Vol. 11 No. 8 AUG 2013

Vol. 11 No. 8 AUGUST 2013 International Journal of Computer Science and Information Security

Publication AUGUST 2013, Volume 11 No. 8 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 31071330: Optimizing Key Distribution in Peer to Peer Network Using B-Trees (pp. 1-6)

Full Text: PDF

.

Abdulrahman Aldhaheri, School of Engineering and Technology, Computer Science and Engineering, University of Bridgeport

Hammoud Alshammari, School of Engineering and Technology, Computer Science and Engineering, University of Bridgeport

Majid Alshammari, School of Engineering and Technology, Computer Science and Engineering, University of Bridgeport

.

Abstract — Peer to peer network architecture introduces many desired features including self-scalability that led to achieving higher efficiency rate than the traditional server-client architecture. This was contributed to the highly distributed architecture of peer to peer network. Meanwhile, the lack of a centralized control unit in peer to peer network introduces some challenge. One of these challenges is key distribution and management in such an architecture. This research will explore the possibility of developing a novel scheme for distributing and managing keys in peer to peer network architecture efficiently.

.

Keywords:

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 22041303: A Distributed Deadlock-Free Quorum-Based Algorithm for Mutual Exclusion (pp. 7-13)

Full Text: PDF

.

Mohamed NAIMI, Department of Computer Science, University of Cergy Pontoise, 33, Boulevard du port, 95000 Cergy-Pontoise, France

Ousmane THIARE, Department of Computer Science, UFR S.A.T, University Gaston Berger, BP. 234 Saint-Louis, Senegal

.

Abstract — Quorum-based mutual exclusion algorithms enjoy many advantages such as low message complexity and high failure resiliency. The use of quorums is a well-known approach to achieving mutual exclusion in distributed environments. Several distributed based quorum mutual exclusion was presented. The number of messages required by these algorithms require between 3(sqrt of n) and 5(sqrt of n) , where n is the size of under- lying distributed system, and the deadlock can occur between requesting processes. In this paper, we present a quorum-based distributed mutual exclusion algorithm, free deadlock. Every group is organized as a logical ring of (sqrt of n) processes. A requesting process sends its request to its successor on the logical ring. When a process receives its own request after one round, it enters in the critical section. The algorithm requires 2 (sqrt of n -1) messages.

.

Keywords-component; Distributed Mutual Exclusion, Quroum, Logical ring, free deadlock;

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31071311: Steganography in the Non-Edges of True Color Images (pp. 14-18)

Full Text: PDF

.

(1) Ahmed Yaseen Kamel, (2) Auf Abdul-Rahmaan Hasso, (3) Shahd Abdul-Rhman Hasso

(1) Assistant Lecturer in Directorate Nineveh Education,

(2) B.Sc. in Electrical and Electronics Engineering,

(3) Lecturer in Software Engineering Dept., College of Computer Sciences and Math., University of Mosul, Mosul, Iraq,

.

Abstract — This paper proposed a new technique for text hiding in the non-edges of a true color image. Text has been hidden as bytes by embedding it in the image (depending on its edges) and results showed high accuracy in the hiding subjectively and objectively and there is no evidence on the existence of hidden data in the true image in each color, any pixel is used for hiding 3 bytes of the text so it is possible using the proposed algorithm to hide text of any size, without the appearance of any effect on the resulting image. The results shows no change in the image size after embedding the text, and any increase or decrease in the text size does not represent a major factor in hiding, but whenever the size of the image is greater, the hiding will be secure.

.

Keywords- Steganography; Canny Edge Detection, True Color Image.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31071313: Image Integrity based on HMAC Structure (pp. 19-24)

Full Text: PDF

.

Shahd Abdul-Rhman Hasso

Department of Software Engineering, College of Computer Sciences and Math., University of Mosul, Mosul, Iraq

.

