International Journal of Engineering and Innovative Technology (IJEIT)

Displaying 1-40 of 98 results

  • White Papers // Nov 2013

    Utilization of ID-Based Proxy Blind Signature Based on ECDLP in Secure Vehicular Communications

    Security of Vehicular Ad-hoc NETworks (VANETs) has been a major research area in both academia and industry. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge in vehicular communications. Security establishment with no certificates and/or certificate revocation gives lesser signature overhead....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2013

    A Survey on the Measurements and Requirements of Various Security Aspects of Data Warehousing Environment in Different Levels of Organization

    In this paper, the authors present the survey about the security levels of various levels of organizations ranging from small, medium, large and enterprise. The activities are common in all the levels of data warehousing environment, the only thing to consider is the amount of data and the number of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2013

    A New Approach for Skin Tone Based Steganography with Key Analysis for Mistreatment Biometrics

    Biometric feature accustomed implement steganography is skin tone region of pictures. Here secret information is embedded inside skin region of image that may offer a wonderful secure location for information activity. For this skin tone detection is performed by using HSV (Hue, Saturation and Value) color space and DWT (Discrete...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2013

    A Survey on Resource Allocation and Task Scheduling Algorithms in Cloud Environment

    Cloud computing is a computing service paradigm that charges under the basis of the amount of resources consumed i.e. pay per use constraint .One key characteristic that differentiate cloud computing from the other enterprises computing is that the infrastructure itself is programmable. An important issue faced by Infrastructure-as-a-Service (IaaS) in...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2013

    Energy Efficiency for Data Center and Cloud Computing: A Literature Review

    Cloud computing (CC) is a promising area in distributed computing. This technology can achieve communication, storage, processing, high performance, hosting and services on demand to cloud costumer. Energy consumption cost and environmental effect are dynamic challenge to cloud computing. Data centers are the backbone of cloud computing. They continue to...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2013

    Improving the Efficiency of Apriori Algorithm in Data Mining

    In computer science and data mining an interdisciplinary subfield of computer science, is the computational process of discovering patterns in large data sets in database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2013

    Radio Frequency Identification (RFID) Security Issues and Possible Solutions

    Radio Frequency IDentification (RFID) has become popular for automated identification and tracking of objects, goods and people. As the applications of RFID are expanding every day, new security issues also will be appeared. This paper speaks about fundamentals of RFID systems and security issues which can be raised in each...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    Review of Biometric Technologies Used for ATM Security

    Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security, authentication plays an important role. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    A New Approach for Discovering Frequent Pattern from Transactional Database

    Frequent pattern mining is a heavily researched area in the field of data mining with wide range of applications. Finding a frequent pattern (or items) play essentials role in data mining. Efficient algorithm to discover frequent patterns is essential in data mining research. A number of research works have been...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    Real Time Peer-Peer Intrusion Detection Using Rough Set Dynamic Reduct Approach

    There's a humongous rise in the usage of internet over the past decade with the introduction of new services and constantly progressing technology. Some of these services imbibe in them sensitive information thereby resulting in high exposure for compromising the data. There comes a deep necessity to inculcate the features-confidentiality,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Mobile Cloud Security Issues and Challenges: A Perspective

    Mobile Cloud Computing (MCC) is exploring vast in IT due to anywhere anytime data access. Mobile devices are enabled with rich user experience especially, Smartphone's. Apple, Google, Facebook and Amazon are the top four horsemen in the mobile world. That is why the mobile cloud computing technology is growing rapidly...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Comparison Between PSO and Firefly Algorithms in Fingerprint Authentication

    One of the biggest challenges facing society is confirming the true identity of a person. Fingerprint identification may be preferred over traditional methods (e.g. passwords, smart-cards) because its information is virtually impossible to steal. Recently, a new trend has been opened by using swarm intelligence techniques in biometric field. Therefore,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Enhancing Data Security during Transit in Public Cloud

