Shefalika Samaddar - Academia.edu (original) (raw)
Papers by Shefalika Samaddar
2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC)
The accelerated growth rate of the human intellectuality of any country warrants a rapid developm... more The accelerated growth rate of the human intellectuality of any country warrants a rapid development of information infrastructural facility protecting their intellectual property. Basically determination of potential Geographical Indication (GI) is a necessity for timely protection of intellectual property of geographical characteristics. The process of determination and its subsequent filing for registration of GI remains manual in most of the developing and least developed nations. Apart from determination of potential candidature of GI and registration of GI, various types of analysis of existing GIs is one of the key issues to be tackled also for timely protection of GI. The present work reports the development of an efficient interoperable Service Oriented Architecture (SOA) based GI SDI Model (Acronym: GI 3 (Geographical Indication Information Infrastructure)) to provide better geospatial web services for different applications in terms of their functionality, ease of operati...
Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 2013
The accelerated growth rate of the human intellect warrants a rapid development of information in... more The accelerated growth rate of the human intellect warrants a rapid development of information infrastructural facility protecting their intellectual property. Basically determination of potential Geographical Indication (GI) is a necessity for timely protection of intellectual property of geographical characteristics. The process for registration filling and determination of GI remains manual in most of the nations. Apart from determination of potential candidature of GI and registration of GI, various types of analysis of existing GIs is one of the key issues to be tackled for timely protection of GI. Enhanced growth of communication and information technology, integration of heterogeneous repository of data from the different data sources can be achieved. At the present scenario, the dynamic updating of data, data analysis, data visualisation and data uploading are lacking in most of the information system in GIS environment. For real time integrated Geographical Indications Information monitoring, it is essential to integrate information system with geospatial database. Visualisation of integrated Geographical Indications (GI) information is possible on the desktop environment with the help of GIS technology. But it is not sufficient for updating the data in dynamic environment. It can possible to perform dynamic tasks like update, analysis and visualise of GI information through the mobile devices with the modern high end mobile communication infrastructure. It will make suitable to take the decision at anytime from anywhere in the world. However, the data repositories can be timely updated with the help of common mobile devices from any location. In the present work, a framework has been proposed for the mobile based SDI Model for the better management of Geographical Indications Information Infrastructure with the use of mobile devices by the integration of geospatial database.
Procedia Engineering, 2012
Information security is dependent on various access control mechanism governed by cryptography or... more Information security is dependent on various access control mechanism governed by cryptography or the art of encryption and decryption. Cryptography is the largely built in computer hardware or in software using various discrete structure. Security is, thus, merging in network with cryptography to provide secure communication between trusted and/or untrusted network. Efficient mechanism of encryption process is a primary method of protecting valuable electronic information. The encryption process also needs to be dynamic in order to face new hazards and advance methods used by cryptanalysts. RC4 is one of the most popular and efficient stream ciphers [1]. Stream ciphers are often used in applications where high speed and low delay are a requirement. This paper proposes to identify the security requirements for data stream systems; according to the increasing order of robustness. Various security circumstances demand various degree of security robustness. This paper suggests to develop a family of cryptographic algorithm based on the RC4 and checks on the performance of each one to analyze the robustness so that the particular algorithm becomes readily applicable to a circumstance. The applicability of algorithm is totally governed by the requirement of robustness for the security concern of the circumstance. The security concern of robustness of circumstances is matched against the designed ciphersuites where such family of algorithms is available. The process of selection of ciphersuites and hence the cryptographic algorithm is automated in order to ensure appropriate circumstantial robustness. This analysis shows that, the full-size RC4 remains secure against known attacks [2]. The family of algorithm considered here is based on RC4. The basic RC4 algorithm and its variants suggested by different authors like RC4 KSA [3], RC4-PRGA are included in the family. In order enhance the degree of security robustness, two new algorithm S-RC4 1 and S-RC4 2 are proposed. Addition of variants of RC4 increases the range of automatic selection ensuring further enhancement in security. RC4 family is analyzed for encryption, decryption and algorithm strength is analyzed. Robustness is determined considering both the factors; speed of encryption/decryption or performance and algorithm strength. It is proposed to evaluate the effect of existing RC4 changing different parameters.
