IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)
VOL 5.4 Ver-2, Oct to Dec, 2014


International Journal of Computer Science and Technology Vol 5.4-2

S.No. Research Topic Paper ID Download
31

Neighbour Verification and Discovery in MANETS

Yerramsetti.Venkata Sairam, Medikonda Asha Kiran, Dr. G.S.Bapi Raju

Abstract
Information about the Location is an important resource in mobile networks. This information may be used by a number of protocols and applications. The knowledge of location of the nodes in a MANET is essential in these applications. The correctness of node locations is an important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In Mobile ad-Hoc networks, routes may be disconnected due to dynamic movement of nodes. Such networks are more vulnerable to both internal and external attacks due to presence of adversarial nodes. These nodes affect the performance of routing protocol in ad-hoc networks. It is essential to identify the neighbours in a MANET. The proposed scheme identifies a neighbour and verifies its position effectively.

Full Paper
IJCST/54/4/A-0349
32

Partitioning and Load Balancing in Cloud Computing

Esha Sarkar, Ch. Sekhar

Abstract
Cloud computing implementations offer seemingly infinite pooled computing resource over the network. In cloud computing resources are provided virtually for computation, storage and developing application. Cloud computing is built on the base of distributed computing, grid computing and virtualization. Cloud computing is defined as a large scale distributed computing paradigm. While resource are under sharing, load balancing play a critical role. An efficient load balancing scheme will definitely improve the performance of the cloud. There are many load balancing algorithms, such as Round Robin, Equally Spread Current Execution Algorithm, and Ant Colony algorithm. This paper discuses various load balancing schemes for the better improvement of the performance of the cloud.

Full Paper
IJCST/54/4/A-0350
33

Data leakage and Prevention

Deepika Sonal, Ms. D.Kiranmay

Abstract
Data leakage can cause an organization untold public embarrassment and loss of revenue. Decision-makers therefore need to address the risk of data loss or leakage in light of a broader security strategy and roadmap. Data leakage incidents are not necessarily the result of malicious intent. Employees may transfer sensitive data to external media devices such as iPods, smartphones, USB memory sticks or e-mail to home addresses, just so that they can continue working from home. Data leakage can be caused by internal and external parties, either intentionally or accidentally.
As the capabilities of data transmission and storage are being continuously improved nowadays, data leakage incidents may result in more significant damages, diminishing organisations’ value and reputations. A comprehensive and effective DLP solution requires the commitment from both the management and general users to carefully determine the system specifications, functional requirements and data coverage, so that the solution can best fit in the university’s existing IT infrastructure and operational process and would not introduce inefficiencies and incompatibilities.

Full Paper
IJCST/54/4/A-0351
34

Heterogeneous Wireless Sensor Networks – Redundancy Mnagement of Multipath Routing

Pandi P Pradeep Kumar, K.Vinay Kumar

Abstract
Un reliable and malicious nodes create a lot of problems in wireless sensor networks. To address the energy consumption and QoS gain in reliability, delay and security with the goal to maximize the lifetime of a clustered Heterogeneous Wireless Sensor Networks while satisfying application QoS requirements in the context of multipath routing. The proposed research is a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes. The proposed work consider multidimensional trust attributes derived from communication and social networks to evaluate the overall trust of a sensor node. The protocol relies on a new multipath constructions paradigm that is defined specifically for heterogeneous WSN. The approach leverages a reasonable increase in the network lifetime and a higher resilience and fault tolerance.

Full Paper
IJCST/54/4/A-0352
35

An Ensure Outsourcing System for Crystallizing (LE) Linear Equations using Cloud Computing

Spandana Kala, Kota Venkata Narayana Rao

Abstract
By means of concentrating memory, bandwidth and processing cloud computing permits for additional resourceful computing and to preserve the data the internet was used by the technology. Cloud is kind of centralized database where numerous clients accumulate their data, recover data and possibly adjust data and it is a representation where user is made available services by Cloud Service Provider on the basis of pay per use. For the past few years, the technology of cloud computing has the extreme growth sections in the field of infrastructure and permits the consumers to make usage of applications devoid of installation and by means of internet access the personal files. Even if the utilization of cloud computing has rapidly improved; the safety of cloud computing is still considered the most important issue in the environment of cloud computing. By taking a variety of kinds of data in the data safety, the difficulty of checking correctness of data is still became a challenging one. The examining from the approaches of existing and the computational practicality inspires to plan secure method of outsourcing linear equations by means of an entirely different method of iterative approach, where the explanation is extracted by means of finding consecutive estimations to the elucidation until the necessary accuracy is attained. When measured to direct method, method of iterative merely demands moderately simpler operations of matrix-vector with O(n2) cost of computation, which is greatly easier to put into practice in practice and extensively adopted for large-scale linear equations.

