International Journal of Science and Research (IJSR)

Displaying 1-40 of 135 results

  • White Papers // May 2014

    Data Security in Cloud Computing Using Homomorphic Encryption

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since, cloud computing...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Efficient Workload Management in Cloud Computing

    In this paper, the authors have evaluated that workload pre assumption plays a significant role in the management of requests from users end. Cloud computing faces a huge challenge to deal with the high workload and un precedent requests, therefore in order to see the latency variations in cloud computing...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Improved Performance in R-Sram Design

    In this paper, the authors propose an SRAM memory cell which embeds ROM data for faster and simpler implementation of certain application such as DSP, math function evaluation, built in self test. On-chip tables stored as ROM can significantly improve the performance with no area penalty and power overhead. Standard...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Extending Hadoop to Improve Support for Multiple-Input Applications

    Hadoop is a MapReduce programming model which provides a cost effective solution for many data-intensive applications. Hadoop stores data distributive and exploits data locality by assigning tasks to where data is stored. Many data-intensive applications, however, require two input data for each of their tasks. Such applications pose significant challenges...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Implementation of Can Bus Based System-on-Chip on Altera FPGA

    A Field-Programmable Gate Array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing. FPGAs are going to rule in the future because of their flexibility, decreasing prices and increasingly better power efficiency. Often a soft processor is added in the FPGA design...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Reallocation of Load in Nodes of Distributed File Systems

    Distributed file systems are the collection of nodes which does both computation and storage functions in terms of MapReduce programming paradigms. Each node contains files that are uniformly allocated. The nodes does not retain as the same as initial allocation. They can be upgraded, replaced, added according to the workload....

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Data Security Using Lightweight Techniques in Mobile Cloud Computing

    With the explosion of mobile applications and the support of cloud computing for a variety of services for mobile users, Mobile Cloud Computing (MCC) is introduced as an integration of cloud computing into the mobile environment. Mobile cloud computing brings new types of services and facilities for mobile users to...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2014

    Towards Secured and Trusted Multi Cloud Storage with Backup Link

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud computing is a new environment in computer oriented services. It is a model for enabling convenient, on-demand network access to a shared pool...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2014

    Cloud Security: Problems and Solutions

    Cloud computing is a network-based environment that focuses on sharing computations or resources. Cloud computing is new computing model which is based on grid computing distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies. In cloud computing data is stored remotely from the customer's location; in fact,...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2014

    Cloud Computing - Challenges Ahead for Human Resource Managers

    Cloud systems are often different from the traditional IT infrastructure set up by a company itself because they are normally provided by a third party supplier, and hence businesses do not have much control over the cloud system as compared to their own IT infrastructure. But, in reality, cloud computing...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2014

    Diagnosis and Fault Tolerance for Embedded Bist RAms

    With the rapid growth of SoC (System-on-Chip), the BIST is being widely used to increase the yield of the built-in memories, which is a very important component in SoC. Due to poor controllability and observability of address, control and data lines embedded RAMs are extremely very difficult to test. The...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2014

    A Web Usage Mining Approach to User Navigation Pattern and Prediction in Web Log Data

    Web Usage Mining (WUM) are specifically designed to carry out the user navigation pattern in web log files organizations collect large volumes of data in their daily operations, generated automatically by web servers and collected in server access logs and this task is used for analyzing the data representing usage...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2014

    Privacy Preserving Public Auditing in Secured Cloud Storage

    Cloud computing is the long dreamed vision where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, the burden of local data storage and maintenance can be relieved...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Feb 2014

    Achievement of Cost-Effective Datasets Transference in The Cloud Through Ant Colony Optimization

    The booming volume of data generated by contemporary business users and consumers have created enormous data storage and management challenges. Cloud computing provides a way to enable massive amounts of data to work together as data-intensive services. Many users are moving their data to online storage clouds, where data are...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Feb 2014

    Dataplexed Network Attached Storage System

    In this paper, the authors propose a system which aims to resolve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of the computing resources. With the traditional model, information's are stored on servers and downloaded to clients as required, where they are then...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Feb 2014

    Data Mining: Performance Tuning of Temporal Data Mining Based on Frequent Inter-Transaction Itemsets Discovery

    A good number of the studies carried out on mining association rules so far are on mining intra-transaction associations. Traditional association rules are mainly concerned about intra-transaction rules. Mining association rules from transactions occurred at different time series is a difficult task because of high computational complexity, very large database...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jan 2014

