Vivechana 2016- National Conference on Advances in Computer Science and Engineering
"Vivechana 2016 Conference Papers "
Pages
[1]
[2]
Task Scheduling in Cloud Computing[Full-Text ]
Aakanksha Sharma, Sanjay TyagiCloud computing is most popular technology now a days and has a lot of research potential in various areas like resource allocation, task scheduling, security and privacy etc. Scheduling is one of important issues for improving the efficiency of all cloud based services. In cloud computing Task scheduling is used to allocate the task to best suitable resource for execution. There are different types of task scheduling algorithms. Some issues like execution time, execution cost, complexity etc in task scheduling have been considered in this paper. In this paper, focus is on Task scheduling description and different algorithms proposed to resolve the issues of task scheduling have been reviewed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Big Data Database Systems : A Comparative Study[Full-Text ]
Adarsh Kumar, Anita GanpatiWe are living in 21st century digital world where large amount of data generated from various sources in bulk and in different format at high rate. In Current time data is more important than information and bulk data help in making correlation and help in decision making which is not possible with small data set. Different formats are not fit in one system. In this paper, a comparative study on different big data database systems in which discuss about classification, architectural properties and functionality.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security Issues in Grid Computing[Full-Text ]
Akanksha, Dr. Kanwal GargThe premise of this paper is to specify the security requirements of grid computing. The dynamic nature of Grid environments introduces challenging security concerns that demand new technical approaches. In this brief overview the author provides key Grid security issues and outlines a new method to resolve architectural level issues in grid environment. The frequent itemset mining in grid environment provides resources to transform data into useful sequences by providing front end accessing and done in most secured manner.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Emerging No-SQL Technologies for Big Data Processing[Full-Text ]
Amrinder Kaur, Dr. Rakesh KumarIn modern era everyone is connected with internet and with the usage of information technology, IT tools, data is increasing on exponential rate. The generated data may be structured, semi structured or unstructured in nature, called big data. This demands new techniques and technologies with extensive processing requirement and storage requirement for this voluminous data. Existing technologies and computation facilities are facing challenges in meeting the scale and performance of such a vast data. To scale with big data, organizations are opting diversified solutions like NO-SQL which is proving to be emerging alternative for big data and other fields. This paper discusses big data, no-sql databases, its classifications and comparison of various no-sql technologies.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Systematic Review of Document Clustering Algorithms and Future Research Directions[Full-Text ]
Anjali Vashist, RajenderNathClustering is an efficient technique that organizes a large quantity of unordered text documents into a small number of significant and coherent clusters, thereby providing a basis for intuitive and informative navigation and browsing mechanisms. It is studied by the researchers at broad level because of its broad application in several areas such as web mining, search engines, and information extraction. It clusters the documents based on various similarity measures. So far many clustering algorithms are proposed in the literature but they are not reviewed systematically. This paper intends to review the literature on document clustering algorithms systematically and suggest various research directions in this field.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REVIEW OF FAULT DETECTION TECHNIQUE IN WSN AND MANET[Full-Text ]
Anu, Er. MeenakshisharmaDependable mobile ad-hoc networks are being consideredto provide reliable and continuous service despite thefailure of some of their components. One of the basicbuilding block that has been identified for such fault tolerant systems is the failure detection service which goals at providing some information on which hosts have crashed. In this paper, we present a review of WSN and MANET of failure detection technique., we studied Clustering ,Faults and Exciting faults recovery algorithms such as fault node recovery (FNR), Directed Diffusion (DD) Algorithm, Grade Diffusion(GD) Algorithm,Clusted consensus time synchronization (CCTS) algorithm ,Round Trip Delay(RTD) time.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review on Task Scheduling Algorithms in Cloud Computing Environment[Full-Text ]
Anu Rani, Dr.Kanwal GargCloud computing is a popular computing paradigm that performs processing of huge volume of data using highly available geographically distributed resources. Task scheduling is one of the important step for improve efficiency of all cloud computing services. Task scheduling is used to allocate best suitable resources for the tasks to be executing with the consideration of various factors such as time, cost, reliability, and throughput and so on. In this paper, the author has discussed different algorithms of task scheduling in Cloud Computing. The author mentioned some of their shortcomings for future development.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Role of Hibernation File in Memory Forensics of windows 10[Full-Text ]
