developing erp for torque calibration for flutech engineering pvt ·  · 2017-09-27“developing...

58
VISVESVARAYA TECHNOLOGICAL UNIVERSITY BELAGAVI, KARNATAKA A Project Report on DEVELOPING ERP FOR TORQUE CALIBRATION FOR FLUTECH ENGINEERING PVT.LTD Submitted in the partial fulfillment for the requirements for the conferment of Degree of BACHELOR OF ENGINEERING in INFORMATION SCIENCE AND ENGINEERING By Mr. ADITYA BHAT USN: 1BY13IS003 Mr. DHEERAJ A S USN: 1BY13IS015 Mr. MOHAMMED ZAID USN: 1BY13IS028 Under the guidance of Mrs. Ashwini N Assistant Professor Department of ISE, BMSIT&M. DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING BMS INSTITUTE OF TECHNOLOGY & MANAGEMNT YELAHANKA, BENGALURU-560064 2016-2017

Upload: lenguyet

Post on 15-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

BELAGAVI, KARNATAKA

A Project Report on

“DEVELOPING ERP FOR TORQUE CALIBRATION FOR FLUTECH

ENGINEERING PVT.LTD”

Submitted in the partial fulfillment for the requirements for the conferment of Degree of

BACHELOR OF ENGINEERING

in

INFORMATION SCIENCE AND ENGINEERING

By

Mr. ADITYA BHAT USN: 1BY13IS003

Mr. DHEERAJ A S USN: 1BY13IS015

Mr. MOHAMMED ZAID USN: 1BY13IS028

Under the guidance of

Mrs. Ashwini N Assistant Professor

Department of ISE, BMSIT&M.

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

BMS INSTITUTE OF TECHNOLOGY & MANAGEMNT YELAHANKA, BENGALURU-560064

2016-2017

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

BELAGAVI, KARNATAKA

BMS INSTITUTE OF TECHNOLOGY & MANAGEMENT YELAHANKA, BENGALURU-560064

DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING

This is to certify that the project work entitled “Developing ERP for Torque calibration for

Flutech Engineering Pvt.ltd” is a bonafide work carried out by Mr.Aditya Bhat (1BY13IS003),

Mr.Dheeraj A S (1BY13IS015), Mr.Mohammed Zaid (1BY13IS028) in partial fulfillment for

the award of Bachelor of Engineering Degree in Information Science and Engineering of the

Visvesvaraya Technological University, Belagavi during the year 2016-17. It is certified that all

corrections/suggestions indicated for Internal Assessment have been incorporated in this report.

The project report has been approved as it satisfies the academic requirements in respect of project

work for the B.E degree.

__________________ _________________

Signature of the Guide Signature of the HOD Signature of the Principal

Mrs.Ashwini N Dr.Manjunath T N Dr.Mohan Babu G N

EXTERNAL EXAMINERS

Name of the Examiners Signature with Date

1.

2.

CERTIFICATE

i

ABSTRACT

This project is aimed at computerizations and increasing productivity of process and

documentation of flow of calibration instruments from receipt to delivery. The company is

mainly focused at offer wide range of services to a diverse market and industry leaders. We

are building a software that is intended to perform the calibration of a device at a single

stretch that from receiving the device from the customer with the extraction of sufficient

information from the customer, loading these information on to the database, transferring the

device to the lab, performing the necessary calculations required for the calibration process

and finally generating an invoice message and a device certificate. This has been segregated

into 5 different modules where each module performs a specific task. Each module is been

validated and is assured of not taking invalid inputs. The company along calibration is

working as distributors for some of the products that is outsourcing for further addition of

obtaining new devices which has also been included in one of the module. We have

developed an idea for this kind of requirement and looking forward to implement it which

using the CLOUD and DATABASE facilities which will be highlighted in the project.

ii

ACKNOWLEDGEMENT

We are happy to present this project after completing it successfully. This project

would not have been possible without the guidance, assistance and suggestions of many

individuals. We would like to express our deep sense of gratitude and indebtedness to each

and every one who has helped us make this project a success.

We heartily thank our Principal, Dr.Mohan Babu G. N, BMS Institute of

Technology & Management for his constant encouragement and inspiration in taking up

this project.

We heartily thank our Head of Department Dr. Manjunath T. N, Dept. of

Information Science and Engineering, BMS Institute of Technology & Management for

his constant encouragement and inspiration in taking up this project.

We heartily thank our Project Co-ordinator Dr. Pushpa S.K, Associate Professor,

Dept. of Information Science and Engineering, BMS Institute of Technology &

Management for her constant encouragement and inspiration in taking up this project.

We gracefully thank our Project guide, Mrs. Ashwini N, Assistant Professor, Dept.

of Information Science and Engineering, BMS Institute of Technology & Management

for her encouragement and advice throughout the course of the Project work.

Special thanks to all the staff members of Information Science Department for their help and

kind co-operation.

Lastly we thank our parents and friends for their encouragement and support given to us in

order to finish this precious work.

By,

ADITYA BHAT (1BY13IS003)

DHEERAJ A S (1BY13IS015)

MOHAMMED ZAID (1BY13IS028)

iii

TABLE OF CONTENTS

Chapter Page No.

1 Introduction ……………………………………………………………..1

1.1 ERP ………………………………………………………….……....1

1.2 About the company ………………………………………………....2

1.2.1 Accreditation…………....…………………………………2

1.2.2 Industrial Tools and Measuring Instruments………………2

1.2.3 Instruments Developed By the company…………………..3

1.2.4 Calibration Laboratory in the Company…………………...3

2 Literature survey ……………………………………………………......5

2.1 Survey on Calibration Process ………………………………………5

2.2 Survey on cloud ……………………………………………………..5

2.3 Related work …………………………………………………….......7

2.3.1 Storage on cloud ……………………………………….…....8

2.3.2 Security Issues with cloud computing …………………..…..9

2.3.3 Data transfer technology by fujtitsu laboratories…………...10

2.3.4 Protocols for transferring files………………………………12

3 Software Requirement Specification…………………………………....14

3.1 Noble scope ………………………………………………………….15

4 Design………..............................................................................................21

5 Implementation………………………………………………………......24

6 Conclusion ……………………………………………………………….28

7 Future Enhancement ……………………………………………………29

8 Bibliography...............................................................................................30

9 Screenshots………………………………………………………………..31

Appendix A .................................................................................................40

iv

LIST OF FIGURES

Fig. No Figure Name Page No.