Advanced Materials Research, 2011
Determination of potential Geographical Indication (GI) is a necessity for timely protection of i... more Determination of potential Geographical Indication (GI) is a necessity for timely protection of intellectual property of geographical characteristics. The process of determination and its subsequent filling for registration of GI remains manual in most of the developing and least developed nations. The manual process hinders the faster protection mechanism of GIS in a way that encourages bio-piracy. The problem can be solved successfully if the process of determination is fully automated and subsequent filling process is semi-automated (as the nature of information at this stage is mostly semi-structured and unstructured). The process of automation of determining potential GIs require a GIS based decision support system backed up by a distributed database of potential GIs. This paper explores a DSS methodology in the form of an efficient architecture which could be used for potential geographical indication (GI) determination in India. GI is a name or sign used on certain products that have a specific geographical origin and possess qualities, reputation or characteristics that is essentially attributable to that place of origin. More than 5000 cases/items are considered having potential for acquiring geographical indications, other than 223 already registered ones. The paper evolves round a DSS mechanism implemented through a Geographical Information System. The geographical region under consideration is India. However, with the change of database and rule base of DSS, the system can be employed for any country/region. The system design would get its virtual run through a web portal where the end user/consumer/applicant may get to fill the requisite details as demanded in GI application form. The system will accordingly classify it into one of the 34 classes as prescribed in GI Act, 1999 [1]. The norms for checking the potential are based on the provisions of being a GI such as GI must satisfy the condition of newness as claimed by the association or authority of manufactures/growers of the product having strong geographical flavour of the place where it has been originated/manufactured. Prior registration of GI puts to an end to uniqueness. The sign/word indicating GI must not work against public morality of the Nation. The criteria are checked for declaring a potential GI in GIS. The GIS also generates the skeleton application to be submitted after due manual scrutiny/modification/ editing/addition. The web portal provides a number of services for GI and a user can check potential of getting a GI before entering into time, money and effort consuming process of GI application. The database for such purpose is updated periodically from the application database of GI from IPAB or GI application database of IP India, Chennai. The other database for potential GI is maintained indigenously by GIS web portal. The legal validity of GI will be checked by an expert system that works in conjunction with the knowledge base obtained from the registered database as well as periodical updating of application data base. An architectural diagram represents the total methodology of the project. A test case dry run for a potential GI has been worked out in this paper to show the viability of the methodology for a potential GI candidate, namely “Komal Chaul”. The designed DSS methodology will provide a cost effective way for GI registration through GIS web portal.
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, 2010
Computer Forensic, the upcoming branch of forensic science where acquiring, preserving, retrievin... more Computer Forensic, the upcoming branch of forensic science where acquiring, preserving, retrieving and presenting content processed electronically and stored digitally, is used for legal evidence in computer related crimes or any other unethical practice involving manipulation of digital content. Such digital content can take many forms which are manifested by different file formats and digital artifacts. This paper concentrates on evidential usage of recovered deleted e-mail from off-line mail boxes to provide digital evidence in case of non-repudiation either by the sender or by the receiver. This is simply accomplished by using a digital forensic tool Encase 6.0 and applying a capturing mechanism to prove legitimacy of the evidence. The step-by-step procedure is able to increase the practical insight in the capturing of deleted e-mail as digital evidence of non-repudiation and able to provide an example for preparing evidentiary e-mail for presentation in the court of Law or for preparation of any legal procedure. Recovery of deleted e-mails in the form of digital evidence requires certain legal bindings which may be provided under this mechanism. This paper contributes to that extent that recovered files are ready digital evidence in the Court of Law.
Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11, 2011
477 Communication Based Vulnerabilities and Script Based Solvabilities Arun Kumar Singh Departmen... more 477 Communication Based Vulnerabilities and Script Based Solvabilities Arun Kumar Singh Department of Computer Science and Engineering Motilal Nehru National Institute of Technology, Allahabad, Uttar Pradesh, 211004 India. singh_arun7@yahoo.com Pooja Tewari ...
2012 1st International Conference on Recent Advances in Information Technology (RAIT), 2012
Most of the early Virtual Private Networks (VPN) connection came from the vendors of networking h... more Most of the early Virtual Private Networks (VPN) connection came from the vendors of networking hardware and software to satisfy one time goal of security in communication in a remote way. The first and foremost of the solution of VPN is to introduce the security protocols like IPSec. IPSec uses cryptography in order to encrypt and authenticate the traffic flowing
2018 Conference on Information and Communication Technology (CICT)
Border Gateway Protocol (BGP) is the default interdomain routing protocol. However, BGP suffers f... more Border Gateway Protocol (BGP) is the default interdomain routing protocol. However, BGP suffers from many security vulnerabilities such as Byzantine failure. In case of Byzantine failure, a well-defined legitimate node with valid prefix does not behave legitimately and such misbehavior is named as Byzantine failure. The validity of information cannot be trusted from such misbehaving legitimate node as authenticity of network layer reachability information (NLRI) from an autonomous system is not a prime requirement in BGP. There is no systematic method to be applied on BGP for determination of information validity for any BGP speakers (routers). The absence of a method leaves a security hole. The paper proposes a method in the form of before and after attack to be run in the network having shared address space. By running the algorithm, the nature of misbehavior can be detected and analyzed for further action improving Byzantine robustness. Though the simulated method suffers from a limitation of giving cent percent stoppage of legitimate node, misbehavior of prefix hijacking but Byzantine attack can be mitigated as presented in the simulation results.
