International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 10, No. 11, Nov. 2018

Cover page and Table of Contents: PDF (size: 175KB)

Table Of Contents

REGULAR PAPERS

Hybrid KP-ABE Algorithm with Time Bounded Access Control for Cloud Data Security

By Bhumika Dahat Nischol Mishra Santosh Sahu

DOI: https://doi.org/10.5815/ijcnis.2018.11.01, Pub. Date: 8 Nov. 2018

Cloud computing presents a vast area for distributed computing where integrated data centres provide resources for immense and scalable distribution of confidential data. Conceptually, cloud applications being offered, information security and its confidentiality become a vital issue to the cloud. So, as to craft certain security of data at cloud data stowage a design and execution of an algorithmic rule to boost cloud security is planned. With an concept, where the planned algorithmic rule integrates option of three completely different existing algorithms and named RAD cryptography algorithm with most novel and attractive conception of Attribute based encryption (ABE) so as to manage, control access and file sharing management in cloud with its special attribute computing properties. During this analysis, a secure file sharing scheme supported attribute is given. In this Research, during this analysis, work data is encrypted using Hybrid attribute based algorithm i.e. RAD Algorithm which proves its proficiency and effectiveness with respect to security level. If any user wants to access the encrypted information where some authentication credentials also are created based on cipher-text, then it has to evidence itself by providing authentication credentials. Consequently, the planned algorithm offers enriched security along with it diminishes time complexity during encryption and decryption technique for data file.

[...] Read more.
Block Chain: Cryptographic Method in Fourth Industrial Revolution

By Raihana Syahirah Abdullah Faizal M.A.

DOI: https://doi.org/10.5815/ijcnis.2018.11.02, Pub. Date: 8 Nov. 2018

This paper has reviewed the blockchain domain that suits with the current Industrial Revolution (Industry 4.0) uses cryptographic method blockchain. The implementation of this new cryptographic method in Industry 4.0 is currently being used widely as it eases the process of financial transaction and other process that have been as issue related with cyber security. The collection of review papers shows that the blockchain technology has high potential to grow wider not just in financial technology services and manufacturing industry but also in public sector, health care and even media industry. The papers elaborate how the blockchain able to be applied in different fields of technology in order make a secure and more protected services without entrusted the third party to avoid vulnerability to be attacked and misused. Nevertheless, the applications of the blockchain in various field helps in making the industry revolution.

[...] Read more.
QoS Oriented Cross-synch Routing Protocol for Event Driven, Mission-critical Communication Over MANET: Q-CSRPM

By Shashi Raj K Siddesh G K

DOI: https://doi.org/10.5815/ijcnis.2018.11.03, Pub. Date: 8 Nov. 2018

The decentralized and infrastructure less feature of Mobile Ad-hoc network (MANET) has made it a potential networking solution to be used in major applications ranging natural disaster management, vehicular communication, industrial communication etc. Though, being a dominating mobile communication system, exceedingly high network topology and mobility pattern in MANETs make it trivial to achieve Quality of Service (QoS) delivery, particularly for event-driven (mission-critical) communication. With this motivation, in this research paper a robust QoS Oriented Cross-Synch Routing Protocol for Event Driven, Mission-Critical Communication named Q-CSRPM has been developed for MANET. The proposed Q-CSRPM routing protocol exploits cross-layer routing architecture by applying network layer, MAC layer and physical layer information of IEEE 802.11 standard to perform optimal best forwarding node selection and reliable path formation. Q-CSRPM protocol performed proactive node management, service differentiation based data prioritization and resource scheduling, and dynamic buffer assessment based congestion detection at the network layer, dynamic link quality estimation and packet velocity estimation at the MAC layer, and PHY switching control at the physical layer of the protocol stack. Q-CSRPM applies dynamic link quality, congestion probability and packet velocity of a node for best forwarding node selection to form forwarding path. The node information sharing across the layers of protocol stack enables optimal BFN selection and routing control. It strengthened Q-CSRPM to exhibit 98.2% and 93% of packet delivery ratio for real time data and non-real time data respectively. A minimum of 2% deadline miss ratio was observed.