2.1 Over view of file downloads in file sharing system 11

3.1 Requirements of ERP 15

3.2 Requirements of Module-1 18

3.3 Requirements of Module-2 19

3.4 Requirements of Module-3 20

4.1 Overall process module 21

4.2 Workflow Architecture for the Torque model 22

5.1 Torque table 1 25

5.2 Torque table 2 25

5.3 Torque standard table 26

5.4 Torque correction values 26

5.5

9.1

9.2

9.3

9.4

9.5

9.6

9.7

9.8

9.9

9.10

9.11

9.12

9.13

9.14

9.15

9.16

9.17

Torque tester calculation table

Login page

Inward registry

select service

Inward 1 registry-1

Inward 1 registry-2

Retrieve stored data

Lab registry

Display

select calibration

enter details of device

Details of instruments

Calculation 1

Calculation 2

Certificate 1

Certificate 2

Uploading

Uploaded

27

31

31

32

32

33

33

34

34

35

35

36

36

37

37

38

38

39

CHAPTER 1

INTRODUCTION

Developing An ERP for Torque for Flutech Engineering Introduction

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 1

CHAPTER 1

INTRODUCTION

Our Project aims at computerizing the entire business process for the calibration company

Flutech Engineering Pvt. Ltd. We have developed an ERP for the company with respect

to Torque model, the entire process from obtaining the product from the customers,

inward registry, inward 1 registry, lab registry, calculations, certificate generation has

been implemented. We provide encapsulation of customer data, by separating customer

data from the device data.

The employees in the company are using legacy systems for implementing their business

process. They have book registers for maintaining the customer and instrument details.

The calibration calculations are done using excel sheets. They have a lot of formulas

which change as per the type of device. So it’s a tedious task for them to do the

calculations and handle a calibration process. By having an ERP it will remove the

unnecessary low tasks and help the employees to focus at more productive tasks.

1.1 ERP (Enterprise Resource Planning)

An ERP (Enterprise resource planning) is a process by which a company (often a

manufacturer) manages and integrates the important parts of its business. An ERP

management information system integrates areas such as planning, purchasing, inventory,

sales, marketing, finance and human resources. Think of ERP as the glue that binds the

different computer systems for a large organization. Typically, each department would

have its own system optimized for that division's particular tasks. With ERP, each

department still has its own system, but it can communicate and share information easier

with the rest of the company. The ERP software functions like some a central nervous

system for a business. It collects information about the activity and state of different

divisions of the body corporate and makes this information available to other parts where

it can be used productively. Information on the ERP is added in real time by users. Any

authorized user with a valid password and access to the network can access the system

any time. ERP resembles the human central nervous system. Its capacity transcends the

collective ability of the individual parts to form what is known as consciousness. It helps

a corporation become more self-aware by linking information about production, finance,

distribution and human resources. ERP connects different technologies used by each

Developing An ERP for Torque for Flutech Engineering Introduction

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 2

individual part of a business, eliminating duplicate and incompatible technology that is

costly to the corporation. This involves integrating accounts payable, stock-control

systems, order-monitoring systems and customer databases into one system.

1.2 About Company (Flutech Engineering Pvt. Ltd.)

Flutech Engineering Pvt. Ltd. is a leading and independent calibration services laboratory

and industrial tools and manufacturing instruments in distribution company era.

They offer wide range of services to a diverse market and industry leaders. They server

markets ranging from automobiles to aerospace, manufacturing, steel, mining, power, oil

and gas.

They are equipped to perform multi parameter , multi domain calibrations, delivering

high precision and accurate measurements, covering Torque, Pressure, Force,

Temperature, Electrical dimensions and mass.

1.2.1 Accreditation:

There laboratory is accredited in accordance to ISO/IEC 17025:2005 by the NABL

(National Accreditation Board for Testing and Calibration Laboratories), department of

science and technology, gol.

ISO 9000: checks in terms of infrastructure, component to be tested.

ISO 17025: checks more in detail of technical aspects:- like the machine used for

calibration and components used in the machine.

1.2.2 Industrial Tools and Measuring instruments:

Instruments used for measuring :( Distributors for sales and services)

Norbar, UK: - Torque tools for tightening, measurement & calibration.

Fuji, Japan:- Air tools torque and material removing.

Ness, Japan:- Pressure and temperature gauges.

Fluke, USA:- Test tools for Electrical and industrial solutions.

Testo, AG: Portable Test and Measuring Instruments.

Developing An ERP for Torque for Flutech Engineering Introduction

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 3

1.2.3 Instruments developed by the company

Following are few instruments developed by company and their specification is

also discussed.

Hydraulic torque wrench:

Static transducers (10000Nm), In south India this is the only place where they

can calibrated 10000Nm (9500Nm). In sushma industry, they use crude method to

calibrate 1500-1600Nm. If imported this instrument it will cost 12L but they have

designed by 2.5L.

Pressure Gauge Calibrator (Push and Pull gauge):

This is a Universal testing machine, usually the calibrator will be till 300

bars but the one that they develop will go till 700 bars.

1.2.4 Calibration laboratory in the company:

Company provides different calibration at different domains as follows:

Domain :- (Calibration done)

Mechanical domain

Eletro-Technical domain

Thermal domain

Types of calibration:

Torque calibration: Hand Torque Wrench, Rotary torque, Hydraulic torque

wrench

Pressure calibration: Hydraulic, Pneumatic, Vacuum, And Differential

Dimension calibration

Electrical calibration

Temperature calibration

Testing RTD: Sensors measuring upto 6.5 digits.

That has furnace where we can test 4-5 sensors of same/different size at the same time.

Developing An ERP for Torque for Flutech Engineering Introduction

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 4

Types of products they get to calibrate:

Manual torque wrenches

Digital torque wrenches

Torque screw driver

Digital Gauge

Dead weight tester

Process calibrator

Temperature calibrator.

Multi meter

Thermos meter

Clamp meter

Pressure gauge

Temperature gauge

Gas Analyzer

CHAPTER 2

LITERATURE SURVEY

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 5

CHAPTER 2

LITERATURE SURVEY

In our literature survey is broadly classified based on the calibration process in the

company and providing security to documents saved in cloud.

