Volume-4 Issue-4 (July 2016)
Title: A Secure Data Classification Model in cloud computing using Machine Learning Approach
Authors: Kulwinder Kaur and Vikas Zandu
Abstract: Cloud computing offers numerous benefits including scalability, availability and many services. But with its wide acceptance all over the globe, new risks and vulnerabilities have appeared too. Cloud computing provides facility of storing and accessing information and programs over the web without bothering the storage space on system. Storing the data on cloud eliminates one’s worries about space considerations, buying new storage equipment or managing their data, rather they are able to access their data any time from any place provided they have internet access. But the rising security problems have resisted the organizations from connecting with cloud computing completely. Hence security risks have appeared as the main disadvantage of cloud computing. This paper involves the efforts to analyze the security issues and then proposes a framework to address these security issues at the authentication and storage level in cloud computing. While addressing the security issues the first and the foremost thing is to classify what data needs security and what data needn't bother with security and hence data gets classified into two classes sensitive and non-sensitive. To achieve data classification, a data classification approach based on the confidentiality of data is proposed in this paper. Following that an efficient security mechanism has to be deployed by means of encryption, authentication, and authorization or by some other method to ensure the privacy of consumer’s data on cloud storage.
Click Here to Download Pdf
Title: Analytic study on Distinctive Vulnerabilities of Operating System using Metasploit Framework
Authors: Gurjot Singh and Bhupinder Kaur
Abstract: With cyber attacks becoming the norm, it's a necessity to undertake regular penetration testing and identifying the vulnerabilities in the systems to make sure that the cyber controls are working efficiently. Penetration testing looks at vulnerabilities, tries to exploit them and secure the system by imposing particular patch against those vulnerabilities. The testing is commonly stopped once the attack is successful, i.e. once tester gets an access to a network. The purpose of a penetration testing is to figure out the subject’s ability to resist an attack by a hostile attacker. As such, the tester will be using a similar tricks and techniques a real-life attacker may use. The strategy of this simulated attack permits the subject to find and mitigate its security weak spots before a real attacker discovers them. In this paper, we evaluate the critical vulnerabilities through which the operating systems could hack, malfunctioning or undergo severe attacks and how to analyze these vulnerabilities using the Metasploit Framework. We also summarize the literature regarding penetration testing and operating system vulnerabilities.
Click Here to Download Pdf
Title: Survey on Data Integrity Techniques in Cloud Computing
Authors: Ms Sithara A Satish and Mrs. Shashirekha H
Abstract: This More organizations are opted for outsourcing their data to remote cloud service providers. Customers tend to rent the CSPs to store and retrieve almost unlimited amount of data by paying fees metered in gigabyte/month. To increase the level of scalability, availability, and durability, some customers may want their data to be replicated on multiple servers across multiple data centres. The more copies the CSP is asked to store, the more fees the customers are charged. Therefore, customers need to have a strong guarantee that the CSP is storing all data copies that are agreed upon in the service contract, and all these copies are consistent with the most recent modifications issued by the customers. For this various integrity checking techniques for cloud data storage have been proposed. This paper presents a survey of different Integrity Checking Techniques for remotely stored data on cloud. Comparison of all techniques with their advantages and disadvantages are provided. A survey on comparative analysis of existing integrity check techniques for cloud computing is been done.
Click Here to Download Pdf
Title: Comparison of VIJANA Encipherment with Block Ciphers Based on CPU Utilization
Authors: M. Janaki
Abstract: Cloud computing means storing and sharing data over the Internet. The important security issue of cloud computing is data security when it deals with the sensitive data. Hence strong security mechanism is needed to protect sensitive information. Cryptography is proved to be a strong mechanism to secure the confidential data. It is the art of disguising sensitive data in order to share it through the network. Several encipher and decipher algorithms are available today, everything is having its own strength and weakness. This article sets out to analyse the performance of a noval enchipherment technique known as VIJANA cryptography. This algorithm is compared with the block ciphers that includes RC2, RC6, AES, DES, Triple DES and Blowfish. CPU utilization is the metric taken for comparison. The comparative results are tabulated and visualized as graphs.
