Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryption
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1094-1107, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10941107
Abstract
Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising cryptographically primitive to build a practical data sharing system. However, access control is not static. That is, when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. To this end, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which can provide the forward/backward security of cipher text by introducing the functionalities of user revocation and cipher text update simultaneously. Furthermore, we present a concrete construction of RS-IBE, and prove its security in the defined security model. The performance comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system. Finally, we provide implementation results of the proposed scheme to demonstrate its practicability.
Key-Words / Index Term
Cloud computing, data sharing, revocation, Identity-based encryption, ciphertext update, decryption key exposure
References
[1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50–55, 2008.
[2] iCloud. (2014) Apple storage service. [Online]. Available: https://www.icloud.com/
[3] Azure. (2014) Azure storage service. [Online]. Available: http://www.windowsazure.com/
[4] Amazon. (2014) Amazon simple storage service (amazon s3). [Online]. Available: http://aws.amazon.com/s3/
[5] K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, “Social cloud computing: A vision for socially motivated resource sharing,” Services Computing, IEEE Transactions on, vol. 5, no. 4, pp. 551–563, 2012.
[6] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013.
[7] G. Anthes, “Security in the cloud,” Communications of the ACM, vol. 53, no. 11, pp. 16–18, 2010.
[8] K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013.
[9] B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2904–2912.
[10] S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized access control with anonymous authentication of data stored in clouds,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 384–394, 2014.
[11] X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J. Zhou, “Cost-effective authentic and anonymous data sharing with forward security,” Computers, IEEE Transactionson,2014,doi: m10.1109/TC.2014.2315619.
[12] C.-K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,”
[13] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985, pp. 47–53.
[14] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586– 615, 2003.
[15] S. Micali, “Efficient certificate revocation,” Tech. Rep., 1996.
[16] W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” in Advances in Cryptology–CRYPTO 1998. Springer, 1998, pp. 137–152.
[17] D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Advances in Cryptology– CRYPTO 2001. Springer, 2001, pp. 41–62.
[18] C. Gentry, “Certificate-based encryption and the certificate revocation problem,” in Advances in Cryptology–EUROCRYPT 2003. Springer, 2003, pp. 272–293.
[19] V. Goyal, “Certificate revocation using fine grained certificate space partitioning,” in Financial Cryptography and Data Security. Springer, 2007, pp. 247–259.
[20] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proceedings of the 15th ACM conference on Computer and communications security. ACM, 2008, pp. 417–426.
[21] B. Libert and D. Vergnaud, “Adaptive-id secure revocable identitybased encryption,” in Topics in Cryptology–CT-RSA 2009. Springer, 2009, pp. 1–15.
[22] ——, “Towards black-box accountable authority ibe with short ciphertexts and private keys,” in Public Key Cryptography–PKC 2009. Springer, 2009, pp. 235–255.
[23] J. Chen, H. W. Lim, S. Ling, H. Wang, and K. Nguyen, “Revocable identity-based encryption from lattices,” in Information Security and Privacy. Springer, 2012, pp. 390–403.
[24] J. H. Seo and K. Emura, “Revocable identity-based encryption revisited: Security model and construction,” in Public-Key Cryptography– PKC 2013. Springer, 2013, pp. 216–234.
[25] “Efficient delegation of key generation and revocation functionalities in identity-based encryption,” in Topics in Cryptology CT- RSA 2013. Springer, 2013, pp. 343–358.
[26] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloudbased revocable identity-based proxy re-encryption scheme for public clouds data sharing,” in Computer Security-ESORICS 2014. Springer, 2014, pp. 257–272.
[27] D.-H. Phan, D. Pointcheval, S. F. Shahandashti, and M. Strefler, “Adaptive cca broadcast encryption with constant-size secret keys and ciphertexts,” International journal of information security, vol. 12, no. 4, pp. 251–265, 2013.
[28] R. Anderson, “Two remarks on public-key cryptology (invitedlecture),” 1997.
[29] M. Bellare and S. K. Miner, “A forward-secure digital signature scheme,” in Advances in Cryptology–CRYPTO 1999. Springer, 1999, pp. 431–448.
[30] M. Abdalla and L. Reyzin, “A new forward-secure digital signature scheme,” in Advances in Cryptology–ASIACRYPT 2000. Springer, 2000, pp. 116–129.
[31] A. Kozlov and L.Reyzin, “Forward-secure signatures with fast key update,” in Security in communication Networks. Springer, 2003, pp. 241–256.
[32] X. Boyen, H.Shacham, E. Shen, and B. Waters, “Forward-secure signatures with untrusted update,” in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 191–200.
[33] J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen, “Forwardsecure identity-based signature: security notions and construction,” Information Sciences, vol. 181, no. 3, pp. 648–660, 2011.
[34] R. Canetti, S. Halevi, and J. Katz, “A forward-secure public-key encryption scheme,” in Advances in Cryptology–Eurocrypt 2003. Springer, 2003, pp. 255–271.
[35] D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya, “Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption,” in Proceedings of the 11th ACM conference on Computer and communications security. ACM, 2004, pp. 354–363.
[36] J. M. G. Nieto, M. Manulis, and D. Sun, “Forward-secure hierarchical predicate encryption,” in Pairing-Based Cryptography–Pairing 2012. Sprnger, 2013, pp. 83–101.
[37] A. Sahai, H. Seyalioglu, and B. Waters, “Dynamiccredentials a ciphertext delegation for attribute-based encryption,” in Advances in Cryptology–CRYPTO 2012. Springer, 2012, pp. 199–217.
[38] B. Waters, “Efficient identity-based encryption without random oracles,” in Advances in Cryptology–EUROC Springer, 2005, pp. 114–127.
[39] B. Lynn. (2014) Pbc library: The pairing-based cryptography library.
Citation
Maadala Chandra Sekhar, Keerthi Kethineni, "Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryption," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1094-1107, 2018.
Process Mining - A Comprehensive Review
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1108-1113, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11081113
Abstract
Process mining is an emerging research field of computer science, which utilizes automatically generated event logs in information system. An event log contains time stamped record for events which refer to activities under taken for specific cases. Event log also store additional information regarding event such as resources linked to the activity, or data elements recorded with the event. To allow these events to happen in parallel to the current state of a process may be represented by multiple nodes. Those process model can follow the notation of petri nets and Business process Modelling Notation (BPMN), widely used for their improvement. Process model guidance is an important model feature by which the software process is orchestrated. Process mining techniques have been used in business process domain with no focus on the software engineering processes. These techniques have produced faster results and the ability to check conformance and compliance. This paper discussed the basic concepts, applications, frameworks, types, algorithms and research issues of process mining.
Key-Words / Index Term
Process Mining(PM), Educaional Process Mining(EPM), Process Mining techniques, Business Process Modelling(BPM), Event Logs.
References
[1]. AALST, W. VAN DER, “Process Mining: Discovery”, Conformance and Enhancement of Business Processes.Springer-Verlag, Berlin, 2011.
[2]. AALST, W. VAN DER, SCHONENBERG, M and SONG, “Time Prediction Based on Process Mining.Information Systems”2011.
