{"title":"Usability and Security Go Together: A Case Study on Database","authors":"Yong Wang, B. Rawal, Q. Duan, Ping Zhang","doi":"10.1109/ICRTCCM.2017.86","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.86","url":null,"abstract":"In this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recommendations for system security and usability to go together.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Medical Data Storage over Cloud for Comprehensive Treatment","authors":"Sathya Sankaran, R. Rajasekaran","doi":"10.1109/ICRTCCM.2017.78","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.78","url":null,"abstract":"E-health is becoming an ideal, alternative approach to the traditional approach of handling and giving health care. This paper offers a solution for good health by observing and recording the details of each and every consultation made for a patient on the cloud and not merely the storage of milestone observations. The cloud provides a virtualized source of resources including hardware and software. Two algorithms, Difference and Distance Difference provide security. Distance Difference is an advanced version of Difference algorithm.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Enhancement of Low Noise Amplifier Using Cadence Virtuoso Tool","authors":"K. S. Sankaran, K. E. Purushothaman","doi":"10.1109/ICRTCCM.2017.37","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.37","url":null,"abstract":"This paper mainly focuses on low power based amplifier (LNA) design. These types of amplifier design are suitable for low power wireless applications. Here different types of low noise amplifier designs are considered for designing a front end receiver. LNA is used for impedance matching, amplify weak signal and eliminate the unwanted noise signal. Selecting proper circuit element, this delivers better output and prevent short circuitry. Noise cancellation technique, which eliminates unwanted signals are present in the incoming signal. Common gate, resistive parallel feedback and cascading feedback network are designed for low power. Transient analysis and AC analysis are used for calculating the power consumption and the bandwidth respectively. Using current reuse circuit, this enables the generation of necessary current to the design. Cadence analog library is used for designing a low noise amplifier in 180nm technology.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114324615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Age Forecasting Analysis - Over Microblogs","authors":"Prasad Koti, Sujatha Pothula, P. Dhavachelvan","doi":"10.1109/ICRTCCM.2017.38","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.38","url":null,"abstract":"Age predictive analysis is to predict the age of the users who posted the message in any microblog. By using some keywords, we extract the messages as dataset and processed for predicting the age of the user. Here, the design and techniques to foreseen the age of the user by microblog dataset are presented. In recent years, microblogging services like Twitter and SinaWeibo become an essential part in everyone's life. Due to enormous growth in microblogging services, various challenges arise in research fields like detection, sentiment analysis, user classification, etc. due to the data produced by the huge number of microbloggers. In this paper, we used dataset from Twitter and showed promising results for predicting age ranges.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114645759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A CRF Based Machine Learning Approach for Biomedical Named Entity Recognition","authors":"U. Kanimozhi, D. Manjula","doi":"10.1109/ICRTCCM.2017.23","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.23","url":null,"abstract":"The amount of biomedical textual information available in the web becomes more and more. It is very difficult to extract the right information that users are interested in considering the size of documents in the biomedical literatures and databases. It is nearly impossible for human to process all these data and it is even difficult for computers to extract the information since it is not stored in structured format. Identifying the named entities and classifying them can help in extracting the useful information in the unstructured text documents. This paper presents a new method of utilizing biomedical knowledge by both exact matching of disease dictionary and adding semantic concept feature through UMLS semantic type filtering, in order to improve the human disease named entity recognition by machine learning. By engineering the concept semantic type into feature set, we demonstrate the importance of domain knowledge on machine learning based disease NER. The background knowledge enriches the representation of named entity and helps to disambiguate terms in the context thereby improves the overall NER performance.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Awake Network Traffic Steering Using SDN in Cloud Environment","authors":"Sankari Subbiah, V. Perumal","doi":"10.1109/ICRTCCM.2017.56","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.56","url":null,"abstract":"The energy consumed by the networking resources to access the computational and storage resources is one of the factors to be considered in the cloud data center. In SDN, the network virtualization showcases the business in the network resource allocation when traffic is generated from the source host to the destination host. The network switches in the cloud based data centric network acquire the most energy during the traffic flow from source to destination. In this paper, an Energy Efficient Routing Through Open Virtual Switches (EERTOVS) algorithm is proposed to route the traffic efficiently in the power-optimal selected path. The proposed algorithm was implemented using Open Flow Protocol in the forthcoming development of Software Defined Networks. Thereby, the network management entails the improvement in energy conservation with tolerable level of compromising the network performance.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust and Efficient Three-Factor Authentication and Session Key Agreement Mechanism for SIP","authors":"S. H. Islam, Varun Rajeev, Ruhul Amin","doi":"10.1109/ICRTCCM.2017.30","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.30","url":null,"abstract":"Session Initiation Protocol (SIP), which is an IP based telephony protocol, is used mainly for the purpose of starting, sustaining and ending sessions related to multimedia communications on the Internet. The SIP protocol, which works on the top of TCP or UDP, is basically an open text-based protocol. Hence, to ensure security is of utmost importance. The original SIP used HTTP-digest based challenge-response authentication process. However, HTTP digest-based authentication is insecure and pre-existing user configuration on the remote server is needed. Moreover, it provides only one-way message authentication and replay protection, but not the support message integrity and confidentiality. Although, quite a few three factor SIP protocols using password, smartcard and biometric are existing in the literature, however, none of them are robust against known attacks. In this paper, a robust and cost-efficient VoIP based three-factor SIP is proposed based on the computational Diffie-Hellman problem.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130771095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar
{"title":"A Detailed Study on Security Services in Cloud Environment","authors":"S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar","doi":"10.1109/ICRTCCM.2017.24","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.24","url":null,"abstract":"Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127680267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QOS Routing Protocol to Detect Maximum Available Bandwidth in WMCs","authors":"R. Manikandan, A. Rajan, L. Deborah","doi":"10.1109/ICRTCCM.2017.70","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.70","url":null,"abstract":"Wi-Fi Mesh Community has turn out to be an important area community to offer internet to challenge the thrown domains and wireless link in metropolitan environments. In this paper, hassle of figuring out the most to be had bandwidth direction is targeted, which is an essential problem in helping pleasant-of-carrier in WMCs. Due to the concept of interference, bandwidth, which is a familiar challenging metric in restive networks, a new direction is validated in which the weight captures the available route bandwidth statistics. It is also proved that the hop using the hop routing procedure based on the new path weight completely satisfies the consistency and loop-freeness necessities. The property of consistency ensures that each node follows a proper packet forwarding choice, in order that a statistics packet traverses over the supposed path. The experimental results additionally show that our proposed work on direction weight outperforms all the other existing direction metrics in figuring out excessive-throughput paths.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124146636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bibliometric Analysis of Journal of Informetrics – A Decade Study","authors":"G. Mahalakshmi, G. M. Selvi, S. Sendhilkumar","doi":"10.1109/ICRTCCM.2017.22","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.22","url":null,"abstract":"Research and practice are perennial, the scientific articles that get published in line are also the same. Numerous journals are in place – some specialized and many, publishing scientific articles on general and wide discipline. However, there are few research disciplines which have only very less number of focused and specialized journal titles, and, the field of Bibliometrics is one among so. Journal of Informetrics is a dedicated journal involved in publishing scientific articles related to bibliometrics. This paper presents a case study on articles published in Journal of Informetrics.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}