Protecting Location Privacy in Sensor Networks against a Global Eaves Dropper
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.235-238, Feb-2019
Abstract
The sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. Existing techniques defend the leakage of location information from a limited adversary who can only observe network traffic in a small region. However, a stronger adversary, the global eavesdropper, is realistic and can defeat these existing techniques. This paper first formalizes the location privacy issues in sensor networks under this strong adversary model and computes a lower bound on the communication overhead needed for achieving a given level of location privacy. This system then proposes two techniques to provide location privacy to monitored objects (source-location privacy) periodic collection and source simulation and two techniques to provide location privacy to data sinks (sink-location privacy) sink simulation and backbone flooding. These techniques provide trade-offs between privacy, communication cost, and latency. Through analysis and simulation, this project demonstrates that the proposed techniques are efficient and effective for source and sink-location privacy in sensor networks.
Key-Words / Index Term
Wireless Sensor Network, Sink Simulation, Location Privacy, Eaves Dropper
References
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: A Survey,” Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
[2] B. Bamba, L. Liu, P. Pesti, and T. Wang, “Supporting Anonymous Location Queries in Mobile Environments with Privacygrid,” Proc. Int’l Conf. World Wide Web (WWW ’08), 2008.
[3] BlueRadios Inc., “Order and Price Info,” http://www.blueradios. com/orderinfo.htm, Feb. 2006.
[4] B. Bollobas, D. Gamarnik, O. Riordan, and B. Sudakov, “On the Value of a Random Minimum Weight Steiner Tree,” Combinatorica, vol. 24, no. 2, pp. 187-207, 2004.
[5] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy (S&P ’03), pp. 197-213, May 2003.
[6] J. Deng, R. Han, and S. Mishra, “Enhancing Base Station Security in Wireless Sensor Networks,” Technical Report CU-CS-951-03, Univ. of Colorado, Dept. of Computer Science, 2003.
[7] J. Deng, R. Han, and S. Mishra, “Intrusion Tolerance and Anti- Traffic Analysis Strategies for Wireless Sensor Networks,” Proc. Int’l Conf. Dependable Systems and Networks (DSN ’04), June 2004.
[8] J. Deng, R. Han, and S. Mishra, “Decorrelating Wireless Sensor Network Traffic to Inhibit Traffic Analysis Attacks,” Pervasive and Mobile Computing J., Special Issue on Security in Wireless Mobile Computing Systems, vol. 2, pp. 159-186, Apr. 2006.
[9] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS ’02), Nov. 2002.
[10] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.L. Tan, “Private Queries in Location Based Services: Anonymizers are not Necessary,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’08), 2008.
[11] H. Gupta, Z. Zhou, S. Das, and Q. Gu, “Connected Sensor Cover: Self-Organization of Sensor Networks for Efficient Query Execution,” IEEE/ACM Trans. Networking, vol. 14, no. 1, pp. 55- 67, Feb. 2006.
[12] J. Hill, M. Horton, R. Kling, and L. Krishnamurthy, “The Platforms Enabling Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, pp. 41-46, 2004.
[13] Y. Jian, S. Chen, Z. Zhang, and L. Zhang, “Protecting Receiver- Location Privacy in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 1955-1963, May 2007.
[14] D.B. Johnson, D.A. Maltz, Y. Hu, and J.G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” IETF Internet draft, Feb. 2002.
[15] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing Source-Location Privacy in Sensor Network Routing,” Proc. Int’l Conf. Distributed Computing Systems (ICDCS ’05), June 2005.
[16] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS ’03), Oct. 2003.
[17] K. Mehta, D. Liu, and M. Wright, “Location Privacy in Sensor Networks against a Global Eavesdropper,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’07), 2007.
[18] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS) Using AoA,” Proc. IEEE INFOCOM, pp. 1734-1743, Apr. 2003.
[19] Y. Ouyang, Z. Le, G. Chen, J. Ford, and F. Makedon, “Entrapping Adversaries for Source Protection in Sensor Networks,” Proc. Int’l Conf. World of Wireless, Mobile, and Multimedia Networking (WoWMoM ’06), June 2006.
[20] C. Ozturk, Y. Zhang, and W. Trappe, “Source-Location Privacy in Energy-Constrained Sensor Network Routing,” Proc. Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), Oct. 2004.
[21] V. Paruchuri, A. Duressi, M. Duressi, and L. Barolli, “Routing through Backbone Structures in Sensor Networks,” Proc. 11th Int’l Conf. Parallel and Distributed Systems (ICPADS ’05), 2005.
[22] C.E. Perkins, E.M. Belding-Royer, and S.R. Das, “Ad Hoc On- Demand Distance Vector (AODV) Routing,” IETF Internet draft, Feb. 2003.
[23] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Proc. ACM MobiCom, July 2001.
[24] T.S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno, “Devices that Tell on You: Privacy Trends in Consumer Ubiquitous Computing,” Proc. USENIX Security Symp., 2007.
[25] A. Savvides, C. Han, and M. Srivastava, “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors,” Proc. ACM MobiCom, July 2001.