[3]. AALST, W. VAN DER and STAHL, “Modeling Business Processes: A Petri Net Oriented Approach”, Business Process Management: Concepts, Languages, Architectures. Springer-Verlag,Berlin, 2011.
[4]. Wil van der Aalst chistian jan recker and Manfred Reichert, Eindhoven university of technology.
[5]. van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow Mining: Dis-covering Process Models from Event Logs. IEEE Transactions on Knowledge andData Engineering 16 (2004) 11281142.
[6]. van der Aalst, W.M.P., van Hee, K.M.: “Workflow Management: Models, Methods,and Systems”, MIT Press, Cambridge, Massachusets (2002)
[7]. Khodabandelou G, Hug C, Deneckere R, Salinesi C, “Processmining versus intention mining” Enterprise,Business-Process and Information Systems Modeling.Springer Berlin Heidelberg,Valencia, Spain; 2013,466–480.
[8]. Agrawal R, Srikant R. “Mining sequential patterns”,Data Engineering Proceedings of the Eleventh International Conference. IEEE, Taipei, Taiwan; 1995, 3–14.
[9]. Nesbit JC, Zhou M, Xu Y, Winne P. “Advancing loganalysis of student interactions with cognitive tools”,12th Biennial Conference of the European Associationfor Research on Learning and Insruction (EARLI). Budapest, Hungary; 2007, 2–20.
[10]. Reimann P, Frerejean J, Thompson K,“Using processmining to identify models of group decision making in chat data”,9th international conference on Computer supported collaborative learning,Vol. 1. Rhodes, Greece; 2009, 98–107.
[11]. Washio T, Motoda H. State of the art of graph-baseddata mining. Acm Sigkdd Explor Newslett 2003,5:59–68.
[12]. Günther CW, Van Der Aalst WM, “Fuzzy mining–adaptive process simplification based on multiperspectivemetrics”, International Conference onBusiness Process Management. Springer Berlin Heidelberg;Brisbane, Australia; 2007, 328–343.
[13]. Van der Aalst, W., Weijters, A. AndMaruster, L, “Workflow mining:discovering process models from eventlogs”, IEEE Transactions on Knowledgeand Data Engineering, 16(9),1128–1142, 2004.
[14]. Rozinat, A. and van der Aalst, W. (2006a),“Conformance testing: measuring the fit andappropriateness of event logs and processmodels”, Workshops (Workshopon Business Process Intelligence), 3812,163–176, 2005
[15]. Rozinat, A. and van der Aalst, W. (2006b)“Decision mining in ProM”, InternationalConference on Business ProcessManagement (BPM 2006), 4102, 420–425.
[16]. Mekhala, “A review paper on process mining”, International journal of engineering and techniques- volume 1 issue 4, july-aug 2015.
[17]. W.M.P.van der aalst and a.j.m.m.weijters, “Process Mining:A research Agenda”, Eindhoven university of technology.
[18]. Van der aalst, W.M.P. 2011, “Process mining:Overview and oppurtunities”, ACM trans. Management information system 99, article 99.
[19]. Gabriel M. Veiga and Diogo R. Ferreira, “Understanding Spaghetti Models with Sequence Clustering for ProM”
Citation
S. Vijayarani, A. Sakila, R. Ramya, "Process Mining - A Comprehensive Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1108-1113, 2018.
A Literature Review On Satellite Image Data Enhancement Using Digital Image Processing
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1114-1119, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11141119
Abstract
Image enhancement is one of the characteristic of image processing which is used for different real time application such as medical, scientific, geographical and military etc. In this paper, we mainly focus on the literature study of satellite image data enhancement. The major issues of satellite images are enhancement of gray-scale/colour image, noise, weak colour information, artifacts, distortion, large size, resolution high frequency content etc. To obtain the improved quality of satellite image various image processing techniques has been developed such as DWT, SVD, DT-CWT etc. and different authors also proposed some mechanism or algorithm of the image enhancement. This paper also presents the overview of various image enhancement techniques.
Key-Words / Index Term
DWT, SVD, Geographical, Image Enhancement, Satlleite data
References
[1] P. Suganya, N. Mohanapriya, B. Kalaavathi, “Satellite image resolution enhancement using multi wavelet transform and comparison of interpolation techniques”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321-7308, Volume: 03 Special Issue: 07 | May-2014.
[2] Vaibhav R. Pandit, R. J. Bhiwani, “Image Fusion in Remote Sensing Applications: A Review”, International Journal of Computer Applications (0975 – 8887) Volume 120 – No.10, June 2015.
[3] Deepali M. Bongulwar “Satellite Image Enhancement”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 6, Issue 6, June 2017.
[4] Wenkao Yang, Jing Wang and Jing Guo, “A Novel Algorithm for Satellite Images Fusion Based on Compressed Sensing and PCA”, Hindawi Publishing Corporation, Mathematical Problems in Engineering, pp. 1 – 10, Volume 2013.
[5] Lasmika, K. Raveendra, "Improving Quality of Satellite Image by Wavelet Transforming & Morphological Filtering", International Journal of Innovative Research in Science, Engineering and Technology, ISSN: 2319- 8753,Vol. 3, Issue 7, July 2014.
[6] Khaled SAHNOUN, Noureddine BENABADJI “On-Board Satellite Image Compression Using The Fourier Transform And Huffman Coding”
[7] Xue Mei Li “Image Enhancement in the Fractional Fourier Domain” in proceeding IEEE, 2013.
[8] Bhateja, V. “Improvement of masses detection in digital mammograms employing non-linear filtering”, Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on March 2013, Page(s): 406 – 408.
[9] Zouari, M. “A non linear stretching image enhancement technique for micro-calcification detection”, Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on March 2014, Page(s): 193 – 197.
[10] Vijay Tonder, Vivek Shukla2, Rohit Miri “Improving Quality of Satellite Images Using Enhancement Filters and Fuzzy Based Contrast Enhancement Technique”, International Journal of Innovative Research in Computer and Communication Engineering.2017
[11] Mansing Rathod, Jayashree Khanapuri “Satellite Image Resolution Enhancement Using SWT and DWT with SWT”, International Conference on Nascent Technologies in the Engineering Field (ICNTE-2017) in proceeding of IEEE.
[12] R. Aedla, G. S. Dwarakish and D. V. Reddy, "Satellite image contrast enhancement algorithm based on plateau histogram equalization," Region 10 Symposium, 2014 IEEE, Kuala Lumpur, 2014, pp. 213-218.
[13] Sos S. Agaian, Blair Silver and L. Karen A. Panetta, “Transform coefficient histogram-based image enhancement algorithms using contrast entropy” IEEE Trans. On Image Process, vol. 16,no. 3, Mar. 2007.
[14] Hasan Demirel and Gholamreza Anbarjafar, “Discrete Wavelet Transform-Based Satellite Image Resolution Enhancement” IEEE Transactions On Geoscience And Remote Sensing, Vol. 49, No. 6, June 2011.
[15] R. C. Gonzalez and R. E. Woods “Digital Image processing (2nd Edi- tion)”. Prentice Hall, January 2002.
