{"title":"Cloud Testing- The Future of Contemporary Software Testing","authors":"Varsha Mittal, Lata Nautiyal, Mohit Mittal","doi":"10.1109/ICNGCIS.2017.11","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.11","url":null,"abstract":"In this important eon of digital realm, cloud computing has perfectly changed the practice of acquiring computing resources like PCs, platforms, application services and data storage. It is performing its role auspiciously not only in acquiring but also in handling and delivering computing services, solutions and technologies. Instead of following the conventional techniques, organizations are moving towards ready-made business applications to curtail the time and cost, and cloud computing is fulfilling their needs successfully. It has actually been invented to be the cutting-edge computing norms that will work numerous distinctive research areas, such as software testing, platform providing. It provides a great chance in offering testing as a service (TaaS) for SaaS and clouds.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126362133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-Based Resource Discovery for the Intercloud","authors":"Mekhla Sharma, Ankur Gupta, Jaiteg Singh","doi":"10.1109/ICNGCIS.2017.27","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.27","url":null,"abstract":"Achieving efficient and secure resource discovery in the intercloud remains non-trivial. Several peer-to-peer based resource discovery schemes have been proposed by researchers apart from industry bodies such as the Global Inter Cloud Technology Forum (GICTF). The challenges with these distributed schemes include peer-selection, trust/reputation management, transaction record management and financial settlements besides handling failures. We propose a P2P-based resource discovery framework using blockchain which addresses several of the key shortcomings of existing approaches. The proposed framework scores over existing schemes on several functional and performance parameters. It is the first instance of applying the blockchain concept to the intercloud resource discovery process circumventing the need of a trusted third-party or broker between participating Cloud Service Providers (CSPs).","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131367008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Wireless Sensor Network Lifetime by Fuzzy Logic Based Dynamic Clustering with Global Energy Balance","authors":"Rohit Kumar, Sandeep Kad","doi":"10.1109/ICNGCIS.2017.17","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.17","url":null,"abstract":"Wireless Sensor Networks (WSNs) are systems which contain sensing units which might be distributed in the ad-hoc manner. These sensing units operate together to be able to sense a some physical phenomena and then gathered data is processed to receive appropriate output. This paper improves the performance of the global energy balance protocol using improved fuzzy based cluster head selection. The entire objective of the work would be to improve the network life-time by utilizing the integrated global energy balance protocol that will raises the network life-time by using fuzzy rule based techniques and also optimal sized of cluster creation mechanisms. The assessment between exiting and proposed protocol done based upon well known performance parameters there are stability period, half node dead time, network life time and throughput. It is observed that proposed protocol outperforms global energy balance for WSNs.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Authentication Protocol for RFID Systems Using Syndrome Decoding","authors":"P. Maurya, Joydeb Pal, S. Bagchi","doi":"10.1109/ICNGCIS.2017.29","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.29","url":null,"abstract":"Radio Frequency Identification (RFID) is a new technology for remotely identification using a small and inexpensive device called RFID tags. Despite the productivity and convenience provided by RFID, it introduces serious security and privacy risks. To avoid violation of privacy, different authentication protocol have been proposed. In this article, we present a lightweight authentication scheme using one-way hash function and syndrome decoding. The scheme also introduces key classes to avoids exhaustive database search. In the scheme, there is no secure channel required between reader and back-end server. Also, in the scheme, we are not transmitting nonce in communication channel directly. The reader/server can get nonce by using linear code properties. The scheme provides higher level privacy and achieves better efficiency. Our analysis results demonstrates that the level of privacy is high in comparison to other well-known schemes. Also, its comparison table shows that the proposed scheme uses very less resources in comparison to others.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129991720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Network Fault Detection Using Adaptive Polling","authors":"Ankur Gupta, Purnendu Prabhat","doi":"10.1109/ICNGCIS.2017.28","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.28","url":null,"abstract":"Network Management Stations (NMSs) poll the discovered entities in a network topology to determine their operational status classifying them as faulty or normal. This fault detection strategy is prone to scalability issues resulting in delayed fault assessment and reporting, especially when monitoring large network topologies. We study network fault characteristics in light of network baseline statistics and propose a novel adaptive polling strategy. The proposed polling strategy takes into account past behavior of the network and utilizes this information to dynamically formulate polling strategies to achieve faster detection of network faults, while regulating the amount of network management traffic generated. Simulation results show that this leads to lower Mean-Time-to-Detect (MTTD) for network faults compared to traditional network management solutions, which employ static pre-configured polling strategies.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendation for Learners in E-Learning System","authors":"Kamika Chaudhary, Neena Gupta","doi":"10.1109/ICNGCIS.2017.8","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.8","url":null,"abstract":"Recommendation Systems are the software agents which play an important part in providing the learner with a set of suitable learning resources from availability of a number of alternatives. The field of recommendation system is expanding its arms at a faster rate since last decade. Much of the work is going on in this field due to its huge importance in this information overloaded era. In this paper a comprehensive and analogous study of recommendation system for E -learning software is taken into consideration. The objective of E-learning recommendation system is to present the learner with the most required learning material so that he does not wastes his time in navigating from one material to another. In this paper a general framework of the process of e-learning is presented with a brief overview of the work done so far in this area.