Volume 5 Issue 7- July 2015

 

Page Title Full Text
214-218 Secure Mutual Authentication for Cloud Environment
Shipra Kataria, Rupali Syal
Abstract

AbstractCloud computing is a service oriented technology which provides various services to users which vary from software to hardware. However, ensuring the security in cloud computing environments is one of the most challenging issues. In cloud, when two parties communicate with each other, mutual authentication is needed for secure communication. This paper proposes a secure mutual authentication model for cloud environment. The authentication is handled by software-as-a-service application (ASaaS). Modified Diffie Hellman agent (MDHA) is used to provide mutual authentication which interacts with ASaaS instead of cloud server. The scheme provides authentication by using a four step process. Another agent named cryptography agent is used to provide encryption of data before uploading on the cloud. According to the analysis of the proposed scheme, it is resistant from many attacks like Man in the Middle attack.

Keywords: Cloud computing; authentication; cryptography;  encryption

Full Text PDF
219-223 An Energy Efficient, Secure and Trust Aware Routing Protocol in MANET
Jaspreet Kaur,Dr. Sandeep Harit
Abstract

Mobile ad hoc network (MANET) security has become the primary focus of research efforts in ad hoc communication environment. Dynamic nature of MANET results into unique and considerable difficulties of providing security. Many security schemes have been proposed to protect the communication in an ad hoc network. This paper includes detailed analysis on secured extension to AODV i.e Secure ad hoc on demand distance vector protocol (SAODV) and TSAODV . In this paper, we provide an overview of various attributes, dataset, key parameters and methods adopted for vulnerability analysis of Manet protocols to identify unresolved threats to the algorithm, such as malicious node misbehavior, resources depletion, resources consumption, Denial of service and replay attacks. A vulnerability analysis of security extensions to AODV protocol and results concluded by various researchers are also included. This paper includes a proposed methodology to make SAODV protocol more robust, reliable and energy efficient protocol to overhear cryptography and long term communication.
Keywords—  SAODV, encryption, trust, energy 

Full Text PDF
224-228 An Approach of Attribute Based Cryptosystem in Cloud Storage
Ranjini R, Girish, Phaneendra H D, Usha Rani J
Abstract

In this world of the internet, people are increasingly opting for cloud storage for saving their data to off-site storage systems that are maintained by 3rdparties. Risks of losing important files and information are easily avoided by storing data on cloud storage. In this paper, we show how sensitive and confidential information can be shared securely, efficiently, and flexibly with others in cloud storage without unauthorized access. Here we show Cryptosystem scheme for data storage in cloud. One of the important techniques is ABE (Attribute Based Encryption). ABE is a public-key based one to many encryption techniques which allows users to encrypt and decrypt data based on user attributes. This technique effectively secures the data and also provides the correctness of the retrieved data along with the recovery mechanism for the transmitted data in case of malicious attack. The implementation of this scheme will show the correctness of the secure data storage and also advantages over other techniques supporting secure data storage in cloud.

Keywords: Cryptosystem, Key aggregation techniques, ABE (Attribute based encryption).

Full Text PDF
229-231 Symmetric Two Server Password Only Authenticated Key Exchange with Periodic Backup
Nishikant S. Burande, Dr. S.V. Gumaste
Abstract

Two Server Password only authenticated key exchange protocol is most secure technique. It avoids dictionary attack and other threats. By using two servers it is possibility that one of server may shut down due to some reason. So system will collapse. To continue with the system with this fault, making extension of taking periodic backup facility. Because if only backup is taken then there is possibility of redundancy. Here backup are stored on both Server1 and Server2, Server1 will store backup of Server2 and vice versa.

Keywords— PAKE, Elgamal, Diffie-Hellman,Periodic Backup, Encryption

Full Text PDF
232-233 A Distributed Control Law for Load Balancing in Content Delivery Networks
Shendage Swapnil Sunil, Dr. Deshmukh Pradeep K,Prof. Dhainje Prakash B.
Abstract


Full Text PDF
234-239 Improved AODV routing protocol for mitigating effects of Grayhole Attack in VANET using Genetic Algorithm
Gurleen Kaur , Ms. Sudesh Rani, Dr.Trilok C. Aseri
Abstract

Recent advancement in technology related to wireless communication has given rise to VANET.VANET is the application of MANET that relies on vehicles for network functionality and prone to many kinds of attack. Grayhole attack is one of the common Denial Of service attack that causes malicious change in the routing process of effected nodes.Grayhole attack adversely effects various network parameters like throughput, end to end delay, packet delivery ratio and other concerned parameters. Due to lack of security in Ad hoc on demand distance vector routing protocol, Grayhole attack disrupts the performance of network and render communication impossible.This paper proposes metaheuristic algorithm genetic algorithm for minimizing the effect of grayhole attack in VANET and enhancing the network against attack. The performance of the network has been evaluated using average throughput, bit error rate, average end to end delay, and packet delivery ratio and packet loss. The GA shows a relevant good amount of growth in each and every parameter of the calculations. 

