N. Veeraragavan, L. Arockiam, S. S. Manikandasaran
{"title":"Enhanced encryption algorithm (EEA) for protecting users' credentials in public cloud","authors":"N. Veeraragavan, L. Arockiam, S. S. Manikandasaran","doi":"10.1109/ICAMMAET.2017.8186644","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186644","url":null,"abstract":"Cloud is a virtual environment which provides huge amount of storage to cloud users. It is more useful to small and medium scale enterprises for their initial startup. It simplifies the work burden in maintaining the server and storage from users' side. Cloud has serious dispute in securing the data from unauthorized access. If users' sensitive data are stored in cloud then it must be secured. Security of data is ensured by encryption algorithms but not all traditional encryption algorithms do so in cloud. To product the data in cloud, this paper proposes an Enhanced Encryption Algorithm (EEA) for securing the data in cloud storage. This is a symmetric encryption algorithm. It uses same key for encrypting and decrypting the data before stored in to cloud. Result of the proposed EEA produces different ciphertext for same plaintext. It confuses the cryptanalyst (hackers) to get the original data. Hence this EEA is efficient hiding techniques for public cloud.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129423560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Godhandaraman, N. Pruthviraj, V. Praveenkumar, A. Banuprasad, K. Karthick
{"title":"Big data in genomics","authors":"T. Godhandaraman, N. Pruthviraj, V. Praveenkumar, A. Banuprasad, K. Karthick","doi":"10.1109/ICAMMAET.2017.8186739","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186739","url":null,"abstract":"A big data on Healthcare applications which is require big data management as well as intensive computation. In this paper, focus on Genomics in cancer testing whether the healthcare applications can scale well on commercial big data platforms that implement Map Reduce framework. We selected short read gene data sequence alignment and assembly workloads in genome analysis and Apache Hadoop distributed parallelized data processing, analysis petabyte (PB) or Exabyte(EB). Currently usage of bioinformatics community by Hadoop.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134452464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on embankment stability of rising water level of a reservoir in Linyi city","authors":"Xiaocheng Su","doi":"10.1109/ICAMMAET.2017.8186640","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186640","url":null,"abstract":"The reservoir water level rise and fall caused the damage of reservoir shore. The main deformation and failure mode is manifested in two aspects, one is induced by a large number of collapses and landslides, the other is caused by bank collapse. The seepage field distribution law of slope in Linyi reservoir is studied in this paper. Three kinds of limit equilibrium method are used to calculate the safety factor of slope. The influence of the rising of water level on the slope stability is analyzed in this way. This paper solved the problem of the safety performance of the slope using the specific numbers of feedback.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129854461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Health experts for pets using mobile apps","authors":"Praveen Kumar, Madhu, Jaya Kumar, C. Sathish","doi":"10.1109/ICAMMAET.2017.8186740","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186740","url":null,"abstract":"Mobile Technologies are widely make significant impact on our lives, with an advancement technology a rule based expert system allows the end-user to enable new types of healthcare systems. Specially the availability of Android OS based more user friendly GUI and economical smart phones gives new possibilities for a continuously monitoring of pets health status such as dogs/cats healthy, toxic ingestions and swallowed. The proposed applications frequently serve to provide users with related facilities discussed here are broad and essential in health management and clinical practice. The pet mobile app can be used to prevent any disease attacks to pets. In emergency time we can call the pets specialist by taking appointment through online using this app. This app helps to find out the nearest area pets hospital. In this research, issues are handled through the pets health on the basis of mobile phones.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132666964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Device authentication mechanism for IoT enabled healthcare system","authors":"Shantha Mary Joshitta, L. Arockiam","doi":"10.1109/ICAMMAET.2017.8186646","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186646","url":null,"abstract":"Internet of things (IoT) is the prelude to new technological innovation. It expands with different applications such as smart home, smart city, smart grids, smart car, smart healthcare and smart retail. The application of IoT in Healthcare system brings high value for the elderly, victims of chronic disease and those who require constant supervision. But there are many security issues in such application. Moreover, the medical devices used in the IoT enabled Healthcare System are resource constrained devices. So, this paper proposes a novel mechanism for authenticating such resource constrained medical devices. New algorithm for secure authentication and key agreement of the medical devices is also presented. This mechanism is resistance against various security attacks such as eavesdropping, man-in-the-middle and Denial of Service attacks. Formal security analysis and the comparative study presented in this paper have proved that the proposed mechanism has many security features and highly secure among the already existing authentication mechanisms.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprint authentication using Raspberry Pi based on IoT","authors":"R. Vijaysanthi, N. Radha, M. Shree, V. Sindhujaa","doi":"10.1109/ICAMMAET.2017.8186737","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186737","url":null,"abstract":"User authentication is getting inflexible in our Internet of Things (IoT) world. Current approaches for authentication, such as passwords abetted by a second factor, are being reduced moot due to human fault as well as the improved sophistication of further malware attacks. We proposed a way of Fingerprint authentication is centered on minutiae matching where bifurcation, ridge ending are calculated as points and matched. This method is more vigorous than matching based on pattern and singularity points. The fingerprint is collected by optical sensor, which relays to cloud via Raspberry Pi. The fingerprints to be authenticated are stowed in a file server and webserver performs 1:N verification once it obtains the data through POST request. It sends out a retort based on match score along with fingerprint index ID. Our process is secure as fingerprints are stored on server rather local platform.