Secure Authentication Protocol to Cloud
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1551-1557, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15511557
Abstract
There is growing adoption of internet based services and mobility devices in last two decades. With more number of devices falling under internet of things, cloud based service developments are equally growing. Such cloud solution providers act as a service hub for the cloud service they publish. While lowering the maintenance of software and hardware infrastructure, the cloud solution provider faces challenges in increasing service availability, reducing network management time, minimizing risk of data breaches etc. For data security, both cloud service provider & service consumers rely on indispensable firewalls that use authentication and authorization mechanism for each login user. In spite of these measures, the security of sensitive data still remains a challenge that secure data is vulnerable to unauthorized access. This research paper proposes a new protocol called Secure Authentication Protocol (SAPC) for the authentication purpose which provides mutual authentication between client and remote cloud server. User and Server have to prove their identity to each other at the time of login phase to utilize the cloud resources. Whenever a user logs in, remote cloud server generates dynamic symmetric key and shares the key with client device over insecure channel using key agreement protocol for maintaining security. Proposed SAPC approach helps to stop illegitimate users/devices/things from accessing authorized services/data of cloud service provider.
Key-Words / Index Term
Authentication scheme, Cloud services, Insider attack, Key agreement, Mutual authentication, Session key, User Anonymity, Waveform
References
[1] http://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/, May 2016.
[2] http://www.internetlivestats.com/internet-users/, May 2016.
[3] Jain, A.K. and Maltoni, D. Handbook of Fingerprint Recognition. Springer, NewYork, Inc., Secaucus, NJ, USA. 2003.
[4] Jain, A., Hong, L. and Bolle, R. On-line fingerprint verification. IEEE Trans. Pattern Anal. Mach. Intell., 19, 302–314. 1997.
[5] Xi, K. and Hu, J. (2009) Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault. In ICC’09. IEEE Int. Conf. Communications, Dresden, Germany, June 14–18, pp. 1–5. IEEE, Dresden, Germany.
[6] Z. Xiao and Y. Xiao, “Security and Privacy in Cloud Computing,” in Communication Surveys and Tutorials, 2013.
[7] N. Pathak, A. Pawar, and B. Patil, “A Survey on Keylogger: A Malicious Attack,” in International Jourcal of Advanced Research in Computer Engineering and Technology, 2015.
[8] Xi, K., Ahmad, T., Han, F. and Hu, J. (2010) A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secure. Comm. Netw., http://dx.doi.org/10.1002/sec.225.
[9] R. K. Banyal, P. Jain, and V. K. Jain, “Multi-factor Authentication Framework for Cloud Computing,” in Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on. IEEE, 2013.
[10] C. Powell, T. Aizawa, and M. Munetomo, “Design of an SSO authentication infrastructure for heterogeneous intercloud environments,” in Cloud NetworKeyng (CloudNet), 2014 IEEE 3rd International Conference on. IEEE, 2014.
[11] R. Khan, R. Hasan, and J. Xu, “SEPIA: Secure-PINAuthentication- as-a-Service for ATM using Mobile and Wearable Devices,” in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference.
[12] A. U. S. Yogendra Shah, Vinod Choyi and L. Subramanian, “Multi-Factor Authentication as a Service,” in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference
[13] Arif Mohammad Abdul, Sudarson Jena, M Balraju and M. Kiran Sastry, “Enhanced Cipher Method for Cloud Authentication” in International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321-7308, Volume: 05 Special Issue: 05 | ICIAC-2016 | May-2016.
Citation
Arif Mohammad Abdul, Sudarson Jena, M Bal Raju, "Secure Authentication Protocol to Cloud," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1551-1557, 2019.
Educational Data Mining For Student Support in Interactive Learning Environment
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1558-1565, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15581565
Abstract
Educational Data Mining is an emerging interdisciplinary research area that deals with the development of methods to explore data originating in an educational context. EDM uses computational approaches to analyze educational data in order to study educational questions. Firstly, it introduces EDM and describes and why we Need of EDM then, how EDM support Students in Interactive Learning, Applications of EDM, then goes on to list the most typical/common tasks in the educational environment that have been resolved through data mining techniques, LMS Environment, Software used in EDM (MOODLE), Advantages of DM in Education System and what Challenges we are facing in the Field of EDM and finally some of the most promising future lines of research are discussed.
Key-Words / Index Term
EDM, LMS, DM Techniques, Educational Systems
References
[1]. An Empirical Study of the Applications of Data Mining Techniques in Higher Education Dr. Varun Kumar Department of Computer Science and Engineering ITM University
[2]. Educational Data Mining: A Review of the State-of-the-Art By Cristóbal Romero, Member, IEEE, Sebastián Ventura, Senior Member, IEEE.
[3]. Educational Data Mining for Grouping Students in E-learning System Divna Krpan, Slavomir Stankov Faculty of Science, Teslina 12, Split, 21000 Croatia.
[4]. Importance of Data Mining in Higher Education System” 1Bhise R.B., 2Thorat S.S., 3Supekar A.K.