Nepalese journal of geoinformatics, Jun 15, 2016
Economic growth rate of any country largely depends on the development of mineral sector. Then, t... more Economic growth rate of any country largely depends on the development of mineral sector. Then, the level of technology employed for meeting the extraction conditions must meet environmental norms. Exploration of mineral resources in India and mining is a ready application for technologies for ensuring productivity and efficiency. Use of Geographical Information System (GIS) in mineral resources management is of great help, where each stakeholder can access, use and exchange spatial and nonspatial data for social, economic and environmental activities. With development of communication and information technology, integration of heterogeneous repository of data from the different data sources can be achieved by using Spatial Data Infrastructure (SDI). At the present scenario, the dynamic updating of data, data analysis, data visualisation and data uploading are lacking in most of the information system in GIS environment. For real time integrated mineral resources information monitoring, it is essential to integrate information system with geospatial database. Visualisation of integrated mineral resources information is possible on the desktop environment with the help of GIS. But it is not sufficient for updating the data in dynamic environment. It may be possible to perform dynamic tasks like update, analysis and visualisation of mineral resources information through the mobile devices with the modern high end mobile communication infrastructure. It makes it possible and very useful to take the decision at anytime from anywhere in the world. The data repositories can also be timely updated with the help of common mobile devices from any location, of course with security measure in place. In the present work, a three tier secure framework has been proposed for the mobile based SDI Model for the better management of mineral resources information infrastructure with the use of mobile devices by the integration of geospatial database. The interaction between the various services in the proposed Model has been modeled by using Unified Modeling Language (UML) use case and activity diagrams.
Design Engineering, Sep 21, 2021
Advances in Intelligent Systems and Computing, 2019
With the advent of advanced communication technologies, the concept of e-learning came into pract... more With the advent of advanced communication technologies, the concept of e-learning came into practice. Most of the e-learning systems are operating in client server and distributed system environment. The activity of e-learning remained confined to predefined need due to the lack of suitable dynamic software architecture of newer technology. With the advent of service-oriented architecture (SOA), a suitable and better solution framework has been proposed for e-learning. Different functions of e-learning system are implemented as stand-alone web services. The strength of the approach followed in this paper is reusability and interoperability. To achieve the new functionality in e-learning system, the composition of relevant stand-alone web services are required to make the system fully capable of interactive services making electronic teaching learning feasible. Web service composition is a SOA-based model to make a composite web service by existing stand-alone or other composite services. In this paper, we present a full-fledged e-learning system with the help of web services and their composition as per SOA standard.
Communications in Computer and Information Science, 2019
Cloud computing is a state-of-the-art technology using which a resource starved client can access... more Cloud computing is a state-of-the-art technology using which a resource starved client can access various services from a remote cloud server. Accessing such remote services requires that the client and server authenticate each other and come to agree on a common session key in secure manner. Most of the recent mutual authentication and key agreement protocols use two and three factor smart card and biometric based techniques. However, due to the consequent increase in cost of resources and added operational complexity, one factor authentication schemes are still popular. In this paper a lightweight Elliptic Curve Cryptography based one factor three way mutual authentication and key negotiation scheme between a lightweight client and server is proposed with proven safety.
— In this paper, the security of Selective
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017
The security of data is the primary concern in the public network. In public key cryptography we ... more The security of data is the primary concern in the public network. In public key cryptography we have to generate a symmetric sharing key for encryption and decryption of message. There are various protocols are developed for the same such as Diffie-Hellmen, RSA, Rabin cryptosystem, Elagmal cryptosystem, ECC, etc. But these protocols are vulnerable to different types of attacks. In this paper we modified the Diffie-Hellmen protocol and tried to make it more robust. A modification of Diffie-Hellmen protocol has been done using the concept of abc conjecture. The proposed algorithm passes the required parameter using Diffie-Hellmen key exchange protocol and further satisfy the condition of abc conjecture. The developed protocol has used the idea of Diffie-Hellmen protocol but the scalability and robustness of the modified protocol is better than Diffie-Hellmen protocol by design but poor in timing complexity by choice.
