Issues and Protection of Mobile Application Security
Survey Paper | Journal Paper
Vol.07 , Issue.17 , pp.40-42, May-2019
Abstract
Now a days, people give more important to the smartphones. Smartphone users are increasing day by day. Mobile device contains sensible data and hackers easily access our data. Avoid installing more free apps and cyber criminals to avoid cyber crime. All the vulnerabilities are increasing by the hackers. Use block option in some applications to block the camera. Use pin code, patterns, finger prints and iris scanner to secure Smartphone applications. Android platform will be made available under apache software and open source licence. To avoid cyber crime use antivirus software and firewalls keep them to update. Don’t open email or attachment from unknown sources.
Key-Words / Index Term
Smartphone security, Mobile application development, Cyber crime
References
[1] A Study of Android Application Security William Enack, Damien Octeau, Patrick Mcdaniel, And Swarat Chaudhri Systems And Internet Infrastructure Security Laboratory.
[2] Mobile Application Security Platforms Survey Sardasht M.Mahmood, Bakhitier M.Amen, Rebwar M.Nabi International Journal Of Computer Applications (0975-8887).
[3]Security Risks and Their Prevention Capabilities in Mobile Applications Development Aneta of Information Technology, Lodz University Of Technology, Poland Information Systems In Management (2015).Vol.4123-134.
[4]The Role Of Mobile Networks-Apps Security Using Network Techniques S,Amutha International Journal Of Engineering And Techniques And Volume4 Issue1,Feb 2018.
[5]Defending Users Against Smartphone Apps: Techniques And Future Directions, William Enck North Carolina State University.
[6]A Survey Of Android Technology Shivam1,Ranjana Sharma2 International Conference On Advanced Computing(Icac-2016).
Citation
M. Angelin Rosy, N.Shilpa, M. Felix Xavier Muthu, "Issues and Protection of Mobile Application Security", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.40-42, 2019.
NIDS using Random Forest and Random Tree
Research Paper | Journal Paper
Vol.07 , Issue.17 , pp.43-46, May-2019
Abstract
Network Intrusion Detection Systems (NIDS) is the most important system in cyber security and it informs network administrators about policy violations. Identifying the network security violations and tells about where administrators to be improved. In Existing NIDS is designed to detect known network attacks. In this paper it is proposed to develop systematic methods for classifying intrusion detection. The key ideas are to use data mining techniques to discover network behaviour, anomalies and known Intrusions. Decision trees have been effectively used in NIDS but suffer from over sampling and the tree splitting being greedy locally. To overcome this some of the ensemble techniques like Random Forest, Random Trees and Ensemble Weak Learner Tree (EWL TREE) are used. Proposed technique reduces the number of trees required and also improves the precision and recall.
Key-Words / Index Term
Intrusion Detection, Security, Intruder, Decision Tree, Ensemble Weak Learner
References
[1] Raghunath, B. R., &Mahadeo, S. N. (2008, July). Network intrusion detection system (NIDS).
[2] Chandola.V, Banerjee.A&Kumar.V (2009) “Anomaly detection: A survey”, ACM Computing Surveys (CSUR
[3] G.K. Gupta “Introduction to data mining with case studies.
[4] Tan .P. N, Steinbach .M & Kumar .V (2005) “Introduction to data mining” Pearson Addison Wesley
[5] Rokach, L. (2010). Ensemble-based classifiers. Artificial Intelligence Review, 33(1), 1-39.
[6] Jones JM, Fielding A, Sullivan M (2006) Analyzing extinction risk in parrots using decision trees. BiodiversConserv 15(6):1993–2007.
Citation
K. Mohanapriya, M. Savitha Devi, "NIDS using Random Forest and Random Tree", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.43-46, 2019.
