You are on page 1of 7

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: Email:, Volume 2, Issue 6, November December 2013 ISSN 2278-6856

Analysis of Open Source Computing Techniques & Comparison on Cloud-based ERP


D.Krishna, 2Rajasekhar, 3 K.Murali Krishna

Associate Professor, HOD of CSE Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P. Associate Professor, HOD of IT Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P. Assistant Professor, in CSE Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P.

Abstract Cloud computing revolutionizing the business

world on a number of levels new technology allows companies and individuals to easily access computer program and other information that is based at a remote access or by storing the programs and information on remote servers with less computing power. Cloud is large amount of storage unit and open access tool is used to solve problems such as networks databases business software developments, it open access tool directly communicates with each tool or called as Cloud ERP to implement end product. In this paper we present cloud ERP methods used for different analysis and implementation in sales, customer relations & database storage purpose, shows the how cloud computing tool are used in real time application and uses. We also compare ERP with Cloud ERP system are easily scalable to meet new business requirements is useful for enterprise with specific seasonal activities that need to quickly develop or integrate novel functions to meet the business requirements.

IBM Microsoft uses strategies for cloud computing, often called software as a service cloud computing is also sometimes referred to as everything as a service which include databases or any combination of them. The customer doesnt have to know the full capacity they might need at a peak time, cloud computing makes it possible to scale the resources available to the application. Customers pay only for what they use. For their maximum needs no need to buy the servers. Cloud will automatically allocate or de-allocate storage and network bandwidth on demand when there are few users on a site the cloud uses very little capacity to run the site. Because the data centers that run the services are huge and share resources among a large group of users the infrastructure costs are lower Increasing customer relations business receptiveness along with the effective use of smart technologies every business goal is to accomplish the targets of high financial gains at lower operational costs this requires the optimal utilization of available resources. With the IT industry recognize and acknowledge that at the core of it all business remain focused on processes and projects, successful delivery of cloud projects depend on the project managers with project management frameworks and proven methodologies combined with experience acts as catalyst in building the robust service delivery engine to deliver faster and cheaper services in the cloud areas like public and private.

Keywords Cloud Computing, Salesforce, IBM Cloud, Window Azure, Sage CRM

1. Introduction
Cloud computing is a network diagram that represented the internet as schematic clouds, what happens when applications and services are moved into the internet cloud. Cloud uses a virtualized software model enabling the sharing of physical services storage and networking capabilities, allows for the provision of services based on current demand requirements done automatically using software automation, enabling the expansion and contraction of service capability as needed and scaling needs to be done while maintaining high levels of reliability. Cloud access across the internet from a broad range of devices such as laptops and mobile devices using standard based APIs and uses metering for managing and optimizing the service and to provide reporting and billing information. Most of companies can reduce their capital expenditures and use operational expenditures for increasing their computing capabilities. Cloud computing is a category of computing solutions in which a technology access computing resources on demand as needed regardless of whether the resources are virtual dedicated or shared when needed for as long as needed. Cloud can be used in IT services instead of buying servers for internal or external services the company can buy them as a service. There has been increasing hype about cloud computing during the last year organizations like Volume 2, Issue 6 November December 2013

Figure 1 Cloud Management Cloud computing introduces more than technical changes in IT processes and alters the way that the business interacts with its customers to improve the process in an easy and manageable way. Page 118

