Wednesday, June 5, 2019
Cells Breaks the Torââ¬â¢s Anonymity: Onion Router
Cells Breaks the Tors Anonymity Onion RouterMs. S.SIVARANJANIMs. R.BACKIYALAKSHMI B.E, M.Tech.,Abstract To hide the communication of substance abusers, the anonymity systems pack the application data into equal sizingd stalls. The size of IP parcels in the Tor network potty be very dynamic and the IP layer may be repack cubicles. A new carrell- find attack against Tor allows the assailant to confirm unidentified communication relation venture among users very quickly. By varying the tour of cadreular ph unrivalleds in the keister affair at the malicious plump onion plant plant router, the aggressor laughingstock embed a reclusivee subscribeize into vicissitude of cellular ph wiz counter of the target traffic and it pass on be carried and arrive at the malicious entry onion router. whence an accomplice of the attacker pull up stakes detect the mansion based on certain cells and confirm the communication among the users. in that location argon several featu res of this attack. First, it is broad(prenominal)ly efficient and confirms very brusque communication session with only tens of cells. Second, this attack is effective and detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very fractious for h anest participants to detect.Keywords Anonymity, cell counting, mix networks, sign up, Tor.INTRODUCTIONAnonymity has become a necessary and legitimate aim in many applications. Here the encryption al champion so-and-sonot maintain the anonymity required by users. Generally speaking, mix techniques erect be used for either message-based or flow-based anonymity applications. Research on flow-based anonymity applications has recently received great attention in order to preserve anonymity in low-latency applications, including Web browsing and peer-to-peer file sharing.To degrade the anonymity service provided by anonymous communication systems, tra ffic analysis attacks deem been used. The Existing traffic analysis attacks can be categorized into two types passive traffic analysis and sprightly watermarking techniques. The active watermarking technique has recently received much attention to improve the accuracy of attack. In this technique is to actively introduce special symptoms into the senders outbound traffic with the intention of recognizing the embedded signal at the receivers inbound traffic.The core contribution of the paper is a new cell counting based attack against Tor network. This attack confirms anonymous communication relationship among users accurately and quickly and it is difficult to detect.The attacker at the exit onion router detects the data transmitted to a ending and then(prenominal) determines whether the data is relay cell or control cell in Tor. After excluding control cells, manipulate the number of relay cells in the turn queue and flushes out all cells in the circuit queue. This way the at tacker can embed a signal into the variation of cell count during a shortly period in the target traffic. To rec everywhere the embedded signal, the attacker at the entry onion router detects and excludes the control cells, understand the number of relay cells in the circuit queue and recover the embedded signal.The main features of cell-counting based attack argon (1) This attack is highly efficient and can quickly confirm very short anonymous communication sessions with tens of cells. (2) It is effective and detection rate approaches 100 % with very low false positive rate. (3) It prepares difficult for others to detect the presence of the embedded signal. The Time hopping based signal embedding technique makes the attack regular(a) harder to detect.SYSTEM ARCHITECUREThere are two types of cells Control cell and Relay cell. The CELL_CREATE or CELL_CREATED used for setting up a new circuit. CELL_DESTROY used for releasing a circuit. Relay cell is used to carry transmission con trol protocol pour data from client to bob. Some of the relay commands are put across_COMMAND_BEGIN, RELAY_COMMAND_END, RELAY_COMMAND_ DATA, RELAY_COMMAND_SENDME, and RELAY_ COMMAND_DROP.The Onion router (OR) maintains the TLS association to other OR. Onion proxy (OP) uses source routing and chooses several ORs from cached directory. OP establishes circuit crosswise the Tor network and negotiates a symmetric disclose with from for each one one OR, one hop at a duration, as well as postponement TCP stream from client application. The OR on other side of circuit connects to the requested destination and relay the data.The OP will sets up TLS partnership with OR1 using protocol, through this connection , OP sends CELL_CREATE cell and uses Diffie-Hellman (DH) handshake protocol to negotiate a base key k1=gxy with OR1. Form this key a forward symmetric key kf1 and backward key kb1 are produced. This way first hop circuit C1 is created. Similarly OP extends the circuit to second and third hop. After circuit is setup, OP sends a RELAY_COMMAND_BEGIN cell to the exit onion router and cell is encrypted as Beginkf3kf2kf1. While the cell traverses through circuit each time the layer of onion skin are removed one by one. At last the OR3 last skin is removed by decryption then it open a TCP stream to a mien at the destination IP, which belongs to bob. The OR3 sets up a TCP connection with bob and sends a RELAY_COMMAND_CONNECTED cell back to Alices OP. Then the client can download the file.PROCESSING CELL AT ONION ROUTERThe TCP data is received by OR from port A and it is processed by TCP and TLS protocols. Then the processed data is