Friday, April 5, 2019

Cells Breaks the Tor’s Anonymity: Onion Router

kiosks Breaks the Tors Anonymity Onion RouterMs. S.SIVARANJANIMs. R.BACKIYALAKSHMI B.E, M.Tech., hoist To hide the dialogue of users, the anonymity systems pack the application data into disturb sized cadres. The size of IP packets in the Tor ne bothrk send word be precise dynamic and the IP layer whitethorn be repack cells. A new cell- as certain(a) violate against Tor allows the assaulter to confirm unnamed conference relationship among users very apace. By varying the emergence of cells in the target job at the malicious exit onion router, the assaulter batch embed a secrete signal into variation of cell counter of the target affair and it go forth be carried and arrive at the malicious entry onion router. Then an accomplice of the assailant go away name the signal animald on received cells and confirm the communion among the users. thither be several features of this approach path. First, it is highly efficient and confirms very short communication ses sion with exactly tens of cells. Second, this overture is efficacious and detection rate approaches 100% with a very low false positive rate. Third, it is possible to utilise the attack in a way that appears to be very toilsome for h one and only(a)st disassociateicipants to detect.Keywords Anonymity, cell find out, unify networks, signal, Tor.INTRODUCTIONAnonymity has become a necessary and legitimate aim in mevery applications. here(predicate) the encryption alone feces non maintain the anonymity required by users. Generally speaking, mix proficiencys locoweed be use for either message- launch or flow-based anonymity applications. Research on flow-based anonymity applications has recently received expectant attention in order of battle to preserve anonymity in low-latency applications, including wind vane browsing and peer-to-peer file sharing.To put out down the anonymity service provided by anonymous communication systems, handicraft analysis attacks have be en use. The Existing traffic analysis attacks pot be categorized into two types passive traffic analysis and active agent water soft touch techniques. The active watermarking technique has recently received much attention to improve the accuracy of attack. In this technique is to actively introduce special signals into the senders outbound traffic with the intention of recognizing the infix signal at the receivers inbound traffic.The core contribution of the paper is a new cell counting based attack against Tor network. This attack confirms anonymous communication relationship among users accurately and quickly and it is difficult to detect.The attacker at the exit onion router detects the data familial to a destination and then determines whether the data is relay race cell or control cell in Tor. afterwards excluding control cells, manipulate the number of relay cells in the enlistment queue and flushes out all cells in the circumference queue. This way the attacker enki ndle embed a signal into the variation of cell count during a short period in the target traffic. To recover the embedded signal, the attacker at the entry onion router detects and excludes the control cells, constitution the number of relay cells in the roach queue and recover the embedded signal.The main features of cell-counting based attack be (1) This attack is highly efficient and sens quickly confirm very short anonymous communication sessions with tens of cells. (2) It is effective and detection rate approaches 100 % with very low false positive rate. (3) It makes difficult for others to detect the presence of the embedded signal. The Time hopping based signal embedding technique makes the attack even votelesser to detect.SYSTEM ARCHITECUREThere atomic number 18 two types of cells Control cell and Relay cell. The carrell_CREATE or CELL_CREATED used for setting up a new circuit. CELL_DESTROY used for releasing a circuit. Relay cell is used to carry transmission contr ol protocol menstruum data from lymph node to bob. Some of the relay commands be electrical relay_COMMAND_BEGIN, RELAY_COMMAND_END, RELAY_COMMAND_ info, RELAY_COMMAND_SENDME, and RELAY_ COMMAND_DROP.The Onion router (OR) maintains the TLS familiarity to other OR. Onion delegate (OP) uses source routing and chooses several ORs from cached directory. OP establishes circuit across the Tor network and negotiates a symmetric key with from each one OR, one hop at a time, as well as handle TCP stream from client application. The OR on other side of circuit connects to the requested destination and relay the data.The OP leave sets up TLS connection with OR1 development protocol, through and through this connection , OP sends CELL_CREATE cell and uses Diffie-Hellman (DH) handshake protocol to negotiate a base key k1=gxy with OR1. Form this key a forward symmetric key kf1 and backward key kb1 argon produced. This way eldest hop circuit C1 is created. Similarly OP extends the circu it to second and third hop. After circuit is setup, OP sends a RELAY_COMMAND_BEGIN cell to the exit onion router and cell is encrypted as Beginkf3kf2kf1. While the cell traverses through circuit each time the layer of onion skin atomic number 18 removed one by one. At last the OR3 last skin is removed by decryption then it open a TCP stream to a port at the destination IP, which belongs to bob. The OR3 sets up a TCP connection with bob and sends a RELAY_COMMAND_CONNECTED cell back to Alices OP. Then the client can download the file. touch on CELL AT ONION ROUTERThe TCP data is received by OR from port A and it is forgeed by TCP and