    Cloud computing has developed as a widespread model in computing world in which resources of the computing infrastructure are provided as services over the Internet. A cloud computing scenario usually tailors the server as needed. Cloud computing pattern also brings out several new challenges in data security and access control...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    A Review of Cloud Computing Security Issues

    Compute clouds are enormous server farms packed with computing power and storage space accessible through the Internet. Instead of having to manage one's own infrastructure to run applications, server time and storage space can be bought from an external service provider. From the customers' point of view the benefit behind...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    VANET (Vehicular Ad-Hoc Networks): Avoidance of Risk Factor in Secure Communication

    Recent advances in development of Wireless Communication in Vehicular Ad-hoc NETwork (VANET) has provided emerging platform for industrialists and researchers. Vehicular ad-hoc networks are multi-hop networks with no fixed infrastructure. It comprises of moving vehicles communicating with each other. One of the main challenges in VANET is to route the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Security of Credit Card Using Security Code Displayed On Customer Mobile to Prevent Any Unauthorized Access

    As the authors know that over the past three decades, consumers have been largely depending on and trust credit to conveniently meet there credit needs, this paper is to develop a security code, which is used for credit card security system. In this paper, they have to plan that as...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Real Time Periodicity Detection in Time-Series Databases

    Time series is a set of statistics, usually collected at regular intervals. The goal of analyzing a time series database is to find whether and how frequent a periodic pattern is repeated within the series. Periodic pattern mining is the problem that regards temporal regularity. It has a number of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Identification and Alleviation of MANET Routing Attack Risks

    A Mobile Ad-hoc NETwork (MANET) is a self-starting dynamic network comprising of mobile nodes, where each and every participation node voluntarily transmit the packets destined to some remote node using wireless transmission. Mobile Ad-hoc NETworks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jun 2013

    Cloud Service Tools: State of the Art

    Cloud computing is not a newly developed technology. It is an evolutionary paradigm evolved from parallel computing, distributed computing, grid computing and utility computing. It has been one of the hot research topics in Information Technology circle. In the present scenario, many industries are involved in cloud computing related techniques....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Global Load Balancing and Fault Tolerant Scheduling in Computational Grid

    Grid computing is a replica of distributed computing that uses geographically and administratively different resources found on the network. These resources may include processing power, storage capacity, specific data, and other hardware such as input and output devices. In grid computing, individual users can access computers and data visibly, without...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Cloud Vision Using MOCHA Architecture on Jelastic Cloud

    Face recognition applications that automatically identify an individual from captured images or Videos are everywhere and are used for applications such as surveillance, airport security, military enforcement, and edge detection. Face recognition algorithms analyze images, extract information such as the shape, size and position of the facial features (e.g., eyes,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Design of Cloud Computing Based MIS Model for Textile Industries

    Small and Medium Scale Textile Industries are working under intensive market pressure. This pressure forces the textile business to improve their Management Information System (MIS) and reduce expenses (Capex) in IT. IT technology are developing so fast, it is very difficult to keep update with IT by SME. In order...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    A Study on Task Scheduling Algorithms in Cloud Computing

    Cloud computing is a new computing model using which applications, data and IT services are provided over the Internet. Cloud computing shares data and offers service transparently among its users. With the increase in number of users of cloud the tasks to be scheduled increases. The performance of cloud depends...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    STEP-2 User Authentication for Cloud Computing

    Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. At present cloud user authentication can be done by several ways like password authentication, Graphical and 3D password etc. In...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Deployment of Novel Techniques on Web Log Data to Analyze User Navigation Patterns

    The authors know that the amount of data available online is increasing day by day, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. Web mining technologies are the right solutions for knowledge discovery on the Web. Application of web usage...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Security Enhancement Using SCTP Against Password Stealing in Multi-Homed Networks

