International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 1 – March 2015 Payroll Calculation with Innovative Methods using Cloud Nikhil Munj1, Madhuchaitanya Joshi 2, Amol Darvade 3 1,2,3 Student,Department of Computer Engineering, Sinhgad Academy of Engineering, Pune, Maharashtra, India Abstract— This is a paper is related to overall employee management and administration of a company at department level. The system is completely automated. The main purpose of this project is to lower the daily fill up work and on which organization spent several days for management by doing all these parallel on daily basis. The project is divided into two sides viz administration side and employee side . Administration side contains features like tracking all employees, employee management, job history database, event management, appraisal management, efficiency graph, proper communication between employee and management. The employee side contains current payroll system, request for leave, etc. for implementation of this project we are using different programming language. We are using asp.net as the front end programming language and SQL server express 2012 at back end. We are quite confident that our system will change the way how things happen in an organization . Key Words: Cloud computing, clustered index, employee tracking I. Introduction The management of the financial record of employee’s salaries and his/her wages, with bonuses, net pay, and deductions are the basic duties of an employer, regardless of the number of workers they employ, he must maintain all records pertaining to payroll taxes of any sort for at least four years after the tax becomes due or is paid, whichever is later. Altogether, The payroll program is run at a specific time, not only to calculate an employee’s basic monthly salary but also any special payments like overtime payments or bonuses that must be affected in which the amount work done plays a great role. Payroll Management system can help you avoid penalties for miscalculations by doing this work for you. The definition of a payroll is the total amount of money paid by a business to its employees over a certain amount of time. It is one of the most important areas of finance in any business. It usually consists of payroll accounting and payroll administration. Payroll accounting deals with the actual calculation of an employee's earnings, and then from that determining the amount withheld from the earnings for taxes and any other deductions. In this Improved System . Human Resource is the most vital resource for any organization. It provides various features to calculate the organizations pay management and employee management. It provides add employees details,view, delete and edit employee’s details with catching ISSN: 2231-5381 Graphical user interface design. In the pay roll management module in helps the manager to calculate the individual’s salary. There is no human interfere is required. Once the manager pus the salary and any deductions the pay slip generator automatically generates the employees pay slip by just clicking the button. The entire application is developed by Swings. This is one of the powerful technologies in java. This is helpful for creating cross platform facilities. And the back end for this project is My SQL server. This project can be run at any platforms and doesn’t require any additional software’s. I. MOTIVATION Our task was to develop a payroll system that would keep a record of employee data including their leaves, allowance, status and taxes and also to be calculate the pay of the employees taking into consideration employee data .We deploy our project on cloud and this the biggest task for us and it is also interesting job for us.We have been able to achieving these task.the software we are developing calculates the employee net pay from the deductions. The payslip can be printed out as reciept. Most of the bugs that wa have found and those that the clients and beta users found have been corrected and the software will be updated . A. Motivating Example In this paper, we use Tribehr,Orange hrm, a fictitious multicountry outsourced payroll provider as an example. Tribehr,Orange hrm offers a multi-tenant ―payroll on the cloud‖ service to small and mid-size companies to handle employee payroll and benefits. We chose this example because payroll is a commonly outsourced service and is a complex service to be delivered on the cloud from a provider perspective. Multi-country payroll service is a specialized service with several variations. Firstly, there are significant differences in tax computation rules, especially tax rates and tax slabs for different countries. Legal and regulatory compliance obligations also significantly vary across different geographies, e.g. maternity and paternity benefits in different countries. Regulatory obligations may also vary across industry sectors, impacting payroll. Secondly, companies can have different employee compensation schemes and company policies (e.g. car lease policy, personal loan policy), which have to be supported by the outsourced payroll provider. We http://www.ijettjournal.org Page 48 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 1 – March 2015 consider two use-cases that highlight variations in the payroll service offered by Tribehr,Orange hrm. UC#1: Run payroll for a multi-national company Consider a multinational company having employees across sales offices in New York and Singapore and manufacturing facilities in India and China. Tribehr,Orange hrm’s payroll service must now run employee payroll differently for four different countries considering variations in tax rates and slabs of these countries. Additionally, compliance to local laws and statutory regulations has to be ensured. Technically, apart from the variations in the payroll calculation procedure, even the payroll data needed by Tribehr, Orange hrm to process employee payroll can be different across country versions. UC#2: Direct Deposit of Employee Salary