IRD India

Displaying 1-40 of 57 results

  • White Papers // Nov 2013

    The Survey on Security for Smart Dust

    Smart dust motes, as networked computing devices continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due...

    Provided By IRD India

  • White Papers // Nov 2013

    A Walk Through Clouds with Cloud Provisioning and Management

    In this paper, the authors describe \"Cloud computing\", a computing platform for the next generation of the Internet. In this paper, they define clouds, explain the business benefits of cloud computing, and outline the cloud architecture and its major components. The user will discover how a business can use cloud...

    Provided By IRD India

  • White Papers // Nov 2013

    Mitigating Cloud Virtualization Vulnerabilities

    The main idea of cloud computing is to build a virtualized computing resource pool by centralizing abundant computing resources connected with network and present the service of infrastructure, platform and software. Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its infinite benefits. However,...

    Provided By IRD India

  • White Papers // Oct 2013

    A Review of Cloud Computing and Security Issues at Different Levels in Cloud Computing

    Cloud computing is one of exciting technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for computer processes. Cloud computing can be viewed as different things to different people and its elastic nature makes it suitable to any organization. Cloud computing can do...

    Provided By IRD India

  • White Papers // Oct 2013

    Quantum Cryptography with Key Distribution in Wireless Network

    It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security....

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of 128 Bit Key Rc5 Cipher

    In this paper, the authors present the design of RC5 algorithm and its physical design implementation. The RC5 cryptographic algorithm is widely used in wireless communication networks like WSAN and WBSN. RC5 is a fast block cipher, developed by RSA security, which exploits data rotation to achieve a high level...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of Multi-Threaded Pipelined Aes Crypto Processor

    In this paper, the authors present AES algorithm implementation using multi-threaded and pipelining concept for faster data encryption and its physical implementation using 40nm technology. AES crypto-algorithm is widely used in secured wireless communications, zigbee, Electronic financial transactions, content protection, digital rights, set-top boxes etc. The AES algorithm is symmetric...

    Provided By IRD India

  • White Papers // Oct 2013

    Multi-Agent Distributed Intrusion Detection System Using Ontology

    Web services are being used day-by-day. But many users are unaware of the vulnerabilities possible due to semantic web. Semantic web is a standard that promotes common data formats on the WWW. The various attacks are single or distributed which are at times not detectable by firewalls. Hence, there is...

    Provided By IRD India

  • White Papers // Sep 2013

    Data Security for Unreliable Clouds Using Reliable Encryption

    Data Security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud. The risk of malicious insiders in the cloud and the failure of cloud services have received a great deal of attention by companies. This...

    Provided By IRD India

  • White Papers // Aug 2013

    Obstruction of Undesired Traffic by Filtering Source Prefixes on the Internet

    In recent days, the Internet has seen a continuous rise in malicious traffic including DDoS attacks, worm attacks and spam. One way to deal with this problem is to filter unwanted traffic at the routers based on source IP addresses. Filtering techniques are available at routers today via Access Control...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

    Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes connected to each other without any central administrator. Nodes can move from one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly....

    Provided By IRD India

  • White Papers // Aug 2013

    Hybrid Technique for Human Identification Using Information Theory

    Humans can be individualized based on their facial characteristics. However, identifying a face becomes a challenging task due to the complexities involved. The Visual models of face include many parameters. In this paper different algorithms and parameters are studied and computed for real time results. The combined PCA and geometric...

    Provided By IRD India

  • White Papers // Aug 2013

    Outlier Detection for Large Datasets

    Finding outlier or anomaly in large dataset is an important problem in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional athletes. The identification of outliers can lead to the discovery of truly unexpected knowledge. LOF (Local Outlier Factor) is a classical...

    Provided By IRD India

  • White Papers // Aug 2013

    Live Virtual Machine Migration Based on Cow Checkpointing Using XEN Hypervisor

    Live Virtual Machine (VM) migration usually involves migrating physical memory image, the network connections and virtual device state. Live migration has been proposed to reduce the downtime of migrating the virtual machine from host to destination by encountering pre-copy approach. If dirty memory generation is high, it takes long time...

