International Journal of Computer Networks and Communications Security

Volume 8, Issue 1, January 2019

 

 

Quality Control Approach in Developing Software Projects
 

Quality Control Approach in Developing Software Projects

Pages: 1-5 (5) | [Full Text] PDF (304 KB)
Viktorija Stepanova
Department of Computer Science and Information Technology, Riga Technical University, Riga, Latvia

Abstract -
Achievements in a unified digital market raise a topical question on provision of high quality software. Mistakes correction and the quality control have impact on the project. The proposed method provides understanding on the software progress condition with its strong and weak sides.
 
Index Terms - Process Assessment, Process-Orientation, Six Sigma, Software Quality Management, Software Engineering

Citation - Viktorija Stepanova. "Quality Control Approach in Developing Software Projects." International Journal of Computer Science and Software Engineering 8, no. 1 (2019): 1-5.

Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification
 

Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification

Pages: 6-11 (6) | [Full Text] PDF (466 KB)
N Gupta, A Saxena
Department of CSE, Truba Institute of Engineering & Information Technology, Bhopal, India

Abstract -
Here in this paper a new and efficient technique for the Cohort of Keys using Tree based Algorithm is proposed for the Sharing of Data in Secure manner. The Key Group Procedure is implemented for the Sharing of Data where Data Owner who needs to send Data is first Encrypted Information using Tree grounded Key Group and then when Data is received at the other end it is decrypted and Classify as Normal or Abnormal Packet. The Planned Practise realized provides Privacy from various attacks as well as provides less computational and Communication Cost.
 
Index Terms - Tree based Key Generation, AES, User Revocation, Entropy, Network Security, Group Key Establishment

Citation - N Gupta, A Saxena. "Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification." International Journal of Computer Science and Software Engineering 8, no. 1 (2019): 6-11.

An Architecture for Big Data Privacy in the Hybrid Cloud
 

An Architecture for Big Data Privacy in the Hybrid Cloud

Pages: 12-19 (8) | [Full Text] PDF (470 KB)
WA Shehri
Department of Computer Science King Abdul-Aziz University Jeddah, KSA

Abstract -
The tremendous increases in the amounts of data generated and gathered by computer systems constitute a growingproblem, as corporations tend to invest in hardware and software infrastructure but then use only a very limitedproportion of these resources. Cloud computing was created to resolve this issue, with the vast amounts of data beingtermed.
 
Index Terms - Software Architecture, Big Data, Hybrid Cloud, Privacy

Citation - WA Shehri. "An Architecture for Big Data Privacy in the Hybrid Cloud." International Journal of Computer Science and Software Engineering 8, no. 1 (2019): 12-19.