2017 Ninth International Conference on Advanced Computing (ICoAC), 2017
Cloud computing is getting rapid momentum as an alternative to traditional and professional Infra... more Cloud computing is getting rapid momentum as an alternative to traditional and professional Infrastructure of Information Technology due to its attractive features of getting everything in a service mode rather than in a product mode. Service mode using cloud makes the products and services cost effective. As consumers willing to pass on their tasks as services provider to cloud providers, trust factor is required especially when consumers have critical data. The Service Level Agreements (SLA) between cloud service consumers (CSCs) and cloud service providers (CSPs) play important role for building up trust between involved parties. SLA between parties is established in a satisfactory way upon agreements. Cloud computing is very dynamic in nature, hence continuous monitoring on Quality of Service (QoS) attributes as mentioned in SLA is required to be implemented dynamically. Managing SLAs is complicated due to complex nature of the cloud due to multi-tenancy and distributed resource sharing. The paper proposes a methodology for SLAs to be signed digitally and its further management in a single or multi cloud computing environment. The framework had been used in Web Service Level Agreement (WSLA) for monitoring and enforcement of SLA using Service Oriented Architecture (SOA) environment. Cloud broker agents have the capability of automatic extraction of metrics from SLAs. The use of the third party support feature to manage the digital forensics in case of requirement of any violation of SLAs suggested in the present paper and it is also solving the trust issues as demonstrated in digital forensics usage from the initiation of SLA; making the SLA naturally forensic enabled.
A decision support system in healthcare prediction is one of the crucial systems for detection, d... more A decision support system in healthcare prediction is one of the crucial systems for detection, diagnosis and treatment in its course. Data mining techniques have been widely used to mine knowledgeable information from medical database for research as well as for gaining expertise. Disease prediction is one of the applications where data mining techniques demonstrate successful results, which reduces the efforts on the part of doctors, practitioner, etc. by offering them with data, selected techniques, various experiences-based expertise and a number of cost-effective options of treatment. In this paper, different machine learning algorithms such as gradient boosting model (GBM), XGBoost (XGB) and ensemble models are discussed and have been used to calculate the performances of individual algorithms on a previously selected open-source database. A comparative analysis has been conducted to compare the results obtained. Therefore, in order to maximize the probabilistic output, a comb...
Vigenere cipher is a polyalphabetic cipher with a very large key space capable of generating stre... more Vigenere cipher is a polyalphabetic cipher with a very large key space capable of generating streaming cipher text. The difficulty level of cryptanalysis somewhat depends on the size of the key space. However, there are methods of pattern analysis and statistical analysis that can overrule the difficulties of cryptanalysis due to the large key space. Cryptanalysis of Vigenere cipher is one such method of testing code breaking even if the key domain is very large. The proposed algorithm of cryptanalysis works best when the size of the key string is less than the size of the dataset.
A service level agreement (SLA) is usually signed or exchanged between two or more parties on mut... more A service level agreement (SLA) is usually signed or exchanged between two or more parties on mutually agreed terms. The terms and conditions are related to the nature of the services provided with defined quality, expectations and remedies in case of unsatisfactory performance of services. Management of SLA(s) happens to be very crucial for success of web services as well as cloud services; especially where a consumer demands a cloud service that cannot be provided by a single service provider. At the same time, aggregation of services may not be possible due to distributed resources among various data centers adhering to various qualities of services. The problem becomes specific if the SLA is required to cover the planning and preprocessing of digital evidence collection as the part of Digital Forensic-as-a-Service (DFaaS). SLA in that case requires not only certain preprocessing but also some particular customizations as per the nature of the services. The problem calls for a so...
It is essential to protect bio-cultural products from being unduly patented and from biopiracy. I... more It is essential to protect bio-cultural products from being unduly patented and from biopiracy. Identification of a Geographical Indication (GI) itself is not a measure to stop bio-cultural biopiracy and is not an automatic protection to any biocultural product; it must be tested against the characteristics of GI. Identified GI must be seen through the bio-cultural protocol that makes it a ready candidate for GI application. This paper presents a step-by-step procedure for identifying and testing of a GI candidate and a walk-through GI candidature, application and registration steps. The case study taken for the purpose of identification is for ‘Komal Chaul’, a suitable candidate for GI from Assam, located in North-Eastern part of India, yet to be registered for GI. The case-study testing proves that this bio-cultural product, i.e. ‘Komal Chaul’ may be registered for GI successfully.