Some customers prefer direct deposit of salary to employee bank accounts rather than issuing pay cheques to employees. Tribehr,Orange hrm must support such variations in the payroll process. In case of direct deposit, the customer must additionally provide employee bank details to Tribehr,Orange hrm. We provide a simplified white-box view of the PAYROLLRUNSERVICE offered by Tribehr,Orange hrm showing both the abstract service interface and service provider implementation classes. Fig 1.a shows the service interface EmployeePayrollRunInterface with the request message data type (MDT) PayrollRunRequestMessage. Fig 1.b shows the service provider implementation, the PayrollProvider class with language specific data types. service variants using aspects, a simple join-point model for service interface and details about aspect weaving; section 3 deals with specifying tenant specific variations using aspects; section 4 discusses related work; section 5 provides future work and conclusions. II. Payroll Processing in the Cloud The scenario includes the experience in moving a payroll processing application to an Infrastructure (IaaS) Cloud. This application requires an Enterprise Java Bean (EJB) enabled application server as well as a relational (i.e. SQL supported) data store. An infrastructure Cloud is suitable for this type of installation since there is flexibility to control features from the hardware specifications and up. However, the tight requirement of being bound to an enterprise Java environment and also a relational data store makes this application being almost impossible to be ported to a platform based Cloud such as Google App engine or Microsoft Azure. This is disadvantage in a business perspective, for example, platform Clouds offer very competitive pricing for resources but it would not be possible to port the code without significant upfront investments.In a technical perspective, prominent Infrastructure Cloud providers have had catastrophic failures and hence it is essential to place fail-safes in different Clouds to improve availability. This is also not possible in this case without significant porting effort. These considerations are highlighted in the white paper as serious concerns in porting the application to different Clouds. A. Cloud based Logistics Management Application In this scenario, an application was built from scratch to automate a manual logistics control process for a medium sized business. The center piece of this application is the Cloud based global data store, exposed via services. Current data store is managed in the Google Bigtable a highly scalable, schema less, document-oriented (i.e.non relational) data store coupled with Google Appengine Cloud. The primary portability concern in this scenario is the dependence on the schema-less data store of which none of the other Clouds directly support. The service implementations depend on queries written in Google Query Language (GQL), a declarative language comparable to SQL, built with a different paradigm. This dependency dictates that when the data store is ported, the service implementations would also require transformations to the relevant query language. Fig 1.a: EmployeePayrollRunInterface B.Cloud Security Fig 1.b: PayrollProvider Implementation The remaining of the paper is organized as follows: section 2 describes the direction to support heavyweight ISSN: 2231-5381 What are the ―security‖ concerns that are preventing companies from taking advantage of the cloud? Numerous studies, for example IDC’s 2008 Cloud Services User Survey [29] of IT executives, cite security as the number one challenge for cloud users. http://www.ijettjournal.org Page 49 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 1 – March 2015 In this section we present a taxonomy of the ―security‖ concerns. The Cloud Security Alliance’s initial report [39] contains a different sort of taxonomy based on 15 different security domains and the processes that need to be followed in an overall cloud deploying process.We differentiate the security concerns into as: 1.Traditional security 2.Availability 3.Third-party data control 1.Traditional Security These concerns involve computer and network intrusions or attacks that will be made possible or at least easier by moving to the cloud. Cloud providers answer to these concerns by arguing that their security measures and processes are more mature and tested than those of the average company. Another argument, made by the is: "It could be easier to lock down information if it's administered by a third party , if companies are worried about insider threats… In addition, it may be easier to enforce security via contracts with online services providers than via internal controls." Concerns in this category include: TS1. VM-level attacks. Potential vulnerabilities in the hypervisor or VM technology used by cloud vendors are a potential problem in multi-tenant architectures. Vulnerabilities have appeared in VMWare , Xen , and Microsoft’s Virtual PC and Virtual Server [47]. Vendors such as Third Brigade [46] mitigate potential VM-level vulnerabilities through monitoring and firewalls. TS2. Cloud provider vulnerabilities. These could be platform-level, such as an SQLinjection or cross-site scripting vulnerability. For instance, there have been a couple of recent Google Docs vulnerabilities [26] and [40]. The Google response to one of them is here: [27].IBM has repositioned its Rational AppScan tool, which scans for vulnerabilities in web services as a cloud security service (see Blue Cloud Initiative [8]). TS6. Forensics in the cloud. This blog posting on the CLOIDIFIN [12] project summarizes the difficulty of cloud forensic investigations: ―Traditional digital forensic methodologies permit investigators to seize equipment and perform detailed analysis on the media and data recovered. More closely linked to a CC environment would be businesses that own and maintain their own multi-server type infrastructure, though this would be on a far smaller scale in comparison. However, the scale of the cloud and the rate at which data is overwritten is of concern.