2.1 Survey on Calibration Process

Following describes calibration process in company.

On our visit to Flutech Engineering Pvt. Ltd. we discussed the process used

currently for calibration and the problems that they are facing. Some of them are

discussed below:

Creating the spread sheet will not be scalable for their requirement for generating

certificate, which is their main purpose. Hence the data should be maintained in a

database and completely automating their process.

CEO discussed more in detail what he exactly needs like the basic process: from

Inward to dispatch with certificate and invoice.

He also told us that they also work as dealers also means they take the request

order from the customer for products, they place a purchase order for the product,

procure and then they deliver the requested product.

Along with calibration they first check the product to be calibrated is to be

serviced/ not. If to be serviced then the parts to be replaced will again be placed a

purchase order and then the product will be serviced first and then it will be taken

for calibration. Here 2 invoice will be generated 1-calibration 2-cost of the

product with components replaced.

He also suggested his staff to show the calculation of uncertainty which is more

required for certificate generation.

2.2 Survey on Cloud Security

Following are few papers referred for providing security for the documents stored in

cloud for their client access.

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 6

Enhancement of Cloud Computing Security with Secure Data Storage using

AES

Abstract: The evolution of Cloud computing makes the major changes in

computing world as with the assistance of basic cloud computing service models

like SaaS, PaaS, and IaaS an organization achieves their business goal with

minimum effort as compared to traditional computing environment. On the other

hand security of the data in the cloud database server is the key area of concern in

the acceptance of cloud. It requires a very high degree of privacy and

authentication. To protect the data in cloud database server cryptography is one of

the important methods. Cryptography provides various symmetric and asymmetric

algorithms to secure the data. This paper presents the symmetric cryptographic

algorithm named as AES (Advanced Encryption Standard). It is based on several

substitutions, permutation and transformation.

Identity Management System to Ensure Cloud Security

Abstract: Cloud computing can provide infinite computing resources on demand

due to its high scalability in nature, which eliminates the needs for Cloud service

providers to plan far ahead on hardware provisioning. Security is the biggest

challenge to promote cloud computing currently. Trust has proved to be one of the

most important and effective alternative means to construct security in distributed

systems. Multi located data storage and services in the Cloud make privacy issues

even worse. In order to efficiently and safely construct entities trust relationship in

cloud and cross-clouds environment, identity management services are crucial in

cloud computing infrastructures to authenticate users and to support flexible access

control to services, based on user identity properties (also called attributes) and

past interaction histories . Such services should preserve the privacy of users,

while at the same time enhancing interoperability across multiple domains and

simplifying management of identity verification.

Secure Document Service for Cloud Computing

Abstract: The development of cloud computing is still in its initial stage, and the

biggest obstacle is data security. How to guarantee the privacy of user data is a

worthwhile study. This paper has proposed a secure document service mechanism

based on cloud computing. Out of consideration of security, in this mechanism, the

content and the format of documents were separated prior to handling and storing.

In addition, documents could be accessed safely within an optimized method of

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 7

authorization. This mechanism would protect documents stored in cloud

environment from leakage and provide an infrastructure for establishing reliable

cloud services.

2.3 Related Work

Cloud computing consists of hardware and software resources made available on the

Internet as managed third-party services. These services rely on advanced software

applications and high-end networks of server computers.

A cloud computing system keeps its critical data on Internet servers rather than distributing

copies of data files to individual client devices. Video-sharing cloud services like Netflix,

for example, stream data across the Internet to a player application on the viewing device

rather than sending customers DVD or Blu-ray physical discs.

Clients must be connected to the Internet in order to use cloud services. Some video games

on the Xbox Live service, for example, can only be obtained online (not on physical disc)

while some others also cannot be played without being connected. Some industry

observers expect cloud computing to keep increasing in popularity in coming years.

The Chromebook is one example of how all personal computers might evolve in the future

under this trend - devices with minimal local storage space and few local applications

besides the Web browser (through which online applications and services are reached).

Service providers are responsible for installing and maintaining core technology within the

cloud. Some business customers prefer this model because it limits their own burden of

having to maintain infrastructure. Conversely, these customers give up management

control over the system, relying on the provider to deliver the needed reliability and

performance levels.

Likewise, home users become highly dependent on their Internet provider in the cloud

computing model: Temporary outages and slower-speed broadband that are a minor

nuisance today can become a critical issue in a fully cloud-based world. On the other hand

- proponents of cloud technology argue - such an evolution would likely drive Internet

providers to keep improving the quality of their service to stay competitive. Cloud

computing systems are normally designed to closely track all system resources. This, in

turn, enables providers to charge customers fees proportional to their network, storage, and

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 8

processing utilization.

Some customers prefer this metered billing approach to saving money, while others will

prefer a flat-rate subscription to ensure predictable monthly or yearly costs.Using a cloud

computing environment generally, requires you to send data over the Internet and store it

on a third-party system. The privacy and security risks associated with this model must be

weighed against the benefits versus alternatives.

2.3.1 Storage on Cloud

Cloud storage is a model of data storage in which the digital data is stored in logical pools,

the physical storage spans multiple servers (and often locations), and the physical

environment is typically owned and managed by a hosting company. These cloud storage

providers are responsible for keeping the data available and accessible, and the physical

environment protected and running. People and organizations buy or lease storage capacity

from the providers to store user, organization, or application data.

Cloud storage services may be accessed through a co-located cloud computer service,

a web service application programming interface (API) or by applications that utilize the

API, such as cloud desktop storage, a cloud storage gateway or Web-based content

management systems.

Cloud storage is based on highly virtualized infrastructure and is like broader cloud

computing in terms of accessible interfaces, near-instant elasticity and scalability, multi-

tenancy, and metered resources. Cloud storage services can be utilized from an off-

premises service (Amazon S3) or deployed on-premises (ViON Capacity Services).

Cloud storage typically refers to a hosted object storage service, but the term has

broadened to include other types of data storage that are now available as a service, like

block storage.

