Classification of Network Traffic Based on Zero-Length Packets: A Review
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.103-105, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.103105
Abstract
Network traffic visitor’s classification is fundamental to network management and its performance. However, traditional traffic classifications, which were designed to work on a devoted hardware at very high line rates, may not feature well in digital software-primarily based surroundings. The advised fingerprinting scheme is strong to community conditions which include congestion, fragmentation, put off, retransmissions, duplications, and losses and to various processing abilities. Hence, its overall performance is largely independent of placement and migration problems, and consequently yields an appealing answer for virtualized software program-primarily based environments. We recommend an identical fingerprinting scheme for consumer datagram protocol traffic, which advantages from the equal blessings as the TCP one and attains very excessive accuracy as properly. Results show that our scheme effectively labeled about 97% of the flows on the dataset examined, even on encrypted facts.
Key-Words / Index Term
Network traffic classification, Network monitoring and measurements, Machine learning, Network function virtualization, Software-defined networking
References
[1] B. Pfaff, J. Pettit, T. Koponen, E. J. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar et al., “The design and implementation of open vswitch.” in NSDI, 2015, pp. 117–130.
[2] M. Rifai, N. Huin, C. Caillouet, F. Giroire, D. Lopez-Pacheco, J. Moulierac, and G. Urvoy-Keller, “Too many sdn rules? compress them with minnie,” in Global Communications Conference (GLOBECOM), 2015 IEEE. IEEE, 2015, pp. 1–7.
[3] C. Estan, K. Keys, D. Moore, and G. Varghese, “Building a better netflow,” in ACM SIGCOMM Computer Communication Review, vol. 34, no. 4. ACM, 2004, pp. 245–256.
[4] N. Hohn and D. Veitch, “Inverting sampled traffic,” in Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement. ACM, 2003, pp. 222–233.
[5] N. Duffield, C. Lund, and M. Thorup, “Learn more, sample less: control of volume and variance in network measurement,” Information Theory, IEEE Transactions on, vol. 51, no. 5, pp. 1756–1775, 2005. [6] S. Fernandes, C. Kamienski, J. Kelner, D. Mariz, and D. Sadok, “A stratified traffic sampling methodology for seeing the big picture,” Computer Networks, vol. 52, no. 14, pp. 2677–2689, 2008.
[7] S. Zander, T. Nguyen, and G. Armitage, “Sub-flow packet sampling for scalable ml classification of interactive traffic,” in Local Computer Networks (LCN), 2012 IEEE 37th Conference on. IEEE, 2012.
[8] N. Katta, O. Alipourfard, J. Rexford, and D. Walker, “Rule-caching algorithms for software-defined networks,” Technical report, 2014.
[9] A. Vishnoi, R. Poddar, V. Mann, and S. Bhattacharya, “Effective switch memory management in openflow networks,” in Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems. ACM, 2014, pp. 177–188.
[10] M. Kuzniar, P. Pere ´ sˇ´ıni, and D. Kostic, “What you need to know about ´ sdn flow tables,” in International Conference on Passive and Active Network Measurement. Springer, 2015, pp. 347–359. [11] Q. Maqbool, S. Ayub, J. Zulfiqar, and A. Shafi, “Virtual TCAM for data center switches,” in Network Function Virtualization and Software Defined Network (NFV-SDN), 2015 IEEE Conference on. IEEE, 2015, pp. 61–66.
[12] R. McGeer and P. Yalagandula, “Minimizing rulesets for TCAM implementation,” in IEEE INFOCOM, 2009, pp. 1314–1322.
[13] H. Zhu, S. Chen, L. Zhu, H. Li, and X. Chen, “Rangetree: A feature selection algorithm for c4. 5 decision tree,” in IEEE 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013, pp. 17–22.
[14] T. Karagiannis, K. Papagiannaki, and M. Faloutsos, “Blinc: multilevel traffic classification in the dark,” in ACM SIGCOMM Computer Communication Review, vol. 35, no. 4. ACM, 2005, pp. 229–240.
[15] M. Tavallaee, W. Lu, and A. A. Ghorbani, “Online classification of network flows,” in Communication Networks and Services Research Conference, 2009. CNSR’09. Seventh Annual. IEEE, 2009.
[16] L. Grimaudo, M. Mellia, and E. Baralis, “Hierarchical learning for fine grained internet traffic classification,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. IEEE, 2012, pp. 463–468.
[17] Y. Wang, Y. Xiang, and S. Yu, “Internet traffic classification using machine learning: A token-based approach,” in Computational Science and Engineering (CSE), 2011 IEEE 14th International Conference on. IEEE, 2011, pp. 285–289.
[18] S. Zander, T. Nguyen, and G. Armitage, “Automated traffic classification and application identification using machine learning,” in Local Computer Networks, 2005. 30th Anniversary. The IEEE Conference on. IEEE, 2005, pp. 250–257.
[19] A. Dainotti, W. De Donato, A. Pescape, and P. S. Rossi, “Classification of network traffic via packet-level hidden markov models,” in Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE, 2008, pp. 1–5.