[5]. Use of Data Mining Methodologies in Evaluating Educational Data Thilina Ranbaduge Department of Information Technology, University of Moratuwa, Srilanka.
Citation
Gaurav Jindal, Sakshi Garg, "Educational Data Mining For Student Support in Interactive Learning Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1558-1565, 2019.
Analysis of Arraylist and Linked list
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1566-1570, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15661570
Abstract
In the concept of data structures, the List plays a major role in the allocation of data. “A list in java is an interface that can extend to collection interface”. A list can be implemented in two ways: Array list and Linked list. Array list is a class which provides growable array of list ADT. Linked list provides different implementation of the List ADT. There are different kinds of linked lists support in data structures which could be singly linked list, doubly linked list and circularly linked list. This paper deals with the analysis of array list and linked list (i.e.) singly linked list by performing operations such as insertion, deletion, searching and provides results based on time complexity to decide which would be better and efficient for allocation of data.
Key-Words / Index Term
list, arraylist, linkedlist, data structure
References
[1] Stelios Xinogalos, Maya Satratzemi, “An analysis of students’ difficulties with ArrayList object collections and proposals for supporting the learning process”, In the Proceedings of the 2008 IEEE International Conference on Advanced Learning Technologies, Cantabria, Spain, pp. 180-182, 2008.
[2] Gaifang Dong, Xueliang Fu, “An Improved Pathfinding Algorithm Based on Sorted Linked List and Indexed Array”, IEEE Transaction, Vol.6, Issue.4, pp.978-981, 2008.
[3] Anshu Yadav, Aruna Bhat, Rajni Jindal, “Stack implementation of adjacency list for representation of graphs”, In the Proceedings of the 2008 IEEE International Conference on Advanced Learning Technologies, Noida, Uttar Pradesh, India, pp. 213-216, 2013.
[4] Shruti rishab panday, “A Heuristic Approach of Sorting Using Linked List”, In the Proceedings of the IEEE Second International Conference on Computing Methodologies and Communication, Erode,India, pp. 446-450, 2018.
[5] Karuna, Garina Gupta, “Dynamic Implementation Using Linked List”, International Journal of Engineering Research & Management Technology”, Vol.1, Issue.5, pp.44-48, 2014.
[6] H. C Thomas, E. L Charles, L. R Ronald, and S. Clitlord, “Introduction to Algorithms”, Second Edition, MIT Press and 609 McGraw- Hill, ISBN 0-262-03293- 7. Section 1.1 Algorithms, pp.5, 2001.
[7] W.H. Butt, and M. Y. Javed, “A New Relative Sort Algorithm based on mean value”. IEEE Conference on Multi topic, 2008.
[8] Devareddi Ravi Babu, R Shiva Shankar, V Pradeep Kumar, Chinta Someswara Rao, D Madhu Babu, V Chandra Sekhar, “Array-Indexed Sorting Algorithm for natural numbers”, IEEE, pp. 606-609,2011.
[9] Wong, J., Vernon, A. Field, J., “Evaluation of a Path-Finding Algorithm for Interconnected Local Area Networks”, Selected Areas in Communications, pp. 1463-1470, 1987.
[10] Nagendra Singh, “Role of Suffix Array in String Matching: A Comparative Analysis”, International Journal of Computer Sciences and Engineering, Vol. 3, Issue.6, pp.89-93, 2015.
[11] Sourabh Shastri, “A GUI Based Run-Time Analysis of Sorting Algorithms and their Comparative Study”, International Journal of Computer Sciences and Engineering, Vol. 5, Issue.11, pp.217-221, 2017.
[12] A.Chitra, P.T. Rajan, “Data Structures”, second edition, 2007.
Citation
K. Renuka Devi , "Analysis of Arraylist and Linked list," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1566-1570, 2019.
Glucose Level Prediction of LIBREPRO CGM Sensor Data Using Machine Learning Algorithm for Enhanced Diabetes Mellitus Management
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1571-1582, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15711582
Abstract
"India now carries 20 percent of the global burden of diabetes. There is an immense need and progress to be made to identify the possible fluctuation of blood glucose before hand with minimal errors and thereby enabling proactive decision making. As per statistics one in 15 people in UK have diabetes, including one million people who have type 2, but haven`t been diagnosed. In this paper, focus is to use data science(An interdisciplinary field that uses skills from various fields such as statistics machine learning, artificial intelligence, visualization etc. ) algorithms like time series machine learning to derive meaningful and appropriate information from large volumes of blood glucose level and related data for precise forecasting of upcoming blood glucose level fluctuations. Not only can the patient and physician be informed beforehand, to avert complications, but it also aids in predicting response to certain medications with ease. In this case, time series machine learning algorithm is implemented on 15 days LIBRREPRO Continuous Glucose Monitoring (CGM) Sensor dataset of 10 different patients. A comparison of performance evaluation metrics of the different time series machine learning algorithms is drawn. Simple exponential smoothing(SES) Algorithm, with alpha and beta of 0.99 provided the least Root Mean Square Error (RMSE) of 7.98mg/dL for 15-minute prediction, 19.47mg/dL for 30-minute prediction. The Theil’s U coefficient was 0.12 for 15-minute, 0.39 for 30-minute prediction.
