You are on page 1of 52

` 50/ISSN 0970-647X | Volume No. 38 | Issue No.

10 | January 2015

Cover Story
Cloud Computing: A Paradigm
Shift in IT Infrastructure 7

www.csi-india.org

Cover Story
Web-Scale IT: Solution for
Managing Enterprise IT
Infrastructure Challenges 11

Research Front
Innovations in India
Network Biology: A New Way to Software Product Engineering
Understand Complex Disease Maturity Model 30
and Future of Medicine 20

Security Corner
A Case Study of Lemons
& Melons Inc. 34

Security Corner
Trolls, Trolling & Cyber
Law 36
CSI Communications | January 2015 | 1

CSI-2014 the Computer Society of Indias the 49th Annual Convention and International Conference on Emerging ICT for Bridging Future was held from
12-12-2014 to 14-12-2014 at JNTU Hyderabad.
The Convention was held in association with JNTU and DRDO. Government of Telangana State, DRDO and JNTU have partnered the event. The Conference
was well attended and it was a festival of feasts from the best Technical Sessions.

Day 1 : 12-12-2014eGov Knowledge Sharing Summit - Digital Telangana with


four sessions
1.

2.

3.
4.

Inaugural Session with Chief Guest Mr. Rajeev Sharma Chief Secretary Telangana State
Presided by Mr. Mahaliingam, Past President CSI, Guest of Honor Dr. Piyush Gupta,
Chairman CSI SIGeGov.Welcome address: Mr. JA Chowdary, OC.
Digital Telangana The Road Ahead Session: chaired by Mr. AS Samesh Director IT
Telangana State. Moderator: Dr. Ashok Agarwal; Panelists: Prof.MP Gupta, IIT Delhi;
Mr. Biju Kadapurath, PWC
eGov 2.0 Session: Chaired by Dr. Jaijeet Bhattacharya, KPMG
Panelists: Prof. Ajit Rangnekar, ISB Hyderabad, Mr. Lalith S. Choudary Director CISCO.
Integrating eGovernance Applications, Chaired by Dr. Sateesh Reddy, Director rci.
Moderator: Dr Srinath Chakravarthy Vice President NISG, Panelists: Mr Mohd Y Sarulla,
Director KSITM, Mr Thomas Mathew Vice President SAP, Mr Arpan Bansal, Newgen.

K Mohan Raidu
Convention Convenor & KSS
Coordinator

Inaugurating the Summit, Telangana State Chief Secretary Rajeev Sharma urged IT Professionals to
partner the state as it seeks to retain the predominance in e-governance enjoyed by erstwhile Andhra
Pradesh.
The need, he said, is to take IT initiatives closer to the people at nominal costs and to make them user
friendly. eGovernance was the only answer if the thrust is on efficient and corruption free service
delivery for the citizens.
He said the Data Security was a major concern for the state government due to the rise in instances of
Dr Rajeev Sharma
Chief Secretary, Telangana State cybercrimes in the country.
Director Communications in IT, Electronics and Communications Department AS Ramesh said,
Telangana Government wants the Central Project of providing broadband connectivity to all gram
panchayats implemented across the State at one go since that would provide people greater
access to e-Governance initiatives as also help avoid delays on account of a phased rollout. The
Centre's response to the request is awaited.
National Cyber Security Policy 2013 estimates the need for ve lakh cyber security professionals
and the state wants to impart cyber security training to as many engineering students as possible.

AS Ramesh
Director IT, Govt of Telangana

Keynote Address of day was delivered E Sridharan, popularly known as Metro Man.
Swamy Bhoomananda Thirtha has spoken on Inner Management of Human Excellence.

Paper presentation and Tutorials were held at UGC Auditorium in parallel Sessions
Day 2 : 13-12-2014
Dr. S S Mantha (Chairman, AICTE) has delivered Key Note Address on (Digital India - Opportunities and Challenges Ahead).
First session was on Cloud Computing Technologies & Strategies for Business, for which the moderator was Mr. Chandra Shekar Babu
Talluri (VP, OTSI) and the panelists were, Mr. Yogesh Sawant (Director, Partner Sales & Field Alliance Organisation, India, Hitachi Data
Continued on Page C

CSI Communications
Contents
Volume No. 38 Issue No. 10 January 2015

Editorial Board
Chief Editor
Dr. R M Sonar
Editors
Dr. Debasish Jana
Dr. Achuthsankar Nair
Resident Editor
Mrs. Jayshree Dhere

Cover Story

7
11

Cloud Computing: A Paradigm Shift


in IT Infrastructure

13

Impact of Cloud Computing on the


Conventional IT Infrastructure

Debranjan Pal, Sourav Chakraborty and Amitava Nag

Web-Scale IT: Solution for Managing


Enterprise IT Infrastructure Challenges
Prerna Lal

Technical Trends

Design, Print and


Dispatch by
CyberMedia Services Limited

17

Adopting Cloud way for IT Needs Issues


and Challenges

20

Network Biology: A New Way to


Understand Complex Disease and Future
of Medicine

Articles

23

Mapping the Architecture and Quality


Attributes of Information Systems in
Context to Internal Security
Rakesh Kumar and Hardeep Singh

25
Please note:
CSI Communications is published by Computer
Society of India, a non-prot organization.
Views and opinions expressed in the CSI
Communications are those of individual authors,
contributors and advertisers and they may
differ from policies and official statements of
CSI. These should not be construed as legal or
professional advice. The CSI, the publisher, the
editors and the contributors are not responsible
for any decisions taken by readers on the basis of
these views and opinions.
Although every care is being taken to ensure
genuineness of the writings in this publication,
CSI Communications does not attest to the
originality of the respective authors content.
2012 CSI. All rights reserved.
Instructors are permitted to photocopy isolated
articles for non-commercial classroom use
without fee. For any other copying, reprint or
republication, permission must be obtained
in writing from the Society. Copying for other
than personal use or internal reference, or of
articles or columns not owned by the Society
without explicit permission of the Society or the
copyright owner is strictly prohibited.

29

Quick Response Code (QR Code) and


other Automatic Identication and
Data Capture (AIDC) Technologies

S Palani Murugan

Programming.Tips()
Fun with C++ Programs Exploring
Function Calls While using the
Ternary Operator
Wallace Jacob

Innovations in India

30

Prof (Dr.) D G Jha and Ms. Kimaya Ambekar

Dr. Khalid Raza

Information Visualization for Data


Analytics

Practitioner Workbench

Dr. Prema K V

Research Front
Published by
Executive Secretary
Mr. Suchit Gogwekar
For Computer Society of India

28

Software Product Engineering


Maturity Model
Hari Kishore and Gururaj Anjan

Security Corner

32

Information Security
A Security Solution for Rogue Wi-Fi
Access Point
Hemant Kumar Saini

34

Case Studies in IT Governance, IT Risk


and Information Security
A Case Study of Lemons & Melons Inc.
Dr. Vishnu Kanhere

36

IT Act 2000
Trolls, Trolling & Cyber Law
Prashant Mali

Mr. K.V.N. Rajesh and Mr. K.V.N. Ramesh

PLUS
Brain Teaser

38

Dr. Debasish Jana

Happenings@ICT
H R Mohan

39

CSI Reports

40

CSI Report

41

CSI News

42

Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.
Tel. : 022-2926 1700 Fax : 022-2830 2133 Email : hq@csi-india.org Printed at GP Offset Pvt. Ltd., Mumbai 400 059.

CSI Communications | January 2015 | 3

Know Your CSI


Executive Committee (2013-14/15)
President
Mr. H R Mohan
president@csi-india.org

Vice-President
Prof. Bipin V Mehta
vp@csi-india.org

Hon. Secretary
Mr. Sanjay Mohapatra
secretary@csi-india.org

Hon. Treasurer
Mr. Ranga Rajagopal
treasurer@csi-india.org

Immd. Past President


Prof. S V Raghavan
ipp@csi-india.org

Nomination Committee (2014-2015)


Prof. P. Kalyanaraman

Mr. Sanjeev Kumar

Mr. Subimal Kundu

Region - I
Mr. R K Vyas
Delhi, Punjab, Haryana, Himachal
Pradesh, Jammu & Kashmir,
Uttar Pradesh, Uttaranchal and
other areas in Northern India.
rvp1@csi-india.org

Region - II
Mr. Devaprasanna Sinha
Assam, Bihar, West Bengal,
North Eastern States
and other areas in
East & North East India
rvp2@csi-india.org

Region - III
Prof. R P Soni
Gujarat, Madhya Pradesh,
Rajasthan and other areas
in Western India
rvp3@csi-india.org

Region - V
Mr. Raju L kanchibhotla
Karnataka and Andhra Pradesh
rvp5@csi-india.org

Region - VI
Dr. Shirish S Sane
Maharashtra and Goa
rvp6@csi-india.org

Region - VII
Mr. S P Soman
Tamil Nadu, Pondicherry,
Andaman and Nicobar,
Kerala, Lakshadweep
rvp7@csi-india.org

Division-I : Hardware (2013-15)


Prof. M N Hoda
div1@csi-india.org

Division-II : Software (2014-16)


Dr. R Nadarajan
div2@csi-india.org

Division-III : Applications (2013-15)


Dr. A K Nayak
div3@csi-india.org

Division-IV : Communications
(2014-16)
Dr. Durgesh Kumar Mishra
div4@csi-india.org

Division-V : Education and Research


(2013-15)
Dr. Anirban Basu
div5@csi-india.org

Regional Vice-Presidents

Division Chairpersons

Region - IV
Mr. Hari Shankar Mishra
Jharkhand, Chattisgarh,
Orissa and other areas in
Central & South
Eastern India
rvp4@csi-india.org

Publication Committee (2014-15)


Dr. S S Agrawal
Prof. R K Shyamasundar
Prof. R M Sonar
Dr. Debasish Jana
Dr. Achuthsankar Nair
Dr. Anirban Basu
Prof. A K Saini
Prof. M N Hoda
Dr. R Nadarajan
Dr. A K Nayak
Dr. Durgesh Kumar Mishra
Mrs. Jayshree Dhere

Chairman
Member
Member
Member
Member
Member
Member
Member
Member
Member
Member
Member

Important links on CSI website


About CSI
Structure and Orgnisation
Executive Committee
Nomination Committee
Statutory Committees
Who's Who
CSI Fellows
National, Regional & State
Student Coordinators
Collaborations
Distinguished Speakers
Divisions
Regions
Chapters
Policy Guidelines
Student Branches
Membership Services
Upcoming Events
Publications
Student's Corner
CSI Awards
CSI Certification
Upcoming Webinars
About Membership
Why Join CSI
Membership Benefits
BABA Scheme
Special Interest Groups

http://www.csi-india.org/about-csi
http://www.csi-india.org/web/guest/structureandorganisation
http://www.csi-india.org/executive-committee
http://www.csi-india.org/web/guest/nominations-committee
http://www.csi-india.org/web/guest/statutory-committees
http://www.csi-india.org/web/guest/who-s-who
http://www.csi-india.org/web/guest/csi-fellows
http://www.csi-india.org/web/guest/104
http://www.csi-india.org/web/guest/collaborations
http://www.csi-india.org/distinguished-speakers
http://www.csi-india.org/web/guest/divisions
http://www.csi-india.org/web/guest/regions1
http://www.csi-india.org/web/guest/chapters
http://www.csi-india.org/web/guest/policy-guidelines
http://www.csi-india.org/web/guest/student-branches
http://www.csi-india.org/web/guest/membership-service
http://www.csi-india.org/web/guest/upcoming-events
http://www.csi-india.org/web/guest/publications
http://www.csi-india.org/web/education-directorate/student-s-corner
http://www.csi-india.org/web/guest/csi-awards
http://www.csi-india.org/web/guest/csi-certification
http://www.csi-india.org/web/guest/upcoming-webinars
http://www.csi-india.org/web/guest/about-membership
http://www.csi-india.org/why-join-csi
http://www.csi-india.org/membership-benefits
http://www.csi-india.org/membership-schemes-baba-scheme
http://www.csi-india.org/special-interest-groups

Membership Subscription Fees


Membership and Grades
Institutional Membership
Become a member
Upgrading and Renewing Membership
Download Forms
Membership Eligibility
Code of Ethics
From the President Desk
CSI Communications (PDF Version)
CSI Communications (HTML Version)
CSI Journal of Computing
CSI eNewsletter
CSIC Chapters SBs News
Education Directorate
National Students Coordinator
Awards and Honors
eGovernance Awards
IT Excellence Awards
YITP Awards
CSI Service Awards
Academic Excellence Awards
Contact us

http://www.csi-india.org/fee-structure
http://www.csi-india.org/web/guest/174
http://www.csi-india.org /web/guest/institiutionalmembership
http://www.csi-india.org/web/guest/become-a-member
http://www.csi-india.org/web/guest/183
http://www.csi-india.org/web/guest/downloadforms
http://www.csi-india.org/web/guest/membership-eligibility
http://www.csi-india.org/web/guest/code-of-ethics
http://www.csi-india.org/web/guest/president-s-desk
http://www.csi-india.org/web/guest/csi-communications
http://www.csi-india.org/web/guest/csi-communicationshtml-version
http://www.csi-india.org/web/guest/journal
http://www.csi-india.org/web/guest/enewsletter
http://www.csi-india.org/csic-chapters-sbs-news
http://www.csi-india.org/web/education-directorate/home
http://www.csi-india.org /web/national-studentscoordinators/home
http://www.csi-india.org/web/guest/251
http://www.csi-india.org/web/guest/e-governanceawards
http://www.csi-india.org/web/guest/csiitexcellenceawards
http://www.csi-india.org/web/guest/csiyitp-awards
http://www.csi-india.org/web/guest/csi-service-awards
http://www.csi-india.org/web/guest/academic-excellenceawards
http://www.csi-india.org/web/guest/contact-us

Important Contact Details

For queries, correspondenceregarding Membership, contact helpdesk@csi-india.org

CSI Communications | January 2015 | 4

www.csi-india.org

Presidents Message

H R Mohan
From
: Presidents Desk:: president@csi-india.org
Subject : President's Message
Date
: 1st January 2015

Dear Members
At the outset, let me wish you all a HAPPY NEW YEAR 2015. May
this New Year 2015 be: A Year of Health & Happiness; A Year of Peace &
Prosperity; A Year of Wealth & Wisdom; A Year of Glee & Glow; And also A
Year of Love & Laughter.
The ag ship event, our annual convention CSI-2014 and the Golden
Jubilee celebrations recently held at Hyderabad during 12-14 Dec 2014 were
really memorable. The participation of Shri Ravi Shankar Prasad, Minister for
Communications & IT and Law & Justice, Govt. of India and Shri K.T. Rama
Rao, Minister for Panchayat Raj and IT, Govt. of Telengana at the inaugural
session and the presence of Shri Y.S. Chowdary, Minister of State, Science
& Technology and Earth Science, Govt. of India and Shri CH Malla Reddy,
Member of Parliament at the valedictory session added strength to the
vision and mission of CSI. The other events at the convention - Knowledge
Sharing Sessions on eGovernance, CSI Nihiliant eGovernance Awards
Presentation, Tutorials on state of the art technologies, Special sessions,
Keynote addresses, Convention theme related sessions, Contributed paper
presentations were well attended and appreciated by the delegates. An
exhibition which was also a part of this convention attracted the delegates.
CSI-2014, being one of the conventions during the Golden Jubilee period had
a good participation, exceeding 700, from all over the country.
The CSI HQ based events such as National Council meeting, Annual
General Body Meeting, Auditor-Chapter Reps Meeting, Regional/Divisional/
Chapter Meeting were well participated and had good interactions. At the
inaugural session, Life Time Achievement Awards, Honorary Fellowship and
Fellowship Awards were presented to our senior members for their services to
the Computer Society of India and accomplishments in the IT eld. In the CSI
awards function held immediately after the AGM, Service Awards and Academic
Awards were presented recognizing the services of the volunteers who are the
pillars of the society at large. Our congratulations to all the award winners and
sincere thanks for their efforts in organizing various activities at the chapters and
student branches. The release of the Compendium Envisioning a Digital India
Selected eGovernance initiatives 2014, Proceedings of the contributed papers
and a Coffee Table Book of CSI Hyderabad at CSI-2014 deserve special mention.
In this years Think Tank Meeting of CSI Fellows, around 50 fellows participated
and deliberated on the Past, Present and the Future of CSI. The wish list, short
and long term action plans will be shared in the next message. A detailed report
on CSI-2014 will be featured in CSI Communications and also be posted at the
CSI website.
On behalf of CSI Execom and my personal behalf, I wish to place on record
our sincere thanks to the support extended by Jawaharlal Nehru Technological
University (JNTU), Hyderabad. Defense Research Development Organization
(DRDO) and various sponsors for the successful conduct of CSI-2014. Our
appreciation and special thanks to Mr. J.A. Chowdary (OC), Dr. A. Govardhan
(PC) and Mr. Gautam Mahapatra (FC), Mr. Raju L Kanchibhotla (RVP-5), Mr.
Mohan Raidu (CSI-2014 Convener), Dr. Piyush Gupta (CSI SIG eGov) and the
members of the Team CSI Hyderabad, CSI fellows, CSI members, academic and
industry professionals from Hyderabad, delegates from all over the country for
making CSI-2014 a memorable convention.
The Annual Students Convention originally planned to be held prior
to CSI-2014 on 10-11, Dec 2014 at GNIT campus on the theme Campus
to Corporate and Beyond had to be postponed due to the university
examinations and the same will be held on 3-4, Jan 2015 and is being hosted
by Guru Nanak Institutions under the chairmanship of Dr. H.S. Saini. We are
thankful to Shri E.S.L. Narasimhan, Governor of Andhra Pradesh & Telengana
for consenting to inaugurate the convention and Shri K.T. Rama Rao, Minister
for Panchayat Raj and IT, Govt. of Telengana and Shri Bandaru Dattatreya,
Union Labour Minister, Govt. of India for consenting to be our guests at the
valedictory session.
I had the opportunity of participating in EAIT-2014, the 4th edition
of the International Conference on Emerging Applications of Information
Technology, organized by CSI Kolkata and held during 19-21 Dec 2014 at
Indian Statistical Institute with the technical co-sponsorships from IEEE CS,
IEEE TC-S&P, IEEE TC-CLS, BITS(Mesra) and ISI. This event is well known
for its technical content and quality of papers presented. Out of 271 papers
received, 63 were selected for oral presentation in parallel sessions. The
invited talks, keynote address and plenary talk highlighted the trends in ICT
areas. The conference proceedings edited by Dr. Debasish Jana and Dr.
Pinakpani Pal and published by IEEE CS CPS will soon be made available on
CSI Digital Library for access by our members. At the concluding session, I
was fortunate to present the CSI Life Time Achievement Award to Professor
Dwijesh Kumar Dutta Majumder, a founding member of CSI and a recipient

of the Norbert Wiener Award. On 21st Dec 2014 evening, the CSI Kolkata
Chapter had organized the Golden Jubilee celebrations and honoured the
veterans of CSI Kolkata. As Kolkata has a special place in Indian computing
and establishing the CSI, I had requested the senior members of CSI Kolkata
to contribute for the CSI History project which is looking for inputs from all
chapters, senior members and fellows.
The estimated 300 million Internet users and 200 million smartphone
users make the eCommerce scene in India quite exciting. The current (2014)
online shopping market of $3.5 billion is expected to grow to $6 billion in
2015 with the increase of online shoppers from 40 million to 65 million.
Flipkart on 6th Oct 2014 received one billion hits and achieved a sales of
$100 million. The Great Online Shopping Festival (GOSF) held during 10-12
Dec 2014 had 450 online retailers and clocked over 7 million unique visitors.
The Indian eCommerce ventures received funding to the tune of $3 billion
in the year 2014. Amazon has announced its intention to invest $2 billion
in Amazon India. IT czars like Ratan Tata, NRN Murthy, Azim Premji have
started investing in eCommerce ventures. Flipkart started in 2007 with an
investment of just four lakh rupees (about $6700) is now valued at $11 billion.
The IPO of Alibaba - the Chinese eCommerce giant (started in 1999 with a
capital of $60,000) had raised $25 billion in US and valued at $231 billion on
debut. These are some indications that the future is bright to this segment
of consumer internet companies. The eCommerce apart from offering
convenient shopping experience has the potential of making our Indian
products reach global markets; increase job potential; and spur growth in
the logistics sector. With all such excitements, this sector has attracted the
attention of the Government to draw up a regulatory framework. In all, it is
worth watching the trends in this sector.
The CSI Education Directorate is continuing its efforts in training
programmes. Recently it had organized workshops on Mobile Security,
Programming in PHP, Punarjjani workshop for special educators at
Coimbatore. They have also participated and put-up stalls for membership
drive during CeBIT India expo at Bangalore and during CSI-2014 at
Hyderabad.
It may be of interest to note that Vel Tech Dr. RR & Dr. SR Technical
University (VTU), Chennai which has an active student branch of CSI has a
full-edged eWaste recycling unit of one tonne per day capacity. VTU has
volunteered to work with CSI in creating awareness in eWaste recycling and
train entrepreneurs to set up similar units with funding from Govt. agencies.
Also its Research Park and Incubation Centre is willing to support innovative
projects and provide facilities. VTU is planning to conduct training
programmes during 2015 Jan and Feb and those interested may look forward
to announcements through CSI.
I request members to encourage the school children and college
students to participate in the Essay Contest on the theme Harnessing the
Power of ICT for our New Initiatives announced by CSI Chennai chapter and
IEEE CS & PCS Madras. For details, please visit http://goo.gl/FziCmK
I am happy to inform that the 15% Golden Jubilee discount to enroll
as Life Members in CSI has been extended till March 2015 based on the
requests received from various quarters. Please encourage your colleagues
and contacts to avail this opportunity and become members of CSI.
With best regards
H.R. Mohan
President
Computer Society of India

CSI Communications | January 2015 | 5

Editorial

Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere


Editors

Dear Fellow CSI Members,


We wish all of you a very happy year 2015!
Gone are the days when IT managers used to spend lot of their time,
efforts and money on upkeep of IT infrastructure (ITI) and worry
about it becoming legacy infrastructure in course of time. Evolution
in IT from mainframes, min-computers, PCs, client/server computing
and intranet to the Internet and also technologies like virtualization,
wireless networks, cluster computing, grid-computing, multi-core
machines, mobile computing etc. have taken care of these issues to
certain extent. However, factors such as pace of change in IT and
various different kinds of technologies and computing systems within
the organization increase the complexity of upgrading, integrating and
managing them. Since systems have become more open, connected
and accessible to outside people and computing systems, it adds
another set of challenges to IT infrastructure maintenance such as
security. Something is coming up or has already come up for rescue:
viz. cloud computing which is embarked to change drastically or
rather radically the way computing used to be done till recently! It is
likely to transform whole IT ecosystem and is going to impact various
players in the ecosystem.
Gone are the days when IT managers used to spend lot of their time, efforts
and money on upkeep of IT infrastructure (ITI) and worry about it becoming
legacy infrastructure in course of time. Evolution in IT from mainframes, mincomputers, PCs, client/server computing and intranet to the Internet and
also technologies like virtualization, wireless networks, cluster computing,
grid-computing, multi-core machines, mobile computing etc. have taken
care of these issues to certain extent.

One can safely say that cloud computing can eventually become a
panacea for all pain areas of IT managers irrespective of size of IT that
they are managing. With unprecedented increase in communication
infrastructure and availability of bandwidth to everyone assures
24x7 connectivity to remote infrastructure irrespective of wherever
it may be located in the world. Presence of big players like Microsoft,
Amazon and Google along with their massive investments in building
cloud infrastructure world-wide would make sure that computing and
storage would be available to everyone similar to other utility services
like electricity. To make readers aware of what is happening on ITI side
we are covering a related theme of IT Infrastructure in Jan 2015 issue.
We have two contributions under Cover Story section - the rst
one Cloud Computing: A Paradigm Shift in IT Infrastructure by
Debranjan Pal, Sourav Chakraborty and Amitava Nag, Assistant
Professors from Academy of Technology, West Bengal University of
Technology, Hooghly describing the signicance of cloud computing
in IT industries, its benets and various models. Authors also compare
different public cloud service providers on various parameters. In
second contribution for Cover Story section, Prof. Prerna Lal, Lecturer,
Information Management, International Management Institute, New
Delhi writes on new buzzword called Web-Scale IT, introduced by
Gartner, which is gaining attention from the rms and businesses.
She talks about key characteristics and benets of Web-scale IT for
enterprises to address IT challenges such as complexity and scale.
The contribution in Technical Trends section is about Impact of Cloud
Computing on the Conventional IT Infrastructure, by Dr. Prema K V,
Professor, Dept. of CSE, Manipal Institute of Technology, Manipal.
Under Research Front we have two contributions the rst one about
Adopting Cloud way for IT Needs Issues and Challenges by Prof (Dr.)
D G Jha, Professor and Ms. Kimaya Ambekar Academic AssociateIT, K J Somaiya Institute of Management Studies and Research,
Vidyavihar, Mumbai focussing on IaaS and business challenges
on adopting cloud; and the second contribution by Dr. Khalid Raza,
Assistant Professor, Department of CS, Jamia Millia Islamia (Central

CSI Communications | January 2015 | 6

One can safely say that cloud computing can eventually become a panacea
for all pain areas of IT managers irrespective of size of IT that they are
managing. With unprecedented increase in communication infrastructure
and availability of bandwidth to everyone assures 24x7 connectivity to
remote infrastructure irrespective of wherever it may be located in the
world. Presence of big players like Microsoft, Amazon and Google along
with their massive investments in building cloud infrastructure world-wide
would make sure that computing and storage would be available to everyone
similar to other utility services like electricity.

