Está en la página 1de 10

International Journal of Pure and Applied Mathematics

Volume 119 No. 10 2018, 1657-1665


ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)
url: http://www.ijpam.eu
Special Issue
ijpam.eu

ONLINE PROJECT MONITORING SYSTEM BASED ON CLOUD


COMPUTING PLATFORM

S.Saravana Kumar1 , R.Anisha2 ,A.Biniya3 ,J.Poornima4 ,R.Suganthi5


1
Professor, Dept of CSE, Karpagam College of Engineering, Coimbatore.
2, 3, 4, 5
Student, Dept of CSE, Karpagam College of Engineering, Coimbatore.

ABSTRACTAs business become Technology, there has been an increase in


increasingly dependent on Information the demand for software that make jobs
Technology for their operations, project easier for people, as a result, to keep up
managers find themselves under pressure with rising demand, project managers need
to remain innovative and go forward to a way to effectively manage their software
deliver quality projects, on time and within projects. Using the iterative methodology,
budget constraints. However, some a web based software project management
organizations still find it hard to plan and system was developed, that fully monitors
track project components, stakeholders and project progress, allocates tasks, creates
resources. Additionally, project managers, milestones and provides an avenue for
team members and customers do not stakeholders to track project progress
communicate frequently to share their during its development phase. The
expert opinions. Projects tend to extend developed system solves the problem of
beyond scheduled deadlines, not unity and lack of communication. With the
necessarily due to lack of resources or system, once added to a new project, all
incompetence of projects members, but participating members may send messages
often because of inability to elicit to one another and keep tabs on the
requirements completely and inadequacy progress of the project so as to implement
of proper communication. To this end, the stakeholder’s requirements efficiently.
with the advent of Information
KEYWORDS:Cloud computing, I.INTRODUCTION
Schedule arrangement, Software project,
The development of the On-line
Time management.
communication is a quest for universal

1657
International Journal of Pure and Applied Mathematics Special Issue

connectivity and openness. Radically new II.RELATED WORKS


types of application are made possible and
Project management is the
the emergency of new online computing
application of scientific theories and
technology causes the net to get more
methods. It implements the project
intimately integrated with the very fabric
objectives with project plan,
our lives by the day. Small scale
organization, command, controlling and
organization (colleges) issues like
coordination. The project management
management, maintenance and
is a project as the research object of a
stabilization of the projects. To have a
discipline, and it includes the financial
complete web-based enterprise project
management, decision-making, benefit
management application that helps
for the integration of organization,
organizations plan, execute and deliver on
process and methods of the collection.
their entire portfolio of projects.On-Line
Project progress management is an
Project Management contains information
important aspect of project management.
about what kind of projects we are
Project progress management, as
collecting i.e. main and mini projects, how
referred in the project implementation
we go about this process of data collection,
process, includes various stages of
the kind of analysis which will take place,
progress and project deadline for
analysis means when Teams upload their
management. Its purpose is to ensure
project executable files or when they
that the project can meet the time
upload their documentations done Guide
constraints on the premise of achieving
will analyse their work done and give
goals. Project progress management's
status for their work done and again the
ultimate goal is to establish a realistic
teams will see the status for their work
project progress plan that can provide a
done. And also there are timesheets for the
basis for monitoring the progress of the
teams for their work done daily i.e. daily
project.
activity they have through the project will
Schedule Management has
be noted in the timesheet and they will be
become one of the most important field
later viewed by the Guides or the
and the focus of customer and
Administrator. This all the process will be
administrator. Schedule Management
taken place systematically from the
focuses on how to effectively complete
different types of users enter and uses the
all the needed tasks, based on the
service and logouts.
premise that the project should be sure to

1658
International Journal of Pure and Applied Mathematics Special Issue

finish within the schedule and limited fraudulent acts. The objective is to
resources. And in the system software analyze the processes, procedures,
development project, it is necessary to methodologies, tools and techniques of
combine it with the characteristic of Computer Forensics and its usages in
software engineering to finish the Cloud Computing for tracking digital
planned tasks in time and push the evidences, frauds.This technology is
schedule control. In the actual project evolving its roots all over the world and
management, schedule management utilizing the capability of internet for the
contents consist of schedule plan's great achievements[2].
establishment and schedule plan's The importance of ensuring the
implement. Schedule plan's remote data integrity has been
establishment is based on historical data, highlighted by the following works
project management experience and under different system and security
effective methods, and gives reference to models. These techniques can be useful
the actual project management[1]. to ensure the storage correctness without
In 1990’s, changes have been having users possessing local data. They
made by the computing world, from uni- may be useful for testing, but may not be
processing environment to parallel useful for the data availability in case of
processing, distributed computing, grid server failures.Though direct applying
computing, pervasive computing and these techniques to multiple server’s
now cloud computing . It allows storage could be in direct way, the
businesses to grow and decay their resulted storage verification would be
resources based on their needs. Using equal to the number of servers. By
cloud computing, users can store their complementary approach, researchers
data remotely and enjoy application have proposed distributed protocols for
access without having to invest in ensuring storage correctness across
hardware infrastructure or software multiple servers.While providing
management. Thus, it shields the user efficient cross server storage verification
from traditional computing difficulties and data availability, these schemes are
such as development of infrastructures, focusing on static data. As a
and hiring of technical staff. result,capabilities of handling dynamic
The need is to address them for data remains unclear.
successful implementation of Computer To achieve a good balance between
Forensics for detection and prevention of error flexibility and data dynamics and we