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132400283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible data hiding in encrypted images based on side matching and enhanced complexity function","authors":"G. Sowmya, P. Thangavel","doi":"10.1109/ICAMMAET.2017.8186730","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186730","url":null,"abstract":"Cloud computing has developed to be the most promising business model in recent times owing to access business applications or infrastructure resources at a negligible cost but the issue of security still lies as a question to be answered since storing and processing of data are done by a third-party data centers. Reversible data hiding in images guaranties security to data accumulated at a third-party center. Zhang proposed a complexity function that neglects borders of the image block. Hong et al. worked on the side matching technique and evaluated complexity function considering two adjacent pixels of the image block. Liao et al. organize image block of three different groups containing two, three and four neighborhoods for the computation of complexity function. In our proposed method, instead of utilizing the whole image block for data embedding, selection of pixels are based on the unencrypted fourth least significant bit (LSB) layer because it is nearly random. Further, a new complexity function is proposed considering every pixels of the image. The proposed method decreases the error rate during bit extraction when compared with existing approaches.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suboptimal mechanism for load balancing in cloud environment","authors":"Shikha Pandey, A. Upadhaya, C. K. Jha","doi":"10.1109/ICAMMAET.2017.8186689","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186689","url":null,"abstract":"Load balancing is important and major issue for cloud networks due to its elastic nature, user's unpredictable behavior and difficulty faced to foresee the request issued to the server. In order to efficiently utilize cloud resources, we are presenting a new methodology for dynamic resource allocation based on the suboptimal mechanism of aggregation i.e. GIT (greedy incremental tree). The technique improves path sharing at time of migration during load balance process. A cloud workload network is constructed based on-Greedy heuristics having the characteristics to build incrementally diverse set, selecting one compute node at a time to maximize diversity measure. The virtual machine manager can rely on the rules and can make efficient decision for optimal provisioning of virtual machine based on the aggregated route.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123285406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Karpagam, G. K. Thrilokesh, J. Shanker, K. Harish, M. Raja
{"title":"Split reading of redundant datasets on datanodes using Hadoop framework","authors":"N. Karpagam, G. K. Thrilokesh, J. Shanker, K. Harish, M. Raja","doi":"10.1109/ICAMMAET.2017.8186711","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186711","url":null,"abstract":"The process of storing and developing of big data is done with the help of Hadoop which is an open-source framework in a distributive arena across groups of systems using plain scheduling models. According to this framework HDFS (Hadoop Distributed File System) replicates datasets into two additional data nodes by default to achieve availability during failure of any components. The read and write activities of the data nodes is done with the file system based on instruction given by name node. The reading of data collection from different data node is done completely in parallel for the different data block of one data. So that if any failure of one block it would get the other location of its replicated block and read data block which would take up some time for it. In this paper the data collection are read in two different orders on two different data nodes of same data block as such from top to the middle and bottom to the middle respectively. In case of failure in any data node the other half of the other data node is read. Which is then processed using map reduce technique for analysis.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison and evaluation of Node.js and traditional web server (IIS)","authors":"Lakshmi Prasanna Chitra, Ravikanth Satapathy","doi":"10.1109/ICAMMAET.2017.8186633","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186633","url":null,"abstract":"As the technological needs increase there is an increase in the necessity for information of users using the internet that has lead to the development of real-time web services. This paper analyses the differences of Node.js compared to traditional web server-IIS. Node provides a high performance, asynchronous event-based server. Node.js is event-based and uses single thread for its event loop, which allows developers to use asynchronous interfaces to do I/O operations. Traditional Web servers (IIS) follow the multiple thread request model. This paper shows how the architectural choices of Node.js and traditional web server brings an affect in the way applications perform that run on them. Web services operate over network throughput which is considered as a metric parameter for evaluation. They are developed both in node.js as well as in .NET which are hosted in Internet Information Services (IIS Server). Systematic tests are performed presenting different scenarios to make a comparison of the performance of Node and IIS. The performance evaluation results show some valuable performance data of Node and IIS Server in a certain time. The results show that lightweight and efficient nature of Node.js. A web server environment which can perform in heavily can be built with node. Hence it is good for developing web-service APIs.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}