Object storage services like Amazon S3 and Microsoft Azure Storage, object storage

software like Openstack Swift, object storage systems like EMC Atmos, EMC ECS and

Hitachi Content Platform, and distributed storage research projects like OceanStore and

VISION Cloud are all examples of storage that can be hosted and deployed with cloud

storage characteristics.

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 9

Cloud storage is:

Made up of many distributed resources, but still acts as one, either in a federated or

a cooperative storage cloud architecture

Highly fault tolerant through redundancy and distribution of data

Highly durable through the creation of versioned copies

Typically eventually consistent with regard to data replicas

2.3.2 Security Issues with Cloud computing

The importance of Cloud Computing is increasing and it is receiving a growing attention in

the scientific and industrial communities. A study by Gartner considered Cloud Computing

as the first among the top 10 most important technologies and with a better prospect in

successive years by companies and organizations.

Cloud Computing enables ubiquitous, convenient, on-demand network access to a shared

pool of configurable computing resources (e.g., networks, servers, storage, applications,

and services) that can be rapidly provisioned and released with minimal management effort

or service provider interaction.

Cloud Computing appears as a computational paradigm as well as a distribution

architecture and its main objective is to provide secure, quick, convenient data storage and

net computing service, with all computing resources visualized as services and delivered

over the Internet. The cloud enhances collaboration, agility, scalability, availability, ability

to adapt to fluctuations according to demand, accelerate development work, and provides

potential for cost reduction through optimized and efficient computing.

Cloud Computing combines a number of computing concepts and technologies such as

Service Oriented Architecture (SOA), Web 2.0, virtualization and other technologies with

reliance on the Internet, providing common business applications online through web

browsers to satisfy the computing needs of users, while their software and data are stored

on the servers. In some respects, Cloud Computing represents the maturing of these

technologies and is a marketing term to represent that maturity and the services they

provide.

Although there are many benefits to adopting Cloud Computing, there are also some

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 10

significant barriers to adoption. One of the most significant barriers to adoption is security,

followed by issues regarding compliance, privacy and legal matters. Because Cloud

Computing represents a relatively new computing model, there is a great deal of

uncertainty about how security at all levels (e.g., network, host, application, and data

levels) can be achieved and how applications security is moved to Cloud Computing. That

uncertainty has consistently led information executives to state that security is their

number one concern with Cloud Computing.

Security concerns relate to risk areas such as external data storage, dependency on the

“public” internet, lack of control, multi-tenancy and integration with internal security.

Compared to traditional technologies, the cloud has many specific features, such as its

large scale and the fact that resources belonging to cloud providers are completely

distributed, heterogeneous and totally virtualized. Traditional security mechanisms such as

identity, authentication, and authorization are no longer enough for clouds in their current

form. Security controls in Cloud Computing are, for the most part, no different than

security controls in any IT environment. However, because of the cloud service models

employed, the operational models, and the technologies used to enable cloud services,

Cloud Computing may present different risks to an organization than traditional IT

solutions. Unfortunately, integrating security into these solutions is often perceived as

making them more rigid.

Moving critical applications and sensitive data to public cloud environments is of great

concern for those corporations that are moving beyond their data center’s network under

their control. To alleviate these concerns, a cloud solution provider must ensure that

customers will continue to have the same security and privacy controls over their

applications and services, provide evidence to customers that their organization are secure

and they can meet their service-level agreements, and that they can prove compliance to

auditors.

2.3.3 Data Transfer Technology By Fujitsu Laboratories

Fujitsu Laboratories has developed a software-based technology to increase data-transfer

speeds for accessing files on remote enterprise file-sharing servers. When accessing remote

file-sharing servers in the cloud, slow upload and download speeds for typical file-sharing

systems due to network latency has been an issue. By using a newly developed software

that relays communications between the client and server, the number of communications

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 11

made has been significantly reduced, lowering the effects of network latency. This

communication frequency occurs when obtaining information on multiple file names and

file sizes on a remote network. In an internal experiment, file transfers were confirmed to

be up to ten times faster when dealing with multiple small files. Transfers of large files can

be up to twenty times faster when combined with the deduplication technology Fujitsu

Laboratories announced last year.

By simply installing this software on a client and server, increased speeds for file access

for existing systems.

In file sharing, files are stored on server connected to a network and multiple clients can

share the same files. This is used by enterprises to share information and manage

documents. Previously, Individual locations have maintained their own file-sharing servers

on-site, but in order to improve security and reduce operating costs through combined

management, server consolidation has become more common as have opportunities to

remotely access file-sharing servers. With two network file-sharing protocols that are

widely used in file-sharing systems, CIFS and SMB, the effects of network latency can

impose significant wait times for accessing files, creating a demand for improving speed.

Fig 2.1 Over view of file downloads in file sharing systems

Fujitsu Laboratories has developed a technology that accelerates data transfers for file-

sharing servers using only software. Key features of the technology are as follows.

Collectively proxy read-ahead for multiple files and proxy response

With this technology, a module is installed on both the client and server that

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 12

accelerates data transfers (Figure 2). The server-side module: 1) identifies when a

folder containing multiple files starts to download; 2) read-ahead on the client

proxy the batch of all the files downloaded; 3) these read-ahead files are bundled

together and transmitted to the client-side module; and 4) the client-side module

then replies to a request to get data with its server proxy. In this way, the amount of

communications generated by obtaining file attributes, such as multiple file names

and file sizes, is greatly reduced, as are the delays influenced by network latency.

Effective deduplication due to header separation

Fujitsu Laboratories developed a technology that works on the server-side module

to separate the transmitted data into the headers and the contents of file. This makes

deduplication of retransmitted data more precise, leading to more effective network

traffic reduction.

In Fujitsu Laboratories' internal experiment, software that implements this

technology was found to have the following effects.

Increase in speed of multiple small file transfers: In a test environment that

simulated the network latency for accessing a file-sharing server in Kawasaki from

a location in Kyushu, batch downloads of folders containing one hundred 1-

KB files was found to be ten times faster.

Increase in speed of large file transfers: In the same test environment, a download

of a single 10 MB file was found to be as much as twenty times faster (compared

with having no acceleration technologies such as deduplication).

This technology is implemented as software and can be installed on existing file-

sharing systems. It can also be applied to cloud and server-virtualization

environments, mobile devices, etc., and can be extended to a variety of network

services. This technology enables more efficient file sharing and joint development

between remote locations.