2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC)
The accelerated growth rate of the human intellectuality of any country warrants a rapid developm... more The accelerated growth rate of the human intellectuality of any country warrants a rapid development of information infrastructural facility protecting their intellectual property. Basically determination of potential Geographical Indication (GI) is a necessity for timely protection of intellectual property of geographical characteristics. The process of determination and its subsequent filing for registration of GI remains manual in most of the developing and least developed nations. Apart from determination of potential candidature of GI and registration of GI, various types of analysis of existing GIs is one of the key issues to be tackled also for timely protection of GI. The present work reports the development of an efficient interoperable Service Oriented Architecture (SOA) based GI SDI Model (Acronym: GI 3 (Geographical Indication Information Infrastructure)) to provide better geospatial web services for different applications in terms of their functionality, ease of operati...
Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 2013
The accelerated growth rate of the human intellect warrants a rapid development of information in... more The accelerated growth rate of the human intellect warrants a rapid development of information infrastructural facility protecting their intellectual property. Basically determination of potential Geographical Indication (GI) is a necessity for timely protection of intellectual property of geographical characteristics. The process for registration filling and determination of GI remains manual in most of the nations. Apart from determination of potential candidature of GI and registration of GI, various types of analysis of existing GIs is one of the key issues to be tackled for timely protection of GI. Enhanced growth of communication and information technology, integration of heterogeneous repository of data from the different data sources can be achieved. At the present scenario, the dynamic updating of data, data analysis, data visualisation and data uploading are lacking in most of the information system in GIS environment. For real time integrated Geographical Indications Information monitoring, it is essential to integrate information system with geospatial database. Visualisation of integrated Geographical Indications (GI) information is possible on the desktop environment with the help of GIS technology. But it is not sufficient for updating the data in dynamic environment. It can possible to perform dynamic tasks like update, analysis and visualise of GI information through the mobile devices with the modern high end mobile communication infrastructure. It will make suitable to take the decision at anytime from anywhere in the world. However, the data repositories can be timely updated with the help of common mobile devices from any location. In the present work, a framework has been proposed for the mobile based SDI Model for the better management of Geographical Indications Information Infrastructure with the use of mobile devices by the integration of geospatial database.
Procedia Engineering, 2012
Information security is dependent on various access control mechanism governed by cryptography or... more Information security is dependent on various access control mechanism governed by cryptography or the art of encryption and decryption. Cryptography is the largely built in computer hardware or in software using various discrete structure. Security is, thus, merging in network with cryptography to provide secure communication between trusted and/or untrusted network. Efficient mechanism of encryption process is a primary method of protecting valuable electronic information. The encryption process also needs to be dynamic in order to face new hazards and advance methods used by cryptanalysts. RC4 is one of the most popular and efficient stream ciphers [1]. Stream ciphers are often used in applications where high speed and low delay are a requirement. This paper proposes to identify the security requirements for data stream systems; according to the increasing order of robustness. Various security circumstances demand various degree of security robustness. This paper suggests to develop a family of cryptographic algorithm based on the RC4 and checks on the performance of each one to analyze the robustness so that the particular algorithm becomes readily applicable to a circumstance. The applicability of algorithm is totally governed by the requirement of robustness for the security concern of the circumstance. The security concern of robustness of circumstances is matched against the designed ciphersuites where such family of algorithms is available. The process of selection of ciphersuites and hence the cryptographic algorithm is automated in order to ensure appropriate circumstantial robustness. This analysis shows that, the full-size RC4 remains secure against known attacks [2]. The family of algorithm considered here is based on RC4. The basic RC4 algorithm and its variants suggested by different authors like RC4 KSA [3], RC4-PRGA are included in the family. In order enhance the degree of security robustness, two new algorithm S-RC4 1 and S-RC4 2 are proposed. Addition of variants of RC4 increases the range of automatic selection ensuring further enhancement in security. RC4 family is analyzed for encryption, decryption and algorithm strength is analyzed. Robustness is determined considering both the factors; speed of encryption/decryption or performance and algorithm strength. It is proposed to evaluate the effect of existing RC4 changing different parameters.
