Tuesday, August 6, 2019

Cells Breaks the Tor’s Anonymity: Onion Router

Cells Breaks the Tor’s Anonymity: Onion Router Ms. S.SIVARANJANI Ms. R.BACKIYALAKSHMI B.E, M.Tech., Abstract To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells. A new cell-counting attack against Tor allows the attacker to confirm anonymous communication relationship among users very quickly. By varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secrete signal into variation of cell counter of the target traffic and it will be carried and arrive at the malicious entry onion router. Then an accomplice of the attacker will detect the signal based on received cells and confirm the communication among the users. There are several features of this attack. First, it is highly efficient and confirms very short communication session with only tens of cells. Second, this attack is effective and detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect. Keywords Anonymity, cell counting, mix networks, signal, Tor. INTRODUCTION Anonymity has become a necessary and legitimate aim in many applications. Here the encryption alone cannot maintain the anonymity required by users. Generally speaking, mix techniques can be used for either message-based or flow-based anonymity applications. Research on flow-based anonymity applications has recently received great attention in order to preserve anonymity in low-latency applications, including Web browsing and peer-to-peer file sharing. To degrade the anonymity service provided by anonymous communication systems, traffic analysis attacks have been used. The Existing traffic analysis attacks can be categorized into two types: passive traffic analysis and active watermarking techniques. The active watermarking technique has recently received much attention to improve the accuracy of attack. In this technique is to actively introduce special signals into the sender’s outbound traffic with the intention of recognizing the embedded signal at the receiver’s inbound traffic. The core contribution of the paper is a new cell counting based attack against Tor network. This attack confirms anonymous communication relationship among users accurately and quickly and it is difficult to detect. The attacker at the exit onion router detects the data transmitted to a destination and then determines whether the data is relay cell or control cell in Tor. After excluding control cells, manipulate the number of relay cells in the circuit queue and flushes out all cells in the circuit queue. This way the attacker can embed a signal into the variation of cell count during a short period in the target traffic. To recover the embedded signal, the attacker at the entry onion router detects and excludes the control cells, record the number of relay cells in the circuit queue and recover the embedded signal. The main features of cell-counting based attack are: (1) This attack is highly efficient and can quickly confirm very short anonymous communication sessions with tens of cells. (2) It is effective and detection rate approaches 100 % with very low false positive rate. (3) It makes difficult for others to detect the presence of the embedded signal. The Time – hopping based signal embedding technique makes the attack even harder to detect. SYSTEM ARCHITECURE There are two types of cells: Control cell and Relay cell. The CELL_CREATE or CELL_CREATED used for setting up a new circuit. CELL_DESTROY used for releasing a circuit. Relay cell is used to carry TCP stream data from client to bob. Some of the relay commands are: RELAY_COMMAND_BEGIN, RELAY_COMMAND_END, RELAY_COMMAND_ DATA, RELAY_COMMAND_SENDME, and RELAY_ COMMAND_DROP. The Onion router (OR) maintains the TLS connection to other OR. Onion proxy (OP) uses source routing and chooses several ORs from cached directory. OP establishes circuit across the Tor network and negotiates a symmetric key with each OR, one hop at a time, as well as handle TCP stream from client application. The OR on other side of circuit connects to the requested destination and relay the data. The OP will sets up TLS connection with OR1 using protocol, through this connection , OP sends CELL_CREATE cell and uses Diffie-Hellman (DH) handshake protocol to negotiate a base key k1=gxy with OR1. Form this key; a forward symmetric key kf1 and backward key kb1 are produced. This way first hop circuit C1 is created. Similarly OP extends the circuit to second and third hop. After circuit is setup, OP sends a RELAY_COMMAND_BEGIN cell to the exit onion router and cell is encrypted as {{{Begin}kf3}kf2}kf1. While the cell traverses through circuit each time the layer of onion skin are removed one by one. At last the OR3 last skin is removed by decryption then it open a TCP stream to a port at the destination IP, which belongs to bob. The OR3 sets up a TCP connection with bob and sends a RELAY_COMMAND_CONNECTED cell back to Alice’s OP. Then the client can download the file. PROCESSING CELL AT ONION ROUTER The TCP data is received by OR from port A and it is processed by TCP and TLS protocols. Then the processed data is delivered to the TLS buffer. The read event is called to read and process the data pending in the TLS buffer. This read event will pull the data from TLS buffer into the input buffer. Then the read event process cells from input buffer one by one. Each OR has routing table which maintains map from source connection and circuit ID to destination connection and circuit ID. The transmission direction of the cell can be