KeywordsVehicular Ad hoc Network (VANET), Ad-hoc On Demand Distance Vector (AODV), Route Request (RREO),Route Reply(RREP), Denial of Service Attack(DOS),Genetic Algorithm(GA)


Full Text PDF
240-242 Caching of Data in Social Wireless Networks
Shruthi B, K Praveen Kumar
Abstract

Social wireless networks are the networks in which the nodes are splits in a wireless network for an effective communication. Social wireless networks are common in mobile devices such as data-enabled phones and in some other mobile devices. These are used to share common interests such as to share the electronic content in networks. Electronic object caching in such networks will be reduce the content provisioning cost which depends heavily on service and pricing dependencies among content providers, network service providers and end consumers. In this paper the cooperative caching policies have been proposed to reduce the content provisioning cost in Social Wireless Networks. It also develops network, service and pricing models. They are used for creating two cooperative caching strategies. These strategies are used for minimizing the content provisioning cost in networks with homogenous and heterogeneous object demands. In this project the analytical and simulation models have been proposed in-order to check the performance of the proposed caching strategies.

Keywords: Wireless Network, Content Provider


Full Text PDF
243-245 Dynamic Resource Management in Communication Networks
D.Srikanth, Raghupathi, K.Praveen Kumar
Abstract

We study the best usage-based rating downside in an incredibly resource-constrained network with one increasing service supplier and multiple teams of surplus-maximizing users. With the idea that the service supplier is aware of the utility operate of every user (thus complete information), we discover that the entire value differentiation theme can do an over sized revenue gain (e.g., 50%) compared to no value differentiation, once the entire network resource is comparably restricted and therefore the high-willingness-to-pay users are minorities. However, the entire value differentiation theme could result in a high implementational quality. To trade off the revenue against the implementational complexity; we tend to any study the partial value differentiation theme and style a polynomial-time formula which will cipher the best partial differentiation costs. We tend to additionally think about the unfinished data case wherever the service supplier doesn't understand to that cluster every user belongs. We tend to show that it's still doable to comprehend value differentiation beneath this situation and supply the sufficient and necessary condition under that an incentive-compatible differentiation theme can do similar revenue as beneath complete data.

Index Terms—Network pricing, price differentiation, resource allocation, revenue management.


Full Text PDF
246-249 Providing Security in Cloud by Using Two Layer Encryption Access Control
M.Dinesh ,V.Srujan, K.Praveen Kumar
Abstract

The motivation of this paper is to propose a secure Access control scheme, for public clouds. We proposed a Privacy Preserving Two layer Encryption Access control in public clouds, which provides more privacy and security compared to the traditional approaches. Current approaches to enforce ACPs on outsourced data using selective encryption require organizations to manage all keys and encryptions and upload the encrypted data to the remote storage. Such approaches incur high communication and computation cost to manage keys and encryptions whenever user credentials change. In this paper, we proposed a two layer encryption based approach to solve this problem by delegating as much of the access control enforcement responsibilities as possible to the Cloud while minimizing the information exposure risks due to colluding Users and Cloud.

Keywords: - Access Control, Anonymous Data, Cloud Computing, Privacy preserving, Two layer encryption.


Full Text PDF
250-254 Hybrid Encryption Scheme for Hadoop Based Cloud Data Security
Charanjeet Kaur , Gurjit Singh Bhathal
Abstract

Cloud computing is a concept in which services (Iaas, Paas, and Saas) are leased to the user as per imposition.  Cloud computing entire data resides over a set of network resources; this data can be accessed through virtual machines like mobiles PC etc. Cloud computing reduces hardware, maintenance and installation cost. But security is major issue that prevents users for cloud computing. When we relocate data to cloud we use standard encryption technique to secure the data. But when we have to do computations on data hoarded on cloud then we have to decode data i.e. provide private key every time which is not a secure methodTrusted computing and security of services is one of the most challenging topics today and is the cloud computing’s core technology that is currently the focus of international IT universe. Hadoop, as an open-source cloud computing and big data framework, is increasingly used in the business world, while the weakness of security mechanism now becomes one of the main problems obstructing its development. This paper first describes the hadoop project and its present security mechanisms, then analyzes the security problems and risks of it, pondering some methods to enhance its trust and security and finally based on previous descriptions, concludes Hadoop's security challenges.