[16] Mallat, S.G. “Multifrequency channel decompositions of image and wavelet models “, IEEE Trans. Acoust. Speech Signal Process., 1989, 37, (12), pp. 2091–2110
[17] Chan, R.H., C.W. Ho and M. Nikolova “Salt-and pepper noise removal by median-type noise detectors and detail-preserving regularization.
[18] Mohanapriya N, Kalaavathi B “Comparative Study of Different Enhancement Techniques for Medical Images” International Journal of Computer Applications, 2013; 61(20).
Citation
Kshipra Singh, Jijo S Nair, "A Literature Review On Satellite Image Data Enhancement Using Digital Image Processing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1114-1119, 2018.
Selective Block Local Binary Pattern Based Algorithm for Face Recognition
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1120-1124, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11201124
Abstract
This paper presents the selective block local binary pattern algorithm for human face recognition. Various LBP methods were used to improve the recognition rates. The most important step in face recognition is the feature extraction. Tolerance to illumination variation and computational simplicity is made LBP a very popular method for pattern recognition system. Traditional LBP method is compared with the selective blocks LBP methods by conducting the experiments using ORL and UMIST datasets.
Key-Words / Index Term
Local Binary Pattern, Selective Block, Pattern Recognition, Feature Extraction, Histogram, Face Recognition
References
[1] Bhatt, Ms, et al. "A study of local binary pattern method for facial expression detection." arXiv preprint arXiv:1405.6130 (2014).
[2] Liu, Li, et al. "Extended local binary patterns for texture classification." Image and Vision Computing 30.2 (2012): 86-99.
[3] Huang, Di, et al. "Local binary patterns and its application to facial image analysis: a survey." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 41.6 (2011): 765-781.
[4] Rahim, MdAbdur, et al. "Face recognition using local binary patterns (LBP)." Global Journal of Computer Science and Technology (2013).
[5] Cai, Cheng, and Jianqiao Li. "Cattle face recognition using local binary pattern descriptor." Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2013 Asia-Pacific. IEEE, 2013.
[6] Shyam, Radhey, and YogendraNarain Singh. "Face recognition using augmented local binary pattern and Bray Curtis dissimilarity metric." Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on. IEEE, 2015.
[7] Lv, Shiwen, Feipeng Da, and Xing Deng. "A 3D face recognition method using region-based extended local binary pattern." Image Processing (ICIP), 2015 IEEE International Conference on. IEEE, 2015.
[8] Panchal, Pradip, et al. "Pose, illumination and expression invariant face recognition using laplacian of Gaussian and Local Binary Pattern." Engineering (NUiCONE), 2015 5th Nirma University International Conference on. IEEE, 2015.
[9] Dahmouni, Abdellatif, et al. "Face recognition using local binary probabilistic pattern (lbpp) and 2d-dct frequency decomposition." Computer Graphics, Imaging and Visualization (CGiV), 2016 13th International Conference on. IEEE, 2016.
[10] Stekas, Nikolaos, and Dirk van den Heuvel. "Face Recognition Using Local Binary Patterns Histograms (LBPH) on an FPGA-Based System on Chip (SoC)." Parallel and Distributed Processing Symposium Workshops, 2016 IEEE International. IEEE, 2016.
[11] Saleh, Sheikh Ahmed, et al. "An improved face recognition method using Local Binary Pattern method." Intelligent Systems and Control (ISCO), 2017 11th International Conference on. IEEE, 2017.
[12] Olivares-Mercado, Jesus, et al. "Face recognition system for smartphone based on LBP." Biometrics and Forensics (IWBF), 2017 5th International Workshop on. IEEE, 2017.
[13] Yahia, Samah, Yassine Ben Salem, and Mohamed NaceurAbdelkrim. "3D face recognition using local binary pattern and grey level co-occurrence matrix." Sciences and Techniques of Automatic Control and Computer Engineering (STA), 2016 17th International Conference on. IEEE, 2016.
[14] Heisele, Bernd, Thomas Serre, and TomasoPoggio. "A component-based framework for face detection and identification." International Journal of Computer Vision 74.2 (2007): 167-181.
[15] Siddharth, KunwarPankaj, and DakshinaRanjanKisku. "Heterogeneous Face Identification by Fusion of Local Descriptors." Advance Computing Conference (IACC), 2017 IEEE 7th International. IEEE, 2017.
[16] T. Ahonen, A. Hadid, and M. Pietikainen, “Face Description with Local Binary Patterns: Application to Face Recognition,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 28, no. 12,pp. 2037-2041, Dec. 2006.3
Citation
Sunil Kumar B. L., SharmilaKumari M., "Selective Block Local Binary Pattern Based Algorithm for Face Recognition," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1120-1124, 2018.
Sentiment Analysis: A Proficient Methodology for Analyzing Review on Product
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1125-1128, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11251128
Abstract
The Efficient Process that is analyzing Sentiment is the way of identifying the orientation of opinion in text data. It finds assignment of comments whether it become positive comment or negative comment to perform analysis of review collected from social networking sites. Now a days Use of Social networking sites are going to increase rapidly. In various Micro blogging sites user post their review about any interesting topics about event, about newly launched product, etc. according to that user going to analyze reviews. In this paper we put forward process of analyzing sentiment that is also called as Opinion mining on collected twitter review data set on mobile product based on priority wise selection of feature. By considering this concept we are going to assign polarity to the word which decide polarity of comments and based on that we divide the comments into positive and negative club. For that classification we use machine learning Naive Bayes algorithm and according to that we analyze quality of that product and decide whether to purchase product or not based on selected feature of product.
Key-Words / Index Term
Machine learning, Naive Bayes, opinion mining, Sentiment analysis
References
[1] Neri, C.Aliprandi, F.Capeci, M.Cuadros, T.By, “Sentiment Analysis on Social Media”, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2012, pp. 919 ? 926.
[2] Lopamudra Dey , Sanjay Chakraborty , Anuraag Biswas , Beepa Bose, Sweta Tiwari “Sentiment Analysis of Review Datasets using Naive Bayes? and K-NN Classifier”.
[3] Huma Parveen,Prof. Shikha Pandey “Sentiment Analysis on Twitter Data-set using Naive Bayes Algorithm”2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT),2016 pp 416-419.
[4] Alexander Hogenboom, Daniella Bal,Flavius Frasincar “Exploiting Emoticons in Sentiment Analysis”Journal of Web Engineering, Vol. 0, No. 0 (2013) 000?000 cRinton Press.
[5] Ms. Md. Sania Sultana, Mr. G. V Suresh ,“Opinion Mining on Twitter Data of Movie Reviews using R”.Conference on, 2003, pp. 10?17 vol.
[6] Jiangtao Ren, Sau Dan Lee, Xianlu Chen, Ben Kao, Reynold Cheng and David Cheung, “Naive Bayes Classification of Uncertain Data”, (2009).
[7] Bo Pang and Lillian Lee , Shivakumar Vaithyanathan ,“Thumbs up? Sentiment Classification using Machine Learning Techniques”.
[8] P. Bavithra Matharasi, Dr. A.Senthilrajan, “Sentiment Analysis of Twitter Data using Naive Bayes with Unigram Approach”, (May 2017).