Advanced Materials Research, 2011
Determination of potential Geographical Indication (GI) is a necessity for timely protection of i... more Determination of potential Geographical Indication (GI) is a necessity for timely protection of intellectual property of geographical characteristics. The process of determination and its subsequent filling for registration of GI remains manual in most of the developing and least developed nations. The manual process hinders the faster protection mechanism of GIS in a way that encourages bio-piracy. The problem can be solved successfully if the process of determination is fully automated and subsequent filling process is semi-automated (as the nature of information at this stage is mostly semi-structured and unstructured). The process of automation of determining potential GIs require a GIS based decision support system backed up by a distributed database of potential GIs. This paper explores a DSS methodology in the form of an efficient architecture which could be used for potential geographical indication (GI) determination in India. GI is a name or sign used on certain products that have a specific geographical origin and possess qualities, reputation or characteristics that is essentially attributable to that place of origin. More than 5000 cases/items are considered having potential for acquiring geographical indications, other than 223 already registered ones. The paper evolves round a DSS mechanism implemented through a Geographical Information System. The geographical region under consideration is India. However, with the change of database and rule base of DSS, the system can be employed for any country/region. The system design would get its virtual run through a web portal where the end user/consumer/applicant may get to fill the requisite details as demanded in GI application form. The system will accordingly classify it into one of the 34 classes as prescribed in GI Act, 1999 [1]. The norms for checking the potential are based on the provisions of being a GI such as GI must satisfy the condition of newness as claimed by the association or authority of manufactures/growers of the product having strong geographical flavour of the place where it has been originated/manufactured. Prior registration of GI puts to an end to uniqueness. The sign/word indicating GI must not work against public morality of the Nation. The criteria are checked for declaring a potential GI in GIS. The GIS also generates the skeleton application to be submitted after due manual scrutiny/modification/ editing/addition. The web portal provides a number of services for GI and a user can check potential of getting a GI before entering into time, money and effort consuming process of GI application. The database for such purpose is updated periodically from the application database of GI from IPAB or GI application database of IP India, Chennai. The other database for potential GI is maintained indigenously by GIS web portal. The legal validity of GI will be checked by an expert system that works in conjunction with the knowledge base obtained from the registered database as well as periodical updating of application data base. An architectural diagram represents the total methodology of the project. A test case dry run for a potential GI has been worked out in this paper to show the viability of the methodology for a potential GI candidate, namely “Komal Chaul”. The designed DSS methodology will provide a cost effective way for GI registration through GIS web portal.
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, 2010
Computer Forensic, the upcoming branch of forensic science where acquiring, preserving, retrievin... more Computer Forensic, the upcoming branch of forensic science where acquiring, preserving, retrieving and presenting content processed electronically and stored digitally, is used for legal evidence in computer related crimes or any other unethical practice involving manipulation of digital content. Such digital content can take many forms which are manifested by different file formats and digital artifacts. This paper concentrates on evidential usage of recovered deleted e-mail from off-line mail boxes to provide digital evidence in case of non-repudiation either by the sender or by the receiver. This is simply accomplished by using a digital forensic tool Encase 6.0 and applying a capturing mechanism to prove legitimacy of the evidence. The step-by-step procedure is able to increase the practical insight in the capturing of deleted e-mail as digital evidence of non-repudiation and able to provide an example for preparing evidentiary e-mail for presentation in the court of Law or for preparation of any legal procedure. Recovery of deleted e-mails in the form of digital evidence requires certain legal bindings which may be provided under this mechanism. This paper contributes to that extent that recovered files are ready digital evidence in the Court of Law.
Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11, 2011
477 Communication Based Vulnerabilities and Script Based Solvabilities Arun Kumar Singh Departmen... more 477 Communication Based Vulnerabilities and Script Based Solvabilities Arun Kumar Singh Department of Computer Science and Engineering Motilal Nehru National Institute of Technology, Allahabad, Uttar Pradesh, 211004 India. singh_arun7@yahoo.com Pooja Tewari ...
2012 1st International Conference on Recent Advances in Information Technology (RAIT), 2012
Most of the early Virtual Private Networks (VPN) connection came from the vendors of networking h... more Most of the early Virtual Private Networks (VPN) connection came from the vendors of networking hardware and software to satisfy one time goal of security in communication in a remote way. The first and foremost of the solution of VPN is to introduce the security protocols like IPSec. IPSec uses cryptography in order to encrypt and authenticate the traffic flowing
2018 Conference on Information and Communication Technology (CICT)
Border Gateway Protocol (BGP) is the default interdomain routing protocol. However, BGP suffers f... more Border Gateway Protocol (BGP) is the default interdomain routing protocol. However, BGP suffers from many security vulnerabilities such as Byzantine failure. In case of Byzantine failure, a well-defined legitimate node with valid prefix does not behave legitimately and such misbehavior is named as Byzantine failure. The validity of information cannot be trusted from such misbehaving legitimate node as authenticity of network layer reachability information (NLRI) from an autonomous system is not a prime requirement in BGP. There is no systematic method to be applied on BGP for determination of information validity for any BGP speakers (routers). The absence of a method leaves a security hole. The paper proposes a method in the form of before and after attack to be run in the network having shared address space. By running the algorithm, the nature of misbehavior can be detected and analyzed for further action improving Byzantine robustness. Though the simulated method suffers from a limitation of giving cent percent stoppage of legitimate node, misbehavior of prefix hijacking but Byzantine attack can be mitigated as presented in the simulation results.