Key-Words / Index Term
Glucose Prediction, Machine Learning, SES, MA, RMSE, Theil’s U, LIBREPRO, CGM Sensor, Data Science, Time Series Forecasting, Moving Window Walk Forward Validation
References
[1] Centers for Disease Control and Prevention. National Diabetes Fact Sheet: National Estimates and General Information on Diabetes and Prediabetes in the United States, 2011. Atlanta, GA, U.S. Department of Health and Human Services, Centers for Disease Control and Prevention, 2011
[2] International Diabetes Federetion, IDF diabetes atlas.Technical report, 2013.
[3] K. Plis, r. j. shubrook and F. schwartz, "A machine learning apprroach to predicting blood glucose levels for diabetes management," Modern artificial intelligence for health analytics, pp. 1-14, 2014.
[4] G. Sparacino, F. Zanderigo, S. corazza, A. Maran, A. FAcchinetti and C. Cobelli, "Glucose concentration can be predicted ahead in time from continuous glucose monitoring sensor time series," Biomedical engineering IEEE Transactions, pp. 931-937, 2007.
[5] M. Jensen, T. F. Cristensen, L. Tarnow, E. Seto, M. Johansen and O. Hejlesen, "Real time hypoglycemia detection from continuous glucose monitoring data of subjects with type 1 diabetes," Diabetes technology and theraupeutics 15(7), 2013.
[6] C. Marling, M. wiley, R. Buneseu, J. Shudrook and F. Schwartz, "Emerging Applications for intelligent diabetes management," AI MAgazine, vol. 67, 2012.
[7] K. Polat and S. Gunes, "An expert system approach based on principle component analysis and adaptive neuro fuzzy inference system to diagonisis of diabetes disease," Science Direct, pp. 702-710, 2007.
[8] S. Polat, K. Gunes and A. Arslan, "A cascade learning system for classification of diabetes disease:Generalised disciminant analysis and least squared support vector machine," Expert systems with applications, pp. 482-487, 2008.
[9] G.Baghdadi and A. Nasrabadi, "Controlling blood levels in diabetics by neural network predictor," Engineering in medicine and biology society, pp. 3216-3219, August 2007.
[10] C.Zecchin, A. Facchinetti, G. Sparacino, G. D. Nicolao and C. Cobelli, "Neural network incorporating meal information improves accuracy of shorttime predictions of glucose concentration," IEEE Transactions on Biomedical Engineering, 2012.
[11] T. e. al., "Artificial neural network for blood glucose level prediction," in International conference on smart,monitored and controlled cities, 2017.
[12] S. Pappada, B. D. Cameron, P. M. Rosman, R. E. Bourey, T. J. Papadimos, W. Olorunto and M. J. Borst, "Neural Network based real time prediction of glucose in patients with insulin dependent diabetes," Diabetes technology and Therapeutics, pp. 135-141, 2011.
[13] MeriyanEren-Orukulu, A. Cinar, L. Quinn and D. smith, "Estimation of future glucose concentrations with subject specific recursive linear models," Diabetes technology and Theraupetics, pp. 243-253, 2009.
[14] V.Petridis, A. KehagiasL, PetrouA, BakirtzisS, Kiartzish, PanagiotouN and Masalaris, "A bayesian multiple models combination method for time series prediction," Journal of Intelligence and robotic systems, vol. 31, no. 1-3, pp. 69-89, may 2001.
[15] R. J, S. Rajaraman, A. Gribok and K. W. ward, "Predictive monitoring for improved management of glucose levels," Journal of diabetes science and technology, pp. 478-486.
[16] Lynn Kennedy, Adam Brown, Äbotts freestyle librepro professional CGM system.
[17] Freestyle Libre 14 days users manual
[18] P. HAmmond, Interpreting the ambulance glucose profile, vol. 16, 2016.
[19] Rob J Hyndman, George Athanasopoulous, "Forecasting principles and practice" 2nd edition may 2018.
[20] Zbikowski and Kamil, "Using Volume weighted support vector machines with walk forward testing and feature selection for the purpose of creating stock trading strategy," Elsevier,Expert systems with applications, vol. 42, 2014.
[21] S. Makridakis and S. C. Wheelright, "Forecasting methods and applications," 2018.
[22] GalitScmueli and K. C. Lichtendahl Jr, "Practical time series forecasting with R-A hands on guide," 2016.
[23] R. J. Hyndman, "Forecasting: Principles and Practice-Exponential Smoothing II".
[24] R. Hyndman and A. Muhammad, "Some Nonlinear Exponential Smoothing models are unstable," 2006.
[25] C. Marling and C. Bunescu, "The OhioT1DM dataset for blood glucose level prediction," in III International workshop on knowledge discovery in healthcare data, Stockholm,Sweden, July 13 2018.
Citation
Rekha Phadke, Varsha Prasad, H C Nagaraj, K P Nagesh, "Glucose Level Prediction of LIBREPRO CGM Sensor Data Using Machine Learning Algorithm for Enhanced Diabetes Mellitus Management," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1571-1582, 2019.