    SCTP is a young transport layer protocol. It is designed for transferring public switched telephone network signaling over IP networks. SCTP provide improved security mechanism in addition with DTLS. Password stealing attack is the major problem in the web environment. Passwords are stolen by attackers using several methods. An attacker...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    A Trust Based Secure Source Routing Using Fuzzy Logic Rules Prediction in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. It is a collection of independent mobile nodes that can communicate with each other via radio waves. These networks are fully distributed, and can work at any place without the help...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Secure Routing in Mobile Ad-hoc Networks: A Survey

    In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Functional Analysis of the Eucalyptus Private Cloud

    The paper addresses the methodology of deployment of a private cloud in enhancing the functional limits of cloud computation at constrained conditions of configuration. The investigation was performed in environment of well designed configuration in such a way that the load limits are controlled. The attempt reveals that there is...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Task Scheduling in Grid Computing Systems Constrained by Resource Availability

    In this paper, a survey of some of the approaches to task scheduling in grid computing systems based on resource availability is discussed. To improve task scheduling, resource availability can be predicted by multistate availability predictors. Execution time of each application is modeled by a random variable. Each application is...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Distributed Data Warehouse Architecture: An Efficient Priority Allocation Mechanism for Query Formulation

    Data warehouse is the repository where data for an enterprise is stored using a centralized approach. A data warehouse environment includes an Extraction, transportation, Transformation and Loading (ETL) solution, an On-Line Analytical Processing (OLAP) engine, client analysis tools, and other applications that manage the process of gathering data and delivering...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Review: Location Based Authentication to Mitigate Intruder Attack

    Recently the use of online banking has been increased to perform various online banking transactions. On the other hand, it is been targeted by various attacks found at the client side. Lately, traditional security methods were not capable enough to tackle these attacks such as intruder attacks, phishing attacks, etc....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Survey on Resource Allocation in Grid

    Resource allocation is a problem that arises whenever different resources, which have preferences in participating, have to be distributed among multiple autonomous entities. A distributed system is composed of such computers which are separately located and connected with each other through a network Resource allocation is a problem that arises...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Natural Language Interface to Database

    The need for natural language interfaces to database has become increasingly acute as more and more people access information from web browsers. Yet NLI (Natural Language Interface) is only usable if they map natural language questions to SQL queries correctly. Natural Language processing is becoming one of the most active...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Entropy-Based Similarity for Efficient Keyword Search In XML Databases

    With the rapid emergence of XML as a data exchange and data transfer medium over the Web, an effective keyword-based search approach to locate the relevant information is indeed essential. The major challenge with keyword-based search is to ensure that; it returns only the relevant results to the query, and...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Operating System as Service Using XEN Cloud

    Cloud computing provides a means to access IT service through a network. This paper can be used to effectively cut down infrastructure costs. In order to perform operations and run processes on multiple hardware systems, one would have to install the required operating systems in each of those systems. Cloud...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Providing Security for Database at Rest with Fine Grained Encryption

    Database is an important asset for any organization and there should be strong security measures to preserve the confidentiality of sensitive data. There are different levels of granularity for encryption. This paper focus on minimizing the overhead of encryption and decryption during query processing. These include encrypting the sensitive data...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    User Centric Access Control in Cloud Using Identity Management

    Having numerous login for many service providers brought an pathetic situation among many organizations in order to avoid verifying identity of each individual every time when they login the challenge to overcome the multiple accounts is by providing Identity as a Service (IaaS).The overall objective of security, private and trust...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Design and Implementation of Computation Grid, Measure & Improve Performance Parameter:-A Survey

    The goal of this Paper is to develop Reliable Communication System in the Grid. The first initiative is to apply multi-casting features to this protocol & the algorithm for the same is developed. Then apply the algorithm on the Grid by using MPI (Message Passing Interface). Reduce the System call,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Security Risks & Migration Strategy For Cloud Sourcing: A Government Perspective