[20] Y.-D. Lin, C.-N. Lu, Y.-C. Lai, W.-H. Peng, and P.-C. Lin, “Application classification using packet size distribution and port association,” Journal of Network and Computer Applications, vol. 32, no. 5, pp. 1023–1030, 2009.
Citation
S.Kalpana, T. Raghu Trivedi, "Classification of Network Traffic Based on Zero-Length Packets: A Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.103-105, 2019.
A Review on Multi-Task clustering with self-adaptive and Model Relation Learning
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.106-108, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.106108
Abstract
Multi-task clustering improves the clustering performance of each task by transferring knowledge among the related tasks. An important aspect of multi-task clustering is to assess the task relatedness. However, to our knowledge, only two previous works have assessed the task relatedness, but they both have limitations. In this paper, we propose two multi-task clustering methods for partially related tasks: the self-adapted multi-task clustering (SAMTC) method and the manifold regularized coding multi-task clustering (MRCMTC) method, which can automatically identify and transfer related instances among the tasks, thus avoiding negative transfer. Both SAMTC and MRCMTC construct the similarity matrix for each target task by exploiting useful information from the source tasks through related instances transfer, and adopt spectral clustering to get the final clustering results. But they learn the related instances from the source tasks in different ways.
Key-Words / Index Term
Multi-task Clustering, Partially Related Tasks, Negative Transfer, Instance Transfer
References
[1] S. J. Pan and Q. Yang, “A survey on transfer learning,” IEEE Trans. Knowl. Data Eng., vol. 22, no. 10, pp. 1345–1359, 2010.
[2] J. Zhang and C. Zhang, “Multitask Bregman clustering,” in Proc. 24th AAAI Conf. Artif. Intell., 2010, pp. 655–660.
[3] X. Zhang and X. Zhang, “Smart multi-task Bregman clustering and multi-task Kernel clustering,” in Proc. 27th AAAI Conf. Artif. Intell., 2013, pp. 1034–1040.
[4] X. Zhang, “Convex discriminative multitask clustering,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 37, no. 1, pp. 28–40, 2015.
[5] J. Lin, “Divergence measures based on the shannon entropy,” IEEE Trans. Inform. Theory, vol. 37, no. 1, pp. 145–151, 1991.
[6] J. Huang, A. J. Smola, A. Gretton, K. M. Borgwardt, and B. Scholkopf, “Correcting sample selection bias by unlabeled data,” ¨ in Proc. 20th Adv. Neural Inform. Process. Syst., 2006, pp. 601–608.
[7] X. Zhang, X. Zhang, and H. Liu, “Self-adapted multi-task clustering,” in Proc. 25th Int. Joint Conf. Artif. Intell., 2016, pp. 2357–2363.
[8] R. Caruana, “Multitask learning,” Mach. Learn., vol. 28, no. 1, pp. 41–75, 1997.
[9] R. K. Ando and T. Zhang, “A framework for learning predictive structures from multiple tasks and unlabeled data,” J. Mach. Learn. Res., vol. 6, pp. 1817–1853, 2005.
[10] A. Argyriou, T. Evgeniou, and M. Pontil, “Multi-task feature learning,” in Proc. 20th Adv. Neural Inform. Process. Syst., 2006, pp. 41–48.
[11] J. Chen, L. Tang, J. Liu, and J. Ye, “A convex formulation for learning shared structures from multiple tasks,” in Proc. 26th Int. Conf. Mach. Learn., 2009, pp. 137–144.
[12] T. Evgeniou and M. Pontil, “Regularized multi–task learning,” in Proc. 10th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., 2004, pp. 109–117.
[13] C. A. Micchelli and M. Pontil, “Kernels for multi–task learning,” in Proc. 18th Adv. Neural Inform. Process. Syst., 2004.
[14] T. Evgeniou, C. A. Micchelli, and M. Pontil, “Learning multiple tasks with kernel methods,” J. Mach. Learn. Res., vol. 6, pp. 615–637, 2005.
[15] A. Barzilai and K. Crammer, “Convex multi-task learning by clustering,” in Proc. 18th Int. Conf. Artif. Intell. and Stat., 2015, pp. 65–73.
[16] N. D. Lawrence and J. C. Platt, “Learning to learn with the informative vector machine,” in Proc. 21st Int. Conf. Mach. Learn., 2004.
[17] E. V. Bonilla, K. M. A. Chai, and C. K. I. Williams, “Multitask gaussian process prediction,” in Proc. 21st Adv. Neural Inform. Process. Syst., 2007, pp. 153–160.
[18] B. Zadrozny, “Learning and evaluating classifiers under sample selection bias,” in Proc. 21st Int. Conf. Mach. Learn., 2004, pp. 114– 121.
[19] W. Dai, Q. Yang, G. Xue, and Y. Yu, “Boosting for transfer learning,” in Proc. 24th Int. Conf. Mach. Learn., 2007, pp. 193–200.
[20] W. Dai, G. Xue, Q. Yang, and Y. Yu, “Transferring naive bayes classifiers for text classification,” in Proc. AAAI Conf. on Artif. Intell., 2007, pp. 540–545.
Citation
C.Rupakumar, S. Girinath, "A Review on Multi-Task clustering with self-adaptive and Model Relation Learning", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.106-108, 2019.
Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.109-115, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.109115
Abstract
Cloud storage system provides helpful file storage and sharing services for distributed purchasers. to handle integrity, manageable outsourcing and origin auditing issues on outsourced files, we have a tendency to propose Associate in Nursing identity-based information outsourcing (IBDO) theme equipped with fascinating options advantageous over existing proposals in securing outsourced information. First, our IBDO theme permits a user to authorize dedicated proxies to transfer information to the cloud storage server on her behalf, e.g., an organization could authorize some staff to transfer files to the company’s cloud account in an exceedingly controlled means. The proxies area unit known and approved with their recognizable identities, that eliminates difficult certificate management in usual secure distributed computing systems. Second, our IBDO theme facilitates comprehensive auditing, i.e., our theme not solely permits regular integrity auditing as in existing schemes for securing outsourced information, however conjointly permits to audit {the information|the knowledge|the information} on data origin, kind and consistence of outsourced files. Security analysis and experimental analysis indicate that our IBDO theme provides robust security with fascinating potency.
Key-Words / Index Term
Cloud storage, information outsourcing, Proof of storage, Remote integrity proof, Public auditing
References
[1] D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud information protection for the plenty,” Computer, IEEE, vol. 45, no. 1, pp. 39–45, Jan 2012.
[2] C.-K. Chu, W.-T. Zhu, J. Han, J. Liu, J. Xu, and J. Zhou, “Security issues in widespread cloud storage services,” Pervasive Computing, IEEE, vol. 12, no. 4, pp. 50–57, Oct 2013.
[3] K. Yang and X. Jia, “Data storage auditing service in cloud com- puting: challenges, strategies and opportunities.
[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Pe- terson, and D. Song, “Provable information Possession at Untrusted Stores,” in Proceedings of the fourteenth ACM Conference on laptop and Communications Security. New York, NY, USA: ACM, 2007, pp. 598–609.
[5] J. Sun and Y. Fang, “Cross-Domain information Sharing in Distributed Electronic Health Record Systems,” Parallel and Distributed System- s, IEEE Transactions on, vol. 21, no. 6, pp. 754–764, 2010.
[6] J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryptography based mostly Secure EHR System for Patient Privacy and Emergency care,” in Distributed Computing Systems (ICDCS), 2011 IEEE thirty first International Conference on. IEEE, 2011, pp. 373–382.
Citation
C. Anilkumar Raju, "Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.109-115, 2019.
Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault
Research Paper | Journal Paper
Vol.07 , Issue.06 , pp.116-121, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.116121
Abstract
Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Human beings can no longer be separated from electronic devices and the Internet technology. The need for information made available on systems and networks which are connected on the internet. It is very essential to provide an effective security measure and system that ensures the confidentiality, integrity, and availability of information system, networks, and the services and resources made available. In this paper a new way of technique is Fuzzy vault. Fuzzy Vault is one of the most promising bio-cryptographic techniques to prevent the template data from being misused. To make the fuzzy vault practically realizable in real-life applications especially for large databases, the chaff generation time needs to be reduced to greater extent. This work focuses on decreasing the chaff generation time to reduce the overall vault creation time This can be achieved using Biometric and Digital Forensic Technology.
Key-Words / Index Term
Biometrics, Digital Forensic Technology, Biometric Security, fingerprint recognition, Fuzzy Vault, Chaff Points
References
[1] Fish JT, Miller LS, Braswell MC (2013) Crime scene investigation Routledge.
[2] A.K Jain, P. Flynn, and A.A Ross, Handbook of Biometrics, New York, NY, USA: Spinter, 2008
[3] A. Cavoukian and A. Stoianov, “Biometric encryption,” Encyclopedia of Cryptography and Security, New York, NY, USA: Springer, 2009.
[4] Opdahl, A. L. and G. Sindre “Experimental comparison of attack trees and misuse cases for security threat identification.”Information and software Technology. In press, Corrected proof, 2008.
[5] N.S.Sargur, C.Huang, S. Harish, V. Shah. “Biometric and Forensic aspects of Digital Document Processing,” 2010, PP.720-728.
[6]G. Pangalos, C. Linoudis,and I. pagkalos.” The Importance of Cooperate Forensic Readlines in the information Security Framework,” in proceedings of IEEE Workshop on Enabling Technologies infrastructure for collaborative Enterprise “ 2010, PP.12-18
[7] A.Juels and M.Sudan “A Fuzzy valut scheme”, in Proc IEEE int. Symp. Inf, Theory, Jul 2002, p. 408
[8] T.C Clancy, N Kiyavash, and D.L Lin, “Secure Smartcard based fingerprint authentication, “ in Proc. ACM SIGMM workshop Biometrics Methods Appl 2003, pp 45-52.
[9] K. Nandakumar, A.K Jain, and S.Pankanti, “Fingerprint – based fuzzy vault: implementation and performance,” IEEE Trans, Inf. Forensics, Security, vol 2, no 4, pp 744 – 757, Dec 2007.