Full Paper
IJCST/54/4/A-0353
36

Partitioning and Load Balancing in Cloud Computing

Esha Sarkar, Ch. Sekhar

Abstract
Cloud computing implementations offer seemingly infinite pooled computing resource over the network. In cloud computing resources are provided virtually for computation, storage and developing application. Cloud computing is built on the base of distributed computing, grid computing and virtualization. Cloud computing is defined as a large scale distributed computing paradigm. While resource are under sharing, load balancing play a critical role. An efficient load balancing scheme will definitely improve the performance of the cloud. There are many load balancing algorithms, such as Round Robin, Equally Spread Current Execution Algorithm, and Ant Colony algorithm. This paper discuses various load balancing schemes for the better improvement of the performance of the cloud.

Full Paper
IJCST/54/4/A-0354
37

Data leakage and Prevention

Deepika Sonal, Ms. D.Kiranmay

Abstract
Data leakage can cause an organization untold public embarrassment and loss of revenue. Decision-makers therefore need to address the risk of data loss or leakage in light of a broader security strategy and roadmap. Data leakage incidents are not necessarily the result of malicious intent. Employees may transfer sensitive data to external media devices such as iPods, smartphones, USB memory sticks or e-mail to home addresses, just so that they can continue working from home. Data leakage can be caused by internal and external parties, either intentionally or accidentally.
As the capabilities of data transmission and storage are being continuously improved nowadays, data leakage incidents may result in more significant damages, diminishing organisations’ value and reputations. A comprehensive and effective DLP solution requires the commitment from both the management and general users to carefully determine the system specifications, functional requirements and data coverage, so that the solution can best fit in the university’s existing IT infrastructure and operational process and would not introduce inefficiencies and incompatibilities.

Full Paper
IJCST/54/4/A-0355
38

Heterogeneous Wireless Sensor Networks – Redundancy Mnagement of Multipath Routing

Pandi P Pradeep Kumar, K.Vinay Kumar

Abstract
Un reliable and malicious nodes create a lot of problems in wireless sensor networks. To address the energy consumption and QoS gain in reliability, delay and security with the goal to maximize the lifetime of a clustered Heterogeneous Wireless Sensor Networks while satisfying application QoS requirements in the context of multipath routing. The proposed research is a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes. The proposed work consider multidimensional trust attributes derived from communication and social networks to evaluate the overall trust of a sensor node. The protocol relies on a new multipath constructions paradigm that is defined specifically for heterogeneous WSN. The approach leverages a reasonable increase in the network lifetime and a higher resilience and fault tolerance.

Full Paper
IJCST/54/4/A-0356
39

Data leakage and Prevention

Deepika Sonal, Ms. D.Kiranmay

Abstract
Data leakage can cause an organization untold public embarrassment and loss of revenue. Decision-makers therefore need to address the risk of data loss or leakage in light of a broader security strategy and roadmap. Data leakage incidents are not necessarily the result of malicious intent. Employees may transfer sensitive data to external media devices such as iPods, smartphones, USB memory sticks or e-mail to home addresses, just so that they can continue working from home. Data leakage can be caused by internal and external parties, either intentionally or accidentally.
As the capabilities of data transmission and storage are being continuously improved nowadays, data leakage incidents may result in more significant damages, diminishing organisations’ value and reputations. A comprehensive and effective DLP solution requires the commitment from both the management and general users to carefully determine the system specifications, functional requirements and data coverage, so that the solution can best fit in the university’s existing IT infrastructure and operational process and would not introduce inefficiencies and incompatibilities.

Full Paper
IJCST/54/4/A-0357