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: Email:, Volume 2, Issue 6, November December 2013 ISSN 2278-6856
The key to successful project management in the cloud is to create and manage a project framework that embeds best practices of standard project management and cloud computing methodology into how one manages projects inside and outside the cloud. Impact of cloud on project management will include a higher emphasis on security parallel processing scalability and ability to utilize infinite resources. sufficient controls to provide such level of security than the organization would have if the cloud were not used. The major security challenge is that the owner of the data has no control on their data processing. Due to involvement of many technologies including networks, databases, operating systems, resource scheduling, transaction management, concurrency control and memory management [3],various security issues arises in cloud computing. Top seven security threats to cloud computing discovered by Cloud Security Alliance (CSA) are [4]: Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders. Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking. Unknown Risk Profile Formal proof of retrievability (POR) model for ensuring the remote data integrity. Their scheme combines spotchecking and error correcting code to ensure both possession and retrievability of files on archive service systems. Shacham et al. [16] built on this model and constructed a random linear function based homomorphism authenticator which enables unlimited number of challenges and requires less communication overhead due to its usage of relatively small size of BLS signature. Bowers et al. [7] proposed an improved framework for POR protocols that generalizes both Juels and Shachams work. Later in their subsequent work, Bowers et al. extended POR model to distributed systems. However, all these schemes are focusing on static data. The effectiveness of their schemes rests primarily on the preprocessing steps that the user conducts before outsourcing the data file F. Any change to the contents of F, even few bits, must propagate through the errorcorrecting code and the corresponding random shuffling process, thus introducing significant computation and communication complexity. Recently, Dodis et al. [9] gave theoretical studies on generalized framework for different variants of existing POR work. Ateniese et al. [10] defined the provable data possession (PDP) model for ensuring possession of file on untrusted storages. Their scheme utilized public key based homomorphism tags for auditing the data file. However, the precomputation of the tags imposes heavy computation overhead that can be expensive for an entire file. In their subsequent work, Ateniese et al. described a PDP scheme that uses only symmetric key based cryptography. This method has lower-overhead than their previous scheme and allows for block updates, deletions and appends to the stored file, which has also been supported in our work. However, their scheme focuses on single server scenario and does not provide data availability guarantee against server failures, leaving both the distributed scenario and data error recovery issue unexplored. The incremental cryptography work done by Bellare etal. Also provides a Page 119

Section II 2. Related Work:

The survey of major cloud service providers to investigate the security mechanisms to overcome the security issues discussed in this paper. We consider ten major cloud service providers. These providers provide their services in all major areas of cloud computing, including SaaS, PaaS and IaaS. List shows the list of service providers that we studied in this survey. In order to analyze the complete state of art of security in cloud computing, the survey needs to be more exhaustive. However, due to the fact that the scope of our work is not just to explore the state of art but to look at the major factors that affect security in cloud computing. Therefore we have intentionally not considered other cloud service providers in this survey. In list 2, we present the results of the survey that depicts the current state of security mechanisms. Information given in table 2 is based on the information available online at the official websites of these providers. 1. IaaS Service Provides is a Amazon EC2 Amazon S3 Go Grid 2. PaaS Service Provides Google Application Engine Microsoft Azure Services, Elastic Map Reduce 3. SaaS service provides Sales force Google Docs Password Recovery 90% are using standard methods like other common services while 10% are using sophisticated techniques. Encryption 40% are using standard SSL encryption while 20% are using encryption mechanism but at an extra cost 40% are using advance methods like HTTPS access Data Location 70% have their data centers located in more than one country while 10% are located at a single location 20% are not open about this issue. Cloud computing is a model for information and services using exiting methods, it uses the internet infrastructure to allow communication between client side and server side applications. Cloud clients service providers provides exist between that offers cloud platforms for their customers to use and create their own web services. When making decisions to adopt cloud services privacy or security has always been a major deal with these issues the cloud provider must build up

Volume 2, Issue 6 November December 2013

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: Email:, Volume 2, Issue 6, November December 2013 ISSN 2278-6856
set of cryptographic building blocks such as hash, MAC, and signature functions that may be employed for storage integrity verification while supporting dynamic operations on data. However, this branch of work falls into the traditional data integrity protection mechanism, where local copy of data has to be maintained for the verification. It is not yet clear how the work can be adapted to cloud storage scenario where users no longer have the data at local sites but still need to ensure the storage correctness efficiently in the cloud. Microsoft .Net service bus helps with discovery and access and control service helps role which claims transformation mapping. Cloud applications that are built for cloud computing expose web interface and services for end users enabling multitenant hosting models some functions include connecting disparate systems and leveraging cloud storage infrastructure to store documents. Users and providers of cloud computing are three categories cloud platform provide the hosting platform and infrastructure services, cloud consumers utilizes the cloud platform and develop applications and services to be consumed by end users and it also configure applications for scalability availability security needs. end users leverage the services offered by cloud consumers. Web Application Development used to store digital images in the cloud users must be able to use their own desktop applications to access these pictures directly from the storage. Represents a high level architecture and service managing their digital assets these services store and retrieve digital assets from the asset store implemented on top of windows Azure blob services.