    Provided By IRD India

  • White Papers // Aug 2013

    Predictable Testing of Phishing Websites Based on Deportment Model Approach

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. An attacker might generate...

    Provided By IRD India

  • White Papers // Aug 2013

    Envisaging Roles for Access Security

    Access Control is the principle process of enterprise risk and Security Management. Role Based Access Control (RBAC) is the model for effective management of risk arises in safeguarding three important features of security Secrecy, Integrity and no Denial of Service (DoS). This paper addresses the new approach called \"Role visualization\"...

    Provided By IRD India

  • White Papers // Aug 2013

    Tracking of Non Cooperative Target to Prevent the Gang Injection of False Data Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is a collection of heterogeneous sensor nodes having limited computation capacity, restricted memory space, limited power, and short range of communication which all are connected by wireless network. It is vulnerable to security attacks, attacks may be in the form of injection of false data, injection...

    Provided By IRD India

  • White Papers // Jul 2013

    Resource Monitoring and Provisioning in SaaS in Public Cloud

    Load balancing of non-preemptive independent tasks on Virtual Machines (VMs) is an important aspect of task scheduling in clouds. Whenever certain VMs are overloaded and remaining VMs are under loaded with tasks for processing, the load has to be balanced to achieve optimal machine utilization. In this paper, the authors...

    Provided By IRD India

  • White Papers // Jul 2013

    Wi-Fi Infrastructure Security System from Vulnerable Attacks

    Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

    Provided By IRD India

  • White Papers // Jul 2013

    Pair Hand: A Pairing-Based Cryptography to Secure Handover Process

    Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs and are subject to a few security attacks. Further, a novel handover authentication protocol...

    Provided By IRD India

  • White Papers // Jul 2013

    Architectural Framework to Provide SaaS as Delivery Model

    Service Oriented Architecture (SOA) is a revolutionary paradigm for developers in order to gain on time and cost. Software-as-a-Service (SaaS) is a delivery model which gain in enormous economy in deployment, management. In this paper, the authors have proposed a model that re-defines the architecture of SOA in way to...

    Provided By IRD India

  • White Papers // Jul 2013

    Dynamic Resourcing using Virtualization Technique in the Cloud and Implement Parallel Data Processing

    In recent years, ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Many cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their...

    Provided By IRD India

  • White Papers // Jul 2013

    Development of CGI Based Front End for Implementation of Security Policies and Application Layer Filtering

    A system with vulnerabilities in operating system and installed software which are connected to internet are liable to attacks from the outside world as the outermost protecting layer firewall will not block all the attacks .So a second layer of protection can be built at the host level to prevent...

    Provided By IRD India

  • White Papers // Jul 2013

    Contemplate for Online Plebiscite Capturing Using ATM Terminals

    Online voting (e-voting) is gaining its momentum as a flexible means of voting system that has been talked about very often but not been implemented successfully on a large scale. With the increased number of ATM terminals across the globe this paper proposes an ATM based contemplate for online plebiscite....

    Provided By IRD India

  • White Papers // Jun 2013

    Secured Modified Bloom's Based Q-Composite Key Distribution for Wireless Sensor Networks

    The security issue in a Wireless Sensor Network (WSN) has been drawing considerable research attention in recent years. However Key management, a basic security service, becomes the core design for various security services, such as encryption and authentication. To increase the connectivity of each key in a large-scale WSN and...

    Provided By IRD India

  • White Papers // Jun 2013

    Session Passwords for Android Mobiles

    The mobiles that are marketed today are developed with extended features that include the data storage. To protect the data most people make use of the textual passwords or graphical passwords in spite of its high security issues such as eavesdropping, dictionary attacks, social engineering and shoulder surfing. Hence, as...

    Provided By IRD India

  • White Papers // Jun 2013

    A Secured Retrieval of Quantitative Data In An Outsourced Environment

    In this paper, the authors consider a secured proximity querying of quantitative data from an un-trusted server. The data is to be revealed only to trusted user and not to anyone else. The need for security may be due to the data being sensitive, valuable or otherwise confidential. Given this...

