Volume 5 Issue 4- April 2015


Page Title Full Text
66-68 Detecting Spam Zombies
Vivek Fernando, Siddharth Nayak, Suraj Naik

One of the key security threats on the Internet  are compromised machines which are often used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. Spamming provides a key economic incentive for attackers to recruit a large number of compromised machines hence we focus on the detection of the compromised machines in a network that are involved in the spamming activities. These are commonly known as spam zombies. We have developed an effective detection system named SPOT which detects spam zombties by monitoring outgoing messages of a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test, which bounds false positive and false negative error rates.
Keywords—Compromised machines, spam zombies, compromised machine detection algorithms.

Full Text PDF
69-72 A Comparative Study of Pedestrian Identification Approaches for Traffic Light Simulation
Kadamvari, Monika Mehta, Dr. Shailendra Narayan Singh

This paper presents the different approaches for the pedestrians (who cross the road), there is different type of systems developed now days for pedestrians and to control the traffic so that time consumption to reaching the destination by road become less. This type of system is very helpful for both, the one who drive on the road or who walk on the road (pedestrians). There are different approaches used for making such related systems like wise an autofocus study of traffic light and using multi-objective optimization to control the traffic lights timing. As we know that the good management of traffic lights system will ensure the good flow of vehicles and it impact on the less traffic jams and less accidents and all other aspects. This paper presents the comparative study on the field of traffic lights simulation for pedestrians in detail in this paper. To identify the pedestrian who walked over the road and accordingly traffic light system will show the light red, green and yellow. To provide overview in this field, we present this paper so that different systems that are developed till today will be reviewed for the improvement of current system.
Keywords- Automatic Detection, Graphical Information System, Multi-objective Optimization, Traffic Light Timing, Traffic Video Monitoring System.


Full Text PDF
73-75 Key Based Secured Data and Data Storage in Cloud
P.Sailaja , S.Sarath kumar ,K.Jagadeesh ,A.T.Vignesh

Cloud computing is used to store, manage, and process data using a network which is hosted rather than a local server or a personal computer.We proposed  how data are stored and shared in the cloud ,we use a key aggregate cryptosystem which uses both public and private key to encrypt and decrypt the data we are uploading  in the cloud. Then using cpabe algorithm the attribute policy  is created so that unauthorized person cannot modify the data and share data to the others in offline.The  user who is downloading the uploaded data  has to send the aggregate key request to the user who has uploaded the data file,then the user has to send the aggregate key to decrypt the  downloaded file,by checking the authenticated user.  

 Key words— Data sharing, key-aggregate encryption, patient-controlled encryption , cpabe.                          


Full Text PDF
76-80 Detecting Human from Environment: Using AI for embellishing preprocessing step of Human Accedence
Monika , Madhulika, Kadamvari

In order to enhance the surveillance system, detecting human and acceding their behavior is a must requirement. This research paper is presenting a methodology towards improvement of human detection approaches. Human dataset is created through 2D images by developing feature vector of humans using various image processing techniques in order to extract the human contours from the environment. As per the studies head is a most distinct part of human, head features are extracted to train the neural network and make it able to perform classification between human and a non-human entity. 

Keywords- human detection, feature extraction, classification.


Full Text PDF
81-85 Heuristic Approach for Cluster-Based Wireless Sensor Network Design
Reshma Jayesh Rasal, Gajanan S. Deokate

Wireless sensor networks give the alternative to assembling diverse sorts of information at continous intervals, even various times every second and over tremendous zones. WSNs grant the environmentalists and field researchers to partake in heightened, broad testing and accumulate new sorts of information with no issue. Wireless sensor networks have extending recurring pattern limits and will allow analysts to lead analyzes that are not reasonable at this point. Frequently, sensors have limited energy and are at risk to the parts in the territory. System operations, all things considered, incorporate infrequently changing decisions of system stream to enhance the system lifetime which remotely supervised for recuperating the assembled information by a customer through web. This paper considers the cluster based data gathering get-together issue related to a fused topology control and routing in WSNs. To upgrade the system lifetime by successfully using the limited energy at the sensors, this proposed framework pick a decision of hierarchical system structure with diverse sinks at which the information assembled by the sensors are collected through the ClusterHeads(CHs).
The proposed framework considers a mixed-integer linear programming (MILP) model to in a perfect world center the sink and CH area and the information flow in the system. This model enough uses both the position and energy level parts of the sensors while selecting the Chs and keep up a vital separation from the most bewildering energy sensors that are modestly arranged sensors with respect to sinks being picked as CHs again and again in progressive periods. The current work focuses on the change of a convincing Benders deterioration (BD) approach that wires an upper bound heuristic algorithm, fortified cuts, and a perfect framework for animated union for MILP model. Computational confirmation demonstrates the benefit of the BD approach and the heuristic the extent that plan quality.

Keywords - Benders decomposition (BD), network design, wireless sensor networks (WSNs), mixed-integer linear programming (MILP)model.


Full Text PDF
86-89 Traceability Mechanism for Sharing Data in Cloud
Kedar Jayesh Rasal, Sandip A. Kahate

Cloud is basic place to store information and imparted to various users. In any case some framework issue or human error produces more issues about integrity of cloud data. Couple of systems has been intended to allow both data owners and public verifiers to effectively auditing cloud data integrity without getting to the whole information from the cloud server. Specifically, we consider the work of third party auditor (TPA), for the advantage of the data owner, to check the integrity of the information/data put away in the cloud. Likewise, our method has the capacity perform a several auditing task in the meantime as opposed to conforming them one by one. In our work we utilize ring signatures to gauge conformation meta-data anticipated that would review the rightness of different data, additionally the Key Distribution Center (KDC) which is a part of a cryptosystem proposed to decrease the risk intrinsic in exchanging keys. With our technique, the recognizable identification of the signer on every piece in distributed data is kept private from Third party auditors, who have the capacity to effectively check the circulated data unwavering quality without recovering the entire record. The plan supports creation, alteration, and reading data put away in the cloud, and it additionally supports traceability (tracking the fake users).

Keywords- Cloud Computing, Public Auditing, Shared Data, Key Distribution Center, Traceability


Full Text PDF