III Section 3.1. Window Azure

Windows Azure provides a host based application server and storage networking integration infrastructure for building and running windows applications which relies on large pools of commodity hardware in creating the utility computing environment.

Figure 2 Cloud Window Azure Figure Azure resource model is visualized storage network and compute resources are deployed on demand by the provisioning policies at deployment time. Resource pool comprises commodity resources that are made fault tolerant by the fabric controller and spawns additional instances to meet service level agreements. Window Azure is a complete platform for application hosting it ensures systemic qualities of the application by offering virtually unlimited resources through on demand provisioning. Windows Azure datacenters are managed by a handful of professionals who rely on automation Azure enables application owners to provision resources through machine readable models comprising resource descriptors know as service models these service model specify the application resource and their dependencies sufficient for provisioning the complete runtime infrastructure without user involvement. Windows Azure is responsible for providing CPU cycles for executing applications underlying operating system and hardware, these applications are deployed into the windows Azure package of roles and associated executable code and resource. Cloud platform services developing and managing software for cloud computing is complex becomes really complex when we integrate on premise software with hosted services. These set of capabilities exposed as services to help with integration for example Volume 2, Issue 6 November December 2013 Figure 3 Example of Cloud Window Azure Application To develop Windows Azure in cloud, first need to understand the application scenario select appropriate patterns and programming models. During this process will need to identify the type of application and workloads targeting windows Azure. To facilitate development the windows Azure SDK comes with a development environment that simulates Window Azure on the local machine thereby enabling offline development and debugging. SDK supports web and worker roles storage visual studio templates tools for packaging viewing and managing role instances. To begin the use Window Azure tools for Microsoft visual studio to create a template, necessary to add user interface application logic and input processing to the web application or could start from an existing ASP.NET web application because the application will execute under partial trust avoid calling APIs that violate this restriction. Windows Azure storage relies on Hash based message authentication code for authenticating the rest web requests, shared secret key associated with the windows Azure storage is combined with the HTTP request in computing a 256 byte hash that gets embedded as an authorization header into the web request. Windows Azure follow the same authentication process while the Page 120

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: Email:, Volume 2, Issue 6, November December 2013 ISSN 2278-6856
payload and the target URLs are different for each of the storage types. and maintenance costs and allows seamless integration with other mission critical applications across enterprise. Sage CRM provides multicurrency multi-lingual support from a single code base U.S English U.K English French German Spanish making this solution the logical choice for businesses around the world. Single server installation and web browser access allow employees partners and customers alike to view the information need to get job done.

3.2. Sales Force:

Sales force is business software market by exploiting companies desire to stop managing programs for thousands of their employees and outsource the job instead. Salesforce is customer relationship management product which is composed of sales cloud, service cloud, marketing cloud which manages contact information and integrates social media and real time customer collaboration. Service cloud includes a call center like case ticketing feature and a social media monitoring and marketing application. With a CRM every step of sale from phone calls and emails to collaboration with colleagues is tracked in single customer database, so sales stay organized and build stronger relationship with clients.

Section IV 4.1. IBM Cloud Computing

IBM cloud simulator for Tivoli service automation manager provides an automatically created simulation of a customers system that enables developers to create effective prototypes and get a taste of private cloud service management and administrative functions. IBM Tivoli service automation manager is a component based on the Tivoli process automation engine that implements a data model workflows and applications for automating the management of IT services by using the notation of service instance. Tivoli service automation manager requires a fully hypervised environment to function for either a proof of concept or internal education purpose environment takes a lot of time effort and skill not to mention configuring.