2.3.4 Protocols for transferring Files

SSH2 File Transfer Protocol (SFTP)

Despite the name, SFTP is a completely different protocol from traditional FTP. SFTP is

definitely the favorite these days because of its robust security model and easier setup than

FTP and FTPS. Unlike traditional FTP, SFTP runs over an SSH channel and provides

security and integrity by default. SFTP is also considerably more firewall friendly than

Developing An ERP for Torque for Flutech Engineering Literature Survey

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 13

FTP because it only requires one port to establish a connection and carry out file

operations.

File Transfer Protocol (FTP and FTPS)

FTP is the original File Transfer Protocol and enjoys wide support from a variety of clients

and devices. Unfortunately, FTP is by default an insecure protocol, transferring commands

and data over an unencrypted connection. This can allow eavesdropping of passwords and

data. FTPS was introduces to solve the problem of unencrypted data being transferred and

adds SSL or TLS encryption to the FTP protocol.

FTP and FTPS require multiple ports (one port to issue commands and a separate port for

each and every directory listing or file transfer) to accomplish the same thing that SFTP

can do with one port. The requirement to setup forwarding for large numbers of ports can

be a problem in many environments and can make troubleshooting problems difficult.

However, FTP and FTPS have been around a lot longer than SFTP and there are still many

devices and clients that only support FTPS.

The original FTP protocol offers no security and transmits commands and data in an open,

easily eavesdropped connection. FTP should generally be avoided in favor of FTPS and

SFTP. In terms of security, both the SFTP and FTPS protocols are considered secure. The

requirement to open up multiple ports with FTPS can be viewed as a security concern but

there is nothing inherently more secure about the SFTP protocol over the FTPS protocol.

Either is appropriate when a secure connection is required but SFTP tends to be easier to

configure and more firewall friendly.

Performance of the protocols, the only real advantage I would give FTPS over SFTP

would be performance. SFTP runs over a considerably more robust and generic protocol

than FTPS, and that robustness imparts a significant performance impact. There is a lot

more overhead involved in SFTP. The overhead in the SFTP protocol is because SFTP

runs on top of the SSH2 protocol, and because SFTP implements its own handshaking

mechanism. If you want the highest transfer speeds possible over a secure connection then

you want FTPS.

CHAPTER 3

SOFTWARE REQUIREMENTS

SPECIFICATION

Developing An ERP for Torque for Flutech Engineering Software Requirement

Pvt. Ltd Specification

Department of ISE, BMSIT 2016-2017 Page 15

CHAPTER 3

SOFTWARE REQUIREMENT SPECIFICATION

The following are the requirements sent by the Flutech Engineering Pvt Ltd Technical

Coordinator to be implemented in the ERP, after an interaction.

Fig 3.1 Requirements of ERP

3.1 NABL SCOPE

NABL Vision

To be the world’s leading accreditation body and to enhance stakeholders’ confidence

in its services.

Developing An ERP for Torque for Flutech Engineering Software Requirement

Pvt. Ltd Specification

Department of ISE, BMSIT 2016-2017 Page 16

NABL Mission

To strengthen the accreditation system accepted across the globe by providing high

quality, value driven services, fostering APLAC/ILAC MRA, empanelling competent

assessors, creating awareness among the stake holders, initiating new programs

supporting accreditation activities and pursuing organisational excellence.

Master Records with their history cards

For each type of calibration that is being implemented in the company Flutech

Engineering Pvt. Ltd., a suitable Standard table is being maintained. This standard

table consists of certain standard details that are termed as master data used for

calibration.

Dynamic Item Creation

Whenever a customer visits the company, a dynamic record is created and maintained.

For every device to be calibrated, if the device is from the same customer then the

device is kept in the same Dynamic item.

Certificate format creation & management

The certificate is generated after calibration which follows the standards of ISO and

NABL which are further uploaded on to the cloud and managed online.

Customer creation & management

A new customer is assigned with a customer id and his devices are assigned feplids

for future use and references.

Sales Quotation Creation and email

They will design a quotation based on the calibration and email it to the customer.

Job Register

Each job is assigned to different people, separation concern is possible.

SRF Creation and print

SRF form is to be filled by the staff and a printout is taken.

Record of results i.e Observation taken by Engineer

The calibration results are to be noted down and the observations are analysed.

Uncertainty Calculation and verification

Then the Record of results are used to make uncertainty calculations.

Developing An ERP for Torque for Flutech Engineering Software Requirement

Pvt. Ltd Specification

Department of ISE, BMSIT 2016-2017 Page 17

Certificate printing and Storage

The certificate is generated and stored on the cloud and the access is given to the

customer.

Invoicing against calibrated items

The total costs as per the calibrated devices are made into invoices.

All kind of report

All kinds of reports are stored in cloud.

Admin Dash Board with Graphical Summary of Everything

The statistics of the sales done is displayed on the admin’s dashboard.

User Management & Authorization Also

Each employee will have a user id and password and also a level of authorization to

use the ERP.

Developing An ERP for Torque for Flutech Engineering Software Requirement

Pvt. Ltd Specification

Department of ISE, BMSIT 2016-2017 Page 18

Fig 3.2 Requirements of Module-1

Developing An ERP for Torque for Flutech Engineering Software Requirement

Pvt. Ltd Specification

Department of ISE, BMSIT 2016-2017 Page 19

Fig 3.3 Requirements of Module-2

Developing An ERP for Torque for Flutech Engineering Software Requirement

Pvt. Ltd Specification

Department of ISE, BMSIT 2016-2017 Page 20

Fig 3.4 Requirements of Module-3

CHAPTER 4

DESIGN

Developing An ERP for Torque for Flutech Engineering Design

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 21

CHAPTER 4

DESIGN

Aiming to develop an Enterprise Resource Planning for the company Flutech Engineering

Pvt. Ltd. needed to incorporate a particular design that explains the entire workflow

associated with a particular process. Each calibration part implemented, follows a particular

flow that is depended on its type. The design consists of a Database required to store the

necessary calibration data. The flowchart below depicts the entire working being flowed in

the current ERP development.

