{"title":"An approach for data privacy in hybrid cloud environment","authors":"C. Ray, Uttam Ganguly","doi":"10.1109/ICCCT.2011.6075158","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075158","url":null,"abstract":"The cloud computing immerges as a new computing technology where all required services are available as a service. In a cloud environment, location of data is generally maintained by a third party (service provider/vendor) and hence an individual has no control over its own data. In this context, data privacy is an important issue for cloud computing both in terms of legal compliance and user trust. In this paper, an approach for data privacy in hybrid cloud environment is focused. Initially, a data privacy model for cloud computing is provided in which sensitive and non-sensitive data are maintained separately. In order to maintain data privacy, an authentication monitor is introduced in this privacy model. Finally, the authentication algorithm is implemented in a very small setup cloud environment and experimental results are provided at the end of the paper.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129442695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal transmit power and energy level performance of random WSN in Rayleigh fading channel","authors":"A. Nandi, S. Kundu","doi":"10.1109/ICCCT.2011.6075110","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075110","url":null,"abstract":"In Wireless Sensor Networks (WSNs) where nodes are power-driven by batteries, it is important to extend the network lifetime by minimizing the energy consumption of each node. Excessive high transmit power consumes more energy and increases internode interference significantly, while low transmit power may cause network failure. Thus choice of optimal transmit power is one of the prime concern in such network. Optimal transmit power is the minimum power required to sustain the network connectivity while maintaining a predetermined maximum tolerable Bit Error Rate (BER). In this paper, optimal transmit power is derived for a WSN deployed based on a random topology. Further impact of Rayleigh fading on optimal transmit power, route BER and energy consumption for successful delivery of data in multihop using ARQ in each hop is studied for such random WSN. In random network, an intermediate node in the route selects the nearest node within a sector of angle (θ) towards the direction of the destination as the next hop. The effects of search angle (θ) on optimal transmit power, route BER performance and energy consumptions are also indicated.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web based access and control environment for experiment on electronic circuits","authors":"A. P. J. Chandra, C. R. Venugopal","doi":"10.1109/ICCCT.2011.6075170","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075170","url":null,"abstract":"Electronic laboratory experiments mainly describe the design and implementation of various circuits which assists theoretical study. Web based environment for these experiments helps the learners with any time accessibility of the remote hardware resources through online environment. The graphical programming language LabVIEW and data acquisition facilities provide an attractive solution through the availability of rich functions to acquire and analyze the signals. The custom interface circuits are designed to configure the circuit remotely based on the design requirement. The remote switching of different components to the circuit experimentation is achieved through the transistor switching circuitry. The switching circuitry is operated by the Boolean control actuations on graphical user interface, which can be remotely operated through a common web browser. A case study is presented with the circuit experimentation on the generation of frequency modulation signal.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"78 4 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131945740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An emulation based impact analysis of DDoS attacks on web services during flash events","authors":"M. Sachdeva, Gurvinder Singh, Krishan Kumar","doi":"10.1109/ICCCT.2011.6075134","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075134","url":null,"abstract":"The phenomenal growth of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defense are operated. In present era, the Internet is considered as main infrastructure of the global information society. Therefore, the availability of Internet is very critical. Distributed denial-of-service (DDoS) attacks pose an immense threat to the availability of these services. The services are severely degraded and hence lot of business loses are incurred due to these attacks. To objectively evaluate DDoS attack's impact, its severity and the effectiveness of a potential defense, a precise, quantitative and comprehensive DDoS impact metrics that are applicable to web services are required. In this paper, network topology is emulated and Flash Event (legitimate web traffic at high Rate) is generated. The attack traffic is generated at different strengths using different protocols to measure attack impact on web service. The impact is measured in terms of metrics such as Throughput, Response Time, Active Connections, Percentage of Failed transactions, Legitimate Packet Survival Ratio; Percentage of Packets Lost, Percentage of Request Packets Lost and Bottleneck Bandwidth","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WEP implementation using Linear Feedback Shift Register (LFSR) and dynamic key","authors":"Nidhi Gupta, G. P. Biswas","doi":"10.1109/ICCCT.2011.6075144","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075144","url":null,"abstract":"The WEP (wired equivalent privacy) is an IEEE 802.11's optional stream cipher scheme implemented in its MAC layer for confidentiality of the data frames. It uses RC4 for pn-sequence generation and the same is xored with the plain text and added integrity check value produced by the CRC-32. In this paper, the WEP has been implemented using the Linear Feedback Shift Register (LFSR) as a pn-sequence generator, i.e., the RC4 in WEP has been replaced by LFSR. Also the static key used in WEP is replaced by a dynamic key; as a result the proposed WEP implementation is more secured than the original one. The pn-sequence generated by LFSR is more random than the pn-sequence generated by RC4. In this regard, a randomness test, called Diehard test, has been carried out on the outputs of both RC4 and LFSR, and it has been found that more tests are satisfied by the LFSR, the details test results are included in this paper for ready reference.