IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 293 results

  • White Papers // Apr 2014

    Journey from Data Mining to Web Mining to Big Data

    Data is the collection of values and variables related in certain sense and differing in some other sense. The size of data has always been increasing. Storing this data without using it in any sense is simply waste of storage space and storing time. Data should be processed to extract...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification

    Packet classification is a vital and complicated task as the processing of packets should be done at a specified line speed. In order to classify a packet as belonging to a particular flow or set of flows, network nodes must perform a search over a set of filters using multiple...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Categorical Heuristic for Attribute Based Encryption in the Cloud Server

    Attribute-Based Encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and Ciphertexts. One...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    An Approach for Normalizing Fuzzy Relational Databases Based on Join Dependency

    Fuzziness in databases is used to denote uncertain or incomplete data. Relational databases stress on the nature of the data to be certain. This certainty based data is used as the basis of the normalization approach designed for traditional relational databases. But real world data may not always be certain,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Optimizing Resource Allocation in IAAS Clouds

    Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as Infrastructure-as-a-Service (IaaS). The IaaS allows cloud users to access resources in pay per use fashion. The problem with this service model...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    A Survey of Preprocessing Method for Web Usage Mining Process

    The amount of web applications are increasing in large amount and users of web applications are also increasing rapidly with high speed. By increasing number of users the size of log file also increases .The information which stores in log files cannot be directly used for analysis. Therefore preprocessing of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data

    Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable Symmetric Encryption (SSE)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment

    Cloud computing is an emerging technology in distributed computing which facilitates pay per model as per user demand and requirement. Cloud consists of a collection of virtual machine which includes both computational and storage facility. The primary aim of cloud computing is to provide efficient access to remote and geographically...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Adaptive Mobile Video Streaming and Efficient Social Video Sharing in Cloud

    The mobile phones grow to be an essential part of the people everyday life, with smart phone sales at present greater than before very much and also user demands to run lots of applications have enhanced. The victory of next invention mobile phone communication based on the capability of service...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Ensuring Accountability for Data Sharing in Cloud

    Cloud computing is emerging rapidly as part of latest developments in communication trends and technology. It brought revolution in today's world among key stakeholders like service providers and consumers. As a result, Leading IT industries and consumers changed the traditional way of doing business and swiftly started moving towards cloud...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Big Data : Overview

    Big data is data that exceeds the processing capacity of traditional databases. The data is too big to be processed by a single machine. New and innovative methods are required to process and store such large volumes of data. This paper provides an overview on big data, its importance in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Importance and Techniques of Information Hiding : A Review

    Information or data is very crucial resource to the users. Thus securing the information becomes all the more necessary. The communication media through which the users send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today. It...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    A Privacy Preserving of Composite Private/Public Key in Cloud Servers

    Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that they should not have access to. It is a two step process. The security system in the first step identifies who the user is by requiring the user...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    A Study on Big Data Integration with Data Warehouse

    The amount of data in world is exploding. Data is being collected and stored at unprecedented rates. The challenge is not only to store and manage the vast volume of data, but also to analyze and extract meaningful value from it. In the last decade data warehousing technology has been...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Object Deployment Using Data Trans-Reception in Military Applications

    A Mobile Ad-hoc NETwork (MANETs) is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Improved 3-Dimensional Security in Cloud Computing

    Cloud computing is a trending technology in the field of information technology as it allows sharing of resources over a network. The reason cloud computing gained traction so rapidly was because of its performance, availability and low cost among other features. Besides these features, companies are still refraining from binding...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack

    Cloud computing is widely used technology in present era. Cloud computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uninterrupted services. DDOS attack is one of the most important issue in cloud environment which...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Password-Only Authenticated Key Exchange Using Distributed Server

    Authentication using Password-Authenticated Key Exchange Using Distributed sErver (PAKEUDE) is done where a cryptographic key - exchange of messages. Database of all passwords to authenticate clients are stored in a distributed server. If the server is compromised, the attacker cannot act like a client with the information from the compromised...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Analysis of Job Scheduling Algorithms in Cloud Computing