University), New Delhi who introduces readers about Network biology,


an emerging area of research, to understand complex diseases and
future of medicine.
We have three contributions in Article section covering various topics
- the rst one: Mapping the Architecture and Quality Attributes
of Information Systems in context to Internal Security by Rakesh
Kumar of Khalsa College for Women, Amritsar and Hardeep Singh
of Department of CSE, Guru Nanak Dev Universaity, Amritsar, the
second one: Quick Response Code and other Automatic Identication
and Data Capture Technologies by K.V.N. Rajesh of Vignan Institute
of Information Technology, Visakhapatnam and K.V.N. Ramesh,
project manager at Tech Mahindra, Visakhapatnam and the third one:
Information Visualization for Data Analytics by Prof. S Palani Murugan,
Assistant Professor, Department of IT, E.G.S Pillay Engineering College,
Nagapattinam.
In our regular Practitioner Workbench columns Programming.Tips()
section, we have an article: Fun with C++ Programs Exploring
Function Calls While using the Ternary Operator by our regular
contributor Prof. Wallace Jacob, Senior Assistant Professor, Tolani
Maritime Institute, Pune.
Under Innovations in India section, Hari Kishore and Gururaj Anjan,
Lead Architects, Software Engineering Group, Tata Consultancy
Services (TCS) introduce readers to Software Product Engineering
Maturity Model developed by TCS and its key features and various
phases involved.
In Information Security section of Security Corner column we have
two contributions - rst one a Security Solution for Rogue Wi-Fi
Access Point by Hemant Kumar Saini, M. Tech Scholar, Department
of CSE, RTU, Kota (Rajasthan) and other one by Dr. Vishnu Kanhere
of CSI-SIG on Humane Computing, covering a case study of Lemons
& Melons Inc. as part of series of case studies. The third contribution
in Security Corner column under IT Act 2000 section is by Prashant
Mali, Cyber Law & Cyber Security Expert, Author, Speaker and is titled:
Trolls, Trolling & Cyber Law.
Dr. Debasish Jana, Editor, CSI Communications presents crossword
for those who want to test their knowledge in IT Infrastructure under
Brain Teaser column. Mr. H R Mohan, President, CSI and Former AVP
(Systems), The Hindu, Chennai brings us the ICT News Briefs at a
glance under various sectors in December 2014 under regular column
Happenings@ICT.
We have other regular features like CSI Announcements, CSI Reports and
Chapter and Student Branch News.
Please send your feedback, comments and views about CSI
Communications magazine to csic@csi-india.org

With warm regards,


Rajendra M Sonar, Achuthsankar S Nair,
Debasish Jana and Jayshree Dhere
Editors

www.csi-india.org

Cover
Story

Debranjan Pal*, Sourav Chakraborty** and Amitava Nag***


*Assistant Professor, Dept. of CSE, Academy of Technology, West Bengal University of Technology, Hooghly India
**Assistant Professor, Dept. of CSE, Academy of Technology, West Bengal University of Technology, Hooghly India
***Assistant Professor and Head, Dept. of IT, Academy of Technology, West Bengal University of Technology, Hooghly India

Cloud Computing: A Paradigm Shift in IT Infrastructure


Abstract: Now-a-days many start up organizations and growing organizations are thinking about reduction of their IT infrastructure,
network and software cost by means of cloud technology. Cloud computing provides different services like infrastructure, platform,
applications etc. as utility services over internet which opens the new door to think in different way to meet the business challenges
of IT industries. This paper describes the signicance of cloud computing in IT industries with comparative study of different public
cloud service providers giants like Google (Google App-engine or GAP), Microsoft (Microsoft Windows Azure) and Amazon (Amazon
Web Service or AWS).
Keywords: IT Infrastructure, Service provider, Comparative study, On-premises, Deployment.
Introduction
Cloud computing[4][9] is a new trend of
computing where resources like storage,
computation power, network, applications
etc. are delivered as services. This
services are available to the customers as
subscription-based model i.e. pay-as-you
go. In this model, customers can get these
services on their demands regardless
of where these services are hosted and
customers have to pay depending on their
usage of services. In cloud computing,
resources are made virtual and unlimited.
Also, the resources can be provisioned
from anywhere i.e. always available
at any location. So, cloud computing
is a new paradigm where we can
provision resources dynamically, deploy
applications, and can access platformindependent services. Cloud computing,
successor of internet computing[2][10],
is a technology, where the concept of
utility, scalability, on-demand services are
incorporated. Figure 1 illustrates Internet
Computing vs. Cloud Computing.

applications; that can be accessed,


manipulated and released with minimal
management effort, less cost and minimal
service provider interaction. Cloud
computing can be dened by the following
important properties[1].
Service on demand: Cloud users can use
services on their demands, whenever
they need from any place and at any time
without making any direct communication
with cloud service provider.
Wide network access: Services can be
accessed over the network using different
devices (like laptops, mobile phones, PDA,
tablets, office computer etc.). Services
can be provisioned in any platform,
which means cloud services are platform
independent.
Pooled Resources: In cloud computing,
resources are pooled together so that
cloud providers can offer multi-tenant
services. Multi-tenant supports multiple
users to be served at a time with physical
and virtual resources. These resources
can be dynamically assigned and released

Internet Computing

(a) Internet Computing

(b) Cloud Computing


Fig. 1: Internet Computing vs. Cloud Computing

Dening Cloud in IT
According to the U.S. National Institute
of Standards and Technology (NIST)[1],
Cloud is a classical model which enable
omnipresent, convenient, on-demand
network access to a publicly accessible
pool of congurable resources like
servers, storage, network components,

according to the users choice.


Increased elasticity: There is no limit
for provisioning resources via cloud. So
services can be easily and quickly scale
in and scale out. For example, an online
shopping site uses the resources from the
cloud in terms of users. Now suppose for
any reason there is a hike in the number of

a user on a particular day. In that particular


day cloud dynamically allocates additional
resources to handle the additional users.
When the headcount comes down, he
cloud automatically restores in its normal
condition.
High Transparency: A distributed system
is able to expose itself to clients and
applications as if it is a single coherent
computer system. For example, end-users
may not have any information about the
resources exact locations but will be able
to specify their preferred location.
Metered service: In cloud computing,
services are measurable like other type of
utility services (like electricity, water etc.)
according to the usage. Cloud system
provides transparent view of usage of
services to the end-users as well as
providers. This characteristic allows cloud
users to use the services on pay-as-yougo basis.
Benets of Cloud Computing in IT
For opening a new IT business company
you have to spend a lot of money to
build up the infrastructure. After that for
maintaining this infrastructure, company
has to bear operational costs. To get
maximum revenue organizations always
want to minimize these costs. Cloud
computing technology helps to reduce
operational as well as maintenance cost
of IT infrastructure. In cloud computing,
infrastructure and software are made as
utilities. So for a new IT organization, there
is no need to invest upfront cost to build
up the infrastructure. Organizations just
requests services from the cloud service
providers, as per their requirements, by
spending minimal costs. Using cloud,
organizations are equipped with upto-date and latest version of hardware
and software. There is no need to spend
money on hardware or software license
and up-gradation. As cloud computing is
ubiquitous, anyone can access services at

CSI Communications | January 2015 | 7

Fig. 2: Cloud Users vs. Time

any time and from anywhere with internet


connection. As cloud computing offers
scalability, organizations can grow or shrink
their cloud resources on their demands.
Cloud computing categorizes the services
like Infrastructure-as-a-service, Platformas-a-service, and Software-as-a-service
etc., so organizations can make decision
about which services they require.
Infrastructure service providers make
available hardware to integrate with user
system. Platform service provider offers
runtime development environment, where
a user can develop his own application
Parameters\Type

without installing the environment.


Software-as-a-service provider provides
only existing applications for scaling
without requiring infrastructure. Using
cloud computing, organizations may take
the advantage of backup and recovery
of their organizational data. For these
reasons the cloud users are growing
rapidly as illustrated Fig. 2.
Customers can take services
like infrastructure (servers, storage,
network etc.), platform for application
development, testing, etc. from anywhere
using internet. Cloud computing can be

described using two fundamental models:


Deployment model and Service model.
Deployment Model
Deployment model of cloud computing
describes how the cloud is located.
It denes the boundary in which the
services are employed. There are four
deployment models of cloud computing:
Public, Private, Hybrid, and Community. A
comparative study[8][11] of these providers
are given in table 1.
In cloud there are two types of
resources: on-premises (clients home)
and off-premises. In Fig. 3, we have

Public Cloud

Private Cloud

Hybrid Cloud

Community Cloud

Description

In public cloud, services


are available for public
users.

Private cloud is build


up with existing private
infrastructure. This type of
cloud has some authentic
users who can dynamically
provision the resources.

Hybrid
cloud
is
a
heterogeneous
distributed
system,
resulting from a private
cloud, which incorporates
different types of services
and resources from public
clouds.

Different types of cloud


are integrated together
to meet a common or
particular need for some
organizations.

Scalability

Very High

Limited

Very High

Limited

Reliability

Moderate

Very High

Medium to High

Very High

Security

High class security

Secure

Secure

Performance

Totally Depends
service provider
Low to medium

Good

Good

Very Good

Cost

Cheaper

High Cost

Costly

Costly

Examples

Amazon EC2, Google


AppEngine

VMWare,
KVM, Xen

IBM,
HP,
VMWare
vCloud, Eucalyptus

SolaS Community Cloud,


VMWare

on

Microsoft,

Table 1: Comparison among Public, Private, Hybrid and Community Cloud

CSI Communications | January 2015 | 8

www.csi-india.org

Fig. 3: Deployment Model (Public, Private, Community and Hybrid cloud)

explained the nature of these resources in


hybrid, private, public, community cloud
and also the relationship among those.
Service Model or SPI Model
Depending on the types of services
provided by cloud, there are in three most
important service models: Infrastructureas-a-service (IaaS), Platform-as-a-service
(PaaS), Software-as-a-service (SaaS) as
shown in Fig. 4.
IaaS provides infrastructure on
demand. An organization can outsource
resources like storages, hardwares,
servers, computation power, and network
components on their demand. Here
resources are made virtual. Using the
virtualization technique virtual machine
is created with the basic hardware
components like memory, CPU, disk
storage etc. and billed according to the
usage. End users can customize the virtual
machine according to their need.
In PaaS, cloud users can get the

runtime environment to develop and


deploy their own applications. It does not
expose underlying infrastructure to the
PaaS user. It provides a middleware over
the infrastructure which has the key role
of managing and deploying applications,
load balancing, conguring, billing, policy
management etc. User does not bother
about the underlying hardware. The
runtime environment supports some
programming languages and some specic
components to develop applications. This
environment is exposed by APIs.
SaaS is a many-to-one like software
delivery model where an application is
deployed and then shared worldwide
across variety of users through internet.
SaaS incorporates the full cloud
infrastructure, software and the users
solutions stack as the service aids.
Comparisons among the Key Players in
Cloud Computing Platforms
There are mainly three public cloud service

providers: (1) Amazon Web Services[3],


(2) Windows Azure and (3) Google App
Engine[8]. A comparison among these
widely used public cloud providers are
listed in table 2.
Conclusions
Cloud computing has become a new
trend in IT firms for its scalability,
reduced cost, flexibility and availability.
But this technology currently is going
through its infant stage. Still now cloud
computing technology suffers from
privacy and security issues. Also there
are a lot of distributed system issues and
legal, compliance issues in large scale.
For an ordinary user it is very difficult
to choose a particular service provider
because different service providers
use different taxonomy for a particular
service, hence need proper guidance
and manuals. So to reach a complete
cloud computing environment with
most of the aspects we will try to resolve

Fig. 4: Three dierent service models with examples

CSI Communications | January 2015 | 9

Amazon[5][7]

Parameters

Microsoft[9]

Google[9]

1. Cloud platform[6]

Amazon Web Service

Microsoft Azure

Google AppEngine

2. Year of Launch

2006

2009

2008

3. Model Type

IaaS, PaaS

IaaS, PaaS

SaaS, PaaS

4. ComputeServices

Amazon Elastic Compute Cloud, Amazon


Elastic
MapReduce,
AWS
Elastic
Beanstalk, and AWS Cloudformation.

Windows Azure Compute:


Web Role, Worker Role,
Virtual Machine Role.

AppEngine Runtime, Task


Queues, Corn Jobs.

5. Storage Services

Amazon Simple Storage Service, Amazon


Elastic Block Store, Amazon Elastic Cache,
Amazon CloudFront.

Blobs, Azure Drive, Tables,


Queues.

Static File Server, MemCache.

6. Database Services

Amazon SimpleDB, Amazon RDS.

SQL Azure

DataStore.

7. Communication
Services

Amazon Virtual Private Cloud, Amazon


Direct
Connect,
Identity
Access
Management, Amazon Route 53, Amazon
Simple Notication Service, Amazon
Simple Mail Service, Amazon Simple
Queue Service.

Azure Content Delivery


Network, Azure Connect,
Azure Traffic Manager.

XMPP Protocol, Google Mail,


Google Talk.

8. Cost Model

Pay only for what you use and then


subscription method. There is no
minimum fee and it varies from region to
region[3].

Pay-as-you-go, then
subscription[4].

Charged on pay-per-use
basis.
An
applications
service is measured against
billable quotas, xed quotas
and per-minute quotas.

9. Supported
Environment

Red Hat Enterprise Linux, Windows Server


2003/2008, Oracle Enterprise Linux,
Microsoft
SQL
Server
Standard
2005,Fedora, Gentoo Linux

Operating system
Windows 7, Windows
Server 2008, Windows
Vista

Java Runtime Environment,


Python Runtime Environment

10. Virtualization
Models Used

Normally Amazon Machine Image uses


either paravirtual (PV) or hardware virtual
machine (HVM) technology. Amazon
uses the Xen hypervisor to host the
applications.

Hyper-V
also
known
as the Microsoft Azure
Hypervisor used to provide
virtualization of services

Technique Specic Sandbox:


Google AppEngine(Python &
JVM), Heroku(Ruby), Morph
Application Platform(Ruby)

11. Tools or Framework


Used

Amazon machine
image (AMI), Java, PHP, Python, Ruby

.NET framework.

AppEngine Framework, Java


SDK ,go, Python SDK

12. Clients Access


Interface

The AWS command line interface (CLI)


is a unied tool to manage the AWS
resources.

The Azure Cross Platform


command line interface
xplat-cli, offers set of
open source, cross platform
commands for interacting
with Azure Platform.

Objectify, a Java Data Access


API, Java Persistence API
(JPA), Java Data Objects
(JDO) interface.

13. Clouds Interaction


with on-Premise
Apps

Done by using Amazon Elastic Compute


Cloud (EC2).

Azure AppFabric uses


Service bus for messaging
and
interconnectivity
infrastructure.

Platform does not supports


to enable this scenario. But
possible through each app
using intermediary store to
communicate.

Table 2: Comparison among three popular public cloud[8]

Continued on Page 16
CSI Communications | January 2015 | 10

www.csi-india.org

Cover
Story

Prerna Lal
Lecturer, Information Management, International Management Institute, New Delhi

Web-Scale IT: Solution for Managing Enterprise IT


Infrastructure Challenges
Web-Scale IT is a new buzzword
which is gaining a lot of attention from
organizations and businesses. This
interest is justied as Gartner predicts
that 50 percent of the global enterprises
will adopt to Web-scale IT architectural
approach by 2017[1].
Web-Scale IT
Technology analyst Gartner introduced the
term Web-scale IT as a comprehensive name
for the practices and architecture developed
by Web innovators and cloud providers.
According to Gartner Web-scale IT is a
global-class computing that delivers the
capabilities of large cloud service providers
within an enterprise IT setting by rethinking
positions across several dimensions[1]. The
term is coined from the way cloud service
providers manage uctuating demands of
the clients regarding their IT infrastructure
existing as well as evolving.
Cloud computing titans Google,
Amazon, and Rackspace have altered
the way in which IT can be delivered as a
service for anything ranging from servers,
storage, applications, and networking.
They have designed and developed set of
practices which can create IT infrastructure
with extraordinary capabilities in terms of
scale, speed and agility.
Key Characteristics of Web-Scale IT
Commodity Hardware and Open-source
Software
An infrastructure can be created with
commodity hardware and open-source
software in such a way that can be
controlled by software programs. This
gives organizations an ability to customize
and control the technology stack[2]. The
use of commodity hardware (e.g., x86
servers) reduces the cost and risk of vendor
lock-in which leads to changing hardware
vendors easy and less expensive[3].
Distributed Everything
A
distributed
everything
system
design is critical for delivering a
fully distributed, scalable resilient
environment with no single point-of
failure. Distributed everything includes
distributed server/storage nodes, data,
metadata, intelligence, administration,
management, and operations control

without any resource contention. This also


enables efficient scaling of Web-scaled
infrastructure without any limitation[4].
API-based Automation and Rich
Analytics
Automation is the key to achieve
scalability, agility in case of a Web-scale
environment. Web-scale IT is software
dened environment wherein a variety of
interfaces are used for programmability and
interfacing[5]. For optimized automation of
operations, analytics are used through APIdriven programmatic interface.
DevOps
DevOps is a philosophy born to improve
delivery of IT services and provide agility
by aligning everybody involved in the
software delivery process. Specically, it
seeks to improve collaboration between
developers and operations teams[6],[7],[8].
The focus of these teams is to achieve
automation and operational efficiency
and make it possible to develop an
infrastructure that responds quickly to
the change while remaining stable and
reliable. Thus, DevOps philosophy in
case of Web-Scale IT design is to provide
always available and agile infrastructure[3].
Self-Healing System
Web-scale IT environment is expected
to perform 24/7 without any failure.
Practically individual components in a
cluster may fail at some point. To ensure
that these failures do not jeopardize the
health of the overall system, fault isolations
are enabled through softwares. Further,
automatic recovery is facilitated to make
sure 24/7 availability of the data[9].
Enterprise IT Challenges
Inherent Complexity
There are a number of factors which
contribute to the huge growth in enterprise
IT complexity. The rst challenge is to
create integration between different
computing systems such as mainframes,
client-server and Web systems. The
second challenge is the lack of common
standards which results in heterogeneous
systems from different vendors talking
through middleware systems. Finally, time
and cost constraints that results in a huge
amount of proprietary code[10].

Inefficient Silos
Prevalent IT infrastructure environments
of corporations and businesses had many
inefficient data silos and expectedly are
more costly and maintenance-driven.
Further, the frequent addition of back-up
and other redundant products for existing
physical and virtual networks compounded
issues related to silos. Consequently,
IT grapples with backup scalability and
ancillary support for multiple domains and
systems leading to ROI tradeoffs.
To be sure, managing, backing up
and maintain these separate silos of
storage across IT centers and locations
is prohibitively expensive. Because of
lack of adequate abilities for predicting
disaster scenarios, IT department heads
and managers are compelled to overprovision either performance or capacity.
Data protection built into the storage
hardware further limits them. Waste and
inefficiencies add to the costs of delivering
and managing storage.
Unpredictable Scaling
IT organizations or IT departments of
enterprises and businesses have had
to grapple with intense competitive
pressures with the advent of Webbased and cloud-based technologies and
paradigms. The pressure on IT heads and
managers are immense and they have to
perforce respond to the needs of business
rapidly and at times even preemptively.
Growing
organization
needs
and
business-driven activities and programs
necessitates making swift purchase and
procurement decisions about servers
and hardware systems, space required
on the site or offsite and estimated
budgetary requirements. The challenges
are paramount: help create a fairly uid
and scalable environment; leverage
advantages of new technologies; deliver
ways and means to execute business
processes and line/work functions as
seamlessly as possible without breaking
corporate budgets.
The Benets of Web-Scale IT for
Enterprises
Organizations and businesses had
harvested important lessons and certain
best practices from early cloud providers.
CSI Communications | January 2015 | 11

Now, in a much-changed environment


and the need to adopt world-class cloud
and Web-scale IT, they can leverage
the experiences of pioneers such as
Facebook, Amazon and Google. And
look to adopt many of the Web-scale
principles, processes and architectures
to the enterprise IT. Over time and with
increasing experience, enterprise IT
organizations of varying sizes can leverage
many of the benets of Web-scale IT.
Scale
Scale is a term which IT organizations
are familiar with and have to account
for its many dimensions and subtleties
when it comes to usage and adoption in
enterprise environments. Size is one of
the critical dimensions and is generally
measured by the numbers of physical and
virtual servers and allied hardware assets
deployed. The complexity dimension
pertains to the levels of the sophisticated
of the technology stack and the nature of
service interdependencies.
Automation facilitates the scaling up
(or down) as per demands and needs of
IT organizations. Accounting is integral
to any IT strategy that involves dynamic
provisioning of infrastructure at scale.
One of the advantages of automation is
elastic scale whether the IT organization
decides to operate in the public cloud, onpremises and or in a hybrid environment.
Web-scale IT, which is designed for
elasticity and predictability in provisioning
resources and IT assets as per changing
needs is extremely agile and highly scalable.

About the Author

Agility
Automated provisioning is the key to
agility. Apart from providing for incumbent
users, new users are provisioned rapidly.
Changes can also be affected across large
groups of users across locations. Webscale architecture also has the capability
to integrate as well as automate storage
and networking provisioning coupled
with computation. This facilitates fullprovisioning in seconds.
To ensure agility, automating
software updates as and when needed is
a must. Web-scale provides the necessary

environment that is highly adaptable and


exible. Changes can be made rapidly
and often as needed or provisioned
by IT departments. It is pertinent to
note that Web-scale is built on loosely
coupled components that can be updated
independently. As a result, the IT
infrastructure becomes highly responsible
to changing the user and /or business
needs. Web-scale pushes enterprises
towards DevOps principles, offering
continuous development/upgrades. There
is also rapid development with less risk.
Cost
The adoption of Web-scale architecture,
principles and technologies can minimize
waste. Cost reductions can be obtained
and costs can also be spread across
commodity-priced servers which would
facilitate exponential scaling. With
increasing demand, commodity servers
can be added and due to variable costs
being linear, xed costs are diluted over
the next lot of users.
Conclusion
The swift transition of the Information
Economy to a more dynamic digital
environment has fundamentally changed
consumption patterns in the business
landscape. Customers are indeed
spoilt for choices and the availability of
products and services across platforms
and availing through any devices has
pushed businesses. Emergent and new
expectations have forced organizations to
transform the way they conduct business
or miss losing out in the competitive
sweepstakes.
Enterprises across sectors and
business categories are aware of these
signicant challenges and the enabling
of corporate and business structures to
enable such digital shopping, retailing and
consumer environments. Disadvantages
and limitations of traditional IT
infrastructures still dog business visions
and competing with public cloud providers
add to the challenges. Enterprises
need to leverage learning pointers and
approaches from public cloud providers
and hyper scale datacenters to retool their

operations thinking processes.


It would behoove IT organizations
to gauge the fact that Web-scale IT
perfection will not happen immediately.
Realizing a near-optimally running
Web-scale IT environment will be
shaped by the still evolving commercial
hardware platforms which look to adopt
innovative models. Further, softwaredened approaches and paradigms and
cloud-optimized models will always
take time to reach mainstream. Verily,
the foundational block or initial step of
organizations towards a Web-scale IT
implantation should be DevOps. They act
as the foundation for coalescing business
operations and development activities
in a seamlessly organized manner which
results in rapid development of services
and applications.
Culling the best
practices of pioneers and early-stage
innovators especially with respect to
architecture, tools and technologies can
bring great benets to all organizations,
irrespective of size.
References
[1] http://www.gartner.com/newsroom/
id/2867917
[2] http://pages.chef.io/rs/opscode/
images/Automation-and-WebScale-IT.pdf
[3] http://research.gigaom.com/report/
web-scale-it-for-the-enterprisethe-journey-to-data-centermodernization/
[4] h t t p : // r e l e a s d - i m a g e s .
s 3 . a m a z o n a w s . c o m /
pdf/1403612302870.pdf
[5] h t t p : //s t eve n p o i t ra s .co m /t h e nutanix-bible/
[6] http://www.gartner.com/it-glossary/
devops
[7] h t t p s : / / w w w . c h e f . i o /
blog /2010/07/16/what-devopsmeans-to-me/
[8] http://www.cutter.com/promotions/
itj1108/itj1108.pdf
[9] h t t p s : // i s w a r a d e . w o r d p r e s s .
c o m / 2 0 1 4 / 1 0/ 2 3 /w e b - s c a l e infrastructure/
[10] http://ubiquity.acm.org /article.
cfm?id=504691
n

Prerna Lal is a Lecturer in Information Management at International Management Institute, New Delhi and a published writer in
journals and publications, both Indian and international. She is an engineer with an MBA degree (IIT-Roorkee). She is a SAP-certied
consultant and has ITIL V3 Foundation-level certicate in IT Service Management. She has more than 13 years of experience
in academics and research with areas of interest being Data Warehousing and Data Mining, Business Analytics, Management
Information System, Software Project Management, IT Service Management, Cyber Law, and Cloud Computing.