‖ IV.Availability These concerns center on critical applications and data being available. Well-publicized incidents of cloud outages include , Amazon S3 , and FlexiScale. A1. Uptime. As with the Traditional Security concerns, cloud providers argue that their server uptime compares well with the availability of the cloud user’s own data centers. Besides just services and applications being down, this includes the concern that a third-party cloud would not scale well enough to handle certain applications. SAP’s CEO said: ―There are certain things that you cannot run in the cloud because the cloud would collapIts hard to believe that any utility company is going to run its billing for 50 million consumers in the cloud.‖ (11/24/08, searchSAP.com) A2. Single point of failure. Cloud services are thought of as providing more availability, but perhaps not – there are more single points of failure and attack. A3. Assurance of computational integrity. Can an enterprise be assured that a cloud provider is faithfully running a hosted application and giving valid results? For example, Stanford's Folding@Home project gives the same task to multiple clients to reach a consensus on the correct result. 3.Third-party data control TS3. Phishing cloud provider. Phishers and other social engineers have a new attack vector, as the Salesforce phishing incident [37] shows. TS4. Expanded network attack surface. The cloud user must protect the infrastructure used to connect and interact with the cloud, a task complicated by the cloud being outside the firewall in many cases. For instance, [38] shows an example of how the cloud might attack the machine connecting to it. The legal implications of data and applications being held by a third party are complex and is difficult to understood. There is also a potential lack of control and transparency when a third party holds the data. Part of the hype of cloud computing is that the cloud can be implemented independently, but in reality regulatory compliance requires transparency in the cloud. All this is encouraging some companies to build private clouds to avoid these issues and yet retain some of the advantages of cloud. TS5. Authentication and Authorization. V.Conclusion The enterprise authentication and authorization framework does not naturally extend into the cloud. How does a company moulds its existing framework to include cloud resources? How does an enterprise adapt to cloud security data (if even available) with its own security metrics and policies? ISSN: 2231-5381 The outcomes of the review provided a compelling case to introduce a new solution for the delivery of transactional HR and Payroll activity; this case has been http://www.ijettjournal.org Page 50 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 1 – March 2015 strengthened by the knowledge that our current systems are unable to comply with emerging legislation. Even without taking into account anticipated savings in staff costs over time, a modern integrated system will cost c.£12k p.a. less in revenue than our current systems, which are no longer fit for purpose. Implementing a new system will bring a lots of benefits in terms of upgrading us with full automation, internal self-service and real-time management information, will provide a solution to future usage. V.Acknowledgement We would like to sincerely thank Prof. L. J. Sankpal, our guide from Sinhgad Academy of Engg. and Mr. Gangadhar. Botla, our mentor from First Insight Pvt. Ltd. for their support and encouragement. VI.References [1] M. Armbrust et al., ―Above the Clouds: A Berkeley View of Cloud computing‖, Technical Report No. UCB/EECS-200928, University of California at Berkley, 2009. [2] R. Bianchini and R. Rajamony, ―Power and energy management for server systems,‖ IEEE Computer, vol. 37, no. 11, pp. 68–74, 2004. [4] EPA Datacenter Report Congress, http://www. [5] V. Sharma, A. Thomas, T. Abdelzaher, and K. Skadron, ―Power-aware QoS Management in Web Servers‖, Proc. of the Real-Time Systems Symposium, 2003. ISSN: 2231-5381 [6] X. Wang and M. Chen, "Cluster-level feedback power control for performance optimization", Proc. of the IEEE 14th International Symposium on High Performance Computer Architecture, 2008. [7] A. Gandhi, M. Harchol-Balter, R. Das, and C. Lefurgy, "Optimal Power Allocation in Server Farms", Proc. of SIGMETRICS Conference on Measurement and Modeling of Computer Systems, 2009. [8] D. Meisner, B. T. Gold, and T. F. Wenisch, ―PowerNap: Eliminating Server Idle Power‖, Proc. of ASPLOS, 2009. [9] Y. Agarwal et al., ―Somniloquy: Augmenting Network Interfaces to Reduce PC Energy Usage‖, Proc. of NSDI, 2009. [10] V. Anagnostopoulou, S. Biswas, A. Savage, R. Bianchini, T. Yang, and F. T. Chong, ―Energy Conservation in Datacenters Through Cluster Memory Management and Barely-Alive Memory Servers", Proc. of the Workshop on Energy-Efficient Design, 2009. [11] K. Rajamani and C. Lefurgy, "On Evaluating RequestDistribution Schemes for Saving Energy in Server Clusters", Proc. of IEEE International Symposium on Performance Analysis of Systems and Software, 2003. [12] T. Heath, B. Diniz, E.V. Carrera, W. Meira Jr., and R. Bianchini, ―Energy Conservation in Heterogeneous Server Clusters‖, Proc. of the 10th Symp. on Principles and Practice of Parallel Programming, pp. 186-195, 2005. [13] S. Srikantaiah, A. Kansal, and F. Zhao, ―Energy Aware Consolidation for Cloud Computing‖, Proc. of the Workshop on Power-Aware Computing and Systems, 2008. [14] B. W. Wah, and M. L. Qian, ―Constrained formulations and algorithms for predicting stock prices by recurrent FIR neural networks‖, International Journal of Information Technology & Decision Making, Vol.5, No. 4 (2006), pp. 639-658. [15] B. G. Aslan, and M. M. Inceoglu, ―A Comparative Study on Neural Network based Soccer Result Prediction‖, Proc. of The Seventh International Conference on Intelligent Systems http://www.ijettjournal.org Page 51