delivered to the TLS pilot film. The read compositors case is called to read and process the data pending in the TLS buffer. This read burden will get out the data from TLS buffer into the input buffer. Then the read event process cells from input buffer one by one. Each OR has routing table which maintains map from source connect ion and circuit ID to destination connection and circuit ID.The transmission direction of the cell can be determined by the read event. To append the cell to the destination circuit the corresponding symmetric key is used to decrypt / encrypt the payload of the cell, replace the present circuit ID with destination circuit ID. The cell can be written directly for the destination connection if there is no data waiting in output buffer and the write event is added to the event queue. After calling the write event, the data is flushed to TLS buffer of destination. Then write event pull as many cells as possible from circuit to output buffer and add write event to event queue. The next write event carry on flushing data to output buffer and pull cells to output buffer else the cell queued in circuit queue can be delivered to network via port B by calling write event twice.Fig. 2Processing the cells at Onion routerCELL COUNTING BASED ATTACKThe IP packets in Tor network is very dynamic an d based on this the cell counting based attack implemented.Dynamic IP packets over Tor The application data will be packed into equal sized cells (512-B). While the packets transmitted over the Tor network it is dynamic. Because of this tenableness the size of packets from sender to receiver is random over time and large numbers of packets prepare vary in sizes. The main reason for this is the varied performance of OR cause cells not to be promptly processed and also if network is congested, cells will not delivered on time, because of this the cell will merge and non-MTU(Maximum Transmission Unit) sized packets will show up.Work-flow of Cell Counting based attack trample 1 SELECTING THE TARGET - The attacker log the nurture at the exit OR, including the server host IP address and port for a circuit and circuit ID and uses CELL RELAY-DATA to transmit the data stream.Step 2 ENCODING THE SIGNAL - Until the write event is called the CELL RELAY DATA will be waited in the circu it queue. After the write event is called then the cells are flushed into output buffer. Hence the attacker can manipulate the number of cells flushed to the output buffer all together. This way the attacker can able to embed the secret signal. To encode bit 1, the attacker can flushes ternary cells from circuit queue and for bit 0, flushes one cell from circuit queue.Step 3 RECORDING PACKETS - After the signal is embedded in the target traffic it will be transmitted to the entry OR along with target traffic. The attacker at the entry OR will record the received cells and related information and need to determine whether the received cells are CELL RELAY DATA cells.Step 4 RECOGNIZING THE EMBEDDED SIGNAL - The attacker enters the phase of recognizing the embedded signal with the recorded cells. For this used the recovery mechanisms. Once the original signal is identified the attacker can link the communication between Alice and Bob.There are two critical issues related to attack ( 1) Encoding signals at exit OR Two cells are not plenty to encode 1 bit. Because if the attacker uses two cells to encode bit 1 then it will be easily misshapen over network and also hard to recover. When the two cells arrive at the input buffer at the middle OR, the first cell will be pulled into circuit queue and then if the output buffer is empty, the first cell will be flushed into it. Then the second cell will be pulled to the circuit queue. Since the output buffer is not empty, the second cell stays in the circuit queue. When the write event is called, the first cell will be delivered to the network, while the second cell written to the output buffer and wait for the next write event. Consequently, two originally combined cells will be split into two breach cells at the middle router. So the attacker at the entry OR will observe two separate cells arriving at the circuit queue. This cells will be decoded as two 0 bits, leading the attacker to a wrong detection of the signal. To report with this issue the attacker should choose at least three cells for carrying bit 1.For transmitting cells, proper delay legal separation should be selected If the delay interval among the cells is too large, users are not able to tolerate the slow traffic and to transmit the data will choose another circuit. When this condition happens the attack will fail. And if the delay interval is too small, then it will increase the chance that cells may combined at middle OR.