CSI Communications | January 2015 | 12

www.csi-india.org

Technical
Trends

Dr. Prema K V
Professor, Dept. of Computer Science & Engineering, Manipal Institute of Technology, Manipal

Impact of Cloud Computing on the Conventional


IT Infrastructure
Abstract: This technical article discusses the information technology(IT) infrastructure. The components of IT infrastructure and the

services it provides are presented. This is followed by Internet based utility computing more popularly known as cloud computing.
Pros and cons of adopting cloud computing are discussed followed by its impact on the traditional IT infrastructure. It is discussed
that although cloud computing is nancially advantageous and ensures GREEN IT, there are serious concerns with regard to security,
reliability, lack of control and inter-operability that need to be addressed.
Introduction
Information Technology (IT) has become
an indispensable part of modern day life
be it in our day to day activities or the
business dealings. Multiple advantages
that can be derived by the use of IT has
transformed it from being just a means
of automation into a strategic tool that
enables
organizational
efficiencies
and provides scope for more business
opportunities. Today it is being recognized
as a strategic business enabler[1]. This
has driven more and more organizations
to establish an IT Infrastructure of their
own. However, it is expensive to build and
maintain IT infrastructure.
An IT Infrastructure consists of all
the components that are needed to deliver
IT services to customers. It comprises
of everything that is needed to deliver
cheaper, efficient and effective solutions.
IT Infrastructure can be dened as the
system of hardware, software, facilities
and service components that support
the delivery of business systems and IT
enabled
processes.
It
consists
of
hardware
devices
such
as
computers(client machines or servers),
networking devices(switches or routers),
transmission media(copper or optical
ber), and system software such as
operating systems as well as services
used in common across an organization
irrespective of the project being carried
out. It serves as the foundation upon
which mission/program/project specic
systems and capabilities are built.
Components of IT Infrastructure
The IT Infrastructure ecosystem consists
of seven components that operate in a
coordinated fashion to provide a coherent
IT infrastructure.
The seven components[2] are as
follows:
i.
Computer Hardware: It includes
computers such as client machines,

Fig. 1: IT Infrastructure Ecosystem[1]

ii.

iii.

iv.

server machines and modern


mainframes. Ex: IBM blade servers,
Dell Power Edge servers etc.
Operating Systems: It is the software
that controls the execution of
application programs and acts as
an interface between the user and
computer hardware. Ex: Windows
operating system, UNIX, LINUX,
MAC os etc.
Enterprise Software Applications:
It encompasses a large number of
users and extends even beyond the
organizations boundary. Ex: SAP or
Oracle PeopleSoft and middleware
software that are used to link a rms
existing application systems.
Data Management and Storage:
Data and les are managed by
database management software and
stored in storage devices. Ex: Data
management software and storage
by IBM DB2, Microsoft SQL server,
Data Centers etc. A data center is
a centralized facility having a large
number of powerful networked
computers and their peripherals and
is used for storage, management
and dissemination of data and
information. Data can be stored on

disks, tapes or SANs(Storage Area


Networks).
v. Networking
and
telecommunications
platforms: They use TCP/
IP computer network model
with the associated protocols
and interconnecting devices
such as bridges, switches,
routers, gateways etc.
vi. Internet platforms: Comprises
of all the infrastructure
needed to establish intranets/
extranets including web
hosting. Ex: IBM Web sphere
is an Internet platform.
vii.Consulting and system integration
services: At times it may be necessary
to integrate the companys legacy
systems into the latest technology
or infrastructure. Ex: Accenture
Management Consulting provides
expertise in this regard.
Services Provided by IT Infrastructure
IT infrastructure involves huge expenditure
and it is a complex set up. But once set
up effective use of IT infrastructure has
helped the organizations to redene
their business models, improve customer
experience and make prots in their
business in the long run. Some of the
services for which IT infrastructure is
being used are as follows:

Banking & Financial Services

Communications

Consumer Goods

Education

Energy & Utilities

Healthcare

Information Services

Insurance

Life Sciences

Manufacturing

Media & Entertainment

Retail Technology

Transportation & Logistics

CSI Communications | January 2015 | 13

Travel & Hospitality


Insurance companies in Britain and
the United States[3] use GPS devices
and sensors to record the speed of
cars and even the damage caused
to them. In manufacturing, radio
frequency identification (RFID) tags
now provide insights into the way goods
move through supply chains and thus
reduce inventory levels. In both cases,
infrastructure supports and manages
the sensors and other devices needed
to capture information reliably and
inexpensively.
Pharmaceutical
companies
and manufacturers deploy low-cost
computing grids that, respectively, make
it possible to develop and test drugs and
to develop products that would have
been inconceivable even a decade ago.
Across industries, fast reaction times
give companies advantages such as the
ability to set up sales offices in rapidly
growing territories quickly, to give
customers strong off-site support for their
initiatives, or to meet demand for services
when online interactions surge. The best
infrastructure units can support all of
these goalsand more.
The best retailers and service providers
let their customers interact with them
via cell phones, call centers, and kiosks,
as well as in person. To get the customer
experience right, companies must be able
to switch and route consumers across
different types of networks exibly. Only a
well-tuned infrastructure can provide that
kind of exibility.
Cloud Computing
Cloud computing is the latest IT buzzword.
It has started a new phase in the evolution
of IT. The simplest working denition of
cloud computing is being able to access
les, data, programs, and third party
services from a web browser via the
Internet that are hosted by a third party
provider[4]. It is a new paradigm that
provides Internet based utility computing.
It provides a convenient on-demand
network access to a shared pool of
congurable computing resources (such
as servers, networks, storage, applications
and services) that can be rapidly
provisioned and released with minimal
management effort or service provider
interaction[5]. It is a pay as you use facility
wherein you have to pay only when you use
the infrastructure, platform or software.
However here customers only see the
services and may not have knowledge

CSI Communications | January 2015 | 14

Fig.2: Cloud Infrastructure[6][7]

about
implementation/infrastructure
used by the service providers.
Components of Cloud Technology
Cloud is a complex set of numerous
components, the prominent ones being
the end user (cloud service consumer),
cloud service provider, data center and a
network[5].
The end users are clients which
interact with the system and demand for
services as per their requirement. They
may be mobile clients, thin clients, or thick
clients. Mobile clients run on laptops,
PDAs, or smart phones. Thin clients have
neither hard drives nor DVD ROM drives
and largely depend on the server. Thick
clients are regular computers, using a web
browser to connect to the cloud and are
self-sufficient in terms of accessories. As
compared to thick clients, thin clients are
less expensive to maintain, and use less
energy.
Cloud service providers are the
agents which host the servers in the cloud
and deliver service to the end users. Ex:
Google, Amazon, IBM, Rackspace.
Data center is a collection of servers
where the applications are residing. It
essentially consists of servers, storage
and network. Servers may be virtualized
as well as geographically dispersed.
The network such as Internet is the
communication channel between the
consumer and the service provider.
Cloud Services
Cloud computing employs a service
driven business model. Cloud services
are broadly classified as Infrastructure
as a Service (IaaS), Platform as a Service
(PaaS), and Software as a Service
(SaaS)[5][10].

IaaS model refers to on demand


provisioning of resources, usually in terms
of virtual machines. Here the consumer
does not have control over the underlying
infrastructure but has control over the
operating systems, storage and deployed
applications. Ex: IaaS providers such as
Amazon EC2 and GoGrid.
PaaS model provides platform level
resources and enables the customer to
deploy his applications into the cloud
infrastructure using the programming
language or tools supported by the
cloud provider. The customer has control
over the deployed applications. It also
provides solutions for integrating cloud
computing into existing applications,
services and infrastructure with a market
oriented approach. Ex: PaaS providers
such as Google App Engine and Microsoft
Windows Azure.
SaaS model enables the customer to
use the applications existing in the cloud.
These applications are installed by the
service provider. Ex: SaaS providers such
as Rackspace and Salesforce.com.
Cloud: Pros and Cons
One of the main reasons for the adoption
and popularity of the cloud system is the
Low IT investment, where the consumer
does not need to purchase the resources.
As a result start-up companies do not
need a heavy investment in setting up
an IT rm. Use of cloud removes IT
infrastructure management overhead and
provides immediate access to a broad
range of applications. Another reason
for the popularity of cloud computing is
due to Elasticity, where the computing
demand of a service consumer grows and

www.csi-india.org

shrinks dynamically in accordance with


current resource requirement. The current
trend is to preserve ozone depletion. Use
of cloud ensures Green Computing.
By consolidating the IT operations of
multiple consumers at a single data
center, an effective resource sharing is
achieved leading to a reduction in power
consumed by the computing and cooling
equipment[5].
Use of cloud also poses a number
of concerns such as lack of control,
security, reliability, and inter-operability
among multiple service providers. These
concerns may prevent all organizations
to go for cloud computing. Suitable
solutions need to be provided to overcome
these concerns. Organizations can also
establish their own private clouds. It is
highly necessary that IT firms negotiate
proper service level agreements to
ensure that the cloud infrastructure
that they are going to use is protected,
secure and backed up regularly. A recent
survey by Cloud Security Alliance (CSA)
and IEEE indicates that enterprises
across sectors are eager to adopt cloud
computing but that security are needed
both to accelerate cloud adoption on a
wide scale and to respond to regulatory
drivers[9].

Impact of Cloud Computing on IT


Infrastructure
The biggest impact of cloud computing
on traditional IT infrastructure is that
users no longer need to own their own
infrastructure. Thanks to cloud computing,
organizations/businesses can now have
virtual off-site IT infrastructures that are
much more affordable than the traditional
in-house local IT infrastructures. As
a result users of the cloud can avoid
capital expenditure by renting usage of
infrastructure from a third party provider.
In doing so, users consume resources as
a service and only pay for those that they
use. By moving over to cloud companies
need not purchase licensed software,
they need not establish and maintain data
centers of their own. Hence they will be
saving on hardware investment, physical
space, and personnel needed to run and
maintain the data centers. Cloud vendors
create virtual servers on large hardware
platforms so that they can scale up or
down quickly and house many customers
on a single piece of server hardware.
This achieves the economies of scale
unavailable to the typical data center,
even if the data center is already heavily
virtualized. This is especially helpful for
businesses that have erratic loads on their
computing infrastructures[8].

Just like Internet, cloud computing


will become popular and will be widely
used by one and all in the days to come.
It may severely affect the prots of
computer
hardware
manufacturing
industries. In the long run traditional data
centers may disappear. It will also impact
the IT job skills that one must have. Cloud
like Internet, will make the geographical
boundaries more irrelevant.
Having realized clouds potential, more
and more organizations are moving over to
cloud. By going for a private cloud solution,
Europe Airpost, a French airliner observed
a 66% reduction in the companys servers
as well as lowering of energy and cooling
requirements. The cloud infrastructure
helped Europe Airpost to improve its overall
cost efficiency and reduce its application
response times by up to 33%.
Washington
State
Universitys
School of Electrical Engineering and
Computer Science which uses the cloud
platform vSphere 4 claims that cloud
computing has enabled it to expand
the services it offers to faculty and
students[11]. Kentuckys Pike County
district introduced cloud computing in
its schools, as a result of which 1,400
old computers, ready for scrap, were
transformed into fully functioning virtual
machines using which computer based
formative assessment could be carried
out. This is because cloud eliminates
the need for a hard drive on the local
computer and processing takes place
on the cloud. By hosting the desktops in
IBMs data center, Pike County was able
to avoid the additional infrastructure
and staffing costs of administering the
servers. A number of higher education
institutions in UK such as University of
Aberdeen, University of Westminster etc.
have adopted Google Apps. According
to the research rm IDC, 85% of new
software being built today is for the cloud.
Pearson is using the cloud to transform
the way it delivers education worldwide[12].
Cloud journey is different for different
organizations. Some start with an enterprise
wide cloud strategy while others start
small and grow fast. The benets of cloud
are also leveraged by Militzer and Munch
group, an international logistics company
in Switzerland, a local transportation
system operator Yarra Trams in Melbourne,
Australia and Delhaize America, a grocery
chain operator.

CSI Communications | January 2015 | 15

Conclusion
For any organization to leverage IT for
its smooth and efficient functioning, IT
infrastructure is a necessity. However, today,
instead of setting up their own dedicated
physical IT infrastructure, organizations can
deploy their business on the cloud. This has
enabled small and medium sized companies
as well as startups to realize their business
dreams with a small budget. However, cloud
service providers need to ensure safety,
reliability and inter-operability as per the
business needs of the users.
References

About the Author

[1]

Sudeep Mallick et al. Principles of


Enterprise IT Architecture, Wiley India

Pvt. Ltd., 2006.


[2] Laudon Kenneth C, Management
Information Systems: Managing the
Digital Firm, 11th edition, Pearson
Education India, 2010.
[3] www.mckinsey.com/insights/business_
technology/ where_ it _infrastructure_
and_business_strategy_meet.
[4] Won Kim, Cloud Computing: Today and
Tomorrow, Sungkyunkwan University,
Suwon, S. Korea. http://www.jot.fm/
issues/issue_2009_01/column4/
[5] Pranab Kumar Das Gupta et al., Cloud
Computing-Based
Projects
Using
Distributed Architecture, PHI Learning
Pvt. Ltd., 2013.
[6] www.c3dmw.com
[7] www.tecnologicodominicano.com

[8] h t t p : //s m a l l b u s i n e s s . c h r o n . c o m /
description-effect-cloud-computingtraditional-infrastructure- 69534.html
[9] S Subashini, V Kavitha, A survey on
security issues in service delivery models
of cloud computing, Journal of Network
and Computer Applications, vol. 34, pp.
1-11, Jan 2011, Elsevier Ltd.
[10] Qi Zhang, Lu Cheng, and Raouf Boutaba,
Cloud Computing: state-of-the-art and
research challenges, Journal(Springer) of
Internet Services and Applications, vol.1,
issue 1, pp.7-18, May 2010.
[11] Nabil Sultan, Cloud Computing for
education: A new dawn? International
Journal of Information Management,
Elsevier Limited 2009.
n
[12] www.ibm.com/cloud

Dr. Prema K V is currently working as professor, department of Computer Science & Engineering, Manipal Institute of Technology, Manipal,
Karnataka. She has more than 20 years of teaching experience. Her areas of research interest are soft computing, computer networks and
security. She has published more than 80 research papers in several national and international journals and conferences.

Continued from Page 10


the security anxieties and compliance
issues.
References
[1] Peter Mell Timothy Grance, The
NIST Denition of Cloud Computing,
Recommendations of the National
Institute of Standards and Technology,
US Department of Commerce, Special
Publication 800-145.
[2] Dikaiakos, M, Pallis, G, Katsaros, D,
Mehra, P, & Vakali, A (2009). Cloud
computing: Distributed internet
computing for it and scientic
research. IEEE Internet Computing,
13(5), 1013.
[3] Amazon Web Services User Guide:
Amazon EC2 Cost Comparison

Calculator, February 2010.


[4] Saurabh Kumar Garg and Rajkumar
Buyya, Green Cloud computing
and Environmental Sustainability,
Cloud computing and Distributed
Systems (CLOUDS) Laboratory, The
University of Melbourne, Australia.
[5] Jinesh Varia/Sajee Mathew, Amazon
Web Services Overview of Amazon
Web Services, January 2014.
[6] David Chappell, A Short Introduction
to Cloud Platforms- An EnterpriseOriented View, August 2008.
[7] Amazon Web Services: The
Economics of the AWS Cloud vs.
Owned IT Infrastructure, December
2009.
[8] Noman Islam and Aqeel-ur-Rehman,

A comparative study of major service


providers for cloud computing.
[9] Rajkumar Buyya, Christian Vecchiola,
S
ThamaraiSelvi,
Mastering
Cloud
Computing
Foundations
andApplications
Programming,
Morgan Kaufmann Publication,
Elsevier.
[10] Rajkumar
Buyya,
Karthik
Sukumar, Platforms for Building
and
Deploying
Applications
for
Cloud
Computing,
CSI
Communications,35(3),2011,6 11.
[11] J K Verma and C P Katti, Study of
Cloud Computing and its Issues: A
Review, Smart Computing Review,
vol. 4, no. 5, October 2014.
n

About the Authors

Debranjan Pal has received his M.Tech from the Dept.of Computer Science & Engineering, University of Calcutta,
India. Currently he is working as Assistant Professor, Dept. of CSE, Academy of Technology, W.B., India. His interest
areas are DataStructure, Cryptography and Network Security, Steganography, Mobile Communication, Computer
Network, Cloud Computing.
Sourav Chakraborty has received his M.Tech from the Dept. of Computer Science & Engineering, University of
Calcutta, India. Currently he is working as Assistant Professor, Dept. of CSE, Academy of Technology, W.B., India.
His interest areas are DataStructure, Cryptography and Network Security, Computer Network, Cloud Computing.
Amitava Nag received his M. Tech. degree from University of Calcutta. Currently he is working as an Assistant
Professor and Head in Dept. of IT, Academy of Technology, West Bengal,India and also working towards his PhD at
the Dept. of Engineering & Technological Studies, University of Kalyani. He is member of CSI, IEEE and ACM. His
areas of interest include Image Processing, Information Security, and Data Mining.

CSI Communications | January 2015 | 16

www.csi-india.org

Research
Front

Prof (Dr.) D G Jha* and Ms. Kimaya Ambekar**


*Professor & Area Chairperson IT; Programme Coordinator MCA, K J Somaiya Institute of Management Studies and Research
(SIMSR), Vidyanagar, Vidyavihar, Mumbai
** Academic Associate- IT, K J Somaiya Institute of Management Studies and Research, Vidyavihar, Mumbai

Adopting Cloud way for IT Needs Issues


and Challenges
Introduction
The development of web and software
services, coupled with advancement in
the areas such as distributed computing,
virtualization and utility computing
has resulted in new paradigm cloud
computing. The ever-evolving cloud
computing has impacted the use of ICT
in businesses due to its cost-saving
philosophy of pay-as-you-use and ondemand services. The businesses are now
all set to adopt the cloud way to meet their
IT requirements albeit cautiously.
The cloud has started showing a
transformational impact on businesses
of all sizes - from small and midsized
businesses (SMBs) to large enterprises
According to study conducted by Gartner,
the use of cloud computing is still growing
and will become the bulk of new IT spend
by 2016, a year that the experts predicts
will see hybrid cloud overtake private cloud,
with nearly half of large enterprises having
deployments by the end of 2017.[1]
The organisations have invested
considerable
amount
in
acquiring
high-end servers, developing software
applications, creating platform storages,
mechanism for data backups, setting
of networks, establishing data centers
and so on. They are and have been using
now matured and secured client-server
environment over the years. Switching over
to cloud-environment, despite the enlisted
advantages is no-easy task as many in the
industry consider it as critical missionoriented decision that requires careful
planning. This poses a greater challenge
to the service-providers propagating the
benets that the organisation can get by
adopting cloud environment. The pluses
and minus are indicated in Fig. 1.
Almost all the service providers tag line
indicates that organizations can not only get
their responsibilities off-loaded with respect
to getting storage, devices, platforms and
other services but can also get the facility to
pay-as-per use in almost secured and 100%
uptime environment. However, despite
the claims- theres no denite way for the
organisation to adopt cloud environment
as each of the service-providers have their

XaaS [Anything as a
service]
As IaaS is the most crucial
service that redenes the digital
rm, the article highlights the
issues and challenges with
respect to IaaS.
Infrastructure-as-a-Service
(IaaS)
IaaS is a delivery model
in which three basic subcomponents of services like
[2]
Fig 1: Cloud Computing pluses and minuses
storage, hardware & networks
are delivered along with
own deployment tactics. The onus therefore
associated technologies like
lies on the organisation to choose the most
le systems, virtualization technology and
reliable service providers in case they decide
operating systems Most of the service
to adopt cloud.
providers combine the three models and
For an organisation, cloud computing
give combination of them.
is a model for delivering information
The IaaS provider generally provides
technology services in which resources are
the hardware and administrative services
retrieved from the internet through webneeded to store applications and a
based tools and applications, rather than
platform for running applications. Scaling
a direct connection to a server. Data and
of bandwidth, memory and storage are
software packages are stored in servers.
generally included, and vendors compete
However, cloud computing structure
on the performance and pricing offered
allows access to information as long as an
on their dynamic services. The Service
electronic device has access to the web. This
provider owns the equipments and
type of system allows employees to work
services and they are solely responsible
remotely[3].The features that characterizes
for managing, hosting maintaining services
cloud computing environment are:
uninterrupted. Clients can purchase

Computation done over the internet


the services on pay-per-usage basis or

Enabled through
contractual basis.
High bandwidth and high speed
IaaS Conguration
internet
There are two primary types of IaaS
Utility computing
provider, namely, On-premises and Off Virtualization
premises service providers. On-Premises

Three basic services


IaaS conguration is shown in Fig. 2. In
Software as a service [SaaS]
this type of architecture, a virtual machine
Applications through browser
is prepared, congured and then deployed
Platform as a service [PaaS]
in the environment. All the licentiate and
Delivery of a computing
custom softwares are also included.
platform for customer software
Once this is done the virtual machine is
development as a service
uploaded on service providers hosting
Infrastructure as a service [IaaS]
environment where it is recongured to
Delivery
of
computer
map with providers storage/network/
infrastructure as a service
hardware.[5]

Other services
MaaS [Monitoring as a service]
Consumers View on IaaS
CaaS [Communication as a
Cloud service consumer desires a
service]
secure environment for its application

CSI Communications | January 2015 | 17

Fig. 2: On-premise IaaS configuration[5]

development and data, which can be


accessed from anywhere, from any device,
at low cost and mainly pay-per-usage or
contract basis. Major requirements are:

Elastic & 24 *7 uptime

Modular system which is reliable and


scalable as per usage

The system should be virtualized and


maintained by the provider

The environment should be secure


and free from any type of security
attacks.

Hardware and related softwares


must be up to date and should be
available all the time to consumer

The SLA (Service Level Agreement)


should be concrete and adhered to by
the provider.[5]
Providers View on IaaS
Cloud service providers are responsible
for providing required resources i.e. mainly
power, space, cooling and also associated
hardware, softwares and networks. With
this security, availability, privacy creating
appropriate SLA and maintenance
differentiates one provider with the other.
Maintaining virtualized environment and
load balancing is also special responsibility
that rests with the providers[4]
Cloud Computing Adoption Challenges
in India
Cloud computing has revolutionized
changes in the world of computing and has
impacted the organisations performance
i.e., both the areas (a) improvement in
business processes and (b) enhancing
IT operations has mutually impacted
each other. Changes in IT strategy have
changed the organisation structure and

CSI Communications | January 2015 | 18

roles and responsibilities of the employees


while changes in business processes have
made professionals reengineer their IT
deployment strategy.[6][7]
These changes pose problems related
to reengineering of business processes,
security, dependency and governance. The
challenges can be classied into following
categories:
Business challenges:
Cloud can mean different thing to different
people and the motivation to adopt cloud
can differ accordingly. Business related
adoption challenges can be described as
follows:

Mapping deployment on cloud with


scope and understanding of the
business processes
Understanding and identifying
the processes that needs to be
deployed is the first step towards
adoption of cloud i.e., only those
processes that require to be shifted
on IaaS should be picked and then
only the deployment should begin.
Business process should define the
cloud strategy and not the other
way round.[8]

Reduction in process cost


Ideally, in an organisation were
the IT operations are centralized,
adopting of cloud services becomes
very easy. Hence, it is perceived
that every department should
be ready to go centralized with
common IT requirements in order
to take complete advantage of
cloud services. It should be however
understood that moving to cloud is
not the only tool that can reduce IT

infrastructure cost, there are others


as well.[8]
Vendor lock-in
Despite getting classied as cloud
infrastructure
service
provider,
each of the vendors has different
characteristics with which they get
recognized. Therefore, before selecting
the vendor it is important to carefully
scrutinize the services. Once a vendor
is selected, changing or switching
the vendors becomes difficult for
an organization. In a scenario, were
an organization intends to adopt
hybrid cloud technology, managing
the combination between different
vendors become tedious task.[8]
ROI and Payback period
One of the important aspects that
win the battle for service providers
is the ultimate cost advantage that
it propagates before the client.
Organisations have always viewed IT
infrastructure as huge investments
with greater payback period before
the benets are reaped. With the
advent of cloud environment, the
expenses for utilizing IT expenses is
regarded as OPEX (instead of CAPEX)
with option such as pay-per-usage
basis, monthly or hourly basis or on
leased/contract basis. By adopting
cloud the business can track/measure
the performance and also control the
cost since it no longer has to maintain
its own datacenters and other related
hardware. But the challenge remains
as, how to compute and analyze
the cost v/s benets and which
methodology to accept for computing
ROI and payback.[8]
Utilisation of resources freed after
moving to cloud
Moving to cloud environment would
ultimately mean freeing certain
dedicated resources which an
organisation were earlier utilizing for
managing the digital setup. These
resources could be people, nances,
and time. For a business to reap the
complete advantage after adopting
cloud it becomes important to have
apt plan in place for utilization of
these freed resources.[8]
Uniformity and consistency
Cloud services can be used from
anywhere using any device but still
should give the same performance

www.csi-india.org

and accessibility at every time. The


services should give the same output
whether it is accessed within the
organization or outside of it; whether
people are using desktop, laptop
or mobile phone to access those
services it should give same feel and
look and also it should give same
level of security.[8]
Technical challenges

Data Security
Since
cloud
uses
distributed
architecture, data comes from
different locations and in different
formats. Analyzing these data and
depositing it is a tedious task. Security
challenges can be many like virus/
worm/Trojan attack, malware attack,
unauthorized attacks, DoS attacks so
on and so forth. The security policy
of organisation and service provider
must be mapped to reduce (if not
eliminate) such risks.[6]

Data Loss
At First when organizations use cloud,
data will be mostly stored outside the
organization. Second, data is moving
from one tenant to multi tenant
framework so the threat to data loss/
data leakage increases.[6]

Problems related to virtualization


Lack of awareness in the areas of
application usage, additional cost
of virtualized hardware-all can be
considered as add-on problem areas
for IaaS[9]

About the Authors

Governance challenges

IT governance
Cloud sets up communication within
and outside the organisation which
requires clear guidelines and IT policies
in place, the escalation path and the
nal authority responsible for taking
decisions in case of ambiguity.[7]

Inter-organizational dependency
In case of public and hybrid
infrastructure services, dependency of
third party can make organization feel

that they are losing the rights on their


data or services.[7]
Intra-organizational dependency
Change in IT governance for cloud
adoption can make changes in
decision making rights among
stakeholders. This can be a setback
for the organization.[7]

Environmental challenges

Cloud market lacks mature service


providers who understand both
business needs and IT services.

Vendors are not readily available


with proper value proposition for
organizations.

Companies sometimes lack guidance,


leading practices or experiences from
other companies can also become
barrier for adoption of cloud.

Sometimes, ecosystem of the


organization is not ready for cloud
adoption.[6]
Conclusion
As cloud computing is much faster to
deploy, businesses have to incur minimum
project start-up costs with predictable
ongoing expenses and thus businesses
can lower both Capex as well as Opex.
Applications on cloud are available round
the clock and the enterprise users can
work from anywhere remotely from
home, or on the move. The pay-as-youuse model helps SMEs to secure their
backup and have access to les, set up
communication channel, access le from
anywhere, track time spend on projects,
use design and print services available
online, create email platforms, perform
accounting services online, organizing
notes, use applications for business
communication.
References
[1] Gartner. 2013. Gartner Says Cloud
Computing Will Become the Bulk of
New IT Spend by 2016. Available at
http://www.gartner.com/newsroom/
id/2613015 [Accessed 5 Nov 2014]
[2] UMS Gorgs. 2013. Cloud Computing.