determined by the read event. To append the cell to the destination circuit the corresponding symmetric key is used to decrypt / encrypt the payload of the cell, replace the present circuit ID with destination circuit ID. The cell can be written directly for the destination connection if there is no data waiting in output buffer and the write event is added to the event queue. After calling the write event, the data is flushed to TLS buffer of destination. Then write event pull as many cells as possible from circuit to output buffer and add write event to event queue. The next write event carry on flushing data to output buffer and pull cells to output buffer else the cell queued in circuit queue can be delivered to network via port B by calling write event twice. Fig. 2Processing the cells at Onion router CELL – COUNTING BASED ATTACK The IP packets in Tor network is very dynamic and based on this the cell – counting based attack implemented. Dynamic IP packets over Tor : The application data will be packed into equal sized cells (512-B). While the packets transmitted over the Tor network it is dynamic. Because of this reason the size of packets from sender to receiver is random over time and large numbers of packets have varied in sizes. The main reason for this is the varied performance of OR cause cells not to be promptly processed and also if network is congested, cells will not delivered on time, because of this the cell will merge and non-MTU(Maximum Transmission Unit) sized packets will show up. Work-flow of Cell – Counting based attack: Step 1: SELECTING THE TARGET :- The attacker log the information at the exit OR, including the server host IP address and port for a circuit and circuit ID and uses CELL – RELAY-DATA to transmit the data stream. Step 2: ENCODING THE SIGNAL :- Until the write event is called the CELL – RELAY – DATA will be waited in the circuit queue. After the write event is called then the cells are flushed into output buffer. Hence the attacker can manipulate the number of cells flushed to the output buffer all together. This way the attacker can able to embed the secret signal. To encode bit 1, the attacker can flushes three cells from circuit queue and for bit 0, flushes one cell from circuit queue. Step 3: RECORDING PACKETS :- After the signal is embedded in the target traffic it will be transmitted to the entry OR along with target traffic. The attacker at the entry OR will record the received cells and related information and need to determine whether the received cells are CELL – RELAY – DATA cells. Step 4: RECOGNIZING THE EMBEDDED SIGNAL :- The attacker enters the phase of recognizing the embedded signal with the recorded cells. For this used the recovery mechanisms. Once the original signal is identified the attacker can link the communication between Alice and Bob. There are two critical issues related to attack: (1) Encoding signals at exit OR: Two cells are not enough to encode â€Å"1† bit. Because if the attacker uses two cells to encode bit â€Å"1† then it will be easily distorted over network and also hard to recover. When the two cells arrive at the input buffer at the middle OR, the first cell will be pulled into circuit queue and then if the output buffer is empty, the first cell will be flushed into it. Then the second cell will be pulled to the circuit queue. Since the output buffer is not empty, the second cell stays in the circuit queue. When the write event is called, the first cell will be delivered to the network, while the second cell written to the output buffer and wait for the next write event. Consequently, two originally combined cells will be split into two separate cells at the middle router. So the attacker at the entry OR will observe two separate cells arriving at the circuit queue. This cells will be d ecoded as two â€Å"0† bits, leading the attacker to a wrong detection of the signal. To deal with this issue the attacker should choose at least three cells for carrying bit â€Å"1†. For transmitting cells, proper delay interval should be selected: If the delay interval among the cells is too large, users are not able to tolerate the slow traffic and to transmit the data will choose another circuit. When this condition happens the attack will fail. And if the delay interval is too small, then it will increase the chance that cells may combined at middle OR. (2) Decoding signals at the entry OR: Distortion of signal: Anyway the combination and division of the cells will happen due to unpredictable network delay and congestion. This will cause the embedded signal to be distorted and the probability of recognizing the embedded signal will be reduced. Because of this distortion of the signal, a recovery mechanism can be used, that recognize the embedded signal. The combination and division of cell can be categorized into four types: (1) Two types of the cell division for the unit of the signal and (2) Two types of the cell combination for different units of signal. To deal with these types of division and combination types of the cells the recovery algorithm can be used. If the number of cells recorded in the circuit queue is smaller than the number of the original signal are recovered as either two types of cell division for the unit of the signal. Suppose the number of cells recorded in the circuit queue is larger than the number of cells for carrying the signal; the recovered signal will be either two of the cell combination for different units of signal. When the signals are