    Aggregation to Prepare Data Mining Sets for Analysis

    The authors introduced a new class of extended aggregate functions, called horizontal aggregations which help preparing data sets for data mining and OLAP cube exploration. Aggregate functions perform a calculation on a set of values and return a single value. Except for COUNT, aggregate functions ignore null values. Aggregate functions...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jan 2014

    Merge Configuration of Multiservers with Finite Capacity Intermediate Buffers and External Arrivals to the Merger Queue

    The authors consider a queuing network consisting of multiservers in parallel and connected to a merger queue. All servers have a finite capacity buffers. Some incoming streams go directly to the merger without passing through merging servers. They insert virtual servers for these requests and decompose the configuration into two...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Judicial Frameworks and Privacy Issues of Cloud Computing

    Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company's resources such as capital and knowledge based assets. Hither to know much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Offline Signature Verification and Recognition Using Neural Network

    Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioral features used for the authentication purpose. In this paper, the authors work on the offline signature collected through different persons. Morphological operations are applied on these signature...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Laboratory Inventory System

    There are a lot of forms to be completed as the inventory process happened. Many systems had been introduced to manage and place the inventory items to be in a systematic ways. The proposed project was about laboratory inventory that will be used as a system at Faculty of Electronics...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Cloud Computing and It's Types in Mobile Network

    Cloud computing basically involves delivering hosted services over the Internet to store, manage, and process data, instead of using local server or a personal computer. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). In scientific terms, cloud computing is a synonym for distributed...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Effective VM Scheduling Strategy for Heterogeneous Cloud Environment

    Cloud computing is the set of distributed computing nodes. It is the use of computing resources that are delivered as a service over a network. Virtualization plays a crucial role in cloud computing. Typically VMs are offered in different types, each type have its own characteristics which includes number of...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA

    The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data also called Rijndael. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. Hardware-based cryptography is used for authentication of users and of software...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Black Hole Attack Detection Using Fuzzy Logic

    MANET is a dynamic network with large number of mobile nodes. As the traffic increases over the MANET it will leads to number of problems i.e. congestion and packet loss. This congestion and packet loss problems occurs due to the attack in MANET. One of attack is black hole attack....

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    Enhancing Security in Cloud Storage Using ECC Algorithm

    Security in cloud computing is an evolving area in today's world. It is subject of concern for Cloud Technology Services. One of the measures which customers can take care of is to encrypt their data before it is stored on the cloud. This paper is intended towards providing security service...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    A Security Enhancing Scheme in Leach Using Homomorphic Encryption

    As WSNs grow in application area and are used more frequently, the need for security in them becomes inevitable and vital. However, the inherent characteristics of WSNs in occur constraints of sensor nodes, such as limited energy, processing capability, and storage capacity, etc. These constraints make WSNs very different from...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    Web Based Security Using Online Password Authentication in Mobile Application

    The internet has one of the most convenient and widely used media for people for exchanging information and to do business over the internet. E.g. accessing web based emails, online auction or banking sites. But now-a-day's accessing the internet is faced with many challenges. One of the most popular challenges...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    A Novel Approach for the Analysis & Issues of IPsec VPN

    Virtual Private Network (VPN) is the technology to setup a private network in the public network. It is broadly accepted technology for corporate world for strengthen their business. A VPN connection can be represent as a pipe carrying enclosed private data via a public network. Internet Protocol Security (IPSec) is...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    Avoiding Selective Attacks with Using Packet Hiding Approaches in Wireless Network

    The authors address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of \"High\" importance by exploiting his knowledge on the implementation details of network protocols at various layers of the protocol stack. They illustrate illustrating various selective attacks against the TCP...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Security Issues in Hybrid Cloud Computing

    Cloud computing is solution in which resources such as hardware, software, network and storage requirement are provided to the user as per the demand. Basically Cloud computing is the combination of private cloud and public cloud. This paper focuses on the overview of security issues which may arise while adopting...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Scheduling Virtual Machines for Load balancing in Cloud Computing Platform

    Cloud computing enables developers to automatically deploy applications during task allocation and storage distribution by using distributed computing technologies in numerous servers. To gain the maximum benefit from cloud computing, developers must design mechanisms that optimize the use of architectural and deployment paradigms. The role of Virtual Machine's (VMs) has...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Secure Virtualization in Cloud Computing Using Eucalyptus

    The paper aims to ensure the security for virtual machines in cloud computing using Eucalyptus. Cloud computing is the next generation of networking computing, since it can deliver both software and hardware as on demand resources and services over the Internet. Virtualization plays a special role in cloud computing. After...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    FADE: A Secure Overlay Cloud Storage System