Positive Aspects of Social Media in Various Fields
Review Paper | Journal Paper
Vol.07 , Issue.17 , pp.47-50, May-2019
Abstract
Now a days, social media plays an important role in our life we are using it to keep in touch with our friends and relatives. These tools are very useful when we talk about business too. In this paper we cover all aspects of social media with its positive effect. Social media is an integral part of today’s society. Social media changes the way people interact with each other by offering more convenience but less quality. On the positive side, Social networks can act as individual tools for professionals to market their skills and seek business opportunities. Here we cover every aspect of social media with its positive effects. Some of the sites have become a day to day routine for the people. Social media has been mainly defined to refer to “the many relatively inexpensive and widely accessible electronic tools that facilitate anyone to publish and access information, collaborate on a common effort, or build relationship”. Focus is on the particular field like education, Healthcare, business, aerospace, youth, chemical engineering and society.
Key-Words / Index Term
Business, Chemical Engineering, Education, Healthcare Social Media
References
[1] S.Shabnoor,S.Tajinder,Social Media its Impact with Positive and NegativeAspects IJCATR, Volume 5– Issue 2, 71 - 75, 2016
[2] Bin Zhao et al., “Online Detection of Unusual Events in Multimedia via Dynamic Sparse Coding”, 2011.
[3] Nagar, Himanshu, Chetna Dabas, and J. P. Gupta. "Navie Bayes and K-Means Hybrid Analysis for Extracting Extremist Tweets", ACM Conference, pp 27-32.
[4]https://www.schooliseasy.com/2014/02/social-media-in-theclassroom/
[5] http://www.edudemic.com/how-students-benefit-from-usingsocialmedia/
[6] http://blog.hootsuite.com/social-media-for-business/
[7]http://www.automatedbuildings.com/news/sep11/columns/1108 26030404mandrusiak.html
[8]http://www.practicalparticipation.co.uk/yes/what/what_does_it_change
[9] Impact of Social Media on Adolescent Behavioral Health in California,Source: (Lenhart, 2010) except for Online video sites
[10]http://www.business2community.com/social-med
Citation
S. Nagalakshmi, "Positive Aspects of Social Media in Various Fields", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.47-50, 2019.
Standard Mobile Based Wireless Broadband Networks
Research Paper | Journal Paper
Vol.07 , Issue.17 , pp.51-54, May-2019
Abstract
Now-a-days there is high demand for broadband mobile services. Traditional high-speed broadband solutions depend on wired technologies namely digital subscriber line (DSL).Wi-Fi and Wimax are helpful in providing any variety of property like the mounted or transportable or nomadic connectivity without the requirement of LoS (Line of Sight) of the base station. Mobile Broadband Wireless Network (MBWN) may be a versatile and economical answer for remote areas. The IEEE Wi-Fi and Wi-Max/802.16 are the most promising technologies for broadband wireless metropolitan area networks (WMANs) and these are capable of providing high throughput even on long distances with varied QoS. These technologies ensure a wireless network that enables high speed Internet access to residential, little and medium business customers, further as net access for wireless local area network hot spots and cellular base stations. These offer support to both point-to-multipoint (P2MP) and multipoint-to-multipoint (mesh) nodes and offers high speed data (voice, video) service to the customers. In this paper, we study the issues related to, benefits and deployment of these technologies.
Key-Words / Index Term
WIMAX, SSO’s, Industry benefits, Wireless Network, Broadband
References
[1] IEEE Standard 802.16-2004, IEEE Standard for Local and Metropolitan Area Networks (MAN) - Part16: Air Interface for Fixed Wireless Access Systems.
[2] Revision of IEEE Std. 802.16-2004 and consolidates material from IEEE Std. 802.16e-2005, IEEE Std 802.16-2004/Cor1-2005, IEEE Std 802.16f-2005 and IEEE Std. 802.16g- 2007.Gizem, Aksahya & Ayese, Ozcan (2009) Communications & Networks, Network Books, ABC Publishers.
[3] IEEE Standard 802.16e-2005, Amendment to IEEE Standard for Local and Metropolitan Area Networks (MAN)– part 16: Air Interface for Fixed Broadband Wireless Access Systems-Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands.
[4] Intel Corp., IEEE 802.16* and WiMAX: Broadband Wireless Access for Everyone, 2003, www.intel.com/ebusiness/pdf/wireless/intel/80216_wimax.pdf WiMAX Forum, WiMAX’s Technical Advantage for Coverage in LOS and NLOS Conditions, Aug. 2004, www.wimaxforum.org/news/downloads/ WiMAXNLOSgeneral-versionaug04.pdf.