Fig.4.1 Overall process module

Developing An ERP for Torque for Flutech Engineering Design

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 22

Fig 4.2 Workflow Architecture for the Torque model

Developing An ERP for Torque for Flutech Engineering Design

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 23

The different steps involved in this workflow are:

Login : Login, also known as social sign-in, is a form of sign in using existing information

from a social networking service to sign into a third party website instead of creating a new

login account specifically for that website. It is designed to simplify logins for end users as

well as provide more and more reliable demographic information.

Inward Registry: This register asks for the basic details of the customer who wants his

particular device to be calibrated stored into the database. Only the admin can enter the

details.

Inward Registry 1: This register asks for the basic details of the particular device that has to

be calibrated by the company requiring its basic details for calibration.

Select Onsite or Off Site: If the calibration has to be done from the scratch it goes to ON

Site. If the calibration can be done with the company itself its called OFF site.

Lab Registry: The device that has to be calibrated comes under the particular lab where the

details of calibration are taken.

Torque Calibration: Suitable Torque calibration techniques are taken for the device to be

calibrated under torque.

Final Datasheets: These sheets contain the Standard data that are used for calculations.

Certificate: The certificate is generated for the device that is calibrated with the calibration

details.

Cloud Storage: Finally the certificate generated is stored on to the cloud where security and

access only to authenticated and authorised access is provided.

CHAPTER 5

IMPLEMENTATION

Developing An ERP for Torque for Flutech Engineering Implementation

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 24

CHAPTER 5

IMPLEMENTATION

Torque Calibration are categorised on certain parameters through which the entire process

will depend on it.

1. Hydraulic Torque Wrench

2. Pneumatic Torque

3. Torque Multiplier

4. Torque Tester

The following steps are carried out for calibrating Torque calibration:

Torque Multiplier:

The following are the formulas used for calculation of calibration:

Interpolation for Error readings also to be taken for different ranges.

Calculations:

S1. Mean of all readings.

S2. Corrected mean value (Mean+ Corrected_mean_std_cer )

S3. Error (DUC_Torque_reading - Corrected mean value)

S4. STD deviation:

S5. STD (All the readings)

S6. TYPEA :(STD)/SQRT(n) //n is number of readings(count)

S7. Standard, Resolution, Bending as per the specified calculations.

S8. Combined Uncertainty:SQRT[Square(each of the above 4

parameters)+(TYPEA)2]

S9. Degree of Freedom, Coverage factor, Expanded Uncertainty, Compare with Cmc

as per the previous calculations.

S10. Final Uncertainty :MAX(Cmc, Expanded Uncertainty)

In certificate we display,The following details in table format:

Reading all the trials

Mean, Corrected Mean

Deviation , % Deviation

Developing An ERP for Torque for Flutech Engineering Implementation

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 25

± Allowable Tolerance as per ISO 6789(Master Specified)

Uncertainty

Fig 5.1 Torque table 1

Fig 5.2 Torque table 2

Developing An ERP for Torque for Flutech Engineering Implementation

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 26

Calculations done from fetching the values from standard table:

The std value is to be calculated by the uncertainty value that is fetched from the

standard torque table.

Fig 5.3 Torque standard table

Developing An ERP for Torque for Flutech Engineering Implementation

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 27

Fig 5.4 Torque correction values

Torque Tester

Formulas used for the calculation of calibration of torque tester:

Mean(Tm)= avg(s1 to s5)

Correction calculations are based on the range of mean. Based on the range values

from the torque correction table with reference to torque standard table as the

parent table.

Corrected mean(Tmc=Tm- correction value;

Error=Tmc-Tm

Delta Standard=(uncertainity*Ts)/2

Fig 5.5 Torque tester calculation table

CHAPTER 6

CONCLUSION

Developing An ERP for Torque for Flutech Engineering Conclusion

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 28

CHAPTER 6

CONCLUSION

We have proposed an ERP for torque calibration that helps company to automate calibration related to

torque. The ERP provides a comprehensive framework to employ who fills in the information for a

given user. We have also given 3 visits to Flutech Engineering Pvt. Ltd to get clear picture about their

requirement.

Live demo was given with guide to company CEO, Technical Coordinator of Flutech Engineering Pvt.

Ltd. They were happy with the demo and suggested few corrections which was inculcated by next

demo given.

The project will be deployed on to the company before 5th

July 2017.

CHAPTER 7

FUTURE ENHANCEMENT

Developing An ERP for Torque for Flutech Engineering Future Enhancement

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 29

CHAPTER 7

FUTURE ENHANCEMENTS

The ERP that we have done is for torque module, the rest of the modules will be implemented by

our juniors. The other modules to be implemented are temperature, electrical, dimensional,

electro-technical etc.

The ERP has to be implemented in the company within July 5, we will be shifting from Linux to

windows platform and will we setting up the sever and installing the software on the client

computers.

A Sales analysis module will be done, so that it’ll be easy for them to get an overview of the

sales in a particular period of time.

The Certificates will be uploaded to the cloud and access to the certificates will be given through

mobile devices, so that client of Flutech Engineering Pvt. Ltd. will have easy access.

CHAPTER 8

BIBLIOGRAPHY

Developing An ERP for Torque for Flutech Engineering Bibliography

Pvt. Ltd.

Department of ISE, BMSIT 2016-2017 Page 30

CHAPTER 8

BIBLIOGRAPHY

[1] Priyanka S. Rathod et al, International Journal of Computer Science and Mobile Computing.

[2] Vishal R. Pancholi , Dr. Bhadresh P. Patel, Enhancement of Cloud Computing Security with

Secure Data Storage using AES.

[3] Secure Document Service for Cloud Computing Jin-Song Xu1, Ru-Cheng Huang, Wan-Ming

Huang, and Geng Yang.

[4] Learn to code in PHP, https://www.w3schools.com/php/

[5] Learn html , https://www.codecademy.com/courses/web-beginner-en-HZA3b/0/1

[6] Cloud Computing

https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ve

d=0ahUKEwic4rPBx9HUAhVFP48KHaxLAB8QFghPMAE&url=https%3A%2F%2Fcloud.goo

gle.com%2F&usg=AFQjCNHLsLRCgO9ZN6MPLEjI7hmpXsu-7w

[7] https://help.ubuntu.com/lts/serverguide/

[8] https://docs.phpmyadmin.net/en/latest/setup.html

[9] https://filezilla-project.org/

[10] https://www.tutorialspoint.com/php/php_loop_types.htm

[11] https://dev.mysql.com/doc/apis-php/en/

CHAPTER 9

SCREEN SHOTS

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 31

CHAPTER 9

SCREENSHOTS

Fig 9.1 Login page

This is the page where the admin and the users can login, using their username and email ids.