[26] M. Shao, Y. Yang, S. Zhu, and G. Cao, “Towards Statistically Strong Source Anonymity for Sensor Networks,” Proc. IEEE INFOCOM, 2008.
[27] V. Srinivasan, J. Stankovic, and K. Whitehouse, “Protecting Your Daily In-Home Activity Information from a Wireless Snooping Attack,” Proc. Int’l Conf. Ubiquitous Computing (UbiComp ’08), 2008.
[28] H. Takahashi and A. Matsuyama, “An Approximate Solution for the Steiner Problem in Graphs,” Math.Japonica, vol. 24, pp. 573- 577, 1980.
[29] Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, “Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks,” Proc. ACM Conf. Wireless Network Security (WiSec ’08), 2008
Citation
C. Ragavi, R. Meera, "Protecting Location Privacy in Sensor Networks against a Global Eaves Dropper", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.235-238, 2019.
Security Aspects of Cloud Based Environments
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.239-242, Feb-2019
Abstract
Cloud computing is a specialized form of distributed computing. It involves introduction of utilisation models for effective utilisation, remote provisioning, and scalability of measured resources available, ending up in creating useful working environments. Virtualization separates functions from hardware and allows creation of multiple simulated environments or dedicated resources from one physical hardware system to other. It gives specific users, access to packaged resources in on-demand basis, for specific purposes. Virtualisation allows all types of resources to be added to a system, which is managed by a single operating system or Administrator. The concept of virtualization has two serious battles ahead, one is that of data security and the other one is to meet the demand from corporate to store their client data safely. The threat of data breach is generating newer techniques in virtualisation leading to multiple virtual environments being linked,so that it reduces possibility of hardware failure and data security breach. Virtualisation management is also one key element of the virtualisation process and it provides the ability to create, modify, transform and link the virtualised environments in order to effectively manage the environment. With the advent of linking virtual environments, new concept of Multi cloud has come up, wherein multiple cloud services are interconnected or multiple cloud services are accessed by the user for one particular job. This paper proposes to look upon the techniques that shall transform the future of cloud and the security or insecurity that shall come with it.
Key-Words / Index Term
Virtualization, Cloud computing, Multi cloud, Data security, Virtual environments
References
[1]http://www.thesmallbusiness.org/software/benefits-of-cloudcomputing.html
[2]http://www.allthingscrm.com/cloudcoomputing/understanding-cloudcomputing-applications.html
[3] http://en.wikipedia.org/wiki/Cloud_computing
[4] http://www.wikinvest.com/concept/Cloud_Computing
[5]Cloud computing security challenges &solutions a survey https://ieeexplore.ieee.org/document/8301700/ by S Basu- 2018
[6]Cloudcomputing Trends to-prepare-for-in-2018
[7] C. Divya Shaly, R. Anbuselvi, ” Multi-Cloud Data Hosting for Protection Optimizationand Security”-International Journal of Computer Science and MobileComputing. April 2016.
[8] A. Manimaran and K. Somasundaram.”An efficient Data Security Mechanismin Cloud Computing Using Anonymous ID algorithm. 2016.
[9] Mark D. Ryan, “Cloud computing security: The Scientific challenge and aSurvey of solutions”. Elsevier 02013.
[10] AlZain, M.A.; Soh, B.; Pardede, E. (2011). MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. Dependable, Autonomic and SecureComputing (DASC). 2011 IEEE Ninth International Conference on , vol., no.,pp.784,791, 12-14.
[11] Chang, V.; Bacigalupo, D.; Wills, G.; De Roure, D. (2010). A Categorisation of Cloud Computing Business Models. Cluster, Cloud and Grid Computing (CCGrid). 2010 10th IEEE/ACM International Conference on , vol., no.,
pp.509,512, 17-20.
[12] AlZain, M.A.; Pardede, E.; Soh, B.; Thom, J.A. (2012). Cloud Computing Security: From Single to Multi-clouds. System Science (HICSS). 2012 45th Hawaii International Conference on, vol., no., pp.5490, 5499, 4-7.
[13] Barinder Kaur and Sandeep Sharma Parametric Analysis of Various Cloud Computing Security ,ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506
[14] Cloud standard security council, Cloud Security Standards: What to Expect & What to Negotiate Version 2.0
[15] Ahmed Albugmi,Madini O. Alassafi ,Robert Walters, Gary WillsConference: 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT), IEEE,, At Luton, UK, Volume: 1
[16] Jeffrey Voas, Jia Zhang,“Cloud Computing: New Wine orJust a New Bottle?”, IT Professional, Vol. 11, No. 2, pp. 15-17, Mar./Apr. 2009.
[17]Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres,Maik Lindner,“A Break in the Clouds: Towards a CloudDefinition”, ACM SIGCOMM Computer CommunicationReview, 39(1), pp. 50-55, 2009
[18] Mao Wen-Bo (2009),"Cloud computing security, [Online] Available: http://blog.pconline.com.cn/article/334526. html,2010.