    Cloud computing is flourishing day-by-day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of issues are confronted like heavy load or traffic while computation. Job scheduling is one of the answers to these issues. It is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    A Proposed Methodology for Virus Detection Using Data Mining and Reverse Engineering Tools with Client-Server Model

    Viruses are a class of malicious programs that cause unfavorable effects on the computer system and thereby become an obstacle to the standard operation of the system. Their existence and execution within the system should be detected within an apt time to prevent them from causing irrecoverable and devastating problems...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Hadoop Mapreduce Framework in Big Data Analytics

    As hadoop is a substantial scale, open source programming system committed to adaptable, disseminated, information concentrated processing. Hadoop Mapreduce is a programming structure for effectively composing requisitions which prepare boundless measures of information (multi-terabyte information sets) in parallel on extensive bunches (many hubs) of merchandise fittings in a dependable, shortcoming...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Implementation of an Efficient RBAC Technique of Cloud Computing in .Net Environment

    Cloud computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of security and traffic related issues are confronted. Load balancing is one of the answers to these issues. RBAC deals with...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Survey on Security Issues and Solutions in Cloud Computing

    Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Cloud computing weakness include list of issues such as the security and privacy of business...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Securing ATM Using Graphical Password Authentication Scheme

    In the people day to day life ATMs are widely used and have brought so much relief to the financial world. Various problems were solved with the advent of these machines ranging from keeping the banking hall free of traffic with its attendant issues. But crime at ATMs has become...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Multiple Criteria Decision Making Methodology for Network Security

    Technology and it's requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling the decision system. Making a prejudice statement on the support system is lead to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    A Review on Impersonation Attack in Mobile Ad-Hoc Network

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Analysis on Credit Card Fraud Detection Methods

    Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern techniques in detecting fraud are persistently evolved and applied to many business fields. Fraud detection involves monitoring the activities of populations of users in order to estimate, perceive or avoid undesirable behavior....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    VHDL Modeling of Intrusion Detection & Prevention System (IDPS) - A Neural Network Approach

    The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes. The cost of temporary or permanent damages caused by unauthorized access of the intruders to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Privacy Preservation using Shamir's Secrete Sharing Algorithm for Data Storage Security

    The cloud computing is a latest technology which provides various services through internet. The cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Battery-Powered Mobile Computer using Denial of Service

    A Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Survey on End-to-End Confidentiality in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a collection of a large number of sensor nodes and few sink nodes that have limited computation, communication and power resources. Data aggregation is used to reduce amount of data transmission and increases the lifetime of sensors. Data aggregation is the process of combining...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    An Effective Secure Mechanism for Vehicular Content Distribution in VANET

    Vehicular Ad hoc NETworks (VANETs) facilitate vehicles to communicate with each other and with Road-Side Units (RSUs). Content distribution for vehicular users through roadside Access Points (APs) has become an important requisite to obtain good road safety and driving experience. Cooperative Content Distribution System for Vehicles (CCDSV) operates upon a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Efficient Data Gathering and Improving Network Lifetime in Wireless Sensor Networks

    In large-scale wireless sensor networks the data gathering mechanism to introducing mobility into the network. The authors consider the location service in a WSN, where each sensor needs to maintain its location information by frequently updating its location information within its neighboring set of polling points in the network. In...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept

    Biometric system is essentially a pattern recognition system which recognizes a person by determining the authenticity of a specific physiological (e.g., fingerprints, face, retina, and iris) or behavioral (e.g., gait and signature) characteristic possessed by that person. Among all the presently employed biometric techniques, fingerprint identification systems have received the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Novel Design and Implementation of Topology and Orchestration Specification for Cloud Applications to enable Portability

    In order to obtain an optimal detector that is also robust, an appropriate approach is to treat the watermark detection as a statistical detection problem, wherein a binary hypothesis test is formulated using a more accurate Probability Density Function (PDF) of the DWT coefficients of the image. Various types of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    WLan Architecture

    It is the review paper of architecture of wireless local area networks. In this paper the authors are discussing the architecture of WLAN. A Wireless LAN (WLAN) is a local area network based on wireless technology. Most modern local area networks now employ some wireless network infrastructure because it allows...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Efficient Fault-Tolerant Strategy Selection Algorithm in Cloud Computing

