment have been incorporated in this report.
The project report has been approved as it satisfies the academic requirements in respect of project
work for the B.E degree.
__________________ _________________
Signature of the Guide Signature of the HOD Signature of the Principal
Mrs.Ashwini N Dr.Manjunath T N Dr.Mohan Babu G N
EXTERNAL EXAMINERS
Name of the Examiners Signature with Date
1.
2.
CERTIFICATE
i
ABSTRACT
This project is aimed at computerizations and increasing productivity of process and
documentation of flow of calibration instruments from receipt to delivery. The company is
mainly focused at offer wide range of services to a diverse market and industry leaders. We
are building a software that is intended to perform the calibration of a device at a single
stretch that from receiving the device from the customer with the extraction of sufficient
information from the customer, loading these information on to the database, transferring the
device to the lab, performing the necessary calculations required for the calibration process
and finally generating an invoice message and a device certificate. This has been segregated
into 5 different modules where each module performs a specific task. Each module is been
validated and is assured of not taking invalid inputs. The company along calibration is
working as distributors for some of the products that is outsourcing for further addition of
obtaining new devices which has also been included in one of the module. We have
developed an idea for this kind of requirement and looking forward to implement it which
using the CLOUD and DATABASE facilities which will be highlighted in the project.
ii
ACKNOWLEDGEMENT
We are happy to present this project after completing it successfully. This project
would not have been possible without the guidance, assistance and suggestions of many
individuals. We would like to express our deep sense of gratitude and indebtedness to each
and every one who has helped us make this project a success.
We heartily thank our Principal, Dr.Mohan Babu G. N, BMS Institute of
Technology & Management for his constant encouragement and inspiration in taking up
this project.
We heartily thank our Head of Department Dr. Manjunath T. N, Dept. of
Information Science and Engineering, BMS Institute of Technology & Management for
his constant encouragement and inspiration in taking up this project.
We heartily thank our Project Co-ordinator Dr. Pushpa S.K, Associate Professor,
Dept. of Information Science and Engineering, BMS Institute of Technology &
Management for her constant encouragement and inspiration in taking up this project.
We gracefully thank our Project guide, Mrs. Ashwini N, Assistant Professor, Dept.
of Information Science and Engineering, BMS Institute of Technology & Management
for her encouragement and advice throughout the course of the Project work.
Special thanks to all the staff members of Information Science Department for their help and
kind co-operation.
Lastly we thank our parents and friends for their encouragement and support given to us in
order to finish this precious work.
By,
ADITYA BHAT (1BY13IS003)
DHEERAJ A S (1BY13IS015)
MOHAMMED ZAID (1BY13IS028)
iii
TABLE OF CONTENTS
Chapter Page No.
1 Introduction ……………………………………………………………..1
1.1 ERP ………………………………………………………….……....1
1.2 About the company ………………………………………………....2
1.2.1 Accreditation…………....…………………………………2
1.2.2 Industrial Tools and Measuring Instruments………………2
1.2.3 Instruments Developed By the company…………………..3
1.2.4 Calibration Laboratory in the Company…………………...3
2 Literature survey ……………………………………………………......5
2.1 Survey on Calibration Process ………………………………………5
2.2 Survey on cloud ……………………………………………………..5
2.3 Related work …………………………………………………….......7
2.3.1 Storage on cloud ……………………………………….…....8
2.3.2 Security Issues with cloud computing …………………..…..9
2.3.3 Data transfer technology by fujtitsu laboratories…………...10
2.3.4 Protocols for transferring files………………………………12
3 Software Requirement Specification…………………………………....14
3.1 Noble scope ………………………………………………………….15
4 Design………..............................................................................................21
5 Implementation………………………………………………………......24
6 Conclusion ……………………………………………………………….28
7 Future Enhancement ……………………………………………………29
8 Bibliography...............................................................................................30
9 Screenshots………………………………………………………………..31
Appendix A .................................................................................................40
iv
LIST OF FIGURES
Fig. No Figure Name Page No.
2.1 Over view of file downloads in file sharing system 11
3.1 Requirements of ERP 15
3.2 Requirements of Module-1 18
3.3 Requirements of Module-2 19
3.4 Requirements of Module-3 20
4.1 Overall process module 21
4.2 Workflow Architecture for the Torque model 22
5.1 Torque table 1 25
5.2 Torque table 2 25
5.3 Torque standard table 26
5.4 Torque correction values 26
5.5
9.1
9.2
9.3
9.4
9.5
9.6
9.7
9.8
9.9
9.10
9.11
9.12
9.13
9.14
9.15
9.16
9.17
Torque tester calculation table
Login page
Inward registry
select service
Inward 1 registry-1
Inward 1 registry-2
Retrieve stored data
Lab registry
Display
select calibration
enter details of device
Details of instruments
Calculation 1
Calculation 2
Certificate 1
Certificate 2
Uploading
Uploaded
27
31
31
32
32
33
33
34
34
35
35
36
36
37
37
38
38
39
Developing An ERP for Torque for Flutech Engineering Introduction
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 1
CHAPTER 1
INTRODUCTION
Our Project aims at computerizing the entire business process for the calibration company
Flutech Engineering Pvt. Ltd. We have developed an ERP for the company with respect
to Torque model, the entire process from obtaining the product from the customers,
inward registry, inward 1 registry, lab registry, calculations, certificate generation has
been implemented. We provide encapsulation of customer data, by separating customer
data from the device data.
The employees in the company are using legacy systems for implementing their business
process. They have book registers for maintaining the customer and instrument details.
The calibration calculations are done using excel sheets. They have a lot of formulas
which change as per the type of device. So it’s a tedious task for them to do the
calculations and handle a calibration process. By having an ERP it will remove the
unnecessary low tasks and help the employees to focus at more productive tasks.