[19] Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues, "Towards Trusted Cloud Computing, [Online] Available: http://www.mpi-sws.org/~gummadi/papers/trusted_cloud. pdf,2010.
[20] http://www.nist.gov/itl/csd/cloud-102511.cfm
[21] http://thecloudtutorial.com/related.html
[22] http://thecloudtutorial.com/cloudtypes.html
[23] Learning about Cloud http://www.arcitura.com/
[24]VirtualizationVsCloudcomputing http://www.businessnewsdaily.com/5791-virtualization-vs-cloud-computing.html
[25]Sura Khalil Abd, Rawia TahirSalih, S.A. RAl Haddad, FazirulhisyamHashim.“Cloud Computing Security Risks with Authorization Access for Secure Multi-Tenancy Based on AAAS Protocol” IEEE/978–1-4799–8641- 5/15, 2015.
[26]https://www.quickstart.com/blog/post/5-benefits-of-virtualization-in-a-cloud-environment/
Citation
E. Suganthi, F. Kurus Malai Selvi, "Security Aspects of Cloud Based Environments", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.239-242, 2019.
Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.243-245, Feb-2019
Abstract
Underwater sensor network consists of number of various sensors and autonomous underwater vehicles deployed underwater to coordinate, interact and share information among them to carry out sensing and monitoring functions. Underwater environment differs from terrestrial radio environment both in terms of energy costs and channel propagation phenomena. The goal of the project is to reduce the occurrence of delays and attacks, during data transmission among sensor nodes in under water acoustic sensor network by introducing a protocol called delay sensitive energy management cluster head routing protocol in order to enhance the energy efficiency of the sensor network.
Key-Words / Index Term
Underwater , Delays And Attacks , Sensor Network
References
[1]. Manjula, R.B. and Sunilkumar, S. M. (2011)Issues in Underwater Acoustic Sensor Networks‟, International Journalof Computer and Electrical Engineering, Vol.3, No.1, pp.101-110.
[2]. Akyildiz, I. F., Pompili,D., Melodia, T.(2006) State of the Art in Protocol Research for Underwater Acoustic Sensor Networks,The First ACM International Workshop on UnderWater Networks (WUWNet06) 2006, Los Angeles, California, USA,pp.7-17.
[3]. Liu, L., Zhou, S., and Cui, J. H., (2008)
[4]. “Prospects and Problems of Wireless Communication for Underwater Sensor Networks”, WILEY WCMC, Vol. 8, Pages977-994.
[5]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422,Mar. 2002.
[6]. A. Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,” Computer Networks, vol. 56, no. 7, pp. 1951–1967, May.2012.
[7]. T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen- sor networks using randomized dispersive routes,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp.941–954,
[8]. Jul. 2010.
[9]. P. Papadimitratos, J. Luo, and J. P. Hubaux, “A randomized coun- termeasure against parasitic adversaries in wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp. 1036–1045, Sep.2010.
Citation
S. Sahana, V. Vinothini, "Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.243-245, 2019.
A Survey on Virtualization for Cloud Data Centers
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.246-248, Feb-2019
Abstract
Distributed computing is another registering standard, in which the information handling and information stockpiling are offered to clients like administrations got to over the Internet. The increment in the interest for Cloud Computing Services has realized the rise of new business specialist co-ops, and additionally the development of those that have just taken part in this market. The consistent interest by the purchaser for administrations of more prominent quality occupies the consideration of the market and scholarly foundations towards the issue concerning high vitality utilization of server farms. This work characterizes a choice arrangement of VMs that has as a goal, the decrease of vitality utilization of server farms by methods for the MLR application procedure. It is sectioned into two principle stages The primary stage picks and stores the information alluding to the CPU utilization of the VMs and the vitality utilization of the servers, while the second stage includes presenting these accumulations to the MLR show, and in concurrence with the arrangement acquired, chooses whether or no VM ought to be moved, in addition to here a encouraging folder, which individual will be the finest candidate. The data gathering stage is discontinuous and intermittent. The second stage dependably builds up that the server is as of now qualified as over-burden, and is closed with a decision of regardless of whether to move a VM. Along these lines this determination, is utilized to dissect the vitality utilization dimension of the VMs of an over-burden server, and in this way, pick the suitable movement of the one that spoke to the best level of vitality commitment.
Key-Words / Index Term
Virtual machines, Multiple linear regression (MLR), Load balancing, energy consumption, migration
References
[1] C. Gu, H. Huang, and X. Jia, “Green scheduling for cloud datacenters using ESDs to store renewable energy,”in Proc. IEEE ICC,Apr. 2016 pp. 1–6.
[2] Longxiang Fan∗, Chonglin Gu∗, Lining Qiao∗, Wenbin Wu∗, Hejiao Huang∗†∗Harbin Institute of Technology, Shenzhen, China Greensleep: A multi-sleep modes based scheduling of servers for cloud data center 2017.
[3] S. Wang, Z. Qian, J. Yuan, and I. You, “A DVFS based energy efficient tasks scheduling in a data center,” IEEE Access, vol. 5, pp. 13 090–13 102, 2017.