[9] Vishal A. Kharde , S.S. Sonawane , “Sentiment Analysis of Twitter Data: A Survey of Techniques”, (April 2016).
[10] Maneesh Singhal, Ramashankar Sharma, “Optimization of Naive Bayes Data Mining Classification Algorithm”.
[11] Walaa Medhat, Ahmed Hassan , Hoda Korashy, “Sentiment analysis algorithms and applications: A survey”.
[12] Sai Krishna, D., G Akshay Kulkarni and A. Mohan, Kurup,“Sentiment Analysis-Time Variant Analytics”, commerce Websites in India, International Journal of Advanced Research in Computer Science and Software Engineering, 2015.
[13] Chen, X., M. Vorvoreanu and K. Madhavan, “Mining Social Media Data for Understanding Students’ Learning Experiences”IEEE Transactions on Learning Technologies, 2014.
[14] Barbosa, L. and J. Feng, “Robust sentiment detection on twitter from biased and noisy data”In Proc. of Coling, 2010.
[15] Davidov, D., O. Tsur and A. Rappoport, “Enhanced sentiment learning using twitter hashtags and smileys”, In Proceedings of Coling, 2010.
[16] Sayali D. Jadhav, H. P. Channe, “Comparative Study of K-NN, Naive Bayes and Decision Tree Classification Techniques”.
Citation
Dipali Bhalekar, Prakash Rokade, "Sentiment Analysis: A Proficient Methodology for Analyzing Review on Product," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1125-1128, 2018.
Implementation of Validation of Requirements in Agent Development by means of Ontology
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1129-1135, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11291135
Abstract
One significant limitation in Multi-Agent Systems development methodologies is lack of proper requirements validation. The authors have tried to implement requirement validation in Multi-Agent Systems using ontologies. Organizational Multi-Agent Systems Engineering is used as the agent development methodology. The aim of this paper is to include an appropriate method for validation of the requirements in Multi-Agent System development. In addition to working as a knowledge base, the authors in this paper have used ontologies to support requirements validation. Requirements validation is performed through rules that ascend from requirements and enforcement of these rules is done through a formal language, Semantic Web Rule Language. Genomic Information Retrieval is taken as case study. The Java Agent Development Environment (JADE) framework is used along with the Protégé 5.2.0 for ontology development. Apache Jena API, OWLAPI and SWRLAPI are used for implementation of the Multi-Agent System.
Key-Words / Index Term
Multi- Agent System, Protégé, Jena, JADE, OWLAPI, SWRLAPI, agent communication, OWL, RDF
References
[1] Scott Deloach, O-MaSE: A customisable approach to designing and building complex, adaptive multi-agent systems, https://www.researchgate.net, 2010.
[2] Beydoun, G. & Low, G. Complex Intell. Syst. (2016) 2: 235. https://doi.org/10.1007/s40747-016-0025-5
[3] Kieth Decker, DECAF, A Multi-Agent System for Automated Genomic Annotation, Kluwer Academic Publishers, 7,7-27, 2003.
[4] Fabio, Bellifemine, Giovanni Caire, Dominic Greenwood, Developing Multi Agent Systems with JADE, Wiley, 2007.
[5] Katia P. Sycara, Martin van Velsen, Massimo Paolucci, Joseph Andrew Giampapa, The RETSINA MAS infrastructure, Research Gate, July 2003.
[6] Kalliopi Kravari, Efstratios Kontopoulos and Nick Bassiliades, EMERALD: A Multi-Agent System for Knowledge-based Reasoning Interoperability in the Semantic Web, Research Gate, May 4-7, 2010.
[7] Gaurav Kant Shankhdhar, Manuj Darbari, Building Custom, Adaptive and Heterogeneous Multi-Agent Systems for Semantic Information Retrieval Using Organizational-Multi-Agent Systems Engineering, O-MaSE, IEEE Explore, ISBN: 978-1-5090-3480-2, 2016.
[8] Atul Verma , Narendra Jha, Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment, International Journal of Applied Information Systems, 2017.
[9] Gaurav Kant, Manuj Darbari, Change Management in Semantic Web Services in Legal Domain using FSM & XXM Publication: IJAIS volume9/number1/751-1359, 2015.
[10] Sumit Kumar Mishra, V.K. Singh, Ontology Development For Wheat Information System Description: Publication: IJRET-International Journal of Research in Engineering and Technology 2015, V0l4/I05.
[11] Gaurav Kant, Manuj Darbari, Introducing Two Level Verification Model for Reduction of Uncertainty of Message Exchange in Inter Agent Communication in Organizational-Multi-Agent Systems Engineering, O-MaSE, IOSR Journal of Computer Engineering (IOSR-JCE), http://www.iosrjournals.org/iosr-jce/pages/19(4)Version-2.html, 2017
[12] Nasserine Hamrouni, Verification and validation for MAS APN, 6th International Conference on Sciences of Electronics Technologies of Information and Telecommunications (SETIT), 2012.
[13] Gaurav Kant Shankhdhar and M Darbari. Article: Legal Semantic Web- A Recommendation System. International Journal of Applied Information Systems 7(3):21-27, May 2014. Published by Foundation of Computer Science, New York, USA.
[14] Regulated Open Multi-Agent Systems (ROMAS), A Multi-Agent Approach for Designing Normative Open Systems, Springer, 2015.
[15] Jogannagari M.R., Kothari P.R, “The complexity of Validation Testing in Component Based Software Engineering”, International Journal of Computer Science and Engineering, IJCSE,Volume 5, Issue 12, 2017.
[16] Yagyasen, Diwakar, and Manuj Darbari. (2014) "Application of Semantic Web and Petri Calculus in Changing Business Scenario." Modern Trends and Techniques in Computer Science. Springer International Publishing, 2014. 517-528.
[17] K. Laxmi Pradeep, K. Madhavi, "Approaches for Efficient Learning Software Models: A Survey", International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.108-113, 2018.
Citation
G.K. Shankhdhar, M. Darbari, "Implementation of Validation of Requirements in Agent Development by means of Ontology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1129-1135, 2018.
A Comparative Study of Computational Tools for Biological Sequence Cleaning and Analysis
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1136-1140, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11361140
Abstract
The next generation sequencing(NGS) technology is playing an increasingly prominent role in capturing DNA and RNA sequencing by producing high-throughput sequences (HTS). The major challenge with HTS is the complexity and difficulty of data quality control (QC). Only a high quality data is capable for accurate diagnosis of the disease. For accurate diagnosis the data that needs to be analysed must be appropriate and correct. To fulfill this requirement, computer scientists have implemented the algorithms in easy to use manner that become convenient tools for biological research. The raw sequence generated by the NGS technologies is first cleaned and then moved further for clinical analysis. The step of cleaning includes removal of short sequences and trimming of inappropriate headers. This paper compares some popular, open source tools used for cleaning the captured sequences.
Key-Words / Index Term
Illumina, FASTQ, FASTA, tag removal, single end, paired end
References
[1]https://twistbioscience.com/company/blog/twistbioscienceexomesequencing4dataanalysis
[2] White Paper: Exome Sequencing and Data Analysis. Scigenom.com
[3] Trimmomatic Manual: V0.32.