Click Here to Download Pdf
Title: Secure Video Steganography Using Encryption Approach
Authors: Charandeep Kaur and Pushpinder Singh
Abstract: Steganography is an excellent means of conversing covertly if there are guarantees on the integrity of the channel of communication. In the steganography process secret information has been embedded behind the cover object.in this paper. To overcome these problem occurred in video Steganography various types of approaches has been studied and LSB+ISB is taken as most appropriate approach for embedding of data. Size of embedded data can be reduced by performing compression to stego video file.
Click Here to Download Pdf
Title: Review on Data Migration Techniques in Cloud Computing
Authors: Deepika and Amanpreet kaur
Abstract: Data migration technology is mainly carried out at two levels, technology of data replication base on storage controller and the technology based on operating system. In this letter, Database immigration is mainly complicated as you have all the experiments of changing your software platform, where some old structures are missing, or behave otherwise and some new features are offered and you’d like to take benefit of those. The data migration ecosystem for big data is productive set of cooperating processes, practices and environments, to collect data from one location , storage medium , or hardware/ software system, to purify, transform and transfer it to another. The processes and performs are governed by rules and disciplines with goal of ensuring information is complete, of high accuracy and consistent.
Click Here to Download Pdf
Title: Contrast Enhancement Using Fuzzy Alternative Sequential Filtering
Authors: Dillip Ranjan Nayak
Abstract: Image contrast enhancement is an important factor for subjective evaluation of image quality. A Hybrid strategy for image enhancement by combining fuzzy sequential filtering with power-law transforms function has been implemented. Initially image fuzzified with membership function and then sequential filtering used for smoothing. Power law enhance the image linearly. It shows better result than other methods.
Click Here to Download Pdf
Title: Edge Detection of Noisy Images Using Fuzzy Smoothing
Authors: Dillip Ranjan Nayak
Abstract: Detection the edges of noisy images is a critical task quality image analysis. This paper proposes an edge detection method which is based on the combination of fuzzy and min-morphological operator. This method effectively removes the noise and gives good detail image edge detection.
Click Here to Download Pdf
Title: Study of Energy Efficient and Fault Tolerant LEACH Protocol for WSN-A Review
Authors: Pardeep Kumar and Ms. Tanisha Saini
Abstract: Energy efficiency is one of the key constraints in order to handle Wireless Sensor Network for longer time span. Energy consumption is one of the biggest drawbacks of the Wireless Sensor Networks as they have to interact and observe physical phenomena at an unprecedented fidelity. Basically WSN’s are the combination of sensing nodes with specified communication range and limited power resources. These networks have their applications in wide range of operations related to sensing, monitoring and observing different events and situations at different locations like in desert, forest, space, home, scientific laboratory military and any other place with critical situation. Once they get deployed, it is very difficult to provide external resources like power to the WSN’s due to the inaccessibility of sensing nodes so it is the key requirement to design and develop an energy efficient protocol for WSN’s for making them operational for longer time duration. LEACH is one of the routing protocols which provide energy efficient way with the help of clustering for data transfer and communication.
Click Here to Download Pdf
Title: ITS and IOT: A Survey
Authors: Junias Kennedy
Abstract: Intelligent transport system is used in different fields to ensure safety to the people. It plays an important role in Transport. Transportation means going or convey the goods from one place to another place. Due to this Transportation faces many issues for this cause intelligent transportation system has been introduced for the safety of the people. ITS is used to enhance the safety of the people and to reduce the accidents, meanwhile Internet of things has also used to overcome the problems in the traffic. By using advanced techniques we can reduce the deaths and injuries caused by the vehicles.
Click Here to Download Pdf