[4] Jie Li, Student Member, IEEE ZuyiLi, Senior Member, IEEE, Towards Optimal Electric Demand Management for Internet Data Centers VOL. 3, NO. 1, MARCH 2012.
[5] Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo, Prem Prakash Jayaraman, Song Jun, Albert Y. Zomaya, Rajiv Ranjan, Energy-Efficient VM-Placement in Cloud Data Center, (2018).
[6] R. Xie, X. Jia, K. Yang, and B. Zhang, “Energy saving virtual machine allocation in cloud computing,” in Proc. IEEE ICDCSW, Jul. 2013, pp. 132–137.
[7] Dzmitry Kliazovich, Pascal Bouvry, Fabrizio Granelli, Nelson L. S. da Fonseca” Energy Consumption Optimization in Cloud Data Centers”, Cloud Services, Networking and Management.
[8] Y. Liu, H. Zhu, K. Lu, and X. Wang, “Self-adaptive management of the sleep depths of idle nodes in large scale systems to balance between energy consumption and response times,” in Proc. IEEE CloudCom, 2012, pp. 633–639.
[9] V. M. Raj and R. Shriram, “A study on server sleep state transition to reduce power consumption in a virtualized server cluster environment,” in Proc. IEEE COMSNETS, Jan. 2012, pp. 1–6.
[10] G.B.Hima Bindu, Dr. J. Janet,” a statistical survey on vm scheduling in cloud workstation for reducing energy consumption by balancing load in cloud”, 2017 international conference on networks & advances in computational technologies (netact) |20-22 july 2017|.
[11] Harmanpreet Kaur [1], Jasmeet Singh Gurm [2] Department of Computer Science and Engineering [1] & [2] PTU/RIMT Institute of Engineering and Technology” A Survey on the Power and Energy Consumption of Cloud Computing”, International Journal of Computer Science Trends and Technology (IJCST) – Volume 3 Issue 3, May-June 2015.
[12] Abusfian Elgelany, Nader Nada Sudan University, Khartoum, Sudan, Fatih University, Istanbul,Turkey” Energy Efficiency for Data Center and Cloud Computing”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013.
Citation
R. Priya , "A Survey on Virtualization for Cloud Data Centers", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.246-248, 2019.
Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.249-253, Feb-2019
Abstract
This paper proposes a lossless, a reversible, and a combined data hiding schemes for ciphertext images encrypted by public key cryptosystems with probabilistic and homomorphic properties. In the lossless scheme, the ciphertext pixels are replaced with new values to embed the additional data into several LSB-planes of ciphertext pixels by multi-layer wet paper coding. Then, the embedded data can be directly extracted from the encrypted domain, and the data embedding operation does not affect the decryption of original plaintext image. In the reversible scheme, a preprocessing is employed to shrink the image histogram before image encryption, so that the modification on encrypted images for data embedding will not cause any pixel oversaturation in plaintext domain. Although a slight distortion is introduced, the embedded data can be extracted and the original image can be recovered from the directly decrypted image. Due to the compatibility between the lossless and reversible schemes, the data embedding operations in the two manners can be simultaneously performed in an encrypted image. With the combined technique, a receiver may extract a part of embedded data before decryption, and extract another part of embedded data and recover the original plaintext image after decryption.
Key-Words / Index Term
Reversible data hiding, Lossless data hiding, Image encryption
References
[I] X Zhang, "Separable Reversible Data Hiding in Encrypted Image", IEEE transactions on infonnation forensics and security, vol. 7, no. 2, pp. 826-832, Apr.2012.
[2] Z. Ni, Y-Q. Shi, N. Ansali, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol.` 16, no. 3 , pp. 354-362, Mar.2006.
[3] X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
[4] RiniJ ,4th Semester M.Tech ,Dept. of Computer Science and Information Systems FISAT Angamaly ,Kerala, India "Study on Separable Reversible Data Hiding in Encrypted Images" International Journal of Advancements in Research &Teclmology, Volume 2, Issue 12, December-2013 Copyright © 2013 SciResPub. IJOART
[5] VinitAghamDepaltment of Computer Engineeling R C Patel Institute of Technology, Shirpur.Dist. Dhule, Maharashtra, India.TareekPattewar Department oflnfonnation Technology R C Patel Institute of Technology, Shirpur. Dist. Dhule, Maharashtra, India" A Novel Approach Towards Separable Reversible Data Hiding Technique" 2014 Intemational Conference on Issues and Challenges in Intelligent Computing Techniques (IClCT).
[6] Rengarajaswamy I Assistant Professor, Department of Electronics and Communication Engineeling, M.A.M School of Engineering, Trichy, Tamil Nadu "OFT Based Individual Extraction Of Steganographic Compression Oflmages", : IJRET Feb-14.
[7] VinitAghamDepaltment of Computer Engineering R C Patel Institute of Technology, Shirpur.Dist. Dhule, Maharashtra, India.TareekPattewar Department of Infonnation Technology R C Patel Institute of Technology, Shirpur. Dis!.Dhule, Maharashtra, India " A Novel Approach Towards Separable Reversible Data Hiding Technique" 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (lClCT).