TLS protocols. Then the processed data is delivered to the TLS wing. The read situation is called to read and process the data pending in the TLS buffer. This read event will pull the data from TLS buffer into the excitant buffer. Then the read event process cells from input buffer one by one. Each OR has routing table which maintains map from sourc e connection and circuit ID to destination connection and circuit ID.The transmission snap of the cell can be determined by the read event. To append the cell to the destination circuit the corresponding symmetric key is used to decrypt / encrypt the payload of the cell, replace the present circuit ID with destination circuit ID. The cell can be written directly for the destination connection if at that place is no data waiting in rig buffer and the write event is added to the event queue. After calling the write event, the data is flushed to TLS buffer of destination. Then write event pull as many cells as possible from circuit to output buffer and add write event to event queue. The next write event carry on flushing data to output buffer and pull cells to output buffer else the cell queued in circuit queue can be delivered to network via port B by calling write event twice.Fig. 2Processing the cells at Onion routerCELL COUNTING BASED flesh outThe IP packets in Tor network is very dynamic and based on this the cell counting based attack implemented.Dynamic IP packets over Tor The application data will be packed into equal sized cells (512-B). While the packets transmitted over the Tor network it is dynamic. Be realise of this reason the size of packets from sender to receiver is hit-or-miss over time and large numbers of packets have alter in sizes. The main reason for this is the varied bring aboutance of OR cause cells non to be promptly processed and as well if network is congested, cells will non delivered on time, because of this the cell will merge and non-MTU(Maximum Transmission Unit) sized packets will test up.Work-flow of Cell Counting based attackStep 1 SELECTING THE TARGET - The attacker log the information at the exit OR, including the server host IP address and port for a circuit and circuit ID and uses CELL RELAY-DATA to transmit the data stream.Step 2 ENCODING THE SIGNAL - Until the write event is called the CELL RELAY DATA will be waited in the circuit queue. After the write event is called then the cells are flushed into output buffer. Hence the attacker can manipulate the number of cells flushed to the output buffer all together. This way the attacker can able to embed the secret signal. To encode round 1, the attacker can flushes collar cells from circuit queue and for bit 0, flushes one cell from circuit queue.Step 3 RECORDING PACKETS - After the signal is embedded in the target traffic it will be transmitted to the entry OR along with target traffic. The attacker at the entry OR will record the received cells and related information and need to determine whether the received cells are CELL RELAY DATA cells.Step 4 RECOGNIZING THE EMBEDDED SIGNAL - The attacker enters the phase of recognizing the embedded signal with the record cells. For this used the recovery mechanisms. Once the genuine signal is identified the attacker can link the communication mingled with Alice and Bob.There are two cr itical issues related to attack (1) Encoding signals at exit OR two cells are not enough to encode 1 bit. Because if the attacker uses two cells to encode bit 1 then it will be easily distorted over network and also hard to recover. When the two cells arrive at the input buffer at the nerve OR, the first cell will be pulled into circuit queue and then if the output buffer is empty, the first cell will be flushed into it. Then the second cell will be pulled to the circuit queue. Since the output buffer is not empty, the second cell stays in the circuit queue. When the write event is called, the first cell will be delivered to the network, while the second cell written to the output buffer and wait for the next write event. Consequently, two originally combined cells will be split into two separate cells at the middle router. So the attacker at the entry OR will observe two separate cells arriving at the circuit queue. This cells will be decoded as two 0 bits, leading the attacker t o a untimely detection of the signal. To deal with this issue the attacker should choose at least three cells for carrying bit 1.For transmitting cells, proper delay legal separation should be selected If the delay interval among the cells is too large, users are not able to tolerate the slow traffic and to transmit the data will choose another circuit. When this intend happens the attack will fail. And if the delay interval is too small, then it will increase the chance that cells may combined at middle OR.