3.3. Sage Management:



Sage CRM is an easy to use fast to deploy solution with out of the box but configurable business processes, provides enterprise wide access to vital customer information anytime anywhere integrated approach to inside and fields sales automation. Sage CRM puts complete control of sales pipeline allowing sales team members to effectively manage forecast and report on all phases of the sale cycle. Sage CRM sales cycles can be shortened and more deals can close faster capabilities within sage CRM provide sales team instant access to vital customer data including reports and graphs and historical details. Every user with front to back office customer centric integration because orders move to accounting more quickly and accurately customers receive products the organization gets paid faster salespeople receive commission checks earlier and customers receive higher levels of customers service. Sage CRM workflow capabilities business can automate pre-determined business processes across all channels departments and employees to help assess and design workflow sage CRM provides graphical views of the process and its development patterns. Sage CRM combines a fully integrated CRM solution with interactive inbound and outbound telephony automation, customer complete CRM history including fax personal visits phone and email is viewed through automated screen pop functionality gives the support employees an enterprise view of the customer experience. Full on-screen auto dial and phone functionality allows support staff to perform necessary tasks through the system interface rather than the phone system, provides the full integration to all standard third party telephony software leveraging functionality. SageCRM provides customization tools that allow businesses to rapidly modify all aspects of the system. Sage CRM open architecture greatly reduces development Volume 2, Issue 6 November December 2013

Figure 4 IBM Cloud Computing IBM cloud simulator automation manager is a package of Tivoli Service Automation manager and IBM cloud simulator acts as a simulator for infrastructure provisioning components. From experience developing the IBM cloud simulator for Tivoli service automation manager image outline a few advantages below. Customer Specific user interface labeling is a proof of concept development common for a customer to ask to have user interface labeling that includes a customer logon homepage the Tivoli service automation manager portal as well as adding and modifying text across different offerings. With the cloud simulator it is relatively easy to develop all user interface changes and reconfigure the user interface and can be migrated to the Page 121

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: Email:, Volume 2, Issue 6, November December 2013 ISSN 2278-6856
production Tivoli service automation manager to develop all user interface changes and reconfigure. Co-existence of multiple hypervisor pools will include a minimum of two hypervisors most customers want to observe how the system behaves under varied multiple hypervisor pool scenarios interested to observing the process of how authorize these pools to different customers on Tivoli service automation manager. Integrating with external systems is key use case regardless of customer for example a cloud service provider wants to expose Tivoli service automation manager service using external and established marketplace portals. into resource utilization operational performance and overall demand patterns including metrics such as CPU utilization, disk read/write and network traffic.

4.3. Open source tools for Cloud computing:

The role of open source in cloud has vulnerability and security threats and flexibility and cost savings open source would provide the time to invest and open source cloud computing Open QRM is the data centers management platform a single management console for the complete IT setup and defined API to integrate third party tools open QRM on a high level comes with complete set of features around Business continuity deployment monitoring storage management virtualization. Cobbler is a linux installation server that allows for rapid setup of network installation environment glues together and automates many associated linux tasks so do not have to hop between lots of various commands and applications when rolling out new systems and changing existing ones. Configuration tools help system administrators produce a consistent reproducible and verifiable description of their environment and offers visualization reporting tools to aid in day to day administrative tasks. It is portable has been successfully run on AIX free BSD open solaris along with many GNU linux distribution. CFE community is the open source core of innovative technology for data center self-handing configuration and management we can download software online is a professional enterprise solutions. Puppet is an enterprise system management that standardizes the way IT staff deploy and manage infrastructure in the enterprise cloud.

4.2. Amazon Elastic Compute

It is a web service that provides resizable compute capacity in the cloud designed to make web scale computing easier for developers. It allows to obtain configure capacity with minimal friction and provides with complete control of computing resources. Amazon EC2 reduces the time required to obtain to boot new server instances to minutes allowing to quickly scaling capacity. Amazon EC2 changes the economics of computing allowing to pay only for capacity that actually use. Functionality of Amazon presents a true virtual computing environment allowing to use web service interface to launch instance with a variety of operating systems, loaded with custom application environment manage networks access permissions Pre-requisite for EC2 is to select a pre-configured template Amazon machine image to get up and running immediately or create an AMI containing application libraries data configuration settings Configure security and network access on Amazon EC2 instance Choose the instance which want then start terminate and monitor as many instances as needed using the web service API or the variety of management tools provided. Determine whether to run in multiple locations utilize static IP endpoints attach persistent block storage to your instances Amazon EC2 enables to increase capacity within minutes not hours commission hundreds or thousands of server instance simultaneously. Amazon offers persist storage for amazon EC2 instances and EBS volumes are highly reliable volumes that can be leveraged as an Amazon EC2 instance boot partition or attached to a running Amazon EC2 instance as standard restarted volumes offer greatly improved durability over local amazon EC2 instance stores are automatically replicated on the backend. EBS optimized instances for a low additional hourly fee customers can launch selected Amazon EC2 instances types as EBS optimized instances and fully utilize that IOPS provisioned on an EBS volume. Amazon cloud watch is a web service that provides monitoring for AWS cloud resources and applications starting with Amazon EC2 and also provides visibility Volume 2, Issue 6 November December 2013