An Review on Ear Recognition Techniques Based On Local Texture Descriptors
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.1583-1587, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15831587
Abstract
Ear biometric is considered as one of the most reliable and invariant biometrics characteristics. Ear recognition is an active area of research and automatic ear recognition is one of the challenging areas in biometric and forensic domains. Human ear contains large amount of unique features for recognition of an individual. The Ear biometric is unhurried as one of the majority unswerving and invariant biometrics approach. Ear appreciation is an active area of enquiry and instinctive ear recognition is one of the challenging areas in biometric and pathological provinces. When compared with the other biometric based recognition, human ear recognition system is universally accepted by various researchers. There are different approaches and descriptors that achieve relatively good results in ear biometric recognition. In this study, presents an overview of different local texture descriptors in the field of automatic ear recognition. Further, we have compared the various feature descriptor extraction techniques and discuss the recognition rate and accuracy for different problems.
Key-Words / Index Term
Ear Biometric, Physiological and Texture Characteristics, Recognition, Local Descriptors
References
[1] Emersic, Z., Struc, V., & Peer,“Ear biometrics” A survey of detection, Ear recognition: More than a survey. Neurocomputing, 255, 26-39 P(2017).
[2] A.Iannarelli,”Earidentification.ForensicIdentification Series”,Paramontpublishingcompany, Fremont,California,1989
[3] A. Kumar, C. Wu, “Automated human identification using ear imaging”, Patter Recognition doi:10.1016/j.patcog.2011.06.005, (2011).
[4] A. Kumar, C. Wu, “Automated human identification using ear imaging”, Patter Recognition doi:10.1016/j.patcog.2011.06.005, (2011).
[5] A,“Identification Anthropometrique”: Instructions Signaletique; 1885.
[6] M. Burge, W. Burger, “Biometrics: Personal Identification in Networked Society”, Springer US, Boston, MA, Ch. Ear Biometrics, pp. 273–285, 1996.
[7] B. Moreno, A. Sánchez, J. F. Vélez, “On the use of outer ear images for personal identification in security applications”, in: Proceedings of the International Carnahan Conference on Security Technology, pp. 469–476, IEEE, 1999.
[8] Z. Mu, L. Yuan, Z. Xu, D. Xi, S. Qi, “Shape and structural feature based ear recognition”, in: Advances in biometric person authentication, Springer, pp. 663–670,2004.
[9] D. J. Hurley, M. S. Nixon, J. N. Carter, “Automatic ear recognition by force field transformation”s, in: Proceedings of the Colloquium on Visual Biometrics, pp. 7–1, IET, 2000.
[10] B. Victor, K. Bowyer, S. Sarkar, “An evaluation of face and ear biometrics”, in: Proceedings of the International Conference on Pattern Recognition, Vol. 1, pp. 429–432, IEEE, 2002.
[11] K. Chang, K. W. Bowyer, S. Sarkar, B. Victor, “Comparison and combination of ear and face images in appearance-based biometrics”, Transactions on Pattern Analysis and Machine Intelligence 25 (9) (2003) 1160–1165.
[12] H.-J. Zhang, Z.-C.Mu, W. Qu, L.-M.Liu, C.-Y. Zhang, “A novel approach for ear recognition based on ICA and RBF network”, in: Proceedings of the International Conference on Machine Learning and Cybernetics, Vol. 7, pp. 4511–4515, IEEE, 2005 .
[13] L. Nanni, A. Lumini, “Fusion of color spaces for ear authentication,Pattern Recognition”, 42 (9) (2009) 1906–1913.
[14] A. Pflug, C. Busch, A. Ross, “2D ear classification based on unsupervised clustering”, in: Proceedings of the International Joint Conference on Biometrics, pp. 1–8, IEEE, 2014.
[15] A. Benzaoui, N. Hezil, A. Boukrouche, “Identity recognition based on the external shape of the human ear”, in: Proceedings of the International Conference on Applied Research in Computer Science and Engineering, pp. 1–5, , IEEE, 2015.
[16] A. Pflug, P. N. Paul, C. Busch, “A comparative study on texture and surface descriptors for ear biometrics”, in: Proceedings of the International Carnahan Conference on Security Technology, pp. 1–6 IEEE, 2014.
[17] L. Jacob, G. Raju, “Advances in Signal Processing and Intelligent Recognition Systems”, Springer International Publishing,Cham, Ch. Ear Recognition Using Texture Features – A Novel Approach, pp.1–12, 2014.
[18] Ojala, T. and Pietikäinen, M. “Unsupervised Texture Segmentation Using Feature Distributions”. Pattern Recognition 32:477-486, (1999).
[19] R. AnandhaJothi, V. Palanisamy, “Performance Enhancement of Minutiae Extraction Using Frequency and Spatial Domain Filters” International Journal of Pure and Applied Mathematics Volume-118 issue-7 page no-647-654 ISSN No-1314-3395.
[20] R.AnanadhaJothi and V.Palanisamy, "Analysis of Fingerprint Minutiae Extraction and Matching an Algorithm " International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Volume- 3, Special Issue 20, April 2016, PP: 398-410.