Azad Singh, Pankaj Sharma, RajenderNathDigital media devices are regularly seized pursuant to criminal investigations and Microsoft Windows is the most commonly encountered platform on seized computers. Memory forensics gives the volatile artifacts from the system as they play a significant role in reconstructing the events along with static artifacts from the system storage. Hibernation file is identified as an essential part of digital forensics, which provides analysts with snapshots of system memory from various points in the past. Hibernation file includes web, email and chat sessions in addition to running processes, login credentials, encryption keys, program data and much more. The purpose of this work is to study the hibernation file and page file, there role in memory forensics and to explore current technologies and concept for analysis. This study includes the windows hibernation features, file formats, potential evidence saved to the file and impacts in digital forensic investigations and also compares page file and hibernation file in order to validate the evidences and finding additional artifacts.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Technique to Handle Small Files with Big Data Technology[Full-Text ]
Bharti Gupta, Rajender Nath, Girdhar GopalHadoop is an open source Apache project and a software framework for distributed processing of large datasets across large clusters of computers with commodity hardware. Large datasets include terabytes or petabytes of data where as large clusters means hundreds or thousands of nodes. It supports master slave architecture, which involves one master node and thousands of slave nodes. NameNode acts as the master node which stores all the metadata of files and various data nodes are slave nodes which stores all the application data. It becomes a bottleneck, when there is a need to process numerous number of small files because the NameNode utilizes the more memory to store the metadata of files and data nodes consume more CPU time to process numerous number of small files. This paper proposes a novel technique to handle small file problems with Hadoop technology based on file merging, caching and correlation strategies. The proposed technique has reduced the amount of data storage at NameNode as has been proved by theoretical validation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Clustering Techniques for Digital Image Segmentation[Full-Text ]
Bharti Tanwar, Rakesh Kumar, Girdhar GopalAn image analysis is a process to extract some useful and meaningful information from an image. Segmentation is one of the methods used for image analyses. Image segmentation has many techniques to extract information from an image. Clustering is a technique which is used for image segmentation. The main goal of clustering is to differentiate the objects in an image using similarity and dissimilarity between the regions. K-Nearest Neighbour is a classification method. K-mean is a clustering technique which is a simple and an iterative method. In this paper, details of both algorithms have been provided with the implementation results on an image dataset consisting of 4 images.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact of Resource Allocation Schemes on Cost and Performance in Federation of Clouds[Full-Text ]
Bhawna Taneja, Rajender NathIn a Federated Cloud Environment, binding of cloudlets to a Datacenter is a complex task as compared to non-federated environment and this greatly affects the performance of a federation. A number of techniques in this context are proposed in the literature but not evaluated in the context of cloud federation. This paper intends to study the impact of Round Robin, Greedy and Random resource allocation techniques on the usage cost in a federation of clouds. These techniques have been compared by evaluating them using SmartFed Simulator.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A comparative study of Various Hypervisors Performance[Full-Text ]
Budhprakash, Dr.Anupam Bhatia, Dr. GurjeetsinghBhattalVirtualization is a great technology in this era of computer. In the technology of virtualization, hypervisor is a main component of this technology. A hypervisor is a computer software, firmware that creates and runs virtual machines. There are two type of hypervisors are used, one is native hypervisor and another is hosted hypervisor. The type 1 or native hypervisors directly run on the host’s hardware to control the hardware and to manage guest operating systms. As the example Oracle VM Server for SPARC, Oracle VM Server for x86, the Citrix XenServer, Microsoft’s Hyper-V, and VMware ESX/ESXI. On the other side hosted hypervisors run on a conventional operating system just as other computer programs do. The type-2 hypervisors abstract guest operating systems from the host operating system. VMware Player, VirtualBox, VMware Workstation, and QEMU are examples of type-2 hypervisors. Here there is the comparison between the KVM, Hyper-VESXI and Citrix Xen server hypervisors and on the basis of performance and load balancing to proof which hypervisor is best.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study on Energy Efficient Routing Protocols in Wireless Sensor Networks[Full-Text ]
Davender Krishan Malhotra, Aarti SinghA wireless sensor network (WSN) consists of small, multifunctional, low cost and low power sensor nodes. In WSNs, the routing protocol has limited battery power and bandwidth constraints and yet they have to facilitate efficient working as well as prolonged lifetime of these networks. On the basis of network structure routing techniques can be classified as data-centric, hierarchical and location based. Routing protocol being the backbone of communication in WSNs suffer from design trade-off between energy efficiency and communication overhead. This paper explores the various routing protocols existing for WSNs and focuses on protocols enabling optimal utilization of energy.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Data Utility Metrics for k-anonymization Algorithms[Full-Text ]