    Cloud storage offers an abstraction of infinite storage space for clients to outsource data storage in a pay-as-you-go manner. Third party cloud storage will be provides guaranteed security and reduces the management cost. FADE provides policy access control and assured deletion. Assured deletion aims to provide cloud client on option...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Classification of Cloud Data using Bayesian Classification

    One of the major security challenges in cloud computing is the detection and prevention of intrusions and attacks. In order to detect and prevent malicious activities at the network layer, the authors propose a security framework which integrates a Network Intrusion Detection System (NIDS) in the Cloud infrastructure. They use...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Comparative Study of Green Computing on University Campus

    Green computing achieve not only more efficient processing and utilization of computing infrastructure for operational, but also minimize energy consumption and save power waste. Green computing is ensured that the future growth of computing is sustainable and more reliable. Otherwise, Green computing with increasingly then front-end client devices interacting with...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Prevention of Black Hole Attack in Secure Routing Protocol

    Mobile Ad-hoc NETwork (MANET) consists of a collection of mobile nodes which do not require intervention of any existing infrastructure or centralized access point such as base station. MANET routing protocol are responsible for communication between mobile nodes. But MANET Routing Protocols are highly vulnerable to various attacks on layers...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    A Novel Security Model for Password Stealing and Password Reuse Attacks

    In this paper, the authors design a user authentication protocol named Opass which leverages a user cell phone and short message service to password stealing and password reuse attacks. Opass only requires a unique phone number, and involves a telecommunication service provider in registration and recovery phase. This protocol is...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Public Key Encryption: A Survey

    Security experts around the world have been researched for many years on how to build a safe and reliable network environment, and the studies involved different levels of security technologies and measures. Public key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Avoiding Selective Jam Attack by Packet Hiding Method in Wireless Sensor Network

    The open nature of the wireless medium leaves it vulnerable to drive or wedge packets forcibly into a tight position referred as squeeze. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks typically; squeeze has been addressed under an...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad Hoc Networks (MANET)

    A Mobile Ad hoc NETwork (MANET) is an infrastructure less and autonomous network where a set of nodes are connected by wireless links where each node works as both a router and an end system. Due to vulnerable features of MANET it is prone to several attacks from insider as...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Efficient Regular Expression Signature Generation for Network Traffic Classification

    Regular expression signatures are most widely used in network traffic classification for trusted network management. These signatures are generated by the sequence alignment of the traffic payload. The most commonly used sequence alignment algorithm is Longest Common Subsequence (LCS) algorithm which computes the global similarity between two strings but it...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Secure Sharing of Personal Health Records in Cloud Computing

    Personal health record, or PHR, is a health record where health data and information related to the care of a patient is maintained by the patient. This stands in contrast with the more widely used electronic medical record, which is operated by institutions (such as a hospital) and contains data...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Quality of Service in Wireless Networks Using Weighted Clustering Algorithm

    In today's Internet, inter-domain route control remains indefinable; however, such control could improve the performance, dependability, and usefulness of the network for end users and ISPs alike. While researchers have anticipated a number of resource routing techniques to combat this limit, there has thus far been no way for autonomous...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    A New Novel Based Approach to Enhance Security in Arithmetic Coding Using Random Probabilities

    The current network scenario demands secure and fast communication of information. This requires both compression and encryption. Arithmetic coding provides compression as well as data security. In fixed model arithmetic coding security is improved by assigning symbol frequencies arbitrarily rather than matching the frequency of occurrence in the source input...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Secure Routing to Prevent Sybil Attack in Sensor Networks

    Evaluation of Wireless Sensor Networks (WSN) for performance evaluation is a popular research area and a wealth of literature exists in this area. Denial-of-Service (DoS) attacks are recognized as one of the most serious threats due to the resources constrained property in WSN. The Zigbee model provided in OPNET 16...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Launching Virtual Machine in OpenNebula and Ensuring Accountability in Cloud Data

    The paper aims to launch a virtual machine in the OpenNebula cloud environment and ensuring accountability in cloud data. OpenNebula interoperability makes cloud an evolution by leveraging existing IT infrastructure. Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis. A major feature...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    A Secure Account Based Mobile Payment Protocol With Public Key Cryptography and Biometric Characteristics

    The way people do the business and transactions are changing drastically with the advent of Information Technology. The customer wants to access information, goods and services any time and in any place on his mobile device. Receiving financial data, trade on stock exchanges, accessing#8;alances, paying bills and transfer funds using...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Analysis of Power Control Mechanisms of MAC Protocol for Wireless Sensor Networks

    Power conservation is a major issue in wireless sensor networks, as most of the nodes are battery powered. Power control is not related to any particular layer, since the authors can apply power conservation methods in all layers. But most of the power control mechanisms are working in MAC layer....

