Post on 16-May-2022
DRDO Sponsored National Conference on
Security Issues In
Advanced Computing
16th March, 2013
Editors
Mr. K. Saravanan
Ms. T. Kalai Selvi
Mr. C. Balasubramaniam
Mr. R. Karunamoorthi
Organized by
Department of Computer Science and Engineering
Erode Sengunthar Engineering College
Approved by AICTE, Affiliated to Anna University,
NBA Accreditation and ISO 9001:2008 Certificated Institution
Technically Co-Sponsored by
DRDO Sponsored Proceedings of National Conference on Security Issues in Advanced Computing
Copyright © 2013 by Bonfring
All rights reserved. Authorized reprint of the edition published by Bonfring. No part of this book may be reproduced in any
form without the written permission of the publisher.
Limits of Liability/Disclaimer of Warranty: The authors are solely responsible for the contents of the paper in this volume. The
publishers or editors do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and
readers are required to communicate such errors to the editors or publishers to avoid discrepancies in future. No warranty
may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable
for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or
other professional services. If professional assistance is required, the services of a competent professional person should be
sought. Further, reader should be aware that internet website listed in this work may have changed or disappeared between
when this was written and when it is read.
Bonfring also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in
electronic books.
ISBN 978-93-82338-51-2
Bonfring
292/2, 5th Street Extension, Gandhipuram,
Coimbatore-641 012.
Tamilnadu, India.
E-mail: info@bonfring.org
Website: www.bonfring.org
President’s Message
I am indeed very happy to know that the DRDO sponsored National
Conference on “Security Issues in Advanced Computing (SIAC 2013)“ is being
organized by the Department of Computer Science and Engineering of our
college on 16.03.2013.
I pray to the Almighty for the grand success of this National Conference
on Security Issues in Advanced Computing.
M. Balusamy
Thiru. M. Balusamy
President
Erode Sengunthar Educational Trust
Correspondent’s Message
Er. R. Mohanraj, B.E., MIE, FIV
Correspondent
Erode Sengunthar Engineering College
I am extremely delighted to know that the Department of Computer
Science and Engineering is organizing a DRDO sponsored National Conference
on “Security Issues in Advanced Computing (SIAC 2013) “on 16.03.2013.
I hope that the National Conference will enthuse the participants to
present their creative ideas and also it will provide an opportunity to the
participants to update their knowledge in their respective fields.
I wish the National Conference on Security Issues in Advanced
Computing a grand success.
Er.R. Mohanraj
Secretary’s Message
Thiru. S. Sivananthan
Secretary
Erode Sengunthar Educational Trust
I am glad to know that the Department of Computer Science and
Engineering is organizing a DRDO sponsored National Conference on
“Security Issues in Advanced Computing (SIAC 2013) “on 16.03.2013.
It is thoughtful of the department to have chosen the significant theme
Security Issues which is an essential requirement of the Information
Technology. I am confident that the department will bring out a nation-wide
interaction in this area.
I wish the conference, the delegates and the department every success
in their endeavor to provide an opportunity for experts from academic
institutions all over the nation to discuss and share their visions on the
research activities in the field of Security Issues in Advanced Computing.
S. Sivananthan
Principal’s Message
Dr.A.T. Ravichandran
Principal
Erode Sengunthar Engineering College
In the ever changing technology, one has to update his/her knowledge
in the field of their specialization to stand unique and excel. I hope that in this
DRDO sponsored National Conference all the upcoming technologies will be
discussed and benfittable to every one.
I congratulate the organizers for having chosen this theme for the
Conference and wish them all success.
Dr.A.T.Ravichandran
Organizing Committee
Chief Patron:
Thiru. M. Balusamy,
President, ESET Patrons:
Thiru. S. Sivananthan,
Secretary, ESET Er. R. Mohanraj
Correspondent, ESEC Chairman:
Dr. A. T. Ravichandran,
Principal, ESEC. Convener:
Dr. P. Venkateswari,
HOD / CSE. Co-convener:
Ms. T. Kalai Selvi, A.P. (SG) / CSE Mr. K. Saravanan, A.P. / CSE Mr. C. Balasubramaniam, A.P. / CSE Mr. R. Karunamoorthi, A.P. / CSE Committee Members:
Prof. G. Sivakumar
Prof. K.M. Subramanian
Ms. C. Kavitha
Mr. P. Karunakaran
Mr. K.A. Dhamotharan
Mr. D. Vijaybabu
Ms. N.S. Kavitha
Mr. S. Mohanraj
Mr. V.M. Vijaya Kannan
Ms. P. Suganthi
Ms. R. Nithyadevi
Mr. P. Marimuthu
Ms. T. Naveena
Ms. S. Revathi
Ms. S. Sharmila National Advisory Committee Dr. H. Abdul Rauf, Principal,
MEA Engineering College, Kerala. Dr. G. Sudha Sadasivam,
Professor / CSE,
PSG Tech., Coimbatore. Dr. T. Purusothaman,
Associate Professor / CSE,
Government College of Technology, Coimbatore. Dr. V. Venkatachalam,
Principal,
The Kavery Engineering College, Mecheri. Dr. G. Tholkappia Arasu,
Principal,
AVS Engineering College, Salem. Dr. R. Asokan,
Principal,
Kongunadu College of Engg. & Tech., Trichy. Dr. A.M.J. Md.Zubair Rahman,
Principal,
Al-Ameen Engineering College, Erode. Dr. R.C. Suganthe,
Professor / CSE,
Kongu Engineering College, Perundurai.