[3]

[4]

[5]

[6]

[7]

[8]

[9]

Available at http://www.umsgorgs.
net/category/cloud-computing /
[Accessed 6 Nov 2014]
Investopedia. nd. Cloud Computing.
Available
at
http://www.
investopedia.com/terms/c/cloudcomputing.asp [Accessed 1 Nov
2014]
Kulkarni, G; Sutar, R; Gambhir J., 2012.
Cloud computing-infrastructure as
service-Amazon EC2. International
Journal of Engineering Research and
Applications (IJERA) ISSN: 22489622. Vol. 2, Issue pp.117-125
Tantow, M 2011. What to Consider
Before Choosing An IaaS Provider.
Cloud Times. Available at http://
c l o u d t i m e s . o r g /w p - c o n t e n t /
uploads/2011/02/Infrastructureas-a-Service1.jpg [Accessed 4 Nov
2014].
EY, 2014. Cloud computing adoption
in India Challenges to cloud IaaS
adoption. Available at http://
www.ey.com/IN/en/Industries/
Technology/Cloud-computingadoption-in-India--Challenges-tocloud-IaaS-adoption [Accessed 16
Nov 2014].
Majendran, S 2013. Organizational
Challenges in Cloud Adoption and
Enablers of Cloud Transition Program,
Working Paper CISL# 2013-13.
Ali Khajeh Hosseini; Greenwood,
D; Smith, J W; Sommerville, I The
Cloud Adoption Toolkit: Addressing
the Challenges of Cloud Adoption
in the Enterprise; Cloud Computing
Co-laboratory, School of Computer
Science, University of St Andrews,
UK {akh,dsg22,jws7, ifs} @cs.standrews.ac.uk
F5. 2008. 7 Virtualization Challenges.
Available at http://www.f5.com/
pdf/white-papers/virtualizationpainpoints-wp.pdf. [Accessed 25
Nov 2014]
n

Prof (Dr) D G Jha is currently working as Professor and Area Chairperson - IT at K J Somaiya Institute of Management Studies and
Research. He has over 25 years of experience and has authored a text book in the area of computing concepts and Management
Information System. He is a Ph.D from University of Mumbai. He is also the programme coordinator of MCA. His area of interests
are computing concepts, DBMS, Information systems, and HRIS.
Ms. Kimaya Ambekar is Academic Associate- IT at K J Somaiya Institute of Management Studies and Research, Vidyavihar,
Mumbai. She is a Masters in Computer Applications graduate from University of Mumbai and has two years of academic
experience. Her areas of interests are Cloud computing, security, C# framework.

CSI Communications | January 2015 | 19

Research
Front

Dr. Khalid Raza


Assistant Professor, Department of Computer Science, Jamia Millia Islamia (Central University), New Delhi, kraza@jmi.ac.in

Network Biology: A New Way to Understand


Complex Disease and Future of Medicine
We have various kinds of networks around
us ranging from computer networks
to social networks, food web, disease
transmission networks and terrorist
networks. Today, the concept and the reality
of networks are playing an important role in
modern society. From the last several years,
scientists from different elds: including
computer science, mathematics, physics,
chemistry, sociology, and of course biology,
deals with some kind of network and more
recently coined a new terminology network
science (Newman, et.al., 2006). In this
article, biological networks are discussed
with special focus on understanding
complex molecular interactions for better
insight about a disease and how biological
networks help in the development of future
medicines.
Network biology is an emerging
area of research where researchers try
to understand functional organization of
cell and complex interactions between
various constituents of cells (such as
proteins, RNAs, DNAs, metabolites and
other molecules). Even most cell performs
their functions through interaction
across cells and even across organs.
Network biology approach may help to
identify the root-cause of various human
diseases, including cancers. Due to
rapid advancement in high-throughput
data collection technologies, such as
Microarrays, it is possible to know the
states of a cells constituents at any given
time. Similarly, other modern technologies,
such as protein chips or yeast two hybrid
screens, reveal how and when these cells
constituents interact (Barabasi & Oltavai,
2004). There are interactions between
different constituents of cell that lead
to different kinds of biological networks,
such as protein-protein interaction
network, gene regulatory network and
metabolic pathways. These networks are
not independent to each other, rather
they form network of networks which
is responsible for cells behaviour and
functions. These biological networks
can be analysed using graph theory for
inferring biologically relevant knowledge.
These networks can also be exploited
for developing templates for modelling

CSI Communications | January 2015 | 20

and simulation of biological systems that


may be further revised in consultation
with concerned domain experts. The eld
of network biology has integration with
other elds including text mining, data
analysis, biological databases, modelling
& simulation, sequence analysis, and so
on, as shown in Fig. 1.

Gene regulatory networks: As described,


the interactions between various cellular
molecules form very complex biological
circuits. The gene regulatory network
(GRN) is a kind of such biological circuit.
A typical GRN may consists of input
signalling pathways, regulatory proteins
which assimilate input signals, target genes,
RNAs, and produces proteins from these
target genes. These networks may also
include dynamic feedback loops. The GRNs
are the systematic biological networks
that describe regulatory interactions
among genes in the form of a graph, where
nodes represents genes and edges their
regulatory interactions. In general, there
can be two types of interactions: activation
or inhibition. Generally, edges are directed

Fig. 1. Depicts an overview how dierent


fields are integrated with biological networks
(Koehler, et.al., 2004)

After Human Genome Project, the


main aim of biomedical research is to
develop systematic catalogue of all cell
molecules and model their interactions.
The major challenge is how to integrate
theoretical and experimental techniques
to understand and model the topological
and dynamic properties of different kinds
of networks in quantiable terms.
The Human Interactome
The complexity of biological networks
in human, also known as human
interactome, is daunting. The human
interactome contains around 1,00,000
interacting molecules that includes
~25,000 protein coding genes, ~1,000
metabolites and an undened number of
proteins and functional RNAs (Barabasi,
et.al., 2011). Mathematically, any network
can be represented in the form of a graph
G = {V, E}, where V denotes the set of N
vertices (i.e., biological molecules) and
E denotes set of edges that connect two
elements in V. The biological networks
can be of various types such as gene
regulatory networks, protein-protein
interaction networks, metabolic networks
and RNA networks.

Fig. 2. A typical gene regulatory network


having eight nodes and 10 edges, where sharp
arrows depict activation and blunt arrows
inhibition

but if transfer of information between


nodes is bidirectional, then the edge is
considered as undirected. Figure 2 shows
an example of a gene regulatory network.
Gene regulatory network is a very useful
mechanism used to demonstrate complex
dependencies between developmental
transcription factors, target genes and their
regulators.
Protein-protein interaction networks: It is
also a network where nodes are proteins
and are linked to each other by a physical
interaction. Protein-protein interactions
play a vital role in living cells that control
most of the biological processes. Proteins
mostly perform their functions with the
help of interactions with other proteins.
Mutations occurred due to disease affects
protein interactions that disrupt proteinDNA interactions, adds new unwanted

www.csi-india.org

interactions and lead to protein misfold.


Aberrant protein-protein interactions have
implicated in a number of neurological
disorders, for example, Alzheimers
disease. With appropriate knowledge of
interaction scientist can easily predict
pathways in the cell, potential novel
therapeutic target, and protein functions.
This has motivated to map interactions on
the proteome-wide scale.
Metabolic networks: As we know,
metabolism is one of the complex cellular
processes. The connectivity between
biochemical and metabolites form very
complex metabolic networks which
can be analysed using graph theory for
inferring lots of biologically meaningful
information.
RNA networks: Last few years brought a
better understanding about RNA world
and its key role in biological networks.
RNA networks refer to those networks
that contain RNA-RNA or RNA-DNA
interactions. It is found that non-coding
RNAs regulate in various aspects of cell
differentiation and development and it
also works as a key player in regulating
ow of genetic information. Several
microRNA-gene interaction networks
have been reported in the literature and
are available in various databases such
as microRNA, PicTar, miRBase, miRecords
and TargetScan.
Basic Properties of Disease Networks
Today, the advancement in graph and
network theory helped to get insights
about the properties of biological
networks, especially disease networks.
From the studies of networks, it is revealed
that networks in biological, social and
technological systems are not functioning
randomly, but are organized by set of
principles, such as motifs, modules, hubs,
centrality measures, etc. These network
principles help us to extract some of the
basic properties of genes involved in
disease. Some of the basic properties of
a disease network are describe as follows:
Hub genes: One of the distinguishing
properties of biological networks is a
limited number of highly connected
genes, called hub genes. These hub
genes performs special biological role.
It is revealed from the model organism
that hub genes are older and evolve more
slowly, and also deletion of hub genes
lead to a larger number of phenotypic
outcomes, than non-hub genes. It is a
hypothesis that hub genes are typically

associated with disease genes in human


interactome. Many studies support this
hypothesis; however, evidence of some of
these effects is still poor and debatable.
Disease modules: A module is a subnetwork having high degree of clustering
and represents highly interlinked local
regions within a network. It is commonly
accepted that biological system is modular.
A biological functional module is an entity,
consists of different interacting molecules
and their function is separable from other
modules (Cho, et.al., 2012). It is suspected
that the direct interacting molecules
participating in a specic disease, also play
some role in the same disease. Over the
last few years, many network-clustering
tools have developed but still identication
of network modules is computationally
challenging. Given a large network, we
may require to discover meaningful
functional modules from such biological
networks. The most commonly used
method is to identify densely connected
subgraphs or clusters. Alternatively,
gene expression data or (and) protein
interaction data can be used to extract
modules by grouping co-expressed genes
into one module. Cho & his colleagues
described some of the disease modules
as: (i) disease modules are enriched with
genetic alterations, so, genes or genomic
regions which are altered in a disease
of interest are identied rst, and then
it is mapped to an interaction network;
(ii) differentially expressed network
modules a subnetworks enriched with
genes whose expression values are
signicantly changed in disease sample
prole; and (iii) uncovering information
propagation modules clusters of
genes related to either phenotypic or
genotypic information, or combining
both that may be an effective approach
to understand disease mechanisms.
There are several applications of network
modules in medical science, such as (i)
disease classication, (ii) nding disease
similarity, and (iii) response to treatment.
Motifs: A motif is a sub-graph in which
a group of nodes linking to each other
to form a small subnetwork within a
biological network. Motifs are considered
as elementary units of cellular networks.
Motifs are more likely to be associated
with some biological functions, such
as negative feedback loops, positive
feedforward loops and oscillators.

Predicting Disease Genes and Their


Interaction Networks
Several sophisticated network-based tools
have been proposed to identify disease
associated genes but most of these
methods identify a large number of disease
associated genes. Hence, identication
of particular genes and casual mutation
remains a challenge. These tools can be
grouped into three categories (Barabasi,
et.al., 2011):
Linkage methods: It hypothesise that the
direct interacting disease-proteins are
likely to be involved in the same disease
phenotype.
Module-based methods: It hypothesise
that all cell components belonging to the
same topological, functional or disease
module have a high chance for being
associated in the same disease. In these
methods, disease modules are identied
rst then examines their members as
potential disease genes. Several variants
of these methods have been used to
a large number of diseases including
cancers, systemic inammation, obesity,
cardiovascular disease, neurological
diseases, asthma and diabetes.
Diffusion-based
methods:
These
methods identify the pathways closest
to some known disease. Here, random
walk algorithm is applied and a walker
is released from a known disease
genes, and they are allowed to diffuse
along the links of the network, moving
to any neighbouring nodes with equal
probability. By this way, the nodes and
links closest to the known disease genes
are identified because these genes will
be most often visited by random walkers.
Hence, proteins interacting with large
number of disease proteins are likely to
gain a high probability weight. Several
variants of these methods have also
been applied to detect diseases genes
including cancers and Alzheimer.
Future of Medicines: Network-based &
Personalized Medicines
The current and established diagnosis of
disease relies on humble correlation between
clinical syndromes and pathological analysis.
This traditional method is largely based on
Oslarian clinico-pathological correlation,
where disease is dened on the basis of
organ in which symptoms are identied.
Although, this conventional approach to
disease diagnosis has been serving the
society well for over a century but it has

CSI Communications | January 2015 | 21

About the Author

several severe aws in the post-genomic


modern era of genomic medicine. Some of
the limitations of conventional approach
to disease diagnosis and treatment are as
follows:
i.
The focus is not on specic genetic
of the disease and hence therapy
mechanisms do not focus on targeted
disease source.
ii. Diagnosis is based on late-appearing
symptoms in the organ.
iii. Neglects underlying pathobiological
mechanism of the disease and
molecular & environmental factors
are not taken into account which
governs the evolution of disease.
iv. In fact, disease is not based on
single effector gene product, but on
interactions in the complex biological
networks.
To solve shortcomings & limitations
of conventional disease denition, we
need to reconsider and redene the
factors of the disease and shifting the
entire healthcare system to modern
genome-based approach.
Personalized medicines: The beginning
of a disease is triggered by a breakdown
in a biological network system. The
diagnostic and medical system based on
our understanding of interacting network
system is called network medicine. It
explores the interaction mechanism at the
system-level and translates discoveries to
better diagnosis of disease. Personalized
medicine is the emerging practice that
uses an individuals unique molecular
characteristics and their genetic prole
to diagnose more nely and helps the
doctors to give proper medication and
therapy according to diseases which
also decreases its risk. Network-based
technique is applied to gain better insight
in disease phenotyping and developing
novel therapeutics which address systemwide molecular disturbance occurred due
to disease processes. The main objective
of personalized medicine is to develop
individualized medicine which is more
effective and specic to a particular patient.
The novel personalized medicine is likely

to reduce the adverse effects of drug and


a signicant inuence on healthcare. This
approach optimizes the drug discovery and
drug development process to get improved
understanding of disease processes,
drug safety prole and drug efficacy. It
also straties patients molecular proles
which is main root toward treatment. The
personalized medicine allows development
of targeted diagnostics and therapeutics.
Genomic testing allows physicians to
nd out an individuals susceptibility to
disease, predict how a particular patient
would respond to a specic drug molecule,
reduce adverse effects of drugs, increase
the effectiveness of treatments and nally
improve overall health system. Some of the
benets of such approach to healthcare
are:
i.
Moving towards evidence-based
system from trial-and-error based
system
ii. Anticipating health problems and
focusing on wellness, not on disease
iii. A new medical model that creates a
customizable healthcare according
to the genetic information of an
individual
iv. Remove trial-and-error inadequacies;
decrease healthcare cost, time and
clinical trial failure and lead to better
patient care.
Recently, a personalized medicine
paradigm, called P4 medicine, has been
proposed by Leroy Hood, President of
Institute for Systems Biology, Washington,
USA. The P4 medicine focuses on four
key attributes: Personalized, Preventive,
Predictive and Participatory. Personalized
means considering a persons genetic
information; preventive handing health
problems by focusing on wellness of a
person rather than disease; predictive
prescribing treatment that avoid drug
reaction; and participatory empowering
patients to be attentive and responsible
for their healthcare. According to
Leroy Hood the most unique about P4
medicine is that it will represent a network
of networks molecular networks, genetic
networks, cellular networks, tissue

networks, individual networks, population


networks, social networks.
Conclusions
Network biology lets us study about
the complex diseases. Complex disease
can be better understood by networkbased approaches. Modularity is broadly
recognised concept in molecular biological
networks and module-based methods offer
a number of benets including robustness
in the identication of pathways and
better disease classication. Furthermore,
network-based formalism lets us apply
a plenty of methods already developed
in graph theory, such as bipartite graph,
shortest paths, module and motif
identication, hubs, network ow, and
Steiner trees. Network-based approach
has some limitations including lack of
mechanistic explanations. Despite of
limitations, network biology has been
successfully applied in several diseases
that suggest testable hypotheses. The
personalized medicines, that targets
individualized diagnosis based on
individuals genetic variations is an
innovation which is expected to create
both opportunities and challenges for
conventional healthcare and emerging
markets.
References
[1]

[2]

[3]

[4]

[5]

Barabasi, A-L & Oltvai, ZN (2004).


Network biology: understanding the cells
functional organization. Nature Reviews
Genetics, 5.
Barabasi, A-L, Gulbahce, N & Loscalzo,
J (2011). Network medicine: a networkbased approach to human disease. Nature
Reviews, 12.
Cho, D-Y, Kim, Y-A, & Przytycka, TM.
(2012). Chapter 5: Network Biology
Approach to Complex Diseases. PLoS
Comput Biol 8(12): e1002820.
Koehler, J, et.al. (2004). Linking
experimental results, biological networks
and sequence analysis methods using
Ontologies and Generalised Data
Structures. In Silico Biology 5, 0005.
Newman, M, Barabsi, A-L & Watts, DJ
(2006). The Structure and Dynamics
of Networks. Princeton Studies in
Complexity, Princeton University Press.
n

Dr. Khalid Raza is an active researcher and currently working as an Assistant Professor at the Department of Computer Science, Jamia Millia
Islamia (Central University), New Delhi, India. He has completed his Bachelors & Masters Degree in Computer Science & Applications and
also cleared National Eligibility Test (NET) & Junior Research Fellow (JRF) in the same subject conducted by University Grants Commission
(UGC), India. He has completed his Ph.D in Computational Biology from Jamia Millia Islamia, New Delhi. He has published more than
10 research articles in refereed international journals, conference proceedings and as book chapters. His research area of interest is soft
computing techniques, articial intelligence, systems biology and bioinformatics. He has received research grants for two Govt. funded
research projects and working as Principal Investigator for both. He is reviewer of several international journals, member of several conference
review committee and delivered several invited talk in national/international conferences/workshops.

CSI Communications | January 2015 | 22

www.csi-india.org

Article

Rakesh Kumar* and Hardeep Singh**


*Asst. Professor, Department of Computer Science, Khalsa College For Women, Amritsar, India
**Professor, Department of computer Science & Engineering, Guru Nanak Dev University, Amritsar, India

Mapping the Architecture and Quality Attributes of


Information Systems in Context to Internal Security
Abstract: The success story of information systems over the last decade is beyond the imagination. There has been tremendous rise in

usage and development of these systems. Their vivid applications in almost all the sectors of business have attracted bad men too. The
hackers, crackers, hostile countries and dissatised internal employees are always looking at their chances to break through the defense
of any organizations IS and steal the data or information. A good architecture helps in reducing these risks. This paper attempts to nd
relationship among architecture of IS and quality attributes in context to security of information system.
Keywords: security risk, threats, architecture, mapping, attributes.
Introduction
Antivirus and antimalware scanning
software running on desktop computers
are ineffective to catch a suspicious
activity or any disgruntled employee in any
organization. These threats need different
approach, guidelines and regulations. The
Street View application in Google maps
approximately collected 600 Giga bytes
from famous streets and roads of different
countries by special camera attached
vehicles in 2007. Google was then sued
by an American agency but escaped later
by virtue of nonexistence of any law or
guidelines against such an act. Today,
the mobile devices are being rapidly
integrated into enterprises, government
agencies, and even the military. These
devices have sprouted the problem of
internal security risks. These devices hold
valuable, sensitive content and secret
information. A compromised device can
hand over the owners stored credential
and data to attacker. The large scale
processing of information has attracted
the interest of the security community
for its promised ability to analyze and
correlate security-related data efficiently
and at unprecedented scale. This article
discusses the quality attributes and
relates them with the architecture of an
information system.
Mobile Devices Related Security Attacks
Security breaches can cause huge revenue
loss to organizations. McNamara (1998)
has listed the insider threats like proprietary
information theft, accidental or nonmalicious breaches, sabotage, fraud, viruses,
and eavesdropping/snooping as major
risks. These attacks can be premeditated,
deliberate or malevolent. Magklaras and
Furnell (2002) contend that there are four
main categories of insider threats such as

possible intentional, potential accidental


threat, suspicious and harmless. It should
be noted that threats posed by a malicious
insider may be exponentially far greater than
that posed by an outsider (Colwill, 2010).

The threat of attack from criminals,


insiders, worms, and viruses is much
more unpredictable than changing
business models and the threat
environment has shown an increase in
the speed and complexity
Sr No
Year
Number of Security Attacks
of attacks (Gordon et al,
Due to Mobile Devices
2010). The implications
1
2011
33347
for
proactive
security
2
2012
34840
management include the
3
2013
46160
need for capabilities that
can integrate new security
technologies and tightly
Table 1: Data about attacks in last three years
link them with architectural
changes like asset, patch,
The Internal Threats
and
configuration
management.
The mobile devices have brought with
Intentionally or unintentionally, the
them new kind of risks. In addition to
information system is in continuous risk
organizations data and voice plan misuse
from the man power of competitors both
they pose serious security threats too. The
within the business house and outside.
unencrypted wi, BYOD devices, third
The disgruntled former employee can
party patches and applications, untrusted
also trigger phishing enabled theft of
websites etc can be categorized as top
data or some other kind of virus infection.
risks of modern times. The disgruntled
New employees who are unaware of
employee can also trigger phishing
security policies and processes can also
enabled theft of data or virus infection.
result in threats (Kazman et al, 2003).
Given below is relationship between
Architectural Changes and their Effects on
architectural level changes and security
Security of IS in Context to Internal Threats
of IS.
Check Points

Importance Level

Benet to organization

Awareness about
risk of information
leakage

Highly Important

This will alert employees about


the possible misuse of information
intentionally/unintentionally sent by
them to other peoples/organizations

Details of career and


psychological prole
of persons hired for
information security
purpose

Highly Important

This will increase the vigilance and secure


the organizations system from criminal
minded peoples

Table 2: Check points to reduce the internal threats

CSI Communications | January 2015 | 23

Architectural Change

Importance level

Effects on security of IS

Encrypting the database backups

Very high

No one will be able to read


the contents. Even copying
will not be fruitful idea

Encryption of on-line production


database information

Very high

All the data through


transactions will also be
stored in encrypted form

Designing and granting generic


access privileges that are specic
to job requirements.

High

Will help in restricting the


rights of employees

Make a provision of taking digital


signature or other biometric
signature of employee after some
important transactions
Enabling data leak prevention
techniques
Use of data centric security
approaches instead of secure
perimeter approach

High

It will increase the security


level

its quality attributes. It helps in identifying


the architecture level changes that
affect the security of an organizations
information system. The internal security
can be increased by incorporating these
architectural changes in an information
system.
References
[1]

[2]

High

Data breaches will be saved

High

Data is top most important


assets for organization

[3]

[4]
Table 3: Architectural change and their eects on IS

Architectural Changes and their Effects


on the Quality Attributes of IS

Conclusion
This study attempts to relate the
architecture of information system with

Architectural Change

Importance level

Effects on Quality Attributes


of IS
It will improve Availability

Reducing the System Errors while


designing

Very high

By incorporating mechanism for


properly balancing the system load

Very high

Improved Availability

Designing techniques for proper


resource utilization
Architecting the interface with
third party software in better way

Very High

Improved Efficiency

High

It will increase Interoperability

Enabling the completion of a


transaction in a specied time
interval.

Very High

Reliability will be improved

Use of development models


and techniques supporting agile
approaches

High

Extensibility will increase

Encrypting the database backups

Very High

Condentiality is increased

Encryption of on-line production


database information

Very High

Condentiality is improved

of IS

[6]

[7]

[8]

[9]

Table 4: Relation between architecture and quality attributes of IS

About the Authors

[5]

[10]

Sun, L, Srivastava, R P, and Mock, T J


2006. An information system security risk
assessment model under the DempsterShafer Theory of Belief Functions. Journal
of Management Information Systems, vol.
22, 2006, pp. 109-142.
McNamara, R (1998). NetworksWhere
does the real threat lie? Information
Security Technical Report, 3(4), 65-74.
Colwill, C (2010). Human factors
in information security: The insider
threat- Who can you trust these days?
Information Security Technical Report, 14,
186-196.
Guarro, S B 1987. Principles and
procedures of the LRAM approach to
information systems risk analysis and
management. Computers and Security,
vol. 6, 1987, pp. 493-504.
Joseph Migga Kizza: A Guide to Computer
Network Security, Springer, 2008,
pp112-115, http://en.wikipedia.org/wiki/
Timeline_of_computer_ security_hacker_
history
Julia H Allen, Sean Barnum, Robert
J Ellison, Gary McGraw and Nancy R
Mead: Software Security Engineering:
A Guide for Project Managers, Addison
Wesley Professional, 2008, pp 6-8.
Magklaras, G B & Furnell, S M (2002).
Insider threat prediction tool: Evaluation
the probability of IT misuse. Computer and
Security, 21(1), 62-73.
Kazman, R, Nord, R L., & Klein, M A LifeCycle View of Architecture Analysis
and Design Methods (CMU/SEI-2003TN- 026). Pittsburgh, PA: Software
Engineering Institute, Carnegie Mellon
University, 2003.
Wade H Baker and Linda Wallace, Is
information security under control?:
Investigating quality in information
security management. IEEE Security and
Privacy, 5(1):3644, 2007.
http://www.dqindia.com/dataquest/
feature/205756/india-most-vulnerablecyber-attacks#sthash.Z9TrKNYG.dpuf

Rakesh kumar is working as Assistant Professor in department of computer science, Khalsa college for Women, Amritsar. He is
pursuing his PhD in computer science. His area of research is Software Engineering and Information Security. He has about 17
publications in national and international journals and conferences.
Dr Hardeep Singh is working as Professor in department of computer science and Engineering, Guru Nanak Dev University Amritsar.
He has more than hundred publications in reputed National/ International journals and conferences. He is life member computer
society of India. His area of research is Software Engineering.

CSI Communications | January 2015 | 24

www.csi-india.org

Article

Mr. K.V.N. Rajesh* and Mr. K.V.N. Ramesh**


*Senior Assistant Professor, Vignan Institute of Information Technology, Visakhapatnam
**Project Manager, Tech Mahindra, Visakhapatnam

Quick Response Code (QR Code) and other Automatic


Identication and Data Capture (AIDC) Technologies
Introduction
Technology and Computers have made
inroads into all aspects of day-to-day life
due to their ability to automate various
repetitive and monotonous tasks and thus
provide people with time to pursue other
useful and interesting avenues. The main
use of automation is to minimize human
intervention and thus speed up the tasks
and reduce the errors associated with
manual work. Automatic Identication
and Data Capture (AIDC in short) refers to
various technologies used to automatically
identify and collect data related to objects
and enter them into computer systems
with minimized human intervention. AIDC
technologies such Barcode and Quick
Response code (QR Code in short) are
fairly ubiquitous these days with their use
in fast moving consumer goods (FMCG),
other retail products and books. Anybody
who has seen the usage of a Barcode
reader at the point of sale counter in a
department store or a shopping mall has
seen AIDC in action.
Telephones have come a long
way from being mere devices of
communication.
The
Smartphones,
Tablets and other mobile devices of
today have bundled up the functionalities
of various devices like mobile phone,
personal digital assistant, watches,
camera, handheld computer and a host
of other technologies into one. The
popularity of the AIDC technology called
QR code is mainly due to the proliferation
of Smartphones and other mobile devices
and their ability to function as QR code
reader when loaded with the respective
software.
This aim of this article is to introduce
various AIDC technologies like Barcode,
QR code, Radio-Frequency Identication
(RFID) and Near Field Communication
(NFC). Of course, the main subject of
interest of this article is QR code.
One notable use of QR code is in the
Indian Governments Unique Identication
Number project called Aadhar. The Aadhar
card has the linear Barcode as well as
the two dimensional QR code. This is
discussed in further detail in the respective
sections related to Barcode and QR code.