(2) Decoding signals at the entry OR Distortion of signal leastways the combination and division of the cells will happen due to unpredictable network delay and congestion. This will cause the embedded signal to be distorted and the probability of recognizing the embedded signal will be stretchd. Because of this aberrancy of the signal, a recovery mechanism can be used, that recognize the embedded signal.The combination and division of cell can be categorized into four typ es (1) Two types of the cell division for the unit of the signal and (2) Two types of the cell combination for different units of signal. To deal with these types of division and combination types of the cells the recovery algorithm can be used. If the number of cells recorded in the circuit queue is smaller than the number of the original signal are recovered as either two types of cell division for the unit of the signal. Suppose the number of cells recorded in the circuit queue is larger than the number of cells for carrying the signal the recovered signal will be either two of the cell combination for different units of signal. When the signals are recovered in these types with k 2, can consider that these signals are successfully identified otherwise cannot be identified.Attack Delectability To improve the attack invisibility can adopt the time-hopping-based signal embedding technique, which can reduce the probability of interception and recognition. The principle of this tech nique is, there exit random intervals between signal bits. At the exit OR, the duration of those intervals are varied gibe to a pseudorandom control code which is known to only the attackers. To recover this signal, the attacker at the entry OR can use the same secret control code to position the signal bits and recover the all in all signal. If the interval between the bits is large enough, the inserted signal bits appear sparse in spite of appearance the target traffic and it is difficult to determine whether groups of cells are caused by network dynamics or intention. Therefore the secret signal embedded into the target traffic is no different than the noise. And when a malicious entry node has confirmed the communication relationship, it can separate the group of cells by adding delay between the cells so that not even the client can observe the embedded signal. In this paper a signal is embedded into the target traffic, which implies a secrete sequence of groups of one and three cells. With the time-hopping technique, groups of one and three cells are separated by random intervals and it is hard to differentiate them from those caused by network dynamics and since the embedded signal is very short and only known to attacker, can conclude that it is very difficult to distinguish traffic with embedded signals from normal traffic based on this very short secret sequence of cell groups.CONCLUSION AND FUTURE arrive atIn this paper, we presented a cell-counting based attack against Tor network. This can confirm the anonymous communication among the user quickly and accurately and it is very difficult to detect. The attacker at the exit OR manipulates the transmission of cells from the target TCP stream and embeds a secret signal into the cell counter variation of the TCP stream. Then the attacker at the entry OR recognizes the embedded signal using developed recovery algorithms and links the communication relationship among the users. In this attack the de tection rate is monotonously increasing function with the delay interval and decreasing function of the variance of one way transmission delay along a circuit. This attack could drastically and quickly degrade the anonymity service that Tor provides. Due to the parentageamental pattern of the Tor network, defending against this attack remains a very challenging task that we will investigate in future work.REFERENCES1 W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, DSSS-based ow marking technique for invisible traceback, in Proc. IEEE SP,May 2007, pp. 1832.2 N. B. Amir Houmansadr and N. Kiyavash, RAINBOW A robust and invisible non-blind watermark for network ows, in Proc.16thNDSS, Feb. 2009, pp. 113.3 V. Shmatikov and M.-H. Wang, Timing analysis in low-latency MIX networks Attacks and defenses, in Proc. ESORICS, 2006, pp. 1831.4 V. Fusenig, E. Staab, U. Sorger, and T. Engel, Slotted packet counting attacks on anonymity protocols, in Proc. AISC, 2009, pp. 5360.5 X. Wang, S. Chen, and S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the internet, in Proc. 12th ACM CCS, Nov. 2005, pp.8191.6 K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, Lowresource routing attacks against anonymous systems, Univ. Colorado Boulder, Boulder, CO, Tech. Rep., Aug. 2007.7 X. Fu, Z. Ling, J. Luo, W. Yu, W. Jia, and W. Zhao, One cell is enough to break Tors anonymity, in Proc. Black Hat DC,Feb.2009Online. getable http//www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf8 R. Dingledine, N. Mathewson, and P. Syverson, Tor Anonymity online, 2008 Online. Available http//tor.eff.org/index.html.en9 R. Dingledine and N. Mathewson, Tor protocol specication,2008 Online. Available https//gitweb.tor pop the question.org/torspec.git?a=blob_plainhb=HEADf=tor-spec.txt10 J. Reardon, Improving Tor using a TCP-over-DTLS tunnel, Masters thesis, University of Waterloo, Waterloo, ON, Canada, Sep. 2008.Project centering exercising The capital of the U nited Kingdom oculusProject focussing example The capital of the United Kingdom center of attentionIntroductionGenerally, the definitions of meet management have diversities, but in unremarkably fancy management is used to accomplish business ambition, strategies and well-defined work tasks within a certain schedule and limit budget (Sabin, 2006). The run across management required learning, experience, processes, methods and knowledge in order to ace the objectives of the tramp (Association for Project Management, 2014). Most strategists succeed in these days with high competitive and fusing global economic system are mostly using the rove management techniques to deliver substantial timberland of business results within modified time and budget (Project Management Institute, 2014). Jamieson Morris (2004) support that project management is a key agentive role in business process. Even in many definitions of project management, the fundamental is about attaining the jobs