[8] Ming Li, Di Xiao, ZhongxianPeng, and Hai Nan, “A modified reversible data hiding in encrypted images using random diffusion and accurate prediction,” ETRIJournal, vol. 36, no. 2, pp. 325–328, 2014.
[9] J. Zhou, W. Sun, L. Dong, X. Liu, O. C. Au, and Y. Y. Tang, “Secure reversible image data hiding over encrypted domain via key modulation,” IEEE Transactionson Circuits and Systems for Video Technology, vol. PP, no. 99, pp. 1–1, 2015.
[10] Xinpeng Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on InformationForensics and Security, vol. 7, no. 2, pp. 826–832, 2012.
[11] Xinpeng Zhang, ZhenxingQian, GuoruiFeng, and YanliRen, “Efficient reversible data hiding in encrypted images,” Journal of Visual Communication and ImageRepresentation, vol. 25, no. 2, pp. 322–328, 2014.
[12] ShuliZheng, Dandan Li, Donghui Hu, Dengpan Ye, Lina Wang, and Jinwei Wang, “Lossless data hiding algorithm for encrypted images with high capacity,” MultimediaTools and Applications, pp. 1–14, 2015.
[13] Xinpeng Zhang, Chuan Qin, and Guangling Sun, “Reversible data hiding in encrypted images using pseudorandom
sequence modulation,” Digital Forensics and Watermaking, vol. 7809, pp. 358–367, 2013.
[14] Zhaoxia Yin, Bin Luo, and Wien Hong, “Separable and error-free reversible data hiding in encrypted image with high payload,” The Scientific World Journal, vol. 2014, pp. 8, 2014.
[15] Zhaoxia Yin, Huabin Wang, Haifeng Zhao, Bin Luo, and Xinpeng Zhang, “Complete separable reversible data hiding in encrypted image,” Cloud Computing andSecurity: First International Conference, ICCCS 2015, pp. 101–110, 2015.
[16] Xiaotian Wu and Wei Sun, “High-capacity reversible data hiding in encrypted images by prediction error,” Signal Processing, vol. 104, pp. 387–400, 2014.
[17] Xinpeng Zhang, Chuan Qin, and Guangling, “Reversible data hiding in encrypted images using pseudorandom
sequence modulation,” Digital Forensics and Watermaking, vol. 7809, pp. 358–367, 2013.
[18] Chong Fu, Jun-jie Chen, HaoZou, Wei-hongMeng, Yong-feng Zhan, and Ya-wen Yu, “A chaos-based digital image encryption scheme with an improved diffusion strategy,” Optics Express, vol. 20, no. 3, pp. 2363–2378, 2012.
[19] Zhicheng Ni, Yun-Qing Shi, N. Ansari, and Wei Su, “Reversible data hiding,” IEEE Transactions on Circuitsand Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006.
[20] Y. Q. Shi, X. Li, X. Zhang, H. Wu, and Ma B., “Reversible data hiding: Advances in the past two decades,” IEEE Access, vol. PP, no. 99, pp. 1–1, 2016, doi:10.1109/ACCESS.2016.2573308.
[21] Xinpeng Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255–258, 2011.
[22] K. Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE.
[23] M. N. Islam,M. S. Alam, and M. A. Karim, _Optical security system employing quadrature multiplexing,_ Optical Engineering, vol. 47, 2008, Paper No. 048201.
[24] Z. Liu and S. Liu, _Double image encryption based on iterative fractional Fourier transform,_ Optics Communications, vol. 275, 2007, pp. 324-329.
[25] Z. H. Guan, F. Huang, and W. Guan, _Chaos-based image encryption algorithm,_ Physics Letters A, vol. 346, 2005, pp. 153-157.
[26] N. Y. Pareek, V. Patidar, and K. K. Sud, _Image encryption using chaotic logistic map,_ Image and Vision Computing, vol. 24, 2006, pp. 926-934.
Citation
S. Suvetha, B. Vinodha, "Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.249-253, 2019.
Human Computer Interfacing Using Eye Gazing and Movements
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.254-260, Feb-2019
Abstract
Eye gaze is staring at the face of others to examine and see what they`re staring at and to signal interest in interacting. it`s a nonverbal behaviour wont to convey or exchange info or specific emotions while not the utilization of words. The important aspect of this paper is to give the basic idea of Human Computer Interaction (HCI). The outline of this paper includes the introduction of what exactly are these HCI Systems, current existing systems and recent developments in the field, most common frameworks or architectures used in the design of HCI systems that may include unimodal and multimodal modes, and the applications of HCI.
Key-Words / Index Term
Human, Computer, Interaction, eye, gaze
References
[1] D. Teeni, J. Carey and P. Zhang, Human Computer Interaction:Developing Effective Organizational Information Systems, John Wiley& Sons, Hoboken (2007).