Barcode
Barcode is a standard linear/onedimensional (1D) graphical representation
of encoded data (usually numeric) in the
form of parallel lines of various width and
spacing. These Barcodes are machinereadable using optical scanners like
Barcode readers. The Barcode readers
can scan and interpret the Barcode and
turn it into the data which the Barcode
represents and provide this input to
a computer to which it is connected.
Figure 1 shows the Barcode printed on
packages of some retail products. In the
retail scenario, the Barcode is used to
represent a unique identier (usually a
number) corresponding to the product.
This unique identier is printed on the
product in the form of a Barcode. All packs
of the same brand, type and size share the
same unique identier and Barcode. An
example of two packs of same size and
brand sharing the same Barcode can be
seen in Fig. 1. At the sales counter in the
retail store, the sales personnel scan the
Barcode on the product using the Barcode
reader. The Barcode reader inputs the
unique identier to the computer. The
computer fetches the respective details
like the product name, price and discount
(if any) from the product database using

Fig. 1 : Sample Barcodes and ISBN

the unique identier as the key and inputs


the same into the bill. This automatic
identication and data capture eliminates
any manual entry errors by the sales
personnel and is quite faster too.
Coming to the history of Barcode, it
was invented by Norman J Woodland &
Silver Bernard. Patent No US 2612994
A with the title Classifying apparatus
and method was issued to the inventors
on 07-Oct-1952. The patent consisted
of Barcode label in the form of series of
concentric labels akin to bulls eye and
the technology to scan and interpret the
same. The rst commercial use of the
Barcode label and Barcode Reader was
on 26-Jun-1974 in a Marsh Supermarket
in Troy, Ohio, USA and was used to
scan a packet of Wrigleys Juicy Fruit
Chewing Gum.
There are many types of Barcodes in
use. The most popular Barcode symbology
in use are the Universal Product Code
(UPC) and the European Article Number
now renamed as the International Article
Number (EAN-13). The most common
form of UPC in use is the UPC-A consisting
of 12 digits. The EAN-13 is a superset of
the UPC and consists of 13 digits. These
Barcode standards are dened and
provided by a not-for-prot organization
called GS1. The enormity of the usage of
Barcodes can be gauged from the GS1
statistics that at least 5 billion Barcodes
are scanned all over the world per day.
The consumer goods in India commonly
use the 13-digit GS1 Barcode which is the
same as the EAN-13. The product number
encoded in the EAN-13 is known as the
Global Trade Item Number or GTIN in
short. The examples of the same can
be seen in Fig 1. The 13-digits consist of
the GS1 organization prex (rst three
digits), manufacturers prex, product
code, Check digit. The rst three digits
represent the GS1 organization with which
the company is registered. As can be seen
in Fig 1, the Indian consumer products
start with 890 since it is the allocated
prex code of GS1 India to which the India
manufactures subscribe to.
Another special type of Barcode
which we usually come across is related

CSI Communications | January 2015 | 25

to the International Standard Book


Number (ISBN in short). It is a numeric
identier used to identify books. ISBNs
now have 13 digits and are represented
using EAN-13 Barcode. The 13 digits
consist of the prex element, registration
group element, registrant element,
publication element and check digit. The
prex element made available by GS1
for published books are 978 and 979.
978 and 979 are humorously referred
to a ctitious country named Bookland.
ISBNs therefore start with either 978
or 979. The registrant group element
identies the language area, country or
geographical region. The prex element
for India is 978 and the registrant group
element for India is Raja Rammohun
Roy National Agency for ISBN with the
numbers as 81 and 93, so ISBNs of all
book publications from India would start
with either 97881 or 97893. Registrant
element represents the publisher and
Publication element signies the specic
edition of a publication.
Another area where the Barcode is
used is for identifying and tracking articles
shipped via speed post and courier. India
Post adopted Barcode symbology named
Code 39 for its speed posts and parcels.
Code 39 consists of 43 characters
containing upper case letters, numeric
digits and some special characters.
Another well know use of Barcode is
in the Aadhar card. The Aadhar card has
the 12 digit Aadhar number encoded in the
linear Barcode format.
Quick Response Code (QR Code)
Quick Response code (QR code) is
a type of two dimensional matrix
Barcode. It is usually in the form of a
square with black square dots with
three big boxes at the three corners.
QR code stores information both along
the length and width and hence is
able to store more information than
Barcode which stores information in
only one direction. QR code has risen
to prominence due to the ability of the
Smartphones and other mobile devices
to act as QR code scanners. For casual
use by general public for scanning QR
codes of lesser density (generally used
in various public relations campaigns
and advertisements), any smartphone
or mobile device (like Tablet) with a
camera, QR code reader software and
with the ability to connect to internet,

CSI Communications | January 2015 | 26

Fig. 2 : Sample QR Codes

is sufficient. Dedicated professional


scanners on the lines of Barcode readers
are anyhow required and available for
commercial use for scanning of denser
QR codes which store more information.
QR code was invented by a Japanese
company named DENSO WAVE in 1994.
DENSO WAVE is a company specializing
in Automatic Data Captures, Industrial
robots and Industrial Controllers. At
DENSO WAVE, it was invented by
Masahiro Hara and his team member
Takayuki Nagaya. It was developed in
response to the limitation of the one
dimensional Barcode to store limited
amount of information and their inability to
store Japanese Kanji and Kana characters.
Hara and his team developed a 2D code
to store a great deal of information to
overcome this limitation. In terms of
numeric characters, QR code can pack up
to 7000 characters in it.
Fast readability is another dening
feature of QR code. The three boxes at
the corners of the QR codes act as landing
sites and aid the scanners to focus on the
code better and faster and thus allow them
to read the QR code quicker. The three
boxes are the position detection patterns
which allow the QR code to be read from
any alignment.
Another reason for popularity of
QR code is that there is no license cost
associated with the usage of QR code.
DENSO WAVE which is the owner of the
patent rights of QR code chose not to
exercise it so that QR code can be used
by as many people as possible. This was
to honor the intent of the inventors of
QR code. It first became widespread in
use in Japan (in 2002) with the General
public when mobile phones with QR
Code-reading feature became available.
Another notable aspect of QR code is
that it is likely to be scanned and decoded
even when a portion of the QR code is
slightly damaged, disgured or marked.
This is possible due to the high levels of

error correction possible using the Reed


Solomon error correction algorithm.
Due to the amount of information
that QR code can store, many innovative
and interesting applications of QR code
have been developed by the marketing
people. It has not just been restricted for
usage as a machine readable identier
of objects like the Barcode. The very
commonly seen use of QR code is to
embed Uniform Resource Locators
(URL) in it. When the respective QR
code is scanned using a smartphone, it
automatically directs to the respective
web page. The Fig 2 shows sample QR
codes generated for Computer Society of
India and Vignans Institute of Information
Technology. It also shows usage of QR
code for a commercial product. The
URLs corresponding to the websites of
the mentioned organizations have been
embedded in the QR codes. When these
QR codes are scanned using a smartphone
with QR code reader software, it directs
to http://www.csi-india.org/ and http://
www.vignaniit.com/ respectively. The
QR code thus automatically connects the
user to the information without the need
to manually input the details. These two
sample QR codes have been generated
using the QR code generator available
freely online at http://www.qrstuff.com/
since the usage of QR code is license
free. A casual Google search for QR code
generator retrieves a list of such sites.
Some other uses, to which QR codes
are put to, is to encode information
for
creating
contact
information,
creating calendar events, creating an
e-mail message or populate a SMS on
Smartphones.
QR code has also found use in the
Aadhar card. The QR code is used to store
the citizen related demographic information
like name, address, data of birth, gender
and name of parent or guardian.
The Smartphone or Tablets can be
enabled to work as QR code readers by

www.csi-india.org

installing any of the various freely available


QR code reader software. The authors were
able to make the low cost Aakash II tablet
which comes with a basic Video Graphics
Array camera (VGA), to work as a QR
code reader. Aakash (Ubislate 7Ci) is tablet
computer produced by a British-Canadian
company named Datawind founded by Tuli
brothers who are originally from Punjab.
The Aakash II tablet is Android based and
is promoted by the Ministry of Human and
Resources Development of the Government
of India. The Aakash II tablet is connected to
Internet using Wi-Fi. Then the Google Play
app store available on Aakash II is opened.
Various QR code reader Apps like QR Code
Reader and QR Droid are available in Google
Play for download. They are downloaded
and installed to make the Aakash II tablet
function as a QR code reader.

About the Authors

Radio-Frequency Identication (RFID)


RFID is the AIDC technology which makes
use of radio waves. The system consists of
RFID tags and readers. The RFID tags are
microchips with antennas that store and
transmit data. They are used to store the
identiers and data related to the product
or object that they are tagged to. The
electronic readers can receive the data from
the tag readers and transmit the same to
computers for further processing. Some of
the advantages of RFID are that there is no
line of sight required between the tag and the
reader and the tag can be read from greater
distances since the data is transmitted by
radio waves. The reader can read multiple
tags at one go and at a faster pace when
compared to Barcodes. RFID can store
signicantly larger amount of data when
compared to 1D or 2D Barcodes. One of the
reasons why RFID is not as much visible in
daily use as Barcodes is the cost. RFID tags
and readers are costlier when compared to

Barcodes and Barcode readers.


Near Field Communication (NFC)
NFC is the latest among the various
AIDC technologies mentioned in this
article. It is an AIDC technology based
on wireless radio communication on
similar lines as RFID. The difference is that
NFC may not need specialized readers
and Smartphones can be NFC enabled.
NFC enabled Smartphones can read the
information stored in NFC tags when
touched or brought in close proximity. NFC
tags are designed similar to RFID tags with
chip, memory and antenna. NFC tags are
passive and have no power of their own.
When a NFC enabled device is touched
or brought in proximity to a NFC tag, they
draw power from the device and use this
power to transmit data to the device.
Conclusion
Barcode and QR code use optical
recognition to read data encoded in 1D
and 2D format respectively. RFID and NFC
use the wireless radio communication
technology to transmit data from the
tag to the reader. Barcode is oldest of
the AIDC technologies discussed in this
article but is still popular due to its ease
of use and lower cost. It is expected
that wireless AIDC technologies would
grow further in popularity in future with
lowering costs and due to their ability to
carry more data and transmit them at a
quicker pace. AIDC also nds application
in the Internet of Things which is the
technology of future.
References
[1] Curran, K, Millar, A, & Mc Garvey, C
(2012). Near eld communication.
International Journal of Electrical and
Computer Engineering (IJECE), 2(3),
371-382.

[2] Hong-Ying, S (2009, March). The


application of Barcode technology
in
logistics
and
warehouse
management.
In
Education
Technology and Computer Science,
2009. ETCS09. First International
Workshop on (Vol. 3, pp. 732-735).
IEEE.
[3] http://www.gs1india.org/
[4] Landt, J (2005). The history of RFID.
Potentials, IEEE, 24(4), 8-11.
[5] Liu, Y, Yang, J, & Liu, M (2008, July).
Recognition of QR code with mobile
phones. In Control and Decision
Conference, 2008. CCDC 2008.
Chinese (pp. 203-206). IEEE.
[6] Narayanan, A S (2012). QR Codes
and Security Solutions. International
Journal of Computer Science and
Telecommunications, 3(7), 69.
[7] Sharma, V, Gusain, P, & Kumar,
P. (2013, April). Near eld
Communication. In Proceedings
of the Conference on Advances
in Communication and Control
Systems-2013. Atlantis Press.
[8] Sriram, T, Vishwanatha Rao, K,
Biswas, S, & Ahmed, B (1996, August).
Applications of Barcode technology
in automated storage and retrieval
systems. In Industrial Electronics,
Control, and Instrumentation, 1996.,
Proceedings of the 1996 IEEE IECON
22nd International Conference on
(Vol. 1, pp. 641-646). IEEE.
[9] Want, R (2006). An introduction
to RFID technology. Pervasive
Computing, IEEE, 5(1), 25-33.
[10] Winter, M (2011). Scan MeEverybodys Guide to the Magical
World of Qr Codes. Westsong
Publishing.
n

Mr. K.V.N. Rajesh has obtained his B.Tech in Computer Science and Engineering from Jawaharlal Nehru
Technological University in 2005. He obtained his M.Tech in Computer Science and Technology from
Andhra University in 2010. He is working as Senior Assistant Professor in department of information
technology at Vignans institute of information technology, Visakhapatnam since 2005. He is a member of
Computer Society of India. His research interests include Business Intelligence, Location Intelligence and Big
Data and he has published papers in the respective areas. He is also the webmaster of his college website
http://www.vignaniit.com/. He can be reached at kvn.rajesh@gmail.com.
Mr. K.V.N. Ramesh is a M.E in Structural Engineering from Andhra University. He has 14 years of experience
in IT industry with expertise in the area of Data Warehousing and Business Intelligence. He has worked on
UNIX, Oracle, Sybase, Business Objects and OBIEE during these years. He is an Oracle certied professional in
Oracle DW and OBIEE. He is currently working as Project Manager at Tech Mahindra, Visakhapatnam. He can
be reached at kvn_ramesh@yahoo.com.

CSI Communications | January 2015 | 27

Article

S Palani Murugan
Assistant Professor, Department of Information Technology, E.G.S Pillay Engineering College, Nagapattinam

Information Visualization for Data Analytics


Visualization is the way of representing
facts in graphical form rather than
traditionally keeping data as at texts.
This writing focuses on information
visualization in specic in contrary
to typically explaining its types.
Information visualization is the study of
visual representation of data, meaning
information that has been abstracted in
some schematic form, including attributes
or variables for the units of information,
Friendly 2008 describes.
Information Visualization
It is an interesting area to talk about which
promises role on Data analysis algorithms
that enable extraction of patterns and
trends in data, temporal, geospatial,
topical, and network visualization
and systems that drive research and
development. In so many occasions we
would infer the importance of visual
effects of data, traditionally, in MS-Excel
to represent data and results in terms of
various charts namely bar chart, pie chart
etc. and from those days the application
of visualization still remains the same
and ever promising on representing data
effectively enough to be interpreted by
end users and analyst in no time.
Importance of Information Visualization
Presenting data or the derived results
in pictorial or graphical form is the core
idea behind Information visualization.
In crunch situations, the amount of data
to be considered for analysis will be of
huge volume as people talks in data
warehouse rather than less capable data
stores, at les etc as it allows more
data to derive accurate result than to
be dependent on small amount of data
to derive sensitive results very much in
areas such as medical data analysis. As
a result, the information derived may not
be directly useful for decision makers
and it may require analysts to compare
to nd relevance among results derived.
So analysts have been dependent on
visualization, presenting data in graphical
form, to easily understand and interpret
information.
Typical needs, briey
saying, of visualization are spreadsheets
are difficult to visualize, toughness of
interpretation of data shown in distinct
way and so forth.

Visualization in Machine Learning


Traditionally, systems for analysis
were developed to have well dened
instructions. In converse to that, Machine
learning gives an interesting way to develop
systems which can derive instructions
from given dataset. Instructions in many
ways can be referred to as patterns that are
highly useful in decision support systems.
Normally, it will be of If...then rules, which
is extracted from given dataset rather than
dening it explicitly is said to be a process
of learning. Data Mining is the vast area
which provides powerful algorithms such
as association rule mining, classication,
clustering etc. for predictive analysis.
Area of applications of data mining is
unlimited but includes stock market
analysis, weather forecasting, credit
card fraudulent analysis and heart attack
prediction. We would normally see that
to represent data charts, maps, graphs
being used. Before to visualize, the raw
data needs to be processed and analysed
in systematic way.
Steps in Data Mining Process to
Visualize Information
Information visualization is a phased
approach rather that just showing data in
some manner. Here the primary concern
is to visualize data which should be
meaningful of some sort. Raw data needs
to be cleaned, analyzed and visualized in
the end. Data cleaning includes removing
noisy data, reducing redundancy, lling
up missing values and listed here comes
under pre-processing as process. The
whole approach tells how to take raw data,
extract meaningful information, then use
statistical tools and make visualizations.
Even though reporting tools and some
OLAP (Online Analytical Processing)
queries can be used to retrieve data from
data warehouse usually a data store which
is capable of holding huge volume of data,
it is of applying highly effective data
mining algorithms on Data Warehouse to
better extract useful information that will
be visualized as an end result and which
can be used in DSS (Decision Support
Systems) also. Any analytics has no/fewer
roles in decision support needs to undergo
a lot of changes to effectively support
forecasting and predictive analysis.

Decide on which Visual is Best


There are few criteria to be considered for
generating the best visuals for presenting
your data:
Keen on data to visualize and its
attributes, dimensions etc.
Fix on what to be visualized and the
kind of information to communicate.
Select a visual type which express the
information in the best and simplest form
possible
The biggest challenge in producing
visualization is deciding on what
visualization will best suit to display the
information accurately. For an instance,
Visualization tools like SAS Visual analytics
has intelligent autocharting which is to
create best suited visual for the data being
selected. Especially for non-technicians
and business people this will be a handy
solution for decision making and much to
understand information. The below gure
is an example bar-chart generated from
SAS which displays information by means
of bar chart to quickly assess and interpret
information.

It is not the case that autocharting


always produces visualizations that you
want. In specic case, user can select one
from the list to create the intended visual
type. It produces bar chart, scatter plot,
map frequency chart for geographic data,
histogram, multiscape, parabox, data
constellation and these are the few you
would opt for.
Visualization to Deal with Big Data
Case Studies show that human brain can
process image faster than text. The nal
step in big data analytics workow as
just in data mining process, the big data
analytics visualization is a graphical/
pictorial (visual) representation of the
knowledge patterns gained from analysis.
There is a tool in name of Datameer, for
Continued on Page 37

CSI Communications | January 2015 | 28

www.csi-india.org

Practitioner
Workbench

Wallace Jacob
Senior Assistant Professor, Tolani Maritime Institute, Induri, Talegaon-Chakan Road, Talegaon Dabhade,
Pune, Maharashtra

Programming.Tips()

Fun with C++ Programs Exploring Function


Calls While using the Ternary Operator
This article explores the resulting type of the expression if different
types are present before and after the : while using the ternary
operator in C++. Lets examine the program below and its output:
Program Listing one
#include<iostream>

The conditional operator (? :) takes three operands and has the


following syntactic form:
expr1 ? expr2 : expr3;
expr1 is always evaluated rst and results in either true or
false. If expr1 evaluates to true (1), expr2 is evaluated;
otherwise expr3 is evaluated.

using namespace std;


A few points need to be borne in mind:
void func(int tempvar1)
{
cout <<\nWithin func(int tempvar1),
tempvar1 = <<tempvar1;
}

void func(double tempvar2)


{
cout <<\nWithin func(double tempvar2),
tempvar2 = <<tempvar2;
}

main()
{
int var1 = 1;
func(var1 ? 20 : -9.8);
var1 = 0;
func(var1 ? 30 : -7.6);
return 0;
}
A sample output of the program is given below:
Within func(double tempvar2), tempvar2 = 20
Within func(double tempvar2), tempvar2 = -7.6

About the Author

When the value of var1 is 0, then the function func(double


tempvar2) is invoked. Interestingly, when the value of var1 is 1,
then also the function func(double tempvar2) is invoked. Why?

If expr2 and expr3 are of the same type (for instance, int),
then the result is of the same type (i.e. int).
If one operand is an int and the other operand is an unsigned
int, then int is converted into unsigned int.
In short, if expr2 and expr3 are not of the same arithmetic type
(for instance, int and float), then the usual implicit arithmetic
conversion rules apply.
A rank can be assigned to different data types as follows:
short
int
long
long long
oat
double
long double

1
2
3
4
5
6
7

If expr2 and expr3 are not of the same rank, then normally the
lower-ranking operand is promoted to the higher-ranking operand.
In the statement:
func(var1 ? 20 : -9.8);
expr2 is of type int and expr3 is of type double. As per the
above discussion expr2 is promoted to type double and hence
func(double tempvar2) is invoked when the value of var1
is 1.
n

Wallace Jacob is a Senior Assistant Professor at Tolani Maritime Institute, Induri, Talegaon-Chakan Road,
Talegaon Dabhade, Pune, Maharashtra. He has contributed articles to CSI Communications especially in the
Programming.Tips section under Practitioner Workbench.
E-mail:wallace_jacob@yahoo.co.in
Office Contact No:02114 242121

CSI Communications | January 2015 | 29

Innovations
in India

Hari Kishore* and Gururaj Anjan**


*Lead Architect, Software Engineering Group, Tata Consultancy Services (TCS)
**Lead Architect, Software Engineering Group, Tata Consultancy Services (TCS)

Software Product Engineering Maturity Model


Product development in stipulated time
and cost, and ensuring quality has always
been a formidable challenge for the
software industry. Several development
methodologies and automated tools are
used to engineer the product. To ensure
an architecture-centric development
and to adopt a product-line approach for
interoperable products and infrastructure,
it is essential for the team to follow a
structured approach supported by a
framework of processes.
Several methods have been developed
with automated tools to assess software

To ensure architecture-centric development


and to adopt a product-line approach for
interoperable products and infrastructure, it
is essential for the team to follow a structured
approach supported by framework of processes.

product maturity level. However, no


known assessment methods and system
demonstrates an approach that focuses
on key competency areas that include
Process, Architecture, Infrastructure and
People. Also, no known evaluation model
demonstrates software product maturity
assessment based on a dened degree

of maturity levels and Key Focus Areas


(KFA).
TCS focused on key attributes
of product engineering and devised a
maturity model that has four dimensions
of measurement and a provision to scale
for future requirements of the product
maturity model. Software Product
Engineering Maturity Model (SPEMM)
enables the assessors to objectively
measure the maturity across each
dimension and results in an objective and
holistic product engineering approach.
SPEMM can be leveraged to legacy

Fig. 1: TCS Software product engineering maturity model

CSI Communications | January 2015 | 30

www.csi-india.org

software products for dening scope of


reengineering, digital software products,
enterprise projects and products. It is
industry
domain-agnostic;
however,
it enables the assessors to the model
congure to address domain aspects.
The key features of SPEMM are:

Four levels of product engineering


maturity Basic, Established,
Differentiated and Leadership

Four Competency Areas (CA) of


product engineering Process,
Architecture, Infrastructure and
People

Seven KFA Product planning,


Technology Tools and Methodology,
Product and Code quality and so on
(shown in Fig. 1)

Each CA comprises attributes


covering each KFA (with an option
of yes or no). Each maturity level
of product engineering maturity
comprises 28 sets of attributes
spread across four CAs and seven
KFAs.

Weightage of KFA attributes vary


based on maturity of the engineering
unit. For example, KFA - Product
Planning weightage is more in lower
Adopting SPEMM has helped the Product
Engineering teams to institutionalize product
engineering practices and establish Product
Engineering as a distinct practice from Project
Engineering.

maturity engineering unit while


KFA Product Planning weightage
is less in higher maturity engineering
unit. Similarly, KFA - Intellectual
property creation will have less
weightage for lower maturity
engineering units, while KFAIntellectual property creation will
have higher weightage for higher
maturity engineering units. This is a
unique feature of SPEMM compared
to other models in the industry.
SPEMM is automated through
a specialized tool, which uses
weightages to derive scores across
the CAs and KFAs and Quantitative
score is produced as a result of the
assessment.

The following list provides information


on various phases in SPEMM and the
processes followed in each phase:
1. Initiate phase - Assessors establish
the context of assessment and
preliminary assessment of level of
maturity of the unit where SPEMM is
being applied.
2. Collect phase Assessors collect
required
documentation
to
understand the engineering, people
and architecture processes and
infrastructure provisioning.
3. Analysis phase -Assessors apply
SPEMM to score the software
product against CAs and KFAs.
Assessors discuss and agree on
recommendations for the Product

team to achieve next level of maturity


in SPEMM.
4. Prepare phase - Assessors prepare an
assessment report with presentation
of scores, products SWOT analysis
with respect to SPEMM maturity
levels, recommendations in the form
of Must do, Should Do, Could do
and Would Do (MoSCoW) format
and management summary for the
Product Management team.
5. Present phase - Assessors present
the assessment report to the product
stakeholders.
6. Certication of the product at a level
of SPEMM maturity is granted to
the Product team at the end of the
assessment.
7. Plan for Support phase is published
with responsibilities for assessing
unit and engineering unit.
Over the last two and half years, more
than 30 SPEMM assessments have been
leveraged to assess several TCS and client
products. Adopting SPEMM has helped the
Product Engineering teams to institutionalize
product engineering practices and establish
identication of Product Engineering as a
distinct practice from Project Engineering.
Reference
[1] TCS Published Patent Application
- US 20140122182 A1 System
and method for assessing product
maturity Gururaj Anjan, Suresh
Cherusseri, Manoranjan Panda.
n

About the Authors

Hari Kishore Lead Architect, Software Engineering Group, Tata Consultancy Services (TCS) Hari has 17 years of
experience in the IT industry in Solution envisioning, Architecture development, Product development, enterprise
transformation programs, Process deployment and Large Bid response management. He is an Open Group Master
Certied IT Architect, a TOGAF 9 certied architect and a practicing architect. Hari is currently a Lead Architect
in Software Engineering Group, a software product development unit of TCS. He holds a Master of Technology
degree from Indian Institute of Technology, Kharaghpur, India.
Contact Details: +91 92462 90058; gh.kishore@tcs.com.
Gururaj Anjan Lead Architect, Software Engineering Group, Tata Consultancy Services (TCS) Gururaj Anjan is a
Senior Architect in TCS specializing in Solution Architecture for Business solutions. He has a Bachelors degree
in Computer Science and Engineering. He has architected and managed several business solutions across many
industry domains and geographies. He has been with Solution Engineering Group since its inception and was
instrumental in driving architectural excellence and automating various aspects of product engineering lifecycle.
Currently, he is the Lead Architect for one of the agship business solution at TCS.

