International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

January 2019

  Submission         January 10

  Acceptance         January 20

  Publication          January 30

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 


The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

December  2018

     Submission            December 10

      Notification            December 20

      Publication            December 31

Bookmark and Share

Open Access Database


IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.

 

 IJASCSE volume 6 issue 9 (Theme: Cyber Security, Information Security & Privacy in Communication Networks)                            


An Improved Approach for Delay Management with  QoS Computation in  Mobile Adhoc Networks

Mamata Rath, Binod Kumar Pattanayak

 

Abstract-The current wireless technology supports practice of mobile agents in multiple applications for more effective data transmission and control of communication channel.Mobile Ad-hoc Network (MANET) is a special network  that can create a temporary connection between hosts as and when required. Due to the challenges such as high mobility of the stations,  frequent link failures and variable topology there commits undesirable delay in end to end data transmission. This paper presents a  monitoring system for delay management and Quality of Service (QoS) based task module using mobile agent as basic mechanism. 

 

A Novel Software Development Life cycle Model for developing Software Project

Dr Ekbal Rashid, Mr. Madhup Kumar

 

Abstract-There are different life cycle models available for developing various types of software. Every Software Development Life Cycle (SDLC) model has some advantages and some limitations. In that case software developers decide which SDLC model is suitable for their product. Further, we need development of software in a systematic and disciplined manner. This is advantage of using a life cycle model. A life cycle model forms a common understanding of the activities among the software engineers and helps to develop software in   a proper manner, so that time can be reduced. 


An Efficient Multi-Receiver Certificate Less Digital Multisignature Scheme with Anonymity Based on ECC

SarveshTanwar, Anil Kumar

 

Abstract-To avoid inherent key escrow problem in ID based cryptosystem, Certificate Less (CL) is an attractive and new research paradigm, which does not required certificate. Many schemes are available which are based on ID based cryptography, and PKI with bilinear pairing. And many researchers have proposed different schemes on anonymity for multi receiver identity based cryptography. In this paper we propose an efficient Multi- Receiver CL – Digital Multiple Signature (CL- DMS) with anonymity based on ECC without bilinear pairing. Our motivation is to design a multi receiver CL DMS that broadcast a message with high level of computation efficiency and retains security that only qualified recipients can retrieve the message.

 

A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques

Pratiksha Gautam, Hemraj Saini

 

Abstract-Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. This paper presents comparisons of the software clone detection techniques and tools which are based on their attributes as well as sub-attributes. We proposed a mutation operator based editing taxonomy for generating different software clone types. Further, a hypothetical scenario is developed using mutation operator-based editing taxonomy. Further, this hypothetical scenario is used to evaluate various software clone detection techniques and tools for extending the existing evaluation criterion which is well represented by the analysis of results. 

 

Big Data, Big Challenges

Zeel Doshi, Rashi Agrawal, Pratik Kanani, Dr. Mamta Padole

 

Abstract-The inevitable datafication of almost every aspect of personal, public and commercial life has led to a generation of an enormous amount of data. This data, measured in Petabytes and Zettabytes, is referred to as Big Data. Big Data is characterized by Volume,   Variety, Veracity, Velocity and Value. These characteristics introduce certain complications in the Big Data model, which is highlighted in this paper. This paper also throws a light on the various challenges that arise during storage, transportation, management and processing of Big Data. The principal focus of this paper is to discover the privacy and security issues of Big Data, to examine the probable causes of these issues and to estimate possible security solutions. 

 

Big data – Social Data Analysis-Improvisation of social data analysis to boost E-Commerce

Prem Kumar Ch., Utkarsh Yadav, Saumya Srivastava

 

Abstract-Social network is one of the major contributors to the Big Data world yet still developing. The popularity of social media is a great reflection to the trends developed and the e-Commerce benefiting from it. Using this data to draw insights that help in making decisions is called analytics of Social Data. This paper uses analysis on the social network on the basis of experimental study of human behavior and preparing proper strategy that will help the Networking media to improvise and improve present standards of the networking sites based on analysis of Social Data.