Deepak Narula, Pardeep Kumar, Shuchita UpadhyayaPrivacy remains a major serious issue while publishing the data. In today’s environment some organizations publish their data for the purpose of research. Although during publishing organization keeps a check on attributes which can uniquely identify the information for individual, yet sometimes published information may prove to be an asset for an attacker, which may retrieve sensitive information about an individual. As a result, data protection along with its privacy is an important domain of research. Multiple techniques of anonymization have been proposed to secure the privacy of an individual and to reduce information losses. Out of the provided anonymization techniques k-anonymity is one of the most popular technique which is based on the concept of generalization and puts a check on such type of attacks that helps to anonymize the data sets. In this paper first a brief discussion of various k-anonymity algorithms is presented. Further, various metrics have been discussed for verification of different data sets along with their illustration.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review On Attacks & Countermeasures In Wireless Sensor Network[Full-Text ]
Dinesh Kumar Yadav, Ravi KumarWireless sensor networks are gettings significantly vital to many programs, and they were initially utilized by the military for surveillance functions. One of the important issues of WSNs is that they are very defenseless to protection threats. Due to the truth that these networks are susceptible to hackers; it is possible for one to enter and render a network. For example, such networks can be hacked into in the military, the usage of the system to attack friendly forces. A wireless Sensor network consists of thousands of low value, low energy and self-organizing nodes which are highly allotted. Due to the reason that the sensor nodes are highly distributed, there is a need of security in the network. Security is an important issue now these days in almost every network. There are few security issues and No. Of attacks that need to be look around and work upon. This paper discusses a number of the issues and the denial of provider attacks of security.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Oversight on Mutation Testing[Full-Text ]
Deepika Sharma, Sanjay TyagiTraditional testing methods only measure the execution of code. They do not take into account the actual detection of faults in the executed code. It is therefore only able to test the execution of code and not the faults. Mutation testing is an important method of fault revealing. The main aim of mutation testing is to test the quality of test cases in such a way that it should be able to fail the mutant code. Mutation testing also called as fault revealing strategy because here faults are introduced in the program and then different test cases are applied on the mutant to find bugs in the mutated program. It is the process of rewriting the source code by introducing changes in small ways to remove the redundancies in the source code. This paper reviews the mutation testing concept, effectiveness of test cases, categorizes the mutant and focus on the techniques to reduce mutant.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Web Crawler Challenges and Their Solutions[Full-Text ]
Dr. Naresh Kumar, Shivank Awasthi, Devvrat TyagiIn recent times, web has become an indispensable tool in daily life. The enormous growth of web has become a major concern both for end user and search engine itself. Due to this exponential growth, general crawling technique is not able to handle all relevant URLs. So this paper proposes a detailed analysis on different crawling technologies focusing on specific need of end user.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Classification of Data Mining and Analysis for Predicting Diabetes Subtypes using WEKA[Full-Text ]
Ekta, Sanjeev DhawanFrom the past years Online Social Networks (OSNs) are gaining popularity among the people. Most of the people are using the Social Networking sites to communicate with their loved once, colleagues, friends etc. Data is also growing very faster and there are some issues related to privacy and security in OSNs. Therefore, it is necessary to get the information about the issues and the latest trends in OSNs. In OSNs, the generated datasets have to be analyzed and visualized by users. In order to analyze, classify and visualize the data, WEKA tool is used. In this research paper, holistic approach has been considered to analyze and classify the diabetes dataset for data preprocessing. In order to do so, diabetes.arff dataset is used for data preprocessing and prediction of diabetes. From this research work one can easily analyzed that WEKA tool is quite useful for analyzing the given dataset. Results of the analysis help to predict about the individuals are infected from diabetes or not. Finally, it is analyzed that persons who are suffered from diabetes have age more than 40 and mass more than 35. On the other hand, the persons who are not infected from diabetes have age less than 30 and mass less than 35.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review Paper on Mobile WIMAX Security Threats and Solutions[Full-Text ]
Himani Yadav Mobile WIMAX (IEEE802.16e), where WIMAX stands for Worldwide Interoperability for Microwave Access, is one of the latest technologies in the Wire-Less World. IEEE 802.16e provides the ability for users to use the Broadband Wireless Communication even when the user is moving. The main goal of WIMAX is to deliver the wireless communications with the quality of service in a secured environment. WIMAX has many salient advantages such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WIMAX but it still exposes to various attacks in. In this Paper we have discussed about various threats related to security of IEEE 802.16e and what solutions have been proposed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review on Intrusion Detection System Architectures in WSN[Full-Text ]