[10] P. Li X Yang, K Cao , X Tao, R.Wang, and J Tian, “An alignment – free fingerprint cryptosystem based onfuzzy vault schemen,: J. Netw, Comput. Appl., vol 33, pp 207-220, 2010.
[11] A.Nagar, K. Nandakumar, A.K Jain, and S.Pankanti, “Fingerprint – based fuzzy vault: implementation and performance,” IEEE Trans, Inf. Forensics, Security, vol 2, no 4, pp 744 – 757, Dec 2008.
[12]T.H Nguyen, Y.Wang, Y.Ha, and RLi “ Improved chaff point generation for vault scheme in bio-cryptosystems,” IET Biometrics, vol 2, no2 pp 48-55, Jun 2013.
[13]X.Wu, N.Qi, K. Wang, and D Zhang, “A novel cryptosystem base on iris key generation,” in Proc 4th Int. conf. Natural comput. 2008, pp 53-56.
[14]Y.Wu and B. Qiu, “Transforming a pattern identifier into biometric key generators,” in Proc. IEEE int Conf. Multimedia Expo, Jul 2010 pp 78-82.
[15]Clancy TC, Kiyavash N, Lin Dj Secure smart-card based finger print authentication. In: proceedings of the 2003.
[16] Nguyen TH, Wang Y, Nguyen TN, Li R, A fingerprint fuzzy valut scheme using a fast chaff point generation algorithm. IEEE 2013 International conference on Signal Processing, Communication and Computing; 5-8 August 2013
[17] Nguyen TH, Wang Y, Nguyen TN, Li R, Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrices 2013; 2: 48-55
[18] Benhammadi F, Bey KB Password hardened fuzzy vault for fingerprint authentication system. Image vision comput 2014; 32: 487-496
Citation
Syed Javid Basha, B. Muni Hema Kumar, "Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.116-121, 2019.
Prediction of Groundwater Level In District Level By Implementing Machine Learning And Advanced Softcomputing Techniques
Survey Paper | Journal Paper
Vol.07 , Issue.06 , pp.122-124, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.122124
Abstract
Groundwater plays a major role in human life. Now-a-days, the Groundwater levels are gradually decreasing due to pollution and over usage of water and lack of rains. The air pollution caused by industries and human wastage reducess the Groundwater. The increased Groundwater threat is a threat to human life. There is no proper planning and infrastructure to preserve the Groundwater. The bore wells and tube wells pump the Groundwater from a very deep source. Over usage of sand also causes the decrement of Groundwater level. Now-a-days, due to the the scarcity of Groundwater, the farmer is unable to decide the kind crop to be grown in his/her land. This is a complex task. The food bowl of India is day by day becoming weak due to a the scarcity of Groundwater. “Atmospherical science is the best source of study for analyzing and predicting the weather phenomenon and suggests ways and means overcome the problem”[1].
Key-Words / Index Term
Rainfall, Geographical Parameters,an aquifer
References
[1]. Aziz,A.R.A. and Wong, K.F.V. (1992) Neural network approach the determination of aquifer parameter. Groundwater, v.30(2), pp.164-166.
[2]. ESMAILI VARAKI, M. (2003) Presenting an intelligent model for estimating the fluctuation of alluvial aquifer groundwater level by using artificial neural network. the collection of first two yearly conference of managing water resources of Iran.
[3]. GIDSON, S (2009). Application of Artificial Neural Networks in the Field of Geohydrology. Thesis for Msc of University of the Free State.
[4]. KAASTRA, I. and BOYD, M. (1996). Designing a neural network for forecasting financial and economic time series. Neurocomputing, v.10(3), pp.215-236.
[5]. MAIER, H.R. and DANDY, G.C. (2000) Neural networks for the prediction and forecasting of water esources variables: a review of modeling issues and applications. Environ. Modell. Software, v.15, pp.101–124.
[6]. TASLLOTI, B. (2004) Estimating groundwater level by using MODFLOW and artificial neural network, Msc thesis of irrigation and drainage engineering, Tarbiat Modares University of Tehran, Iran.
[7]. VEMURI, V.R. (1992) Artificial Neural Networks, Concepts and ControlApplications, IEEE Computer Soc. Pr., Los Alamos, California.
[8]. V.Rahamathulla, S.Ramakrishna.(2017) Prediction of rainfall through Data Science using Time Series analysis and Prediction Analysit, IJETTCS, Volume 7, Issue 1, January – February 2018.
[9]. LALLAHEM, S., MANINA, J., HANI,A. and NAJJAR,Y. (2005)on the use of neural networks to evaluate groundwater levels in fractured porous media. Jour. Math. Computer Modell., v.37, pp.1047-1061.
[10]. NAZARI, J. and ERSOY, O. (1992). Implementation of Back Propagation Neural Networks with Matlab, School of Electrical Engineering – Purdue University, West Lafayette, Indiana,
Citation
Mooramreddy Sree Devi, Vempalli Rahamathulla, "Prediction of Groundwater Level In District Level By Implementing Machine Learning And Advanced Softcomputing Techniques", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.122-124, 2019.