 

Behavioral Modeling of Malicious Objects in a Highly Infected Network under Quarantine Defense

YERRA SHANKAR RAO, PRASANT KUMAR NAYAK, HEMRAJ SAINI, ARINI CHARAN PANDA

 

Abstract-The noble work put forwarded here exclusively expressing a highly infected e- epidemic model in a computer network. We establish the Basic reproduction number R0, which explicitly brings out the stability conditions. The stability profile comprising of virus free equilibrium and endemic equilibrium model. Further, the work shows that if R0< 1 then the infected nodes ceases the spreading of  malicious code in computer network as it dies down and consequently establishes the asymptotically stable, when R0> 1, the alternative aspect that is infective nodes stretch out in the network and realizes as asymptotically unstable. 

 

Energy & SLA Efficient Virtual machine placement in Cloud Environment using NSGA

Oshin Sharma, Hemraj Saini

 

Abstract-To increase the availability of the resources and simultaneously to reduce the energy consumption of data center by providing a good level of the service level agreement are one of the major challenges in the cloud environment. With the increasing data centers and their size around the world, the focus of the current research is to save the consumption of energy inside data centers. Thus, this manuscript presents an energy-efficient VM placement algorithm for the mapping of virtual machines over physical machines. The idea of the mapping of virtual machines over physical machines is to lessen the count of physical machines used inside the data center. 


Enablers and inhibitors of cloud computing adoption by SMEs: An empirical study of SMEs located at a prominent industrial hub in the northern region of India

Devesh Kumar, Harsh Vardhan Samalia, Piyush Verma

 

Abstract-Small and Medium Enterprises (SMEs) are a vital and significant part of many economies across the world. For a vastly populated and diversified country like India, SMEs holds significant importance and potential in contributing towards economic and financial growth. Irrespective of SME sector’s prominence for the Indian economy, SMEs in India are exposed to several challenges and issues, and lag of information and communication technology (ICT) adoption because of financial and technical constraints is one of the major challenges that these organizations face. However, with cloud computing, such organizations can reap numerous benefits by adopting appropriate ICT with minimum efforts and investment. 

 

Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing

Pratiksha Gautam, Mohd. Dilshad Ansari, Surender Kumar Sharma

 

Abstract-Recently, Electronic Heath Record (EHR) is the most chosen method to maintain patient’s health information. The advancement of cloud computing enables users to access their data flexibly, providing large storage capability at low costs which encourage EHR maintainers to think over shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHR poses a gigantic challenge. Various security properties like access control, data privacy and scalable access between different clouds need to be satisfied. This paper presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework carried out for EHR confidential data on cloud storage. 


Extended Misuse Case Model (MUCX): Incorporating Assets and Vulnerabilities

Malik Nadeem Anwar, Mohammad Nazir

 

Abstract-Recently, security is perceived as an ineluctable concern during software development. Ensuring it early in SDLC significantly reduces both time and efforts. Misuse Case modelling is a classical and effective technique for eliciting and modelling security threats at the requirements stage. Literature review reveals the fact that this technique is lacking in the ability to model assets and vulnerabilities. Incorporating these concepts into the model seems to be instrumental for assuring the security and quality of an application. Therefore, an extended version of Misuse Case model (abbreviated as MUCX) has been proposed. Thereby, it incorporates assets and vulnerabilities, as modelling elements in the misuse case model. Secondly, the stepwise lightweight process is also proposed for adapting the model.  

 

Green Information Technology: Mapping the Swaying Factors and Strategies

Er. Amardev Singh, Dr. Harsh Vardhan Samalia, Dr. Piyush Verma

 

Abstract-Information Technology being the backbone of most recent advances is well within the frame and can be viewed as a boon or bane to the survival of mankind. With its help, the humans have generated a number of facilities that has made life a lot easier. But at the same time the negative impacts of IT on the Environment cannot be ignored. This impact of IT will soon be magnified especially in developing countries where the Information and Communication Technology (ICT) peripherals are penetrating at a very fast pace. Mostly the businesses today make use of IT in one or the other way, so they also share the responsibility towards striking a well balance among the three bottom lines of Sustainability i.e. Profit, People and Planet.


