Volume 4 Issue 7- July 2014
Page | Title | Full Text |
---|---|---|
214-216 | Efficient Security Solution for Privacy-Preserving
Cloud Services Priyanka, Sunil Saini Abstract
The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user identification and secure communication. Our solution provides only registered users to access cloud services. Our solution offers anonymous authentication. This means that users’ personal attributes (age, valid registration, successful payment) can be proven without revealing users’ identity. Our solution offers secure communication of transmitted data. Keywords— Authentication, Cloud Computing, Cryptography, Encryption, Privacy, Security. |
Full Text PDF |
217-222 | Performance Testing and Improvement in Agile Ananya Shrivastava,,Dr. Dinesh C. Jain Abstract
There is always scope for performance improvement in any application. But, how do we know where and how to improve? Keyword: Performance Testing, Agile platform, Project requirement. |
Full Text PDF |
223-230 | A Secure Routing Protocol for MANET Dr.Mahmood K. Ibrahem , Ameer M. Aboud Abstract
Mobile ad hoc networks (MANETs) have become a remarkable technology for wireless communication in recent years because of its critical and emergency situations that may cover. Routing protocols for ad hoc network are vulnerable to various types of attack. Security is an essential issue in MANET due to open medium and absence of clear line of defence. Security services are prerequisite for using mobile ad hoc networks in sensitive or inimical environments. This research is dedicated for providing a secure routing protocol for MANET with large number of security services in the network layer. The proposed work integrates IPsec protocol with three routing protocol for MANET; Ad hoc On demand distance vector (AODV), Optimized Link State Routing (OLSR), and Geographical Routing Protocol (GRP) to provide confidentiality, authentication, integrity, and access control for routing information and data messages. The designed secure and unsecure networks are simulated under the effect of two types of attack, Intelligence Pulse Jamming Attack (IPJA) which makes Denial of Services (DoS) and Misbehaviour Attack (MA) which performs malicious action of some nodes with respect to others. Simulation results using Optimized Network Engineering Tool (OPNET) Modulator demonstrates that the throughput is degraded and the end to end delay rises in secure network. Best throughput among these three routing protocol with IPsec integration is IPsec-GRP and the worst is IPsec-AODV, while the best end to end delay of the network in case of IPsec-OLSR and the worst is IPsec-AODV. Network with security services under the effect of MA gives better throughput than the network under IPJA influence but the end to end delay in case of MA is more than as compared with IPJA. Keywords— MANET, IPsec, OPNET, AODV, OLSR, GRP, IPJA, MA. |
Full Text PDF |
231-234 | Suitability of Clustering Algorithms for Crime
Hotspot Analysis Divya G,,Rejimol Robinson R R,Kalai Selvan Abstract
Crime analysis is a field that needs immediate attention due to the drastic increase of number of crimes. Most of the crimes, from the past experiences of the police, are said to be concentrated in some areas, called hotspots and keep on recurring. Clustering algorithms are best applied to crime analysis, but suitability of broad spectrum of clustering algorithm for an application is an issue to be addressed. In this paper we evaluate three clustering algorithms i.e. hierarchical clustering, k-means clustering and DBSCAN clustering with the intent of finding the best one suitable for crime hotspot analysis. Each one of the clustering algorithm evaluated here need inputs such as number of clusters, neighbour distance, minimum number of points etc. are needed by a cluster. The cluster similarity measure is the Euclidean distance. The results suggest that DBSCAN is much more suitable to crime hotspot analysis due to its inherent nature of being density driven. Keywords: Hotspot Analysis, Clustering, Data Mining, Average Link Algorithm, K-means Algorithm, DBSCAN, Davies- Bouldin index. |
Full Text PDF |
235-237 | A Study on Web Services Security Julakanti Preetham Kumar, Dr Syed Umar, Chunduri Sree,Harsha,Bommareddy Nagasai Abstract
A Web Services have appeared as a new Web-based
technology concept for trading information on the Internet
using platform-neutral standards, such as XML and adopting |
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net