Nepalese journal of geoinformatics, Jun 15, 2016
Economic growth rate of any country largely depends on the development of mineral sector. Then, t... more Economic growth rate of any country largely depends on the development of mineral sector. Then, the level of technology employed for meeting the extraction conditions must meet environmental norms. Exploration of mineral resources in India and mining is a ready application for technologies for ensuring productivity and efficiency. Use of Geographical Information System (GIS) in mineral resources management is of great help, where each stakeholder can access, use and exchange spatial and nonspatial data for social, economic and environmental activities. With development of communication and information technology, integration of heterogeneous repository of data from the different data sources can be achieved by using Spatial Data Infrastructure (SDI). At the present scenario, the dynamic updating of data, data analysis, data visualisation and data uploading are lacking in most of the information system in GIS environment. For real time integrated mineral resources information monitoring, it is essential to integrate information system with geospatial database. Visualisation of integrated mineral resources information is possible on the desktop environment with the help of GIS. But it is not sufficient for updating the data in dynamic environment. It may be possible to perform dynamic tasks like update, analysis and visualisation of mineral resources information through the mobile devices with the modern high end mobile communication infrastructure. It makes it possible and very useful to take the decision at anytime from anywhere in the world. The data repositories can also be timely updated with the help of common mobile devices from any location, of course with security measure in place. In the present work, a three tier secure framework has been proposed for the mobile based SDI Model for the better management of mineral resources information infrastructure with the use of mobile devices by the integration of geospatial database. The interaction between the various services in the proposed Model has been modeled by using Unified Modeling Language (UML) use case and activity diagrams.
Design Engineering, Sep 21, 2021
Advances in Intelligent Systems and Computing, 2019
With the advent of advanced communication technologies, the concept of e-learning came into pract... more With the advent of advanced communication technologies, the concept of e-learning came into practice. Most of the e-learning systems are operating in client server and distributed system environment. The activity of e-learning remained confined to predefined need due to the lack of suitable dynamic software architecture of newer technology. With the advent of service-oriented architecture (SOA), a suitable and better solution framework has been proposed for e-learning. Different functions of e-learning system are implemented as stand-alone web services. The strength of the approach followed in this paper is reusability and interoperability. To achieve the new functionality in e-learning system, the composition of relevant stand-alone web services are required to make the system fully capable of interactive services making electronic teaching learning feasible. Web service composition is a SOA-based model to make a composite web service by existing stand-alone or other composite services. In this paper, we present a full-fledged e-learning system with the help of web services and their composition as per SOA standard.
Communications in Computer and Information Science, 2019
Cloud computing is a state-of-the-art technology using which a resource starved client can access... more Cloud computing is a state-of-the-art technology using which a resource starved client can access various services from a remote cloud server. Accessing such remote services requires that the client and server authenticate each other and come to agree on a common session key in secure manner. Most of the recent mutual authentication and key agreement protocols use two and three factor smart card and biometric based techniques. However, due to the consequent increase in cost of resources and added operational complexity, one factor authentication schemes are still popular. In this paper a lightweight Elliptic Curve Cryptography based one factor three way mutual authentication and key negotiation scheme between a lightweight client and server is proposed with proven safety.
— In this paper, the security of Selective
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017
The security of data is the primary concern in the public network. In public key cryptography we ... more The security of data is the primary concern in the public network. In public key cryptography we have to generate a symmetric sharing key for encryption and decryption of message. There are various protocols are developed for the same such as Diffie-Hellmen, RSA, Rabin cryptosystem, Elagmal cryptosystem, ECC, etc. But these protocols are vulnerable to different types of attacks. In this paper we modified the Diffie-Hellmen protocol and tried to make it more robust. A modification of Diffie-Hellmen protocol has been done using the concept of abc conjecture. The proposed algorithm passes the required parameter using Diffie-Hellmen key exchange protocol and further satisfy the condition of abc conjecture. The developed protocol has used the idea of Diffie-Hellmen protocol but the scalability and robustness of the modified protocol is better than Diffie-Hellmen protocol by design but poor in timing complexity by choice.