Title: An Analysis of Hierarchical Routing Protocol in Wireless Sensor Networks
Authors: M.Dhurgadevi and Dr.P.Meenakshi Devi
Abstract: Wireless Sensor Networks is composed of small nodes indulged for sensing, computation, and wireless communications capabilities. Routing is essential task of sensor node which collects and forwards the data to the sink node. To improve the energy efficiency various routing protocols are introduced. Each protocol has its own advantages and disadvantages. We presented a survey of the hierarchical routing protocols in WSNs. We highlight the advantages and performance issues of each hierarchical routing Protocol.
Click Here to Download Pdf
Title: Vehicle to Road side unit Communication to detect the Sybil Attack and Prevention using ABC Optimization Technique
Authors: Samiksha and Anit Kaur
Abstract: VANETS is the most prevalent network which is called Vehicular Ad Hoc Network. The researchers make a lot of work in this network. From the Works review, VANETs mechanism on the basis of real time system where the vehicles are moving nodes and travel with a very high rapidity on the highways in the urban areas. There are many security issues like authentication, channel attacks, intelligent system approach, impact detection, congestion avoidance, communication system approach etc. A Vehicular Ad hoc Network involves of a set of communicating wireless mobile nodes or devices that do not have any form of secure organization or integrated authority. The security in VANET has become a significant and active topic within the investigation community. This is because of high demand in sharing streaming video and audio in various applications, one VANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency condition likes disaster liberation operation. In spite of the several attacks aimed at specific nodes in VANET that have been discovered, some attacks involving multiple nodes still receive little attention. A purpose behind this is because people create use of confidence instruments applicable to wired networks in VANET and overlook the security measures that apply to VANET. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to explain the features of different multiple node attacks.In this paper addresses therefore mentioned gap by providing a proper description and classification of Sybil attacks in VANET. In the proposed work DETECT THE SYBIL ATTACK AND PREVENTION OF ARTIFICIAL BEE COLONY OPTIMIZATION has been used with fitness function optimization. The whole reproduction will take place in MATLAB environment. In the end performance is measured by using the parameters like network load, throughput and compare with the existing parameters like packet delivery and throughput.
Click Here to Download Pdf
Title: A Review on Routing Protocols in MANET
Authors: Harmanpreet Kaur, Sunidhi Sharma and Samiksha
Abstract: MANETs are a sort of Wireless ad hoc system that generally has a routable systems administration environment on top of a Link Layer ad hoc network. MANETs comprise of a distributed, self-shaping, self-mending system. Every gadget in a MANET is allowed to move freely in any heading, and will in this manner change its connections to different gadgets regularly. To control the network traffic routing protocols are used that make the network secure and reliable. In this paper, multiple number of routing protocols are describe with their characteristics and features that are used in MANET.
Click Here to Download Pdf
Title: Automated Blood Cancer Detection (LEUKAEMIA) Using Artificial Intelligence by ACO Algorithm with BPNN Classifier under Soft Computing
Authors: Jeenu Garg and Ms. Daljit Kaur
Abstract: In this paper, the time taken to test and detection of Leukaemia (blood cancer) by experts is reduced to some extent with the innovation of automated system that test the blood samples images automatically through the help of some software technique used under soft computing that connects automated system to the real world problems that carries uncertainty and imprecision, totally works as a human mind. This paper helps to remove un-necessary noise from the microscopic blood samples by using filters in software. Leukaemia is the cancer of blood that starts in the bone marrow .There is spongy type material present on the centre of bones where haemoglobin cells create. The affected cell starts in this part of bone marrow and increasing huge in number rapidly. As experts needs microscopic images for studying the human blood that leads to need of some methods, including microscopic colour imaging, segmentation, classification and clustering that helps to allow experts identification of patients suffering from this cancer. The proposed system carry various useful techniques that optimise and classify the different microscopic images collected from cancer hospitals so that this system can check the level of cancer in blood sample