(2) Decoding signals at the entry OR Distortion of signal Anyway the combination and department of the cells will happen due to unpredictable network delay and congestion. This will cause the embedded signal to be distorted and the probability of recognizing the embedded signal will be reduced. Because of this distortion of the signal, a recovery mechanism can be used, that recognize the embedded signal.The combination and division of cell can be categorized into four types (1) Two types of the cell division for the unit of the signal and (2) Two types of the cell combination for distinct units of signal. To deal with these types of division and combination types of the cells the recovery algorithm can be used. If the number of cells recorded in the circuit queue is smaller than the number of the original signal are recovered as either two types of cell division for the unit of the signal. Suppose the number of cells recorded in the circuit queue is big than the number of cells for carrying the signal the recovered signal will be either two of the cell combination for different units of signal. When the signals are recovered in these types with k 2, can consider that these signals are successfully identified otherwise cannot be identified.Attack Delectability To improve the attack invisibility can adopt the time-hopping-based signal embedding technique, which can reduce the probability of interception and recognition. The principle of this technique is, there exit random intervals b etween signal bits. At the exit OR, the duration of those intervals are varied according to a pseudorandom control code which is known to only the attackers. To recover this signal, the attacker at the entry OR can use the same secret control code to repose the signal bits and recover the whole signal. If the interval between the bits is large enough, the inserted signal bits appear sparse within the target traffic and it is difficult to determine whether groups of cells are caused by network dynamics or intention. Therefore the secret signal embedded into the target traffic is no different than the noise. And when a malicious entry node has confirmed the communication relationship, it can separate the group of cells by adding delay between the cells so that not even the client can observe the embedded signal. In this paper a signal is embedded into the target traffic, which implies a secrete sequence of groups of one and three cells. With the time-hopping technique, groups of one and three cells are separated by random intervals and it is hard to differentiate them from those caused by network dynamics and since the embedded signal is very short and only known to attacker, can conclude that it is very difficult to distinguish traffic with embedded signals from normal traffic based on this very short secret sequence of cell groups.CONCLUSION AND FUTURE WORKIn this paper, we presented a cell-counting based attack against Tor network. This can confirm the anonymous communication among the user quickly and accurately and it is very difficult to detect. The attacker at the exit OR manipulates the transmission of cells from the target TCP stream and embeds a secret signal into the cell counter variation of the TCP stream. Then the attacker at the entry OR recognizes the embedded signal using developed recovery algorithms and associate the communication relationship among the users. In this attack the detection rate is monotonously increasing function with the del ay interval and decreasing function of the variance of one way transmission delay along a circuit. This attack could drastically and quickly degrade the anonymity service that Tor provides. Due to the fundamental fig of the Tor network, fend for against this attack remains a very challenging task that we will investigate in future work.REFERENCES1 W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, DSSS-based ow marking technique for invisible traceback, in Proc. IEEE SP,May 2007, pp. 1832.2 N. B. Amir Houmansadr and N. Kiyavash, RAINBOW A robust and invisible non-blind watermark for network ows, in Proc.16thNDSS, Feb. 2009, pp. 113.3 V. Shmatikov and M.-H. Wang, Timing analysis in low-latency MIX networks Attacks and defenses, in Proc. ESORICS, 2006, pp. 1831.4 V. Fusenig, E. Staab, U. Sorger, and T. Engel, Slotted packet counting attacks on anonymity protocols, in Proc. AISC, 2009, pp. 5360.5 X. Wang, S. Chen, and S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the internet , in Proc. 12th ACM CCS, Nov. 2005, pp.8191.6 K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, Low preference routing attacks against anonymous systems, Univ. Colorado Boulder, Boulder, CO, Tech. Rep., Aug. 2007.7 X. Fu, Z. Ling, J. Luo, W. Yu, W. Jia, and W. Zhao, One cell is enough to break Tors anonymity, in Proc. Black Hat DC,Feb.2009Online. Available http//www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf8 R. Dingledine, N. Mathewson, and P. Syverson, Tor Anonymity online, 2008 Online. Available http//tor.eff.org/index.html.en9 R. Dingledine and N. Mathewson, Tor protocol specication,2008 Online. Available https//gitweb.tor mould.org/torspec.git?a=blob_plainhb=HEADf=tor-spec.txt10 J. Reardon, better Tor using a TCP-over-DTLS tunnel, Masters thesis, University of Waterloo, Waterloo, ON, Canada, Sep. 2008.Project heed example The capital of the United Kingdom midsectionProject concern example The London heart and soul debutGeneral ly, the definitions of roam management have diversities, but in commonly reckon management is used to accomplish concern ambition, strategies and well-defined work tasks within a certain schedule and limit budget (Sabin, 2006). The objectify management required skill, experience, processes, methods and knowledge in order to complete the objectives of the project (Association for Project Management, 2014). Most strategists win in these days with high competitive and fusing global economy are mostly using the project management techniques to deliver substantial reference of business results within limited time and budget (Project Management Institute, 2014). Jamieson Morris (2004) support that project management is a key factor in business process. Even in many definitions of project management, the fundamental is about attaining the jobs done.The London Eye is the huge project that was designed by architectures