International Journal of Computer Networks and Communications Security

Volume 6, Issue 1, January 2017

 

 

Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification
 

Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification

Pages: 1-6 (6) | [Full Text] PDF (466 KB)
N Gupta, A Saxena
Department of CSE, Truba Institute of Engineering & Information Technology, Bhopal, India

Abstract -
Here in this paper a new and efficient technique for the Cohort of Keys using Tree based Algorithm is proposed for the Sharing of Data in Secure manner. The Key Group Procedure is implemented for the Sharing of Data where Data Owner who needs to send Data is first Encrypted Information using Tree grounded Key Group and then when Data is received at the other end it is decrypted and Classify as Normal or Abnormal Packet. The Planned Practise realized provides Privacy from various attacks as well as provides less computational and Communication Cost.
 
Index Terms - Tree based Key Generation, AES, User Revocation, Entropy, Network Security, Group Key Establishment

Citation - N Gupta, A Saxena. "Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification." International Journal of Computer Science and Software Engineering 6, no. 1 (2017): 1-6.

Agile Development Overcomes GSD Challenges: A Systematic Literature Review
 

Agile Development Overcomes GSD Challenges: A Systematic Literature Review

Pages: 7-18 (12) | [Full Text] PDF (483 KB)
A Alsahli, H Khan, S Alyahya
Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, Kingdom of Saudi Arabia

Abstract -
This paper aims to discover several Global Software Development (GSD) challenges existing in the literature and review several agile practices available to mitigate those challenges with special focus on Scrum and its practices since it is the most wildly used in GSD setting. A total of 24 papers are identified as relevant papers and data from those papers are used to reveal how agile practices can be used to mitigate known GSD challenges. Thus, this paper can be a reference to GSD developers and agile practitioners to recognize latest agile remedies available to reduce GSD challenges.
 
Index Terms - Agile, Agile practices, GSD, Scrum, Systematic literature reviews

Citation - A Alsahli, H Khan, S Alyahya. "Agile Development Overcomes GSD Challenges: A Systematic Literature Review." International Journal of Computer Science and Software Engineering 6, no. 1 (2017): 7-18.

An Architecture for Big Data Privacy in the Hybrid Cloud
 

An Architecture for Big Data Privacy in the Hybrid Cloud

Pages: 19-26 (8) | [Full Text] PDF (470 KB)
WA Shehri
Department of Computer Science King Abdul-Aziz University Jeddah, KSA

Abstract -
The tremendous increases in the amounts of data generated and gathered by computer systems constitute a growingproblem, as corporations tend to invest in hardware and software infrastructure but then use only a very limitedproportion of these resources. Cloud computing was created to resolve this issue, with the vast amounts of data beingtermed .
 
Index Terms - Software Architecture, Big Data, Hybrid Cloud, Privacy

Citation - WA Shehri. "An Architecture for Big Data Privacy in the Hybrid Cloud." International Journal of Computer Science and Software Engineering 6, no. 1 (2017): 19-26.