[...] Read more.
Novel Secured Biometric System Procuring Miniaturized Prorogation

By Sherin Zafar Ayesha Hena Afzal M. Afshar Alam

DOI: https://doi.org/10.5815/ijcnis.2018.11.04, Pub. Date: 8 Nov. 2018

Different organizations in today’s scenario are fully dependent on information technology for their survival, suffer from various security challenges like unauthorized access, physical damages etc. To avoid various security breaches and concerns, robust mechanism for user access need to be adopted that not only secure of valuable data but can also be utilized for developing various other security applications. “Biometric” secured technology is gaining attention for over traditional security mechanism like password, smart card etc. because information related to biometric are difficult to steal as compared to other mechanisms. In this research analysis “strong biometric approach” is proposed to overcome security apprehensions of various organizations& society through iris recognition system. Iris recognition system is a mechanism to identify a person through analyzing his or her iris pattern. This recognition system includes iris image acquisition, segmentation, normalization, encoding, matching and finally validation of iris templates. The iris recognition system developed and simulated in this research study has taken IIT database iris images as inputs and utilized hamming distance as the matching parameter. The simulated results depict an efficient and novel secured approach that will overcome various unauthorized accesses across the internet. The most novel approach of this iris based recognition system as compared to other traditional systems is that, if selected images are matched with trained iris images present in database then the resultant hamming distance as most of the iris recognition systems directly accept or reject images and causes huge congestion and execution prorogations.

[...] Read more.
Cuckoo Optimisation based Intrusion Detection System for Cloud Computing

By D. Asir Antony Gnana Singh R. Priyadharshini E. Jebamalar Leavline

DOI: https://doi.org/10.5815/ijcnis.2018.11.05, Pub. Date: 8 Nov. 2018

In the digital era, cloud computing plays a significant role in scalable resource sharing to carry out seamless computing and information sharing. Securing the data, resources, applications and infrastructure of the cloud is a challenging task among the researchers. To secure the cloud, cloud security controls are deployed in the cloud computing environment. The cloud security controls are roughly classified as deterrent controls, preventive controls, detective controls and corrective controls. Among these, detective controls are significantly contributing for cloud security by detecting the possible intrusions to prevent the cloud environment from the possible attacks. This detective control mechanism is established using intrusion detection system (IDS). The detecting accuracy of the IDS greatly depends on the network traffic data that is employed to develop the IDS using machine-learning algorithm. Hence, this paper proposed a cuckoo optimisation-based method to preprocess the network traffic data for improving the detection accuracy of the IDS for cloud security. The performance of the proposed algorithm is compared with the existing algorithms, and it is identified that the proposed algorithm performs better than the other algorithms compared.

[...] Read more.
Acknowledgement based Localization Method (ALM) to Improve the Positioning in Vehicular Ad Hoc Networks

By M. Chitra S. Siva Sathya

DOI: https://doi.org/10.5815/ijcnis.2018.11.06, Pub. Date: 8 Nov. 2018

Localization in Vehicular Ad Hoc Networks is a challenging issue due to the dynamic topology and high mobility of vehicles. Finding the exact location of the vehicles is not possible in this network due to the vehicles moving speed. In vehicular ad hoc networks, various kinds of localization techniques are used to know the position and the location of the vehicles. These techniques do have some limitations due to obstacles on the roadside, building shadow, tunnels and bad weather condition, etc. This paper is motivated to propose an algorithm to increase the localization accuracy and localization error. Acknowledgement based Localization Method (ALM) is used to improve the vehicle’s positioning information while broadcasting an Emergency Safety Message. ALM updates the position information whenever the vehicle changes its position. The proposed algorithm is compared with RSSI, TOA and DLM based localization techniques. The result shows that ALM algorithm improves the accuracy level and reduces the error rate caused by incorrect position estimation.

[...] Read more.