Ishu Gupta, Kishu GuptaWireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. Wireless Sensor Network (WSN) is implemented in open medium environment and the sensors nodes are fully distributed in nature. Moreover, WSNs have limitations in terms of energy, bandwidth, computations and memory. Their limited computational ability and battery resources restrictions make them vulnerable to many kinds of attacks. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. The aim of this paper is to provide a detailed review about current IDS and its architectures for WSN. Finally we focus on comparison of recent Intrusion Detection architectures in WSNs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CONTROLLING THE ENERGY STATE OF MANET THROUGH ENERGY ANTS[Full-Text ]
Jaideep Atri, Shuchita UpadhayayaMultipath routing in MANET is a way of utilizing multiple alternative paths in the network, which can provide a variety of benefits like preventing delays due to stale routes, increased available bandwidth on different links etc. as compared to the protocols like DSR and AODV. But Energy is an important factor in these networks. The Energy failure of a node may lead to the development of stale route in the network. In the present paper, the various existing multipath routing techniques for MANETs which consider energy as the contributing factor have been elaborated along with their weak zones. It is observed that none of the existing protocols analyzed the energy of neighbor intermediate nodes used for forwarding the packets. An ant based scheme has been proposed in this paper that makes an attempt in the direction of overcoming the above problem. An illustration of the observed shortcoming and the proposition has been outlined in the paper.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Mobility Models using DSDV Protocol[Full-Text ]
Kamal Kumar, Anil Saini, Rajender NathIn Mobile Ad-hoc Network (MANETs), no fixed infrastructure is required. Completely different wireless hosts are free to move from one region to another without any centralized administration, so, the topology is changed from one instance to another in quickly manner. Routing in MANETs has been a tough task ever since the wireless networks got into existence. One of the important task in MANET keeps adjustments in network topology because degree of node mobility is higher. In most of the studies, the focus has been at the versions in pause instances and network length to measure the performance of various MANET routing protocols. A very few work has been done on the performance analysis of protocols by changing the underlying mobility models. In this paper, we are analyzed various mobility models: Random Waypoint model, Random Direction model and Manhattan Grid Mobility Model using DSDV protocols by using Network Simulator (NS 2.35).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Comprehensive Study on Architecture, Security issues and Challenges in Cloud Computing[Full-Text ]
Kishu Gupta, Ishu GuptaThe emergence of cloud computing promises to have far- reaching effects on the systems and networks. Cloud computing is becoming an increasingly popular enterprise model in which computing resources are made available on-demand to the user as needed. Cloud computing use the internet technologies for delivery of IT-Enabled capabilities ‘as a service’ to any needed users i.e. through cloud computing we can access anything that we want from anywhere to any computer without worrying about anything like about their storage, cost, management and so on. Many of the features that make cloud computing attractive, have not just challenged to the current security system, but also revealed new securities issues/problems. This paper provides comprehensive study of cloud computing security issues and a brief analysis on the challenges faced by cloud computing.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Algorithm for Webpage Change Detection to Reduce Network Load[Full-Text ]
Kompal Aggarwal, Dr. Rajender NathAs the Web size is continuously growing , it becomes very difficult to search it for useful information . Most of current Internet traffic and bandwidth is consumed by the Web crawlers that retrieve pages for indexing by the different search engines. The load on the remote server is also caused by crawlers by using its CPU cycles and memory.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
VM Scheduling in Cloud Computing using Meta-heuristic Approaches[Full-Text ]
Mamta Khanchi, Sanjay TyagiCloud computing promotes the provision and use of IT infrastructure, platform and applications of any kind in the form of services that are electronically accessible via internet in a dynamically scalable and metered manner. It is still in infancy, so as to reap out its full benefits, much research is required across the various topics. One of the important research issues which need to be focus for its efficient performance is VM scheduling. The goal of VM scheduling is to allocate the processing cores of a host to virtual machine that optimize one or more objectives. Scheduling in cloud computing belongs to a category of NP-hard problem due to large solution space and hence it takes a large amount of time to find an optimal solution. At present, there is no algorithm which can produce optimal solution within polynomial time to solve these problems. Some meta-heuristic based techniques have been proved to achieve near optimal solutions within acceptable time for such problems. This paper provides a review on VM scheduling for load balancing, cost effectiveness and energy saving using various meta-heuristic approaches such as ACO, PSO, GA etc.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Modeling and Throughput Analysis of Perfect Difference Network for Parallel and Distributed Systems[Full-Text ]