An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.125-127, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.125127
Abstract
Cipher textual content-coverage characteristic-based totally encryption (cp-abe) has been a desired encryption technology to clear up the difficult problem of comfy details sharing in CC. the shared information documents commonly has the function of multilevel hierarchy, mainly inside the place of healthcare and the military. But, the hierarchy shape of shared documents has been not explored in older systems. on this paper, a green record hierarchy function-based encryption concept is proposed in cloud computing. The layered get admission to structures are included into a unmarried right wing after which the hierarchical files are encrypted with the incorporated get right of entry to format. The cipher text additives associated with attributes may be shared thru way of the documents. Therefore, each cipher text storage and time charge of encryption is saved. Moreover, the proposed scheme is proved to be cozy under the equal vintage assumption. our experimental simulation indicates the proposed scheme that is quite in phrases of encryption and decryption.
Key-Words / Index Term
Cipher textual content-coverage characteristic-based totally encryption (cp-abe), cloud computing, adequate cloud files encryption
References
[1] agrawal, william bolosky, john douceur, and jacob lorch 5-12 months observe of record-device metadata. in rapid’07, feb. 2007.
[2]anand, sen, krioukov avoiding document machine micromanagement with variety writes. in osdi’08, dec. 2008. ieee transactions on pc systems,quantity:sixty five,issue:6,difficulty date :june.1.2016 14
[3] a. batsakis, r. burns, a. kanevsky, j. lentini, and t. talpey. awol: an adaptive write optimizations layer. in rapid’08, feb. 2008.
[4] p. carns, okay. harms, w. allcock, c. sir francis Francis Bacon, s. lang, r. latham, and r. ross. knowledge and improving computational technological know-how storage get right of access to through non-stop characterization. acm transactions on storage, 7(3):1–26, 2011.
[5] f. chen, t. luo, and x. zhang. caftl: a content material fabric-conscious flash translation layer enhancing the lifespan of flash reminiscence based totally robust kingdom drives. in fast’eleven, pages seventy seven–ninety, feb. 2011.
[6] a. t. clements, i. ahmad, m. vilayannur, and j. li. decentralized deduplication in san cluster record systems. in usenix atc’09, jun. 2009.
[7] l. costa, s. al-kiswany, r. lopes, and m. ripeanu. assessing information deduplication trade-offs from an electricity mind-set. in erss’11, jul. 2011.
[8] a. el-shimi, r. kalach, a. kumar, a. oltean, j. li, and s. sengupta. primary information deduplication - big scale look at and system layout. in usenix atc’12, jun. 2012.
Citation
Y. Gnanendra, K. Thanweer Basha, "An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.125-127, 2019.
A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.128-131, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.128131
Abstract
Content-based picture recuperation (CBIR) applications had been fast created along the enlargement in the quantity, accessibility and importance of pix in our day by day existence. Be that as it may, the huge association of CBIR conspire has been constrained with the aid of it`s the extreme calculation and potential prerequisite. Content Based Image Retrieval (CBIR) is an efficient retrieval of relevant images from large databases based on features extracted from the image. This paper proposes a system that can be used for retrieving images related to a query image from a large set of distinct images. It follows an image segmentation based approach to extract the different features present in an image. The above features which can be stored in vectors called feature vectors and therefore these are compared to the feature vectors of query image and the image information is sorted in decreasing order of similarity. The processing of the same is done on cloud. The CBIR system is an application built on Windows Azure platform. It is a parallel processing problem where a large set of images have to be operated upon to rank them based on a similarity to a provided query image by the user. Numerous instances of the algorithm run on the virtual machines provided in the Microsoft data centers, which run Windows Azure. Windows Azure is the operating system for the cloud by Microsoft Incorporation.
Key-Words / Index Term
Cloud computing, image retrieval, encryption techniques, LP transformation
References
[1] C. Pavlopoulou, A. C. Kak, and C. E. Brodley, “Content-based image retrieval for medical imagery,” in Medical Imaging 2003. International Society for Optics and Photonics, 2003, pp. 85–96.
[2] A. K. Jain, J.-E. Lee, R. Jin, and N. Gregg, “Content-based image retrieval: An application to tattoo images,” in Image Processing (ICIP), 2009 16th IEEE International Conference on. IEEE, 2009, pp. 2745–2748.
[3] J. M. Lewin, R. E. Hendrick, C. J. DOrsi, P. K. Isaacs, L. J. Moss, A. Karellas, G. A. Sisney, C. C. Kuni, and G. R. Cutter, “Comparison of full-field digital mammography with screen-film mammography for cancer detection: Results of 4,945 paired examinations 1,” Radiology, vol. 218, no. 3, pp. 873–880, 2001.
[4] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44–55.
[5] E.-J. Goh et al., “Secure indexes.” IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003.
[6] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79–88.
[7] M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient similarity search over encrypted data,” in Data Engineering (ICDE), 2012 IEEE 28th International Conference on. IEEE, 2012, pp. 1156–1167.
[8] C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving usable and privacy-assured similarity search over outsourced cloud data,” in INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 451–459.
[9] Z. Xia, Y. Zhu, X. Sun, and L. Chen, “Secure semantic expansion based search over encrypted cloud data supporting similarity ranking,” Journal of Cloud Computing, vol. 3, no. 1, pp. 1–11, 2014.