Innovators interested in publishing about their work can send a brief write up in 150 words to Dr Anirban Basu, Chairman, CSI Div V, at div5@csi-india.org.

CSI Communications | January 2015 | 31

Security Corner

Hemant Kumar Saini


M. Tech, Department of Computer Science Engineering, RTU, Kota (Rajasthan)

Information Security

A Security Solution for Rogue Wi-Fi Access Point


With rapid evolution in mobile technology,
number of mobile devices in use is
increasing continuously in various
geographical areas. This is creating
regional saturation, leading to increase
in challenges. One of the dangers faced
by Wi-Fi users today is attributable to
rogue access point (RAP) attack. To guard
against such attacks various methods of
intrusion detection are being deployed.
But these methods are being averted as
the RAP is detected by using received
signal strength indicator (RSSI) values.
The invader tries to facsimile the RSSI
value by either slipping in the RAP within
an area of the detector as the victim or
suppresses the RSSI output to correspond
with the victims RSSI values. Meanwhile,
both the access points (APs) - valid AP
and fake AP exist at the same time, which
discover a set of normal and abnormal
traffic. Extracting both the traffic is a new
challenge in RAP detection.

the current intrusion detection systems


(IDS) are still lagging behind in detecting
a type of attack where legitimate AP
is incorporated by the attacker. Hence,
current systems need to be updated
or new methodologies are required for
dispensing with such attacks. For such
situations there are some methods which
can deal with RSSI values that are hashed
out in the following segment.

Challenge
Several methods exist to defeat the RAPs
which impersonate either AP location or
their credentials. Though, the legitimate
AP is down or not broadcasting, and so
at that place there would be no normal
traffic to compare to. For example, where
a legitimate AP is down and a false AP
drives up, with neither existing together.
In such a case where two systems coexist,

Setting Up Location Manager


As said earlier the access points can be
facsimiled by altering RSSI values. So the
RSSI values should also be selected with
precaution according to device types. For
instance, 802.11a work on -78 dBm to
-55 dBm whose default is -72dBm and as
of 802.11 b/g whose default is -67dBm so
the best suitable ranges must be varied

Enabling RAP Detection


Although it is analyzed that the RAP
attack has no denial, some measures can
be admitted to congure the wireless
device for RAP detection as follows
Choose the wireless conguration
and enable the RAP detection.

Also add the trusted access points.

Instantly adjust the scan frequency


for automatic detection after some
specied interval.
This way the device can detect any
abnormal traffic by scanning.

Fig. 1: Propagation of Chameleon attack

CSI Communications | January 2015 | 32

from time to time whenever the device


nds any RAP attack. This power helps a
good deal in dealing with those attackers
who try to undertake the invasion by
tampering RSSI values.
But what about the attacks which are
not based on RSSI value? One such attack
is discussed in the following part.
Chameleon Attack
Since long the malicious activities
have been discovered by IDS system in
Wireless. But a fresh case of malicious
act has been challenging this, as the
newly programmed chameleon virus adds
the fraudulent AP without any change in
traffic volume or address location that
it cant be noticed even by IDS which
rely on the traffic volume for identifying
any bustling in the network. It has been
programmed in such a manner that after
establishing suspected AP it bypasses
encrypted security and stores own
settings onto the targeted AP as shown in
Fig. 1. Similarly, RSSI usage is also failing
in detection due to change in transmit
power. But a new hope came across with
a method suggested based on the layer-2
management frame which detects by
comparing beacons inter-arrival times
and examines the frame exchange to
distinguish the Wi-Fi AP.
The whole procedure of identication
is divided into two steps:
1. Selection of outliers As the beacons
passing by Wi-Fi APs have been
lined up for observation and passes
via the outlier bounds comparator
where each frame is compared within
the orbits calculated by standard
deviation formula of packet interarrival timings.
upper bound = mean value + std dev * 4
lower bound = mean value - std dev * 4
If the selected outliers are within the
permissible range, it passes for suspecting
the illegitimate changes as indicated in
Fig. 2 (a).
2. Detection of illegitimate change The
currently selected beacon frames are
compared to the window averages as
depicted by giving formula:

www.csi-india.org

About the Author

www.watchguard.com/help/
docs/wsm/xtm_11/en-US/index.
html#en-US/wireless/wireless_
rogue_ap_detection_enable_c.ht
ml%3FTocPath%3DWireless%2
520Device%2520Setup%7CRog
ue%2520Access%2520Point%2
520Detection%7C_____1
[3]
J
Milliken,
An
investigation
into
MAC-layer intrusion
detection strategies
for
open-access
wireless
LANs,
Thesis,
Queens
University,
Belfast,
2012.
[4]
V
Nagarajan,
V
Arasan, D Huang,
Fig. 2: (a) Selection of outliers based on the bounds (left) and (b) Tracking of illegitimate changes (right)
Using Power Hoping
to Counter MAC
window upper bound = mean value + std dev * 0.1
are propagating are still observed. Most
Spoong
Attacks
often the methods specied above have
window lower bound = mean value - std dev * 0.1
in
WLAN,
pp-1-5,
overcome the situation but still the APs are
Then the RAP window is appended as
seventh
IEEE
consumer
under research and deliver a wide scope
shown in Fig. 2 (b). These appendors are
communications
for future researchers who are interested
just for the sake of window maintenance
and
networking
in working on Wi-Fi security and catching.
otherwise these RAP window averages are
conference(CCNC),
added and if they exceed the threshold 0
References
Las Vegas, USA, 2010.
then the virus can be easily found.
[1] Jonny Milliken, Valerio Selis and Alan
[5] J Milliken, V Selis, KM Yap, A Marshall,
Marshall, Detection and analysis
Development of device identity
Conclusion
of the Chameleon WiFi access
using WiFi layer 2 management
We know that there is no such xed method
point virus, EURASIP Journal on
dened till now, which can with-stand all
frames for combating rogue APs,
Information Security 2013, Retrived:
attacks in WI-Fi. The IDSs are updated with
international conference on security
http://jis.eurasipjournals.com/
novel methods based on RSSI which helps
and cryptography (SECRYPT13), ppcontent/2013/1/2
a great deal. But notwithstanding this,
488-493, 2013.
[2] Rogue Access Point Detection, http://
attacks such as chameleon program which
n

Mr. Hemant Kumar Saini is a Red hat Certied Engineer. He has recently completed M. Tech in Computer
Science & Engineering from Rajasthan Technical University, Kota in 2014. He has completed his B. Tech in
Information Technology from MLV Government Textile & Engineering College. He is having 2 years of industrial
experience and one year of academic experience. His research interests are Computer Network and Security.
E-mail: hemantrhce@rediffmail.com

Kind Attention: Prospective Contributors of CSI Communications


Please note that Cover Themes for forthcoming issues are planned as follows:
February 2015 Quantum Computing
March 2015 Machine Translation
Articles may be submitted in the categories such as: Cover Story, Research Front, Technical Trends and Article. Please send your contributions
before 20th of a month prior to the issue month for which you are contributing. The articles may be long (2500-3000 words maximum) or short
(1000-1500 words) and authored in as original text. Plagiarism is strictly prohibited.
Please note that CSI Communications is a magazine for membership at large and not a research journal for publishing full-edged research papers.
Therefore, we expect articles written at the level of general audience of varied member categories. Equations and mathematical expressions within
articles are not recommended and, if absolutely necessary, should be minimum. Include a brief biography of four to six lines for each author with high
resolution author picture.
Please send your articles in MS-Word and/or PDF format to the CSI Communications Editorial Board via email id csic@csi-india.org.
(Issued on behalf of Editorial Board of CSI Communications)

CSI Communications | January 2015 | 33

Security Corner

Dr. Vishnu Kanhere


Convener SIG Humane Computing (Former Chairman of CSI Mumbai Chapter)

Case Studies in IT Governance, IT Risk and Information Security


IT Infrastructure the underlying base
IT infrastructure is the combined set of hardware, software, networks, facilities, etc. (including all of the information
technology), used in order to develop, test, deliver, monitor, control or support IT services. It is the basis, foundation and
support on which the IT services and facilities of an organization function. It covers the Hardware, e.g. servers, computers, data
centers, switches, hubs and routers, etc., the Software, e.g. application software like core banking, enterprise resource planning
(ERP), customer relationship management (CRM), productivity applications and also system software such as operating
system software etc., the Network, e.g. Network enablement, Internet connectivity, rewall and security etc. IT infrastructure
forms the basis for the existence, operation and management of the IT environment of an enterprise. It allows the organization
to deliver IT solutions and services to its employees, partners and/or customers / stakeholders and is usually internal to an
organization and deployed within owned facilities. The current trend with infrastructure being offered as a service by IT majors
is for SME enterprises to outsource IT infrastructure. The advent and proliferation of the cloud has also given an impetus to the
outsourcing trend.
Standards like Information Technology Infrastructure Library (ITIL) dene best practices and accepted techniques in the
information technology community. This set of guidelines is widely used both in the public and private sector, essentially
providing enterprises with a blueprint on how to organize and manage information technology operations at the company. The
library is constantly updated to ensure accuracy and to include emerging technological advances. ITIL provides a systematic
and professional approach to the management of IT service provision. Thus IT management, of which IT infrastructure is a part,
involves planning, design, selection, scheduling, implementation, use, and administration of information and communications
technologies using IT infrastructure to deliver IT services and solutions to meet enterprise goals and needs.
With the growing dependence on IT most enterprises face multiple IT challenges, in areas like security, governance, service
delivery, meeting expectations and deadlines, keeping costs under control, etc. Outsourcing and the cloud have both changed
even more the way IT infrastructure is being deployed and used. This has enabled and provided answers to many of the above
issues but given rise to new ones prominent among them being in the domains of IT security and IT governance. It has become
necessary to have a better understanding of the various issues and challenges in IT infrastructure to be able to better manage
and operate the IT environment in modern enterprises.
Given this background the current Case in Information Systems is being presented. The facts of the case are based on
information available in media reports, online information and some real life incidents. Although every case may cover multiple
aspects it will have a predominant focus on some aspect which it aims to highlight.
A case study cannot and does not have one right answer. In fact answer given with enough understanding and application
of mind can seldom be wrong. The case gives a situation, often a problem and seeks responses from the reader. The approach
is to study the case, develop the situation, ll in the facts and suggest a solution. Depending on the approach and perspective
the solutions will differ but they all lead to a likely feasible solution. Ideally a case study solution is left to the imagination of the
reader, as the possibilities are immense. Readers inputs and solutions on the case are invited and may be shared. A possible
solution from the authors personal viewpoint is also presented.

A Case Study of Lemons & Melons Inc.


Deepak the CEO of Lemons & Melons
Inc has taken charge a month back. He
is concerned about the IT infrastructure
and how IT helps operate and support
the company business which spans
a broad spectrum from consumer
products to agricultural inputs and
business / office support equipments.
Deepak is tech savvy and is concerned
about the state of IT at Lemons &
Melons Inc and has plans to make it
better and more effective. He calls
a meeting of his management team
and shares his viewpoint. He expects
the team to share their experiences
and concerns about IT. To be fair the

CSI Communications | January 2015 | 34

IT head and team are also present to


share their thoughts and views.
The gist of the discussion and issues
raised boil down to these

IT always keeps saying no to what we


propose to do, they are very negative
just pointing out why something
cannot be done. Take the case of
using handheld devices for our sales
staff. Samar, Marketing Manager

Slow response time was another from


the operations department. What we
consider important is always kept on
the back burner and they claim lack
of support or user problems.

They always want to put newer

systems just because they have


more juice. Why given a chance they
will change all servers every year
remarked the senior manager.
The IT department had its own
grouse.

We are always last in line, seldom


getting an ok for capital expenditure
and even our revenue budgets are
always cut.

Our trainings are never taken


seriously was another grouse.

The board does not appreciate the


seriousness of some of the issues
especially security and disaster
recovery.

www.csi-india.org

Deepak and the team felt at the


end of the meeting that primarily they
had only realized that all of them on
both sides of the table had issues which
they felt strongly about. Deepak decides
to take the initiative and forms a team
to understand the real issues and only
then could something worthwhile be
done. For good measure they call in
Subal the external IT expert to guide
the meeting and provide inputs. Subal
conducts a joint meeting and a series of
smaller meetings of each group and has
now come up with an understanding of
the major issues. What would be your
thoughts if you were Subal?

About the Author

Solution
The situation
Conguration Management is a major
hurdle in IT Infrastructure. It is very difficult
in a large organization with conicting
demands and needs to understand and
document what is required for an IT
service. You need to tap too many sources,
users, departments each with differing
priorities and pull it all and get it together
to make sense.
As a result there is mismatch in
capacity planning, loss of scalability, not
enough alignment of IT with strategic
goals. Performance problems, lack of
availability / downtime and unforeseen
failures make the situation even worse.
Within the IT department effective
communication in the language of
business seems to be a major hurdle
which causes problems at both ends. IT
fails to convince and get what they need
from the top and find it challenging to
convince the users that they are in fact
doing their best.
Compliance, governance, metrics,
risk management are other issues. These
are often compounded by poor supplier

relations and inadequate skills, training


and processes.
The consequences
As can be seen the issues and the
challenges are numerous and multi
faceted and are aggravated by poor
communication between departments.
If the approach is restricted to problem
solving and reactive re ghting the
difficulties will only increase and
the results are not likely to improve.
Technology or even emerging technology
is not the core issue. Nor is the availability
or otherwise of funds and budgets. But
these are merely enablers or enhancers
that will take you more or less further on
the path. The direction has to be right rst
and that unless addressed in a proactive
manner will not yield results for Lemons &
Melons Inc.
The strategy
The right strategy for Lemons & Melons
Inc at this stage would be:
Formulate the issues under broad heads:
1. Alignment of IT to strategic goals
2. Compute
management
and
provisioning capacity planning and
scalability
3. Better communications and relations
intra department, with users, top
management and suppliers
4. Compliance, governance, metrics
and risk management
5. Capacity planning and scalability
6. Some other issues not visible at this
stage legacy systems, energy and
environmental challenges, network
issues, help desk issues
Approach these issues under
an umbrella initiative that deals with
sustainability of the IT infrastructure as
being the most proactive approach. This
can be done by formulating these issues

and problems under the following heads


and take them up in the order of priority
to be worked out in terms of addressing
those under the rst head rst and so on
1. Improved reputation Positive effects
on company image, reputation and
brand strength.
2. Employee engagement - Positive
effects on employee engagement
motivation,
retention,
and
recruitment
3. Cost efficiency and savings
initiatives and issues that when
tackled will promote cost efficiency.
4. New markets increased market
share, new revenue sources,
increased revenue from existing
sources, and improved market share
and pricing power.
5. Reduced risk risk reduction and
management
6. Social Responsibility IT helping
the perceptions of the company as
a good citizen in its dealings with
communities, employees, and the
environment.
The way forward is to adopt a
proactive approach to improve the IT
infrastructure and its management using
frameworks like ITIL. IT should not only
be aligned to the strategic objectives of
the enterprise and be exible yet resilient
but also be communicative with all its
stakeholders both internal and external.
Finally the IT initiatives need to be
evaluated and prioritized based on the
six criteria outlined above of increased
reputation,
employee
engagement,
cost efficiency and savings, new
markets, reduced risks and nally social
responsibility.
An effective solution is generally
expected to proceed on these lines.
n

Dr. Vishnu Kanhere Dr. Vishnu Kanhere is an expert in taxation, fraud examination, information systems security and
system audit and has done his PhD in Software Valuation. He is a practicing Chartered Accountant, a qualied Cost
Accountant and a Certied Fraud Examiner. He has over 30 years of experience in consulting, assurance and taxation for
listed companies, leading players from industry and authorities, multinational and private organizations. A renowned faculty
at several management institutes, government academies and corporate training programs, he has been a key speaker at
national and international conferences and seminars on a wide range of topics and has several books and publications to his
credit. He has also contributed to the National Standards Development on Software Systems as a member of the Sectional
Committee LITD17 on Information Security and Biometrics of the Bureau of Indian Standards, GOI. He is former Chairman
of CSI, Mumbai Chapter and has been a member of Balanced Score Card focus group and CGEIT- QAT of ISACA, USA. He
is currently Convener of SIG on Humane Computing of CSI and Topic Leader Cyber Crime of ISACA(USA). He can be
contacted at email id vkanhere@gmail.com

CSI Communications | January 2015 | 35

Security Corner

Prashant Mali
Cyber Law & Cyber Security Expert, Author, Speaker

IT Act 2000

Trolls, Trolling & Cyber Law


Trolls are keyboard warriors heavy on
typing and tiny on feelings, they get a zing
out of online aggression and what makes
it attractive to trolls is the anonymity.
This sense of the word troll and its
associated verb trolling are associated
with Internet discourse, but have been
used more widely.
Relatively, little is known about the
type of people who troll. A study published
by the University of Manitoba, in Canada,
found trolls exhibit the personality traits
of narcissists, psychopaths and sadists
taking pleasure in the suffering of others
and lacking remorse or empathy for their
victims.
Trolls are like the Joker villain,
operating as agents of chaos on the
internet, the study said. They are Online
sadists and are insatiably nasty. There
is no reasoning with them. The more
havoc they sow, getting more people
to argue with them, the happier they
are. Most of people who are trolls do
this for reasons like having an abusive
childhood, Mental illness / Mental Health
Problems, Homosexuals in denial, Social
Outcastsor are Sexual Predators.
Trolls are like the Joker villain, operating as
"agents of chaos on the internet", the study said.
They are "Online sadists" and are insatiably
nasty. There is no reasoning with them. The
more havoc they sow, getting more people to
argue with them, the happier they are.

Their chaotic behavior can have


dire consequences. Australian celebrity
Charlotte Dawson, who committed
suicide, had long been attacked by trolls
saying she should kill herself or self-harm.
Some victims are targeted with rape and
death threats. The abuse might spill offline
with victims receiving threatening phone
calls or having their home address, email
id & cell No.s posted online.
What is the Law to Punish Trolls ?
Till November 2014 there has been
113 registered cases of online abuse in
Mumbai City alone for the year 2014 vis-vis 33 cases reported in 2013 as found
out in a reply to a application under the
law of Right To Information led with

CSI Communications | January 2015 | 36

police authorities. In India, we can nd


two different sections in two different laws
which can be applied to trolls, making
trolling a criminal act but only if few
ingredients mentioned in the sections are
present in the comments posted by trolls.
Section 66A of The IT Act, 2000
i.e Punishment for sending offensive
messages
through
communication
service, etc. Any person who sends,
by means of a computer resource or a
communication device,
(a) any information that is grossly
offensive or has menacing character; or
(b) any information which he
knows to be false, but for the purpose
of causing annoyance, inconvenience,
danger, obstruction, insult, injury,
criminal intimidation, enmity, hatred or
ill will, persistently by making use of such
computer resource or a communication
device,
(c) any electronic mail or electronic
mail message for the purpose of causing
annoyance or inconvenience or to deceive
or to mislead the addressee or recipient
about the origin of such messages, shall
be punishable with imprisonment for a
term which may extend to three years
and with ne. it is a cognizable offence but
bailable offence.
Section 66A of the IT Act, 2000
was enacted to be a anti-stalking, antiphishing and anti-spamming provision.
now looks vague, ambiguous and easily
abused. The terms used as annoyance and
inconvenience does not forebear a clear
meaning in criminal law.
*If the troll writes something which is
not offensive or the police feels so that it
is not offensive, then Section 66A would
not be applied.
The newly addedSection 354A(iv)of
the Indian Penal Code(IPC) says if
any man (while trolling also) makes a
Sexually colored remark would be
guilty of sexual harassment. He shall be
punished with imprisonment of either
description for a term which may extend
to one year, or with ne, or with both. it is
acognizableoffence but bailable offence.
Looking at above two sections let
me tell you trolling becomes a grievous

offence, if trolling amounts to abating the


suicide of the person so affected, then the
trolls can be charged with Section 306 of
the Indian Penal code(IPC) that says If any
person commits suicide, whoever abets
the commission of such suicide, shall be
punished with imprisonment of either
description for a term which may extend
to ten years, and shall also be liable to
ne. it is a cognizable offence and NonBailable offence.
In UK The Malicious Communications
Act,which was passed in 2004, allows for
a maximum penalty of only six months
against cyber trolls and other internet
troublemakers. Under the law, cybertrolls
are dened as Those who subject others
to sexually offensive, verbally abusive or
threatening material online. This law is
slated to be changed and now the penalty
up to 2 years imprisonment would be
made for trolls.
In Australia The Commonwealth
Criminal Code Act (the Criminal Code)
Part 10.6 can be used to prosecute
individuals who are trolls.
Trolling is been addressed in U.S.
federal law i.e the Violence Against
Women Act, passed in 2000, cyber
stalking is a part of the federal interstate
stalking statute. Under 18 U.S.C. 875(c),
it is a federal crime, punishable by up to
ve years in prison and a ne of up to
$250,000, to transmit any communication
in interstate or foreign commerce
containing a threat to injure the person
of another. Section 875(c) applies to any
communication actually transmitted in
interstate or foreign commerce - thus it
includes threats transmitted in interstate
or foreign commerce via the telephone,
e-mail, beepers, or the Internet.
Is there an Indian Agency to Monitor and
take on them?
There is no agency in India to specically
monitor trolls or comments posted by
trolls. If one complaints to police, then
police can approach a court of to pass
an order directing CERT-In and Google
to delete a set of defamatory blogs. The
Police is empowered to obtain such an
order from the Court as per section 69A
of the IT Act,2000. This section refers to

www.csi-india.org

the power to issue directions for blocking


public access of any information through
any computer resource.
Law is particularly handicapped
in cases where the person is based
abroad, and not within Indian jurisdiction.
facebook shares details of its users only in
issues of national interest, like terrorism.
Can Trolls be Actually Punished ?
The internet transcends boundaries in a
way that most national laws do not.
When to determine relevant
jurisdiction of a particular comment
by a troll the following questions to be
considered
The law of the country where the
victim resides?
The law of the country where the
host server is located?
The law of the country where the troll
resides?
The answers could point to three
different jurisdictions, it may be that a
victim of a India, troll using a Australian
server is located in England.
Whether or not a troll could find him
or herself being extradited will depend
on which two countries are involved,
the applicable Treaty or Convention
governing
extradition
proceedings

between the two countries and the


specific facts of the case. In India, if
trolls write offensive or having menacing
character comments or comments
with sexually colored remarks, they
can be arrested without warrant and
prosecuted.
Case Laws of Trolls
The case of Zeran v. America Online,
Inc. resulted primarily from trolling. Six
days after the Oklahoma City bombing,
anonymous users posted advertisements
for shirts celebrating the bombing on
AOL message boards, claiming that the
shirts could be obtained by contacting
Mr. Kenneth Zeran. The posts listed
Zerans address and home phone number.
Zeran was subsequently harassed.
In Tamiz v Google Inc [2013] EWCA
Civ 68 the Court of Appeal held that an
internet platform (Google) is a publisher
of defamatory material if it does not act
promptly upon such notication.
European
Court
of
Human
Rights (First Section) in Del AS v
Estonia (no.64569/09), which found
the website liable for comments posted
by anonymous users, despite the
website having removed the comments
complained of on the same day that the

complaints were made.


In Daniel Hegglin Vs Google which
was settled outside the court. For over
three years the UK businessman has been
the victim of a relentless campaign of
internet abuse by an unknown troll. Nearly
4,000 websites contain this slanderous
material about him and any Google search
for his name will bring them up. When he
complained to Google they removed some
links when alerted to them. But in his claim
led to the High Court in the UK, Hegglin
said the company didnt do enough to stop
the torrent of vile and abusive material in
its search results.
Conclusion
Trolling is the subset of crime of Online
Abuse, Trolls are the new generation of
cyber criminals who propagate cyber
crime of hate. Even though some may
argue trolling is not a pure crime but the
ne line coupled with consequences like
drawing the victims to suicide, because
of comments by trolls sometimes make
it a grievance offence. Netizens need to
understand and learn that the anonymity
with which they do trolling can be
detected and law when catches up, will
only see them behind the bars.
n

Continued from Page 28


big data visualization, presentation/
representation is tied to the analysis, so as
the data changes the visualization will also
change consequently.

About the Author

Conclusion
Seeing one picture can be of worth reading
100 lines of text; better wordings cannot
be there to express the importance of
visualization. There are many visualization
tools available for distinct purposes
as single methodology or tool cannot
survive on specic needs of different
application data. This article may not be
a big deal for getting to know everything
about information visualization in a single
place, yet it can provide some useful facts

and information about visualization as


a concept and the key application areas
of concern. More importantly this can
take you for a small tour of visualization
concepts.
References
[1] Shixia Liu, Weiwei Cui, Yingcai
Wu, Mengchen Liu, A survey on
Information visualisation: Recent
advances and challenges , Microsoft
Research area, 2013.
[2] Dr. Prithwis Mukerjee, Learning
Data Science A Do-It-yourself
Approach, CSI Communications,
July-2014.
[3] Visualization for BigData : http://

www.datameer.com/product/datavisualization.html
[4] Data Visualization: Making Big
Data Approachable and Valuable,
Whitepaper,
SOURCE:
IDG
RESEARCH SERVICES, AUGUST
2012.
[5] Data Visualization Process: http://
o c w. m i t .e d u /re s o u rce s /re s - 6 009-how-to-process-analyze-andvisualize-data-january-iap-2012/
[6] Tools for visualization: http://
www.computerworld.com/
article/2502891/businessi n t e l l i ge n ce /8 - co o l - t o o l s -fo rdata-analysis-visualization-andpresentation.html
n

S.Palani Mururgan is an Assistant Professor, Department of Information Technology of E.G.S Pillay Engineering College,

Nagapattinam. He is passionate about technical writing. He loves to teach Data Mining and Cloud Computing. His
research interests are Soft Computing in Data Mining & Predictive Analysis for Cloud Security. He can be reached at
suyambhu@gmail.com.

CSI Communications | January 2015 | 37

Brain Teaser

Dr. Debasish Jana


Editor, CSI Communications

Crossword
Test your Knowledge on IT Infrastructure
Solution to the crossword with name of rst all correct solution provider(s) will appear in the next issue. Send your answers to CSI
Communications at email address csic@csi-india.org with subject: Crossword Solution - CSIC January 2015

CLUES
ACROSS
2.
7.
10.
11.
12.
16.
17.
19.
20.
23.
24.
25.
26.
28.
30.
32.