1.1 ERP (Enterprise Resource Planning)
An ERP (Enterprise resource planning) is a process by which a company (often a
manufacturer) manages and integrates the important parts of its business. An ERP
management information system integrates areas such as planning, purchasing, inventory,
sales, marketing, finance and human resources. Think of ERP as the glue that binds the
different computer systems for a large organization. Typically, each department would
have its own system optimized for that division's particular tasks. With ERP, each
department still has its own system, but it can communicate and share information easier
with the rest of the company. The ERP software functions like some a central nervous
system for a business. It collects information about the activity and state of different
divisions of the body corporate and makes this information available to other parts where
it can be used productively. Information on the ERP is added in real time by users. Any
authorized user with a valid password and access to the network can access the system
any time. ERP resembles the human central nervous system. Its capacity transcends the
collective ability of the individual parts to form what is known as consciousness. It helps
a corporation become more self-aware by linking information about production, finance,
distribution and human resources. ERP connects different technologies used by each
Developing An ERP for Torque for Flutech Engineering Introduction
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 2
individual part of a business, eliminating duplicate and incompatible technology that is
costly to the corporation. This involves integrating accounts payable, stock-control
systems, order-monitoring systems and customer databases into one system.
1.2 About Company (Flutech Engineering Pvt. Ltd.)
Flutech Engineering Pvt. Ltd. is a leading and independent calibration services laboratory
and industrial tools and manufacturing instruments in distribution company era.
They offer wide range of services to a diverse market and industry leaders. They server
markets ranging from automobiles to aerospace, manufacturing, steel, mining, power, oil
and gas.
They are equipped to perform multi parameter , multi domain calibrations, delivering
high precision and accurate measurements, covering Torque, Pressure, Force,
Temperature, Electrical dimensions and mass.
1.2.1 Accreditation:
There laboratory is accredited in accordance to ISO/IEC 17025:2005 by the NABL
(National Accreditation Board for Testing and Calibration Laboratories), department of
science and technology, gol.
ISO 9000: checks in terms of infrastructure, component to be tested.
ISO 17025: checks more in detail of technical aspects:- like the machine used for
calibration and components used in the machine.
1.2.2 Industrial Tools and Measuring instruments:
Instruments used for measuring :( Distributors for sales and services)
Norbar, UK: - Torque tools for tightening, measurement & calibration.
Fuji, Japan:- Air tools torque and material removing.
Ness, Japan:- Pressure and temperature gauges.
Fluke, USA:- Test tools for Electrical and industrial solutions.
Testo, AG: Portable Test and Measuring Instruments.
Developing An ERP for Torque for Flutech Engineering Introduction
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 3
1.2.3 Instruments developed by the company
Following are few instruments developed by company and their specification is
also discussed.
Hydraulic torque wrench:
Static transducers (10000Nm), In south India this is the only place where they
can calibrated 10000Nm (9500Nm). In sushma industry, they use crude method to
calibrate 1500-1600Nm. If imported this instrument it will cost 12L but they have
designed by 2.5L.
Pressure Gauge Calibrator (Push and Pull gauge):
This is a Universal testing machine, usually the calibrator will be till 300
bars but the one that they develop will go till 700 bars.
1.2.4 Calibration laboratory in the company:
Company provides different calibration at different domains as follows:
Domain :- (Calibration done)
Mechanical domain
Eletro-Technical domain
Thermal domain
Types of calibration:
Torque calibration: Hand Torque Wrench, Rotary torque, Hydraulic torque
wrench
Pressure calibration: Hydraulic, Pneumatic, Vacuum, And Differential
Dimension calibration
Electrical calibration
Temperature calibration
Testing RTD: Sensors measuring upto 6.5 digits.
That has furnace where we can test 4-5 sensors of same/different size at the same time.
Developing An ERP for Torque for Flutech Engineering Introduction
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 4
Types of products they get to calibrate:
Manual torque wrenches
Digital torque wrenches
Torque screw driver
Digital Gauge
Dead weight tester
Process calibrator
Temperature calibrator.
Multi meter
Thermos meter
Clamp meter
Pressure gauge
Temperature gauge
Gas Analyzer
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 5
CHAPTER 2
LITERATURE SURVEY
In our literature survey is broadly classified based on the calibration process in the
company and providing security to documents saved in cloud.
2.1 Survey on Calibration Process
Following describes calibration process in company.
On our visit to Flutech Engineering Pvt. Ltd. we discussed the process used
currently for calibration and the problems that they are facing. Some of them are
discussed below:
Creating the spread sheet will not be scalable for their requirement for generating
certificate, which is their main purpose. Hence the data should be maintained in a
database and completely automating their process.
CEO discussed more in detail what he exactly needs like the basic process: from
Inward to dispatch with certificate and invoice.
He also told us that they also work as dealers also means they take the request
order from the customer for products, they place a purchase order for the product,
procure and then they deliver the requested product.
Along with calibration they first check the product to be calibrated is to be
serviced/ not. If to be serviced then the parts to be replaced will again be placed a
purchase order and then the product will be serviced first and then it will be taken
for calibration. Here 2 invoice will be generated 1-calibration 2-cost of the
product with components replaced.
He also suggested his staff to show the calculation of uncertainty which is more
required for certificate generation.
2.2 Survey on Cloud Security
Following are few papers referred for providing security for the documents stored in
cloud for their client access.
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 6
Enhancement of Cloud Computing Security with Secure Data Storage using
AES
Abstract: The evolution of Cloud computing makes the major changes in
computing world as with the assistance of basic cloud computing service models
like SaaS, PaaS, and IaaS an organization achieves their business goal with
minimum effort as compared to traditional computing environment. On the other
hand security of the data in the cloud database server is the key area of concern in
the acceptance of cloud. It requires a very high degree of privacy and
authentication. To protect the data in cloud database server cryptography is one of
the important methods. Cryptography provides various symmetric and asymmetric
algorithms to secure the data. This paper presents the symmetric cryptographic
algorithm named as AES (Advanced Encryption Standard). It is based on several
substitutions, permutation and transformation.