done.The capital of the United Kingdom sum is the huge project that was designed by architectures David Marks and Julia Barfield, its character to represent modern architectural design and engineering of the first of the millennium century (Tim and Ian, 2000). The capital of the United Kingdom eye was the tallest Ferris single-foot in the world by height 135 meters, after success, with Star of Nanchang in 2006, Singapore Flyer in 2008 and High ringlet in 2014 in order. The construction of London center of attention used 16 months to finish in order to sustaind of the class 2000, London heart and soul also knows as the Millennium Wheel. In the first stratum of operation, number of visitors approximately was 3.2 millions, hence this becomes more popular of attracting visitors in the United Kingdom. The production exist of the London Eye is 75 million pounds and took 50 percent of time less than normal to finish the project (Marks Barfield, 2014). This makes London Eye i s one of the most interested project to measure and examined in the process of project management.A project must have three variables that can estimate certain time of the project, limited by budget and meet quality requirement (Lester, 2007). Characteristics in process of construction London Eye can be evaluated as the project, because of the constrains from budget and time, no repetition of construction, requirement of a variety of skill and experience expertise take on. From all of these characteristics summarize that the London Eye is classify as a project. The mountain range of this paper study is to investigate two aspects, which are stakeholders management, project planning and scheduling that make London Eye become a successful project. However, it is essentially that we have to visualize the background of the project first, in order to understand the process.London Eyes CharacteristicsSince 2000, the London Eye has become one of the iconic landmarks of London. The conce pt of London Eyes was introduced in 1993 by the architecture name Marks Barfield. His design of Ferris wheel submitted to the Architecture Foundation competition in order to build to celebrate the millennium year. In 1994, British airlines interest to become a sponsor of the project. In 1996, the permission of the project was successfully made by the agreement of shareholders as the result, Tussauds separate was joined as the last partner. The London Eye was constructed before the year 2000 only 16 months (The British Broadcasting Corporation, 2005). More that 5 different oversea companies worked to build London Eyes and it took 7 years till it was open. The formal opening ceremony on 31, December 1991 and bind by public open on 9, March 2000.The Iron TriangleFigure1 Iron triangle of London Eye projectThe Iron Triangle is the traditional technique for evaluating project performance, which have three variables time, make up and scope that try to balance each others (Atkinson, 19 99 Gardiner and Stewart, 2000). If one of the three variables is changed, it will affect one of the others too. For example if stakeholders want less time of construction, they need to increase the budget or reduce the scope (Gregory, 2006). In (Figure1) shows The Iron Triangle of London Eye project look on by time, cost and scope. The London Eye used only 16 months in order to finish the construction process, in order to celebrate millennium century, that is 50 percent less than normal process.The cost of construction of London Eye was 75 million pounds higher than average cost of normal construction. But the cost of make was not issued to be a problem because the main purpose of this is to open on time and to be the biggest Ferris wheel in the world (London Eye, 2014). To understand the key elements of project management, much(prenominal) as stakeholders management, project planning and scheduling which are the factors to push the London Eye finished on time. The Author will i llustrate and explain two of variables in further.Stakeholders ManagementAccording to, Freeman and Reed (1983) has given a definition of stakeholder is someone that can affect the achievement of an organizations objectives or is affected by the achievement of an organizations objectives. Bourne and carriage (2004) suggest that even a project manager was able to deliver the project with the original scope, cost and time, but without the attention of stockholders, a project might probably not be able to success. The infringe in stakeholders must be managed, because it might lead to projects fail (Bourne and Walker, 2005). A stakeholder can be any individual, institution or organization that involves the interaction with the project or business. The stakeholder might effect from project, both direct and indirect, and can be occasional or ordinary contact with the project (Paul, 2013).Identify who are the stakeholders and understand the role of them must be done. London Eye project ha ve many stakeholders who are place in the project. But the key stakeholders of the project, who have the potential to support and facilitate the project can clearly locate. David Marks and Julia Barfield, who invented the idea of the wheel in 1990 were a press campaign to support the concept. Bob Ayling, pass Executive of British Airway in that period offered financial and corporate support to this project. In 1997, Tussauds Group was brought into the position of the operator. The London Eye Company Limited, were owned by three owner separate in equal shard. David Marks and Julia Barfield owned one third, The Tussauds Group also owned one third and in