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134134115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of Diffserv enabled NAT","authors":"D. Guha, S. Pathak","doi":"10.1109/ICCCT.2011.6075101","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075101","url":null,"abstract":"In this paper we discuss evaluating performance of Network edge device like DiffServ enabled Network Address Translator or Session Border Controller for protecting cluster of VoIP servers. Incoming connections coming from outside to VoIP cluster is terminated at NAT for the purpose of enforcing security policies and connection mapping to identify the ongoing session and new session. We have taken a further step to equip the NAT with Quality of Service policy in order to make NAT as a application aware gateway or Session Border Controller. The performance is evaluated by considering the NAT buffer as a Vacational Queueing model. Mean queue length, and sojourn time analysis is made here.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic programming approach for solving power generating unit commitment problem","authors":"P. K. Singhal, R. Naresh, Sharma","doi":"10.1109/ICCCT.2011.6075161","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075161","url":null,"abstract":"In this paper, a large scale Unit Commitment (UC) problem has been solved using Conventional dynamic programming (CDP), Sequential dynamic programming (SDP) and Truncation dynamic programming (TDP) without time constraints and the results show the comparison of production cost and CPU time. The UC provides an approach to decrease the cost and improve reliability of the network. The UC is a dynamic process, and the generation plan is always changing according to different load and network topology.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115215015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adiabatic logic: Energy efficient technique for VLSI applications","authors":"A. Maurya, G. Kumar","doi":"10.1109/ICCCT.2011.6075164","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075164","url":null,"abstract":"This paper proposes an energy efficient technique with two-phase clocked adiabatic logic. A simulative investigation on the proposed circuit has been carried out in SPICE at 0.18μm technology node. Further NAND and NOR gates have been implemented by this technique and hence compared with the standard CMOS, Positive Feedback Adiabatic Logic (PFAL) and Two-Phase Adiabatic Static Clocked Logic (2PASCL) logic. Comparison has shown a significant power saving to the extent of 70% in case of proposed technique as compared to CMOS logic within 10 to 150MHz transition frequency range. Simulation results obtained from the technique cited just before have strongly ratified its validation & use in low power digital devices operated at low frequency.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115756950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A genetic algorithm based approach for prioritization of test case scenarios in static testing","authors":"Sangeeta Sabharwal, R. Sibal, Chayanika Sharma","doi":"10.1109/ICCCT.2011.6075160","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075160","url":null,"abstract":"White box testing is a test technique that takes into account program code, code structure and internal design flow. White box testing is primarily of two kinds-static and structural. Whereas static testing requires only the source code of the product, not the binaries or executables, in structural testing tests are actually run by the computer on built products. In this paper, we propose a technique for optimizing static testing efficiency by identifying the critical path clusters using genetic algorithm. The testing efficiency is optimized by applying the genetic algorithm on the test data. The test case scenarios are derived from the source code. The information flow metric is adopted in this work for calculating the information flow complexity associated with each node of the control flow graph generated from the source code. This research paper is an extension of our previous research paper [18].","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115896012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Barik, Omprakash Chandrakar, B. Patel, Ankita Barik
{"title":"HKDA — Design pattern system architecture","authors":"L. Barik, Omprakash Chandrakar, B. Patel, Ankita Barik","doi":"10.1109/ICCCT.2011.6075124","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075124","url":null,"abstract":"Software Design Patterns (DPs) have been recognized as very important and useful in real software development since they provide an elegant way of getting around problems that often occur. Researcher has built an ITS known as Human Knowledge Discovery Agent System-HKDA, which provides adaptive learning environment for the students by providing personalized instructions. The HKDA System makes inferences about student knowledge and interacts intelligently with students based upon individual representations of their knowledge. The design pattern system architecture of HKDA consists of eight main components. In this research, researchers are going to discuss about Student Modeller and Pedagogical Module. However, to provide a clear idea about design patterns, a small description about other components such as Domain Knowledge/Domain Model, Knowledge Management, Student Knowledge-base, Presentation Planner, Pedagogical Experts and Communication Knowledge are also given.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}