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 32

Fig 9.2 Inward registry

Enter the customer details and date of po/dc.

Fig 9.3 select service

Select if you want to service offsite or onsite.

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 33

Fig 9.4 Inward 1 registry-1

Fig 9.5 Inward 1 registry-2

The information about the device to be calibrated is input.

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 34

Fig 9.6 Retrieve stored data

The data stored in the inward registries can be retrieved.

Fig 9.7 Lab registry

Here the device is selected based on instrument slno.

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 35

Fig 9.8 Display

The selected device is displayed.

Fig 9.9 select calibration

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 36

Fig 9.10 enter details of device

Fig 9.11 Details of instruments

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 37

Fig 9.12 Calculation 1

Fig 9.13 Calculation 2

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 38

Fig 9.14 Certificate 1

Fig 9.15 Certificate 2

Developing An ERP for Torque for Flutech Engineering Screenshots

Pvt. Ltd

Department of ISE, BMSIT 2016-2017 Page 39

Fig 9.16 Uploading

Fig 9.17 Uploaded

CHAPTER 10

APPENDIX

IJIRST –International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 09 | February 2016 ISSN (online): 2349-6010

All rights reserved by www.ijirst.org 18

Enhancement of Cloud Computing Security with

Secure Data Storage using AES

Vishal R. Pancholi Dr. Bhadresh P. Patel

Research Scholar I/C Principal

Pacific University Udaipur, Rajasthan Matrushri L.J Gandhi (Bakorvala) BCA College Modasa,

Gujarat

Abstract

The evolution of Cloud computing makes the major changes in computing world as with the assistance of basic cloud computing

service models like SaaS, PaaS, and IaaS an organization achieves their business goal with minimum effort as compared to

traditional computing environment. On the other hand security of the data in the cloud database server is the key area of concern

in the acceptance of cloud. It requires a very high degree of privacy and authentication. To protect the data in cloud database

server cryptography is one of the important methods. Cryptography provides various symmetric and asymmetric algorithms to

secure the data. This paper presents the symmetric cryptographic algorithm named as AES (Advanced Encryption Standard). It is

based on several substitutions, permutation and transformation.

Keywords: Cloud Computing, Security, Cryptography, AES

_______________________________________________________________________________________________________

I. INTRODUCTION

Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third

party provider who owns the infrastructure. It is often provided "as a service" over the Internet, typically in the form of

infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) [6]. Cloud computing is the

broader concept of infrastructure convergence. This type of data centre environment allows enterprises to get their applications

up and running faster, with easier manageability, and less maintenance to meet business demands. For example, we can manage

and store all smartphones or tablets apps at one location i.e. cloud. So we do not require any memory space at our end. This also

gives the security of data and applications in case device is damaged or lost [1].

As the central data storage is the key facility of the cloud computing it is of prominent importance to provide the security. The

art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography.

Security goals of data cover three points namely: Availability, Confidentiality, and Integrity. Cryptography, in modern days is

considered grouping of three types of algorithms. They are

1) Symmetric-key algorithms

2) Asymmetric-key algorithms

3) Hash functions

Symmetric algorithms use the same key for encryption and decryption. This is termed as secret key. With the same key

messages are encrypted by the sender and decrypted by the receiver. It contains algorithms like Data Encryption Standard (DES),

Advanced Encryption Standard (AES), Ron's Code (RCn), and Triple DES, Blowfish etc.

Asymmetric algorithms use different keys. One key (public) is used for encryption and other (private key) is used for

decryption. This is named as public key. Public key is known to public and private key is known to the user. It comprises various

algorithms like Rivest, Shamir, & Adleman (RSA), Digital Signature Algorithm (DSA), Elliptic Curve(EC), Diffi-Hillman(DH),

El Gamal etc.

The Hash functions use a mathematical transformation to irreversibly "encrypt" information. It contains algorithms like

Message Digest, Secure Hash Algorithm [10].

We choose symmetric cryptosystem as solution as it has the speed and computational efficiency to handle encryption of large

volumes of data. In symmetric cryptosystems, the longer the key length, the stronger the encryption.

AES is most frequently used encryption algorithm today this algorithm is based on several substitutions, permutations and

linear transformations, each executed on data blocks of 16 byte. As of today, no practicable attack against AES exists. Therefore,

AES remains the preferred encryption standard for governments, banks and high security systems around the world.

II. LITERATURE REVIEW

In [1], it is proposed a simple data protection model where data is encrypted using Advanced Encryption Standard (AES) before

it is launched in the cloud, thus ensuring data confidentiality and security.

In [4], a privacy-preserving public auditing system for data storage security in cloud computing is intended, although the

computational time is increased but the privacy is preserved where data is stored in the cloud by using the most prominent

algorithm AES.

Enhancement of Cloud Computing Security with Secure Data Storage using AES (IJIRST/ Volume 2 / Issue 09/ 004)

All rights reserved by www.ijirst.org 19

In [8], AES data encryption is more scientifically capable and graceful cryptographic algorithm, but its main force rests in the

key length. The time necessary to break an encryption algorithm is straight related to the length of the key used to secure the

communication. AES allows choosing a various type of bits like 128-bit, 192-bit or 256-bit key, making it exponentially stronger

than the 56-bit key of DES.

In [3], it is described a new architecture for security of data storage in multicloud. Two mechanisms-data encryption and file

splitting are used. When user uploads a file, it is encrypted using AES encryption algorithm. Then that encrypted file is divided

into equal parts according to the number of clouds and stored into multicloud. This proposed system enhances the data security

in multicloud.

In [12], Based on the text files used and the experimental result it was concluded that AES Algorithm consumes least

encryption and RSA consume longest encryption time. They also observed that Decryption of AES algorithm is better than other

algorithms. From the simulation result, they evaluated that AES algorithm is much better than DES and RSA algorithm.

III. AES ALGORITHM

AES acronym of Advanced Encryption Standard is a symmetric encryption algorithm.