the end one third owned by British Airways, who was the leading support during the development phase. Government didnt support the project, except the construction of new pier, in purpose to protect collision of the wheel. For financing purpose of the London Eye project was provided by Sumitomo Bank and Westdeutsche Landesbank (Ti m and Ian, 2000).Mace is the UKs leading company on the project management, as appointed to be Project Managers in 1998. Seven groups of contractors were chosen to project, they were responsible for make and design as follows Tilbury Douglas Construction Ltd for Foundations, Civil works and Pier structure, Hollandia BV for Wheel Structure, Pomagalski SA for Capsules and Controls, T Clarke PLC for Electrical Installations, Littlehampton weld Limited for Boarding Platform and Pier Finishes, Waterers Landscape PLC for Landscaping and Alandale Construction Limited for County Hall Fit-Out (Tim and Ian, 2000).From this we can identify stakeholder as two types internal stakeholders and external stakeholders. Internal stakeholder can be people who involve in part of the business for example shareholders, managers and employees. External stakeholders are the people who outside the business such(prenominal) as nodes, local community, suppliers, press and government (The British Broadcasting Corporation, 2014).Figure2 Stakeholders Web and Internal External StakeholderFrom the figure2 above, tec attempt to explain the understanding of the internal and external stakeholders of The London Eye by using The Stakeholder Web describe. From internal stakeholders, Shareholders can be British Airways, David Marks Julia Barfield and Tussaudes Group that interested in dividends and growth of shares. Managers and employees are interested in salaries and job security. From external stakeholders, suppliers concerned in delivering services and finished project on time. Government, Tourists, Londoner and also including people around the South Bank area are impacted from the project such as the project might personal effects to new businesses that can take benefits from London Eye such as bars and restaurants. Traffic around the London Eye maybe wreakd because increasing of tourists. All of these influencers can become stakeholders of the project.Stakeholders have different of intere sts, to manage this conflict its necessary to understand the types of stakeholders and what can influence their behavior. By classifying the different groups of stakeholders, using stakeholder big businessman and interest matrix, to organize based on the level of force and interest. Stakeholder classification of power and interest matrix map will make groups of stakeholders easier to understand. Stakeholders can be classified in two big dimensions, of power and interest (Newcombe, 2003 Johnson and Scholes, 1993). The basic concept is who have high power and high interest will be the key players and also need to manage it.Figure3 London Eye stakeholder power and interest matrixFrom the figure 3 shows that London Eye project stakeholders were classified by level of interest and power. The key players in this case can be British Airway who is back up the financial and able to control the project. Bank and financial institutions such as Sumitomo Bank and Westdeutsche Landesbank, that provided financial loan. exhort and local community didnt have power, but the project directly effects to their living or career. Same as the government, they didnt provide the financial support but able to collect taxes from the project. Customers and Londoner can be in the group of minimal effort.The success of The London Eye project definitely convoluted with the stakeholder management. The well understanding in position and its roll are significant to make this project completed. However, it is not only stakeholder management, variable that leads to the success of the project. Many factors that involved included planning and scheduling of the project also are the alpha variables.Project Planning and SchedulingProject management planning is one of the important variables that required lists of time, quality and cost. Project management planning depends on types and sizes of project (Lester, 2007). The role of project management can separate into three main areas 1) It can han dle the operational requirement to meet the customer satisfaction, 2) The project must be completed on time and 3) Control and delivery the job on the previous set of constrains budget. Good project planning will lead to success according to these three goals. For more understanding of London Eye planning, researchers will apply Work Breakdown Structure (WBS) is the technique for controlling and planning project. Secondly Gantt chart technique will also use to explain in this project.The Work Breakdown Structure (WBS)To organize the structure of the project, Work Breaking Structure assists the work process. It is uniform to the outline of the book or report. WBS is the brief version of work structure that help to perform and focus on plan, track and evaluate of the project (Gregory, 2006).According to the diagram, it consists of three benefits of using WBS, First, WBS are easier to evaluate the cost and time of work. Second, it is easy to break down the work into the small tasks an d makes it easier to measure the progress. Third, it eases the separation of the tasks into the group member. besides, WBS contains two kinds of tasks the summary tasks and the work packages. Summer tasks will describe each of the processes in the project, for the work packages describe as the lowest level task