[2] B. Shneiderman and C. Plaisant, Designing the User Interface:Strategies for Effective Human-Computer Interaction (4th edition),Pearson/Addison-Wesley, Boston (2004).
[3] J. Nielsen, Usability Engineering, Morgan Kaufman, San Francisco (1994).
[4] D. Teeni, “Designs that fit: an overview of fit conceptualization in HCI”, in P. Zhang and D. Galletta (eds), Human-Computer Interactionand Management Information Systems: Foundations, M.E. Sharpe,Armonk (2006).
[5] L.R. Rabiner, Fundamentals of Speech Recognition, Prentice Hall, Englewood Cliffs (1993).
[6] S. Brewster, “Non speech auditory output”, in J.A. Jacko and A. Sears (eds), The Human-Computer Interaction Handbook: Fundamentals,Evolving Technologies, and Emerging Application, Lawrence ErlbaumAssociates, Mahwah (2003).
[7] G. Robles-De-La-Torre, “The Importance of the sense of touch in virtual and real environments”, IEEE Multimedia 13(3), Special issueon Haptic User Interfaces for Multimedia Systems, pp 24-30 (2006).
[8] W. Barfield and T. Caudell, Fundamentals of Wearable Computers andAugmented Reality, Lawrence Erlbaum Associates, Mahwah (2001).
[9] M.D. Yacoub, Wireless Technology: Protocols, Standards, andTechniques, CRC Press, London (2002).
[10] K. McMenemy and S. Ferguson, A Hitchhiker’s Guide to VirtualReality, A K Peters, Wellesley (2007).
[11] www.cc.gatech.edu/classes/cs6751_97_fall/projects/mssquared/ubicom p/ubicomp.html
Citation
V. Geetha, R. Akshaya, "Human Computer Interfacing Using Eye Gazing and Movements", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.254-260, 2019.
An Efficient Method to Discover Transformed Data Leak
Review Paper | Journal Paper
Vol.07 , Issue.04 , pp.261-263, Feb-2019
Abstract
The computer system poses a serious threat to the organisational security due to the leak of sensitive data. According to the report of risk based security (RBS), the leaked sensitive data records has increased dramatically during last few years, (i.e.) from 412 million in 2012 to 822 million in 2013. These are caused only by the lack of proper encryption on files and documents and by human errors these causes data loss. Organisation has the responsibility of screening the content which is stored in the system as sensitive data. In this paper, we utilize two techniques, which are levenshtein-distance technique and luecene search framework. These two helps to detect the leakage of data and this technique is used for screening the data which are outsourced and it also keep an track of, who is transferring the data.
Key-Words / Index Term
Sensitive data, Data leak, Data detection, levenshtein-distance, luecene search
References
[1] X. Shu, D. Yao, and E. Bertino, “Privacy preserving detection of sensitive data exposure,” IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 5, pp. 1092–1103, May 2015.
[2] K. Borders and A. Prakash, “Quantifying information leaks in outbound Web traffic,” in Proc. 30th IEEESymp. Secur. Privacy (SP), May 2009, pp. 129–140.
[3] S. Jha, L. Kruger, and V. Shmatikov, “Towards practical privacy for genomic computation,” in Proc. IEEE Symp.Secur.Privacy, May 2008, pp. 216–230.
[4] S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese, “Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia,” in Proc. 3rd ACM/IEEE Symp. Archit. Netw.Commun. Syst. (ANCS), 2007, pp. 155–164.
Citation
S. Sindhuja, M. Valliammai, "An Efficient Method to Discover Transformed Data Leak", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.261-263, 2019.
Semantic Ontology Extraction in Heterogeneous Text Documents
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.264-268, Feb-2019
Abstract
Ontology Extraction is an important role in the Semantic Web as well as in knowledge management. The emergence of Semantic Web and the associated technologies promise to make the Web a meaningful experience. On the contrary, success of Semantic Web and its applications depends largely on utilization and interoperability of well-formulated ontology bases in an automated heterogeneous environment. Ontology is what exists in a domain also how they relate with each other. The advantage of ontology is that it represents real world information in a manner that is machine understandable. This leads to a diversity of interesting applications for the benefit of the target user groups. Ontology defines the terms used to describe and represent an area of knowledge. Ontologies are significant for applications that need to search across or merge information from diverse communities. In this paper, we present our move toward to extract relevant ontology concepts and their relationships from a knowledge base of heterogeneous text documents.
Key-Words / Index Term
heterogeneous, knowledge, machine understandable, Ontology Extraction, Semantic Web
References
[1] M. Dean and G. Schreiber, “OWL Web ontology language reference,” W3C Recommendation, Feb.2004.
[2] J. Euzenatand P. Shvaiko, Ontology Matching. Heidelberg, Germany: Springer-Verlag,2007.
[3] R. Farkas, V. Vincze, I. Nagy, R. Ormándi, G. Szarvas, and A. Almási, “Web-based lemmatisation of named entities,” in Proc. TSD,vol.5246,LectureNotesinComputerScience,P.Sojka, A. Horák, I. Kopecˇek, and K. Pala, Eds. Berlin, Germany:Springer-Verlag, 2008, pp. 53–60.