Identity Management System to Ensure Cloud Security
Abstract: Cloud computing can provide infinite computing resources on demand
due to its high scalability in nature, which eliminates the needs for Cloud service
providers to plan far ahead on hardware provisioning. Security is the biggest
challenge to promote cloud computing currently. Trust has proved to be one of the
most important and effective alternative means to construct security in distributed
systems. Multi located data storage and services in the Cloud make privacy issues
even worse. In order to efficiently and safely construct entities trust relationship in
cloud and cross-clouds environment, identity management services are crucial in
cloud computing infrastructures to authenticate users and to support flexible access
control to services, based on user identity properties (also called attributes) and
past interaction histories . Such services should preserve the privacy of users,
while at the same time enhancing interoperability across multiple domains and
simplifying management of identity verification.
Secure Document Service for Cloud Computing
Abstract: The development of cloud computing is still in its initial stage, and the
biggest obstacle is data security. How to guarantee the privacy of user data is a
worthwhile study. This paper has proposed a secure document service mechanism
based on cloud computing. Out of consideration of security, in this mechanism, the
content and the format of documents were separated prior to handling and storing.
In addition, documents could be accessed safely within an optimized method of
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 7
authorization. This mechanism would protect documents stored in cloud
environment from leakage and provide an infrastructure for establishing reliable
cloud services.
2.3 Related Work
Cloud computing consists of hardware and software resources made available on the
Internet as managed third-party services. These services rely on advanced software
applications and high-end networks of server computers.
A cloud computing system keeps its critical data on Internet servers rather than distributing
copies of data files to individual client devices. Video-sharing cloud services like Netflix,
for example, stream data across the Internet to a player application on the viewing device
rather than sending customers DVD or Blu-ray physical discs.
Clients must be connected to the Internet in order to use cloud services. Some video games
on the Xbox Live service, for example, can only be obtained online (not on physical disc)
while some others also cannot be played without being connected. Some industry
observers expect cloud computing to keep increasing in popularity in coming years.
The Chromebook is one example of how all personal computers might evolve in the future
under this trend - devices with minimal local storage space and few local applications
besides the Web browser (through which online applications and services are reached).
Service providers are responsible for installing and maintaining core technology within the
cloud. Some business customers prefer this model because it limits their own burden of
having to maintain infrastructure. Conversely, these customers give up management
control over the system, relying on the provider to deliver the needed reliability and
performance levels.
Likewise, home users become highly dependent on their Internet provider in the cloud
computing model: Temporary outages and slower-speed broadband that are a minor
nuisance today can become a critical issue in a fully cloud-based world. On the other hand
- proponents of cloud technology argue - such an evolution would likely drive Internet
providers to keep improving the quality of their service to stay competitive. Cloud
computing systems are normally designed to closely track all system resources. This, in
turn, enables providers to charge customers fees proportional to their network, storage, and
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 8
processing utilization.
Some customers prefer this metered billing approach to saving money, while others will
prefer a flat-rate subscription to ensure predictable monthly or yearly costs.Using a cloud
computing environment generally, requires you to send data over the Internet and store it
on a third-party system. The privacy and security risks associated with this model must be
weighed against the benefits versus alternatives.
2.3.1 Storage on Cloud
Cloud storage is a model of data storage in which the digital data is stored in logical pools,
the physical storage spans multiple servers (and often locations), and the physical
environment is typically owned and managed by a hosting company. These cloud storage
providers are responsible for keeping the data available and accessible, and the physical
environment protected and running. People and organizations buy or lease storage capacity
from the providers to store user, organization, or application data.
Cloud storage services may be accessed through a co-located cloud computer service,
a web service application programming interface (API) or by applications that utilize the
API, such as cloud desktop storage, a cloud storage gateway or Web-based content
management systems.
Cloud storage is based on highly virtualized infrastructure and is like broader cloud
computing in terms of accessible interfaces, near-instant elasticity and scalability, multi-
tenancy, and metered resources. Cloud storage services can be utilized from an off-
premises service (Amazon S3) or deployed on-premises (ViON Capacity Services).
Cloud storage typically refers to a hosted object storage service, but the term has
broadened to include other types of data storage that are now available as a service, like
block storage.
Object storage services like Amazon S3 and Microsoft Azure Storage, object storage
software like Openstack Swift, object storage systems like EMC Atmos, EMC ECS and
Hitachi Content Platform, and distributed storage research projects like OceanStore and
VISION Cloud are all examples of storage that can be hosted and deployed with cloud
storage characteristics.
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 9
Cloud storage is:
Made up of many distributed resources, but still acts as one, either in a federated or
a cooperative storage cloud architecture
Highly fault tolerant through redundancy and distribution of data
Highly durable through the creation of versioned copies
Typically eventually consistent with regard to data replicas
2.3.2 Security Issues with Cloud computing
The importance of Cloud Computing is increasing and it is receiving a growing attention in
the scientific and industrial communities. A study by Gartner considered Cloud Computing
as the first among the top 10 most important technologies and with a better prospect in
successive years by companies and organizations.
Cloud Computing enables ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and released with minimal management effort
or service provider interaction.
Cloud Computing appears as a computational paradigm as well as a distribution
architecture and its main objective is to provide secure, quick, convenient data storage and
net computing service, with all computing resources visualized as services and delivered
over the Internet. The cloud enhances collaboration, agility, scalability, availability, ability
to adapt to fluctuations according to demand, accelerate development work, and provides
potential for cost reduction through optimized and efficient computing.
Cloud Computing combines a number of computing concepts and technologies such as
Service Oriented Architecture (SOA), Web 2.0, virtualization and other technologies with
reliance on the Internet, providing common business applications online through web
browsers to satisfy the computing needs of users, while their software and data are stored
on the servers. In some respects, Cloud Computing represents the maturing of these
technologies and is a marketing term to represent that maturity and the services they
provide.