1659
International Journal of Pure and Applied Mathematics Special Issue

explore mathematics related property of Remote data possession checking


our computation and coded data and is an important component which is used
demonstrate how to efficiently support to detect server corruption. However, if the
operation on data blocks, to maintain the application is a different service than the
equivalent level of storage correctness[3]. backup itself and the server poisonous, a
remote data possession checking protocol
Data outsourcing, together with
only is not enough,the server might back
Cloud Data Storage, is becoming more and
up original files and access them properly
more popular and at the same time
to run the protocol using the corrupted
prompts a number of interesting security
versions to provide an efficient service.
issues. These issues have been extensively
Integrity check is one among the various
investigated in the past few years.Provable
building blocks used to check the
Data Possession is a topic that has only
corrupted data. Several mechanisms exist
recently been noticed by the research field.
(including comparison of different server
The main issue is how to efficiently and
behaviours, runtime checking of models,
securely verify that a Cloud Storage Server
network and host- based detection,etc.),
is faithfully storing the client’s outsourced
Hence it must be very difficult for an
data that is normally very large.
attacker to cause a security failure[5].

III.PROPOSED SYSTEM
The Cloud Storage Server is not
trusted. It might poisonously erase hosted The proposed system is a web-
data, change hosted data, makes the query based system that helps organizations to
slow, etc. The problem might be more recruit competent project managers before
serious if the client has a limited assigning of projects to such persons, but
computing device with limited resources. such system does not in cooperate
Prior work has addressed this problem communication among project team
using either public key cryptography or members as well as stakeholders. To this
requiring the client to outsource its data in end, this study was able to build on some
an encrypted form Storing data in an of the lapses of the related works and
encrypted form limits the query flexibility. literatures reviewed to come up with a
Indistinct queries cannot be executed perfect systems that will not only help in
above encrypted data.Encryption and software project development but will also
decryption need extra computing cost[4]. satisfy all stakeholders involved in a
particular project as most of their

1660
International Journal of Pure and Applied Mathematics Special Issue

requirements will be meant. The system By this, they can check their project status
also breaches the gap between the and take necessary changes if required.
stakeholders and the project manager by System also able to differentiate the
offering a platform whereby the particular projects upon different modules
stakeholder can monitor the progress of the and have concentrate on them when
system. With the system, all members required. This system also provides the list
once added to a new project can message of employees who are successfully
each other, and keep tabs on the progress involved in particular project for particular
of the project. It is recommended that this module for particular time in development
web based project management systems works.
should be deployed wherever the need to
ADVANTAGES
manage projects efficiently arises.
(i)The proposed system solves the problem
The important factors considered in
of unity, and lack of communication.
this system is time. Before starting any
new project, its manager can set the (ii)They are convenient to use, save time
timeand date for deadline and also give an and resources, and reduce both stationery
alert settings, the system notifies its team and labour costs.
members and managers before one week.
IV.FLOW CHART

Project

Monitoring Status of the


Creating project project
Data
Warehouse
Time
Creating
Documentation
cost

purchase
Assign Processes
Conduct Meetings, Adjust Sign Off
Agendas & Minutes Project on
Schedule Process
Check
Points

1661
International Journal of Pure and Applied Mathematics Special Issue

V.CONCLUSION

The primary goal of this project responsive climate where all faculties are
report is to identify action initiatives that valued equally and at the same time
make up the Actionin order to foster a
Administrator, Guide, Teams are VI.FUTURE SCOPE OF THE
also valued equally with respect to their PROJECT
responsibilities. To that end, On-Line
By using automation technology, the
Project Management Report calls for an
project developers can develop the system
increase in the number of projects that has
that generates automatic task assign to the
been done in the organization (colleges),
participant.By having more reworked the
faculty or the guides gives the status for
presentation of the forums can be
their teams for the work done for the
changed.Storage can be improved in order
project i.e. for uploading their project
to maintain all the newer projects.Guides
executable files and the documentation and
can view all the profiles or the projects of
reallocation of work responsibilities are
all the teams i.e. all the executable files.E-
given to the teams for their projects done
mail facility can be improved in order to
through online i.e. by using this online
send messages to all the teams
service. The assurance of status is given to
directly.Messages can be sent to all the
all the teams equally; equal access to
teams or the individual teams can be
Facilities to all the members who are using
developed.Alerts for the projects done can
this service; and the implementation of
be Enhanced i.e. status of their teams when
existing projects are taken through which
they login must be displayed in the dialog
new projects are being taken for the
box automatically.Administrator can block
juniors and the initiation of new projects
any permissions to the teams or the guides
and procedures.
can be enhanced.
Finally by using this On-Line
Project Management we can store all the
Old and new projects. A Team can interact REFERENCES
freely with the concern Guide very easily, 1. Shang Huihua”The Time
juniors can view all the Projects done by Management Framework Research of
the seniors and proceed with the projects software Project Based on cloud
very easily i.e. in the process of selecting computing platform” The Open
the newer projects. Automation and Control Systems