    Provided By IRD India

  • White Papers // Jun 2013

    Resource Allocation Model for Efficient Management in Cloud Computing

    Cloud computing is a computing technology where a large pool of computers are connected in private or public network which provides dynamically scalable infrastructure for application hosting, storage and delivery and it must be supported with minimal management effort or service provider interaction. A cloud environment consists of multiple customers...

    Provided By IRD India

  • White Papers // Jun 2013

    Three-Dimensional Password Generation Technique for Accessing Cloud Services

    Cloud computing refers to the use and access of multiple server-based computational re-sources via a digital network (WAN, Internet connection using the World Wide Web, etc.). To utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password authentication can be done in...

    Provided By IRD India

  • White Papers // Jun 2013

    Implementation of AES Algorithm for Secured Wireless Transmission of Data for RFID Based Transactions

    The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make...

    Provided By IRD India

  • White Papers // Jun 2013

    Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks

    Using multiple channels over single channel the performance can be significantly increased since the use of multiple channels can reduce interference influence. Channel assignment is one of the most basic and major concern in such networks. By effectively utilizing multiple non overlapping channels and multiple interfaces, collision and co-channel interference...

    Provided By IRD India

  • White Papers // Jun 2013

    3 Dimensional Security in Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. So it is emerging field...

    Provided By IRD India

  • White Papers // Jun 2013

    To Implement SaaS Multitenant Framework Security in Cloud Computing

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By IRD India

  • White Papers // May 2013

    Analytical Survey Model on Consumption of Cloud Service Models

    A new paradigm of computing is evolved that is cloud computing where word cloud is used as an allegory for the internet. The incarnation of this technology forces the organizations to rapidly shifting their IT systems from traditional client/server to cloud computing model where everything is offered as a service...

    Provided By IRD India

  • White Papers // Apr 2013

    Data Mining Classification Through Simulation Technique

    The past two decades has seen a dramatic increase in the amount of information or data being stored in electronic format. This accumulation of data has taken place at an explosive rate. It has been estimated that the amount of information in the world doubles every 20 months and the...

    Provided By IRD India

  • White Papers // Apr 2013

    Enriching Mobile Multimedia Applications Using Cloud Mobile Media

    Cloud Mobile Gaming (CMG), an approach that enables rich multiplayer Internet games on mobile devices, where compute intensive tasks like graphic rendering are executed on cloud servers in response to gaming commands on a mobile device, and the resulting video has to be streamed back to the mobile device in...

    Provided By IRD India

  • White Papers // Apr 2013

    Articulate Features for Mobile-Social TV System Using Cloud Computing

    The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services. In this paper, Articulate Features for Mobile-Social TV System using Cloud Computing (CloudMoV) is proposed. This system effectively utilizes...

    Provided By IRD India

  • White Papers // Apr 2013

    A Ranking Based Approach in Security Alert for Handling Sensitive Data Organization

    An organization undoubtedly wants to preserve and retain data stored in an organization's computers. On the other hand, this data is necessary for daily work processes. Users within the organization's perimeter (e.g., employees, subcontractors, or partners) perform various actions on this data (e.g., query, report, and search) and may be...

    Provided By IRD India

  • White Papers // Apr 2013

    Detection and Prevention of Web Application Security Attacks

    Today's Web applications can contain dangerous security flaws. The global distribution of these applications makes them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. Research reports indicate that more than 80 percent of the web applications are vulnerable to security threats. User friendly web applications...

    Provided By IRD India

  • White Papers // Apr 2013

    Credit Card Endorsement using Biometrics in Cloud Computing

    This application focused on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transaction but there is no security measures to verify whether the user is authenticated or...

    Provided By IRD India

  • White Papers // Jul 2012

    Traffic Management Through Inter-Communication Between Cars Using VANET System

    Vehicular Ad-hoc NETwork (VANET) basically used to provide various services to its user. Misbehaviour of such system should be defended. VANET system provides the intercommunication between the vehicles by letting them exchange the traffic information. Such kind of exchanges may create privacy apprehension since the vehicle-generated information can contain much...