[21] R.AnandhaJothi ,V.Palanisamy and J.Nithyapriya ” Evaluation of fingerprint minutiae on ridge structure using Gabor and closed hull filter”, Computational Vision and Bio Inspired Computing. Springer (2018) (in press).
[22] P. Abirami, R. Anandhajothi V. Palanisamy, “A Survey on Biometric E-Voting System Using Retina.” International Journal of Pure and Applied Mathematics, 118 (7) 2018 647-654.
[23] R Suganya,R Anandha Jothi,V Palanisamy,”A Survey on Security Methodologies in E-Voting System.”,International Journal of Pure and Applied Mathematics, vol.118,no.7, 647-654,2018.
[24] AsmitaKamble , AbhijitPatil, VivekPatil, Priya More, AkshayShende, “Automated Human Identification Using Ear Imaging”, IJARIIE-ISSN(O)-2395-4396 Vol International Journal of Pure and Applied Mathematics, 118,(7) (2018) 647-654. -2 Issue-3 2016.
[25] AsmitaKamble , AbhijitPatil, VivekPatil, Priya More, AkshayShende, “Automated Human Identification Using Ear Imaging”, IJARIIE-ISSN(O)-2395-4396 Vol International Journal of Pure and Applied Mathematics, 118,(7) (2018) 647-654. -2 Issue-3 2016
[26] AsmaaSabet Anwar, Kareem Kamal A.Ghany and HeshamElmahdyc, “Human Ear Recognition Using Geometrical Features Extraction”, International Conference on Communication, Management and Information Technology (ICCMIT 2015).
[27] David J. Hurley, Mark S. Nixon, John N. Carter, “Automated Human Identification Using Ear Imaging”, Vol 2 Issue-3 -ISSN(O)-2395-4396, 2016IJARIIE.
[28] AnikaPflug, Christoph Busch and Arun Ross, “2D Ear Classification Based on Unsupervised Clustering”.
[29] KyongChang, Kevin W. Bowyer, SudeepSarkar,Barnabas Victor, “Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics”, Published by the Computer Society 2003 IEEE.
[30] David J. Hurley, Mark S. Nixon, John N. Carter, “Automatic Ear Regnition By Force Field Transformation”, IJARIIE-ISSN(O)-2395-4396 Vol-2 Issue-3 2016.
[31] Zhichun Mu, Li Yuan, ZhengguangXu, Dechun Xi, and Shuai Qi, “Shape and Structural Feature Based Ear Recognition”, S.Z. Li et al. (Eds.): Sinobiometrics 2004, LNCS 3338, pp. 663–670, 2004. © Springer-Verlag Berlin Heidelberg 2004.
[32] Amandeep Kaur Bhatiam and Harjinder Kaur, “Security and Privacy in Biometrics: A Review” International Journal of Scientific Research in Computer Science and Engineering, ISSN No. 2320-7639,Vol 1,2 April 2013.
[33] Abdhulkarim I.Abughfa, Ahmed B.Elmadani “Offline Signature Verification Based On Iimage Processing and Hu Moment” , International journals of scientific research in network security and communication ISSN:2321-3256 , Vol 1,2 April 2013
Citation
S. Saranya, R. Anandha Jothi, V. Palanisamy, "An Review on Ear Recognition Techniques Based On Local Texture Descriptors," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1583-1587, 2019.
UMAX Meta Task Scheduling Algorithm in Grid Computing
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1588-1592, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15881592
Abstract
Grid computing technology can be seen as a positive alternative for implementing high-performance distributed computing. The goal of Grid computing is to create the illusion of virtual computer out of a large collection of connected heterogeneous nodes. Scheduling jobs on computational grids is identified as NP-hard problem due to the heterogeneity of resources; the resources belong to different administrative domains and apply different management policies. Today a highly secure or virtual grid is very demanding in which you can share any resource from any cluster even with existence of fault in system. In this paper, an algorithm named as UMAX is proposed. This method aims to improve the resource utilization with maximum efficiency and throughput
Key-Words / Index Term
Meta task; Scheduling; Resource utilization; Grid task scheduling
References
[1] W. Gentzsch, “DOT-COMing the GRID: Using Grids for Business”, Sun Microsystems Inc, Palo Alto, California, USA, pp. 1–3, 2002.
[2] A News Article Web Page in “Nature”, Available at: http://www.nature.com/nature/webmatters/grid/ grid.html.
[3] M. Baker, R. Buyya, D. Laforenza, “The Grid: International Efforts in Global Computing”, SSGRR 2000 The Computer & eBusiness Conference, l`Aquila, Italy, July 31 2000 – August 6 2000.
[4] C. Germain, V. Néri, G. Fedak, F. Cappello, “XtremWeb: Building an Experimental Platform for Global Computing”, Grid2000, IEEE Press, December 2000.
[5] I. Foster, C. Kesselman, S. Tuecke, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations”, The International Journal of High Performance Computing Applications, Vol. 15, Issue. 3, pp. 200–222, 2001.