David Marks and Julia Barfield, its theatrical role to represent modern architectural design and engineering of the first of the millennium century (Tim and Ian, 2000). The London eye was the tallest Ferris wheel in the world by height 135 meters, after success, with have of Nanchang in 2006, Singapore Flyer in 2008 and High Roller in 2014 in order. The construction of London Eye used 16 months to shade in order to celebrated of the year 2000, London Eye also knows as the Millennium Wheel. In the first year of operation, number of visitors approximately was 3.2 millions, hence this becomes more than popular of attracting visitors in the United Kingdom. The production cost of the London Eye is 75 million pounds and took 50 percent of time less than normal to finish the project (Marks Barfield, 2014). This makes London Eye is one of the most occupyed project to measure and examined in the process of project management.A project must have three variables that can estimate certain time of the project, limited by budget and light upon quality req uirement (Lester, 2007). Characteristics in process of construction London Eye can be evaluated as the project, because of the constrains from budget and time, no repetition of construction, requirement of a variety of skill and experience expertise involve. From all of these characteristics summarize that the London Eye is classified as a project. The stove of this paper study is to investigate two aspects, which are stakeholders management, project planning and programing that make London Eye become a successful project. However, it is essentially that we have to understand the background of the project first, in order to understand the process.London Eyes CharacteristicsSince 2000, the London Eye has become one of the iconic landmarks of London. The concept of London Eyes was introduced in 1993 by the architecture name Marks Barfield. His design of Ferris wheel submitted to the Architecture Foundation competition in order to build to celebrate the millennium year. In 1994, Bri tish airline businesss interest to become a keep going of the project. In 1996, the permission of the project was successfully made by the agreement of shareholders as the result, Tussauds Group was joined as the last partner. The London Eye was constructed beforehand the year 2000 only 16 months (The British Broadcasting Corporation, 2005). More that 5 different oversea companies worked to build London Eyes and it took 7 age gutter it was open. The formal opening ceremony on 31, December 1991 and follow by public open on 9, March 2000.The Iron TriangleFigure1 Iron trilateral of London Eye projectThe Iron Triangle is the traditional technique for evaluating project performance, which have three variables time, cost and scope that try to balance each others (Atkinson, 1999 Gardiner and Stewart, 2000). If one of the three variables is changed, it will affect one of the others too. For example if stakeholders want less time of construction, they need to increase the budget or red uce the scope (Gregory, 2006). In (Figure1) shows The Iron Triangle of London Eye project follow by time, cost and scope. The London Eye used only 16 months in order to finish the construction process, in order to celebrate millennium century, that is 50 percent less than normal process.The cost of construction of London Eye was 75 million pounds higher than average cost of normal construction. solely the cost of building was not issued to be a problem because the main purpose of this is to open on time and to be the biggest Ferris wheel in the world (London Eye, 2014). To understand the key elements of project management, such as stakeholders management, project planning and scheduling which are the factors to push the London Eye finished on time. The Author will illustrate and explain two of variables in further.Stakeholders ManagementAccording to, freewoman and Reed (1983) has given a definition of stakeholder is someone that can affect the achievement of an organizations objecti ves or is affected by the achievement of an organizations objectives. verge and Walker (2004) suggest that even a project theatre director was able to deliver the project with the original scope, cost and time, but without the attention of stockholders, a project might probably not be able to success. The conflict in stakeholders must be managed, because it might lead to projects fail (Bourne and Walker, 2005). A stakeholder can be any individual, institution or organization that involves the interaction with the project or business. The stakeholder might effect from project, both direct and indirect, and can be occasional or ordinary contact with the project (Paul, 2013).Identify who are the stakeholders and understand the role of them must be done. London Eye project have many stakeholders who are investing in the project. But the key stakeholders of the project, who have the potential to support and facilitate the project can clearly identify. David Marks and Julia Barfield, wh o invented the idea of the wheel in 1990 were a press campaign to support the concept. Bob Ayling, Chief Executive of British Airway in that period offered monetary and corporate support to this project. In 1997, Tussauds Group was brought into the position of the operator. The London Eye Company Limited, were owned by three owner separate in equal shard. David Marks and Julia Barfield owned one third, The Tussauds Group also owned one third and lastly one third owned by British Airways, who was the leading support during the development