Volume 4 Issue 7- July 2014


Page Title Full Text
214-216 Efficient Security Solution for Privacy-Preserving Cloud Services
Priyanka, Sunil Saini

The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user identification and secure communication. Our solution provides only registered users to access cloud services. Our solution offers anonymous authentication. This means that users’ personal attributes (age, valid registration, successful payment) can be proven without revealing users’ identity. Our solution offers secure communication of transmitted data.

Keywords— Authentication, Cloud Computing, Cryptography, Encryption, Privacy, Security.

Full Text PDF
217-222 Performance Testing and Improvement in Agile
Ananya Shrivastava,,Dr. Dinesh C. Jain

There is always scope for performance improvement in any application. But, how do we know where and how to improve?
This paper is meant to equip social control and technical persons with an end to end understanding and knowhow to implement performance testing of web applications concerning their project requirements. It explores and helps in deciding how and when a performance test is beneficial. From basic principles to regard to Agile platform to the sum of implementation with examples constitutes this paper. We have our dark areas for improvements. We pin pointed those areas. Now, how do we improve on those areas? How do we manage this whole performance improvement through process? Get on the interesting and information rich text read what awaits ahead!

Keyword: Performance Testing, Agile platform, Project requirement.

Full Text PDF
223-230 A Secure Routing Protocol for MANET
Dr.Mahmood K. Ibrahem , Ameer M. Aboud

Mobile ad hoc networks (MANETs) have become a remarkable technology for wireless communication in recent years because of its critical and emergency situations that may cover. Routing protocols for ad hoc network are vulnerable to various types of attack. Security is an essential issue in MANET due to open medium and absence of clear line of defence. Security services are prerequisite for using mobile ad hoc networks in sensitive or inimical environments. This research is dedicated for providing a secure routing protocol for MANET with large number of security services in the network layer. The proposed work integrates IPsec protocol with three routing protocol for MANET; Ad hoc On demand distance vector (AODV), Optimized Link State Routing (OLSR), and Geographical Routing Protocol (GRP) to provide confidentiality, authentication, integrity, and access control for routing information and data messages. The designed secure and unsecure networks are simulated under the effect of two types of attack, Intelligence Pulse Jamming Attack (IPJA) which makes Denial of Services (DoS) and Misbehaviour Attack (MA) which performs malicious action of some nodes with respect to others. Simulation results using Optimized Network Engineering Tool (OPNET) Modulator demonstrates that the throughput is degraded and the end to end delay rises in secure network. Best throughput among these three routing protocol with IPsec integration is IPsec-GRP and the worst is IPsec-AODV, while the best end to end delay of the network in case of IPsec-OLSR and the worst is IPsec-AODV. Network with security services under the effect of MA gives better throughput than the network under IPJA influence but the end to end delay in case of MA is more than as compared with IPJA.


Full Text PDF
231-234 Suitability of Clustering Algorithms for Crime Hotspot Analysis
Divya G,,Rejimol Robinson R R,Kalai Selvan

Crime analysis is a field that needs immediate attention due to the drastic increase of number of crimes. Most of the crimes, from the past experiences of the police, are said to be concentrated in some areas, called hotspots and keep on recurring. Clustering algorithms are best applied to crime analysis, but suitability of broad spectrum of clustering algorithm for an application is an issue to be addressed. In this paper we evaluate three clustering algorithms i.e. hierarchical clustering, k-means clustering and DBSCAN clustering with the intent of finding the best one suitable for crime hotspot analysis. Each one of the clustering algorithm evaluated here need inputs such as number of clusters, neighbour distance, minimum number of points etc. are needed by a cluster. The cluster similarity measure is the Euclidean distance. The results suggest that DBSCAN is much more suitable to crime hotspot analysis due to its inherent nature of being density driven.

Keywords: Hotspot Analysis, Clustering, Data Mining, Average Link Algorithm, K-means Algorithm, DBSCAN, Davies- Bouldin index.

Full Text PDF
235-237 A Study on Web Services Security
Julakanti Preetham Kumar, Dr Syed Umar, Chunduri Sree,Harsha,Bommareddy Nagasai

A Web Services have appeared as a new Web-based technology concept for trading information on the Internet using platform-neutral standards, such as XML and adopting
Internet-based procedure. In recent times, Web services have initiate vast attractions in both merchants and researchers. It has become a promising technology to design and build
complex inter-enterprise business applications. With the increasing number of web services available on the web, the need for web services composition is becoming more and more important. Though, the current Web services architectures are confronted with a few contrary problems. This paper gives an outline and classify the existing Web Services
compositions and security.
Keywords: Web Services Composition, Security, Web service Standards

Full Text PDF