Advertisements

Computer Science Project Topics

Design and Implementation of Collaborative Software as a Service-based Office Management System

Design and Implementation of a Collaborative Software as a Service-based Office Management System

Advertisements

Design and Implementation of Collaborative Software as a Service-based Office Management System

Chapter One

Aimย and Objectivesย ofย Study

The aim of this study is to design aย collaborative office management systemย using Softwareย as a Service Cloud computing Model. In order to achieve the desired aim, the followingย objectivesย wereย considered:

  1. Providesaย standardย databaseย systemย forย storingย userย informationย thatย isย compatibleย with virtuallyย everyย operating
  2. Deploying useful applications on cloud for managing files which eliminates the need for setup and installation of such application on user system.
  3. Provide a more secured service through file encryption and log

CHAPTER TWOย 

LITERATUREย REVIEW

Cloudย Computing

Cloud computing is the delivery ofย computing services over theย Internet. Cloud servicesย allow individuals and businesses to use software and hardware that are managed at remoteย locations by third parties. Examples of cloud services include online file storage, socialย networking sites, webmail, and online business applications. The cloud computing modelย allowsย accessย toย informationย andย computerย resourcesย fromย anywhereย thatย aย networkย connection is available. Cloud computing provides a shared pool of resources, including dataย storage space, networks, computer processing power, and specialized corporate and userย applications.

Mell and Grance (2011) stated that Cloud computing is a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

Heiser (2009) defined cloud computing as โ€žโ€ža style of computing, where massively scalable IT- enabled capabilities are delivered โ€žas a serviceโ€Ÿ to external customers using Internet technologies. Cloud computing is, in a general sense, on-demand utility computing for anyone with access to the cloud. It offers a plethora of IT services ranging from software to storage to security, all available anytime, anywhere, and from any device connected to the cloud. Cloud computing is not something that suddenly appeared overnight; in some form it may trace back to a time when computer systems remotely time-shared computing resources and applications. More currently though, cloud computing refers to the many different types of services and applications being delivered in the internet cloud. Bringing this down to the understanding of a layman, when you store your photos online instead of on your home computer, or use webmail or a social networking site, you are using a โ€œcloud computingโ€ service. If you are an organization, and you want to use, for example, an online invoicing service instead of updating the in-house one you have been using for many years, that online invoicing service is a โ€œcloud computingโ€ service. In other words cloud computing refers to the delivery of computing resources over the Internet. Instead of keeping data on your own hard drive or updating applications for your needs, you use a service over the Internet, atย another location, to store your information or use its applications. Doing so may give rise toย certainย privacyย implicationsย andย thatย bringsย aboutย theย necessityย ofย securityย inย cloudย computingย services.

ย Cloudย Computingย Serviceย Models

Cloud computing is able to provide a variety of services at the moment and these cloudย service models describe how cloud services are made available to clients. Cloud computingย can be classified by the model of service it offers. According to Chappell (2008), Cloudย Computingย isย splitย intoย threeย differentย categories.ย Theyย areย Infrastructureย asย aย Service,ย Platformย as aย Serviceย andย Softwareย asย aย Service.

ย Infrastructure-As-A-Serviceย (Iaas)

In this service model, the core computing resources are hardware and software components.ย They lay the foundations of every computing infrastructure. Infrastructure-as-a-Service ofย cloud computing provide these services to cloud end users. End users can hire any of theseย servicesย at the level they desire. The capability provided to the customer ofย IaaS is rawย storage space, computing, or network resources with which the customer can run and executeย an operating system,ย applications, or any software that they choose. Theย cloud customer isย not able to control the distribution of the software to a specific hardware platform or changeย parametersย ofย theย underlyingย infrastructure,ย butย theย customerย canย manageย theย softwareย deployed (generally from the boot level upward). User has to pay only for the usage of hisย resources. IaaS is to provide computing infrastructure and operating middleware (Prodan andย Ostermann, 2009). Grid/Cluster architectures provide high performance infrastructures to theย organizations on rent bases and make them free from their own resources, so organizationsย can put their attention on manufacturing and quality concerns (Aniruddha et al., 2013).ย Theย main concept behind IaaS is the resource virtualization. It allows the user to have his ownย guest operating system on top of infrastructure provided by the cloud provider. This conceptย leads to automatic deployment of infrastructure which is both distributed and scalable. Theย administration, deployment, and maintenance is the responsibility of the service providerย (Ostermannย and Prodan,ย 2009).