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Aug 2013

    Judicial Frameworks and Privacy Issues of Cloud Computing

    Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company's resources such as capital and knowledge based assets. Hither to know much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Security Issues in Hybrid Cloud Computing

    Cloud computing is solution in which resources such as hardware, software, network and storage requirement are provided to the user as per the demand. Basically Cloud computing is the combination of private cloud and public cloud. This paper focuses on the overview of security issues which may arise while adopting...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Scheduling Virtual Machines for Load balancing in Cloud Computing Platform

    Cloud computing enables developers to automatically deploy applications during task allocation and storage distribution by using distributed computing technologies in numerous servers. To gain the maximum benefit from cloud computing, developers must design mechanisms that optimize the use of architectural and deployment paradigms. The role of Virtual Machine's (VMs) has...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2013

    Cloud Computing - A Bird's Eye View

    Cloud computing is an internet computing model where data is stored on servers that are on the Internet and temporarily cached on the clients' computing devices such as: desktop computers, laptops, hand-held mobile devices, etc. In a cloud computing architecture, all the applications are not stored in a company's hard...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2013

    Enhancement of Security for Data Storage in Cloud

    Cloud computing is the use of computing resources such as hardware and software that are delivered as a service over the internet. Since the user's data are usually processed or stored remotely in unknown machines, user may not have full control over the data and it can be accessed by...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Secure Virtualization in Cloud Computing Using Eucalyptus

    The paper aims to ensure the security for virtual machines in cloud computing using Eucalyptus. Cloud computing is the next generation of networking computing, since it can deliver both software and hardware as on demand resources and services over the Internet. Virtualization plays a special role in cloud computing. After...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2013

    Virtual Machine Migration Policies in Clouds

    The Virtual Machine (VM) migration brings multiple benefits such as higher performance, improved manageability and fault tolerance. Failures are often common in systems comprising thousands of processors and often the authors encounter these failures using a well defined Fault Tolerance Mechanism (FTM).This technique is enabled using a Virtual Machine (VM)...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2013

    Cluster Based Load Rebalancing in Clouds

    Now-a-days most of the cloud applications process large amount of data to provide the desired results. Data volumes to be processed by cloud applications are growing much faster than computing power. This growth demands on new strategies for processing and analyzing the information. This paper explores the use of Hadoop...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    FADE: A Secure Overlay Cloud Storage System

    Cloud storage offers an abstraction of infinite storage space for clients to outsource data storage in a pay-as-you-go manner. Third party cloud storage will be provides guaranteed security and reduces the management cost. FADE provides policy access control and assured deletion. Assured deletion aims to provide cloud client on option...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Classification of Cloud Data using Bayesian Classification

    One of the major security challenges in cloud computing is the detection and prevention of intrusions and attacks. In order to detect and prevent malicious activities at the network layer, the authors propose a security framework which integrates a Network Intrusion Detection System (NIDS) in the Cloud infrastructure. They use...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    Enhancing Security in Cloud Storage Using ECC Algorithm

    Security in cloud computing is an evolving area in today's world. It is subject of concern for Cloud Technology Services. One of the measures which customers can take care of is to encrypt their data before it is stored on the cloud. This paper is intended towards providing security service...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Comparative Study of Green Computing on University Campus

    Green computing achieve not only more efficient processing and utilization of computing infrastructure for operational, but also minimize energy consumption and save power waste. Green computing is ensured that the future growth of computing is sustainable and more reliable. Otherwise, Green computing with increasingly then front-end client devices interacting with...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2013

    Database Systems and Query Processing in Mobile Environment: A Survey

    The mobile devices became effective seeds of information, which are thrown to world through various platforms like social networking, cloud computing, peer-to-peer communications and so on. Such information has been transformed in form of databases and further utilized to nurture the queries from other users. Databases are generally kept on...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2013

    A Survey on Security Issues and Concerns to Social Networks

    Social networking sites are websites designed for human interaction. Online social networks are now used by hundreds of millions of people and have become a major platform for communication and interaction between users. Under the gentle encouragement of social networking services like Face book, Twitter, LinkedIn, Google, Yahoo, the right...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2013

    A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

    Now-a-days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    Prevention of Black Hole Attack in Secure Routing Protocol