Although there are many benefits to adopting Cloud Computing, there are also some
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 10
significant barriers to adoption. One of the most significant barriers to adoption is security,
followed by issues regarding compliance, privacy and legal matters. Because Cloud
Computing represents a relatively new computing model, there is a great deal of
uncertainty about how security at all levels (e.g., network, host, application, and data
levels) can be achieved and how applications security is moved to Cloud Computing. That
uncertainty has consistently led information executives to state that security is their
number one concern with Cloud Computing.
Security concerns relate to risk areas such as external data storage, dependency on the
“public” internet, lack of control, multi-tenancy and integration with internal security.
Compared to traditional technologies, the cloud has many specific features, such as its
large scale and the fact that resources belonging to cloud providers are completely
distributed, heterogeneous and totally virtualized. Traditional security mechanisms such as
identity, authentication, and authorization are no longer enough for clouds in their current
form. Security controls in Cloud Computing are, for the most part, no different than
security controls in any IT environment. However, because of the cloud service models
employed, the operational models, and the technologies used to enable cloud services,
Cloud Computing may present different risks to an organization than traditional IT
solutions. Unfortunately, integrating security into these solutions is often perceived as
making them more rigid.
Moving critical applications and sensitive data to public cloud environments is of great
concern for those corporations that are moving beyond their data center’s network under
their control. To alleviate these concerns, a cloud solution provider must ensure that
customers will continue to have the same security and privacy controls over their
applications and services, provide evidence to customers that their organization are secure
and they can meet their service-level agreements, and that they can prove compliance to
auditors.
2.3.3 Data Transfer Technology By Fujitsu Laboratories
Fujitsu Laboratories has developed a software-based technology to increase data-transfer
speeds for accessing files on remote enterprise file-sharing servers. When accessing remote
file-sharing servers in the cloud, slow upload and download speeds for typical file-sharing
systems due to network latency has been an issue. By using a newly developed software
that relays communications between the client and server, the number of communications
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 11
made has been significantly reduced, lowering the effects of network latency. This
communication frequency occurs when obtaining information on multiple file names and
file sizes on a remote network. In an internal experiment, file transfers were confirmed to
be up to ten times faster when dealing with multiple small files. Transfers of large files can
be up to twenty times faster when combined with the deduplication technology Fujitsu
Laboratories announced last year.
By simply installing this software on a client and server, increased speeds for file access
for existing systems.
In file sharing, files are stored on server connected to a network and multiple clients can
share the same files. This is used by enterprises to share information and manage
documents. Previously, Individual locations have maintained their own file-sharing servers
on-site, but in order to improve security and reduce operating costs through combined
management, server consolidation has become more common as have opportunities to
remotely access file-sharing servers. With two network file-sharing protocols that are
widely used in file-sharing systems, CIFS and SMB, the effects of network latency can
impose significant wait times for accessing files, creating a demand for improving speed.
Fig 2.1 Over view of file downloads in file sharing systems
Fujitsu Laboratories has developed a technology that accelerates data transfers for file-
sharing servers using only software. Key features of the technology are as follows.
Collectively proxy read-ahead for multiple files and proxy response
With this technology, a module is installed on both the client and server that
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 12
accelerates data transfers (Figure 2). The server-side module: 1) identifies when a
folder containing multiple files starts to download; 2) read-ahead on the client
proxy the batch of all the files downloaded; 3) these read-ahead files are bundled
together and transmitted to the client-side module; and 4) the client-side module
then replies to a request to get data with its server proxy. In this way, the amount of
communications generated by obtaining file attributes, such as multiple file names
and file sizes, is greatly reduced, as are the delays influenced by network latency.
Effective deduplication due to header separation
Fujitsu Laboratories developed a technology that works on the server-side module
to separate the transmitted data into the headers and the contents of file. This makes
deduplication of retransmitted data more precise, leading to more effective network
traffic reduction.
In Fujitsu Laboratories' internal experiment, software that implements this
technology was found to have the following effects.
Increase in speed of multiple small file transfers: In a test environment that
simulated the network latency for accessing a file-sharing server in Kawasaki from
a location in Kyushu, batch downloads of folders containing one hundred 1-
KB files was found to be ten times faster.
Increase in speed of large file transfers: In the same test environment, a download
of a single 10 MB file was found to be as much as twenty times faster (compared
with having no acceleration technologies such as deduplication).
This technology is implemented as software and can be installed on existing file-
sharing systems. It can also be applied to cloud and server-virtualization
environments, mobile devices, etc., and can be extended to a variety of network
services. This technology enables more efficient file sharing and joint development
between remote locations.
2.3.4 Protocols for transferring Files
SSH2 File Transfer Protocol (SFTP)
Despite the name, SFTP is a completely different protocol from traditional FTP. SFTP is
definitely the favorite these days because of its robust security model and easier setup than
FTP and FTPS. Unlike traditional FTP, SFTP runs over an SSH channel and provides
security and integrity by default. SFTP is also considerably more firewall friendly than
Developing An ERP for Torque for Flutech Engineering Literature Survey
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 13
FTP because it only requires one port to establish a connection and carry out file
operations.
File Transfer Protocol (FTP and FTPS)
FTP is the original File Transfer Protocol and enjoys wide support from a variety of clients
and devices. Unfortunately, FTP is by default an insecure protocol, transferring commands
and data over an unencrypted connection. This can allow eavesdropping of passwords and
data. FTPS was introduces to solve the problem of unencrypted data being transferred and
adds SSL or TLS encryption to the FTP protocol.
FTP and FTPS require multiple ports (one port to issue commands and a separate port for
each and every directory listing or file transfer) to accomplish the same thing that SFTP
can do with one port. The requirement to setup forwarding for large numbers of ports can
be a problem in many environments and can make troubleshooting problems difficult.