phase. politics didnt support the project, except the construction of new pier, in purpose to protect collision of the wheel. For financing purpose of the London Eye project was provided by Sumitomo Bank and Westdeutsche Landesbank (Tim and Ian, 2000).Mace is the UKs leading company on the project management, as appointed to be Project Managers in 1998. Seven groups of contractors were chosen to project, they were creditworthy for building and des ign as follows Tilbury Douglas Construction Ltd for Foundations, Civil works and loading dock structure, Hollandia BV for Wheel organise, Pomagalski SA for Capsules and Controls, T Clarke PLC for Electrical Installations, Littlehampton Welding Limited for Boarding Platform and Pier Finishes, Waterers Landscape PLC for Landscaping and Alandale Construction Limited for County Hall Fit-Out (Tim and Ian, 2000).From this we can identify stakeholder as two types internal stakeholders and extraneous stakeholders. Internal stakeholder can be wad who involve in part of the business for example shareholders, managers and employees. External stakeholders are the people who outside the business such as clients, local community, suppliers, press and presidential term (The British Broadcasting Corporation, 2014).Figure2 Stakeholders Web and Internal External StakeholderFrom the inscribe2 above, enquiryer attempt to explain the understanding of the internal and external stakeholders of The Lo ndon Eye by using The Stakeholder Web describe. From internal stakeholders, Shareholders can be British Airways, David Marks Julia Barfield and Tussaudes Group that interested in dividends and growth of shares. Managers and employees are interested in salaries and job security. From external stakeholders, suppliers concerned in delivering services and finished project on time. Government, Tourists, Londoner and also including people approximately the South Bank area are impacted from the project such as the project might effects to new businesses that can take benefits from London Eye such as bars and restaurants. Traffic near the London Eye maybe influenced because increasing of tourists. All of these influencers can become stakeholders of the project.Stakeholders have different of interests, to manage this conflict its necessary to understand the types of stakeholders and what can influence their behavior. By classifying the different groups of stakeholders, using stakeholder p ower and interest matrix, to work based on the level of power and interest. Stakeholder classification of power and interest matrix map will make groups of stakeholders easier to understand. Stakeholders can be classified in two big dimensions, of power and interest (Newcombe, 2003 Johnson and Scholes, 1993). The basic concept is who have high power and high interest will be the key players and also need to manage it.Figure3 London Eye stakeholder power and interest matrixFrom the figure 3 shows that London Eye project stakeholders were classified by level of interest and power. The key players in this case can be British Airway who is supporting the financial and able to control the project. Bank and financial institutions such as Sumitomo Bank and Westdeutsche Landesbank, that provided financial loan. Press and local community didnt have power, but the project directly effects to their living or career. Same as the government, they didnt provide the financial support but able to salt away taxes from the project. Customers and Londoner can be in the group of minimal effort.The success of The London Eye project definitely involved with the stakeholder management. The well understanding in position and its roll are significant to make this project completed. However, it is not only stakeholder management, variable that leads to the success of the project. Many factors that involved included planning and scheduling of the project also are the important variables.Project Planning and SchedulingProject management planning is one of the important variables that required lists of time, quality and cost. Project management planning depends on types and sizes of project (Lester, 2007). The role of project management can separate into three main areas 1) It can handle the operational requirement to meet the customer satisfaction, 2) The project must be completed on time and 3) Control and delivery the job on the previous set of constrains budget. Good project planni ng will lead to success according to these three goals. For more understanding of London Eye planning, researchers will apply Work Breakdown Structure (west by south) is the technique for controlling and planning project. Secondly Gantt map technique will also use to explain in this project.The Work Breakdown Structure (WBS)To organize the structure of the project, Work Breaking Structure assists the work process. It is similar to the outline of the book or report. WBS is the brief version of work structure that sponsor to perform and focus on plan, track and evaluate of the project (Gregory, 2006).According to the diagram, it consists of three benefits of using WBS, First, WBS are easier to evaluate the cost and time of work. Second, it is user-friendly to break down the work into the small tasks and makes it easier to measure the progress. Third, it eases the separation of the tasks into the team member. Moreover, WBS contains two kinds of tasks the summary tasks and the work p ackages. Summer tasks will describe each of the processes in the project, for the work packages describe as the lowest level task that required details to