Articles


Data Confidentiality in Cloud Computing with Blowfish Algorithm

Shirole Bajirao Subhash

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

Abstract: - Cloud provides enormous capacity of storage for cloud users. It is more reliable and flexible to users to store and retrieve their data at anytime and anywhere. It is an increasingly growing technology. Nowadays, many enterprises have started using cloud storage due to its advantages. Even though the cloud continues to gain popularity in usability and attraction, the problems lie in data security, data confidentiality, privacy and other data protection issues. Security and Confidentiality of data stored in the cloud are major setbacks in the field of Cloud Computing. Security and Confidentiality are the key issues for cloud storage. This paper proposes a Blowfish encryption algorithm to address the security and Confidentiality issue in cloud storage in order to protect the data stored in the cloud.

Keywords: Cloud Storage, Security, Confidentiality, Encryption Algorithm, Cryptography

 

Baseline Study of Vegetation in Doyan Valley District Astore, Gilgit-Baltistan, Pakistan

Rehmat Ali1, Babar Khan1 Amjad Ali2,Muhammad Zafar Khan1, Garee K Saeed Abbas1, Ejaz Hussain1Muhammad Ali

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

Abstract:

The total covered Area of Gilgit-Baltistan is about 72496 square kilometers, bordering with China, Afghanistan and India. The flora and fauna of the Gilgit-Baltistan are unique because of their natural ecological zones there are 1,000 species of vascular plants are known to occur in northern mountain regions of Pakistan. Most of endemic plants are found in the northern mountains. Medicinal plants are important source of drugs for the treatment of various ailments of human kind. Out of 5,700 plant species in Pakistan, 400-600 species are considered to have medicinal use in unani and other medicines

Rural people especially poor households also extract and process medicinal plants to meet their daily needs such as fodder, medicine and shelter. The present study has been conducted in Doyan valley, Astore to make an assessment of the flora of the valley. The main objective of the study was to identify and enlist existing plant species and their distribution in the study area and preparation of a taxonomical checklist of the species with their scientific, vernacular and local names. A total of 80 plant species belonging to different families were recorded and specimens of unidentified plants species collected for further proper identification.

It was observed that during the study olive, Chilgoza, birch and spruce were abundantly found in the study area. The abundance of floral species is beneficial for livestock grazing while maintaining the ecosystem. Floral species have importance because many have medicinal and aromatic properties while so many others are used as timber and fodder. However, the most important aspect associated with plants is that they are the main source of oxygen for life on earth. The report mentions threats to the floral and their root causes and recommendations have also been suggested for improvement.

 

Malicious Agent Detection In Multi Party Data Access Structure

Rahul Bhanudas Shendage

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

— A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some amount of data is leaked and found in an unauthorized machines (e.g., on the internet or computer). The distributor has to find out from whom that data get leaked. We propose data allocation strategies (across the agents) that increase the chances of detecting leakages. These techniques do not need to modify data of the released data (e.g., watermarks). In some cases we can also embed real but fake data records to further increase our chances of detecting leakage and identifying the guilty agent. Our goal is to detect when the distributors sensitive data has been leaked by agents, and detect the agent that leaked the data. Perturbation is a very useful method where the data is modified and made less sensitive before being handed to agents. we develop secure techniques for detecting leakage of a set of objects or records.

 

Index Terms – Data leakage, Detection Guilty Agent, Distributor .

Image Morphing with Data Security

Ankita Deshmukh, Priti Sharma Anil Sahu and Harshali Patil

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

Abstract

Along with Computer and Network Security.Data Security plays a vital role in today world. Data is  of great importance. In this paper, we have discussed how the data can be secured. This paper deals with hiding your encrypted data inside an image. Now this image would be covered by another image. We will apply some morphing techniques on these covered images to get morphed images. Now the morphed image is sent on the network. No one in the network can predict about data inside morphed images except the intended sender and receiver. This paper deals with three algorithms. The three algorithms are required for doing three different specific task. This paper deals with RSA algorithm for encrypting data .Second Water- marking embedding and extraction algorithm is used for hiding information inside image. And the third algorithm used is Hide and Extract image algorithm to cover your image behind other image

Keywords:

Least significant bits – LSB,

Cipher Text –C

Red Green Brown- RGB .