    Provided By IRD India

  • White Papers // Jul 2012

    Null Direction Propagation of Antennas and Counter Measures in Tactical High Frequency Sky Wave Communication

    In tactical High Frequency (HF) communication, sky wave and ground wave mode establish the radio link. There is a phenomenon by which antenna in ground wave mode communicates with antenna in sky wave mode. This happens due to emission of radio waves in the NULL direction. This emission can be...

    Provided By IRD India

  • White Papers // Jul 2012

    High Throughput Lossless Data Compression Algorithm

    Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Data compression offers an attractive approach to reducing communication costs by using available bandwidth effectively. Though this scheme has clear benefits, the execution time of compression and decompression is critical to its application in...

    Provided By IRD India

  • White Papers // Jul 2012

    Achieving Privacy Preservation Schemas Against Traffic Analysis in Multi-Hop Wireless Networks

    Privacy threat is one of the critical issues in multihop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to thwart these attacks since the coding/mixing operation is encouraged...

    Provided By IRD India

  • White Papers // Jul 2012

    Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System

    Data storage and transmission, task scheduling, and network construction used for that. The authors have proposed a clustering algorithm to find the group relationships for query and data aggregation efficiency. This paper are as follows: First, since the clustering algorithm itself is a centralized algorithm, in this paper, they further...

    Provided By IRD India

  • White Papers // Oct 2012

    BgpAND - Architecting a Modular BGP4 Attack & Anomalies Detection Platform

    Border Gateway Protocol (BGP) is an Autonomous System (AS) routing protocol. It forms the backbone of Internet core routing decisions. However, it is also equally prone to security issues and several attempts to attack & exploit the protocol have been noted. bgpAND is a platform designed and developed to analyze...

    Provided By IRD India

  • White Papers // Oct 2012

    Safer Data Transmission Using Steganography

    Today's Internet connected networks are under permanent attack by intruders and hackers. The explosive growth of computer systems and their interconnections has led to a heightened awareness of the need to protect the data transmitted. There are many ways already existing and also discovered daily. The field of cryptography has...

    Provided By IRD India

  • White Papers // Oct 2012

    A Scheme for Key Revocation in Wireless Sensor Networks

    Key revocation is a challenging task in wireless sensor networks. There can be many nodes in a sensor network sharing the same key(s) in their key ring. If any of those nodes in the network gets compromised then the keys of those nodes having same keys will also be revealed....

    Provided By IRD India

  • White Papers // Nov 2012

    Parallel Data Mining and Assurance Service Model Using Hadoop in Cloud

    In the information industry, huge amount of data is widely available and there is an imminent need for turning such data into useful information. This need is fulfilled by the process of exploration and analysis, by automatic or semi-automatic means, of large quantities of data provided by Data Mining. In...

    Provided By IRD India

  • White Papers // Dec 2012

    Multiple Trust in Trust-Based On-Demand Routing in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworking is concept of communication, which means a communication temporary network without any form of centralized administration. Every node in this network acts both as host and a router to forward packets for other node. Due to the absence of the centralized administration, MANETs are easily attacked by...

    Provided By IRD India

  • White Papers // Dec 2012

    A High Speed Frequency Based Multimodal Biometric System Using Iris and Fingerprint

    In this paper, the authors adopt a unified viewpoint to extract singular points (core and delta) that determine the topological structure and largely influence the orientation field by using the principal of Gabor basis functions. Lastly the points are classified into classes by method of Poincare index for Fingerprint classification....

    Provided By IRD India

  • White Papers // Dec 2012

    Border Gateway Protocol - A Best Performance Protocol When Used for External Routing Than Internal Routing

    The paper addresses the interoperability issues between Internal Border Gateway Protocol (IBGP) over other Interior Gateway Protocols (IGPs) by knowing the characteristics of the respective protocols and also studies the efficiency of External Border Gateway Protocol (EBGP) as an Exterior Gateway Protocol (EGP). Furthermore, it shows how IGRP proves to...

    Provided By IRD India

  • White Papers // Jun 2013

    Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks

    Using multiple channels over single channel the performance can be significantly increased since the use of multiple channels can reduce interference influence. Channel assignment is one of the most basic and major concern in such networks. By effectively utilizing multiple non overlapping channels and multiple interfaces, collision and co-channel interference...