Rakesh Kumar Katare, Manish BhardwajNumerous challenges are faced by researchers in the efficient design of future interconnection networks. We are in a phase of strengthening, improving the architectural design and hardware of new interconnection networks importantly Perfect Difference Network (PDN). This paper focuses on the study of various performance metrics and modeling techniques of interconnection networks. Bandwidth, functionality, latency, scalability, density and throughput are the decisive metrics for the cost effective optimal design of interconnection networks. Interconnection systems can be modeled using performance modeling techniques such as analytical, simulation and empirical. PDN interconnection network communication arc analysis has been done in this paper. Routing tables have been derived for PDN with δ=2,3,4 with their linear, communication and diagonal connectivity. Nodes are represented using a binomial and polynomial code. A PDN (δ=2) is simulated on Network Simulator ver3 (NS3) to measure the throughput for the User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) for limited and unlimited data packet transfer.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Hybrid Approach for Raising Biometric System Security by Fusing Face and Fingerprint Traits[Full-Text ]
Manisha kumari, Chander KantBiometric includes physical and behavioral characteristics of the person for identifying an actual user and imposter. Unimodal biometric system (having single biometric trait) provide recognition but contain some limitation such as high error rate, non-universality, noise in sensed data etc. These problems could be overcome by multimodal approaches which combine more than one trait of a user for authentication. Multimodal provides better performance, accuracy and security over a unimodal biometric system. The main aim of introducing liveness detection with multimodal biometric is that we can use this approach in a highly secured application such as defence and bank application. So in this paper liveness detection technique (which detect whether the enrolled user is live or not) is defined with a multimodal approach. This paper presents a new approach for increasing security and performance by the combination of face and fingerprint biometric together with liveness detection technique.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimal Solution by Application of PSO with Differential Algorithm[Full-Text ]
Manisha Rani, Dr. Ramesh KaitFirst scientist were interested only to calculate the shortest path but further they all are moved towards to find out the optimal with different aspects of network (traffic and congestion control). The elements of the network continuously changing their values, to tattle this property: Differential Evolution (DE/DA) was introduced. This category is potentially capable of getting compiled with other evolutionary algorithm and can produce a better result. This paper defines a brief introduction of DE with Practical Swarm Optimisation (PSO). Not every time the local optimal techniques and the discrete optimisation algorithm may solve the entire class of problems. DE algorithms come across to face these exceptions: to handle the situation of global and continuous optimisation. The motivation is to evaluate the DA for solving the continuous optimal path problem and framework of the Metaheuristic Algorithm to present a heuristic for finding the optimal solutions to the shortest path problem.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cyber Laws: Issues and Legal Consequences[Full-Text ]
Manju Sharma Cybercrime, e-crime or Internet frauds etc. refer to the illegal activity where a single system or whole network is involved. Cybercrime is emerging as a profession these days, with the advancement of technology and the Internet being incognito in nature, has made possible for individuals with low technical expertise to make money illegally without leaving their homes. These threats are increasing every day, in fact the 2014 has witnessed some of the biggest attacks of all time and according to predictions the situation is about to worsen in the future. These increasing crimes give rise to the need of cyber laws and the concern of the government authorities. This paper gives an overview of the Cyber legislation of few countries alongwith their issues and legal consequences. Here the sufficiency and the extent to which these laws provide us protection is discussed. These laws are not able to keep pace with the rapidly changing cybercrime scenario.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review of Various Approaches to Multipath Routing[Full-Text ]
Maryada, Mrs. Shalini Aggarwal, Dr. Pardeep MittalMultipath routing is used to overcome the problems incurred in single path routing such as more power consumption, time consuming, hope count, packet delay, low bandwidth and traffic congestion. Multipath routing distributes the load over other available optimal paths to have balanced results. It is not always the case that multipath is better than single path. Multipath results are good to use where there are limited paths and easily adaptable topologies available. Different algorithms and different protocols are used to find the best path among all available paths algorithms such as Dijkstra algorithm, Bellman Ford algorithm. Various Protocols such as OSPF (open shortest path first), IS-IS (Intermediate System to Intermediate System), ECMP (Equal Cost Multiple path), OMRP (Optimal Multipath Routing Protocol) are used for multipath routing. Different routing tables are made to store the calculated results for minimum path cost and distance from source to destination. On the basis of these tables data is transmitted through multiple paths.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhance Security with AES cryptography algorithm: a Survey[Full-Text ]