    Cloud computing is upcoming a mainstream feature of information technology. More progressively enterprises deploy their software systems in the cloud environment. The applications in cloud are usually large scale and containing a lot of distributed cloud components. Building cloud applications is highly reliable for challenging and critical research issues. Information...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Defending Wireless Sensor Network using Randomized Routing

    Wireless Sensor Network (WSN) challenges in the transmission of data are its network traffic and network security. Another issue in sensor network is compromised node and Denial-of-Service attack (DOS). Multipath routing algorithms are vulnerable to these attacks. A key management scheme is used with this routing algorithm to generate randomized...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    A Study on Educational Data Mining

    Data mining is the automatic extraction of implicit and interesting patterns from large data collections. Educational data mining is an emerging discipline, concerned with developing methods for exploring the unique types of data that come from educational settings, and using those methods to better understand students, and the settings which...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2014

    Improved WaterMarking algorithm For Securing Image authentication and Integrity

    Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A digital watermark is a signal permanently embedded into digital data that can be detected or extracted later by means of computing operations in order to make assertions about the data. In the existing approach discrete...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Spectral Flatness Measurements for Detection of C-Worms

    Active Worms such as Morris (1988), CodeRed (2001), Nimda (2001), Slammer worm (2003),Blaster (2003) and Witty (2004) had always caused large parts of the Internet to be temporarily inaccessible, costing both public and private sectors millions of dollars. The authors identified a hard to detect new class of worms like...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Secure Mobile System Using NTRU Encrypt

    The first IM system created by Mirabilis (a pioneer of online chatting that revolutionized communication over the Internet), dubbed ICQ (I seek you), in 1996 which achieved widespread adoption quickly among netizens. Although other Instant Messaging (IM) systems have surpassed ICQ in popularity, the medium of IM remains a popular...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Dual Encryption Schema with Cheating Text and NTRU

    Shared data systems have grown in numbers and hence they are susceptible to many security challenges. The sender embeds a plain message in another plain text called Cheating Text. The positions of the characters of the plain text in the cheating text are stored in a Real Message Index File...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Security and Access Control Evaluation for Cloud Data Centers

    Cloud computing is a computing paradigm that enables highly scalable services to be consumed over the Internet on a shared basis. Cloud service providers place data in data centers which is distributed as shared data to the users. Users' data are usually processed remotely in unknown machines that users do...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Scalable Communication for Web Applications by Using Windows Azure Serive

    Cloud computing has emerged as an ideal platform for deploy scalable web applications. But at the same time they give up data consistency. However, many applications cannot give any data inconsistency scalable transaction manager which guarantee ACID properties for multi-item connections issued by Web application, even in the attendance of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Automatic Bus Recognition Through Mobile

    In this paper, the authors present a GPS (Global Positioning System) to track the vehicle in the remote areas. Here based on the latitude and longitude values of the vehicles anywhere on the globe, a microcontroller which will process the information and switch the GSM (Global System for Mobile communication)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Vaccination Strategies of a Modified SIS Model on Complex Networks

    A new susceptible-infected-susceptible model is researched in this paper, which has an infective vector. And it describes epidemics (e.g. malaria) transmitted through an infective vector (e.g. mosquitoes) on complex networks. The authors compare the modified model with the standard SIS model having an infective vector. They also study and compare...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    A FEC Decoding in LTE and WiMAX Systems

    In this paper, the authors are mainly dealing with Forward Error Correction (FEC) which is a technique used for controlling data errors in unreliable or noisy channels. Recent wireless systems such as EDGE, WIMAX, LTE are using LDPC, tail biting and turbo convolution codes as the Forward Error Correction codes...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Eradicate Energy Inefficiencies That Reduce The Lifetime Using Clustering Approach For WSN

    The Wireless Sensor Network technology is a enter constituent for everywhere. A Wireless Sensor Network consists of a huge number of sensor nodes. Every sensor node senses ecological circumstances such as temperature, force and light and sends the sensed data to a base station which is a long way off...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Secure CRM Cloud Service using RC5 Algorithm