    Provided By IRD India

  • White Papers // Jun 2013

    3 Dimensional Security in Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. So it is emerging field...

    Provided By IRD India

  • White Papers // Jun 2013

    To Implement SaaS Multitenant Framework Security in Cloud Computing

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By IRD India

  • White Papers // Apr 2013

    Enriching Mobile Multimedia Applications Using Cloud Mobile Media

    Cloud Mobile Gaming (CMG), an approach that enables rich multiplayer Internet games on mobile devices, where compute intensive tasks like graphic rendering are executed on cloud servers in response to gaming commands on a mobile device, and the resulting video has to be streamed back to the mobile device in...

    Provided By IRD India

  • White Papers // Apr 2013

    Articulate Features for Mobile-Social TV System Using Cloud Computing

    The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services. In this paper, Articulate Features for Mobile-Social TV System using Cloud Computing (CloudMoV) is proposed. This system effectively utilizes...

    Provided By IRD India

  • White Papers // May 2013

    Analytical Survey Model on Consumption of Cloud Service Models

    A new paradigm of computing is evolved that is cloud computing where word cloud is used as an allegory for the internet. The incarnation of this technology forces the organizations to rapidly shifting their IT systems from traditional client/server to cloud computing model where everything is offered as a service...

    Provided By IRD India

  • White Papers // Oct 2013

    A Review of Cloud Computing and Security Issues at Different Levels in Cloud Computing

    Cloud computing is one of exciting technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for computer processes. Cloud computing can be viewed as different things to different people and its elastic nature makes it suitable to any organization. Cloud computing can do...

    Provided By IRD India

  • White Papers // Dec 2012

    Mobile Commerce - New Way to Business

    The world wide web is now a practical medium for customers, information seekers, business owners and entrepreneurs. The increase in suppleness and power of internet provides proper opportunities for rising up services to customers. In today's scenario of business mobile commerce has entered in finance, services, retails, and telecommunication and...

    Provided By IRD India

  • White Papers // Jul 2013

    Architectural Framework to Provide SaaS as Delivery Model

    Service Oriented Architecture (SOA) is a revolutionary paradigm for developers in order to gain on time and cost. Software-as-a-Service (SaaS) is a delivery model which gain in enormous economy in deployment, management. In this paper, the authors have proposed a model that re-defines the architecture of SOA in way to...

    Provided By IRD India

  • White Papers // Jun 2013

    A Secured Retrieval of Quantitative Data In An Outsourced Environment

    In this paper, the authors consider a secured proximity querying of quantitative data from an un-trusted server. The data is to be revealed only to trusted user and not to anyone else. The need for security may be due to the data being sensitive, valuable or otherwise confidential. Given this...

    Provided By IRD India

  • White Papers // Aug 2013

    Obstruction of Undesired Traffic by Filtering Source Prefixes on the Internet

    In recent days, the Internet has seen a continuous rise in malicious traffic including DDoS attacks, worm attacks and spam. One way to deal with this problem is to filter unwanted traffic at the routers based on source IP addresses. Filtering techniques are available at routers today via Access Control...

    Provided By IRD India

  • White Papers // Nov 2013

    A Walk Through Clouds with Cloud Provisioning and Management

    In this paper, the authors describe \"Cloud computing\", a computing platform for the next generation of the Internet. In this paper, they define clouds, explain the business benefits of cloud computing, and outline the cloud architecture and its major components. The user will discover how a business can use cloud...

    Provided By IRD India

  • White Papers // Jul 2013

    Resource Monitoring and Provisioning in SaaS in Public Cloud

    Load balancing of non-preemptive independent tasks on Virtual Machines (VMs) is an important aspect of task scheduling in clouds. Whenever certain VMs are overloaded and remaining VMs are under loaded with tasks for processing, the load has to be balanced to achieve optimal machine utilization. In this paper, the authors...

    Provided By IRD India

  • White Papers // Jul 2013

    Dynamic Resourcing using Virtualization Technique in the Cloud and Implement Parallel Data Processing

    In recent years, ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Many cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their...