[10] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, 2013, pp. 71–82.
[11] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.
[12] Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. PP, no. 99, p. 1, 2015.
[13] S. Kamara and C. Papamanthou, “Parallel and dynamic searchable symmetric encryption,” in Financial Cryptography and Data Security. Springer, 2013, pp. 258–274.
[14] D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, “Dynamic searchable encryption in very large databases: Data structures and implementation,” in Proc. of NDSS, vol. 14, 2014.
[15] J. Shashank, P. Kowshik, K. Srinathan, and C. Jawahar, “Private content based image retrieval,” in Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. IEEE, 2008, pp. 1–8. [16] C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, “Secure and robust SIFT,” in Proceedings of the 17th ACM international conference on Multimedia. ACM, 2009, pp. 637–640.
[17] ——, “Image feature extraction in encrypted domain with privacy preserving SIFT,” Image Processing, IEEE Transactions on, vol. 21, no. 11, pp. 4593–4607, 2012.
[18] P. Zheng and J. Huang, “An efficient image homomorphism encryption scheme with small cipher text expansion,” in Proceedings of the 21st ACM international conference on Multimedia. ACM, 2013, pp. 803–812.
[19] Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, “Towards efficient privacy-preserving image feature extraction in cloud computing,” in Proceedings of the ACM International Conference on Multimedia. ACM, 2014, pp. 497–506.
[20] W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, “Enabling search over encrypted multimedia databases,” in IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2009, pp. 725 418–725 418
Citation
K.Anitha, P. Madhura, "A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.128-131, 2019.
A Review on Traffic classification Based on Zero-Length Packets
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.132-134, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.132134
Abstract
A system, or information arrange, is a computerized media communications organize which enables hubs to share assets. In PC systems, registering gadgets trade information with one another utilizing associations between hubs. In this paper, we devise a novel fingerprinting method that can be used as a product based arrangement which empowers machine-learning based characterization of progressing streams. The proposed plan is extremely easy to actualize and requires negligible assets, yet accomplishes high exactness. In particular, for TCP streams, we propose a unique finger impression that depends on zero-length parcels, subsequently empowers an exceedingly proficient inspecting technique which can be embraced with a solitary CAM rule. The proposed fingerprinting plan is vigorous to organize conditions, for example, clog, fracture, delay, retransmissions, duplications and misfortunes and to changing preparing abilities. Consequently, its execution is basically free of position and relocation issues, and in this way yields an appealing answer for virtualized programming based conditions. We recommend a practically equivalent to fingerprinting plan for UDP traffic, which profits by indistinguishable favorable circumstances from the TCP one and achieves high precision also. Results demonstrate that our plan effectively ordered about 97% of the streams on the dataset tried, even on scrambled information.
Key-Words / Index Term
Machine Learning, Software-defined networking, Network traffic classification
References
[1] Cao, J., Fang, Z., Qu, G., Sun, H., Zhang, D.: An accurate traffic classification model based on support vector machines. Int. J. Netw. Manag. 27, e1962 (2017)
[2] Ertam, F., Avc, E.: A new approach for internet traffic classification: GA-WK-ELM. Measurement 95, 135–142 (2017)
[3] Munther, A., Othman, R.R., Alsaadi, A.S., Anbar, M.: A performance study of hidden Markov model and random forest in internet traffic classification. In: Kim, K., Joukov, N. (eds.) Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 319–329. Springer, Singapore (2016).
[4] Rizzi, A., Iacovazzi, A., Baiocchi, A., Colabrese, S.: A low complexity real-time internet traffic flows neuro-fuzzy classifier. Comput. Netw. 91, 752–771 (2015)
[5] Velan, P., Čermák, M., Čeleda, P., Drašar, M.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5), 355–374 (2015)
[6] Peng, L., Yang, B., Chen, Y.: Hierarchical RBF neural network using for early stage internet traffic identification. In: 2014 IEEE 17th International Conference on Computational Science and Engineering. Institute of Electrical and Electronics Engineers (IEEE) (2014)
[7] P. Mehta and R. Shah, “A survey of network based traffic classification methods,” Database Systems Journal, vol. 7, no. 4, pp. 24–31, 2017.
[8] De Donato, Walter, Antonio Pescapé, and Alberto Dainotti. "Traffic identification engine: an open platform for traffic classification ." IEEE Network 28.2. 2014. 56-64.
[9] Finsterbusch, Michael. "A survey of payload-based traffic classification approaches." IEEE Communications Surveys & Tutorials 16.2. 2014. 1135- 1156.
[10] Xue, Yibo, Dawei Wang, and Luoshi Zhang. "Traffic classification: Issues and challenges." Computing, Networking and Communications (ICNC) International Conference on IEEE. 2013.
[11] Valenti, Silvio. "Reviewing traffic classification - Data Traffic Monitoring and Analysis." Springer Berlin Heidelberg, 2013. 123-147.
[12] Zhang, Jun. "An effective network traffic classification method with unknown flow detection." IEEE Transactions on Network and Service Management 10.2. 2013. 133-147.