    Governments of various countries all over the globe, irrespective of their economic & technological standing on the world stage, are realizing the benefits of cloud computing and devising strategies to migrate their IT systems to the Cloud, a trend also called Cloud sourcing. In this paper, the authors identify the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Distributed Data Warehouse Architecture: An Efficient Priority Allocation Mechanism for Query Formulation

    Data warehouse is the repository where data for an enterprise is stored using a centralized approach. A data warehouse environment includes an Extraction, transportation, Transformation and Loading (ETL) solution, an On-Line Analytical Processing (OLAP) engine, client analysis tools, and other applications that manage the process of gathering data and delivering...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2013

    Utilization of ID-Based Proxy Blind Signature Based on ECDLP in Secure Vehicular Communications

    Security of Vehicular Ad-hoc NETworks (VANETs) has been a major research area in both academia and industry. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge in vehicular communications. Security establishment with no certificates and/or certificate revocation gives lesser signature overhead....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2013

    A Survey on the Measurements and Requirements of Various Security Aspects of Data Warehousing Environment in Different Levels of Organization

    In this paper, the authors present the survey about the security levels of various levels of organizations ranging from small, medium, large and enterprise. The activities are common in all the levels of data warehousing environment, the only thing to consider is the amount of data and the number of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    Review of Biometric Technologies Used for ATM Security

    Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security, authentication plays an important role. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    A New Approach for Discovering Frequent Pattern from Transactional Database

    Frequent pattern mining is a heavily researched area in the field of data mining with wide range of applications. Finding a frequent pattern (or items) play essentials role in data mining. Efficient algorithm to discover frequent patterns is essential in data mining research. A number of research works have been...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    Real Time Peer-Peer Intrusion Detection Using Rough Set Dynamic Reduct Approach

    There's a humongous rise in the usage of internet over the past decade with the introduction of new services and constantly progressing technology. Some of these services imbibe in them sensitive information thereby resulting in high exposure for compromising the data. There comes a deep necessity to inculcate the features-confidentiality,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2013

    Improving the Efficiency of Apriori Algorithm in Data Mining

    In computer science and data mining an interdisciplinary subfield of computer science, is the computational process of discovering patterns in large data sets in database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2013

    Radio Frequency Identification (RFID) Security Issues and Possible Solutions

    Radio Frequency IDentification (RFID) has become popular for automated identification and tracking of objects, goods and people. As the applications of RFID are expanding every day, new security issues also will be appeared. This paper speaks about fundamentals of RFID systems and security issues which can be raised in each...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2013

    A Survey on Resource Allocation and Task Scheduling Algorithms in Cloud Environment

    Cloud computing is a computing service paradigm that charges under the basis of the amount of resources consumed i.e. pay per use constraint .One key characteristic that differentiate cloud computing from the other enterprises computing is that the infrastructure itself is programmable. An important issue faced by Infrastructure-as-a-Service (IaaS) in...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2013

    Energy Efficiency for Data Center and Cloud Computing: A Literature Review

    Cloud computing (CC) is a promising area in distributed computing. This technology can achieve communication, storage, processing, high performance, hosting and services on demand to cloud costumer. Energy consumption cost and environmental effect are dynamic challenge to cloud computing. Data centers are the backbone of cloud computing. They continue to...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2013

    A New Approach for Skin Tone Based Steganography with Key Analysis for Mistreatment Biometrics

    Biometric feature accustomed implement steganography is skin tone region of pictures. Here secret information is embedded inside skin region of image that may offer a wonderful secure location for information activity. For this skin tone detection is performed by using HSV (Hue, Saturation and Value) color space and DWT (Discrete...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Mobile Cloud Security Issues and Challenges: A Perspective

    Mobile Cloud Computing (MCC) is exploring vast in IT due to anywhere anytime data access. Mobile devices are enabled with rich user experience especially, Smartphone's. Apple, Google, Facebook and Amazon are the top four horsemen in the mobile world. That is why the mobile cloud computing technology is growing rapidly...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Comparison Between PSO and Firefly Algorithms in Fingerprint Authentication