    Provided By IRD India

  • White Papers // Dec 2012

    Distributed Systems and Economics Related to Pricing in Cloud Computing

    Cloud computing allows users to perform computation in a public cloud with a pricing scheme typically based on incurred resource consumption. While cloud computing is often considered as merely a new application for classic distributed systems, the authors argue that, by decoupling users from cloud providers with a pricing scheme...

    Provided By IRD India

  • White Papers // Jun 2013

    Resource Allocation Model for Efficient Management in Cloud Computing

    Cloud computing is a computing technology where a large pool of computers are connected in private or public network which provides dynamically scalable infrastructure for application hosting, storage and delivery and it must be supported with minimal management effort or service provider interaction. A cloud environment consists of multiple customers...

    Provided By IRD India

  • White Papers // Oct 2013

    Multi-Agent Distributed Intrusion Detection System Using Ontology

    Web services are being used day-by-day. But many users are unaware of the vulnerabilities possible due to semantic web. Semantic web is a standard that promotes common data formats on the WWW. The various attacks are single or distributed which are at times not detectable by firewalls. Hence, there is...

    Provided By IRD India

  • White Papers // Apr 2013

    Data Mining Classification Through Simulation Technique

    The past two decades has seen a dramatic increase in the amount of information or data being stored in electronic format. This accumulation of data has taken place at an explosive rate. It has been estimated that the amount of information in the world doubles every 20 months and the...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of 128 Bit Key Rc5 Cipher

    In this paper, the authors present the design of RC5 algorithm and its physical design implementation. The RC5 cryptographic algorithm is widely used in wireless communication networks like WSAN and WBSN. RC5 is a fast block cipher, developed by RSA security, which exploits data rotation to achieve a high level...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of Multi-Threaded Pipelined Aes Crypto Processor

    In this paper, the authors present AES algorithm implementation using multi-threaded and pipelining concept for faster data encryption and its physical implementation using 40nm technology. AES crypto-algorithm is widely used in secured wireless communications, zigbee, Electronic financial transactions, content protection, digital rights, set-top boxes etc. The AES algorithm is symmetric...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

    Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes connected to each other without any central administrator. Nodes can move from one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly....

    Provided By IRD India

  • White Papers // Aug 2013

    Hybrid Technique for Human Identification Using Information Theory

    Humans can be individualized based on their facial characteristics. However, identifying a face becomes a challenging task due to the complexities involved. The Visual models of face include many parameters. In this paper different algorithms and parameters are studied and computed for real time results. The combined PCA and geometric...

    Provided By IRD India

  • White Papers // Aug 2013

    Outlier Detection for Large Datasets

    Finding outlier or anomaly in large dataset is an important problem in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional athletes. The identification of outliers can lead to the discovery of truly unexpected knowledge. LOF (Local Outlier Factor) is a classical...

    Provided By IRD India

  • White Papers // Aug 2013

    Live Virtual Machine Migration Based on Cow Checkpointing Using XEN Hypervisor

    Live Virtual Machine (VM) migration usually involves migrating physical memory image, the network connections and virtual device state. Live migration has been proposed to reduce the downtime of migrating the virtual machine from host to destination by encountering pre-copy approach. If dirty memory generation is high, it takes long time...

    Provided By IRD India

  • White Papers // Aug 2013

    Predictable Testing of Phishing Websites Based on Deportment Model Approach

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. An attacker might generate...

    Provided By IRD India

  • White Papers // Apr 2013

    Detection and Prevention of Web Application Security Attacks

    Today's Web applications can contain dangerous security flaws. The global distribution of these applications makes them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. Research reports indicate that more than 80 percent of the web applications are vulnerable to security threats. User friendly web applications...

    Provided By IRD India

  • White Papers // Apr 2013

    A Ranking Based Approach in Security Alert for Handling Sensitive Data Organization

    An organization undoubtedly wants to preserve and retain data stored in an organization's computers. On the other hand, this data is necessary for daily work processes. Users within the organization's perimeter (e.g., employees, subcontractors, or partners) perform various actions on this data (e.g., query, report, and search) and may be...

    Provided By IRD India

  • White Papers // Apr 2013

    Credit Card Endorsement using Biometrics in Cloud Computing

    This application focused on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transaction but there is no security measures to verify whether the user is authenticated or...

    Provided By IRD India