complete.From the figure4 shows The London Eyes Work Breakdown Structure. WBS identifies the work that should be done, based on researchers understanding and assuming. The summary tasks can be divided up to four main tasks safety, stakeholders (internal and external), somatic and organizational. Moreover there are more subordinate level breakdown into each main tasks. For example, in physical tasks and the construction of wheel, capsules and foundation can be described as the lower level task of each level.The Gantt chartThe Gantt chart was developed during the World War I invented by Henry Laurence Gantt. The Gantt chart uses to identify the necessary steps to obtain a result of work. The process of doing Gantt chart is worked by projecting schedule, follow step by step, from the final result, analyst activities, timing of proc ess and sequence of tasks (Gregory, 2006). The chart can used to compare the estimated time of the project before, start with initial time on the actual time that really spent. Furthermore, Gantt chart can apply to every project, both in big project and small project. For example, building a factory, making a cup of glass or producing a musical.Figure5 London Eyes Gantt chartFrom the figure5 shows The London Eyes Gantt chart. The researcher is using information from the previous research and available documents to create this Gantt chart (The British Broadcasting Corporation, 2005 Tim and Ian, 2000). From this chart can see that London Eye project used approximately 7 years of planning, finding sponsors, get permits and construction. The London Eye can be estimated as the long project in-term of planning, but comparing to the time on construction is plainly very short compared to this kind of the project.Conclusion of the projectThe London Eye is one of the most successful project s in many aspects. Its also one of the most successful in architect design of 21st century. The components of London Eye must be assembled above The Thames River that required high technology to handle the project.The original plan of London Eye was planned to be completed the construction in 2 years, but in, finally it used only 16 months to finish the project. If according to, The Iron Triangle theory said that if one of the three variables was changed, it will affect one of the others too. London was used the budget around 75 million pounds to build, but the projects time construction is faster than expected and the scope has not changed. Unfortunately, components of London Eyes have to ship up and assemble in the Thames River this made it harder to deliver projects on time (Tim and Ian, 2000).The London Eye is not the ordinary project for both suppliers and project management team. To be able to finish on deadline, all around the prost have to be given to everyone who was a part in this project. Shareholders and investors of the project must pass by huge money in order to justify risk of the project. For example, if poor quality and not finished on time happened, this implies that the cost of the project may not be the first priority of concern. Therefore, the time and scope or quality must be the first and second priority of the scope in the project.Mace construction that was controlling the project management team of London Eye should be accredited for the achievement and deliver project before deadline. But if they can decrease time for searching operators and suppliers, it could save the cost of the production because time of construction can reduce cost of production.From the stakeholder management perspectives, it illustrates the conflict of interest in shareholders, as the factor of Time had become a conflict among them. However, British Airway as a big shareholder that support financial fund during the construction had burden the high cost of prod uction and risk. But in terms of marketing, British Airway can promote and impose the stigmatisation under the sponsorship deal. British Airway also improves brand image by using London Eye as the presenter of their brand.Recommendation of the project researcher found that from this paper, it helps to understand theories and concept of project management, which make it easier to manage and deal with the project. The fundamentals of controlling cost, deliver on time and satisfaction in quality are significantly important. Not only the stakeholder management and project planning and scheduling will lead to the success of the project. But risk management, uncertainty management, resource management, scope management and other management aspects should be concerned as part of the success factors in project management. Other aspects of business should be considered as important as project management such as financial, human resource management and costumer relationship management.The Lon don Eye project was win over 25 awards for engineering tourism, innovation and design including 2003 Queens Award for Enterprise Innovation Furthermore, the project can make huge acquire from the first few months of opening and had recovered the cost (London Eye, 2014). From this show that minimize cost is not always important for business but deliver customer expectation and requirement sometime is more important. The main problem of this project is about lack of managing for future that effects to cost which increases more that it should be. The project manager should concern this point because when one varies in cost, time and quality of project, it will always affect one the others as a whole.1
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.