recovered in these types with k ≠¤ 2, can consider that these signals are successfully identified otherwise cannot be identified. Attack Delectability: To improve the attack invisibility can adopt the time-hopping-based signal embedding technique, which can reduce the probability of interception and recognition. The principle of this technique is, there exit random intervals between signal bits. At the exit OR, the duration of those intervals are varied according to a pseudorandom control code which is known to only the attackers. To recover this signal, the attacker at the entry OR can use the same secret control code to position the signal bits and recover the whole signal. If the interval between the bits is large enough, the inserted signal bits appear sparse within the target traffic and it is difficult to determine whether groups of cells are caused by network dynamics or intention. Therefore the secret signal embedded into the target traffic is no different than the noise. And when a malicious entry node has confirmed the communication relationship, it can separate the group of cells by adding delay betw een the cells so that not even the client can observe the embedded signal. In this paper a signal is embedded into the target traffic, which implies a secrete sequence of groups of one and three cells. With the time-hopping technique, groups of one and three cells are separated by random intervals and it is hard to differentiate them from those caused by network dynamics and since the embedded signal is very short and only known to attacker, can conclude that it is very difficult to distinguish traffic with embedded signals from normal traffic based on this very short secret sequence of cell groups. CONCLUSION AND FUTURE WORK In this paper, we presented a cell-counting based attack against Tor network. This can confirm the anonymous communication among the user quickly and accurately and it is very difficult to detect. The attacker at the exit OR manipulates the transmission of cells from the target TCP stream and embeds a secret signal into the cell counter variation of the TCP stream. Then the attacker at the entry OR recognizes the embedded signal using developed recovery algorithms and links the communication relationship among the users. In this attack the detection rate is monotonously increasing function with the delay interval and decreasing function of the variance of one way transmission delay along a circuit. This attack could drastically and quickly degrade the anonymity service that Tor provides. Due to the fundamental design of the Tor network, defending against this attack remains a very challenging task that we will investigate in future work. REFERENCES [1] W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, â€Å"DSSS-based à ¯Ã‚ ¬Ã¢â‚¬Å¡ow marking technique for invisible traceback,† in Proc. IEEE SP,May 2007, pp. 18–32. [2] N. B. Amir Houmansadr and N. Kiyavash, â€Å"RAINBOW: A robust and invisible non-blind watermark for network à ¯Ã‚ ¬Ã¢â‚¬Å¡ows,† in Proc.16thNDSS, Feb. 2009, pp. 1–13. [3] V. Shmatikov and M.-H. Wang, â€Å"Timing analysis in low-latency MIX networks: Attacks and defenses,† in Proc. ESORICS, 2006, pp. 18–31. [4] V. Fusenig, E. Staab, U. Sorger, and T. Engel, â€Å"Slotted packet counting attacks on anonymity protocols,† in Proc. AISC, 2009, pp. 53–60. [5] X. Wang, S. Chen, and S. Jajodia, â€Å"Tracking anonymous peer-to-peer VoIP calls on the internet,† in Proc. 12th ACM CCS, Nov. 2005, pp.81–91. [6] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, â€Å"Lowresource routing attacks against anonymous systems,† Univ. Colorado Boulder, Boulder, CO, Tech. Rep., Aug. 2007. [7] X. Fu, Z. Ling, J. Luo, W. Yu, W. Jia, and W. Zhao, â€Å"One cell is enough to break Tor’s anonymity,† in Proc. Black Hat DC,Feb.2009[Online]. Available: http://www.blackhat.com/presentations/bh-dc-09/Fu/ BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf [8] R. Dingledine, N. Mathewson, and P. Syverson, â€Å"Tor: Anonymity online,† 2008 [Online]. Available: http://tor.eff.org/index.html.en [9] R. Dingledine and N. Mathewson, â€Å"Tor protocol specià ¯Ã‚ ¬Ã‚ cation,†2008 [Online]. Available: https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt [10] J. Reardon, â€Å"Improving Tor using a TCP-over-DTLS tunnel,† Master’s thesis, University of Waterloo, Waterloo, ON, Canada, Sep. 2008. Project management example: The London Eye Project management example: The London Eye Introduction Generally, the definitions of project management have diversities, but in commonly project management is used to accomplish business ambition, strategies and well-defined work tasks within a certain schedule and limit budget (Sabin, 2006). The project management required skill, experience, processes, methods and knowledge in order to complete the objectives of the project (Association for Project Management, 2014). Most strategists succeed in these days with high competitive and fusing global economy are mostly using the project management techniques to deliver substantial quality of business results within limited time and budget (Project Management Institute, 2014). Jamieson Morris (2004) support that project management is a key factor in business process. Even in many definitions of project management, the fundamental is about attaining the jobs done. The London Eye is the huge project that was designed by architectures David Marks and Julia Barfield, its purpose to represent modern architectural design and engineering of the first of the