International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 9, No. 9, Sep. 2017

Cover page and Table of Contents: PDF (size: 172KB)

Table Of Contents

REGULAR PAPERS

CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation

By Mohamed A. Elsharkawey Hosam E. Refaat

DOI: https://doi.org/10.5815/ijcnis.2017.09.01, Pub. Date: 8 Sep. 2017

The Video requests can be streamed in two forms. They are the live streaming and the on-demand streaming. Both of them should be adapted (I.e., transcoded) to fit the characteristics (e.g., spatial resolution, bit rate… and the supported formats) of client devices. Therefore, many streaming service providers are presented the cloud services to be utilized in the video transcoding. But, the introducing of the cloud services for video transcoding is encountered by the contradiction between the deploying cloud resources in a cost-ef?cient without any major influence on the quality of video streams. In order to address this problem, this paper presents an Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation (CVSHR) to transcode the video streams on cloud resources in an efficient manner with the QoS of the requested video stream. The system architecture is elastic and based on multiple heterogeneous clusters that provide a great flexible resource allocation and De-allocation strategy. This strategy aims to assign a suitable VM with adequate resources based on the GOPs characteristic. Also, it can reassign the unused resources. In addition, the number of VMs can be extended as the system necessity. Finally, The CVSHR is simulated and evaluated on truthful cloud resources and various workload circumstances.

[...] Read more.
Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment

By ChukwuNonso H. Nwokoye Virginia E. Ejiofor Moses O. Onyesolu Boniface Ekechukwu

DOI: https://doi.org/10.5815/ijcnis.2017.09.02, Pub. Date: 8 Sep. 2017

Now, it is unarguable that cyber threats arising from malicious codes such as worms possesses the ability to cause losses, damages and disruptions to industries that utilize ICT infrastructure for meaningful daily work. More so for wireless sensor networks (WSN) which thrive on open air communications. As a result epidemic models are used to study propagation patterns of these malicious codes, although they favor horizontal transmissions. Specifically, the literature dealing with the analysis of worms that are both vertically and horizontally (transmitted) is not extensive. Therefore, we propose the Vulnerable–Latent–Breaking Out–Temporarily Immune–Inoculation (VLBTV-I) epidemic model to investigate both horizontal and vertical worm transmission in wireless sensor networks. We derived the solutions of the equilibriums as well as the epidemic threshold for two topological expressions (gleaned from literature). Furthermore, we employed the Runge-Kutta-Fehlberg order 4 and 5 method to solve, simulate and validate our proposed models. Critically, we analyzed the impact of both vertical and horizontal transmissions on the latent and breaking out compartments using several simulations experiments.

[...] Read more.
Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES

By Surinder Kaur Pooja Bharadwaj Shivani Mankotia

DOI: https://doi.org/10.5815/ijcnis.2017.09.03, Pub. Date: 8 Sep. 2017

The purpose of this study is to implement and observe parameters like time and memory for implementation of multi-level encryption using the Data Encryption Standard (DES) and a modified version of the RSA Algorithm, the multi-prime RSA. The average values are calculated for each parameter after using a different number of primes and the results have been illustrated graphically and in tabular form for clarity of conclusions. The advantages and reasoning for using this approach have also been listed in the study.

[...] Read more.
Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image

By Narges Mehran Mohammad Reza Khayyambashi

DOI: https://doi.org/10.5815/ijcnis.2017.09.04, Pub. Date: 8 Sep. 2017

Recently, security of digital images has attracted significant attention. This paper evaluates the performance of authentication-encryption and confidentiality block cipher modes of operation, on digital image. Authentication-encryption scheme, such as Offset Code Book (OCB) mode, offers both privacy and authenticity; that is to say, this scheme provides data authenticity without increasing the cost of encryption. The performance of this mode is compared with other confidentiality modes of operation, such as the fast counter (CTR) mode that just encrypts the image without verification. Various statistical methods, such as correlation coefficient, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI) are utilized to analyze the efficiency of different modes. Results show that the model based on OCB scheme, by both AES and Serpent algorithms, exhibits good performance on a digital image compared to the models based on other modes. OCB-AES based scheme, associated with its own authentication, has considerable speed in comparison with other confidentiality modes.

[...] Read more.
Video Steganography: Secure Data Hiding Technique

By Gat Pooja Rajkumar V. S. Malemath

DOI: https://doi.org/10.5815/ijcnis.2017.09.05, Pub. Date: 8 Sep. 2017

Today, the security is getting the major attention due to the increased use of internet. As the use of internet is increased, the rate at which the data is exchanged per day is also increased. The data that is exchanged every day may become the victim of hackers. To deal with this problem one of the effective solution is the Steganography. The Steganography is a way to hide secret information behind an innocent cover file, such that the existence of information is not usually recognized. This paper uses the concept of video Steganography, where the data is hidden behind the frames of videos. This paper provides two level of security to the data i.e. Steganography and cryptography. First the data is encrypted using cryptography algorithm, next the encrypted data is embedded into frames of videos. The technique used to embed the data is LSB coding. It is the most common technique, but can hide large amount of data in most simplest and efficient way.

[...] Read more.
New Design of Tiny-Block Hybridization in AES

By Ritu Goyal Mehak Khurana

DOI: https://doi.org/10.5815/ijcnis.2017.09.06, Pub. Date: 8 Sep. 2017

The cryptographic algorithm designed to enhance security in real life which storage track and increase speed. This is kind of Feistel cipher which real use for the processes from assorted (mixed/orthogonal) algebraic collections. AES is combined with segmentation and validation algorithm to improve the performance of the security. Also, Key expansion is done to make the AES more secure. The processes are pipelined to increase the speed of AES. Our strategies that are hybrid method which work as change the original files (data) into encoded/encrypted type using AES and Tiny Encryption Process. The hybrid Procedure is considered for easiness and improved performance. The encryption pattern, data is encoded using tiny-AES-128 encryption process and authentication SHA that alterations it into an indecipherable cipher text. In process of encryption that encodes the information which consider a random text through the idea of cryptography and then data/text for the user. Our proposed approach get minimize computational time and memory utilization which simulated in MATLAB 2014Ra.

[...] Read more.
Pseudo Random Ternary Sequence and Its Autocorrelation Property Over Finite Field

By Md. Arshad Ali Emran Ali Md. Ahsan Habib Md. Nadim Takuya Kusaka Yasuyuki Nogami

DOI: https://doi.org/10.5815/ijcnis.2017.09.07, Pub. Date: 8 Sep. 2017

In this paper, the authors have proposed an innovative approach for generating a pseudo random ternary sequence by using a primitive polynomial, trace function, and Legendre symbol over odd characteristics field. Let p be an odd prime number, FP be an odd characteristic prime field, and m be the degree of the primitive polynomial f(x) Let w be its zero and a primitive element in Fpm* In the beginning, a primitive polynomial f(x) generates maximum length vector sequence, then the trace function Tr(.) is used to map an element of the extension field (Fpm) to an element of the prime field Fthen non-zero scalar A∈Fp is added to the trace value, and finally the Legendre symbol (a/p) is utilized to map the scalars into ternary sequence having the values, {0,1,and -1} By applying the new parameter A the period of the sequence is extended to its maximum value that is n=pm-1 Hence, our proposed sequence has some parameters such as p,m,and A This paper mathematically explains the properties of the proposed ternary sequence such as period and autocorrelation. Additionally, these properties are also justified based on some experimental results.

[...] Read more.