[4] D.Faure and T. Poibeau, “First experiences of using semantic knowl- edge learned by ASIUM for information extraction task using INTEX,” in Proc. ECAI Workshop Ontology Learning, vol. 31, CEUR Work- shop Proceedings, S. Staab, A.Maedche, Nédellec, and P. Wiemer- Hastings, Eds.,2000.
[5] A.Maedche and S. Staab, “The Text-To-Onto ontology learning environ- ment,” in Proc. 8th Int. Conf. Conceptual Struct., Darmstadt, Germany,2000, pp.14-18.
[6] W.BFrakes and R. A. Baeza-Yates, Eds., Information Retrieval: Data Structures & Algorithms. Englewood Cliffs, NJ:Prentice-Hall,1992.
[7] M. Gaeta, F. Orciuoli, S. Paolozzi, and P. Ritrovato, “Effective ontology management in virtual learning environments,” Int. J.Internet Enterprise Manage., vol. 6, no. 2, pp. 96–123,2009.
[8] A.D. Maedche, Ontology Learning for theemanticWeb.Norwell, MA: Kluwer,2002.
[9] C. D. Manning and H. Schtze, Foundations of Statistical Natural Language Processing. Cambridge, MA: MIT Press, Jun.1999.
[10] D. L. McGuinness, R. Fikes, J. Rice, and S. Wilder, “The Chimaera ontology environment,” in Proc. AAAI/IAAI, 2000, pp. 1123–1124.
[11] R. Navigli and P. Velardi, “Semantic interpretation of terminological strings,” in Proc. 6th Int. Conf. TKE, 2002, pp. 95–100.
[12] R. Navigli, P. Velardi, and A. Gangemi, “Ontology learning and its application to automated terminology translation,” IEEE Intell. Syst., vol. 18, no. 1, pp. 22–31, Jan.2003.
Citation
T. Deepaalakshmi, "Semantic Ontology Extraction in Heterogeneous Text Documents", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.264-268, 2019.
Effective Content Based Data Retrieval Algorithm for Industrial Manpower Resource Organizer
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.269-272, Feb-2019
Abstract
In each query session, the algorithm maintains weights on the data in the database which reflect the assumed relevance of the data. Relevance feedback is used to modify these weights. As a second ingredient, the algorithm uses a minimax principle to select data for presentation to the user: any response of the user will provide significant information about his query, such that relatively few feedback rounds are sufficient to find a satisfactory data. We have implemented this algorithm and have conducted experiments on both simulated data and real data which show promising results. The objective behind developing IMPRO (Industrial Manpower Resource Organizer) is to maintain the hierarchy of the employees within an organization. It provides the manger and administrative department an overall hierarchical view of the complete enterprise and helps them in managing employee’s allocation between the manufacturing plants in large scale industry. Every Organization has many managers, who are responsible for all the activities in the organization. These managers manage different aspects of the organizational management issues, such as manufacturing, production, Marketing, etc; one such essential management issue is IMPRO. As years progressed, the approach of the management changed towards the human capital. Now Hierarchical Organization is part of every organization, and has its own identity and importance.
Key-Words / Index Term
Content Based, Data Retrieval, Manpower, IMPRO, Feature Selection
References
[1] Everingham, M., Van Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: The PASCAL Visual Object Classes Challenge2007 Results (2007), http://www.pascalnetwork. org/challenges/VOC/voc2007/workshop
[2] Markus Koskela, JormaLaaksonen, and ErkkiOja. “Inter-Query Relevance Learning in PicSOM for Content-Based Image Retrieval”. In SupplementaryProceedings of 13th International Conferenceon Artificial Neural Networks / 10th InternationalConference on Neural Information Processing(ICANN/ICONIP 2003). Istanbul, Turkey. June 2003.
[3] F. Jing, M. Li, H. Zhang, and B. Zhang, “A unified framework for image retrieval using keyword and visual features”, IEEE Transactions on Image Processing, 2005, pp.979-989.
[4] X.S. Zhou and T.S. Huang, “Unifying Keywords and Visual Contents in Image Retrieval”, IEEE MultiMedia, 2002, pp.23-33.
[5] X. He, O. King,W. Ma, M. Li, and H. Zhang, “Learning a semantic space from user’s relevance feedback for image retrieval”, IEEE Trans. Circuits Syst. VideoTechn., 2003, pp.39-48.
[6] J. Fournier and M. Cord, “Long-term similarity learning in content-based image retrieval”, Proc. ICIP (1), 2002, pp.441-444.
[7] M. Koskela and J. Laaksonen, “Using Long-Term Learning to Improve Efficiency of Content-Based Image Retrieval”, Proc. PRIS, 2003, pp.72-79.
[8] Jacob Linenthal and Xiaojun Qi, “An Effective Noise- Resilient Long-Term Semantic Learning Approach to Content-Based Image Retrieval,” IEEE InternationalConference on Acoustics, Speech, and Signal Processing(ICASSP’08), March 30-April 4, Las Vegas, Nevada, USA, 2008.