ย Componentsย ofย IaaS

Infrastructure of cloud has multiple components which are used in infrastructure serviceย model (Wesam et al., 2011). They are the shared resources among the users, so they haveย multipleย challengesย forย serviceย providers.ย Theseย components are:

  1. CloudSoftware
  2. ComputerHardware
  3. Networkandย Internetย Connectivity
  4. PlatformVirtualization
  1. UtilityComputing
  2. ServiceLevelย Agreements

Platform-as-a-Serviceย (PaaS)

Inย theย caseย ofย PaaS,ย theย cloudย providerย notย onlyย providesย theย hardware,ย butย theyย alsoย provideย aย toolkitย andย aย numberย ofย supportedย programmingย languagesย toย buildย higherย levelย servicesย (i.e. software applications that are made available as part of a specific platform).The users ofย PaaSย areย typically softwareย developersย whoย hostย theirย applicationsย onย theย platformย andย provide these applications to the end-users. Platform as a service provides a developmentย platform to its users so that they can develop and maintain their applications and cloudย specificย utilities.ย Itย isย differentย fromย SaaSย becauseย SaaSย isย aย developedย andย deployedย application and PaaS provides a platform or ground to develop those applications. PaaSย provides development environment and platform, so all supporting material i.e. programmingย environment, development tools and infrastructure etc. must be provided by cloud providerย (Goudar and Santosh, 2012).

 

CHAPTERย THREE

Advertisements

ย SYSTEMย ANALYSISย ANDย METHODOLOGY

ย ย Introduction

System analysis is a problem-solving technique that decomposes a system into its componentย pieces for the purposes of studying how well those components parts work and interacts toย accomplish their purpose (Whitten et al., 2004). It is a process whereby the system underย study is carefully examined to determine or find out areas of inefficiencies with the view ofย arrivingย at a new systemย that addresses the issues.

ย Analysisย ofย theย Existingย System

The existing system is one that restricts file sharing among business partners in distinctย locations. The traditional file management system used in offices permits files to be created,ย retrieved, edited and deleted within the user personal computer, it stores files on the userโ€Ÿsย system with no provision for files to be used outside the office location and when such needย arises, it requires that the user transfer file to an external storage.ย The form of securityย measure taken is mostly the password authentication, which is usually insecure and can easilyย be tampered. Once an intruder gains access to the system; mostly by breaking through theย desktopย passwordย security,ย theย intruderย automaticallyย gainsย accessย toย theย systemย resourcesย and files stored on it. File sharing and collaboration within the office is done using externalย devices (flash drive) and sometimes Bluetooth, within close distance. This system has noย provisionย for fileย sharingย and collaborationย outsideย the office environment.

Figure 3.1 highlights the security breach and inefficiency in this system, where Employer Bย couldย accessย fileย Employeeย Aย filesย withoutย permissionย andย alsoย theย inabilityย ofย Employeeย Aย to access his files outside the office environment. Hence, there is no continuity of activitiesย outsideย theย office even atย emergencies.

Activitiesย Procedureย inย Systematics

The activities procedure in systematics was analysed using the Data Flow Diagram (DFD).ย Ganeย andย Sarsenโ€Ÿs ย approachย wasย usedย toย effectย theย DFD asย shownย inย Figureย 3.1

CHAPTERย FOUR

ย SYSTEMย DESIGNย ANDย IMPLEMENTATION

ย Objectiveย of theย design

The objective of this design is to create a SaaS-based file management system for office use,ย toย enableย officesย continueย theirย usualย activitiesย withoutย distanceย barrierย orย any formย ofย insecurity.ย Theย system will allow users to:

  1. Editandย createย new file.
  2. Enablefileย Uploadsย (withย anย optionย forย encryptionย whichย willย beย decryptedย usingย aย permit key).
  3. Download
  4. Usersinย sameย organizationย canย exchangeย orย share filesย among
  5. Keeplogย ofย users activitiesย forย each

CHAPTERย FIVE

ย SUMMARY,ย RECOMMENDATIONย ANDย CONCLUSION

ย Summary

The primary aim of this project work is to provide a robust and scalable office managementย system and a collaborative work environment that greatly improves the processes of theย traditional file management system in a typical organizational work setting. It factors out theย drawbacks of the present workflow in Organizations as regards to team collaboration and fileย manipulation and seeks a better way to help team members effectively carry out collaborativeย tasksย asย wellย asย streamlineย theย questionย ofย fileย managementย byย detailingย theย design,ย developmentย andย implementationย ofย aย Collaborativeย SaaS-Basedย Officeย Managementย System.