[6] I. Foster, C. Kesselman, Eds., “Computational Grids”, In: “The Grid: Blueprint for a New Computing Infrastructure”, Morgan Kaufmann, 1998
[7] D.C. Arnold, S.S. Vahdiyar, J. Dongarra, “On the Convergence of Computational and Data Grids”, Parallel Processing Letters, Vol. 11, pp. 187–202, 2001, ISSN 0129-6264.
[8] P. Sessini, “Scheduling in Grid Computing Systems”, University of Calgary, Alberta, Canada, 2015.
[9] C. Franke, U. Schwiegelshohn, R. Yahyapour, “Job Scheduling for Computational Grids”, University of Dortmund, Germany.
[10] M. Hemamalini, M.V. Srinath, “Memory Constrained Load Shared Minimum Execution Time Grid Task Scheduling Algorithm in a Heterogeneous Environment”, Indian Journal of Science & Technology, Vol. 8, 2015, ISSN (Print): 0974–6846, ISSN (Online): 0974–5645.
[11] R.J. Wisnesky, “Evaluating Scheduling Algorithms on Distributed Computational Grids”, 2002.
[12] K. Jairam Naik, K. Vijaya Kumar, N. Satyanarayana, “Scheduling Tasks on Most Suitable Fault Tolerant Resource for Execution in Computing Grid”, IJGDC, Vol. 5, pp. 121–132, 2012.
[13] M. Hemamalini, “Review on Grid Task Scheduling Algorithm in a Distributed Heterogeneous Environment”, International Journal of Computer Applications, Vol. 40, Issue. 2, pp. 24–30, 2012.
[14] M. Hemamalini, Dr. M.V. Srinath, “State of the Art: Task Scheduling Algorithms in Heterogeneous Grid 0 50 100 150 200 250 Time in Milliseconds Response Time Minimization”, International Journal of Computer Applications, Vol. 145 p. 14, 2016, “Computing Environment”, Elysium Journal of Engineering Research Management, Vol. 1, August 2014.
[15] M. Hemamalini, M.V. Srinath, “Response Time Minimization Task Scheduling Algorithm”, International Journal of Computers and Applications, Vol. 145, pp. 9–14, 2016.
[16] J. Balasangameshwara, N. Raju, “A Hybrid Policy for Fault Tolerant Load Balancing in Grid Computing Environments”, Journal of Network and Computer Applications, Vol. 35, Issue. 1, pp. 412–422, 2012.
Citation
K. Padma Priya, M. Hemamalini, "UMAX Meta Task Scheduling Algorithm in Grid Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1588-1592, 2019.
Modern Helmet with Smart Utility Features
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.1593-1595, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15931595
Abstract
This paper proposes architecture for a Smart helmet using the IOT technology. Regular bike riding requires various parameters to be handled by human beings. These parameters change in real time while driving. Even slightly neglecting these parameters can cause accidents. The Proposed system collects the data sensed from various sensors in real time, processes that data and helps the rider to be alert about the surrounding and inform him in advance through actuators. It will reduce the manual effort required to find the routes by automating the process. This System can largely reduce the number of accidents by alerting the rider in advance.
Key-Words / Index Term
Actuators, internet of things, IoT, sensors, Smart Helmet
References
[1] Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei Palade, and Siobhán Clarke, Middleware for Internet of Things: A Survey,IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 1, FEBRUARY 2016,70-95.
[2] Jianli Pan, Raj Jain, Subharthi Paul, TamVu, Abusayeed Saifullah, andMo Sha, An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype and Experiments, IEEE INTERNET OF THINGS JOURNAL, VOL. 2, NO. 6, DECEMBER 2015,527-537.
[3] Matthew Edel, Road Profile Sensor: A Detection Method for Active Suspension Systems, SEATTLE PACIFIC UNIVERISTY HONORS PROJECT, MAY 2014,1-17.
[4] Drinking and Driving: a road safety manual for decision-makers and practitioners. Geneva, Global Road Safety Partnership, 2007,22-23.
[5] Gamini Bulumulle and Ladislau Boloni, Reducing Side-Sweep Accidents with Vehicle-to-Vehicle Communication,Journal of Sensor and Actuator Networks,NOVEMBER 20,6.
[6] Edel, Matthew, "Road Profile Sensor: A Detection Method for Active Suspension Systems" (2014). Honors Projects OCTOBER 2017, 1-18.
[7] P. Manickam, V. Muthu Ganeshan , M. Girija “Comprehensive Approach in Studying the Behaviour of Contiki RPL Protocol in Diverse Data Transmission Ranges” ,International Journal of Scientific Research in Network ,Volume-6, Issue-3, June 2018
[8] Mantripatjit Kaur , Anjum Mohd Aslam “Big Data Analytics on IOT: Challenges, Open Research Issues and Tools” International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.3, pp.81-85 , June (2018)
Citation
Ameya Deshpande, Sudeshna Roy, "Modern Helmet with Smart Utility Features," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1593-1595, 2019.