A new trend of computing where resources (storage, computation power etc)


are delivered as services (5, 9)
A connectionless protocol for use on packet-switched networks (4)
A set of practices for IT service management (ITSM) (4)
Portable data terminal (3)
A channel access method for shared medium networks (4)
A packet oriented mobile data service on the 2G and 3G cellular
communication system (4)
Process of keeping track of a users activity while accessing the resources (10)
A device responsible for modulation and demodulation of communication
between computer and phone line (5)
Properties of an entity that makes it denable and recognizable (8)
A standard for the short-range wireless interconnection of devices and
computers (9)
Code Division Multiple Access (4)
A digital mobile telephony system that is widely used in Europe and other
parts of the world (3)
Process of granting or denying a user access to resources (13)
A special device that detects or measures a physical property and records,
indicates, or otherwise responds to it (6)
The basic geographic unit of a cellular system (4)
A collaborative movement led by international standards body W3C (8, 3)

DOWN
1.
3.
4.
5.
6.
7.
8.
9.
13.
14.

Did you know what does Autonomic Computing mean?


Started by IBM in 2001, autonomic
computing refers to managing networked
computing infrastructure by self-managing
without direct human intervention,
through self-conguration, self-healing,
self-optimization and self-protection
(collectively called CHOP).

15.
18.
21.
22.
27.
29.
31.

A protocol in which every device on Internet is IP-addressable for identication


with location (4)
Universal Description, Discovery, and Integration (4)
Global network connecting any smart object (8, 2, 6)
A forwarding element, enabling various local networks to be connected (7)
A messaging protocol (4)
The ability of different IT systems and software components to communicate (16)
The person who envisioned Device to Device communication (4, 3)
A technical arrangement for radiating and receiving electromagnetic waves (7)
Process of identifying an individual usually based on a username and password
(14)
A unique identier for network interfaces for communications on the physical
network segment (3, 7)
A wireless standard of third generation (3G) (4)
A markup language (3)
An open standards based interface denition language (4)
The ability of an individual or group to seclude themselves (7)
Language for describing web ontology (3)
A 4G mobile communications standard (3)
A universal unique electronic identier used to identity for every physical object
anywhere in the world (3)

Solution to December 2014 crossword

(More details can be found in


http://en.wikipedia.org/wiki/Autonomic_computing)

We are overwhelmed by the responses and solutions received from our


enthusiastic readers

Congratulations!
NEAR ALL correct answers to December 2014 months
crossword received from the following reader:
Er. Aruna Devi (Surabhi Softwares, Mysore),

CSI Communications | January 2015 | 38

www.csi-india.org

Happenings@ICT

H R Mohan
ICT Consultant, Former AVP (Systems), The Hindu & President, CSI
Email: hrmohan.csi@gmail .com

ICT News Briefs in December 2014


The following are the ICT news and
headlines of interest in December 2014.
They have been compiled from various
news & Internet sources including the
dailies - The Hindu, Business Line, and
Economic Times.

Voices & Views

Mobile
attacks
would
deploy
Cryptolocker solutions to lock les on
your mobile devices, seeking a ransom.
Mobile ransomware will break into cloud
accounts and encrypt the data - FireEye.
India ranked 6th largest source of worlds
spam. The US (14%), Russia (6.1%) and
Vietnam (6%) were the three biggest
sources of spam in the 3rd quarter of
2014. - Kaspersky.
A new breed of writers is taking the
self-publishing route, capitalising on the
digital boom and spread of e-books. Selfpublishers can make up to 70% from
royalties as opposed to 5-20% from
traditional publishing.
Domestic demand for IT hardware
and electronics is expected to touch
$400 billion by 2020 of which $320 will
be imported. Make in India to offer big
opportunity for IT manufacturers MAIT.
As on March 2014, India had a total of
1,60,005 ATMs, of which 58% are in
metro and urban centres, 27% in semiurban centres and only 14.5% in rural
centres.
The margins for selling saris can go up to
200% in the online segment compared
with 60% for other categories like apparel,
and consumers durables.
The Internet of Things is pegged to be a
market size of $8.2 trillion by 2020 IDC.
The Internet of Everything (IoE) value at
stake in India over 10 years (20132022)
is $511 billion with private sector value is
$394.4 billion and public sector value is
$116.2 billion. India will have 526 million
Internet users and 1.5 billion networked
devices by 2018 Cisco.
Implementation of free software across
3.2 lakh schools in the country could lead
to savings of more than Rs. 8,000 crore.
Rs. 18 lakh is spent per school under the
Centres ICT in Education scheme
Rahul De, HP Chair Prof., IIMB.
Smart cities should aim at improving
governance Modi.

Govt, Policy, Telecom, Compliance

The new IT Policy of the Maharashtra


Govt. will have imprints of Modis Digital
India and Make in India campaigns,
while building on the 2009 IT/ITeS Policy.
Aims to create technology hubs and
lease out land to IT/ITeS companies for
99 years and also plans to automate all
citizen services.
With over 4 years, DoT yet to clarify 3G,
broadband rollout norms.
DeitY wants the Ministry of Defence to
expand the scope of its offset policy for
boosting electronics manufacturing in India.
Department
of
Electronics
plans

Rs. 10,000 crore angel fund.


DoT panel wants 15-20% higher reserve
price of 3104 crore for the 800 MHz
spectrum suggested by TRAI for spectrum
auction.
The Telangana Govt. to come out with its
maiden IT Policy with an aim to doubling IT
exports to Rs. 1.20 lakh crore in the next ve
years. Aims to achieve a growth rate of 16%
and provide 20 lakh direct and indirect jobs.
DeitY seeks to bless Indian Set Top Box
manufacturing rms with Rs. 100 crore
fund by offering long term credit.
DoT ropes in state-owned entities for IoT
push.
Govt. proposes to create the EDF of
$2 billion (around Rs. 12,000 crore) to
promote innovation, intellectual property,
research and development, nano
electronics and to help commercialise
Made-in-India products, to reduce
dependence on imports.
RBI may scrap 2-step verication for
transactions below Rs. 3,000 to boost
ecommerce.
E-mail services may come under new
Consumer Protection Act.
Home Ministry sets up group to tackle
cyber-crime.
Microsoft CEO Satya Nadella has offered
to collaborate with the Centre in providing
last-mile internet connectivity. Expressed
interest to be part of both Digital India and
Make in India initiatives.
Post offices to issue ATM-cum-debit
cards for savings account holders.
The Centre invites comments from
stakeholders on the rst draft of the National
Intellectual Property Rights (IPR) policy.
DoT may ask Google to do Loon trials.

on social networks that TCS is planning to


sack 25,000 non-performers by the end
of February 2015.

Company News: Tie-ups, Joint Ventures,


New Initiatives

IT Manpower, Staffing & Top Moves

With a view to address various employeerelated issues, a national confederation of


the Union for ITeS Professionals (UNITES)
has been launched.
Microland to hire 100 for new Bengaluru
centre.
Atmel Corporation to expand Chennai
centre. Currently employing 200 to
double its size and focus on IoT.
Infy focuses on building deep connect
with employees. To distil 10 ideas from
Sikkas murmuration crowd sourced
ideas drive.
HCL Info Chief Executive Harsh Chitale
quits.
Foxconn, the $130-billion Taiwanese
electronics manufacturer, to suspend
all operations at its Sriperumbudur
plant from Dec 24, leaving nearly 1,700
employees jobless.
TCS cheer for freshers, plans to pay more.
In 1996-97, a TCS fresher was offered an
entry-level salary of Rs. 1.45 lakh, which in
2013 rose to Rs. 3.16 lakh, but after adjusting
for ination, it amounts to just Rs. 1.15 lakh.
Teradata to hire about 300 employees
over the next 12-18 months for its new
centre in Navi Mumbai.
An online forum formed in Chennai
We are against TCS layoff has posted

Online real estate segment has witnessed


a two-fold increase in the number of deals
in 2014, as compared to 2013. Online
portals housing.com and proptiger.com
attract venture capital investments.
Mumbai based YOU Broadband to offer
most cost effective 100 Mbps connection
at Rs. 1699/= for a quota of 200 GB.
MAIT has set up a website www.
maitsme.com catering to all information
needs of the SMEs. It will give SMEs the
opportunity to showcase their solutions
to a wider audience and aims to create
ample B2B opportunities within SMEs.
Kerala State to host 5th global meet on
free software on the theme Free software
for a free World.
Intel Corp invites six Indian companies to
jointly work on its prestigious perceptual
computing which uses gestures and
image recognition to control a computer,
helps devices see, hear and feel the user.
Artisangilt.com, a portal dedicated to
sari, holds around 19,000 products in this
section.
www.bengalurudutyfree.in offers dutyfree pre-ordering service.
Dell makes India its second research hub
outside the US.
Hyderabad to host CSI Golden Jubilee
49th Annual Convention during 12-14,
Dec 2014.
Uber - online cab service banned in Delhi.
Cisco showcases three Made in India
products.
Google Online Shopping Festival (GOSF)
during 10-12, Dec 2014 to feature
exclusive products.
Solar power mainframes from IBM.
India will serve as Taiwanese networking
components major D-Links global R&D
headquarters.
The Data Security Council of India to
certify websites. Singn MoU with San
Francisco-based TRUSTe.
YouTube users can now download videos on
mobile devices and store them for 48 hours.
Google launches Adwords in Hindi.
As part of its Billion Dollar Babies
initiative, TiE will pick 3-5 Indian startups (non ecommerce / services but
product category) and to handhold them
to become a $1-billion rm. It also plans to
take them to Silicon Valley.
Ericsson to set up its second plant in India
at Pune as a part of Make in India.
Free software enthusiasts have launched
Code Free for India (CoFFI), an initiative
to leverage the power of free and open
source software in nation-building.
Micromax sets up an R&D centre in
Beijing.
IRCTC is among the most searched on
n
Google.

CSI Communications | January 2015 | 39

CSI Reports
From CSI SIG and Divisions
Please check detailed news at:
http://www.csi-india.org/web/guest/csic-reports
SPEAKER(S)

TOPIC AND GIST

College of Engineering Roorkee, in Association with CSI


HR Mohan, Dr. NS Chaudhari, Dr. Saro Lee, Dr. Prabhaker Mateti, 28-30 November 2014: International Conference on Advances in Computing
Dr. MN Hoda, JC Jain, Shreyance Jain, MK Mittal, Dr. VK Jain, Communication & Informatics (ICACCI 2014)
Dr. Devesh Jinwala, Dr. Maya Ingle, Dr. Vilas M Thakare.

Inauguration of the Conference

Chief guest HR Mohan released conference Souvenir. Various sessions were


as follows 1- Advances in Computing with HR Mohan on "Big Data: Opportunities Ahead",
Dr. Chaudhari spoke on "Rapid developments in Information Technology" and
Dr. Prabhaker talked about what privacy data mobile phones leak and how you
can see evidence of it.
2- Security and Cryptography with Keynote Speakers Dr. Devesh Jinwala,
Dr. Maya Ingle & Dr. Thakare.
3- Parallel Paper Presentation for Best PhD Presentation had 14 participations
and was judged by Dr. Chaudhari, Dr. Thakare & Dr. Jain. Winner was
Dr. Kanwalvir Singh out of 5.
Paper Presentation had 3 tracks viz. 1. Advance Computing (71 papers)
2. Communication and Information Security (32 papers)
3. Informatics and E-Business (46 papers).

Hi-Tech Institute of Technology, Odisha in Association with CSI


RK Pattnaik, Prof. Sisir Samal, Prof. PL Mohanty and Prof. RN 6 December 2014: Seminar on A Walk through Communication
Satpathy

Mr Pattnaik, Scientist-G, Director (Instrumentation), DRDL delivered a talk


and covered many important aspects of Tele-communication. Seminar was
completed successfully by the efforts of Prof. Sisir Samal and Prof. P. L. Mohanty,
along with other faculties & staff of HIT, under guidance of Principal Prof.
(Dr.) R. N. Satpathy.
Dr. Pattnaik along with faculty member

Division V and Chandigarh Chapter


Dr. Gurmohan Singh Walia, Avtar Singh Sampla, Dr. Anirban Basu,
Brig AK Pathak, Dr. JS Oberoi, Kamalpreet Kaur, Preet Kamal Deol,
Priya Goel, Dr. PK Saxena, Dr. Varinder Singh, Dr. Maninder Singh,
Dr. Amritbir Singh, Amandeep Kaur, Dixit Sharma, Lakhwinder
Singh, Tushal Kumar, Kajal Rai, Subash Chander, Dr. Lakhvir Singh,
Navtej Singh Ghumman, Lt. Gen. N K Kohli, Sastry Tumuluri, NS
Tiwana

Dignitaries on stage for releasing the proceedings

CSI Communications | January 2015 | 40

31 October & 1 November 2014: National Seminar Cyber Warfare


Dr. Gurmohan Singh Walia was chief guest and Avtar Singh Sampla was guest
of honour along with Dr. Anirban Basu. Tech session on Essentials of Cyber
Warfare was given by Brig Pathak. Kamalpreet Kaur shared her research on
"Characteristics and Challenges of Cyber Warfare". Preet Kamal Deol discussed
"Analysis on Defence and Cyber Warfare". "Denoising of Audio Signals and
Speech Signals using Wavelets" was explained by Priya Goel. Dr. PK Saxena
spoke on "Hardware Sanitization and Testing from Embedded Threats". Session
on Secure Application Software Development was chaired by Dr. Maninder
Singh & Dr. Amritbir Singh. "Security Issues of big data" were discussed by
Amandeep Kaur. Mr Dixit Sharma & Dr. Lakhwinder Singh spoke on End Point
Security Solution for Effective Cyber Defence. Mr. Tushal Kumar talked about
"Threats of Internet" and Ms. Kajal Rai presented paper on "Denial of Service
Attacks and Measures". Session on "Internet Based Threats and Measures was
taken by Subash Chander and Dr. Lakhvir Singh. Mr Navtej Singh Ghumman
gave views on "Cyber Security Issues in Cloud Computing". Lt. Gen. Kohli spoke
on "Cyber crime, Cyber warfare and Cyber security". There was workshop on
Internet Based threats and Measures by OWSAP' where Sastry Tumuluri gave
inputs on "Information security".

www.csi-india.org

CSI Report

Dr. Debasish Jana* and Dr. Pinakpani Pal**


*Editor, CSI Communications
**Vice Chairman cum Chairman Elect, CSI Kolkata Chapter

EAIT 2014
19-21 December 2014: Fourth International Conference on Emerging Applications of Information Technology
Organized by Computer Society of India Kolkata Chapter and Hosted by the Indian Statistical Institute Kolkata

Encouraged by the responses of the academic community in earlier meetings


of EAIT in 2006, 2011 and 2012, CSI Kolkata Chapter (CSIKC) organized
the Fourth International Conference on Emerging Applications of Information
Technology (EAIT 2014). The conference was hosted by the Indian Statistical
Institute (ISI), Kolkata from 19-21 Dec 2014. EAIT 2014 enjoyed the active
collaboration and cooperation of both the academia and industry it had
over 150 delegates in attendance. The conference was successful in achieving
the aspiration to blend theory and practice, research and production, art and
science. EAIT 2014 received 271 papers from 532 authors across the globe.
Paper submission was online through Microsofts Conference Management
Tool (CMT). All papers were meticulously reviewed by more than 140
members of the Program Committee and additional reviewers. Review process
was double-blind. Finally, 63 papers were selected for oral presentations. Noshow has been sincerely discouraged for the spirit of the conference. The

conference proceedings were published by IEEE and 62 presented papers will


be available in IEEE XploreTM.
Pre-Conference Tutorial Session on December 19, 2014
The session was inaugurated by Prof. Pradipta Bandyopadhyay, Dean
of Studies, ISI. Prof. Subho Chaudhuri and Mr. Subhasis Dasgupta were
the Tutorial Chairs, EAIT 2014. SEMAT India Special Tutorial session was by
learned luminaryProf.June Sung Park of KAIST, South Korea. Prof. Park also
serves as the Executive Chairman of SEMAT and President of Korea Software
Technology Training Institution of Korea Software Technology Association,
His talk on Essence-Based Adaptive Software Engineeringemphasized on
quantifying the value of using SEMATs Essence Framework as a new SE
paradigm. The other panel of speakers comprised ofDr.Rohit K Chatterjee,
BIT Mesra, Kolkata Campus (Scale Space And Partial Differential Equations
(PDEs): Theory And Implementation Of Adaptive Filters), Dr. Sushanta
Karmakar, IIT Guwahati (Fault-Tolerant Distributed Systems) andDr.Bibhas

C Dhara, Jadavpur University (Image And Video Coding With BTC-PF


Method). About 50 participants attended the tutorial talks.
Conference Inaugural Session on December 20, 2014
In welcoming the delegates, Prof. Aditya Bagchi, General Chair,
presented the need of the hour in encouraging cutting edge research
work, especially for the young researchers and wished EAIT to continue
its recurrence as a biennial event. Mr. G S Rautela, Director General,
National Council of Science Museums, Guest of Honor of the program,
inaugurated the conference. He expressed his extreme satisfaction in

nding applications of IT in several areas


including digital restoration of ancient
cave paintings, 3D printing, 360- degree
giant screen projections and wished CSI
to organize events for cultural sector as
well. Dr. Debasish Jana, Program Chair,
explained the program, its objectives and
sketched a brief schedule. Mr. H R Mohan,
President, CSI, Chief Guest of the program
released the proceedings and expressed
his profound contentment about EAIT and talked about various avenues
of IT applications and role of CSI in facilitating pioneering activities.
Prof. Debatosh Guha, Chairman, IEEE Kolkata Section was overwhelmed
and expressed his views about the fact that on the 150th anniversary of
Maxwell equations that changed the world, IT applications alongwith
physics, radio physics together can do marvels. Prof. Subho Chaudhuri,
Tutorial Chair, thanked all the sponsors, especially technical co-sponsor
IEEE Computer Society and appreciated the efforts of the enthusiastic
team in organizing EAIT once again.
Plenary Talks and Keynote Speech on December 20, 2014
The plenary speech entitled Achieving Quality of Service, Cost and
Revenue Goals on Distributed Systems: the Resource Management Challenge
was delivered by Prof. Shikharesh Majumdar of Carleton University,
Ottawa, Canada. The keynote speech
on I-GOD: Identication of Geolocation
of Cloud Data-Centers was delivered by
Prof. Vijay Kumar of University of MissouriKansas City, Kansas City, Missouri, USA.
The attendees appreciated their inspiring
deliberations with great enthusiasm and
applause.
Conference Sessions on December
20-21, 2014
62 papers were presented in 15 technical sessions split into 3 parallel
tracks. In addition, six invited talks were held on emerging areas by
eminent speakers of international repute. The invited talks were delivered
by Dr. Sanjoy Kumar Saha, Jadavpur University (Application of Image
Processing in Material Science), Prof. Paramartha Dutta, Visva-Bharati
University, West Bengal (Fuzzy Mathematics in Machine Learning),
Dr. Sarmistha Neogy, Jadavpur University (Intrusion Detection in Wireless
Sensor Networks), Prof. Bidyut Baran Chaudhuri, ISI Kolkata (Glimpses
of Document Image processing), Prof. Sanghamitra Bandyopadhyay, ISI
Kolkata (Computational Methods for Solving Problems in Life Sciences)
and Prof. Debashis Saha, IIM Calcutta (Beyond 4G: Its 5G - What is it?
When can we expect it?). A Banquet was also arranged in the evening
of Dec 20. A separate panel of judges selected four papers as Special
Mention papers based on their content, research contribution as well as
presentation. The paper titles that earned Special Mention were: An Expert
System based Process Control System for
Silicon Steel Mill Furnace of Rourkela Steel
Plant by Somnath Mitra, Rajeev K Singh and
Ashis K Mondal (Steel Authority of India
Ltd, Ranchi); Power Efficient Code Converters
Using Adiabatic Array Logic by Shruti
Konwar, Thockchom B Singha and Soumik
Roy (Tezpur University, Assam); SEVA: A
Salient Event Detection Framework from Video
Shots Using Support Vector Data Description
by Chiranjoy Chattopadhyay and Sukhendu Das (IIT Madras, Chennai);
and Convergence of the Min-Sum Decoding Scheme for LDPC Codes from a
Dynamical Systems Perspective by Monosij Maitra and Abhik Mukherjee
(IIEST, Shibpur, West Bengal).
Felicitation of Prof. Dwijesh Kumar Dutta Majumder on Dec 21, 2014
Prof. Dwijesh Kumar Dutta Majumder was felicitated with the
Lifetime Achievement Award that was conferred by Mr. H R Mohan,
President of CSI and the felicitation message was read out by
Prof. Dipti Prasad Mukherjee.

CSI Communications | January 2015 | 41

CSI News
From CSI Chapters
Please check detailed news at:
http://www.csi-india.org/web/guest/csic-chapters-sbs-news
SPEAKER(S)

TOPIC AND GIST

GHAZIABAD (REGION I)
Manjeet Singh, Arpit Chadha, Aditya Sharma,
Sivasankaran Laxminarayanan, Manohaur Kumar,
Dr. Sunil Kumar Pandey, Dr. Rabins Porwal, Dr. Umang
Singh, Prof. Rakesh Roshan, Prof. Smita Kansal, Dr. Maya
Ingle, Dr. MP Singh and Swati Mehra

7-8 November 2014: 10th National Conference on Emerging Paradigms


of Information & Communication Technologies & its Impact on Society
(EPICTIS-2014)
Workshop on Database Retrieval Mechanism was conducted by Manjeet
Singh. Conference was inaugurated by Hon. Vice-Chairman Arpit Chadha
Chief Guest and Aditya Sharma. Conference proceedings (both Hard Copy
& Soft Copy) was released by invited guests. Technical paper presentations
session was chaired by Dr. Anurag Jain and Prof. Anil Yadav. Ms. Geetanjali
Singh from Banasthali University, Jaipur Campus was awarded First Prize.
Eminent Guests & Dignitaries releasing proceedings -(L to R) Prof Umang Singh
(Co-Convener), Dr. Sunil Pandey, Mr. Aditya Sharma, Mr. Arpit Chadha,
Mr. Sivasankaran Laxminarayanan, Mr. Manohaur Kumar, Mr. Rabins Porwal
(Co-Convener) & Prof. Smita Kansal

HARIDWAR (REGION I)
Dr. Mayank Aggarwal, Mani Madhukar and Dr. VK Jain

8 December 2014: Workshop on Cloud Computing and Bluemix


Dr. Aggarwal explained concepts of Cloud Computing to students using very
basic examples. Mr. Madhukar gave hands on Session on Bluemix in which
students were given small exercise. Participants were benetted by one
month free access to Bluemix.