Meena kumariAdvancement of network technology and various communication techniques, like email, twitter, faceboook etc. However many hackers and malicious groups also increased with the advancement on network Technology. So security is most challenging issue in the world. There for many Different data security methods like cryptography, hashing, and steganography etc, have been developed for protecting data from unauthorized access. This paper provides a survey in between some symmetric algorithms like Data Encryption Standard (DES), Triple DES (3DES), Blowfish and (AES) Advanced Encryption Standard. Comparison of these algorithms is provided on the basis of various factors like key size, block size, attacks, security and number of rounds required for its implementation. Existing symmetric algorithms AES provide better data security. AES involves the sequence of four functions like: Sub Bytes, Shift Rows, Mix Column and Add Round Key.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
One-Way Hash Algorithms in Cloud Computing Security- A Systematic Review[Full-Text ]
Meena Kumari, Dr. Rajender NathCloud Computing (CC) has been emerged as the next generation of computing in IT Enterprise.CC migrates data and applications to huge data centers, where the management of data is totally under control of service providers. However this feature brings about various security concerns. Information authentication and its Integrity verification are such challenges in CC environment. Hash functions are versatile building blocks that are used in this context. This paper is an attempt to review and critically analyze existing hashing algorithms in CC environment. A comparison is also made among existing algorithms and possible future research directions are also given in this paper.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks[Full-Text ]
Meenakshi, Dr. Chander KantFace recognition is one of the most commonly used biometric technology to recognize an individual from a digital image or a video frame from a video source. Face recognition is more user friendly and cost-effective solution than other biometric technologies. Face recognition system can be spoofed by placing photo/video/mask or dummy face of the enrolled user in front of the camera. In order to enhance the security of system and minimize the spoofing attacks, liveness detection is integrated within the system and is added just before the face recognition module. The aim of liveness detection is to verify that the data is from a live user and is not generated by the artificial sources. In the proposed approach, the facial features of human face such as eye blinking and lip movement are used for liveness detection. User is asked to perform some activities such as eye movement and lip movement according to some random challenge generated by the system and then sequence of images are captured by the camera. After that, the facial features are located and variations in these facial features are computed. If the variations are greater than threshold value and also, the given challenge is equal to the desired response, then the user is considered as a “Live User” otherwise it is considered as a “Fake User”.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BLACKHOLE ATTACK DETECTION IN AODV ROUTING PROTOCOL[Full-Text ]
MonikaMobile Ad-hoc networks are collection of mobile hosts that communicate with each other without any infrastructure, hence are also termed as infrastructureless. One of the major area of concern in mobile ad-hoc networks is the security and because of the security attacks in its routing protocol, the networks are left unprotected against the attack of the malicious nodes. One of the major attack in mobile ad-hoc networks is the black hole attack. In this attack all the data packets processed by the source node are taken up by the malicious node and hence does not reach to the destination node. Therefore the data packets are dropped by the malicious nodes. This results in data loss. This paper is focused on detection of the black hole attacks in AODV. AODV is a reactive routing protocol for MANETS.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Survey on Various Scheduling Algorithms in Cloud Computing[Full-Text ]
Monika, Dr. Pardeepkumar, Dr. Sanjay tyagiCloud computing consist of cost effective, scalable, and flexible IT operations. As it works on pay-as-you go model, user’s request must be fulfilled as fast as possible. Resources should be managed and scheduled in a way that gives fast response in economical way. In this paper various scheduling algorithms have been discussed with respect to their various constraints such as time, cost, energy, SLA and so on.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
XSS Attack: Detection and Prevention Techniques[Full-Text ]
Monika Rohilla, Rakesh Kumar, GirdharGopalWeb applications provide access to online services. Web application’s security is the most critical part of web development. The attacker can exploits the vulnerabilities of web applications by injecting the malicious code in application which results in theft of cookies and other credential information. Cross site scripting (XSS) attack is one of the web application vulnerabilities. This paper discusses about various techniques to detect and prevent XSS attacks like sanitization, input validation, web proxy, Browser Enforced Embedded Policy (BEEP), Saner, deDcaota, NOXES etc. The details of these techniques with their shortcomings have been conducted so that one can use these techniques and tools as applicable to avoid the XSS attacks on Web applications.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cryptography-A Security System[Full-Text ]