[9] MichaelWacht, Juan Shan, and Xiaojun Qi, “A Short- Term and Long-Term Learning Approach for Content- Based Image Retrieval,” Proc. of IEEE InternationalConference on Acoustics, Speech, and Signal Processing(ICASSP’06), pp. 389-392, Toulouse, France,May14-19, 2006.
[10] C. Zhang and T. Chen, “An active learning framework for content-based information retrieval”, IEEE Transactionson Multimedia, 2002, pp.260-268.
[11] S. Tong and E.Y. Chang, “Support vector machine active learning for image retrieval”, Proc. ACM Multimedia, 2001, pp.107-118.
[12] P.-H. Gosselin, M. Cord, S. Philipp-Foliguet, “Active learning methods for Interactive Image Retrieval” ,IEEE Transactions on Image Processing, 2008.
[13] E. Chang, S. Tong, K. Goh, and C. Chang, “Support Vector Machine Concept-Dependent Active Learning for Image Retrieval”,IEEE Transactions on Multimedia, 2005.
[14] Y. Chen, X.S. Zhou, and T.S. Huang, “One-class SVM for learning in image retrieval”, Proc. ICIP (1), 2001, pp.34-37.
[15] Y. Rui and T.S. Huang, “Optimizing Learning in Image Retrieval”, Proc. CVPR, 2000, pp.1236-1236.
[16] J. Rocchio. “Relevance Feedback in Information Retrieval”, Salton: The SMART Retrieval System: Experimentsin Automatic Document Processing, Chapter 14, pages 313323, Prentice-Hall, 1971.
[17] Remco C. Veltkamp, MirelaTanase, “Content-based Image Retrieval Systems: a Survey”. State-of-the-Artin Content-Based Image and Video Retrieval 1999: 97-124.
[18] A.W.M. Smeulders, M.Worring, S. Santini, A. Gupta, and R. Jain, “Content-Based Image Retrieval at the End of the Early Years”, IEEE Trans. Pattern Anal.Mach. Intell., 2000, pp.1349-1380.
[19] Crucianu, M., Ferecatu, M., Boujemaa, N. (2004) “Relevance feedback for image retrieval: a short survey”, 20 p., State of the Art in Audiovisual Content-Based Retrieval, Information Universal Access and Interaction, Including Data models and Languages, reportof the DELOS2 European Network of Excellence (FP6).
[20] M.S. Lew, N. Sebe, C. Djeraba, and R. Jain, “Content based multimedia information retrieval: State of the art and challenges”, TOMCCAP, 2006, pp.1-19.
Citation
S. Mahalakshmi, A. Elakiya, "Effective Content Based Data Retrieval Algorithm for Industrial Manpower Resource Organizer", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.269-272, 2019.
Real-Time Big Data Analytics: Applications and Challenges
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.273-276, Feb-2019
Abstract
In recent years, time-significant processing or real-time processing andanalytics of big data have received a huge amount of attentions. There are many areas/domains where real-time processing of data and making timely decision can saves thousands of human lives, minimizing the risks of human lives and resources, enhance the quality of human lives, enhance the chance of effectiveness, capableresources management etc. This paper has describedreal-time big data analytics applications and the tools used and the technical challenges faced by the applications. In addition it presents a general overview of big data to describe a background knowledge on this extent. Some examples of these domains includesecurity, healthcare, transportation, military, and natural disaster. Several big data applications in these domains rely on fast and timely analytics based on available data to make excellence decisions.
Key-Words / Index Term
bigdata,applications,tools,challenges
References
[1] Nader Mohamed, Jameela Al-Jaroodi, “Real-Time Big Data Analytics: Applications and Challenges” International Conference on High-performance Computing & Simulation (HPCS), 2014
[2] Big Data Real Time Analytics: Applicationsand ToolsJayanth Kumar K1, Anisha B.S
[3] Real-Time Big Data Processing Framework: Challenges and Solutions Zhigao Zheng1,2, Ping Wang1,3,4,∗ and Jing Liu3 and Shengli Sun 1
[4] Big Data Real Time Analytics: Applications and Tools Jayanth Kumar K1, Anisha B.S.2
[5] B. Balis, T. Bartynski, M. Bubak, G. Dyk, T. Gubala, and M. Kasztelnik, “A Development and Execution Environment for Early Warning Systems for Natural Disasters,” In 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 575-582. IEEE, 2013.
[6] Real-timebig data analytics-applications and challenges-Nader Mohamed Jameela Al-Jaroodi
[7] A Thommandram, JE Pugh, JM Eklund, C McGregor, andAG James. Classifying neonatal spells using real-time temporalanalysis of physiological data streams: Algorithm development.
[8] In IEEE Point-of-Care Healthcare Technologies(PHT 2013), pages 240–243, New York, USA,Bangalore, India,2013. IEEE.
Citation
R. Uthra, A. Mahalakshmi, "Real-Time Big Data Analytics: Applications and Challenges", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.273-276, 2019.