[13] Abijith Sankar, P. Divya Bharathi, M. Midhun, K. Vijay, T. Senthil Kumar, "A Coniectural study on Machine Learning Algorithms", Advances in Intelligent Systems and Computing, pp. 105-116, Dec 2015.
[14] Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Guiyi Wei, Laurence T. Yang, "Internet Traffic Classification Using Constrained Clustering", IEEE Transactions On Parallel And Distributed Systems, vol. 25, no. 11, November 2014.
[15] M. Shafiq, X. Yu, A. A. Laghari, L. Yao, N. K. Karn, and F. Abdessamia, “Network traffic classification techniques and comparative analysis using machine learning algorithms,” in Computer and Communications (ICCC), 2016 2nd IEEE International Conference on. IEEE, 2016, pp. 2451–2455.
[16] Jie Cao et al., "Network Traffic Classification Using Feature Selection and Parameter Optimization", Journal of Communications, vol. 10.10, 2015.
[17] Pawel Foremski, On different ways to classify Internet traffic: a short review of selected publications Theoretical and Applied Informatics, 2013.
[18] B. Pfaff, J. Pettit, T. Koponen, E. J. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar et al., “The design and implementation of open vswitch.” in NSDI, 2015, pp. 117–130.
[19] J. Hwang, K. K. Ramakrishnan, and T. Wood. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. In Proc. of NSDI, Apr. 2014.
[20] ] N. Katta, O. Alipourfard, J. Rexford, and D. Walker. Infinite CacheFlow in Software-Defined Networks. In Proc. of HotSDN, 2014.
[21] K. Kogan, S. Nikolenko, O. Rottenstreich, W. Culhane, and P. Eugster. SAX-PAC (Scalable And eXpressive PAcket Classification). In Proc. of SIGCOMM, 2014.
Citation
M.G. Divya, "A Review on Traffic classification Based on Zero-Length Packets", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.132-134, 2019.
A Review on Task Scheduling Approaches Based on Weighted Round Robin Algorithm in Cloud Environment
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.135-138, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.135138
Abstract
Cloud computing uses the concepts of scheduling and load balancing to move around tasks to underutilized VMs for effectively sharing the resources. The scheduling of the tasks in the cloud computing environment is an irrecoverable restraint and hence it has to be assigned to the most appropriate VMs at the initial placement itself. Practically, the arrived jobs consist of multiple tasks and they may execute the tasks in multiple VMs or in the same VM’s multiple cores. Also, the jobs arrive during the run time of the server in changeable random intervals under various load conditions. The participating various resources are managed by allocating the tasks to appropriate resources by static or dynamic scheduling to make the cloud computing more efficient and thus it improves the user satisfaction. Objective of this work is to introduce and evaluate the proposed scheduling and load balancing algorithm by considering the capability of each virtual machine (VM), the task length of each requested job, and the of multiple tasks. Performance of the proposed algorithm is studied by comparing with the accessible methods.
Key-Words / Index Term
cloud computing, scheduling, load balancing, virtual machine
References
[1] Z. Xiao, W. Song, and Q. Chen, “Dynamic resource allocation using virtual machines for cloud computing environment,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1107–1117, 2013. View at Publisher • View at Google Scholar • View at Scopus
[2] L. D. Dhinesh Babu and P. Venkata Krishna, “Honey bee behavior inspired load balancing of tasks in cloud computing environments,” Applied Soft Computing Journal, vol. 13, no. 5, pp. 2292–2303, 2013.View at Publisher • View at Google Scholar • View at Scopus
[3] J. Cao, K. Li, and I. Stojmenovic, “Optimal power allocation and load distribution for multiple heterogeneous multicore server processors across clouds and data centers,” IEEE Transactions on Computers, vol. 63, no. 1, pp. 45–58, 2014. View at Publisher • View at Google Scholar • View at MathSciNet • View at Scopus
[4] R. N. Calheiros and R. Buyya, “Meeting deadlines of scientific workflows in public clouds with tasks replication,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, pp. 1787–1796, 2014. View at Publisher • View at Google Scholar • View at Scopus
[5] R. Basker, V. Rhymend Uthariaraj, and D. Chitra Devi, “An enhanced scheduling in weighted round robin for the cloud infrastructure services,” International Journal of Recent Advance in Engineering & Technology, vol. 2, no. 3, pp. 81–86, 2014. View at Google Scholar
[6] Z. Yu, F. Menng, and H. Chen, “An efficient list scheduling algorithm of dependent task in grid,” in Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT `10), IEEE, Chengdu, China, July 2010.
[7] H. M. Fard and H. Deldari, “An economic approach for scheduling dependent tasks in grid computing,” in Proceedings of the 11th IEEE International Conference on Computational Science and Engineering (CSEWorkshops `08), pp. 71–76, IEEE, San Paulo, Brazil, July 2008. View at Publisher • View at Google Scholar • View at Scopus
[8] W. Kadri, B. Yagoubi, and M. Meddeber, “Efficient dependent tasks assignment algorithm for grid computing environment,” in Proceedings of the 2nd International Symposium on Modelling and Implementation of Complex Systems (MISC `12), Constantine, Algeria, May 2012.