2017 Ninth International Conference on Advanced Computing (ICoAC), 2017
Cloud computing is getting rapid momentum as an alternative to traditional and professional Infra... more Cloud computing is getting rapid momentum as an alternative to traditional and professional Infrastructure of Information Technology due to its attractive features of getting everything in a service mode rather than in a product mode. Service mode using cloud makes the products and services cost effective. As consumers willing to pass on their tasks as services provider to cloud providers, trust factor is required especially when consumers have critical data. The Service Level Agreements (SLA) between cloud service consumers (CSCs) and cloud service providers (CSPs) play important role for building up trust between involved parties. SLA between parties is established in a satisfactory way upon agreements. Cloud computing is very dynamic in nature, hence continuous monitoring on Quality of Service (QoS) attributes as mentioned in SLA is required to be implemented dynamically. Managing SLAs is complicated due to complex nature of the cloud due to multi-tenancy and distributed resource sharing. The paper proposes a methodology for SLAs to be signed digitally and its further management in a single or multi cloud computing environment. The framework had been used in Web Service Level Agreement (WSLA) for monitoring and enforcement of SLA using Service Oriented Architecture (SOA) environment. Cloud broker agents have the capability of automatic extraction of metrics from SLAs. The use of the third party support feature to manage the digital forensics in case of requirement of any violation of SLAs suggested in the present paper and it is also solving the trust issues as demonstrated in digital forensics usage from the initiation of SLA; making the SLA naturally forensic enabled.
A decision support system in healthcare prediction is one of the crucial systems for detection, d... more A decision support system in healthcare prediction is one of the crucial systems for detection, diagnosis and treatment in its course. Data mining techniques have been widely used to mine knowledgeable information from medical database for research as well as for gaining expertise. Disease prediction is one of the applications where data mining techniques demonstrate successful results, which reduces the efforts on the part of doctors, practitioner, etc. by offering them with data, selected techniques, various experiences-based expertise and a number of cost-effective options of treatment. In this paper, different machine learning algorithms such as gradient boosting model (GBM), XGBoost (XGB) and ensemble models are discussed and have been used to calculate the performances of individual algorithms on a previously selected open-source database. A comparative analysis has been conducted to compare the results obtained. Therefore, in order to maximize the probabilistic output, a comb...
Vigenere cipher is a polyalphabetic cipher with a very large key space capable of generating stre... more Vigenere cipher is a polyalphabetic cipher with a very large key space capable of generating streaming cipher text. The difficulty level of cryptanalysis somewhat depends on the size of the key space. However, there are methods of pattern analysis and statistical analysis that can overrule the difficulties of cryptanalysis due to the large key space. Cryptanalysis of Vigenere cipher is one such method of testing code breaking even if the key domain is very large. The proposed algorithm of cryptanalysis works best when the size of the key string is less than the size of the dataset.
A service level agreement (SLA) is usually signed or exchanged between two or more parties on mut... more A service level agreement (SLA) is usually signed or exchanged between two or more parties on mutually agreed terms. The terms and conditions are related to the nature of the services provided with defined quality, expectations and remedies in case of unsatisfactory performance of services. Management of SLA(s) happens to be very crucial for success of web services as well as cloud services; especially where a consumer demands a cloud service that cannot be provided by a single service provider. At the same time, aggregation of services may not be possible due to distributed resources among various data centers adhering to various qualities of services. The problem becomes specific if the SLA is required to cover the planning and preprocessing of digital evidence collection as the part of Digital Forensic-as-a-Service (DFaaS). SLA in that case requires not only certain preprocessing but also some particular customizations as per the nature of the services. The problem calls for a so...
It is essential to protect bio-cultural products from being unduly patented and from biopiracy. I... more It is essential to protect bio-cultural products from being unduly patented and from biopiracy. Identification of a Geographical Indication (GI) itself is not a measure to stop bio-cultural biopiracy and is not an automatic protection to any biocultural product; it must be tested against the characteristics of GI. Identified GI must be seen through the bio-cultural protocol that makes it a ready candidate for GI application. This paper presents a step-by-step procedure for identifying and testing of a GI candidate and a walk-through GI candidature, application and registration steps. The case study taken for the purpose of identification is for ‘Komal Chaul’, a suitable candidate for GI from Assam, located in North-Eastern part of India, yet to be registered for GI. The case-study testing proves that this bio-cultural product, i.e. ‘Komal Chaul’ may be registered for GI successfully.