Contents
Paper ID Title/Author Page No.
1 Trust Based Routing in Wireless Sensor Networks for Detecting Attacks
D. Rekha and V. Gurunathan
1
2 Database Security Coordination against SQL Attacks
V. Nirmal and M. Ganapathiraman
2
3 Energy Efficient Black Hole Router Detection and Communication between Transgression Nodes on MANET
G. Naveen Kumar, C. Nanda Kumar and N. Nishanth
3
4 Computer and Network Security for Wireless LAN Based on MAC and WEP
R. Nandhakumar, S. Naveen Prasath and S. Nowshanth
4
5 An Overview of Handover in Wireless Networks
N. Priya and M. Ramya
5
6 Cloud Information Accountability for Data Sharing Using JAR Files
B. Revathi
6
7 IRIS Recognition Based Authentication in ATM
V. Sangavee and S. Sajitha
7
8 Cryptographic Puzzle Hiding Scheme Methods for Preventing Selective Jamming Attacks
P. Thangarasu and P. Nithyadevi
8
9 Secure Internet Verification Based on Image Processing Segmentation
D. Sowmiya Devi and C. Sindhu
9
10 Ensuring Data Storage Security in Cloud Computing
S. Selvalakshmi and C. Kiruthika
10
11 Cryptographic Key Regeneration Scheme Based on Fingerprint and IRIS
C. Devika
11
12 Analysing of Spot Instance via Check Pointing and Migration on Cloud
R. Jayasudha, M. Abinaya and V. Divya
12
13 Preventing the Privacy Information of an Individual while Publishing the Microdata
C. Jency
13
14 OPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks
S. Kalaivani and K. Kanimozhi
14
15 A Misuseability Weight Measure Using M-Score Algorithm
M. Srimathi and D. Saranya
15
16 Efficient Reliable MAC Layer Multicasting IEEE 802.11 Wireless Networks
S. Prashanth, S. Sathyanarayanan and M. Sathishkumar
16
17 Improving Resilence and Revocation by Mitigating Bad-Mouthing Attacks in Wireless Sensor Networks through Reputation Based Trust Management Scheme with Biased Sampling PRT Test
S. Kowsika, S. Abuthahir, P. Sampathkumara and K. Vijaya
17
18 Prevention of DDOS Attacks Using Port Number Revolutionize and Time Stamp-Clock Drifts
V. Haripriya
18
19 Role of Multiple Level Encryptions in Secure Electronic Transaction
S. Chitra and M. Keerthi ka Janani
19
20 Secure Communication Using Image Steganography
B. Parkavi, M. Sasipriya and K. Kalaivendhan
20
21 Location Privacy in Pervasive Computing
D. Devipriya and T. Malathi
21
22 Assessment of Critical Behaviour for MI, PCI & CABG Events
C. Premalatha, X. Rexeena and S. Saranya
22
23 Dynamic Resource Allocation to Reduce Computational Complexity
M. Ganesh and R. Srinivasan
23
24 A Survey on Security Issues and Counter-Measures in Cloud Computing Storage and a Tour towards Multi-Clouds
G. Manigandan and R. Tamilselvan
24
25 Proficient Method for Trajectory of Moving Vehicles Using OLAP by Segmentation of Geography
P. Kiruthikadevi, A. Kishore Kumar and K. Jeeve Sakthi
25
26 Dynamic Resource Allocation for Efficient Parallel Data Processing in Cloud
C. Jayagopal
26
27 Secure and Robust Localization in Wireless Network Protection S. Jagadeesan and R.K. Arunkumar
27
28 Privacy Preserving Decision Tree Learning Using Unrealized Data Sets with C 5.0
B. Neelu
28
29 Efficient Range Queries on Encrypted Data
G. Dinesh and K. Mansoor Ali
29
30 Rendering Adaptation Approach in Mobile Cloud Computing for Mobile Multimedia Applications
B. Manimegalai and S. Rami la
30
31
Datamining Security Issues in Cryptography
R. Yogalakshmi and M. Azhageswari
31
32 Content Based Image Retrieval (CBIR) Using Fast Wavelet Transform
S. Sarayadevi, S. Sivanandhini, G. Suresh and S. Karthik
32
33 MASTERO – Mobihealth Analysation by Sensorized Telemetric Embedded Realtime Oscilloscope
R. AravinthYukesh, K. Yasodha, S. Vinothini, D. Vijayakumar, M. Manoj Prabu
33
34 Border Defence System Using Bluetooth Technology (Wireless Technologies)
V. Divya and S. Parvathavarthini
34
35 Deadline Aware Task Migration Model for Economic Clouds
V. Satheeshkumar
35
36 Trust Evaluation Based Security in Wireless Sensor Network
C. Janani and K. Selvi
36
37 New General Purpose Matching Algorithm for De-Duplication
S. Rejeeramani and R. Arunkumar
37
38 GPRS and SMTP/PTP Based Wireless Home Security System
R. Velvizhi
38
39 The Multicast Capacity of Large Multihop Wireless Networks
C. Munusamy
39
40 Implementation of Data Mining Techniques for Weather Report Guidance for Ships Using Global Positioning System
P. Hemalatha
40
41 A Service Provide for Granting the Ticket using Fine KERBEROS and Authenticate for Client Using RTP in Multi-Cloud
P. Nithyadevi and R. Pradeep
41