    Enterprises always used organizational internal storage system for storing data. Mainly in a Customer Relational Management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage are there may be intruders in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Secure Web Mining Framework for e-Commerce Websites

    In this paper, the authors deal with e-commerce website and shows the usage of web mining technology to provide security for e-commerce websites. User behavior on the web is based on web mining, security and e-commerce. Customer behavior pattern is analyzed to improve e-commerce websites. Different web mining algorithm and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Review of Transactions on Illuminated Facial Image Preprocessing for User Authentication

    In this paper, the authors mainly deal with improving the performance of face detection security system by removing the two most important factors that is illumination and reflectance which hamper detection or reorganization. The problem in 2D face verification system is poor illumination condition which causes variation in facial image...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Cryptoviral Extortion: A virus based approach

    As the authors know that traditionally, "Cryptography" is used for information processing and communications, it helps people to store information securely and it is used very frequently for private communications. But Cryptovirology is the study of applications of cryptography to build the malicious software (malware). It is an investigation, how...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Reliable Data Delivery in Mobile Ad-Hoc Network using Fisheye State Routing

    In this paper, the authors address the problem of reliable data distribution in dynamic large scale mobile ad-hoc network, for which existing routing protocols are not suitable. An efficient Position-based Opportunistic Routing (POR) protocol is good in delivering the data in highly dynamic MANETs. But it is affected by the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Data Storage in Cloud Environment Enhance Privacy

    Cloud data have to be encrypted to protect data privacy, before outsourced to the commercial public cloud. The encryption process makes effective data utilization service a very challenging task. Traditional searchable encryption techniques allow users to securely search over encrypted data through keywords. They support only Boolean search and are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Optimal Price Distribution Strategy for Mobile Service Providers

    Ubiquitous Multimedia Access has become a very common topic within the multimedia community during the last few years. Research centers and telecom providers address new, smart and efficient solutions for the ubiquitous access to multimedia data and in particular videos, from everywhere with mobile devices. But videos pose serious problems...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Handling Traffic Dynamics in Multipath Routing Topology

    To achieving a better quality of service and overall network performance, it is able to cope almost optimally with unpredicted traffic dynamics. Using multiple virtualized routing topologies, AMPLE (Adaptive Multi-topology traffic Engineering) system shows an effective routing performance. The proposed system consists of offline link weight optimization component that takes...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    FESCIM for Multi-Hop Cellular Network

    In multi-hop cellular networks, the mobile nodes forever advertise other's packets for fashionable the network performance and deployment. However, selfish nodes usually do not cooperate but make use of the cooperative nodes to relay their packets, which degrades network fairness and performance. Due to this, the authors propose a fair...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Routers Optimization and Minimizing Forwarding States with Explicit Multicast Forwarding

    Now-a-day's plenty of algorithms and techniques are available for optimization and multicast forwarding. But in this paper, the authors are improving the scalability (Efficiency) of IP multicast and source specific multicast and to reduce the number of routers for required storing the forwarding states. The Multicast forwarding mechanism optimizes the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Automatic Rule Extraction from Frequent Rules in Similar Network Sites

    Knowledge is an essential part of most Semantic Web applications and ontology. Ontology is the most important part of the knowledge. Ontology learning, which refers to extracting conceptual knowledge from several sources and building ontology from scratch, enriching, or adapting an existing ontology is one of the attempts at knowledge...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

    Patient Health Records (PHR) is maintained in the centralized server to maintain the patient's personal and diagnosis information. The patient records should be maintained with privacy and security. The privacy mechanism protects the sensitive attributes. The security schemes are used to protect the data from public access. Patient data can...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Unassailable Fuzzy Keyword Searching in Cloud Storages

    Cloud Computing allows users to dispense as well as access data remotely. The ongoing environment, in which the data is stored in cloud, has a security dent, which is still not yet resolved. A notable number of techniques have been developed to retrieve data using keyword searches through encrypted data....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Cloud Information Accountability Frameworks for Data Sharing in Cloud - A Review

    The difficulty of how to provide proper security and privacy protection for cloud computing is very important, and as yet not solved. In this paper, the authors review the cloud information accountability framework for the data sharing in which procedural and technical solutions are co-designed to demonstrate accountability by the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission

    The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Diverse techniques including watermarking, steganography, and cryptography have been introduced...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Securing User's Data in HDFS

    With the advent of technology and increasing growth in volume of data the business are finding the cloud as suitable option to host their data. However, putting the sensitive data on third-party infrastructure poses several security risks to their data utilizing the advantages of the Clouds. Though there are many...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Challenges and Issues in 4G - Networks Mobility Management

    Wireless broadband technology is now in motion to provide higher data rate, wider coverage and improved mobility. Towards this, the 4G-network is an integration of various wireless technologies and expected to provide seamless mobility. Moreover 4G-networks will be entirely packet switched systems based on IP protocol. One of the research...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Chain Clustered Communication Protocol for WSN

    A Wireless Sensor Network (WSN) is composed of a collection of sensor nodes. Sensor nodes being small energy constrained devices; hence the main focus is that these have to be as energy efficient as possible. The focus should also be on minimizing the transmitting and receiving of data, as these...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Mobile Location-Based Tour Guide System

    Mobile phones are the most commonly used communication tools. Using mobile phones to obtain information is not only quick, but also more convenient shortcut to improve people's lives. In the paper, the authors propose the software development architecture based on Web services. This framework introduces the three-layer architecture of Web...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    An Efficient Approach For Integrating Data Mining Into Cloud Computing

    Cloud computing and data mining are the two emerging trends now a days in the world of information technology and computing. This paper deals with the study of how data mining is used in cloud computing. Data mining is a process of extracting potentially useful information from raw data, and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Reviewing Effectiveness of CAPTCHA

    The massive use of the Internet and WWW by the government and commercial organizations for automation of work has resulted in extensive proliferation of online computing. To avoid online forms being filled by bots or malicious computers the form designers usually use a cryptic image known as CAPTHA (Completely Automated...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Assuring Data Sharing and Culpability as a Service in Cloud

    Cloud computing presents a replacement thanks to supplement the present consumption and delivery model for IT services supported the net, by providing for dynamically accessible and sometimes virtualized resources as a service over the net. Data handling is outsourced by the direct Cloud Service Provider (CSP) to alternative entities within...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Implementation Opass Authentication Protocol System for Net Security

    Safety may be a major focus of awareness for operators and users of the web site and its several applications, among the tough issues still inefficiently self-addressed is identity authentication for functions of associating specific user with particular services and authorizations. Asking may be thanks to classify users such shaping...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Wireless LAN Security: Addressing Challenges, Attacks and Solutions

    With tremendous growth and advancement in wireless technology and excessive use of internet in all the applications, security has become one of the most crucial and most demanding factors in wireless LAN, no matter if it is an individual, home or a business network. Regardless of different benefits of wireless...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks

    In this paper, the authors identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. They propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. The protocol is a software-based solution...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Behaviour Based Trust Management Using Geometric Mean Approach for Wireless Sensor Networks

    The resource constraints of Wireless Sensor Network (WSN) make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Hence, they...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, the author has proposed a new hybrid graphical password based system. The system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel SHA-1 Approach in Database Security

    Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving, data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information. A database contains data ranging from different degree of confidentiality and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Asynchronous Optical Burst Switching Networks

    The ever increasing demand for higher bandwidth due to the growth of bandwidth intensive applications such as video-on-demand, video conferencing, on-line banking, on-line auction and other multimedia applications motivated the search for alternatives to traditional electronic networks. Optical Burst Switching (OBS) is one such paradigm developed to handle the future...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Security Design Combining the Advantages of Cryptanalysis and Anonymous Routing Protocol to Achieve Data Secrecy and Anonymity

    Since internet is widely used these days, users privacy has become the main concern. Privacy is related to anonymity. Basic requirement for anonymity is to unlink the user's identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Linear Appearance Based Algorithms for Face Recognition

    Analyzing the face recognition rate of various current face recognition algorithms is absolutely critical in developing new robust algorithms. In this paper, the authors propose performance analysis of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA) and Locality Preserving Projections (LPP) for face recognition. This analysis was carried out on...

    Provided By IJCTT-International Journal of Computer Trends and Technology