security issues in advanced computing

16
DRDO Sponsored National Conference on Security Issues In Advanced Computing 16 th March, 2013 Editors Mr. K. Saravanan Ms. T. Kalai Selvi Mr. C. Balasubramaniam Mr. R. Karunamoorthi Organized by Department of Computer Science and Engineering Erode Sengunthar Engineering College Approved by AICTE, Affiliated to Anna University, NBA Accreditation and ISO 9001:2008 Certificated Institution Technically Co-Sponsored by

Upload: others

Post on 16-May-2022

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Issues in Advanced Computing

DRDO Sponsored National Conference on

Security Issues In

Advanced Computing

16th March, 2013

Editors

Mr. K. Saravanan

Ms. T. Kalai Selvi

Mr. C. Balasubramaniam

Mr. R. Karunamoorthi

Organized by

Department of Computer Science and Engineering

Erode Sengunthar Engineering College

Approved by AICTE, Affiliated to Anna University,

NBA Accreditation and ISO 9001:2008 Certificated Institution

Technically Co-Sponsored by

Page 2: Security Issues in Advanced Computing

DRDO Sponsored Proceedings of National Conference on Security Issues in Advanced Computing

Copyright © 2013 by Bonfring

All rights reserved. Authorized reprint of the edition published by Bonfring. No part of this book may be reproduced in any

form without the written permission of the publisher.

Limits of Liability/Disclaimer of Warranty: The authors are solely responsible for the contents of the paper in this volume. The

publishers or editors do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and

readers are required to communicate such errors to the editors or publishers to avoid discrepancies in future. No warranty

may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable

for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or

other professional services. If professional assistance is required, the services of a competent professional person should be

sought. Further, reader should be aware that internet website listed in this work may have changed or disappeared between

when this was written and when it is read.

Bonfring also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in

electronic books.

ISBN 978-93-82338-51-2

Bonfring

292/2, 5th Street Extension, Gandhipuram,

Coimbatore-641 012.

Tamilnadu, India.

E-mail: [email protected]

Website: www.bonfring.org

Page 3: Security Issues in Advanced Computing

President’s Message

I am indeed very happy to know that the DRDO sponsored National

Conference on “Security Issues in Advanced Computing (SIAC 2013)“ is being

organized by the Department of Computer Science and Engineering of our

college on 16.03.2013.

I pray to the Almighty for the grand success of this National Conference

on Security Issues in Advanced Computing.

M. Balusamy

Thiru. M. Balusamy

President

Erode Sengunthar Educational Trust

Page 4: Security Issues in Advanced Computing
Page 5: Security Issues in Advanced Computing

Correspondent’s Message

Er. R. Mohanraj, B.E., MIE, FIV

Correspondent

Erode Sengunthar Engineering College

I am extremely delighted to know that the Department of Computer

Science and Engineering is organizing a DRDO sponsored National Conference

on “Security Issues in Advanced Computing (SIAC 2013) “on 16.03.2013.

I hope that the National Conference will enthuse the participants to

present their creative ideas and also it will provide an opportunity to the

participants to update their knowledge in their respective fields.

I wish the National Conference on Security Issues in Advanced

Computing a grand success.

Er.R. Mohanraj

Page 6: Security Issues in Advanced Computing
Page 7: Security Issues in Advanced Computing

Secretary’s Message

Thiru. S. Sivananthan

Secretary

Erode Sengunthar Educational Trust

I am glad to know that the Department of Computer Science and

Engineering is organizing a DRDO sponsored National Conference on

“Security Issues in Advanced Computing (SIAC 2013) “on 16.03.2013.

It is thoughtful of the department to have chosen the significant theme

Security Issues which is an essential requirement of the Information

Technology. I am confident that the department will bring out a nation-wide

interaction in this area.

I wish the conference, the delegates and the department every success

in their endeavor to provide an opportunity for experts from academic

institutions all over the nation to discuss and share their visions on the

research activities in the field of Security Issues in Advanced Computing.