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric Based User Authentication in Smart Phones","authors":"Malika Verma, Radhike Sawhney, Rashmi Chalia","doi":"10.1109/ICNGCIS.2017.38","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.38","url":null,"abstract":"Authenticity of a user is considered to be as one of the most sensitive issue that requires attention especially in the case of smart phones, where the statistics concludes that, almost half of the smart phone users use no authentication system since they need to unlock their devices very often and the complex passwords are difficult to remember. Also, a lot of time is consumed while entering the passwords or patterns each time the user wants to log in. The Basic assumption of this approach is that the existing user authentication methods for smart phones, and current statistics of user. To recall, some people have a habit of writing down their passwords at places or use same password for multiple accounts. Even if the password is complex, attacks like key logger, social engineering or shoulder surfing are commonly being used. Authentication in smart phones elaborating the reason behind why people do not like to have any method based on graphical password and behavioral biometric has been proposed in this paper which is expected to be easier, secure and faster at the same time.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116480425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring Health Care System Using Internet of Things - An Immaculate Pairing","authors":"V. Tripathi, Faizan Shakeel","doi":"10.1109/ICNGCIS.2017.26","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.26","url":null,"abstract":"IoT in health care is aimed at empowering people to live healthier life by wearing connected devices. Health care industry has perpetually been on the forefront in the adoption and utilization of information and communication technologies (ICT) for the efficient health care administration. Recent developments in wireless sensors, communication and information network technologies have created a new era of the Internet of things (IoT)[1]. Connected health care is very important application of the Internet of Things. The concept of connected health care system and smart medical devices bears enormous potential not just for companies, but also for the well-being of people in general. Hospitalized patients whose physiological status requires close attention can be constantly monitored using IoT-driven monitoring. This type of solution employs sensors to collect comprehensive physiological information and uses gateways and the cloud to analyze and store the information and then send the analyzed data wirelessly for further analysis and review. It replaces the process of having a health professional come by at regular intervals to check the patient's vital signs, instead providing a continuous automated flow of information. The main aim of this work is to give a comprehensive overview of this area of research and sensors used in health monitoring device, how the wearable health monitoring devices works, capture the data and generate report based on different parameters.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"111 3S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116709630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach in Multi Cloud Environment to Improve Data Security","authors":"G. P. Kanna, V. Vasudevan","doi":"10.1109/ICNGCIS.2017.23","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.23","url":null,"abstract":"Cloud computing is a growing technology, provides way to access information and to share, transmit huge content of raw data information such as text, various type of image and videos. The information of resources can access anywhere with help of internet and provide services based on demand process to user and provides satisfaction to the end user. Now a days information security is becoming more vital for huge data and in real time constraints. However, the performance and security of cloud computing is more important in providing services. To design security algorithm to secure data from unauthorized attacks. The security and performance of computing must be balanced. In this paper, an Improved Hybrid Encryption is proposed, in which the data to split and to stock up in different multiple cloud environment to offer high security for the data stored in multi cloud and performance of the environment is also better and the result is compared with the AES RC6, Blowfish, DES encryption algorithm and it is analyze better data security and with respect to the time required for process. Its performance intensity of encryption method is also increased and the data is stored with higher security.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE 802.22 Standard for Regional Area Networks","authors":"Sonakshi Gupta, Vani Malagar","doi":"10.1109/ICNGCIS.2017.20","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.20","url":null,"abstract":"IEEE 802.22 is a Wireless Regional Area Network (WRAN) anticipated at collaborating license free equipment on a non-interfering base in band that is labeled for the TV simulcast use. This standard is the fundamental authoritative for cognitive wireless that strives to tackle an empty or beneath exploit spectrum which specifically allocated for Television lines. It can cater radio band network testing spectrum that is communally earmarked to supplementary use without generating any unfair obstruction. Two dominant threats that are experienced through IEEE 802.22 are controversy of self coincidence along with the latent binding dilemma. In this paper, it furnishes a comprehensive outline of the 802.22 architecture, its demand, utilization, and conformity review that no more alone configure the ground for the depiction of this innovative mobile air network regulation, but that will also handle as base for forthcoming analysis in an encouraging circle of cognitive field.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121582618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}