[4] Anthony M. Bolger, Marc Lohse and Bjoern Usadel. Trimmomatic: a flexible trimmer for Illumina sequence data. Vol. 30 no. 15 2014, pages 2114–2120.
[5] Taking appropriate QC measures for RRBS-type or other -Seq applications with Trim Galore!. Babraham Bioinformatics. September 03, 2013.
[6] Alexis Criscuolo and Sylvain Brisse. ALIENTRIMMER: A tool to quickly and accurately trim off multiple short
contaminant sequences from high-throughput sequencing reads Frontiers in Genetics. Vol. 5, Article 130, May 2014.
[7] Alexis Criscuolo. AlienTrimmer User Guide. [Version 0.2.1] September 2012
[8]Hongshan Jiang, Rong Lei, Shou-Wei Ding and Shuifang Zhu. Skewer: a fast and accurate adapter trimmer for next-generation sequencing paired-end reads.BMC Bioinformatics 2014, 15:182.
[9] Marc Sturm, Christopher Schroeder and Peter Bauer. SeqPurge: highly-sensitive adapter trimming for paired-end NGS data. Sturm et al. BMC Bioinformatics (2016) 17:208.
[10] https://genomics.sschmeier.com/ngs-qc/index.html
[11] Murray P Cox, Daniel A Peterson, Patrick J Biggs. SolexaQA: At-a-glance quality assessment of Illumina second-generation sequencing data. Cox et al. BMC Bioinformatics 2010, 11:485
[12] Robert Schmieder and Robert Edwards. Quality control and preprocessing of metagenomic datasets. Vol. 27 no. 6 2011, pages 863–864.
[13] Marcel Martin. cutadapt Documentation Release 1.16. Feb 21, 2018.
[14] Richard M. Leggett, Ricardo H. Ramirez-Gonzalez, Bernardo J. Clavijo, DarrenWaiteand Robert P. Davey. Sequencing quality assessment tools to enable data-driven informatics for high throughput genomics. Frontiers in Genetics. December 2013, Volume4, Article288.
[15] FASTQC Manual
[16]https://www.reddit.com/r/bioinformatics/comments/63nu1f/comparing_quality_trimming_and_adapter_removing/ [25 May, 2018]
[17] https://cutadapt.readthedocs.io/en/stable/ [25 May, 2018]
[18] Stephan Pabinger, Andreas Dander, Maria Fischer, Rene Snajder, Michael Sperk, Mirjana Efremova, Birgit Krabichler, Michael R. Speicher, Johannes Zschocke and Zlatko Trajanoski. A survey of tools for variant analysis of next-generation genome sequencing data. BRIEFINGS IN BIOINFORMATICS. VOL 15. NO 2. 256-278, 21 January 2013.
[19] Hongshan Jiang. Skewer: A fast and accurate adapter trimmer for paired-end reads: User’s Manual. Chinese Academy of Inspection and Quarantine May 12, 2015.
Citation
K.S.Mehta, D.S.Mehta, V.Dahiya, "A Comparative Study of Computational Tools for Biological Sequence Cleaning and Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1136-1140, 2018.
Critical Software Testing Using Cloud Computing Tools
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1141-1146, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11411146
Abstract
‘Software Testing’ is a demanding action on behalf of numerous projects on software engineering. Amongst all the five core technological action areas of the ‘software engineering lifecycle’, it is the main which still fronts considerable confronts. Software Testing necessitates an adequate amount of sources as well as finances on the way to attain the objective productively. But most of the organizations face the challenges to provide enough resources to test their software in distributed environment, with different loading level. This leads to severe problem when the software deployed into different client environment and varying user load. ‘Cloud computing’ is one of the important up-coming proficiency. This releases innovative access for ‘software testing’. Presented paper examines the ‘software testing’ in the platform of cloud computing and this comprises of models of testing of cloud, latest investigation on the same, marketable tools as well as investigative concerns.
Key-Words / Index Term
Marketable Tools, Software testing, Cloud Computing, Cloud Testing, Software Engineering Life cycle etc
References
[1]. Nivedan Prakash, “Cloud testing: attracting demand”, http://www.expresscomputeronline.com/20100201/trend01. shtml.
[2]. Fujitsu, “Confidence In Cloud Grows, Paving Way For New Levels Of Business Efficiency” 2010.
[3]. P.Jogalekar, M.Woodside, “Evaluating the scalability of distributed systems” IEEE Trans. Parallel and Distributed Systems vol.11, no 6, 589-603,2000.
[4]. L. Yu, W. Tsai, X. Chen, L. Liu, Y. Zhao, L. Tang, and W. Zhao, “Testing as a Service over Cloud,” in 2010 Fifth IEEE International Symposium on Service Oriented System Engineering, 2010, pp. 181–188.
[5]. T. King, A. Ramirez, R. Cruz, and P. Clarke, “An Integrated Self-Testing Framework for Autonomic Computing Systems,” Journal of Computers, vol. 2, no. 9, pp. 237–249, 2007.
[6]. T. King, “A Self-Testing Approach for Autonomic Software,” Ph.D. dissertation, Florida International University, 2010.
[7]. T. King and A. Ganti, “Migrating Autonomic Self-Testing to the Cloud,” in Third International Conference on Software Testing, Verification, and Validation Workshops, 2010, pp. 438–443.
[8]. T. Vengattaraman, P. Dhavachelvan, R. Baskaran, “Model of Cloud Based Application Environment for Software Testing,” (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 3, 2010.
[9]. [9] Y. Yang, C. Onita, J. Dhaliwal, X. Zhang, “TESTQUAL: conceptualizing software testing as a service,” In the 15th Americas conf. on information systems, 6-9.08, San Francisco, California, USA, paper 608, 2009.
[10]. G. Candea, S. Bucur, and C. Zamfir, “Automated Software Testing as a Service,” in Proceedings of the 1st ACM symposium on Cloud computing, 2010, pp. 155–160.
[11]. L. Ciortea, C. Zamfir, S. Bucur, V. Chipounov, G. Candea, “Cloud9: A software testing service,” In The 3rd SOSP Workshop on Large Distributed Systems and Middleware (LADIS), Big Sky, MT, October 2009.
[12]. T. Banzai, H. Koizumi, R. Kanbayashi, T. Imada, T. Hanawa, and M. Sato, “D-Cloud: Design of a Software Testing Environment for Reliable Distributed Systems using Cloud Computing Technology,” in Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, 2010, pp. 631–636.
[13]. T. Praveen, S. Tilley, N. Daley, and P. Morales, “Towards a Distributed Execution Framework for JUnit Test Cases,” in IEEE International Conference on Software Maintenance, 2009., sept. 2009, pp. 425 –428.
[14]. J. Moreno, D. Kossmann, T. Kraska, and S. Loesing, “A Testing Framework for Cloud Storage Systems,” Master’s thesis, Swiss Federal Institute of Technology Zurich, 2010.
[15]. S. Baride and K. Dutta, “A Cloud Based Software Testing Paradigm for Mobile Applications,” ACM SIGSOFT Software Engineering Notes, vol. 36, no. 3, pp. 1–4, 2011.