    One of the biggest challenges facing society is confirming the true identity of a person. Fingerprint identification may be preferred over traditional methods (e.g. passwords, smart-cards) because its information is virtually impossible to steal. Recently, a new trend has been opened by using swarm intelligence techniques in biometric field. Therefore,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Enhancing Data Security during Transit in Public Cloud

    Cloud computing has developed as a widespread model in computing world in which resources of the computing infrastructure are provided as services over the Internet. A cloud computing scenario usually tailors the server as needed. Cloud computing pattern also brings out several new challenges in data security and access control...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    A Review of Cloud Computing Security Issues

    Compute clouds are enormous server farms packed with computing power and storage space accessible through the Internet. Instead of having to manage one's own infrastructure to run applications, server time and storage space can be bought from an external service provider. From the customers' point of view the benefit behind...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    VANET (Vehicular Ad-Hoc Networks): Avoidance of Risk Factor in Secure Communication

    Recent advances in development of Wireless Communication in Vehicular Ad-hoc NETwork (VANET) has provided emerging platform for industrialists and researchers. Vehicular ad-hoc networks are multi-hop networks with no fixed infrastructure. It comprises of moving vehicles communicating with each other. One of the main challenges in VANET is to route the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Security of Credit Card Using Security Code Displayed On Customer Mobile to Prevent Any Unauthorized Access

    As the authors know that over the past three decades, consumers have been largely depending on and trust credit to conveniently meet there credit needs, this paper is to develop a security code, which is used for credit card security system. In this paper, they have to plan that as...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Real Time Periodicity Detection in Time-Series Databases

    Time series is a set of statistics, usually collected at regular intervals. The goal of analyzing a time series database is to find whether and how frequent a periodic pattern is repeated within the series. Periodic pattern mining is the problem that regards temporal regularity. It has a number of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Identification and Alleviation of MANET Routing Attack Risks

    A Mobile Ad-hoc NETwork (MANET) is a self-starting dynamic network comprising of mobile nodes, where each and every participation node voluntarily transmit the packets destined to some remote node using wireless transmission. Mobile Ad-hoc NETworks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Operating System as Service Using XEN Cloud

    Cloud computing provides a means to access IT service through a network. This paper can be used to effectively cut down infrastructure costs. In order to perform operations and run processes on multiple hardware systems, one would have to install the required operating systems in each of those systems. Cloud...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Providing Security for Database at Rest with Fine Grained Encryption

    Database is an important asset for any organization and there should be strong security measures to preserve the confidentiality of sensitive data. There are different levels of granularity for encryption. This paper focus on minimizing the overhead of encryption and decryption during query processing. These include encrypting the sensitive data...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Review of Behavior Malware Analysis for Android

    Android based Smartphone are now-a-day's getting more popularity. With the use of Smartphone user must always concern about the security breaching and malicious attacks. Here, the authors introduce an approach for proactive malware detection working by abstraction of program behaviors. Suspicious behaviors are detected by comparing trace abstractions to reference...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2012

    Impact of a Comparative Study of the Upper Layer Authentication Methods for Wi-Fi Networks

    The current considerations of IEEE 802.1X are an IEEE standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols; it provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. Enables Extensible Authentication Protocol (EAP) to support a...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Security Enhancement Using SCTP Against Password Stealing in Multi-Homed Networks

    SCTP is a young transport layer protocol. It is designed for transferring public switched telephone network signaling over IP networks. SCTP provide improved security mechanism in addition with DTLS. Password stealing attack is the major problem in the web environment. Passwords are stolen by attackers using several methods. An attacker...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    A Trust Based Secure Source Routing Using Fuzzy Logic Rules Prediction in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. It is a collection of independent mobile nodes that can communicate with each other via radio waves. These networks are fully distributed, and can work at any place without the help...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Secure Routing in Mobile Ad-hoc Networks: A Survey