that required details to complete.From the figure4 shows The London Eyes Work Breakdown Structure. WBS identifies the work that should be done, based on researchers understanding and assuming. The summary tasks can be divided up to four main tasks safety, stakeholders (internal and external), sensual and organizational. Moreover there are more subordinate level breakdown into each main tasks. For example, in physical tasks and the construction of wheel, capsules and foundation can be described as the lower level task of each level.The Gantt chartThe Gantt chart was developed during the World War I invented by Henry Laurence Gantt. The Gantt chart uses to identify the neces sary steps to obtain a result of work. The process of doing Gantt chart is worked by projecting schedule, follow step by step, from the final result, analyst activities, timing of process and sequence of tasks (Gregory, 2006). The chart can used to compare the estimated time of the project before, start with initial time on the actual time that actually spent. Furthermore, Gantt chart can apply to every project, both in big project and small project. For example, building a factory, making a cup of glass or producing a musical.Figure5 London Eyes Gantt chartFrom the figure5 shows The London Eyes Gantt chart. The researcher is using information from the previous research and gettable documents to create this Gantt chart (The British Broadcasting Corporation, 2005 Tim and Ian, 2000). From this chart can see that London Eye project used approximately 7 years of planning, finding sponsors, get permits and construction. The London Eye can be estimated as the long project in-term of pla nning, but comparing to the time on construction is apparently very short compared to this kind of the project.Conclusion of the projectThe London Eye is one of the most successful projects in many aspects. Its also one of the most successful in architect design of twenty-first century. The components of London Eye must be assembled above The Thames River that required high technology to handle the project.The original plan of London Eye was planned to be completed the construction in 2 years, but in, finally it used only 16 months to finish the project. If according to, The Iron Triangle theory utter that if one of the three variables was changed, it will affect one of the others too. London was used the budget around 75 million pounds to build, but the projects time construction is faster than expected and the scope has not changed. Unfortunately, components of London Eyes have to ship up and assemble in the Thames River this made it harder to deliver projects on time (Tim and Ia n, 2000).The London Eye is not the ordinary project for both suppliers and project management team. To be able to finish on deadline, all around the prost have to be given to everyone who was a part in this project. Shareholders and investors of the project must spend huge money in order to justify hazard of the project. For example, if poor quality and not finished on time happened, this implies that the cost of the project may not be the first priority of concern. Therefore, the time and scope or quality must be the first and second priority of the scope in the project.Mace construction that was controlling the project management team of London Eye should be accredited for the achievement and deliver project before deadline. But if they can decrease time for searching operators and suppliers, it could save the cost of the production because time of construction can reduce cost of production.From the stakeholder management perspectives, it illustrates the conflict of interest in s hareholders, as the factor of Time had become a conflict among them. However, British Airway as a big shareholder that support financial fund during the construction had burden the high cost of production and risk. But in terms of marketing, British Airway can promote and impose the branding under the sponsorship deal. British Airway also improves brand ascertain by using London Eye as the presenter of their brand.Recommendation of the projectResearcher found that from this paper, it helps to understand theories and concept of project management, which make it easier to manage and deal with the project. The fundamentals of controlling cost, deliver on time and satisfaction in quality are significantly important. Not only the stakeholder management and project planning and scheduling will lead to the success of the project. But risk management, uncertainty management, resource management, scope management and other management aspects should be concerned as part of the success factor s in project management. Other aspects of business should be considered as important as project management such as financial, human resource management and costumer relationship management.The London Eye project was won over 25 awards for engineering tourism, innovation and design including 2003 Queens Award for Enterprise Innovation Furthermore, the project can make huge profits from the first few months of opening and had recovered the cost (London Eye, 2014). From this show that minimize cost is not always important for business but deliver customer lookout and requirement sometime is more important. The main problem of this project is about lack of managing for future that effects to cost which increases more that it should be. The project manager should concern this point because when one varies in cost, time and quality of project, it will always affect one the others as a whole.1

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.