International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 4, No. 7, Jul. 2012

Cover page and Table of Contents: PDF (size: 125KB)

Table Of Contents

REGULAR PAPERS

UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment

By Dilbag Singh Jaswinder Singh Amit Chhabra

DOI: https://doi.org/10.5815/ijcnis.2012.07.01, Pub. Date: 8 Jul. 2012

Main objective of this research work is to improve the checkpoint efficiency for integrated multilevel checkpointing algorithms and prevent checkpointing from becoming the bottleneck of cloud data centers. In order to find an efficient checkpoint interval, checkpointing overheads has also considered in this paper. Traditional checkpointing methods stores persistently snapshots of the present job state and use them for resuming the execution at a later time. The attention of this research is strategies for deciding when and whether a checkpoint should be taken and evaluating them in regard to minimizing the induced monetary costs. By varying rerun time of checkpoints performance comparisons are which will be used to evaluate optimal checkpoint interval.
The purposed fail-over strategy will work on application layer and provide highly availability for Platform as a Service (PaaS) feature of cloud computing.

[...] Read more.
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

By Basappa B. Kodada Gaurav Prasad Alwyn R. Pais

DOI: https://doi.org/10.5815/ijcnis.2012.07.02, Pub. Date: 8 Jul. 2012

In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from many different nodes used to solve the complex or scientific problem. However in this case, security is a major concern. Even most grid security researches focus on user authentication, authorization and secure communication. This paper presents DDoS and Data Modification attack scenario and also provides the solution to prevent it. In case of data modification attack, it shows how easy to read/forward/modify the data exchanged between a cluster head node and computing nodes. Therefore this paper provides the solution to protect the grid computing environment against Data Modification and DDOS attack.

[...] Read more.
Image Encryption Using Chaotic Map and Block Chaining

By Ibrahim S. I. Abuhaiba Hanan M. Abuthraya Huda B. Hubboub Ruba A. Salamah

DOI: https://doi.org/10.5815/ijcnis.2012.07.03, Pub. Date: 8 Jul. 2012

In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryption is proposed. It is a simple block cipher based on logistic chaotic maps and cipher block chaining (CBC). The new system utilizes simplicity of implementation, high quality, and enhanced security by the combined properties of chaos and CBC cipher. Implementation of the proposed technique has been realized for experimental purposes, and tests have been carried out with detailed analysis, demonstrating its high security. Results confirm that the scheme is unbreakable with reference to many of the well-known attacks. Comparative study with other algorithms indicates the superiority of CMBC security with slight increase in encryption time.

[...] Read more.
A Robust Image Steganography using DWT Difference Modulation (DWTDM)

By Souvik Bhattacharyya Gautam Sanyal

DOI: https://doi.org/10.5815/ijcnis.2012.07.04, Pub. Date: 8 Jul. 2012

Maintaining the secrecy of information is of great concern today.Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. Considerable amount of work has been carried out by different researchers on steganography. In this work a new transform domain image stenographic technique DWTDM is presented where secret data is embedded in adjacent DWT coefficient differences. The dynamic range of the DWT difference considered while extraction of data which results an efficient and robust stenographic technique which can avoid various image attacks and works perfectly well for both uncompressed and compressed domain. Experimental results demonstrate the effectiveness and accuracy of the proposed technique in terms of security of hidden data and various image similarity metrics.

[...] Read more.
An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps

By Ruisong Ye Haiying Zhao

DOI: https://doi.org/10.5815/ijcnis.2012.07.05, Pub. Date: 8 Jul. 2012

Linear congruential generator has been widely applied to generate pseudo-random numbers successfully. This paper proposes a novel chaos-based image encryption scheme using affine modular maps, which are extensions of linear congruential generators, acting on the unit interval. A permutation process utilizes two affine modular maps to get two index order sequences for the shuffling of image pixel positions, while a diffusion process employs another two affine modular maps to yield two pseudo-random gray value sequences for a two-way diffusion of gray values. Experimental results are carried out with detailed analysis to demonstrate that the proposed image encryption scheme possesses large key space to frustrate brute-force attack efficiently and can resist statistical attack, differential attack, known-plaintext attack as well as chosen-plaintext attack thanks to the yielded gray value sequences in the diffusion process not only being sensitive to the control parameters and initial conditions of the considered chaotic maps, but also strongly depending on the plain-image processed.

[...] Read more.
Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting

By Nischay Bahl Ajay K. Sharma Harsh K. Verma

DOI: https://doi.org/10.5815/ijcnis.2012.07.06, Pub. Date: 8 Jul. 2012

This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal). Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network, and, the constant shadowing approach is a better fit for a static network, both, under static as well as mobile jammer environments, as compared to the log normal one. An improvement in sink-node packet delivery ratio by 15.02 % and 16.58 % was observed with static and mobile jammer environments respectively, under multicasting and constant shadowing mean of 8.0. Further, average sink-node packet delivery ratio with constant shadowing shows an improvement of 4.15% and 5.94%, using static and mobile jammer environment respectively, in comparison to the values obtained under log normal shadowing based network.

[...] Read more.
Application of Biometrics in Mobile Voting

By Donovan Gentles Suresh Sankaranarayanan

DOI: https://doi.org/10.5815/ijcnis.2012.07.07, Pub. Date: 8 Jul. 2012

Voting process in today's era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. We have considered the mobile equipment for the present system development, a smart phone using Android 3.0 (Honeycomb). The details of the proposed development are presented in this paper.

[...] Read more.
Estimating the Video Registration Using Image Motions

By N.Kannaiya Raja K.Arulanandam R.Radha krishnan M.Nataraj

DOI: https://doi.org/10.5815/ijcnis.2012.07.08, Pub. Date: 8 Jul. 2012

In this research, we consider the problems of registering multiple video sequences dynamic scenes which are not limited non rigid objects such as fireworks, blasting, high speed car moving taken from different vantage points. In this paper we propose a simple algorithm we can create different frames on particular videos moving for matching such complex scenes. Our algorithm does not require the cameras to be synchronized, and is not based on frame-by-frame or volume-by-volume registration. Instead, we model each video as the output of a linear dynamical system and transform the task of registering the video sequences to that of registering the parameters of the corresponding dynamical models. In this paper we use of a joint frame together to form distinct frame concurrently. The joint identification and the Jordan canonical form are not only applicable to the case of registering video sequences, but also to the entire genre of algorithms based on the dynamic texture model. We have also shown that out of all the possible choices for the method of identification and canonical form, the JID using JCF performs the best.

[...] Read more.