Reviewย ofย Achievements

Thisย study startedย withย reviewย ofย theย existingย system,ย statingย theย background,ย problemย statement, objectives, significance, scope and the limitations of the study. Again, conceptsย such as cloud computing, Infrastructure as a Service, Platform as a Service, Software as aย Service,ย cloudย deploymentย models,ย fileย management,ย cloudย computingย securityย wereย reviewedย in depth in the second chapter ofย the study.

More so, the third chapter of this research provided detailed analysis ofโ€Ÿ the existing system.ย Specifying Activities Procedure in Systematics with a view to outline the shortcomings of theย existing system and propose a solution with a well detailed description as well as the Highย Level Decomposition of the proposed system and then adopting Object Oriented Hypermediaย Designย Methodology.

Furthermore, a more detailed analysis of the proposed system leading to a fine system designย and implementation of a Saas-Based Office Management System, showing its specifications,ย systemย requirement,ย programย developmentย andย testingย wereย carriedย out,ย whichย areย allย documentedย in theย fourthย chapterย of this study.

Applicationย Areas

The Collaborative SaaS-Based Office Management System can be used and implemented in every organization, whether small or large scale firms, cooperate offices, departments and faculties, industries as well as government parastatals. The ability of the system to implement Software as a Service cloud computing model for managing organizational files and member collaboration while working in remote places makes this system highly useful in this era ofย hugeย technologicalย advancements.

ย Recommendations

Forย anย optimalย useย ofย theย Collaborativeย SaaS-Basedย Officeย Managementย System,ย itย isย recommended that users upgrade their client application from time to time whenever there isย an upgrade available, give their reviews on updates andย also provide the user feedbackย required for the software improvement and upgrade. Users should be wary when using theirย password, permit key and also monitor log activities in order to enjoy the maximum securityย implementationย of theย system.

Suggestedย Areasย forย Furtherย Studies

For further studies, the manipulation of compressed files in the collaborative environmentย withoutย destroyingย its encryption is suggested.

Conclusion

In this era of huge technological advancement, cloud computing has always been an activeย research area because it provides a simple interface where the user is abstracted from theย underlyingย frameworkย ofย theย systemย andย itย enablesย ubiquitousย convenient,ย onย demandย networkย accessย toย sharedย poolย ofย configurableย computingย resourcesย thatย canย beย rapidlyย provisioned and released with minimal management effort or service provider interaction.ย Thoughย movingย filesย toย aย cloudย systemย hasย beenย aย welcomedย advancementย inย fileย managementย but has failed in addressingย the issues ofย securityย andย cost.

Adopting Software as a Service (SaaS) as the befitting cloud computing model for this workย does not only provide software availability but also provides an efficient means of billingย users. A log of records was provided for billing system which in turn aided the monitoring ofย any form of any form of intrusion created by unauthorized access. Therefore a SaaS modelย thatย providesย aย moreย securedย serviceย throughย fileย encryptionย andย logย managementย wasย designedย and implemented.

REFERENCES

  • Aniruddh,ย S.,ย &ย Chaudhari,ย D.ย (2013).ย Cloudย Computing:ย Infrastructureย asย aย Service.ย International Journal of Inventive Engineering and Sciences (IJIES), Vol. 1, Issue-3,ย pp.14-36.
  • Ashraf, I. (2014). An Overview of Service Models of Cloud Computing. International Journalย ofย Multidisciplinaryย andย Currentย Research, Vol.ย 2,ย (July/Augย 2014ย issue), pp.779-783.
  • Asigra, A. (2011). Agentless backup is not a myth. Retrieved from www.asigra.comย onย Augustย 16, 2011.
  • Aulbach, S., Grust, T., Jacobs, D., Kemper, A., &ย Rittinger, J. (2008). Multi-tenant databasesย for software as a service: schema-mapping techniques, Proceedings of the 2008 ACMย SIGMODย internationalย conferenceย onย Managementย ofย data,ย ACM,ย Vancouver,ย Canada,ย pp.1195-1206.ย Doi:10.1145/11376616.1376736
  • Avram,ย M.ย (2014).ย Advantagesย andย challengesย ofย adoptingย cloudย computingย fromย anย enterpriseย perspective.ย Proceedingsย ofย theย 7thย Internationalย Conferenceย Interdisciplinarity in Engineering, (INTER-ENG 2013), Elsevier, Vol. 12, pp.529-ย 534.ย Doi:10.1016/j.proty.2013.12.525
  • Bowers, K.,ย Juels, A., & Oprea, A. (2009). Hail: a high-availability and integrity layer forย cloudย storage,ย inย Proceedingsย ofย theย 16thย ACMย conferenceย onย Computerย andย communicationsย security, ย pp. 187โ€“198.

Advertisements

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!