with high accuracy without the need of experts and is successfully implemented in MATLAB. Basically, Ant colony optimization swarm intelligence technique is used that is formally used in robotics because this helps the system working same like as ant colony method by finding most efficient shortest path i.e. system artificially creates ants that detect the affected leukaemia cells from number of another cell in less time consumption with high accuracy. Then classifier BPNN is used that is very effective in detecting the errors because the reason is it has number of multiple inputs and outputs that finds the errors fast . BPNN basically trains the system artificially like as it creates a target to achieve the result with maximum accuracy.
Click Here to Download Pdf
Title: A Review on Image Segmentation for Medical Images
Authors: Ruchi Sharma and Raj bhupinder Kaur
Abstract: Image segmentation is frequently characterized as a segment of pixels or picture blocks into homogeneous gatherings. These gatherings are described by a prototypical vector in histograms, e.g., the space of Gabor filter reactions, by prototypical histograms of components or by pair wise dissimilarities between picture squares. For each of the three information positions cost capacities have been proposed to measure distortion and, in this manner, to encode the nature of a segment. Robust algorithms for picture preparing are planned by taking after three stages. In this paper, the performance of PFCM algorithm is discussed and compared to those of many derivatives of FCM algorithm. Experimental results on segmentation of synthetic and real images demonstrate that the proposed algorithm is effective and robust.
Click Here to Download Pdf
Title: A Review on Energy & Fault Tolerance Optimization in WSN Using Mobile Clustering & Recovery Node
Authors: Amandeep Kaur and Raj bhupinder Kaur
Abstract: Wireless sensor networking is a rising technology that has primarily distorted the way, people observes their atmosphere. As an outcome, WSNs is a rapidly growing research area and is being used in very large number of applications. Energy is the main constraint of wireless sensor networks (WSNs) due to irreplaceable and limited power sources of the sensor nodes. Clustering is the most popular topology control method to reduce energy consumption and improve scalability of WSNs. However, in a cluster based WSN, cluster heads (CHs) consume more energy due to extra work load owing to data collection, data aggregation and their communication to the base station.
Click Here to Download Pdf
Title: A Survey on Web Mining
Authors: P. Kavitha
Abstract: Web mining is a mainly focused on learning about the web user and their interaction with web sites and application of web to extract knowledge from World Wide Web. The motive of the web mining is to find user’s access object automatically and promptly from the huge web log data such as continuously access same paths and frequent access groups and separate of data. This paper provides a survey and analysis of current web mining system and technologies. There are three broad category in web mining i) web usage mining ii) web content mining, iii) web structure mining. Through web usage mining, execute six main task pattern analysis, data gathering, navigation pattern discovery, data preparation pattern visualization and pattern application. Web content mining draw useful data from the contents the web documents. In this paper we have discussed about web mining taxonomy, web mining applications and techniques, opportunities and challenges.
Click Here to Download Pdf
issn
Announcements
IJMCSA  IJMCSA

Submit your Paper Last date 20th November 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-6 & Issue-1 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Submit your Paper Last date 20th March 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-5 & Issue-4 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-3 Published (Acceptance Ratio=33%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-2 Published (Acceptance Ratio=27.27%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-1 Published (Acceptance Ratio=75%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-6 Published (Acceptance Ratio=32%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%) http://www.ijmcsa.org/july_issue

IJMCSA  IJMCSA

Volume-4 & Issue-3 Published (Acceptance Ratio=47.22%) http://www.ijmcsa.org/may_issue

IJMCSA  IJMCSA

Volume-4 & Issue-2 Published (Acceptance Ratio=52.17%) http://www.ijmcsa.org/march_issue

IJMCSA  IJMCSA

Volume-4 & Issue-1 Published (Acceptance Ratio=40.90%) http://www.ijmcsa.org/january_issue

IJMCSA  IJMCSA

Volume-3 & Issue-3 Published (Acceptance Ratio=18%) http://www.ijmcsa.org/current_issue

impact factoor
open access
-------------------------------------------------popup-------------------------------------------->