    Mobile Ad-hoc NETwork (MANET) consists of a collection of mobile nodes which do not require intervention of any existing infrastructure or centralized access point such as base station. MANET routing protocol are responsible for communication between mobile nodes. But MANET Routing Protocols are highly vulnerable to various attacks on layers...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    A Security Enhancing Scheme in Leach Using Homomorphic Encryption

    As WSNs grow in application area and are used more frequently, the need for security in them becomes inevitable and vital. However, the inherent characteristics of WSNs in occur constraints of sensor nodes, such as limited energy, processing capability, and storage capacity, etc. These constraints make WSNs very different from...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jul 2013

    Web Based Security Using Online Password Authentication in Mobile Application

    The internet has one of the most convenient and widely used media for people for exchanging information and to do business over the internet. E.g. accessing web based emails, online auction or banking sites. But now-a-day's accessing the internet is faced with many challenges. One of the most popular challenges...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Jun 2013

    A Novel Security Model for Password Stealing and Password Reuse Attacks

    In this paper, the authors design a user authentication protocol named Opass which leverages a user cell phone and short message service to password stealing and password reuse attacks. Opass only requires a unique phone number, and involves a telecommunication service provider in registration and recovery phase. This protocol is...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2013

    Data Security Through More Robust DCT Based Methodology and Assessment in Terms of PSNR

    In this paper, the authors present a new frequency domain approach for steganography algorithm. The proposed system proved to be more robust than the existing systems and calculates its PSNR, MSE, CER and Correlation coefficient. This paper also analyze the Least Significant Bit (LSB) spatial domain based Steganography and Discrete...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2013

    Comparative Analysis of Various Biometric Techniques for Database Security

    Biometric recognition refers to the use of different physiological characteristics like fingerprint recognition, face recognition, retina recognition, hand geometry recognition, iris recognition etc. The premise of this paper is to analyze the various biometric techniques. This paper provides an overview of different biometric technique with some advantages and disadvantages. The...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Mar 2013

    Countering Phishing Threats Using Visual Cryptography

    Phishing is an attempt by an individual or a group to get personal confidential information such as the passwords, credit card information from unsuspecting victims for identity theft, financial gain and the other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2014

    Towards Secured and Trusted Multi Cloud Storage with Backup Link

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud computing is a new environment in computer oriented services. It is a model for enabling convenient, on-demand network access to a shared pool...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Data Security in Cloud Computing Using Homomorphic Encryption

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since, cloud computing...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Efficient Workload Management in Cloud Computing

    In this paper, the authors have evaluated that workload pre assumption plays a significant role in the management of requests from users end. Cloud computing faces a huge challenge to deal with the high workload and un precedent requests, therefore in order to see the latency variations in cloud computing...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Improved Performance in R-Sram Design

    In this paper, the authors propose an SRAM memory cell which embeds ROM data for faster and simpler implementation of certain application such as DSP, math function evaluation, built in self test. On-chip tables stored as ROM can significantly improve the performance with no area penalty and power overhead. Standard...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Extending Hadoop to Improve Support for Multiple-Input Applications

    Hadoop is a MapReduce programming model which provides a cost effective solution for many data-intensive applications. Hadoop stores data distributive and exploits data locality by assigning tasks to where data is stored. Many data-intensive applications, however, require two input data for each of their tasks. Such applications pose significant challenges...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Implementation of Can Bus Based System-on-Chip on Altera FPGA

    A Field-Programmable Gate Array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing. FPGAs are going to rule in the future because of their flexibility, decreasing prices and increasingly better power efficiency. Often a soft processor is added in the FPGA design...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Reallocation of Load in Nodes of Distributed File Systems

    Distributed file systems are the collection of nodes which does both computation and storage functions in terms of MapReduce programming paradigms. Each node contains files that are uniformly allocated. The nodes does not retain as the same as initial allocation. They can be upgraded, replaced, added according to the workload....

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // May 2014

    Data Security Using Lightweight Techniques in Mobile Cloud Computing

    With the explosion of mobile applications and the support of cloud computing for a variety of services for mobile users, Mobile Cloud Computing (MCC) is introduced as an integration of cloud computing into the mobile environment. Mobile cloud computing brings new types of services and facilities for mobile users to...

    Provided By International Journal of Science and Research (IJSR)

  • White Papers // Apr 2014

    Cloud Security: Problems and Solutions

    Cloud computing is a network-based environment that focuses on sharing computations or resources. Cloud computing is new computing model which is based on grid computing distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies. In cloud computing data is stored remotely from the customer's location; in fact,...

    Provided By International Journal of Science and Research (IJSR)