The algorithm was developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen. It is useful when we want to

encrypt a confidential text into a decryptable format, for example when we need to send sensitive data in e-mail. The decryption

of the encrypted text is possible only if we know the right password. AES is an iterative rather than Feistel cipher. It is based on

‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by

specific outputs (substitutions) and others involve shuffling bits around (permutations).

The First Step

AddRoundKey

The Following Four Functions Are Periodically Repeated

SubByte

ShiftRow

MixColumn

AddRoundKey

Final Step

SubByte

ShiftRow

AddRoundKey

Fig. 1: Encryption and decryption in AES [8]

Enhancement of Cloud Computing Security with Secure Data Storage using AES (IJIRST/ Volume 2 / Issue 09/ 004)

All rights reserved by www.ijirst.org 20

Byte Substitution (SubBytes)

The 16 input bytes are substituted by looking up a fixed table (S-box) given in design. The result is in a matrix of four rows and

four columns.

Fig. 2: Byte Substitution (SubBytes)

Shift Rows

Each of the four rows of the matrix is shifted to the left. Any entries that ‘fall off’ are re-inserted on the right side of row. Shift is

carried out as follows

First row is not shifted.

Second row is shifted one (byte) position to the left.

Third row is shifted two positions to the left.

Fourth row is shifted three positions to the left.

The result is a new matrix consisting of the same 16 bytes but shifted with respect to each other.

Fig. 3: ShiftRows

Mix Columns

Each column of four bytes is now transformed using a special mathematical function. This function takes as input the four bytes

of one column and outputs four completely new bytes, which replace the original column. The result is another new matrix

consisting of 16 new bytes. It should be noted that this step is not performed in the last round.

2 3 1 1

1 2 3 1

1 1 2 3

3 1 1 2

Addroundkey

The 16 bytes of the matrix are now considered as 128 bits and are XORed to the 128 bits of the round key. If this is the last

round then the output is the ciphertext. Otherwise, the resulting 128 bits are interpreted as 16 bytes and we begin another similar

round.

IV. CONCLUSION

According to a report, “Worldwide and Regional Public IT Cloud Services 2012-2016 Forecast” released by IDC, cloud services

will see as much as 41% growth from 2013 to 2016. Spending on IT cloud services worldwide will edge toward $100 billion by

2016 [13]. And in all this cloud growth, security will play a key role. AES encryption is the fastest method that has the flexibility

and scalability and it is easily implemented. On the other hand, the required memory for AES algorithm is less than the Blowfish

algorithm. AES algorithm has a very high security level because the 128, 192 or 256-bit key are used in this algorithm. It shows

Enhancement of Cloud Computing Security with Secure Data Storage using AES (IJIRST/ Volume 2 / Issue 09/ 004)

All rights reserved by www.ijirst.org 21

resistance against a variety of attacks such as square attack, key attack, key recovery attack and differential attack. Therefore,

AES algorithm is a highly secure encryption method. Data can also protect against future attacks such as smash attacks. AES

encryption algorithm has minimal storage space and high performance without any weaknesses and limitations while other

symmetric algorithms have some weaknesses and differences in performance and storage space.

REFERENCES

[1] Abha Sachdev, Mohit Bhansali “Enhancing Cloud Computing Security using AES Algorithm” International Journal of Computer Applications (0975 –

8887) Volume 67– No.9, April 2013

[2] Dr.S.Gunasekaran, M.P.Lavanya “ A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS” (IJAER) 2015, Vol. No. 9, Issue No. IV, April ISSN: 2231-5152

[3] Rashmi S. Ghavghave, Deepali M. Khatwar “Architecture for Data Security In Multicloud Using AES-256 Encryption Algorithm” International Journal on

Recent and Innovation Trends in Computing and Communication Volume: 3 Issue: 5 ISSN: 2321-8169 [4] Mr. Santosh P. Jadhav, Prof. B. R. Nandwalkar “Efficient Cloud Computing with Secure Data Storage using AES” International Journal of Advanced

Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015 ISSN (Online) 2278-1021

[5] Namita N. Pathak, Prof. Meghana Nagori “Enhanced Security for Multi Cloud Storage using AES Algorithm” International Journal of Computer Science and Information Technologies, Vol. 6 (6), 2015 ISSN:0975-9646

[6] R. H. Sakr, F. Omara, O. Nomir “An Optimized Technique for Secure Data Over Cloud OS” International Journal of Emerging Trends & Technology in

Computer Science (IJETTCS) Volume 3, Issue 3, May-June 2014 ISSN 2278-6856 [7] Ranjit Kaur, Raminder Pal Singh “Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques” SSRG International

Journal of Mobile Computing & Application (SSRG-IJMCA) – volume 2 Issue 3 May to June 2015

[8] P.V.NITHYABHARATHI, T.KOWSALYA, V.BASKAR “To Enhance Multimedia Security in Cloud Computing Environment Using RSA and AES” International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 2, February 2014

[9] T. Shobana Maheswari, S. Kanagaraj and Shriram K. Vasudevan “Enhancement of Cloud Security Using AES 512 Bits” Research Journal of Applied

Sciences, Engineering and Technology ISSN: 2040-7459; e-ISSN: 2040-7467 November 25, 2014 [10] Disha Shah, “Digital Security Using Cryptographic Message Digest algorithm”, International Journal of Advance Research in Computer Science and

Management Studies, Volume 3, Issue 10, October 2015.

[11] Dr. Prerna Mahajan & Abhishek Sachdeva “A Study of Encryption Algorithms AES, DES and RSA for Security” Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Online ISSN: 0975-4172 & Print ISSN: 0975-4350

[12] Rachna Arora, Anshu Parashar “ Secure User Data in Cloud Computing Using Encryption Algorithms” International Journal of Engineering Research and

Applications (IJERA) Vol. 3, Issue 4, Jul-Aug 2013 ISSN: 2248-9622 [13] Enterprise and Individual Users to fuel Growth in Cloud Computing [Online]. Available: http://www.redorbit.com/news/technology/1112692915/cloud-

computing-growth-paas-saas-091212/

[14] Kiruthika.R, Keerthana.S, Jeena.R “ Enhancing Cloud Computing Security using AES Algorithm” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 3, March 2015 ISSN: 2277 128X