Known and Unknown risks in WWW and Internet of Things

Shelendra Kumar Jain, Nishtha Kesswani

 

ABSTRACT Scope of the internet gets extended to the Internet of Things (IoT). With a long period of time population of the whole word are using internet but it is still suffering to the privacy issues. As internet is one of the basic component to enable functioning of IoT technology, it will also suffer to the same issues in near future. In this paper we discuss unknown privacy issues and risks which we have identified within the scope of the internet and try to give same vision in context of the IoT. Main contribution of this paper is to identify risks from which a high portion of internet users are unaware and trying to promote awareness among Internet and IoT user and government of different regions. 

 

Improved Round Robin Mechanism for Load Balancing in Cloud Computing Environment

M a n m o h a n Sharma, Anil Kumar

 

Abstract-Round Robin Scheduling is a preemptive CPU calculation where the scheduler executes each task and switches between every one of the procedures when Time Quantum lapses. This algorithm is composed particularly for time sharing and real time frameworks. Its shortcoming includes more Average Waiting Time, Higher Context Switches and high Turnaround Time. Here a relative study of different ways to deal with limiting the waiting time in RR has been done. Many adjusted variants of the RR algorithm have been made to settle the inadequacies of the Standard RR calculation. This research looks to answer this query by contrasting an enhanced RR calculation.

 

Monomials Cryptographic Approach and Advanced Scenario for Length Based Attacks

Gautam Kumar, Hemraj Saini

 

Abstract— Noncom mutative Cryptography (NCC) is an opening of a new research field of cryptography by not considering all the security protocol in commutative group only, introduced by Goldreich and Lee. The foundation of this group is based on the Hidden subgroup or subfield problem (HSP). Due this reason it provides a better safety measures for all high level applications. This manuscript contains a research perspective on the monomials generated elements, where the original information are hidden and the computation progression proceeds on the equivalent considered elements, which doesn’t keep such an active knowledge who are interested in so far. Therefore, the information leakage is against the secret discharges and perfect suits for the upcoming future security. 

 

Provenance Based Digital Evidence Collection – Execution Context Approach over Information Flow Control

Asha Joseph and K. John Singh

 

Abstract-Virtually all popular tools for cyber/digital forensics rely upon the availability of evidence data. Once a digital crime is committed, the availability of relevant evidence data is a major problem. Compared to traditional methods of evidence collection which usually rely upon application logs, a security enhanced operating system kernel can make the evidence collection more comprehensive and effective. In this work, a new security framework is proposed, which tries to incorporate some capabilities for the evidence collection, such as a powerful event monitoring mechanism, which encompasses virtually all subsystems of the Operating System kernel. We propose a digital crime model mapping technique based on the execution context of the processes. 

 

Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET

Mamata Rath, Binod Kumar Pattanayak

 

Abstract- Nanotechnologies promise new possibilities for sustaining connectivity issues in mobile robots in a robotic based  Mobile Adhoc Network(MANET). In  multi-robot systems with  disaster scenario, military applications, for search and rescue operations and natural misfortunes this issue is even more critical. Timely communication and forwarding control messages in a Mobile Adhoc Network which is suitable for these drastic   situations from one robot to another is a crucial factor in all these solicitations and it is a security issue in MANET due to the auto-reconfiguration   nature of the network which is not based on  any fixed infrastructure. There is frequent variation in its topology due to speedily  moving mobile nodes. 

 

Strengthening the defense to Cybercrimes: Wanna Cry Ransomware

Habib ur Rehman, Uzair Ahmad Khan, Mohammed Nazir, Khurram Mustafa

 

Abstract-Cybercrime is not only a social ill but also creating tremendous threat to our virtual world of personal, corporate and national data security. The recent global cyber attack of Wanna Cry ransomware has created an adverse effect on worldwide financials, healthcare and educational sectors, highlighting the poor state of cyber security and its failure. This growing class of cyber attackers is gradually became one of the fundamental security concerns that require immediate attention of security researchers. The paper explores why the volume and severity of cyber attacks are far exceeding with the capabilities of their mitigation techniques and how the preventive measures could reduce the losses from cybercrime for such type of attacks in future. 