Keywords-Security; Trust; Hadoop; Big Data; Mapreduce;


Full Text PDF
255-258 Analysis of Performance of Different Routing Protocols with Varying Number of Nodes: A Review
Akashdeep Mahio, Karandeep Singh
Abstract

The field of Mobile Ad hoc Networks (MANETs) has become very popular and an important part in research. It is a dynamic wireless network in which there is no need of any specific structure to perform its (MANET) operations. Due to increase in availability and popularity of mobile wireless devices, researchers are working to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols. This helps to exploit the unique communication opportunities presented by these devices. Simulation is the main method used for evaluating the performance of MANETs. In this paper performance of different protocols (AODV, AOMDV, DSR, DSDV) is analyzed by putting them in different environments. This environment is created by creating different scenarios on the basis of changing number of nodes. This paper evaluates their relative performance with respect to the three performance metrics: average End-to-End delay, Throughput and packet delivery ratio. From the detailed simulation results and analysis, a suitable routing protocol can be chosen for a specified network and goal.
Keywords: AODV, AOMDV, DSDV, DSR, MANET


Full Text PDF
259-263 Privacy Protection of Base Station in WSN's
Gaddam Uday, Raghupathi, K.Praveen Kumar
Abstract

Abstract: Location privacy in wireless sensor networks has gained a wide concern. Particularly, the location privacy of base station requires ultimate protection due to its crucial position in wireless sensor networks. In this paper, we propose an efficient scheme, consisting of anonymous topology discovery and intelligent fake packet injection (IFPI), to protect the location privacy of base station. Anonymous topology discovery eliminates the potential threats against base station within topology discovery period. On the other hand, IFPI enhances privacy protection strength during data transmission period. Under given conditions, comprehensive simulations demonstrate that our scheme significantly improves privacy strength compared with existing strategies.

Index Terms: Location Privacy; Base Station.



Full Text PDF
264-266 Distributed Real-Time Database System Model and Performance Metrics Based on QoS
Chirra Priyanka, K Praveen Kumar
Abstract

In Distributed algorithm an algorithm for anonymous distributing of private facts and figures among parties is evolved. This method is utilised iteratively to accredit these nodes ID figures extending from 1 to N . This assignment is anonymous in that the identities received are unknown to the other constituents of the group. This allotment of successive numbers permits more complex facts and figures to be distributed and has submissions to other difficulties in privacy preserving data excavation, collision avoidance in communications and circulated database access. The needed computations are circulated without utilising a trusted central authority. The QOS such as end-to-end hold up, collision avoidance, Best-effort service and traffic shaping is achieved in circulated system.

 Keywords: Quality of Service(Qos), Distributed system, Data sharing.



Full Text PDF
267-271 Hand Gesture Recognition Using PCA
Mandeep Kaur Ahuja ,Dr. Amardeep Singh
Abstract

Interacting with physical world using expressive body movements is much easier and effective than just speaking. Gesture recognition turns up to be important field in the recent years. Communication through gestures has been used since early ages not only by physically challenged persons but nowadays for many other applications. As most predominantly hand is use to perform gestures, Hand Gesture Recognition have been widely accepted for numerous applications such as human computer interactions, robotics, sign language recognition, etc. This paper focuses on bare hand gesture recognition system by proposing a scheme using a database-driven hand gesture recognition based upon skin color model approach and thresholding approach along with an effective template matching with can be effectively used for human robotics applications and similar other applications.. Initially, hand region is segmented by applying skin color model in YCbCr color space. In the next stage otsu thresholding is applied to separate foreground and background. Finally, template based matching technique is developed using Principal Component Analysis (PCA) for recognition. The system is tested with the controlled and uncontrolled database and shows 100% accuracy with controlled database and 91.43% with low brightness images.

Keywords: hand, gesture, recognition, segmentation.



Full Text PDF
272-277 Text Extraction from Natural Scene using PCA
Tajinder Kaur, Nirvair Neeru
Abstract