However, FTP and FTPS have been around a lot longer than SFTP and there are still many
devices and clients that only support FTPS.
The original FTP protocol offers no security and transmits commands and data in an open,
easily eavesdropped connection. FTP should generally be avoided in favor of FTPS and
SFTP. In terms of security, both the SFTP and FTPS protocols are considered secure. The
requirement to open up multiple ports with FTPS can be viewed as a security concern but
there is nothing inherently more secure about the SFTP protocol over the FTPS protocol.
Either is appropriate when a secure connection is required but SFTP tends to be easier to
configure and more firewall friendly.
Performance of the protocols, the only real advantage I would give FTPS over SFTP
would be performance. SFTP runs over a considerably more robust and generic protocol
than FTPS, and that robustness imparts a significant performance impact. There is a lot
more overhead involved in SFTP. The overhead in the SFTP protocol is because SFTP
runs on top of the SSH2 protocol, and because SFTP implements its own handshaking
mechanism. If you want the highest transfer speeds possible over a secure connection then
you want FTPS.
Developing An ERP for Torque for Flutech Engineering Software Requirement
Pvt. Ltd Specification
Department of ISE, BMSIT 2016-2017 Page 15
CHAPTER 3
SOFTWARE REQUIREMENT SPECIFICATION
The following are the requirements sent by the Flutech Engineering Pvt Ltd Technical
Coordinator to be implemented in the ERP, after an interaction.
Fig 3.1 Requirements of ERP
3.1 NABL SCOPE
NABL Vision
To be the world’s leading accreditation body and to enhance stakeholders’ confidence
in its services.
Developing An ERP for Torque for Flutech Engineering Software Requirement
Pvt. Ltd Specification
Department of ISE, BMSIT 2016-2017 Page 16
NABL Mission
To strengthen the accreditation system accepted across the globe by providing high
quality, value driven services, fostering APLAC/ILAC MRA, empanelling competent
assessors, creating awareness among the stake holders, initiating new programs
supporting accreditation activities and pursuing organisational excellence.
Master Records with their history cards
For each type of calibration that is being implemented in the company Flutech
Engineering Pvt. Ltd., a suitable Standard table is being maintained. This standard
table consists of certain standard details that are termed as master data used for
calibration.
Dynamic Item Creation
Whenever a customer visits the company, a dynamic record is created and maintained.
For every device to be calibrated, if the device is from the same customer then the
device is kept in the same Dynamic item.
Certificate format creation & management
The certificate is generated after calibration which follows the standards of ISO and
NABL which are further uploaded on to the cloud and managed online.
Customer creation & management
A new customer is assigned with a customer id and his devices are assigned feplids
for future use and references.
Sales Quotation Creation and email
They will design a quotation based on the calibration and email it to the customer.
Job Register
Each job is assigned to different people, separation concern is possible.
SRF Creation and print
SRF form is to be filled by the staff and a printout is taken.
Record of results i.e Observation taken by Engineer
The calibration results are to be noted down and the observations are analysed.
Uncertainty Calculation and verification
Then the Record of results are used to make uncertainty calculations.
Developing An ERP for Torque for Flutech Engineering Software Requirement
Pvt. Ltd Specification
Department of ISE, BMSIT 2016-2017 Page 17
Certificate printing and Storage
The certificate is generated and stored on the cloud and the access is given to the
customer.
Invoicing against calibrated items
The total costs as per the calibrated devices are made into invoices.
All kind of report
All kinds of reports are stored in cloud.
Admin Dash Board with Graphical Summary of Everything
The statistics of the sales done is displayed on the admin’s dashboard.
User Management & Authorization Also
Each employee will have a user id and password and also a level of authorization to
use the ERP.
Developing An ERP for Torque for Flutech Engineering Software Requirement
Pvt. Ltd Specification
Department of ISE, BMSIT 2016-2017 Page 18
Fig 3.2 Requirements of Module-1
Developing An ERP for Torque for Flutech Engineering Software Requirement
Pvt. Ltd Specification
Department of ISE, BMSIT 2016-2017 Page 19
Fig 3.3 Requirements of Module-2
Developing An ERP for Torque for Flutech Engineering Software Requirement
Pvt. Ltd Specification
Department of ISE, BMSIT 2016-2017 Page 20
Fig 3.4 Requirements of Module-3
Developing An ERP for Torque for Flutech Engineering Design
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 21
CHAPTER 4
DESIGN
Aiming to develop an Enterprise Resource Planning for the company Flutech Engineering
Pvt. Ltd. needed to incorporate a particular design that explains the entire workflow
associated with a particular process. Each calibration part implemented, follows a particular
flow that is depended on its type. The design consists of a Database required to store the
necessary calibration data. The flowchart below depicts the entire working being flowed in
the current ERP development.
Fig.4.1 Overall process module
Developing An ERP for Torque for Flutech Engineering Design
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 22
Fig 4.2 Workflow Architecture for the Torque model
Developing An ERP for Torque for Flutech Engineering Design
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 23
The different steps involved in this workflow are:
Login : Login, also known as social sign-in, is a form of sign in using existing information
from a social networking service to sign into a third party website instead of creating a new
login account specifically for that website. It is designed to simplify logins for end users as
well as provide more and more reliable demographic information.
Inward Registry: This register asks for the basic details of the customer who wants his
particular device to be calibrated stored into the database. Only the admin can enter the
details.
Inward Registry 1: This register asks for the basic details of the particular device that has to
be calibrated by the company requiring its basic details for calibration.
Select Onsite or Off Site: If the calibration has to be done from the scratch it goes to ON
Site. If the calibration can be done with the company itself its called OFF site.
Lab Registry: The device that has to be calibrated comes under the particular lab where the
details of calibration are taken.
Torque Calibration: Suitable Torque calibration techniques are taken for the device to be
calibrated under torque.