 

Quality Signatures for Detecting Intrusions

Syed Zeeshan Hussain, Nancy Agarwal

 

Abstract-The problem of securing web applications is one of the major and crucial issues with information security which needs immediate attention from the researchers. Attackers have been increasingly targeting the websites for a number of adversarial operations, though monetary gain and accessing sensitive information are the most common. The applications are vulnerable to various kinds of attacks, such as cookie stealing, Cross-Site Scripting (XSS), Structured Query Language (SQL) injection, session hijacking, etc. Intrusion Detection Systems (IDS) works as an outer defense layer and protect the web applications by continuously monitoring their usage to detect any malicious activity. In this paper, we focus on IDS that incorporates signature-based approach to detect the intruders.  

 

Web Based Application Design in Cloud Computing with Resource  Reservation and Security

Mamata Rath, Binod Kumar Pattanayak

 

Abstract-Resource allocation and security requirement for large-scale cloud applications is a challenging issue while design of any web based client oriented business application. Extensive research on various issues in real environment has reported that on-demand provision of resources in cloud where connectivity issue persists for heterogeneous communication channel, requires developers to consider network infrastructure and the environment, which is beyond certain control. In wireless mobile network, the network condition is always variable and cannot be predicted neither controlled. In this paper resource provisioning and  checking of continuous availability of resource to the clients has been carried out using a web based application software that uses cloud servers and data centres.

A Conceptual Paper on Dark Social – Social Cognitive and Social Capital Theory Perspective

Sushant Kumar

 

Abstract-Although knowledge sharing is highly researched topics, there is an entirely a new plain in the field of knowledge sharing. A phenomenon termed as ‘Dark Social’ is becoming more prevalent as the world is becoming more digital. As a result of dark social, very little is known about the source of information sharing, how information has reached and how this information will impact society and companies. The purpose of this article is to introduce the term dark social and understand the phenomena of dark social. Also, the paper establishes a link between dark social, social capital and social cognitive theory. 

 

A review on: VM management in Cloud & Datacenter

Nikita Sharma,Sudarshan Maurya                                                                                        

 

Abstract—Cloud computing (CC) is very emerging and young technology for storing and accessing data and deploying application over the web/internet as a substitute of host thus user can access data from anywhere. Virtualization is the essential technology for enabling cloud computing and datacenters for cloud venders like Google, amazon, IBM, Microsoft, Citrix etc. Security, efficient utilization of resources, load balancing, power management, scalability, capacity planning, monitoring etc. are the most challenging issues that all organization face. They have to find the solution for those problems. This paper presents a survey for server consolidation and load balancing in data center and/or cloud. We focus on approaches used to consolidate Virtual machines (VMs) into the hosts. 

 

An insight into CAPTCHA

Yash Doshi1, Ami Sangani2,Pratik Kanani3, Dr. Mamta Padole4

 

Abstract-Due to the increase in illegitimate use of services, offered by various organizations, there needs to be a method in order to confine it from happening. Therefore CAPTCHA came into prospect in order to control this course of action. In this paper, the role of CAPTCHA in a lucid manner is represented. Different types of CAPTCHAs exist today, starting from the text captchas to graphical captchas as per the requirements. It also explains the captchas used by several software companies. Also, flaws of Captcha and how captchas create a friction among the users has been discussed. It also highlights various applications of CAPTCHA and various forms of attack that can take place onto captcha system.  

 

An Efficient Pairwise Dynamic Key Agreement Scheme for Mobile-Adhoc Networks

Ajeet Singh, V.Ch. Venkaiah, Appala Naidu Tentu

 

Abstract—Mobile Adhoc Network (MANET’s) is an autonomous system of mobile nodes, which are connected each other through wireless links. A mobile adhoc network (MANET) is a type of self configuring network and have dynamic topology. Since each node in MANET is free to move independently, they can change their links to other nodes frequently. Secure communication among nodes in mobile adhoc networks is a major concern. Many key management schemes and protocols have been evolved in past years, but developing fundamentally secure key management scheme for dynamic MANET’s is still an open research problem. 