S. Sivananthan

Page 8: Security Issues in Advanced Computing
Page 9: Security Issues in Advanced Computing

Principal’s Message

Dr.A.T. Ravichandran

Principal

Erode Sengunthar Engineering College

In the ever changing technology, one has to update his/her knowledge

in the field of their specialization to stand unique and excel. I hope that in this

DRDO sponsored National Conference all the upcoming technologies will be

discussed and benfittable to every one.

I congratulate the organizers for having chosen this theme for the

Conference and wish them all success.

Dr.A.T.Ravichandran

Page 10: Security Issues in Advanced Computing
Page 11: Security Issues in Advanced Computing

Organizing Committee

Chief Patron:

Thiru. M. Balusamy,

President, ESET Patrons:

Thiru. S. Sivananthan,

Secretary, ESET Er. R. Mohanraj

Correspondent, ESEC Chairman:

Dr. A. T. Ravichandran,

Principal, ESEC. Convener:

Dr. P. Venkateswari,

HOD / CSE. Co-convener:

Ms. T. Kalai Selvi, A.P. (SG) / CSE Mr. K. Saravanan, A.P. / CSE Mr. C. Balasubramaniam, A.P. / CSE Mr. R. Karunamoorthi, A.P. / CSE Committee Members:

Prof. G. Sivakumar

Prof. K.M. Subramanian

Ms. C. Kavitha

Mr. P. Karunakaran

Mr. K.A. Dhamotharan

Mr. D. Vijaybabu

Ms. N.S. Kavitha

Mr. S. Mohanraj

Mr. V.M. Vijaya Kannan

Ms. P. Suganthi

Ms. R. Nithyadevi

Mr. P. Marimuthu

Ms. T. Naveena

Ms. S. Revathi

Ms. S. Sharmila National Advisory Committee Dr. H. Abdul Rauf, Principal,

MEA Engineering College, Kerala. Dr. G. Sudha Sadasivam,

Professor / CSE,

PSG Tech., Coimbatore. Dr. T. Purusothaman,

Associate Professor / CSE,

Government College of Technology, Coimbatore. Dr. V. Venkatachalam,

Principal,

The Kavery Engineering College, Mecheri. Dr. G. Tholkappia Arasu,

Principal,

AVS Engineering College, Salem. Dr. R. Asokan,

Principal,

Kongunadu College of Engg. & Tech., Trichy. Dr. A.M.J. Md.Zubair Rahman,

Principal,

Al-Ameen Engineering College, Erode. Dr. R.C. Suganthe,

Professor / CSE,

Kongu Engineering College, Perundurai.

Page 12: Security Issues in Advanced Computing
Page 13: Security Issues in Advanced Computing

Contents

Paper ID Title/Author Page No.