Final Datasheets: These sheets contain the Standard data that are used for calculations.
Certificate: The certificate is generated for the device that is calibrated with the calibration
details.
Cloud Storage: Finally the certificate generated is stored on to the cloud where security and
access only to authenticated and authorised access is provided.
Developing An ERP for Torque for Flutech Engineering Implementation
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 24
CHAPTER 5
IMPLEMENTATION
Torque Calibration are categorised on certain parameters through which the entire process
will depend on it.
1. Hydraulic Torque Wrench
2. Pneumatic Torque
3. Torque Multiplier
4. Torque Tester
The following steps are carried out for calibrating Torque calibration:
Torque Multiplier:
The following are the formulas used for calculation of calibration:
Interpolation for Error readings also to be taken for different ranges.
Calculations:
S1. Mean of all readings.
S2. Corrected mean value (Mean+ Corrected_mean_std_cer )
S3. Error (DUC_Torque_reading - Corrected mean value)
S4. STD deviation:
S5. STD (All the readings)
S6. TYPEA :(STD)/SQRT(n) //n is number of readings(count)
S7. Standard, Resolution, Bending as per the specified calculations.
S8. Combined Uncertainty:SQRT[Square(each of the above 4
parameters)+(TYPEA)2]
S9. Degree of Freedom, Coverage factor, Expanded Uncertainty, Compare with Cmc
as per the previous calculations.
S10. Final Uncertainty :MAX(Cmc, Expanded Uncertainty)
In certificate we display,The following details in table format:
Reading all the trials
Mean, Corrected Mean
Deviation , % Deviation
Developing An ERP for Torque for Flutech Engineering Implementation
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 25
± Allowable Tolerance as per ISO 6789(Master Specified)
Uncertainty
Fig 5.1 Torque table 1
Fig 5.2 Torque table 2
Developing An ERP for Torque for Flutech Engineering Implementation
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 26
Calculations done from fetching the values from standard table:
The std value is to be calculated by the uncertainty value that is fetched from the
standard torque table.
Fig 5.3 Torque standard table
Developing An ERP for Torque for Flutech Engineering Implementation
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 27
Fig 5.4 Torque correction values
Torque Tester
Formulas used for the calculation of calibration of torque tester:
Mean(Tm)= avg(s1 to s5)
Correction calculations are based on the range of mean. Based on the range values
from the torque correction table with reference to torque standard table as the
parent table.
Corrected mean(Tmc=Tm- correction value;
Error=Tmc-Tm
Delta Standard=(uncertainity*Ts)/2
Fig 5.5 Torque tester calculation table
Developing An ERP for Torque for Flutech Engineering Conclusion
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 28
CHAPTER 6
CONCLUSION
We have proposed an ERP for torque calibration that helps company to automate calibration related to
torque. The ERP provides a comprehensive framework to employ who fills in the information for a
given user. We have also given 3 visits to Flutech Engineering Pvt. Ltd to get clear picture about their
requirement.
Live demo was given with guide to company CEO, Technical Coordinator of Flutech Engineering Pvt.
Ltd. They were happy with the demo and suggested few corrections which was inculcated by next
demo given.
The project will be deployed on to the company before 5th
July 2017.
Developing An ERP for Torque for Flutech Engineering Future Enhancement
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 29
CHAPTER 7
FUTURE ENHANCEMENTS
The ERP that we have done is for torque module, the rest of the modules will be implemented by
our juniors. The other modules to be implemented are temperature, electrical, dimensional,
electro-technical etc.
The ERP has to be implemented in the company within July 5, we will be shifting from Linux to
windows platform and will we setting up the sever and installing the software on the client
computers.
A Sales analysis module will be done, so that it’ll be easy for them to get an overview of the
sales in a particular period of time.
The Certificates will be uploaded to the cloud and access to the certificates will be given through
mobile devices, so that client of Flutech Engineering Pvt. Ltd. will have easy access.
Developing An ERP for Torque for Flutech Engineering Bibliography
Pvt. Ltd.
Department of ISE, BMSIT 2016-2017 Page 30
CHAPTER 8
BIBLIOGRAPHY
[1] Priyanka S. Rathod et al, International Journal of Computer Science and Mobile Computing.
[2] Vishal R. Pancholi , Dr. Bhadresh P. Patel, Enhancement of Cloud Computing Security with
Secure Data Storage using AES.
[3] Secure Document Service for Cloud Computing Jin-Song Xu1, Ru-Cheng Huang, Wan-Ming
Huang, and Geng Yang.
[4] Learn to code in PHP, https://www.w3schools.com/php/
[5] Learn html , https://www.codecademy.com/courses/web-beginner-en-HZA3b/0/1
[6] Cloud Computing
https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ve
d=0ahUKEwic4rPBx9HUAhVFP48KHaxLAB8QFghPMAE&url=https%3A%2F%2Fcloud.goo
gle.com%2F&usg=AFQjCNHLsLRCgO9ZN6MPLEjI7hmpXsu-7w
[7] https://help.ubuntu.com/lts/serverguide/
[8] https://docs.phpmyadmin.net/en/latest/setup.html
[9] https://filezilla-project.org/
[10] https://www.tutorialspoint.com/php/php_loop_types.htm
[11] https://dev.mysql.com/doc/apis-php/en/
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 31
CHAPTER 9
SCREENSHOTS
Fig 9.1 Login page
This is the page where the admin and the users can login, using their username and email ids.
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 32
Fig 9.2 Inward registry
Enter the customer details and date of po/dc.
Fig 9.3 select service
Select if you want to service offsite or onsite.
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 33
Fig 9.4 Inward 1 registry-1
Fig 9.5 Inward 1 registry-2
The information about the device to be calibrated is input.
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 34
Fig 9.6 Retrieve stored data
The data stored in the inward registries can be retrieved.