Table 1 shows the Comparison of Configuring Tools Monitoring tools like Ganglia is a scalable distributed monitoring system for high performance computing systems such as clusters and Grids, it is based on a hierarchical design targeted at federations of clusters leverages widely used technology such as xml for data representation compact portable data transport and RRD tool Zabbix offers advanced monitoring alerting and visualization features to day which are missing in other monitoring alerting and visualization features today which are missing in other monitoring systems even some of the best commercial ones comes with distributed realtime agentless based monitoring features along with good Page 122

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: Email:, Volume 2, Issue 6, November December 2013 ISSN 2278-6856
scalability visualization problem resolution reporting easy import export and escalation notification features. Nagios is enterprise class monitoring solution almost used by most of the organizations that I or mates happen to work with enterprise hardware and software monitoring. Automatelt is open source tool for automating the setup and maintenance of servers applications and their dependencies provides a surprisingly simple powerful way to manage files packages services networks accounts roles templates and more. this type of deployment ERP software data is managed centrally by the ERP vendor. On-premise ERP system usually require large upfront and ongoing investments to purchase and manage the software and related hardware servers and facilities necessary to run. Organization doesnt have a more number of staff may also have to invest more effort and cost in additional personnel and train them. Even more importantly on premise systems require that our IT spend a significant amount of their time and budgets ensuring system is up and running when we need it including maintenance of hardware server and more when the time of ERP system upgraded must redeploy the system across the various user computers and re-implement various customizations and integration business installed on previous software. For cloud based ERP initial cost are typically much lower because simply implement the software to requirements then access it through our computer internet connection. Cloud ERP provider hosts and maintain all of the IT infrastructure to ensure the system is always running that the data is secure and that product enhancement are rolled out painlessly to solution without breaking previously implemented customization. Cloud ERP offers a predictable pay as go subscription model that can make cash flow management and planning much easier, over time IT savings add up when comparing the total cost of ownership of on premise ERP solutions relative to cloud systems one industry analysts study found that cloud based ERP can cost 50 percent less than over four year period. On-premise ERP software can be customized but those customizations are tied to our current software deployment and are not easy to re-implement with future. As ERP provider release new product updates and enhancements previously implemented customizations will be wiped out when you upgrade and IT team will have to start customizing from scratch again, in fact twothird of mid-size business are running outdated versions of their ERP software compare cloud ERP solutions like Netsuite are continually upgraded by the provider sure always using the latest most advance version of ERP software because of cloud platform todays leading cloud applications are built upon previously implemented customizations and integrations automatically carry forward when the solutions is updated without additional investment. Cloud ERP often delivers better performance than on premise solutions cloud software architecture is designed from the maximum network performance which can mean better application availability than traditional on premise ERP system. Cloud based ERP also offers optimized performance that can adapt needs if there is a spike business cloud ERP automatically adjusts and dynamically provisions additional resources to handle the surge. Also important to note that a cloud based ERP solution provides real time data that can be accessed via internet anywhere at any time means that staff at company can see accurate information on laptops smartphones and tablet device while they travel or Page 123

Table 2 shows the Comparison of Monitoring Tools Capistrano is an open source tool written in ruby for running scripts on multiple servers its main use is deploying web applications automates the process of making a new version of an application available on more web servers. Rundeck is open source software that helps automate adhoc routine procedures in data center or cloud environment provides a number of features that will alleviate time consuming grunt work and make it easy for scale up scripting efforts. Func provides a two way authenticated system for generically doing these sort of things can build own applications on it and easily expand func by adding in additional modules whether want these to work through the func command line or by means of some other application.