[9] Y. Xu, K. Li, L. He, and T. K. Truong, “A DAG scheduling scheme on heterogeneous computing systems using double molecular structure-based chemical reaction optimization,” Journal of Parallel and Distributed Computing, vol. 73, no. 9, pp. 1306–1322, 2013. View at Publisher • View at Google Scholar • View at Scopus
[10] B. Xu, C. Zhao, E. Hu, and B. Hu, “Job scheduling algorithm based on Berger model in cloud environment,” Advances in Engineering Software, vol. 42, no. 7, pp. 419–425, 2011. View at Publisher• View at Google Scholar • View at Scopus
Citation
S.Noortaj, K.Venkataramana, "A Review on Task Scheduling Approaches Based on Weighted Round Robin Algorithm in Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.135-138, 2019.
Secure Data Storage Scheme Using Blockchain in Federated Cloud
Survey Paper | Journal Paper
Vol.07 , Issue.06 , pp.139-143, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.139143
Abstract
With the development of Internet technology, the volume of data is growing immensely. To deal with large-scale data, cloud storage has gained great attention from organizations and businesses because of its easy and efficient to adoption. Traditional cloud storage has come to rely almost exclusively on large storage providers acting as trusted third parties to transfer and store data. Though, cloud Provider offers considerable security features, with increasing demands and usage, these centralized systems have become major targets for hacks and data breaches. This makes the data vulnerable and prone to tampering. In this paper, to address the above problems we proposed a blockchain-based security scheme for distributed cloud storage, where users can divide their own files into encrypted data chunks, and upload those data chunks randomly into the federated clouds.
Key-Words / Index Term
Cloud storage, Security, Blockchain, Architecture, Distributed Cloud computing, federated cloud
References
[1] National Institute of Standards and Technology special publication.no.800-145, “The NIST definition of cloud computing” Sept. 2011
[2] Shan, Chen, Chang Heng, and Zou Xianjun. “ Inter-cloud operations via NGSON” IEEE communications, 2012.
[3] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22(5):847–859, 2011.
[4] Yinghui Zhang, Dong Zheng, and Robert H Deng. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 2018. doi:10.1109/JIOT.2018.2825289.
[5] Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S Wong, Hui Li, and Ilsun You. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379:42–61, 2017.
[6] http://techgenix.com/blockchain-technology-for-cloud-storage/
[7] Nakamoto, S. “Bitcoin: A Peer-to-Peer Electronic Cash Systems https://bitcoin.org/bitcoin.pdf namecoin (2014).
[8] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https: //bitcoin.org/bitcoin.pdf, 2008.
[9] Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016) ‘Hawk: the blockchain model of cryptography and privacy-preserving smart contracts’, Proceedings of IEEE Symposium onSecurity and Privacy (SP), San Jose, CA, USA, pp.839–858.
[10] Buterin, V. (2014) A Next-Generation Smart Contract and Decentralized Application Platform, White Paper.
[11] Zibin Zheng and Shaoan Xie,”Blockchain challeng es and oppor tunities: a survey” Int. J. Web and Grid Services, Vol. 14, No. 4, 2018.
[12] Adel Nadjaran Toosi, Rodrigo N. Calheiros, and Rajkumar Buyya. 2014. Interconnected cl oud computing environments: Challenges, taxonomy, and s urvey. ACM Comput. S urv. 47, 1, Articl e 7 (April 2014), 47 pages. DOI: h ttp://dx.doi.org/10.1145/2593512.
[13] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE, pages 180–184. IEEE, 2015.
[14] Antonio Celesti, Francesco Tusa, Massimo Villari, and Antonio Puliafito. 2010a. How to enhance cloud architectures to enable cross-federation. In Proceedings of the 3rd International Conference on Cloud Computing (Cloud’10). Miami, FL, 337–345.
[15] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick PC Lee, and Wenjing Lou. A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5):1206–1216, 2015.
[16] Xiaoming Zhu, Bingying Song, Yingzi Ni, Yifan Ren, and Rui Li. Software defined anything from software-defined hardware to software defined anything. In Business Trends in the Digital Era, pages 83–103. Springer, 2016.
[17] Qiang Fu, J¨org-Uwe Pott, Feng Shen, and Changhui Rao. Stochastic parallel gradient descent optimization based on decoupling of the software and hardware. Optics Communications, 310:138–149, 2014.
[18] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), EEE, pages 180–184. IEEE, 2015
.[19] Shawn Wilkinson, Tome Boshevski, Josh Brandoff, and Vitalik Buterin. Storj a peer-to-peer cloud storage network, 2014.
[20] Liu, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. Blockchain based data integrity service framework for iot data. In Web Services (ICWS), 2017 IEEE International Conference on, pages 468–475. IEEE, 2017.
[21] Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4):767–778,2017.
[22] Changsong Yang, Xiaofeng Chen, and Yang Xiang. Blcokchain based publicly verifiable data deletion scheme for cloud storage.Journal of Network and Computer Applications, 103:185–193,2017.doi:10.1016/j.jnca.2017.11.011.
Citation
Shaik. Munwar, K.Ramani, K. Madhavi, "Secure Data Storage Scheme Using Blockchain in Federated Cloud", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.139-143, 2019.