1 Trust Based Routing in Wireless Sensor Networks for Detecting Attacks

D. Rekha and V. Gurunathan

1

2 Database Security Coordination against SQL Attacks

V. Nirmal and M. Ganapathiraman

2

3 Energy Efficient Black Hole Router Detection and Communication between Transgression Nodes on MANET

G. Naveen Kumar, C. Nanda Kumar and N. Nishanth

3

4 Computer and Network Security for Wireless LAN Based on MAC and WEP

R. Nandhakumar, S. Naveen Prasath and S. Nowshanth

4

5 An Overview of Handover in Wireless Networks

N. Priya and M. Ramya

5

6 Cloud Information Accountability for Data Sharing Using JAR Files

B. Revathi

6

7 IRIS Recognition Based Authentication in ATM

V. Sangavee and S. Sajitha

7

8 Cryptographic Puzzle Hiding Scheme Methods for Preventing Selective Jamming Attacks

P. Thangarasu and P. Nithyadevi

8

9 Secure Internet Verification Based on Image Processing Segmentation

D. Sowmiya Devi and C. Sindhu

9

10 Ensuring Data Storage Security in Cloud Computing

S. Selvalakshmi and C. Kiruthika

10

11 Cryptographic Key Regeneration Scheme Based on Fingerprint and IRIS

C. Devika

11

12 Analysing of Spot Instance via Check Pointing and Migration on Cloud

R. Jayasudha, M. Abinaya and V. Divya

12

Page 14: Security Issues in Advanced Computing

13 Preventing the Privacy Information of an Individual while Publishing the Microdata

C. Jency

13

14 OPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks

S. Kalaivani and K. Kanimozhi

14

15 A Misuseability Weight Measure Using M-Score Algorithm

M. Srimathi and D. Saranya

15

16 Efficient Reliable MAC Layer Multicasting IEEE 802.11 Wireless Networks

S. Prashanth, S. Sathyanarayanan and M. Sathishkumar

16

17 Improving Resilence and Revocation by Mitigating Bad-Mouthing Attacks in Wireless Sensor Networks through Reputation Based Trust Management Scheme with Biased Sampling PRT Test

S. Kowsika, S. Abuthahir, P. Sampathkumara and K. Vijaya

17

18 Prevention of DDOS Attacks Using Port Number Revolutionize and Time Stamp-Clock Drifts

V. Haripriya

18

19 Role of Multiple Level Encryptions in Secure Electronic Transaction

S. Chitra and M. Keerthi ka Janani

19

20 Secure Communication Using Image Steganography

B. Parkavi, M. Sasipriya and K. Kalaivendhan

20

21 Location Privacy in Pervasive Computing

D. Devipriya and T. Malathi

21

22 Assessment of Critical Behaviour for MI, PCI & CABG Events

C. Premalatha, X. Rexeena and S. Saranya

22

23 Dynamic Resource Allocation to Reduce Computational Complexity

M. Ganesh and R. Srinivasan

23

24 A Survey on Security Issues and Counter-Measures in Cloud Computing Storage and a Tour towards Multi-Clouds

G. Manigandan and R. Tamilselvan

24

25 Proficient Method for Trajectory of Moving Vehicles Using OLAP by Segmentation of Geography

P. Kiruthikadevi, A. Kishore Kumar and K. Jeeve Sakthi

25

Page 15: Security Issues in Advanced Computing

26 Dynamic Resource Allocation for Efficient Parallel Data Processing in Cloud

C. Jayagopal

26

27 Secure and Robust Localization in Wireless Network Protection S. Jagadeesan and R.K. Arunkumar

27

28 Privacy Preserving Decision Tree Learning Using Unrealized Data Sets with C 5.0

B. Neelu

28

29 Efficient Range Queries on Encrypted Data

G. Dinesh and K. Mansoor Ali

29

30 Rendering Adaptation Approach in Mobile Cloud Computing for Mobile Multimedia Applications

B. Manimegalai and S. Rami la

30

31

Datamining Security Issues in Cryptography

R. Yogalakshmi and M. Azhageswari

31

32 Content Based Image Retrieval (CBIR) Using Fast Wavelet Transform

S. Sarayadevi, S. Sivanandhini, G. Suresh and S. Karthik

32

33 MASTERO – Mobihealth Analysation by Sensorized Telemetric Embedded Realtime Oscilloscope

R. AravinthYukesh, K. Yasodha, S. Vinothini, D. Vijayakumar, M. Manoj Prabu

33

34 Border Defence System Using Bluetooth Technology (Wireless Technologies)

V. Divya and S. Parvathavarthini

34

35 Deadline Aware Task Migration Model for Economic Clouds

V. Satheeshkumar

35

36 Trust Evaluation Based Security in Wireless Sensor Network

C. Janani and K. Selvi

36

37 New General Purpose Matching Algorithm for De-Duplication

S. Rejeeramani and R. Arunkumar

37

38 GPRS and SMTP/PTP Based Wireless Home Security System

R. Velvizhi

38

39 The Multicast Capacity of Large Multihop Wireless Networks

C. Munusamy

39

Page 16: Security Issues in Advanced Computing

40 Implementation of Data Mining Techniques for Weather Report Guidance for Ships Using Global Positioning System

P. Hemalatha

40

41 A Service Provide for Granting the Ticket using Fine KERBEROS and Authenticate for Client Using RTP in Multi-Cloud

P. Nithyadevi and R. Pradeep

41