[16]. Cognizant reports, “Taking Testing to the Cloud”. March 2011.
[17]. SOASTA. [Online]. Available: http://www.SOA STA.com/
[18]. ITKO. [Online]. Available: http://www.itko.com/
[19]. CloudTesting.[Online].Available:http://www.CloudTesting. com/
[20]. T. Praveen, and S. Tilley, ”When To Migrate Testing to the Cloud,” In proc. 2nd International Workshop on Software Testing in the cloud (STITC), 3rd IEEE International Conference on Software Testing, Verification and Validation (ICST), April 2010, pp. 424-427, doi:10.1109/ICSTW.2010.77.
[21]. Leah Muthoni Riungu, Ossi Taipale, Kari Smolander, “Research Issues for Software Testing in the Cloud” IEEE International Conference on Cloud Computing Technology and Science, 2010
[22]. B. Wrenn, CISSP, ISSEP, ―Unisys Secure Cloud Addressing the Top Threats of Cloud Computing,‖ (white paper).
[23]. AppLabs, ―Testing the Cloud,‖ white paper, Internet: http://www. pplabs.com/html/TestingtheCloud_786.html.
[24]. P. Jogalekar , M. Woodside. ―Evaluating the scalability of distributed systems,‖ IEEE Trans. Parallel and Distributed Systems, vol. 11, no. 6, 589–603, 2000.
[25]. [25] G. Goth, ― Googling test practices? Web giant’s culture encourages process improvement,‖ IEEE Software, vol. 25, no. 2, 92-94, 2008.
[26]. R. Collard, ―Performance innovations, testing implications,‖ Software Test & Performance Magazine, Vol. 6, No. 8, 19-20 August 2009.
[27]. Y. Yang, C. Onita, J. Dhaliwal, X. Zhang, ―TESTQUAL: conceptualizing software testing as a service,‖ In the 15th Americas conf. on information systems, 6-9.08, San Francisco, California, USA, paper 608, 2009.
[28]. Y Liu, ―Testing as a Service over Cloud,‖ In the Fifth IEEE International Symposium on Service Oriented System Engineering, 2010.
[29]. L. Ciortea, C. Zamfir, S. Bucur, V. Chipounov, G. Candea, ―Cloud9: A software testing service,‖ In The 3rd SOSP Workshop on Large Distributed Systems and Middleware (LADIS), Big Sky, MT, October 2009.
[30]. IBM Smart Business Development and Test Cloud,‖ IBM Global Technology Services, 2010. URL: http://www935.ibm.com/ services/us/index.wss/offering/midware/a1030965.
[31]. Lian Yu, Shuang Su, Jing Zhao, et al, ―Performing Unit Testing Based on Testing as a Service (TaaS) Approach,‖ In the International Conference on Service Science (ICSS), 2008.
[32]. L. Ciortea, et al, “Cloud9: a software testing service”, ‖ACM SIGOPS Operating Systems Review, Vol. 43, No. 4, January, 2010.
[33]. Manish Sharma, Bright Keswani, Vibhakar Pathak, “Cloud Testing: Enhanced Software Testing Framework”, International Journal of Engineering, Science and Mathematics, Vol. 6 Issue 4, pp. 1-6, August 2017.
Citation
Manish Sharma, H.P. Singh, Vibhakar Pathak, "Critical Software Testing Using Cloud Computing Tools," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1141-1146, 2018.
CASE STUDY: MOODLE Approach to Learning and Content Management System (LCMS)
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1147-1152, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11471152
Abstract
In this Internet and Smart devices era, unlimited access to online references, learning materials and archives are available. These millennial learners are smart learners. Thus the use of ICT for learning has also taken a leap from classrooms, physical laboratories, Power Point Presentation, Projectors to Smart, Collaborative, Virtual, Visual and 24 x 7 access to Learning. In academic environment, not only learning and evaluation but also reinforced learning is also needed. The learners experience mandates teachers to be creating contents and provide a innovative learning. The Learning and Content Management System (LCMS) not only supports the needs of both the teachers and e-learners community but gives a seamless synchronization between them to enhance the experience of both. In this paper MOODLE, a free and Open Source Software is used as a tool for creating an LCMS for an Engineering course (Computer Architecture). MOODLE’s features were exploited to bring in the best of the requirements of Content Creation, Course Scheduling, Course Registration, Creative Learning, Quiz, Assignments, Blogs, Assessments and Analysis. It is found that MOODLE is a rich platform for LCMS and is well suited for academic environment LCMS.
Key-Words / Index Term
LMS, CMS, Moodle, E-learning, Moodle Approach, LCMS, Interactive Learning
References
[1] Connolly, P. J., “A standard for success”, InfoWorld, 23(42), 57-58, 2001.
[2] Kumar, Sheo, Anil Kumar Gankotiya, and Kamlesh Dutta. "A comparative study of moodle with other e-learning systems", Proceedings of the 3rd International Conference on Electronics Computer Technology (ICECT), vol. 5, pp. 414-418. IEEE, 2011.
[3] Coates, H., James, R. and Baldwin, G., “A critical examination of the effects of learning management systems on university teaching and learning”, Tertiary Education & Management, 11(1), pp.19-36, 2005.
[4] Suman Ninoriya, P.M. Chawan, B.B. Meshram, “CMS, LMS and LCMS for E-learning", International Journal of Computer Science Issues (IJCSI), vol. 8(2), pp. 644-647, 2011.
[5] Dinesh Kumar, C.S. Lamba, “Open Source Software Evaluation Model for Learning Management System”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Vol. 2(4), PP62 - 72, 2013.
[6] Dharmendra Chourish et al, “Effective E-Learning through Moodle”, International Journal Of Advanced Technology And Engineering Research, Vol.1(1), pp 1-4, 2016
[7] V. Nedeva, “The Possibilities Of E-Learning Based On Moodle Software Platform ”, Trakia Journal of Sciences, Vol. 3, No.7, pp 12-19, 2005.
[8] Aman Rai, Arun Yadav, Divakar Yadav & Prasad, Rajesh, “A Conceptual Framework for E-learning”, Proceedings of the IEEE international conference on MOOC, Innovation and Technology in Education, At Jaipur, India, pp. 209-213 2013.
[9] Reem Razzaq Abdul Hussein and Afaf Badie Al-Kaddo, “E-Learning by Using Content Management System (CMS)”, International Journal of Advanced Computer Science and Applications (IJACSA), 5(10), 2014.
[10] J. C. G. Hernandez and M. A. L. Chavez, "Moodle security vulnerabilities " In the Proceedings of the 5th International Conference on Electrical Engineering, Computing Science and Automatic Control, Mexico City, pp. 352-357, 2008.
[11] Kumari Seema Rani, "Open Source Software: A Prominent Requirement of Information Technology", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.24-29, 2018.
[12] V.S. Varnika, "Cloud Computing Advantages and Challenges for Developing Nations", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.51-55, 2018
[13] D. A. Gomez-Aguilar, M. A. Conde-Gonz´lez, R. Theron and F. J. Garcia-Penalvo, "Reveling the Evolution of Semantic Content through Visual Analysis ", In the Proceedings of the IEEE 11th International Conference on Advanced Learning Technologies, Athens, GA, pp. 450-454, 2011.