1662
International Journal of Pure and Applied Mathematics Special Issue

Journal, 2015, 7,1790-1795. 10-13, 2009.


2. Aqil Burney, Muhammad Asif, 7. D. Song, D. Wagner, and A. Perrig,
ZainAbbas”Forensics Issues in Cloud “Practical techniques for searches on
Computing” Journal of Computer and encrypted data”, In: Proceedings of
Communications, 2016, 4, 63- 2000 IEEE Symposium on Research
69,Published Online August 2016 in in Security and Privacy,IEEE
SciRes. Computer Society Press, pp. 44-55,
http://www.scirp.org/journal/jcc 2000.
http://dx.doi.org/10.4236/jcc.2016.41 8. DrAnanthi Sheshasaayee, 2R.
0007. Megala, “A Conceptual Framework
3. Wang, C., Wang, Q., Ren, K., Cao, For Resource Utilization In Cloud
N. and Lou, W. (2012) Toward Using Map Reduce Scheduler”,
Secure and Dependable Storage International Journal of Innovations
Services in Cloud Computing. IEEE in Scientific and Engineering
Transactions on Services Computing, Research (IJISER), Vol.4, no.6,
5, 220-232. pp.188-190, 2017.
http://dx.doi.org/10.1109/TSC.2011.2
4 9. Y. Zhu, H. Hu, G. Ahn, and M. Yu,
4. Jing Lu, Ting Dou ” Provable Dynamic “Cooperative Provable Data
Data Possession by Datalog Rules” Possession for Integrity Verification
JOURNAL OF SOFTWARE, VOL. 9, in Multi cloud Storage”, IEEE
NO. 4, APRIL 2014. Transactions on Parallel and
5. F. Sebe, J. Domingo-Ferrer, A. Distributed Systems,Volume 23,
Martinez-Balleste, Y.Deswarte, and Issue 12,pp.2231-
J.-J. Quisquater,“Efficient remote 2244,2012.JOURNAL OF
data possession checking in critical SOFTWARE, VOL. 9,NO. 4, APRIL
information infrastructures,” IEEE 2014 963© 2014.
Transactions on Knowledge and Data 10. C. Wang, Q. Wang, K. Ren, and W.
Engineering, Vol.20, No.8, pp. 1034- Lou, “Privacy-preserving public
1038, 2008. auditing for storage security in cloud
6. Dikaiakos M.D., Katsaros D., and computing,” in Proc.of IEEE
Mehra P., “Cloud computing: INFOCOM’10, San Diego, CA, USA,
Distributed internet computing for IT March 2010.
and scientific research”, In- ternet 11. C. Wang, K. Ren , W. Lou, and J. Li,
Computing, IEEE, vol. 13, no. 5, pp. “Towards publicly auditable secure

1663
International Journal of Pure and Applied Mathematics Special Issue

cloud data storage services,” IEEE 2012.


Network Magazine ,vol. 24, no. 4, pp. 15. Bollin A., Hochmüller E. and
19–24, 2010. Samuelis L., “Teaching Software
12. R. C. Merkle , “Protocols for public Project Management using
key cryptosystems,” in Proc. Of IEEE Simulations-The AMEISE Environ-
Symposium on Security and Privacy, ment: from Concepts to Class Room
Los Alamitos, CA, USA,1980. Experience”, IEEE, pp. 85-86, 2012.
13. Q. Wang, K. Ren, W. Lou, and Y. 16. Tan C.H., Yap K.S., Ishibuchi H.,
Zhang, “Dependable and secure TenagaNasional, Selangor and
sensor data storage with dynamic Nojima, “Application of Fuzzy
integrity assurance,” in Proc. Of Inference Rules to Early Semi-
IEEE INFOCOM’09, Rio de Janeiro, automatic Estimation of Activity
Brazil, April 2009. Duration in Software Project
14. Jadeja Y. and Modi K., “Cloud Management”, Human-Machine
computing-concepts, architecture and Systems, IEEE Transactions on, vol.
Challenges”, International 44, no. 5, pp. 678-688,2014.
Conference on. IEEE, pp. 877-880,

1664
1665
1666

También podría gustarte