[5] WiMAX Forum: (www.wimaxforum.org).
Citation
M. Dukitha, D. Kavitha, "Standard Mobile Based Wireless Broadband Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.51-54, 2019.
A Study About Repetition of Group of Data and Avoid the Problem
Research Paper | Journal Paper
Vol.07 , Issue.17 , pp.55-58, May-2019
Abstract
Technology is improving day by day, to manage technology by time and trend. To share data in many ways, such as share it, whatsapp, facebook hike and Twitter By using these apps, sharing and storing the data is easy. Technology is improved by innovation and renovation. Cloud is used to store the big data. Users share information through multiple group members in the cloud with low maintenance and costs. Data owner is not able to control over their data. Various techniques are used to support user privacy and data sharing. The use of the mobile devices in cloud computing environment to various kinds of attacks like, unauthorized access. This paper introduces on how to avoid the repetition of data using normalization forms.
Key-Words / Index Term
Database, cloud computing, encryption, decryption, security.
References
[1].B .V. varshini, M.Vigilson prem, J.Geethapriya “A review on secure data sharing in cloud computing environment” (ISSN: 2278-1323) vol 6, issue 3, March 2017.
[2] Sathishkumar eswarmoorthy, chunduru anilkumar, usha moorthy, saravan kumar “Review on Dynamic Group Data Sharing in Cloud Environment” (ISSN: 646-656)
[3]Jiale zhang, Bing Chen, yanchao zhao, xiang cheng, and feng hu “Data Security and privacy preserving in edge computing paradigm: survey on open issues”vol7, issue4, April 23, 2018.
[4]Ahmad shah1, dr.penmesta V Krishna raja2 “Security and Privacy for Group Data Sharing Mobile Computing Enviornment” (ISSN 2394-4099)
Citation
M. Angelin Rosy, K.Sangeetha, M. Felix Xavier Muthu, "A Study About Repetition of Group of Data and Avoid the Problem", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.55-58, 2019.
A Study Of Industrial Wastewater Treatment Methodology Recycling And Reuse
Survey Paper | Journal Paper
Vol.07 , Issue.17 , pp.59-64, May-2019
Abstract
The water is essential for all living things globalization uses industrialization usage of water global warming is emerging elute of water scarcity one aspect to reduce water scarcity is by water recycling. Reuse the pure water and drinking water. First process of wastewater treatment it is a step by step process. Another step recycling process solid removal oil and grease removal biodegrable organics, trickling processed removal toxic material and reuse for agriculture industrial urban reuse environmental reuse this process is low cost and low processing in the wastewater. This paper cover the a study of industrial wastewater treatment method, recycling and reuse.
Key-Words / Index Term
industrial, wastewater, treatment, recycling, reuse
References
[1] Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[2] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[3] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
Citation
M. Inbavalli, G. Vignesh, "A Study Of Industrial Wastewater Treatment Methodology Recycling And Reuse", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.59-64, 2019.
A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer
Survey Paper | Journal Paper
Vol.07 , Issue.17 , pp.65-70, May-2019
Abstract
Mobile phone becomes the foremost typical and fashionable mobile device in recent years. It combines the practicality of transportable and Personal Digital Assistant. Besides, it provides several computers’ practicality, like process, communication, knowledge storage and etc. But, some users may be permission to allow for device and application choices. Device to attack by victimization network. The common attacks for network to security attacks, privacy attack, region attack, Phishing Network Spoofing, Desktops, etc. How to secure the mobile data to secure and protected are Device Protection, Information Protection, Application Management Security, and manage the application permission. Transferring the data use the Encryption and Decryption methods. To avoid the problems should be used for responsible websites. This is worked for only server sides and secure or install firewall in your device. Mobile firewall is used to reduce the security risk and protect the integrity of the network device.
Key-Words / Index Term
wirelessmobile, securityattacks, secure data, encryption and decryption, firewall, applications
References
[1] Manish Singh, Girish Tere “Study of Security Threats and Vulnerabilities Associated With Mobile Device”, IJCE, Vol.1, Issue.1, Page 15, August 2016.