millennium century (Tim and Ian, 2000). The London eye was the tallest Ferris wheel in the world by height 135 meters, after success, with Star of Nanchang in 2006, Singapore Flyer in 2008 and High Roller in 2014 in order. The construction of London Eye used 16 months to finish in order to celebrated of the year 2000, London Eye also knows as the Millennium Wheel. In the first year of operation, number of visitors approximately was 3.2 millions, hence this becomes more popular of attracting visitors in the United Kingdom. The production cost of the London Eye is 75 million pounds and took 50 percent of time less than normal to finish the project (Marks Barfield, 2014). This makes London Eye is one of the most interested project to measure and examined in the process of project management. A project must have three variables that can estimate certain time of the project, limited by budget and meet quality requirement (Lester, 2007). Characteristics in process of construction London Eye can be evaluated as the project, because of the constrains from budget and time, no repetition of construction, requirement of a variety of skill and experience expertise involve. From all of these characteristics summarize that the London Eye is classified as a project. The scope of this paper study is to investigate two aspects, which are stakeholders management, project planning and scheduling that make London Eye become a successful project. However, it is essentially that we have to understand the background of the project first, in order to understand the process. London Eye’s Characteristics Since 2000, the London Eye has become one of the iconic landmarks of London. The concept of London Eyes was introduced in 1993 by the architecture name Marks Barfield. His design of Ferris wheel submitted to the Architecture Foundation competition in order to build to celebrate the millennium year. In 1994, British Airways interest to become a sponsor of the project. In 1996, the permission of the project was successfully made by the agreement of shareholders as the result, Tussauds Group was joined as the last partner. The London Eye was constructed before the year 2000 only 16 months (The British Broadcasting Corporation, 2005). More that 5 different oversea companies worked to build London Eyes and it took 7 years till it was open. The formal opening ceremony on 31, December 1991 and follow by public open on 9, March 2000. The Iron Triangle Figure1: Iron triangle of London Eye project The Iron Triangle is the traditional technique for evaluating project performance, which have three variables; time, cost and scope that try to balance each others (Atkinson, 1999; Gardiner and Stewart, 2000). If one of the three variables is changed, it will affect one of the others too. For example; if stakeholders want less time of construction, they need to increase the budget or reduce the scope (Gregory, 2006). In (Figure1) shows The Iron Triangle of London Eye project follow by time, cost and scope. The London Eye used only 16 months in order to finish the construction process, in order to celebrate millennium century, that is 50 percent less than normal process. The cost of construction of London Eye was 75 million pounds higher than average cost of normal construction. But the cost of building was not issued to be a problem because the main purpose of this is to open on time and to be the biggest Ferris wheel in the world (London Eye, 2014). To understand the key elements of project management, such as stakeholders management, project planning and scheduling which are the factors to push the London Eye finished on time. The Author will illustrate and explain two of variables in further. Stakeholders Management According to, Freeman and Reed (1983) has given a definition of stakeholder is someone that â€Å"can affect the achievement of an organizations objectives or is affected by the achievement of an organization’s objectives†. Bourne and Walker (2004) suggest that even a project manager was able to deliver the project with the original scope, cost and time, but without the attention of stockholders, a project might probably not be able to success. The conflict in stakeholders must be managed, because it might lead to projects fail (Bourne and Walker, 2005). A stakeholder can be any individual, institution or organization that involves the interaction with the project or business. The stakeholder might effect from project, both direct and indirect, and can be occasional or ordinary contact with the project (Paul, 2013). Identify who are the stakeholders and understand the role of them must be done. London Eye project have many stakeholders who are investing in the project. But the key stakeholders of the project, who have the potential to support and facilitate the project can clearly identify. David Marks and Julia Barfield, who invented the idea of the wheel in 1990 were a press campaign to support the concept. Bob Ayling, Chief Executive of British Airway in that period offered financial and corporate support to this project. In 1997, Tussauds Group was brought into the position of the operator. The London Eye Company Limited, were owned by three owner separate in equal shard. David Marks and Julia Barfield owned one third, The Tussauds Group also owned one third and lastly one third owned by British Airways, who was the leading support during the development phase. Government didn’t support the project, except the construction of new pier, in purpose to protect