Organizers and participants in the workshop

NOIDA (REGION I)
Anuj Agrawal, Tanmoy Chakrabarty, Gopal Krishna 24 November 2014: Seminar on E-Governance Initiatives of GOI and
Agarwal and Dr. RC Tripathi
Implications on Corporate Governance
Mr. Agrawal remarked that governance can be improved only with the help of
IT enabled citizen centric services. Mr. Tanmoy said that with digitization and
e-governance we can remove petty corruption from government services.
Chief Guest CA Gopal Krishna Agarwal said that PMO is entertaining queries
& complaints online and helping nd solutions which was not the case in
past. This government wants to automate the services so that people can
get benet of all Government schemes. Preparation of road map for digital
Noida is to be presented to Noida authorities and constructive suggestions
are being given to MSME task force of Central Government for all-round
development of MSME sector.
Honoring the guest

CSI Communications | January 2015 | 42

www.csi-india.org

SPEAKER(S)

TOPIC AND GIST

NOIDA (REGION I)
Dr. Rajdev Tiwari, Dr. Ajay Kumar, Anuj Agarwal, Deepak 6 December 2014: Seminar on Digital India, opportunities for professional
Kumar, Prof. MN Hoda, RK Vyas, Dr. Somesh Kumar and and organizations
Dr. Tripathi
Seminar was an effort in the direction towards Digital India - project
run by Govt. of India. Mr. Agarwal focused on the meaning of Digital India
and its related opportunities in future. Mr. Deepak Kumar highlighted on
the process of e-voting system run by NSDL for corporates. Prof. Hoda
motivated students to strengthen four necessary pillars for success - four
pillars of SMAC (Social Networking, Mobile Computing, Analytics & Cloud
Computing).
Speaker conducting the Seminar

PATNA (REGION II)


Atul Kumar Sinha, Dr. UK Singh, Sanjeev Kumar,
DP Sinha, Prof. AK Nayak, Dr. Dolly Sinha, Shailesh
Shrivastava, Prof. RP Sahu, Prof. Ganesh Pandey

24 November 2014: Seminar on the theme Emerging ICT for Bridging


Future
Mr. Atul Kumar Sinha inaugurated & spoke about future trends of ICT and
its impact on future generation. Chief Guest Dr. UK Singh stressed upon
effect of digital divide and its consequences on Indian society if appropriate
steps are not taken in time. Sanjeev Kumar talked about changing impact
of technology on Industries and corporate sectors whereas DP Sinha
spoke about history & development of CSI. Prof. AK Nayak discussed
about emerging technologies like Cloud computing, Bio-computing, Nano
Computing, Quantum Computing & Green Computing etc.
Inauguration ceremony by Sri Atul Kumar Sinha and other invitees

BHUBANESWAR (REGION IV)


Manas Pattnaik, Dr. Dillip Kumar Behera, Sanjay
Mohapatra, Prof. Ashok Panda, Prof. PK Behera

26 November 2014: Talk on E-waste Management


Mr Manas Pattnaik highlighted issues & importance of E-Waste
management. Dr. Dillip Kumar Behera explained the role and responsibilities
of Government, manufacturers, users and recyclers. He also informed that
State Govt has authorized 6 collection Centres for disposal of E-waste. He
pointed out that the business of E-waste management is not only social work
but is commercially viable. Mr. Sanjay Mohapatra informed about activities
of CSI and urged students to participate.
Guests on stage

NASHIK (REGION VI)


Nashik Chapter members

19 December 2014: Event on SMB Connect


Event was focused on solutions for SMEs to helpthem in expansion and growth.
SMEs were guided on policies and compliances - When should they start, How
to Manage business grown in the accelerating economy and Expand beyond
boundaries by identifying new market. During talk chapter chairman covered
topics related to innovation & technology for business. He informed that
upcoming event in Nashik i.e. Kumbhmela is offering great opportunities to
SMBs. CSI Nashik Chapter is keen on solving problems that are likely to arise
during this large event with help of technology by actively getting involved &
conducting hackathons in Nashik. It is also aimed at inculcating innovation
culture among youth & members are striving for the same since Jan-2013. INK
talk video of one such participation was shared with audience.
Speaker conducting the event

CSI Communications | January 2015 | 43

From Student Branches


(REGION-I)
BHARATI VIDYAPEETHS INSTITUTE OF COMPUTER APPLICATIONS AND
MANAGEMENT, NEW DELHI

11-11-2014: In Education Day 2014 celebrations, the Winners of Debate


Competition (Mr. Aseem and Mr. Karan) with Judge (Mrs. Neena Pathak)
and faculty members of BVICAM

(REGION-I)
INSTITUTE OF TECHNOLOGY & SCIENCE, GHAZIABAD

12-09-14: Resource persons Prof. Sauresh Mehrotra and Prof. Abhay


Kumar Ray at the Workshop on Dot Net Framework & Programming
Contest along with the Participating students

(REGION-I)

(REGION-III)

ABES INSTITUTE OF TECHNOLOGY, GHAZIABAD NEW BRANCH INAUGURATION

GLS INSTITUTE OF COMPUTER APPLICATION, AHMEDABAD

08-12-2014: Dr Dilkeshwar Pandey HOD, Dr Bhavesh Chauhan, Director,


Mr. Saurabh Agrawal- Ghaziabad Chairman , Mr. Vijay Rastogi UP SSC
during Inauguration of the new student branch

22-12-2014: Prof. Joyti Dube, explaining Scribus Tool on Ubuntu 14.04


during the Workshop on SCRIBUS

(REGION-V)

(REGION-V)

ADITYA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, VISAKHAPATNAM

AMRITA BANGALORE CAMPUS

01-12-2014: At PROJECT EXPO AND OS DAY Dr. G S N Murty HeadCSE, CSI-SBC distributing the prizes to winners

29-10-2014: In Distinguish Speaker Program, Dr. C R Chakravarthy,


Chairman (SIG-IS), Bangalore gave technical talk on e-Security
Technologies

(REGION-VII)

(REGION-VII)

VELAMMAL ENGINEERING COLLEGE, CHENNAI

PSNA COLLEGE OF ENGINEERING & TECHNOLOGY, DINDIGUL

11-12-2014: FDP on Design and Analysis of Algorithms by Dr. G. Geetha,


with Ms. S Rajalakshmi, FDP Coordinator, Dr. B.Rajalakshmi, Dean-IT and
CSI-SBC, Dr. V Vijaya Chamundeeswari, HOD-CSE

26-03-14: A Seminar on Information Security & Ethical Hacking by


Mr. S Thiagarajan, Registrar, SETS, Chennai. Mrs. T Hemalatha, CSI-SBC,
Dr. S Shanthi, HOD, Dr. S Sakthivel, Principal, Mr. G Santhosh Kumar

CSI Communications | January 2015 | 44

www.csi-india.org

(REGION-VII)

(REGION-VII)

SATYABAMA UNIVERISTY, CHENNAI

ADHIYAMAAN COLLEGE OF ENGINEERING, HOSUR

08-12-2014: CSI ED organized a workshop with Dept of IT on


"Programming in PHP" conducted by Prof. J. Jerald Inico, Deputy Dean ,
Loyola College, Chennai. Prof. Murugan, HOD and Prof Jabez, SBC

10-12-2014: Principal Dr. G. Ranganth , SBC Dr. M. Lilly Florence with


the resource persons at Second National workshop on Research Trends
in Information Technology and Applications

(REGION-VII)
EINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI

Please send your student branch


news to Education Director at
director.edu@csi-india.org. News sent
to any other email id will not be
considered. Please send only 1 photo
per event, not more.

14-11-2014: Training on Google Applications by Mr. Dwaraknath


Cheyyur along with Dr. R Velayutham, Dr. K Ramar,
Prof. A Amudhavanan & Prof. M. Suresh Thangakrishnan

CSI ED EVENTS
WORKSHOP ON MOBILE SECURITY

CONDUCTED BY CSI ED

Computer Society of India, Education Directorate, Chennai and IEEE


Computer Society, Madras chapter jointly Organized a program on
Mobile Security on 2nd December, 2014 at Seminar Hall, CSI ED,
Chennai. There is a good number of registration of the delegates across
all the sections such as Academic, Industry and Students. CSI President
Mr. H.R. Mohan, inaugurated the program and introduced the resource
person Prof Prabhaker Mateti, Associate Professor, Dept of Computer
Science and Engineering, Wright State University, Dayton, Ohio, USA.
The participants expressed their satisfaction in attending a worth while
program to update their knowledge during their feedback
01-12-14: CSI President Mr. H R Mohan with speaker Prof. Prabhaker
Meteti during the feedback session of the Mobile Security Workshop
PUNARJJANI WORKSHOP AT COIMBATORE

20-12-14 : Special Teachers during their Hands on session on Punarjjani


Workshop held at Bharathiar University, Coimbatore

CONDUCTED BY CSI COIMBATORE AND CSI ED

Bharathiar University at Coimbatore was host to the fourth Punarjjani


Workshop of CSI held on 20th December 2014. This event of social
signicance was spearheaded by the CSI Coimbatore Chapter, in close
collaboration with Media Lab Asia, CDAC Trivandrum and the CSI
Education Directorate. The one day programme was inaugurated by
Dr. James Pichai- , the Vice Chancellor of Bharathiar University, who
stated that the special teacher was a gift of God, with a very special
mission. The half - day hands on session was the highlight of the event,
with the participants manifesting their skills by the fast pace of creation
of the account and the usage of the modules. Mr. Ranga Raj Gopal,
National Treasurer and Chief guest of Valedictory function,
Prof. Sundaresan, Chairman of CSI Coimbatore Chapter and other officials
of Media Lab Asia, CDAC, CSI Coimbatore and CSI ED were present.

CSI Communications | January 2015 | 45

Computer Society of India, Chennai Chapter


IEEE Computer Society, Madras
IEEE Professional Communication Society, Madras

Student Essay Contest

Harnessing the Power of ICT for our New Initiatives


Computer Society of India, Chennai Chapter, in association with the IEEE Computer Society, Madras and IEEE Professional
Communication Society, is pleased to announce an Essay Contest on the role of Information & Communication Technology (ICT) in
India for school and college students. The contest will be in two streams:

Stream 1: Open to School Students (from 8th Standard to Plus 2)


Stream 2: Open to College/Polytechnic Students (UG/PG students of all disciplines)

Now ICT has ubiquitous presence in India and other parts of the world, and it is being applied in various elds such as
Manufacturing, Banking & Finance, Telecom, Healthcare, Hospitality, Transportation, Education, Agriculture, Environment,
eGovernance, eCommerce, and Defence for quality and productivity improvements. India is a major force in the global IT landscape.
ICT is a key driver of our economic development and accounts for about 6.5% of our GDP and provides employments to over 3
million people. The Government of India has recently launched three major initiatives Digital India, Make in India, and Clean India,
in which ICT can and should - play signicant roles. Through this contest, we seek your thoughts, innovative ideas and solutions on
how ICT could support and help these initiatives.
An eligible participant is required to submit the essay on any one of the following topics by 31st January 2015:
1.
2.
3.

ICT for Digital India


ICT for Make in India
ICT for Clean India

Submissions will be assessed by a panel of experts on criteria such as originality, novelty, applicability, potential value of the
proposed idea(s) and clarity and style of presentation.
The contest winners in each stream will be awarded the following prizes & certicates:

One 1st Prize: Rs. 10000


Two 2nd Prizes: Rs. 5000 of each
Four 3rd Prizes: Rs 2500 of each
Ten Consolation Prizes: Amazon gift voucher of Rs. 1000 each
Certicate of Merit: For 25 shortlisted essays over and the above prize winning essays

For more details & complete brochure, please visit the website: http://goo.gl/FziCmK
For clarications / queries if any, please email us atessay.csi@gmail.com
Theessaycontestis supported by: Dynamic Group, Anjana Software Solutions Pvt. Ltd, HP Networking, Cognitive Platform Solutions
(CPS) Pvt Ltd, Orbit Innovations and CloudReign Technologies.
Please feel free to share this information to all your contacts and encourage participation in this contest.

CSI Communications | January 2015 | 46

www.csi-india.org

CSI CHAPTERS NORMS PENDING COMPLIANCE STATUS


As approved by ExecCom meeting held on 12 Dec. 2014 at Hyderabad, chapters in the following list are being declared
inoperative with immediate effect for failure to meet CSI's norms. CSI HQ will initiate immediate steps for their closure.
Sr No

Region

Chapters

Submission of Chapter Election Submission of


Results
audited accounts

Chapter All FDs to be moved /


Linked to SBI

Jhansi

Not Received

Not Received

No FD

Varanasi

Completed

Not Received

No FD

Durgapur

Not Received

Not Received

No FD

Guwahati

Not Received

Not Received

No FD

Chittorgarh

Not Received

Not Received

No FD

Jabalpur

Not Received

Not Received

No FD

Jaipur

Not Received

Not Received

No FD

Balasore

Not Received

Not Received

No FD

Bokaro

Not Received

Not Received

Pending

10

Dhanbad

Not Received

Not Received

No FD

11

Jamshedpur

Not Received

Not Received

No FD

12

Mysore

Not Received

Not Received

No FD

13

New Guntur

Not Received

Not Received

No FD

14

Ongole

Not Received

Not Received

No FD

15

Nagpur

Completed

Not Received

No FD

16

Annamalainagar Not Received

Not Received

No FD

17

Kanyakumari

Not Received

Not Received

No FD

18

Karaikudi

Not Received

Not Received

No FD

19

Kozhikode

Not Received

Not Received

No FD

20

Salem

Not Received

Not Received

No FD

21

Thanjavur

Not Received

Not Received

No FD

22

Hosur

Completed

Not Received

No FD

23

Puducherry

Completed

Not Received

No FD

CSI Communications | January 2015 | 47

List of chapters with the pending compliance requirement is reproduced below. These chapters should comply before 25th Jan 2015 to
rectify the pending requirement failing which these chapters will be declared "inoperative" through the February issue of CSIC.

Sr No

Region Chapters

SBI, Mumbai Closure of old Submission


of Submission of Chapter All FDs to
Bank
A/c Bank account
Chapter Election audited accounts
be moved /
opening Status
Results
Linked to SBI

Allahabad

Completed

Pending

Completed

Completed

Completed

Chandigarh

Completed

Pending

Completed

Completed

No FD

Delhi

Completed

Pending

Completed

Completed

Pending

Haridwar

Completed

Pending

Completed

Pending

Pending

Noida

Completed

Pending

Completed

Completed

No FD

Kolkata

Pending

Pending

Completed

Completed

Pending

Indore

Completed

Pending

Completed

Completed

Pending

Ujjain

Completed

Pending

Completed

Pending

No FD

Vadodara

Completed

Pending

Completed

Pending

Pending

10

Cuttack

Completed

Pending

Completed

Completed

No FD

11

Raipur

Completed

Pending

Completed

Pending

No FD

12

Rourkela

Completed

Pending

Completed

Pending

Pending

13

Hyderabad

Completed

Pending

Completed

Completed

No FD

14

Koneru

Completed

Pending

Completed

Completed

No FD

15

Visakhapatnam Completed

Pending

Completed

Completed

Pending

16

Mumbai

Completed

Pending

Completed

Completed

Completed

17

Goa

Completed

Completed

Completed

Pending

Completed

18

Solapur

Completed

Pending

Completed

Pending

No FD

19

Sivakasi

Pending

Pending

Completed

Pending

No FD

Please send email on hq@csi-india.org for any clarication or assistance.

Computer Society of India, Vellore Chapter


Annual Symposium on Information Technology Research,
Innovation and Entrepreneurship Development (ITRIED)
Prelude: As the Computer Society of India, Vellore Chapter completes 10 years of its service on 28th February 2015, it has planned to commemorate its formation and
contributions made to IT fraternity and the society in and around Vellore with patronage of VIT University. An annual symposium series on Information Technology
Research, Innovation and Entrepreneurship Development (ITRIED) is being instituted to mark completion of 10 years of CSI Vellore Chapter, 30 years of VIT University and
50 years of Computer Society of India.
The rst event of ITRIED symposium series is being organized by CSI Vellore Chapter in association with Division-V (Education & Research) during 28th February 2015 to 6th
March 2015. The event shall include invited talks by distinguished speakers from industry, R&D organizations and academia as well as presentations by young researchers,
innovators and entrepreneurs on their original and unpublished work.
Call for Proposals: Proposals (containing original and unpublished work) are invited from researchers, innovators and entrepreneurs (including undergraduate students,
postgraduate/ research scholars, faculty members and working professionals) working in the computing, information technology and allied disciplines. The above will be
reviewed by a panel of domain experts from academia, research organizations and industry. The selected work will be called for presentation in different sessions during the
period from 28th February to 6th March 2015. The best work among different categories of applicants will be suitably recognized and awarded.
Eligibility criteria: Applicants (below the age of 35 years) must be valid members of CSI without any dues for the year of award (2014-15) and previous year (2013-14).
Undergraduate student applicants must be CSI student members whereas others must be CSI professional members.
Last date for submission of proposals: 15th February 2015
For registration and further details, please contact:
Programme Committee:

Prof. G. Jagadeesh, Vice Chairman, CSI Vellore Chapter


E-mail: gjagadeesh@vit.ac.in
Prof. K. Govinda, Hon. Treasurer, CSI Vellore Chapter
E-mail: kgovinda@vit.ac.in

Organizing Committee:

Prof. S. Margret Anouncia, Chairperson, CSI Vellore Chapter


Prof. E. Sathiyamoorthy, Hon. Secretary, CSI Vellore Chapter

Advisory Committee:

Dr. Anirban Basu, Chairman, Division-V (Edu. & Research), CSI


Prof. H.R. Vishwakarma, Fellow and Past Hon. Secretary, CSI
Prof. P. Kalyanaraman, Chapter Patron and Member, NC, CSI

CSI Communications | January 2015 | 48

www.csi-india.org

CSI Calendar
2015
Date

Prof. Bipin V Mehta


Vice President, CSI & Chairman, Conf. Committee
Email: bvmehta@aesics.ac.in

Event Details & Organizers

Contact Information

January 2015 events


10- 11 Jan 2015

Two days Workshop on Big Data Analytics Organize by School of Computing


Science and Engineering, VIT University in association with CSI Vellore Chapter and
Student Branch

Prof. K Govinda
Prof. G Jagadeesh
kgovinda@vit.ac.in
gjagadeesh@vit.ac.in

17-18 Jan 2015

5th National Conference on Indian Language Computing (NCILC-2015) organized


by Department of Computer Application, Cochin University of Science &
Technology, Kochi, Kerala and CSI Division-III (Applications)

Prof(Dr.) A K Nayak
aknayak@iibm.in
mullayilkannan@gmail.com

17 Jan 2015

One-Day Course on Research Methodology by Prof. Dipti Prasad Mukherjee


organized by CSI Kolkata Chapter at CSI Kolkata Chapter, 5 Lala Lajpat Rai
Sarani (Elgin Road), 4th Floor, Kolkata 700 020

Prof. D P Mukherjee / R T
Goswami / Pinakpani Pal,
csical@gmail.com

22 Jan 2015

One Day National Seminar on ICT & WOMEN EMPOWERMENT Organized by


Patna Womens College and CSI, Patna Chapter in collaboration with Division
III and I of Computer Society of India at Patna Womens College Auditorium,
Patna

Prof(Dr.) A K Nayak
aknayak@iibm.in
Ms. Bhawna Sinha
computerdepartment@
patnawo
menscollege.in

23-24 Jan 2015

Regional Student (Region-3) organised by AESICS-CSI Student Branch, School of


Computer Studies, Ahmedabad University, Ahmedabad. Theme: ICT for Make
In India http://www.aesics.ac.in/rsc3

Prof(Dr.) Aditya Patel


aditya.patel@ahduni.edu.in
Prof. (Dr.) Sandeep Vasant
sandeep.vasant@ahduni.edu.in
Prof(Dr.) Kuntal Patel
kuntal.patel@ahduni.edu.in

31 Jan 2015
Last Date
for essay
submission

Computer Society of India, Chennai Chapter - in association with the IEEE


Computer Society, Madras and IEEE Professional Communication Society
- announced an Essay Contest on Harnessing the power of ICT for our new
initiatives for students at school and college levels. Last date is 31st Jan
2015and Prize announcement is 28th Feb 2015. For details visit the website at
http://goo.gl/FziCmK

essay.csi@gmail.com

February 2015 events


20 Feb 2015

First
National
Conference
on
Computational
Technologies-2015
(NCCT15) organised by CSI, Siliguri Chapter,
Dept of Computer
Science and Application, University of North Bengal and CSI Div-V.
http://www.nbucsaevents.in

Prof. Ardhendu Mandal


am.csa.nbu@gmail.com

26 Feb-6 March
2015

Annual Symposium on Information Technology Research, Innovation and


Entrepreneurship Development award (ITRIED)

gjagadeesh@vit.ac.in
kgovinda@vit.ac.in

March 2015 events


1113 Mar 2015

9th INDIACom; 2015 2nd International Conference on Computing for Sustainable


Global Development Organized by Bharati Vidyapeeths Institute of Computer
Applications and Management (BVICAM), New Delhi

Prof. M N Hoda
conference@bvicam.ac.in,
indiacom2015@gmail.com

CSI Communications | January 2015 | 49

21-22 Mar 2015

International Conference on ICT in Healthcare organized by Sri Aurobindo


Institute of Technology, Indore in association with CSI Indore, Udaipur Chapter
and CSI Division III and Division IV Communication.
http://www.csi-udaipur.org/icthc-2015/

Prof. Durgesh Kumar Mishra


drdurgeshmishra@gmail.com
Prof. AK Nayak
aknayak@iibm.in
Prof. Amit Joshi
amitjoshiudr@gmail.com

27-28 Mar 2015

International Conference on ICT in Healthcare organized by Sri Aurobindo


Institute of Technology, Indore in association with CSI Indore, Udaipur Chapter
and CSI Division III and Division IV Communication.
http://www.csi-udaipur.org/icthc-2015/

Dr. Durgesh Kumar Mishra


drdurgeshmishra@gmail.com
Prof. AK Nayak
aknayak@iibm.in
Prof. Amit Joshi
amitjoshiudr@gmail.com

April 2015 events


3 -4 April 2015

National Conference on Creativity and Innovations in Technology Development


(NCCITD15) at Udaipur. Organised by CSI Udaipur Chapter, Division IV, ACM
Udaipur Chapter and S S College of Engineering , Udaipur. www.csi-udaipur.org

Amit Joshi
amitjoshiudr@gmail.com
Dr Jaydeep Ameta
jaydeep_ameta@yahoo.com

11-12 April 2015

Two Day National Conference on ICT Applications CONICTA-2014 at IIBM


Auditorium, Patna, organized by CSI Patna Chapter in association with Div-III
and Div-IV of Computer Society of India

Prof. A K Nayak
aknayak@iibm.in
Prof. Durgesh Kumar Mishra
drdurgeshmishra@gmail.com

24-25 April 2015

ICON15 All India Conference On Sustainable product in Computer Science &


Engineering organized by Chhatrapati Shivaji Institute of association with CSI
Division IV, CSI Region IV.

Prashant Richhariya
prashantrichhariya@csitdurg.in

International Conference on Emerging Trend in Network and Computer


Communication (ETNCC2015) at Department of Computer Science, School
of Computing and Informatics Polytechnic of Namibia in Association with
Computer Society of India Division IV and SIG-WC http://etncc2015.org/

Prof. Dharm Singh


dsingh@polytechnic.edu.na

May 2015 events


1517 May 2015

Sept 2015 events


10-12 Sep 2015

International Conference on Computer Communication and Control (IC42015) at


Medicaps Group of Institutions, Indore in association with CSI Division IV,
Indore Chapter and IEEE MP Subsection.

Dr. Pramod S Nair


mitm.csedepartment@yahoo.com
Prof. Pankaj Dashore
pk_dashore@yahoo.co.in

Sept 2015 events


910 Oct 2015

International Congress on Information and Communication Technology


(ICICT-2014). At Udaipur. Organised by CSI Udaipur Chapter, Div-IV, SIG-WNs,
SIG- e-Agriculture and ACM Udaipur Chapter www.csi-udaipur.org/icict-2014

Dr. Y C Bhatt
drycbhatt@hotmail.com
Amit Joshi
amitjoshiudr@gmail.com

16-17 Oct 2015

6th Edition of the International Conference on Transforming Healthcare with


IT to be held at Hotel Lalit Ashok, Bangalore, India. http://transformhealth-it.org/

Mr. Suresh Kotchatill,


Conference Coordinator,
mail@transformhealth-it.org

CSI Communications | January 2015 | 50

www.csi-india.org

Continued from Page B


Systems), Mr. Santhosh Dsouza ( Director Systems Engineering, NetApp ), Mr. Arun Kumar (MD India Business, VMWare India),
Mr. Raju R Kalidindi (Director, HP Cloud R&D).
Session 2 was on Cyber Security & Information Warfare, which was moderated by Mr. Susheel Verma (Director, DCS & Chief of Information
Security, DRDO). Panelists were Dr. Sanjay Burman (Director, CAIR), Mr. N K Verma (GM-IT, Rashtriya Chemicals & Fertilizers LTD.) and
Mr. Praveen Kumar (Country Manager, Fluke Networks).
Post lunch session was on Enterprise Networks & Intelligent Data Centers and the Moderator was Mr. A L Srinath (CEO, Shell Networks &
Solutions Ltd.). Key Note Address was by Mr. Ramanan (MD, CMC) and the Panelists were, Mr. Alamuri Sitaramaiah (MD, CommScope
Enterprise Solutions, India & SAARC) , Mr. Vasunandan Sathamarshan (Director India & SW Asia, Panduit), Mr. Edgar Dias (Director,
Brocade).
The Plenary Session was the highlight of Day 2 of the event with Shri Ravi Shankar Prasad the IT Minister of Indias address . Mr. KT Rama
Rao the IT Minister of Telangana was the Guest of Honor who spoke and gave away the CSI awards

Information Technology Minister Ravi Shankar Prasad said India is inviting technology majors
like Samsung and LG to set up manufacturing facilities in the country under 'make in India'
programme.
He said seven lakh kms of optic ber network would be laid in the country in the next three
years. Through optical ber network, we want to connect 2.5 lakh gram panchayats in two and
half to three years," he added.
Shri Ravishankar Prasad
Union Minister of IT

"We hope to see a big explosion in e-commerce, e-health, (and) e-education (sectors)," he said

Telangana Minister for IT K.T. Rama Rao, presenting CSI awards, said the government was
committed to creating an environment where common man can have access to its services
on mobile phones.
It also wanted to make Hyderabad a top notch destination for the IT industry. Chief Minister
wanted priority for the State in the National Optic Fibre Network programme that seeks to
provide broadband connectivity to 2.5 lakh in the country, he said.
Mr. KT Rama Rao,
Telangana Minister for IT
All India Council for Technical Education (AICTE) chairman SS Mantha pointed out that technology can be effectively used to improve
the access to education in India not just at the university but also at the primary and secondary levels and the Union government has
initiated programs such as National Digital Literacy Mission and SWAYAM (Study webs of active-learning for young aspiring minds), to
address this issue.
CSI SIGeGov has conducted eGov Session with delegates coming from most State Govts and presented CSI Nihiliant eGovernance
Awards to the best IT Projects from State Governments.
Day 3 : 14-12-2014
First Session was on Smart Cities & IOT. Moderator was Mr. Ramesh L (VP Products & MD India, Progress Software) and the panlists
were, Mr. Mitesh Agarwal (Country Head - Sales Consulting, Oracle) and Mr. Ramamurthy Prakash Bhamidipati (Head, IoT/ Smartcites
Practise, Paradigm IT).
Second session was Technology Imperatives for Education & Healthcare Moderated by Mr. K Raju (Regional VP CSI) and Key Note
Address was given by Dr. Peter Perycek (Head, Center for eGovernance, Danube University Krems, Austria). Panelists were, Dr. Debraj
Shome (Founder & CEO, MediAngels), Mr. Samir Jain (Founder & CEO, Bodhaguru) and Mr. Asokan Pitchai (SVP, L&D, TalentSprint).
Third Session was Mobile Computing & Social Networking. The
Moderator was Mr. JA Chowdary (Executive Chairman, Talent Sprint &
Conference Chair, CSI-2014). And the panelists were Mr. Raja Ukil (CIO,
Wipro), Mr. Ananth Rao (MD, Focus Ventures) and Mr. V Srinivas Rao
(Founder & CEO, BT&BT).
Central Minister of Science of Technology Mr. Sujana
Chowdary, Malkajigiri MP Mr. Malla Reddy and Director
General of Survey of India Mr. Swarna Subba Rao at the
Valedictory Session of CSI-2014.

Registered with Registrar of News Papers for India - RNI 31668/78


Regd. No. MH/MR/N/222/MBI/12-14
Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I
Date of Publication:10 & 11every month

If undelivered return to :
Samruddhi Venture Park, Unit No.3,
4th oor, MIDC, Andheri (E). Mumbai-400 093

Photo Gallery CSI Annual Convention 2014

Gautam Mahapatra
Chairman CSI Hyderabad
Chapter

JA Chowdary

Dr A Goverdan

Raju Kanchibotla

Dr HS Saini

Organizing Committee
Chair

Programme
Committee Chair

Reg. Vice President


MD, GNI

Finance Committee
Chair

Prof. DVR Vithal

Dr DD Sarma

Dr Ashok Agarwal

Dr Sateesh Reddy

CSI Fellows Present

Sri SV Raghavan

Conference
Planners

Bipin Pendyala

CSI-2014 Team with Volunteers

CSI Awards
Ceremony

Ramesh Loganathan

Dr IL Narasimha Rao

Chandrasekhar Dasaka with Dr. Peter Perycek & Raju

You might also like