Security to Anonymous Network

Prof. Devendra Shamkuwar, Mr. Arote Nikhil S, Mr. Kamble Kailas R. and Miss. Hinge Apurva R

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

In the today’s world there is mainly people are concentrate on the security and privacy of the data. As there is some change in security system behavior it not as per user intension. In the network some people make unintentional expose of personal information, or relationships and other things in front of people. Technology gives us solution for these types of exposures that is encryption and decryption for data i.e. change view and appearance of data for other or unknown persons. In networking there are mainly two types of attacks Passive and Active attack. Passive i.e. only monitoring the system network and data which is send. But the active attack is focus about the only change in data send by client. Attackers interested in the changing of data and to get detail about the communication happen in the sender and receiver. In TOR, attack happen at the exit onion router. While searching basically this attack is based on active attacks. But main problem in this type is degrading attacks and hidden services. In this attack attacker select particular IP packet at exit onion router and changes that packet. So our aim is to detect attacker and degrade anonymous services.

 

Keywords- Mix network, Onion routing network, Hidden services.

The Case Study of Optimization of DG System in Jamnagar District

Manishkumar Raval, Dr. VedVyas Dwivedi, Rajendra Aparnathi

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

Abstract:This research work is present in Indian energy sector, however, has constraints of resources, capital, technology and environment raising issues of energy security. The traditional electrical power system model in the Gujarat (India) involves centrally-located power plants and a vast web of transmission and distribution networks, which make up the electrical grid. Although this model has been employed for many decades, the flaws associated with these systems have contributed to environmental degradation, unstable power, poor power quality, higher transmission and distribution losses, and higher tariff threats to public health and economic instability. A series of measured are required to meet the situation, one of which is increased focus on renewable energy sources and is improving the efficiency of highly inefficient Indian distribution and transmission networks. Both these measure are to be complemented with implementation of smart grid technology. Keywords:Smart Grid, Intelligent meter, Balancing of Grid, Renewable sources. 

Handwritten Pattern Recognition-A Survey

S. Manimurugan, Priya Mohan, Sissy Annamma Johnson

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

Abstract: Handwritten pattern recognition is one of the main areas which need an important attention because it can be used in various fields in the society such as banking. A survey on different handwritten pattern recognition systems is done in this paper. The aim is to provide a brief idea about various techniques used for the same. Even though there are number of methods, only the four papers based on Back-Propagation neural network, Text recognition based on neural network, optical character recognition and Comprehensive Devnagari numeral and character database are discussed here.Since the Handwritten pattern recognition is one of the most fascinating area, this paper will have an important role during the study about the handwritten pattern recognition.

Key Terms:Handwritten character recognition, Image processing, Feature extraction, feed forward neural networks.

Android App for Local Railway Ticketing Using GPS Validation

Snehal Kalbhor, Ashwini Mangulkar, Mrs. Snehal Kulkarni

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 01 (2014), 26 March 2014

Abstract: One of the biggest challenges in the current ticketing facility is "QUEUE" in buying our suburban railway tickets. In this fast growing world of technology we still stand in the queue or buy with oyster & octopus cards for our suburban tickets, which is more frustrating at times to stand in the queue or if we forget our cards. Android Suburban Railway (ASR) ticketing is mainly to buy the suburban tickets which is the most challenging when compared to booking the long journey tickets through 'M-ticket' which fails with suburban(local travel) tickets.

     The ASR ticket system can be bought with just a smart phone application, where you can carry your suburban railway tickets in your smart phone as a QR (Quick Response) code. It uses the smart phones "GPS" facility to validate and delete your ticket automatically after a specific interval of time once the user reaches the destination. User's ticket information is stored in a CLOUD database for security purpose which is missing in the present suburban system. Also the ticket checker is provided with a checker application to search for the user's ticket with the ticket number in the cloud database for checking purposes.

     Android Suburban Railway (ASR) ticketing is mainly to buy the suburban tickets which are the most challenging.  ASR ticket can be bought with just a smart phone application, where you can carry your suburban railway tickets in your smart phone as a QR (Quick Response) code. It uses the smart phones "GPS" facility to validate and delete your ticket automatically after a specific interval of time once the user reaches the destination. User's ticket information is stored in a cloud database for security purpose which is missing in the present suburban system. Also the ticket checker is provided with a checker application to search for the user's ticket with the ticket number in the cloud database for checking purposes.

Keywords:  ASR ticketing, GPS Validation, Cloud Database, QR- Code format of ticket