[2] Rajivkumar Mente and Asha Begadi “Android Application Security”, ACST, Vol.10, No.5, pp.1207-1210, ISSN 0973-6107, 2017.
[3] Varadan,”Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing”, IEEE, 15 JULY 2017.
[4] B.V.Varshini,M.VigilsonPrem,J.Geethapriya “A Review on secure data sharing in cloud computing environment”, IJARCET, Vol. 6, Issue. 3, March 2017, ISSN: 2278-1323.
[5] S.Monali Gaigole, Prof.M.A.Kalyankar “The Study of Network Security with Its Penetrating Attacks and Possible Security Mech- anisms”, IJCSMC, Vol.4, Issue.5, pg. 728-735, May – 2015, ISSN 2320–088X.
[6] Mohan V.Pawar, Anuradha J “Network security and Types of Attacks in Network”, Elsevier B.V, ICCC 2015.
[7] Sardasht M.Mahmood,Bakhtiar M.Amen,Rebwar M.Nabi “Mobile Application Security Platforms Survey”, IJCA, Vol.133, No.2, January 2016.
[8] Md.Rakibul Hoque “Mobile Computing Security:Issues and Requirements”, JAIT,Vol.7, No.1, february 2016.
[9] I.Indu,P.M.Rubesh Anand,Shaicy P.Shaji “Secure File Sharing Mechanism and key management for Mobile Cloud Computing Environment”, IJST, Vol.9(48), December2016.
[10] Syed Farhan Alam Zaidi, Munam Ali Shah, Muhammad Kamran, “A Survey on Security for Smartphone Device”, IJACSA, Vol.7, No.4, 2016.
[11] Vidhi B patel, Chandresh Parekh, Reena M Patel “Encryption and Decryption Implementation method using network socket programming”, IJARCS, Vol.8, No.5, 2017, ISSN No.0976-5697.
Citation
M. Inbavalli, V. Suriya, "A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.65-70, 2019.
Artificial Intelligence in Machine Learning Techniques for Clustering and Classification
Review Paper | Journal Paper
Vol.07 , Issue.17 , pp.71-75, May-2019
Abstract
Data mining is the search for hidden relationships in data set. Machine learning is implementing some of artificial learning. Machine learning is the ability to alter an existing model based on new information .Machine learning is mainly used for business learning to identify the information. The paper evaluates the performance of clustering and classification.Clustering analysis is one of the main analytical methods in machine learning. Machine learninmg is one of the leading fields where clustering is one of the significant task. Classification methods to improve business opportunity and to improve the quality os services. The machine learning in the computer system use to effectively perform a specific task without using explicit instruction.
Key-Words / Index Term
Data mining , Machine learning ,Clustering ,Classification ,Artificial learning, Relationship
References
[1] M.Praveena,V.Jaiganesh “A Literature review on Supervised machine learning algorithms and boosting process”, IJCA(0975-8887), Vol.169, No.8, July 2017.
[2] UmairAhmed,T.manorajithm “Literature survey on comparison of supervised learning clasification algorithms”, IJPAM, Vol.118,No.20 ,815-823, 2018.
[3] Pedro Domingos, “A Few useful things to know about machine learning”, WA98195-2350,USA.
[4]S.KumarJasra,J.Gauci,AMuscat,G.Valentino, DZammit-Mangion,R.Camilleri “Literature review of machine learning techiques to analyse flight data”, AEGAT, No.19, October2018.
[5] SumitDas, AritraDey, AkashPal, NabamitaRoy “Applications of artificial intelligence in machine learning:Review and prospect”, International Journal of Computer Applications(0975-8887), Vol.115, No.9, April 2015.
Citation
M. Angelin Rosy, M. Chaya, M. Felix Xavier Muthu, "Artificial Intelligence in Machine Learning Techniques for Clustering and Classification", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.71-75, 2019.