collision of the wheel. For financing purpose of the London Eye project was provided by Sumitomo Bank and Westdeutsche Landesbank (Tim and Ian, 2000). Mace is the UK’s leading company on the project management, as appointed to be Project Managers in 1998. Seven groups of contractors were chosen to project, they were responsible for building and design as follows: Tilbury Douglas Construction Ltd for Foundations, Civil works and Pier structure, Hollandia BV for Wheel Structure, Pomagalski SA for Capsules and Controls, T Clarke PLC for Electrical Installations, Littlehampton Welding Limited for Boarding Platform and Pier Finishes, Waterers Landscape PLC for Landscaping and Alandale Construction Limited for County Hall Fit-Out (Tim and Ian, 2000). From this we can identify stakeholder as two types; internal stakeholders and external stakeholders. Internal stakeholder can be people who involve in part of the business for example; shareholders, managers and employees. External stakeholders are the people who outside the business such as customers, local community, suppliers, press and government (The British Broadcasting Corporation, 2014). Figure2: Stakeholders Web and Internal External Stakeholder From the figure2 above, researcher attempt to explain the understanding of the internal and external stakeholders of The London Eye by using The Stakeholder Web describe. From internal stakeholders, Shareholders can be British Airways, David Marks Julia Barfield and Tussaudes Group that interested in dividends and growth of shares. Managers and employees are interested in salaries and job security. From external stakeholders, suppliers concerned in delivering services and finished project on time. Government, Tourists, Londoner and also including people around the South Bank area are impacted from the project such as the project might effects to new businesses that can take benefits from London Eye such as bars and restaurants. Traffic around the London Eye maybe influenced because increasing of tourists. All of these influencers can become stakeholders of the project. Stakeholders have different of interests, to manage this conflict it’s necessary to understand the types of stakeholders and what can influence their behavior. By classifying the different groups of stakeholders, using stakeholder power and interest matrix, to organize based on the level of power and interest. Stakeholder classification of power and interest matrix map will make groups of stakeholders easier to understand. Stakeholders can be classified in two big dimensions, of power and interest (Newcombe, 2003; Johnson and Scholes, 1993). The basic concept is who have high power and high interest will be the key players and also need to manage it. Figure3: London Eye stakeholder power and interest matrix From the figure 3 shows that London Eye project stakeholders were classified by level of interest and power. The key players in this case can be British Airway who is supporting the financial and able to control the project. Bank and financial institutions such as Sumitomo Bank and Westdeutsche Landesbank, that provided financial loan. Press and local community didn’t have power, but the project directly effects to their living or career. Same as the government, they didn’t provide the financial support but able to collect taxes from the project. Customers and Londoner can be in the group of minimal effort. The success of The London Eye project definitely involved with the stakeholder management. The well understanding in position and its roll are significant to make this project completed. However, it is not only stakeholder management, variable that leads to the success of the project. Many factors that involved included planning and scheduling of the project also are the important variables. Project Planning and Scheduling Project management planning is one of the important variables that required lists of time, quality and cost. Project management planning depends on types and sizes of project (Lester, 2007). The role of project management can separate into three main areas; 1) It can handle the operational requirement to meet the customer satisfaction, 2) The project must be completed on time and 3) Control and delivery the job on the previous set of constrains budget. Good project planning will lead to success according to these three goals. For more understanding of London Eye planning, researchers will apply Work Breakdown Structure (WBS) is the technique for controlling and planning project. Secondly Gantt chart technique will also use to explain in this project. The Work Breakdown Structure (WBS) To organize the structure of the project, Work Breaking Structure assists the work process. It is similar to the outline of the book or report. WBS is the brief version of work structure that help to perform and focus on plan, track and evaluate of the project (Gregory, 2006). According to the diagram, it consists of three benefits of using WBS, First, WBS are easier to evaluate the cost and time of work. Second, it is easy to break down the work into the small tasks and makes it easier to measure the progress. Third, it eases the separation of the tasks into the team member. Moreover, WBS contains two kinds of tasks: the summary tasks and the work packages. Summer tasks will describe each of the processes in the project, for the work packages describe as the lowest level task that required details to complete. From the figure4 shows The London Eye’s Work Breakdown Structure. WBS