Ms JyotiNetwork security has become a more practical issue. It basically deals with prevention and monitor of illegal access alternation or incorrect use of the computer network and the resources which are accessible to network. Cryptographic provide network security. It is a science which deals with encryption and decryption of data. It is a practice of writing a secret code. It helps in protection of data and also used for user authentication. This paper represents a survey report of the cryptography approach which is used for network security. The paper recapitulates the related work done in the concerned field since cryptography was developed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Web Log Preprocessing: A Major Step in Web Usage Mining[Full-Text ]
Muskan, Dr. Kanwal GargThe data captured in web logs is highly unstructured, incomplete, inconsistent and noisy in nature. So to get the quality results after analysis this raw data present in the log files need to be preprocessed. Web log preprocessing is the first and very important step in web usage mining because analysis can be done effectively only if data is clean, consistent and complete. This paper provides an overview of the various types of web log formats, various steps included in web log preprocessing- Data Cleaning, User and Session Identification, Path Completion and various issues and challenges in preprocessing of the log files.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Software Reusability and Web Application Development[Full-Text ]
Naveen Kumar, Girdhar Gopal, Dilbag SinghThe Web engineering is a discipline to develop web based applications. Web applications comprise a very broad area of applications. Many problems occur in development and management of web applications. Some of these problems are discussed in this paper like information storage and code repetition. The solutions to these problems like routing, user controls etc. are also discussed. The solutions described in this paper provide a managed way to tackle the web application contents and make easier updating process for applications.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Exploration of Scan Based Testing Overhead in Design for Testability[Full-Text ]
NeetuGoel, Neeraj Kr. ShuklaScan based architecture are widely used in testing, which provides benefits of testability but at the cost of area and power consumption. Recently research is targeting on to reduce area overhead and low power based scan testing. This paper presents and analyzes the scan based design overhead in terms of power consumption, testing time and test area. Several methods and techniques are purposed to reduce them. Experimental results show that with scan based testing, design area and power is increased by 20% (approx.) as compared to conventional design.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A review of advancement in Multimodal Biometrics System[Full-Text ]
Neha, Ms MonikaThe Unimodal biometrics has many problems such as noisy data, intra-class variations, confined degrees of freedom, non uniformity, spoof attacks, uniqueness , diversenesss, non invariant and spoofy attack. The use of single property works as exclusive source of information for authentication (e.g. fingerprint, face, voice, gait etc.) generally leads to high false acceptance rate (FAR) and false rejection rate (FRR), Failure to Enroll rate(FER). . In order to conquered the limitations provided by unimodal system there is need of system which can combine of two or more attributes types of biometrics systems known as multimodal biometric systems. These systems are more authentic and trustworthy due to the presence of multiple, self contained, individualistic biometrics attributes. The spoofing problem is solved easily because it is very difficult for deceiver to take-off multiple biometric traits. The advantages of multimodal biometric systems is that there are multiple sources of information . As multimodal biometric systems use more than one biometric trait so it provide more security and more reliable and provide maximum accuracy.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Task Scheduling in Cloud Computing[Full-Text ]
Neha Sharma, Sanjay TyagiCloud Computing is also known as on-demand computing. Cloud Computing is based on the concept of centralized storage when computation in distributed data centers is maintained by service provider. Applications of cloud computing are more than a simple internet. Cloud computing use internet as to provide several type of services to users on demand. These services provide with pay per use basis. It processes large amount of data and scheduling of this data in a manageable fashion is a big task. This paper features the concept of cloud computing, review several services and deployment models. It also explores several types of task scheduling mechanism.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
IMAGE STEGANOGRAPHY USING ENHANCED LSB TECHNIQUE[Full-Text ]
NidhiThe art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. Steganography – the art and science of hiding information has gained much attention. Image Steganography is one such field(Image acts as cover media for hiding secret message) with vast applications and opportunities. Image steganeganography is a method of hiding secret messages into a image (cover-media) such that an unintended observer will not be aware of the existence of the hidden messages. This paper is an attempt to analyse the various techniques of image steganography on the basis of parameters like PSNR ratio, MSE, efficiency, robustness and embedding capacity.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages
[1]
[2]