    In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Review: Location Based Authentication to Mitigate Intruder Attack

    Recently the use of online banking has been increased to perform various online banking transactions. On the other hand, it is been targeted by various attacks found at the client side. Lately, traditional security methods were not capable enough to tackle these attacks such as intruder attacks, phishing attacks, etc....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2012

    A Survey on Wireless Sensor Network Attacks

    Efficient design and implementation of wireless sensor networks have become a hot area of research in recent years due to the vast potential of the sensor networks to enable application that connect the physical world to the virtual world. Wireless platforms are becoming less expensive and more powerful, enabling the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2012

    A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks

    WSN (Wireless Sensor Networks) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring, environmental control, surveillance tasks, monitoring, tracking etc. All these severe constraints and demanding deployment environments of WSN make security for...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2012

    Novel Malicious Detection Approach and Emergence of Worm Security

    Worm spreads over the network are malicious pose major security threats to the ability of anomaly to propagate in automated process which compromise the computer network evolve during their propagation and challenge to detect against the computer. A class of virus are worm trojans malicious and anomaly, worm is different...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2012

    Innovative Study to the Graph-based Data Mining: Application of the Data Mining

    Graph-based data mining represents a collection of techniques for mining the relational aspects of data represented as a graph. Two major approaches to graph based data mining are frequent sub graph mining and graph-based relational learning. This paper will focus on one particular approach embodied in the Subdue system, along...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2012

    Study of Blackhole Attack in MANET

    In the Mobile Ad-hoc NETworks (MANETs), the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as black hole node attacks....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2012

    Security Threat Analysis for Network (STAN)

    The primary and basic meaning of threat is usually associated with \"Indication of danger or harm\". How can the authors identify that which kind of threats are occurring here in this case of computer system? The most important issue by the threat analysis is: what kind of an effect, danger...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2012

    Authentication Progression Through Multimodal Biometric System

    Automatic person identification is an important task in the people day-to-day life. Traditional method of establishing a person's identity includes knowledge based like password or token base like ID cards. These identities may be lost stolen or shared by any person. For these reasons they are not suitable for authentication...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2012

    Vehicular Ad Hoc Networks: An Approach to Provide Secure and Trusted Data

    Vehicular Ad-hoc NETwork (VANETs), considered as a subclass of Mobile Ad-hoc NETworks (MANETs), is a promising approach for future Intelligent Transportation System (ITS). A Vehicular Ad-hoc NETwork (VANET) facilitates communication between vehicles and infrastructure. The aim of VANETs is to enable moving vehicles by providing safety and non safety messages....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2012

    To Evade Deep Packet Inspection in NIDS Using Frequent Element Pattern Matching

    A set of rules are used signature based Network Intrusion Detection Systems (NIDS) to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behavior like known attacks that hackers look for new techniques to go unseen. Most of the techniques involves, in...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2012

    Wormhole Attack Detection in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of self configurable mobile node connected through wireless links. In MANET nodes which are within the range of each other can connect directly where as nodes which are not in the vicinity of each other rely on the intermediate node for communication....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2012

    Managing Security Using Password Synchronization

    What if the user needs to memorize n number of passwords for getting access to n number of resources across an organization? Users may face many problems in remembering their passwords which will result into raising number of service desk calls for password-resetting which in turn results into wastage of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2012

    Authentication System for Critical Server Using Three- Dimensional Virtual Environment

    Security in the computer is largely supported by the passwords for authentication process. The most common approach for authentication is alphanumeric passwords. Traditionally, alphanumeric passwords have been used for authentication, but they are known to have security and usability problems. The passwords require the following fundamentally requirements so that the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jun 2013

    Cloud Service Tools: State of the Art

    Cloud computing is not a newly developed technology. It is an evolutionary paradigm evolved from parallel computing, distributed computing, grid computing and utility computing. It has been one of the hot research topics in Information Technology circle. In the present scenario, many industries are involved in cloud computing related techniques....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)