Scope and Challenges in Data Visualisation: Presentation of Data in a Graphical Format
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1596-1601, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15961601
Abstract
Data visualization calls to mind the old saying: “a picture is worth a thousand words.” Data visualization techniques exploit this fact: they are all about turning data into visual form by presenting data in pictorial or graphical format. This makes it easy for decision-makers to comprehend the information contained within vast amounts of data at a glance to understand and draw inferences from it. In the present paper the authors have presented techniques and approaches for how huge quantities of data can be represented visually. The authors have designed an intuitive interface to make it easier for an end user to plot data and interact with it. It also demonstrated how data presented visually can be used to draw meaningful inferences from datasets representing real-world scenarios.
Key-Words / Index Term
Big data, Data visualisation, Interactive data representation, Data analytics
References
[1] Mayer-Schonberger, V. & Cukier, K. (2013). Big Data: A Revolution That Will Transform How We Live, Work, and Think. Houghton Mifflin Harcourt.
[2] Favaretto, M., Clercq, E. & Elger, B. (2019). Big Data and discrimination: perils, promises and solutions. A systematic review. Journal of Big Data.
[3] Singh, D. & Reddy, C. (2014). A survey on platforms for big data analytics. Journal of Big Data.
[4] Healy, K. (2018). Data Visualization: A Practical Introduction. Princeton University Press.
[5] Fang, X. & Zhan, J. (2015). Sentiment analysis using product review data. Journal of Big Data.
[6] K. Parimala, G. Rajkumar, A. Ruba, S. Vijayalakshmi, "Challenges and Opportunities with Big Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.16-20, 2017
[7] Rakesh. S.Shirsath, Vaibhav A.Desale, Amol. D.Potgantwar, "Big Data Analytical Architecture for Real-Time Applications", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.1-8, 2017
[8] Oluigbo Ikenna V., Nwokonkwo Obi C., Ezeh Gloria N., Ndukwe Ngoziobasi G., "Revolutionizing the Healthcare Industry in Nigeria: The Role of Internet of Things and Big Data Analytics", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.1-12, 2017
Citation
Asoke Nath, Tejash Datta, Faisal Ahmed, Nitin Gupta, "Scope and Challenges in Data Visualisation: Presentation of Data in a Graphical Format," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1596-1601, 2019.
Remote Integrity Auditing Scheme (RIAS) based on Luhn’s Approach
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1602-1607, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.16021607
Abstract
Cloud technology has gained fabulous popularity in recent years. By outsourcing the confidential resources to the public providers and paying for the provision used, the users can bliss upon the advantages of this new paradigm. However, the archive which backups the user’s sensitive data may not be fully trustworthy and introduces new challenges from the perspectives of data correctness and security. The users may also concern much about data intactness. Bountiful attempts have been espoused and many technological implementations have been established to remove insecurities. This paper aims to enhance the importance of the data integrity scheme and proposes a remote data possession checking based on the Luhn’s approach. The main idea is to design the tags computed from cipher blocks can be used to check the integrity of the resources in deposited in the archive. The security and performance analysis illustrates the computational, storage and communication efficiency of this scheme. Finally, it performs unbounded data possession checking which provides confidentiality of archived sensitive data
Key-Words / Index Term
Cloud storage, remote data possession checking, provable data possession, proof of retrievability
References
[1] Cachin, C., Keidar, I., Shraer, A, ”Trusting the Cloud”, ACM SIGACT News 40(2), 81-86 (2009).
[2] K Ren, C Wang, Q Wang, “Security Challenges for the Public Cloud”, IEEE Internet Computing,2012,16(1):69-73.
[3] Hema. V, and Dr M. Ganaga Durga. “An Improved Novel Hill Cipher Using RCLT “, International Journal of Engineering & Technology,vol.7,no.3.3,2018,p.209.
[4] Deswarte Y, Quisquater J J. “Remote integrity checking”. In: Proc. of IICIS ’03, 2003, pp.1–11.
[5] Ateniese G, Kamara S, Katz J. “Proofs of storage from
homomorphic identification protocols”. In: Proc. of
ASIACRYPT ’09, 2009, pp. 319–333.
[6] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). “Provable data possession at untrusted stores”, Proceedings of the 14th ACM Conference on Computer and Communications Security - CCS 07. doi:10.1145/1315245.1315318
[7] Ateniese G, Pietro R D, Mancini L V, Tsudik G. “Scalable and efficient provable data possession”, In: Proc. of
SecureComm ’08, 2008, pp.1–10.
[8] Curtmola R, Khan O, Burns R, Ateniese G. “MR-PDP:
multiple-replica provable data possession”, In: Proc. of
ICDCS ’08, 2008, pp.411–420.
[9] Xiao D, Shu J, Chen K, Zheng W. “A practical data
possession checking scheme for networked archival
storage”, Journal of Computer Research and Development 2009; 46(10):1660–1668.
[10] Filho D L G, Baretto P S L M. “Demonstrating data possession and uncheatable data transfer”, IACR ePrint archive,2006. Report 2006/150, http://eprint.iacr.org/2006/150.
[11] Juels A, Kaliski B S. PORs: “Proofs of retrievability for
large files”, In: Proc. of ACM-CCS ’07, 2007, pp.584–597.