Many techniques and algorithm have been developed to solve the problem of text extracted from natural scenes. Text extraction is emerging and challenging era in the computer vision. Text which is embedded into the image contains semantic information which is used in many other applications such as information retrieval of complex images, robot navigation, useful for visually impaired persons, street signs, automatic read the sign board and use in so many other applications. Most of the research work in this area has been done only on printed text, a very few research is addressing the LED scene text. Scene text is difficult to extract due to blur image, variations in color, noise problem, complex background, discontinuity, poor lighting conditions, and variation in illumination. LED is Light Emitting Diode which is widely used in displaying the information in LED boards. Now days LED display that is natural scene is being widely used for displaying announcements, sign boards, banners for displaying information. To extract the text from the LED display is not an easy task, it is very complex due to its discontinuity. A matrix of segments is used to display the character of LED, which is combined together to generate an LED text. So, The aim of this paper to propose a technique to extract an LED text from natural scene image. In the preprocessing step, The RGB input image will be converted to a grayscale image, image is binarization and noise is removed.  Then FFT and FFT shift is used to extract the text region because the text is generally found in higher frequency and it is the fastest method. The text or non-text region is classified. Finally, apply the template matching method is developed using PCA, which is used to recognize the extracted text and display in boundary boxes. The experimental results of the proposed method show the extraction rate is 73.25.

Keywords— Connected Component method, FFT method, FFT shift, MSER, Morphological operations, PCA, Text extraction.



Full Text PDF
278-282 Performance Evaluation of Novel Historical Documents Restoration Algorithm
Neha Kundal , Anantdeep
Abstract

Historical documents contain important contemporary information about a person, place, events of that era. A beautiful work on medicine, religion and science written by the scholars, called Vedas, is preserved in India. The histories of civilizations are stored in libraries and museums. Around the world, there is a treasure of excellent literature, which cannot be accessed by most of the people in the world because of time and travel cost. By restoring these historical documents digitally and putting them into a digital library, powerful opportunities for improving knowledge and providing historical background can be available.
Image restoration is the process which is used to restore a degraded document back to the original image. Image Restoration involves denoising using filter techniques like Gaussian Filter, Fuzzy Filter etc.
In this Paper Images have been restored using OTSU Thresholding, SAUVOLA Thresholding and Hybrid Method.



Full Text PDF
283-287 Google Safe Browsing – Web Security
Priyam Kaur Sandhu,Sanjam Singla
Abstract

Google safe browsing is the new shimmer in the market to safeguard the web browsers. Now a days, the web browsers such as Internet Explorer, Mozilla Firefox and Google Chrome are installed on almost all the computers and are used so frequently that their configuration should be done securely. The plug-in extensions are the lucrative vectors for the malwares. The lack in the security mechanism leads to intrusion of malwares in the systems. So it becomes imperative to configure the web browser for safer internet security. A List of URLs is provided by Google that consists of phishing and malware data. This list is used by various web browsers to check the pages against potential threats. The introduction of the Safe Browsing is a life saviour step towards securing the internet surf by the users. This paper gives an overview about how Google provides web security by providing various checklists and focuses on, how a particular site can be analysed in order to mitigate the threat.

Keywords— Google safe browsing; Malwares; Phishing; API; Security



Full Text PDF
288-290 Implementing Low Complexity FIR Filter Using IFIR Technique
Dilraj Kaur, Sangeet Pal Kaur
Abstract

FIR filters are extensively used because of the ease implementation, inherent stability and linear phase. But they have the limitation that their complexity increases as the order of the filter increases. The complexity of linear-phase finite-impulse response (FIR) filters is dominated by the complexity of coefficient multipliers. The number of adders (subtractors) used to implement the multipliers determines the complexity of the FIR filters. Although the complexity of multiplier blocks is significantly reduced by using efficient techniques such as decomposing multiplications into simple operations and sharing common subexpression. In this paper, we present an IFIR technique to minimize the complexity of multiplier blocks. Here the prototype filter is designed using interpolated finite impulse response (IFIR) technique. The stretched factor is chosen in such a way so that computational cost will be reduced. The IFIR approach leads to reduction in stopband energy in magnitude response of the prototype filter. There is a savings in computational complexity and improvement in performance with respect to the previous works. FIR filter design method and the frequency response method were presented but they were improved upon with the IFIR design technique. The results shown that the computational cost of a Interpolated FIR (IFIR) is less with comparing the computational cost of a FIR filter.

Keywords— Canonical signed-digit(CSD), Interpolated filtering (IFIR), Finite impulse response filter (FIR).



Full Text PDF
291-294 PAPR reduction of OFDM signals using PTS and Gaussian Firefly Algorithm
Sandeep Kaur Virk
Abstract

Orthogonal frequency division multiplexing (OFDM) method is a promising technique in this regard as it offers high data rate and reliable communications over several fading channels. But the main drawback of OFDM is the high peak to average power ratio (PAPR). In this thesis we present the technique to reduce the PAPR using Firefly algorithm in multicarrier modulation system. Simulation results show that the proposed scheme considerably outperforms the conventional system.



Full Text PDF

 

 

 

 

 

IJCSET Menu

Downloads