[14] Shivangi Saraswat, “Customization and Implementation of LMS Moodle ”, International Journal of Scientific and Research Publications, Volume 4, Issue 5, pp 1-4, 2014.
[15] Nag, A., "Moodle: An open source learning management system”, Newsforge, May 24th, 2005.
[16] Romero, C., Ventura, S. and García, E., “Data mining in course management systems: Moodle case study and tutorial”, Computers & Education, 51(1), pp.368-384, 2008.
Citation
Abhinaw Anand, Sumathy Eswaran, "CASE STUDY: MOODLE Approach to Learning and Content Management System (LCMS)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1147-1152, 2018.
A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1153-1168, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11531168
Abstract
VANETs privacy and security have attracted a lot of attention over the last couple of years. VANETs are being used to boost road safety and empower a wide variety of services like internet, Emergency Message etc. The Vehicular Ad-hoc Network is a collection of smart devices with their vehicle interface. It can play a significant role in the routing process and provide better Security. An increased number of vehicles can raise a number of accidents. That can be part of life loss. So it is the need for smart vehicles that can establish interpersonal communication and warn each other for safety and security. On the other hand, many forms of attacks against VANETs have emerged recently that attempt to compromise the security of VANET networks. Such security attacks on VANETs might cause harmful results. Therefore, making VANETs security has become a key objective for VANET designers. To modify and deploy secure VANET infrastructures remains a significant challenge. The authors portray the different routing protocol by using Octopus diagram, number of attacks and its solution in VANET. With the help of safety and road traffic info among vehicles and related network attacks which improve security under possible attacks in VANETs.
Key-Words / Index Term
VANET, Attacks, Security, Routing Protocol, Authentication, RSU, and DSRC
References
[01] Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges”, Telecommun Syst 50: 217, 2012. doi:10.1007/s11235-010-9400-5.
[02] Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N., “On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach”, IEEE Journal on Selected Areas in Communications, 30(1), 119–127, 2012.
[03] Shivaldova, V., Paier, A., Smely, D., & Mecklenbra´uker, C. F., “On roadside unit antenna measurements for vehicle-to-infrastructure communications”, In 23d IEEE international symposium on personal, indoor and mobile communications (PIMRC) 2012.
[04] J. Bernsen, D. Manivannan, “RIVER: A reliable inter-vehicular routing protocol for vehicular ad hoc networks”, Comput. Netw. 52 (17), 3795–3807, 2012.
[05] Liao, Cong, Jian Chang, Insup Lee, and Krishna K. Venkatasubramanian, “A trust model for vehicular network-based incident reports”, In Wireless Vehicular Communications (WiVeC), IEEE 5th International Symposium on, pp-1-5, 2013.
[06] Kumar, N., Chilamkurti, N., & Rodrigues, J. J. P. C., “Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks”. Computer Communications, 39, 22–32, 2014.
[07] Xiang, X., Qin, W., & Xiang, B. “Research on a DSRC based rear-end collision warning model”, IEEE Transactions on Intelligent Transportation Systems, 15(3), 1054–1065, 2014.
[08] Sheng, Z., et al. “A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities.” IEEE Wireless Communications, 20(6), 91–98, 2013.
[09] Isaac, J.-T., Camara, J.-S., Zeadally, S., & Marquez, J.-T. “A Secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks”, Computer Communications, 31(10), 2478–2484, 2012.
[10] K.-Y. Ho, P.-C. Kang, C.-H. Hsu, C.-H. Lin, "Implementation of WAVE/DSRC Devices for vehicular communications", Int. Symp. Computer Communication, Control, and Automation, vol. 2, May 2010.
[11] Xiang, X., Qin, W., & Xiang, B. “Research on a DSRC based rear-end collision warning model”, IEEE Transactions on Intelligent Transportation Systems, 15(3), 1054–1065, 2014.
[12] Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V., “Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks”, IEEE Transactions on Mobile Computing, 14 (4), 742–754 2015.
[13] S.S. Wang, Y.S. Lin, “PassCAR: A passive clustering aided routing protocol for vehicular ad hoc networks”, Comput. Commun. 36 (2), 170–179, 2013.
[14] Xiao, Y., Peng, M., Gibson, J., Xie, G. G., Ding-Zhu, D., & Vasilakos, A. V., “Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks”, IEEE Transactions on Mobile Computing, 11(10), 1538–1554, 2012.
[15] C. Ou, “A Roadside Unit-based Localization Scheme for Vehicular Ad Hoc Networks”, International Journal of Communication Systems, vol. 27, pp. 135-150, 2014.
[16] Dua, A., Kumar, N., & Bawa, S., “A systematic review on routing protocols for vehicular ad hoc networks”, Vehicular Communications, 1, 33–52, 2014.
[17] A.M. Malla, R.K. Sahu, “A review on vehicle to vehicle communication protocols in VANETs”, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3 (2), February 2013.
[18] M.A. Rabayah, R. Malaney, “A new scalable hybrid routing protocol for VANETs”, IEEE Trans. Veh. Technol, 61 (6), 2625–2635, 2012.
[19] L.V. Minh, Y.M. Chuan, G. Qing, “End-to-End delay assessment and hybrid routing protocol for vehicular ad hoc network”, IERI Proc. 2, 727–733, 2012.
[20] Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V., “Spatial reusability-aware routing in multi-hop wireless networks”, IEEE Transactions on Computers, PP (99), 1–13, 2015). doi:10.1109/ TC.2015.2417543.
[21] O.A. Wahab, A. Mourad, H. Otrok, J. Bentahar, “CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks”, Expert Syst. Appl. 50, 40–54, 2016.
[22] Manju Bhardwaj, "Faulty Link Detection in Cluster based Energy Efficient Wireless Sensor Networks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.1-8, 2017.
[23] Sandonis, V., Calderon, M., Soto, I., & Bernardos, C. J., “Design and performance evaluation of a PMIPv6 solution for geonetworking-based VANETs”, Ad Hoc Networks, 11, 2069–2082, 2013.
[24] A. Fonseca, T. Vazao, “Applicability of position based routing for VANET in highways and urban environment”, J. Netw. Comput. Appl. 36 (3),961–973, 2013.
[25] L. Zhang, D. Gao, W. Zhao, H.C. Chao, “A multilevel information fusion approach for road congestion detection in VANETs”, Math. Comput. Model. 58 (5–6), 1206–1221, 2013.
[26] Zhou, J., et al. “Secure and privacy-preserving protocol for cloud-based vehicular DTNs”, IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314, 2015.
[27] Viriyasitavat, W., Boban, M., Tsai, H.-M., & Vasilakos, A. V., “Vehicular communications: Survey and challenges of channel and propagation models”, IEEE Vehicular Technology Magazine x, 10(2), 55–66, 2014.
[28] A.Vani, "Detection and Elimination of Wormhole Attacks in a MANET", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.35-40, 2017.