Fig 9.7 Lab registry
Here the device is selected based on instrument slno.
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 35
Fig 9.8 Display
The selected device is displayed.
Fig 9.9 select calibration
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 36
Fig 9.10 enter details of device
Fig 9.11 Details of instruments
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 37
Fig 9.12 Calculation 1
Fig 9.13 Calculation 2
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 38
Fig 9.14 Certificate 1
Fig 9.15 Certificate 2
Developing An ERP for Torque for Flutech Engineering Screenshots
Pvt. Ltd
Department of ISE, BMSIT 2016-2017 Page 39
Fig 9.16 Uploading
Fig 9.17 Uploaded
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 09 | February 2016 ISSN (online): 2349-6010
All rights reserved by www.ijirst.org 18
Enhancement of Cloud Computing Security with
Secure Data Storage using AES
Vishal R. Pancholi Dr. Bhadresh P. Patel
Research Scholar I/C Principal
Pacific University Udaipur, Rajasthan Matrushri L.J Gandhi (Bakorvala) BCA College Modasa,
Gujarat
Abstract
The evolution of Cloud computing makes the major changes in computing world as with the assistance of basic cloud computing
service models like SaaS, PaaS, and IaaS an organization achieves their business goal with minimum effort as compared to
traditional computing environment. On the other hand security of the data in the cloud database server is the key area of concern
in the acceptance of cloud. It requires a very high degree of privacy and authentication. To protect the data in cloud database
server cryptography is one of the important methods. Cryptography provides various symmetric and asymmetric algorithms to
secure the data. This paper presents the symmetric cryptographic algorithm named as AES (Advanced Encryption Standard). It is
based on several substitutions, permutation and transformation.
Keywords: Cloud Computing, Security, Cryptography, AES
_______________________________________________________________________________________________________
I. INTRODUCTION
Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third
party provider who owns the infrastructure. It is often provided "as a service" over the Internet, typically in the form of
infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) [6]. Cloud computing is the
broader concept of infrastructure convergence. This type of data centre environment allows enterprises to get their applications
up and running faster, with easier manageability, and less maintenance to meet business demands. For example, we can manage
and store all smartphones or tablets apps at one location i.e. cloud. So we do not require any memory space at our end. This also
gives the security of data and applications in case device is damaged or lost [1].
As the central data storage is the key facility of the cloud computing it is of prominent importance to provide the security. The
art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography.
Security goals of data cover three points namely: Availability, Confidentiality, and Integrity. Cryptography, in modern days is
considered grouping of three types of algorithms. They are
1) Symmetric-key algorithms
2) Asymmetric-key algorithms
3) Hash functions
Symmetric algorithms use the same key for encryption and decryption. This is termed as secret key. With the same key
messages are encrypted by the sender and decrypted by the receiver. It contains algorithms like Data Encryption Standard (DES),
Advanced Encryption Standard (AES), Ron's Code (RCn), and Triple DES, Blowfish etc.
Asymmetric algorithms use different keys. One key (public) is used for encryption and other (private key) is used for
decryption. This is named as public key. Public key is known to public and private key is known to the user. It comprises various
algorithms like Rivest, Shamir, & Adleman (RSA), Digital Signature Algorithm (DSA), Elliptic Curve(EC), Diffi-Hillman(DH),
El Gamal etc.
The Hash functions use a mathematical transformation to irreversibly "encrypt" information. It contains algorithms like
Message Digest, Secure Hash Algorithm [10].
We choose symmetric cryptosystem as solution as it has the speed and computational efficiency to handle encryption of large
volumes of data. In symmetric cryptosystems, the longer the key length, the stronger the encryption.
AES is most frequently used encryption algorithm today this algorithm is based on several substitutions, permutations and
linear transformations, each executed on data blocks of 16 byte. As of today, no practicable attack against AES exists. Therefore,
AES remains the preferred encryption standard for governments, banks and high security systems around the world.
II. LITERATURE REVIEW
In [1], it is proposed a simple data protection model where data is encrypted using Advanced Encryption Standard (AES) before
it is launched in the cloud, thus ensuring data confidentiality and security.
In [4], a privacy-preserving public auditing system for data storage security in cloud computing is intended, although the
computational time is increased but the privacy is preserved where data is stored in the cloud by using the most prominent
algorithm AES.
Enhancement of Cloud Computing Security with Secure Data Storage using AES (IJIRST/ Volume 2 / Issue 09/ 004)
All rights reserved by www.ijirst.org 19
In [8], AES data encryption is more scientifically capable and graceful cryptographic algorithm, but its main force rests in the
key length. The time necessary to break an encryption algorithm is straight related to the length of the key used to secure the
communication. AES allows choosing a various type of bits like 128-bit, 192-bit or 256-bit key, making it exponentially stronger
than the 56-bit key of DES.
In [3], it is described a new architecture for security of data storage in multicloud. Two mechanisms-data encryption and file
splitting are used. When user uploads a file, it is encrypted using AES encryption algorithm. Then that encrypted file is divided
into equal parts according to the number of clouds and stored into multicloud. This proposed system enhances the data security
in multicloud.
In [12], Based on the text files used and the experimental result it was concluded that AES Algorithm consumes least
encryption and RSA consume longest encryption time. They also observed that Decryption of AES algorithm is better than other
algorithms. From the simulation result, they evaluated that AES algorithm is much better than DES and RSA algorithm.
III. AES ALGORITHM
AES acronym of Advanced Encryption Standard is a symmetric encryption algorithm.
The algorithm was developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen. It is useful when we want to
encrypt a confidential text into a decryptable format, for example when we need to send sensitive data in e-mail. The decryption
of the encrypted text is possible only if we know the right password. AES is an iterative rather than Feistel cipher. It is based on
‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by
specific outputs (substitutions) and others involve shuffling bits around (permutations).