Challenges of Data Analytics for Innovative V’s and Security in Bigdata
Review Paper | Journal Paper
Vol.07 , Issue.17 , pp.76-78, May-2019
Abstract
Data sets that may be analyzed computationally behavior, interactions are too large. Big data considering the security point of view is safeguarding the user’s privacy. A framework for big data security analysis and the semantic technology. The emerging security analysis challenge in big data environment is getting more attention of security. Framework that efficiently processes large volumes of data. The big data analytics is merged with big data security which results in big data security analytics. In this paper, I explain the big data challenges and privacy of outsourced enhancing security be handled by analytics techniques. Big data main problem is privacy of security challenges.
Key-Words / Index Term
Bigdata,Applicationsofbigdata,Privacy,Security,Challenges
References
[1]. Robinson, Department of Computer Science.
https://www.robinson.gsu.edu/org.com.
[2]. Priyank Jain and Manasi Gyanchandani.
https://doi.org/10.1186/S40537-016-0059./st.
[3]. Data Flair Team.
https://data-flair.training>blogs>Bigdata.
[4]. Berkman Klein Center.
https://Cyber.harvard.edu>2018/03>bigdataprivacy.
[5]. Science Soft Research Center.
https://www.scnsoft.com>blog>security.
[6]. Sisense Data Center.
https://www.flydata.com>the6-challengingbigdata.
[7]. Dataversity.
https://www.dataversity.net>bigdatachallenges.
Citation
M. Angelin Rosy, R. Deepa, M. Felix Xavier Muthu, "Challenges of Data Analytics for Innovative V’s and Security in Bigdata", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.76-78, 2019.
Cloud Computing: Study of Security Problems and Analysis Challenges
Research Paper | Journal Paper
Vol.07 , Issue.17 , pp.79-84, May-2019
Abstract
Cloud computing is that the apply of employing a network of remote servers hosted on web to store, manage and method information on demand and pay as per use. It provides access to a pool of shared resources rather than native servers or personal computers. As it doesn’t acquire the items physically, it saves managing value and time for organizations. Cloud computing could be a utterly web dependent technology wherever consumer knowledge is hold on and maintain within the knowledge center of a cloud supplier like Google, Amazon, Microsoft etc .Cloud computing is an rising domain and is acclaimed throughout the globe. There are some security problems locomotion in whereas mistreatment services over the cloud. This analysis paper presents a review on the cloud computing ideas moreover as security problems inherent inside the context of cloud computing and cloud infrastructure. This paper additionally analyzes the key analysis and challenges that presents in cloud computing and offers best practices to service suppliers moreover as enterprises hoping to leverage cloud service to enhance their bottom line during this severe economic climate and intensify its usage. The main stress of our study supported existing literature and to know the idea of multi-tenancy security issue.
Key-Words / Index Term
Cloud computing, Multitenancy, Data, management
References
[1] Abbadi, I.M. and Martin, A. (2011). “Trust in the Cloud”. Information Security Technical Report, 16, 108-114. doi:10.1016/j.istr.2011.08.006
[2] Agarwal, A. and Agarwal, A. (2011). “The Security Risks Associated with Cloud Computing”. International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS), 257-259.
[3] Arshad, J, Townsend, P. and Xu, J. (2013).”A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems”, 29, 416–428. doi:10.1016/j.future.2011.08.009.
[4] Atayero, A.A. and Feyisetan, O. (2011). “Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”. Journal of Emerging Trends in Computing and Information Sciences, 2(10), 546-552.
[5] Bisong, A. and Rahman, S.S.M. (2011). “An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications”, 3(1), 30-45. doi:10.5121/ijnsa.2011.3103
[6] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009). “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems”, 25, 599–616.
[7] Casola, V., Cuomo, A., Rak, M. and Villano, U. (2013). “The CloudGrid approach: Security analysis and performance evaluation. Future Generation Computer Systems”, 29, 387–401. doi:10.1016/j.future.2011.08.008
[8] Celesti, A., Fazio, M., Villari, M. and Puliafito, A. (2012). “Virtual machine provisioning through satellite communications in federated Cloud environments. Future Generation Computer Systems”, 28, 85–93. doi:10.1016/j.future.2011.05.021
Citation
M. Angelin Rosy, V. Shanthakumar, M. Felix Xavier Muthu, "Cloud Computing: Study of Security Problems and Analysis Challenges", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.79-84, 2019.