[29] J. Grover, M.S. Gaur, V. Laxmi, N.K. Prajapati, “A Sybil attack detection approach using neighboring vehicles in VANET, in Proceedings of the 4th International Conference on Security of Information and Networks, pp. 151–158, 2011.
[30] X. Feng, C. Li, D. Chen, J. Tang, “A method for defensing against multi-source Sybil attacks in VANET”, Peer-to-Peer Netw. Appl. 10 (2), 305–314, 2017.
[31] B. Yu, C.-Z. Xu, B. Xiao, “Detecting Sybil attacks in VANETs, J. Parallel Distrib”, Comput. 73 (6) 746–756, Jun 2013.
[32] U. Khan, S. Agrawal, S. Silakari, “Detection of malicious nodes in vehicular ad-hoc networks”, Procedia Comput. Sci. 46, 965–972, 2015.
[33] A. Daeinabi, A.G. Rahbar, “Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks”, Multimed. Tools Appl. 66 (2), 325–338 2013.
[34] D. Kushwaha, P.K. Shukla, R. Baraskar, “A survey on Sybil attack in vehicular ad-hoc network”, Int. J. Comput. Appl. 98 (15), July 2014.
[35] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges”, Telecommunication Systems 50, no- 4 pp- 217-241, 2012.
[36] H. Sedjelmaci, S.M. Senouci, “An accurate and efficient collaborative intrusion detection framework to secure vehicular networks”, Comput. Electr. Eng. 43, 33–47, 2015.
[37] Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V., “Directional routing and scheduling for green vehicular delay tolerant networks”, Wireless Networks, 19(2), 161–173, 2013.
[38] Y. Liu, J. Niu, J. Ma, L. Shu, T. Hara, W. Wang, “The insights of message delivery delay in VANETs with a bidirectional traffic model”, J. Netw. Comput. Appl. 36 (5), 1287–1294, 2013.
[39] N. Kumar, N. Chilamkurti, “Collaborative trust aware intelligent intrusion detection in VANETs”, Comput. Electr. Eng. 40 (6), 1981–1996, 2014.
[40] M.Ch. Chuang, J.F. Lee, “TEAM: trust-extended authentication mechanism for vehicular ad hoc networks”, IEEE Syst. J. 8 (3), 2013.
[41] Biswas, Subir, Jelena Misic, and Vojislav Misic, “ID-based safety message authentication for security and trust in vehicular networks”, In Distributed Computing Systems Workshops (ICDCSW), 31st International Conference on, pp- 323-331, 2011.
[42] K. Verma, H. Hasbullah, A. Kumar, “Prevention of DoS attacks in VANET”, Wireless Person. Commun. 73 (1),95–126, 2013.
[43] L. He, W.T. Zhu Mitigating, “DoS attacks against signature-based authentication in VANETs”, IEEE Int. Conf. Comput. Sci. Automat. Eng. (CSAE) 3, 261–265, 2012.
[44] Abubakar Bala and Yahya Osais, "Modelling and simulation of DDOS Attack using SimEvents", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.5-14, 2013.
[45] A.M. Malla, R.K. Sahu, “Security attacks with an effective solution for Dos attacks in VANET”, Int. J. Comput. Appl, (ISSN 0975-8887), 66 (22), 2013.
[46] S. Biswas, J. Misic, V. Misic, “DDoS attack on WAVE-enabled VANET through synchronization”, in: Global Communications Conference (GLOBECOM), pp. 1079-1084, 2012.
[47] J.T. Isaac, S. Zeadally, J.S. Cámara, “Security attacks and solutions for vehicular ad hoc networks”, IET Commun. 4 (7), 894, 2010.
[48] Shree, R., Khan, R., “Wormhole attack in wireless sensor network”, Int. J. Comput. Netw. Commun. Secur, 2(1), 22–26, 2014.
[49] V. La Hoa, A. Cavalli, “Security attacks and solutions in vehicular ad hoc networks: a survey”, Int. J. Netw. Syst. 4 (2), April, 2014.
[50] A. Kumar, R. Shree, “Study of Wireless Technologies Related to Vehicular Ad-hoc Sensor Network for Intelligent Control and Security”, International Journal of Innovations & Advancement in Computer Science, ISSN No. 2347 – 8616 Vol. 4, 2015.
[51] M. Joe, and B. Ramakrishnan, “Review of Vehicular Ad hoc Network Communication Models including WVANET (Web VANET) Model and WVANET Future Research Directions”, Wireless Networks, Springer, vol. 22, no. 7, pp. 2369-2386, 2015.
[52] M. Joe, and B. Ramakrishnan, “WVANET: Modelling a Novel Web-Based Communication Architecture for Vehicular Network”, Wireless Personal Communications, Springer, vol. 85, no. 4, pp. 1987-2001, 2015.
[53] V. Bibhu, R. Kumar, B.S. Kumar, D.K. Singh, “Performance analysis of black hole attack in VANET”, Int. J. Comput. Netw. Inf. Security 4 (11) 47, 2012.
[54] S.Sharma, Rajshree, R.P.Pandey, V.Shukla, “Bluff-Probe Based Black Hole Node Detection and Prevention”, IEEE International Advance Computing Conference (IACC), pp. 458-462, March 2009.
[55] S. Biswas, J. Misic, “A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs”, IEEE Trans. Veh. Technol. 62 (5), 2182–2192 Jun, 2013.
[56] Ram Shringar Raw, Manish Kumar, Nanhay Singh, “Security Challenges, Issues And Their Solutions For Vanet”, International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, pp- 95-105, September, 2013.
[57] K. Lim, D. Manivannan, “An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks”, Veh. Commun. 4, 30–37, 2016.
[58] R. Raiya, Sh. Gandhi, “Survey of various security techniques in VANET”, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4 (6), June 2014.
[59] J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehicles”, IEEE Security Privacy Mag. 2, 49–55, 2004.
[60] U. Korupolu, S. Kartik, GK. Chakravarthi, "An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.3, pp.26-29, 2016
[61] X. Zhu, S. Jiang, L. Wang, H. Li, “Efficient privacy-preserving authentication for vehicular ad hoc networks”, IEEE Trans. Veh. Technol. 63 (2), 907–919, 2014.
[62] P. Vijayakumar, M. Azees, A. Kannan, L. J. Deborah, "Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks", IEEE Trans. Intell. Transp. Syst., vol. 17, no. 4, pp. 1015-1028, Apr. 2016.
[63] Shen, W., Liu, L., Cao, X., Hao, Y., & Cheng, Y.. “Cooperative Message Authentication in Vehicular Cyber-Physical Systems”. IEEE Transactions on Emerging Topics in Computing, 1(1), 84-97, 2013.
[64] A. Perrig et al., “The TESLA Broadcast Authentication Protocol,“ RSA CryptoBytes, vol. 5, no. 2, pp. 2–13, 2002.
[65] Z. Li and C. Chigan, “On joint privacy and reputation assurance for vehicular ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2334–2344, 2014.
[66] Jie Li et al., “ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs”, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 4, pp.938-948, April 2015.
Citation
Ajay Kumar, Raj Shree, "A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1153-1168, 2018.