Table 3 shows the Comparison of Automated Tools

Section V 5. Comparison on Cloud ERP and On-premise ERP:

ERP business system chances are being with choices whether to select a cloud based ERP solution or one installed locally. Difference between on premise ERP and cloud ERP also know as SaaS is provide as a service with Volume 2, Issue 6 November December 2013

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: Email:, Volume 2, Issue 6, November December 2013 ISSN 2278-6856
telecommute all without extra setup fees or ongoing costs. ERP provide better performance and greater accessibility but better security as well because core competency cloud ERP provides NetSuite make securing their system high priority by providing strong industry standard. ERP deployment takes time and requires careful planning but cloud ERP offers clear advantages when consider speed of deployment. ERP requires no additional hardware business doesnt have to waste time procuring and installing IT infrastructure, with cloud ERP can easily roll it out across multiple regions subsidiaries and divisions avoiding the cost associated with those rollouts. Cloud ERP deployments usually take 3 to 6 months compared to the 12 months that it typically takes to implement an on premise solution, ERP system are also easier to scale which gives flexibility to add more users as business grows. Experience, Volume 40, Issue 5, Pages: 405-429, Wiley Press, USA, April 2010. Open Security Architecture Steve Bennett, Mans Bhuller, Robert Covington. Oracle White Paper in Enterprise Architecture Architectural Strategies for Cloud Computing. August 2009. DOI= arch/pdf/architectural_strategies_for_cloud_computin g.pdf Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. DOI = reats. v1.0.pdf Towards Secure and Dependable Storage Services in Cloud Computing Cong Wand Student Memebet IEEE Qian Wang Kui Ran Ning Cao Student Members IEEE and Wenjing Lou Senior Member

[5] [6]



In this paper a general cloud computing tools such as IBM Amazon and modules like Window Azure Salesforce Sage CRM mechanisms explain the novel results was described. The specific approach of cloud computing tools are characterized, cloud based ERP is a technique that implements and can be used in sales business & IT organization to develop end products. Our work compares ERP with Cloud ERP in real time application to achieve a high rate of accuracy in the case storage in human understandable improve the efficiency and effort of developers.

[1] Linlin Wu, Saurabh Kumar Garg and Rajkumar Buyya, SLA-based Resource Allocation for a Software as a Service Provider in Cloud Computing Environments, Proceedings of the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2011), Los Angeles, USA, May 23-26, 2011. [2] Adel Nadjaran Toosi, Rodrigo N. Calheiros, Ruppa K. Thulasiran, Rajkumar Buyya, Resource Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment, Proceedings of the 13rd International Conference on High Performance and Communications (HPCC 2011), Banff, Canada, September 2-4, 2011. [3] Anton Beloglazov, and Rajkumar Buyya, Energy Efficient Allocation of Virtual Machines in Cloud Data Centers. Proceedings of the 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2010), Melbourne, Australia, May 17-20, 2010. [4] Rodrigo N. Calheiros, Rajkumar Buyya, Cesar A. F. De Rose, Building an automated and selfconfigurable emulation testbed for grid applications. International Journal of Software: Practice and

D.Krishna, B.Tech (CSE) M.Tech (CSE).is having 12+ years of relevant work experience in Academics, Teaching, Lifetime Member of ISTE. At present, he is working as an Associate Professor, HOD of CSE Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P. He has attended seminars and workshops. His areas of interest Data Mining, Data Warehousing, Cloud computing, Network security& Compiler Design. Rajasekhar, B.Tech (IT), M.Tech (IT) is having 7+ years of relevant work experience in Academics & Teaching. At present, he is working as an Associate Professor, HOD of IT Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P. His area of interest includes Cloud computing, Network security, wireless adhoc networks. K.Murali Krishna, B.Tech (CSIT), M.Tech (CS) is having 4+ years of relevant work experience in Academics & Teaching. At present, he is working as an Assistant Professor, in CSE Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, and A.P. His area of interest includes Cloud computing, Network security, wireless adhoc networks.

Volume 2, Issue 6 November December 2013

Page 124