The First Step
AddRoundKey
The Following Four Functions Are Periodically Repeated
SubByte
ShiftRow
MixColumn
AddRoundKey
Final Step
SubByte
ShiftRow
AddRoundKey
Fig. 1: Encryption and decryption in AES [8]
Enhancement of Cloud Computing Security with Secure Data Storage using AES (IJIRST/ Volume 2 / Issue 09/ 004)
All rights reserved by www.ijirst.org 20
Byte Substitution (SubBytes)
The 16 input bytes are substituted by looking up a fixed table (S-box) given in design. The result is in a matrix of four rows and
four columns.
Fig. 2: Byte Substitution (SubBytes)
Shift Rows
Each of the four rows of the matrix is shifted to the left. Any entries that ‘fall off’ are re-inserted on the right side of row. Shift is
carried out as follows
First row is not shifted.
Second row is shifted one (byte) position to the left.
Third row is shifted two positions to the left.
Fourth row is shifted three positions to the left.
The result is a new matrix consisting of the same 16 bytes but shifted with respect to each other.
Fig. 3: ShiftRows
Mix Columns
Each column of four bytes is now transformed using a special mathematical function. This function takes as input the four bytes
of one column and outputs four completely new bytes, which replace the original column. The result is another new matrix
consisting of 16 new bytes. It should be noted that this step is not performed in the last round.
2 3 1 1
1 2 3 1
1 1 2 3
3 1 1 2
Addroundkey
The 16 bytes of the matrix are now considered as 128 bits and are XORed to the 128 bits of the round key. If this is the last
round then the output is the ciphertext. Otherwise, the resulting 128 bits are interpreted as 16 bytes and we begin another similar
round.
IV. CONCLUSION
According to a report, “Worldwide and Regional Public IT Cloud Services 2012-2016 Forecast” released by IDC, cloud services
will see as much as 41% growth from 2013 to 2016. Spending on IT cloud services worldwide will edge toward $100 billion by
2016 [13]. And in all this cloud growth, security will play a key role. AES encryption is the fastest method that has the flexibility
and scalability and it is easily implemented. On the other hand, the required memory for AES algorithm is less than the Blowfish
algorithm. AES algorithm has a very high security level because the 128, 192 or 256-bit key are used in this algorithm. It shows
Enhancement of Cloud Computing Security with Secure Data Storage using AES (IJIRST/ Volume 2 / Issue 09/ 004)
All rights reserved by www.ijirst.org 21
resistance against a variety of attacks such as square attack, key attack, key recovery attack and differential attack. Therefore,
AES algorithm is a highly secure encryption method. Data can also protect against future attacks such as smash attacks. AES
encryption algorithm has minimal storage space and high performance without any weaknesses and limitations while other
symmetric algorithms have some weaknesses and differences in performance and storage space.
REFERENCES
[1] Abha Sachdev, Mohit Bhansali “Enhancing Cloud Computing Security using AES Algorithm” International Journal of Computer Applications (0975 –
8887) Volume 67– No.9, April 2013
[2] Dr.S.Gunasekaran, M.P.Lavanya “ A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS” (IJAER) 2015, Vol. No. 9, Issue No. IV, April ISSN: 2231-5152
[3] Rashmi S. Ghavghave, Deepali M. Khatwar “Architecture for Data Security In Multicloud Using AES-256 Encryption Algorithm” International Journal on
Recent and Innovation Trends in Computing and Communication Volume: 3 Issue: 5 ISSN: 2321-8169 [4] Mr. Santosh P. Jadhav, Prof. B. R. Nandwalkar “Efficient Cloud Computing with Secure Data Storage using AES” International Journal of Advanced
Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015 ISSN (Online) 2278-1021
[5] Namita N. Pathak, Prof. Meghana Nagori “Enhanced Security for Multi Cloud Storage using AES Algorithm” International Journal of Computer Science and Information Technologies, Vol. 6 (6), 2015 ISSN:0975-9646
[6] R. H. Sakr, F. Omara, O. Nomir “An Optimized Technique for Secure Data Over Cloud OS” International Journal of Emerging Trends & Technology in
Computer Science (IJETTCS) Volume 3, Issue 3, May-June 2014 ISSN 2278-6856 [7] Ranjit Kaur, Raminder Pal Singh “Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques” SSRG International
Journal of Mobile Computing & Application (SSRG-IJMCA) – volume 2 Issue 3 May to June 2015
[8] P.V.NITHYABHARATHI, T.KOWSALYA, V.BASKAR “To Enhance Multimedia Security in Cloud Computing Environment Using RSA and AES” International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 2, February 2014
[9] T. Shobana Maheswari, S. Kanagaraj and Shriram K. Vasudevan “Enhancement of Cloud Security Using AES 512 Bits” Research Journal of Applied
Sciences, Engineering and Technology ISSN: 2040-7459; e-ISSN: 2040-7467 November 25, 2014 [10] Disha Shah, “Digital Security Using Cryptographic Message Digest algorithm”, International Journal of Advance Research in Computer Science and
Management Studies, Volume 3, Issue 10, October 2015.
[11] Dr. Prerna Mahajan & Abhishek Sachdeva “A Study of Encryption Algorithms AES, DES and RSA for Security” Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Online ISSN: 0975-4172 & Print ISSN: 0975-4350
[12] Rachna Arora, Anshu Parashar “ Secure User Data in Cloud Computing Using Encryption Algorithms” International Journal of Engineering Research and
Applications (IJERA) Vol. 3, Issue 4, Jul-Aug 2013 ISSN: 2248-9622 [13] Enterprise and Individual Users to fuel Growth in Cloud Computing [Online]. Available: http://www.redorbit.com/news/technology/1112692915/cloud-
computing-growth-paas-saas-091212/
[14] Kiruthika.R, Keerthana.S, Jeena.R “ Enhancing Cloud Computing Security using AES Algorithm” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 3, March 2015 ISSN: 2277 128X
Top Related