[12] Sebe F, Domingo J F, Martinez A B, Deswarte Y,
Quisquater J. “Efficient remote data possession checking in critical information infrastructures”, IEEE Trans.
on Knowl. and Data Eng., 2007, pp.1034–1038.S.
[13] Schwarz T J E, Miller E L. “Store, forget, and check:
using algebraic signatures to check remotely administered storage”, In: Proc. of ICDCS ’06, 2006, pp.12.
[14] Erway, Chris, et al. “Dynamic Provable Data Possession.” Proceedings of the 16th ACM Conference on Computer and Communications Security - CCS 09, 2009, doi:10.1145/1653662.1653688.
[15] Chen, Lanxiang. “Using Algebraic Signatures to Check Data Possession in Cloud Storage.” Future Generation Computer Systems, vol. 29, no. 7, 2013, pp. 1709–1715., doi:10.1016/j.future.2012.01.004.
[16] Hema. V, and Dr M. Ganaga Durga. “A Novel Hill Cipher (NHC) based on Galois Field “ ,International Journal of Pure and Applied MathematicsVolume 118 No. 7 2018, 641-645
[17] S. Nepal, S. Chen, J. Yao and D. Thilakanathan, "DIaaS: Data Integrity as a Service in the Cloud," 2011 IEEE 4th International Conference on Cloud Computing, Washington, DC,2011,pp.308-315. doi: 10.1109/CLOUD.2011.35
[18] Dodis, Yevgeniy, et al. “Proofs of Retrievability via Hardness Amplification.” Theory of Cryptography Lecture Notes in Computer Science, 2009, pp. 109–127., doi:10.1007/978-3-642-00457-5_8.
[19] Bowers, Kevin D., et al. “Hail”, Proceedings of the 16th ACM Conference on Computer and Communications Security - CCS 09, 2009, doi:10.1145/1653662.1653686.
[20] Popa, Raluca Ada, et al. "Enabling Security in Cloud Storage SLAs with CloudProof.", USENIX Annual Technical Conference. Vol. 242. 2011.
[21] Wang, Qian, et al. "Enabling public verifiability and data dynamics for storage security in cloud computing.", European symposium on research in computer security. Springer, Berlin, Heidelberg, 2009.
[22] Nitesh Jain, Pradeep Sharma, “A Security Key Management Model for Cloud Environment”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.45-48, 2017.
[23] M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017.
Citation
V. Hema, M. Ganaga Durga, "Remote Integrity Auditing Scheme (RIAS) based on Luhn’s Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1602-1607, 2019.
Automatic Accident Detection and Reporting Using Life Saver Application
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1608-1610, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.16081610
Abstract
Road accidents are dreaded incidents which are known to take about 146 thousand lives in a year in India itself This system proposes the solution, where the users phone itself initiates a communication to report the accident to the respected authorities. Here an application is being installed in the respective device which will send messages to the emergency numbers those are added at the time of installation of application in the smartphone including the location where the accident occurred. At the time of accident, the smartphone will detect the accident strike and by using accelerometer measurements are being taken, an alert message will send to the emergency numbers including the relatives, hospital and to the police station automatically. Here a threshold value is setted for an accelerometer reading, if the threshold value of accelerometer exceeds, the automatic alert message will send to the respective numbers. This message consists not only the alert of accident but also the exact location of the accidental spot. The alert message is sent using SMS module and the exact location of accident is spotted by using the GPS. This system is taken place using an android application and the user must to carry the smartphone while driving. Now that is not a mandatory case because all are with the smartphone with them always. Proposed system is user friendly and it don`t force any user to carry any other devices but only the device which is already with them.
Key-Words / Index Term
GSM,GPS,Accelerometer,Threshold
References
[1] Indranil Nikose1 , TusharRaut1 , Reena Bisen1 , Varsha Deshmukh1 , Ashwini Damahe1 , Pranoti Gho ,” Smart helmet using GSM and GPS technology”, International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 6, Issue 2, February 2017
[2] Prajitha Prasad A1, Reshma Mohan2, S Lekshmi Raj3, Sreelekshmi S4, Divya R Pillai5”, smart helmet and intelligent bike system” international journal of current engineering and scientific research, Volume-5, ISSUE-5, 2018
[3] Manjesh N “Smart Helmet Using GSM & GPS Technology for Accident Detection and Reporting System” Internal Journal for Electrical and Electronics Research, Vol:2, Issue:4, October 2014
[4] Nitin Agarwal, Anshul Kumar Singh, PushpendraPratap Singh, Rajesh Sahani “Smart Helmet” International Research Journal of Engineering and Technology, Vol:2, Issue:2, May 2015
[5] Mohd Khairul, Afiq Mohd Rasli, Nina Korlina Madzhi, Juliana Johari,” smart helmet with sensors for accident detection”,2013 International Conference on Electrical, Electronics and System Engineering, 978-1-4799-3178-1/13/$31.00 ©2013 IEEE
Citation
Christy Jose, Bejoy Mathew, Giffin M George, Renu V Rajan, Anish George, "Automatic Accident Detection and Reporting Using Life Saver Application," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1608-1610, 2019.