identifies the work that should be done, based on researcher’s understanding and assuming. The summary tasks can be divided up to four main tasks; safety, stakeholders (internal and external), physical and organizational. Moreover there are more subordinate level breakdown into each main tasks. For example, in physical tasks and the construction of wheel, capsules and foundation can be described as the lower level task of each level. The Gantt chart The Gantt chart was developed during the World War I invented by Henry Laurence Gantt. The Gantt chart uses to identify the necessary steps to obtain a result of work. The process of doing Gantt chart is worked by projecting schedule, follow step by step, from the final result, analyst activities, timing of process and sequence of tasks (Gregory, 2006). The chart can used to compare the estimated time of the project before, start with initial time on the actual time that really spent. Furthermore, Gantt chart can apply to every project, both in big project and small project. For example, building a factory, making a cup of glass or producing a musical. Figure5: London Eye’s Gantt chart From the figure5 shows The London Eye’s Gantt chart. The researcher is using information from the previous research and available documents to create this Gantt chart (The British Broadcasting Corporation, 2005; Tim and Ian, 2000). From this chart can see that London Eye project used approximately 7 years of planning, finding sponsors, get permits and construction. The London Eye can be estimated as the long project in-term of planning, but comparing to the time on construction is apparently very short compared to this kind of the project. Conclusion of the project The London Eye is one of the most successful projects in many aspects. It’s also one of the most successful in architect design of 21st century. The components of London Eye must be assembled above The Thames River that required high technology to handle the project. The original plan of London Eye was planned to be completed the construction in 2 years, but in, finally it used only 16 months to finish the project. If according to, The Iron Triangle theory said that if one of the three variables was changed, it will affect one of the others too. London was used the budget around 75 million pounds to build, but the project’s time construction is faster than expected and the scope has not changed. Unfortunately, components of London Eyes have to ship up and assemble in the Thames River this made it harder to deliver projects on time (Tim and Ian, 2000). The London Eye is not the ordinary project for both suppliers and project management team. To be able to finish on deadline, all around the prost have to be given to everyone who was a part in this project. Shareholders and investors of the project must spend huge money in order to justify risk of the project. For example, if poor quality and not finished on time happened, this implies that the cost of the project may not be the first priority of concern. Therefore, the time and scope or quality must be the first and second priority of the scope in the project. Mace construction that was controlling the project management team of London Eye should be accredited for the achievement and deliver project before deadline. But if they can decrease time for searching operators and suppliers, it could save the cost of the production because time of construction can reduce cost of production. From the stakeholder management perspectives, it illustrates the conflict of interest in shareholders, as the factor of â€Å"Time† had become a conflict among them. However, British Airway as a big shareholder that support financial fund during the construction had burden the high cost of production and risk. But in terms of marketing, British Airway can promote and impose the branding under the sponsorship deal. British Airway also improves brand image by using London Eye as the presenter of their brand. Recommendation of the project Researcher found that from this paper, it helps to understand theories and concept of project management, which make it easier to manage and deal with the project. The fundamentals of controlling cost, deliver on time and satisfaction in quality are significantly important. Not only the stakeholder management and project planning and scheduling will lead to the success of the project. But risk management, uncertainty management, resource management, scope management and other management aspects should be concerned as part of the success factors in project management. Other aspects of business should be considered as important as project management such as financial, human resource management and costumer relationship management. The London Eye project was won over 25 awards for engineering tourism, innovation and design including; 2003 Queen’s Award for Enterprise Innovation Furthermore, the project can make huge profits from the first few months of opening and had recovered the cost (London Eye, 2014). From this show that minimize cost is not always important for business but deliver customer expectation and requirement sometime is more important. The main problem of this project is about lack of managing for future that effects to cost which increases more that it should be. The project manager should concern this point because when one varies in cost, time and quality of project, it will always affect one the others as a whole. 1

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.