 

Attack Data Usability and Challenges in its Capturing and Sharing

Ashima Rattan, Navroop Kaur, Saurabh Chamotra, Dr. Shashi Bhushan

                                    

Abstract- Now a days Attacker’s launch attack campaigns targeting the zero day vulnerability, compromising internet users on a large scale. The first response to such campaigns is to detect them and collect sufficient information regarding tools, techniques used to exploit the vulnerability. Hence effective capturing of the attack data and its timely dissemination to defenders is required for the mitigation and prevention of the large scale attacks. The objective of our survey is to make an automated attack data capturing and sharing mechanism. This study will help us in finalizing the standard format for information sharing, further which could be machine readable.

 

Differential Cryptanalysis of Six Rounds DataEncryption Standard: An Implementation

Vikas Tiwari, V.Ch. Venkaiah, Appala Naidu Tentu

 

Abstract—Differential Cryptanalysis is considered as a powerful technique in the field of cryptanalysis, applied to symmetrickey block ciphers. It is a kind of chosen plain-text attack in which the cryptanalyst has some sets of the plain-text and the corresponding cipher-text pairs of his choice. These pairs of the plain-text are related by a constant difference. Generally, it is the analysis of how differences in input information can affect the resultant difference at the output.

 

Distance based and Multivariate Parallel Techniques for Outlier Recognition

Dr. C.P.Gupta and Arunima Sharma

 

Abstract- In Information Age various types of statistics is collected from profuse sources. If we represent this census in graphical form we get deviation in avail. This divergent is high or less than other significance of data set. The exception in the distinguished ability of these values is unambiguously conspicuous, if depicted in graphical form with resulted ethics. Outlier is a dossier of data values which is either greater or lesser means drifted from other resulted esteemed used in representation of a data establish in representable form. Numerous techniques are used to distinguish outliers from other values by using LOF with outlier identification schemes.

 

Parallel Algorithms for outlier detection in high dimensional data

Dr. C.P.Gupta and Arunima Sharma

 

Abstract - Outlier detection based on concept of deciphering different data by using conventional methods with modifications. This paper is based on different parallel approach for outlier recognition in High-dimensional (Mao et. al. 2015) Big-Data. The focal goal of Parallel Data mining is to discover significant patterns or rules in enormous datasets in real time. It is an inter-disciplinary area of research, which associate research from different areas such as machine learning, artificial intelligence (Hodge et. al. 2004), statistics, high performance computing, Big- Data and neural networks. Parallel Algorithms are best to detect outliers in a complex data set with a large future scope in present era. 

 

Survey on Privacy Preservation and Identity Management Systems

Uzair Ahmad Khan, Khurram Mustafa

 

Abstract-Internet has become an integral part of our life, users are dependent on internet for various day to day task starting from emails, online purchases, health record, financial details etc. Most of the interaction on internet if not all, require user to prove their identity and they also need to know with whom they are interacting with (i.e. the identity of other party involve in communication). Digital identity has an important role in internet economy. Identity management systems have been primarily designed to store and manage entity (person or service) and their attributes. Different Identity management system model has been designed and produced in the market. 

 

Testing the security products against next generation malware

Manusankar C, Dr. Vargheese Paul

 

AbstractThe recent attacks in the cyber world is really a night mare for the users as well as the security product companies. Even-though these companies claim that the systems in which the infections affected were not having the up-to date security products, we cannot agree with them completely as we had tested several products with new infections and the detection rate was not up to the mark. This paper presents the results and findings of Sec-Test Auto in the next generation malware scenario. This work is a real time testing with WannaCry and Petaya malwares and other malwares with a Virtual testbed( SecTest Auto) created by the author for testing various Security products.

 

Using Splunk for Farm Data Analytics

Hiral Raveshiya

 

Abstract-Everything is getting connected to the Internet in current era. Internet of Things (IoT) is the hottest trend giving rise to development of lots of applications leading to smart livings and smart cities. This paper presents use of modern technologies and trends in the field of farming leading to smart farming. This paper represents use of splunk for data analysis in farming. Manual methods of data collection are replaced by sensors and gathered data is fed to the splunk software for some analysis and prediction. Prediction related to farming and application development for farmers is currently under development. The aim of this paper is to give overview of use of splunk and machine lerning to the readers and students in particular who are interested in research and contribution towards smart farming.