Abstract — With the increasing of the online applications and aggravation of dealing with official papers via the Internet that is send by images. It has become very necessary to add ways to make sure of the reliability of the transmitted image. The presented work is a design of algorithm for the integration and authentication of the image by adding it’s hash message authentication code (HMAC) of the original image after encryption code using triple DES to it. The proposed algorithm depends on applying the HMACSHA-512 for finding the 512-bit HMAC code of an input (secured and must be integrated) image, then encrypt the resultant hash code by 3DES algorithm , forming it as an icon (small) image and send the resultant image icon attached. The receiver will receive the original and icon image, he wants to insure that the original is integrated and authenticated, Therefore , the HMAC-SHA-512 will applied on the original, decrypt the icon image to obtain the hash code, then matching codes to check the integrity and make sure of the reliability of the transmitted image. Results proved high precision and reliable images whatever the size of the image slight change the image pixel affect the output code which increases the reliability of the image.

.

Keywords- HMAC; 3DES; Image Authentication; Image Integrity.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31071321: Security Issues on Cloud Computing (pp. 25-34)

Full Text: PDF

.

Harit Shah, Sharma Shankar Anandane, Shrikanth

.

Abstract - The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user’s data has to be released to the Cloud and thus leaves the protection sphere of the data owner. Most of the discussions on these topics are mainly driven by arguments related to organisational means. This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena. It also discusses basic security model followed by various High Level Security threats in the industry.

.

Keywords — Cloud Computing, Security, Threats

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31071323: Extraction of Pupil Region from Iris Image Using a Scheme Based On Gamma Transform and Contrast Stretching (pp. 35-38)

Full Text: PDF

.

Suhad A. Ali, Dept. of Computer Science, Babylon University, Babylon/ Iraq

Dr. Loay E. George, Dept. of Computer Science, Baghdad University, Baghdad/ Iraq

.

Abstract — Iris region extraction is almost the most challenging part in iris recognition system. The correctness of iris segment allocation is affected by the pupil localization accuracy. In this paper, a new method is developed for pupil region detection using a combination of gamma transform and contrast enhancement techniques. The proposed method is tested on 2639 iris images from CASIA v4.0 database (Interval class). The results prove the efficiency of the proposed method.

.

Keywords- Gammas transform, Iris segmentation, Seed filling, Enhancement techniques.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 31071325: Quadrate Design of Linear System for Color Image Encryption (pp. 39-47)

Full Text: PDF

.

Ashwaq T. Hashem, MSc., Computer Science Department, Babylon University, Hilla, Iraq

Loay E. George, Ph.D, Computer Science Department, Baghdad University, Baghdad, Iraq

.

Abstract — Nowadays the security of digital images become more and more important since the communications of digital products over open network occur more and more frequently. Images are widely used in several processes. Therefore, the protection of image data from unauthorized access is important. Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. This paper attempts to design a simple and safer cryptographic algorithm. It is a new secret-key block cipher using type-3 Feistel network. The original image has been divided into 4×4 pixels blocks, which were rearranged into a permuted image using a linear system in quadrate design with mixing of operation from different algebraic group. The test results confirmed its security; which are shown in terms of statistical analysis using histograms, entropy and correlation. The test results showed that the correlation between image elements has been significantly decreased, and the entropy has been very close to the ideal value.

.

Keywords-: Image encryption, Linear system, quadrate design, type-3 Feistal network.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31071332: Coin based Untraceable Incentive Mechanism for Multi-hop Cellular Networks (pp. 48-52)

Full Text: PDF

.

Vishnu Subramonian P, Department of Electronics and Communication Engg., Nehru College of Engineering and Research Centre, Pampady, Thiruvilawamala, Kerala, India

Parameshachari B D, Department of Electronics and Communication Engg., Nehru College of Engineering and Research Centre, Pampady, Thiruvilawamala, Kerala, India.

Rahul M Nair, Department of Electronics and Communication Engg., Nehru College of Engineering and Research Centre, Pampady, Thiruvilawamala, Kerala, India.

H S DivakaraMurthy, Department of Electronics and Communication Engg., Nehru College of Engineering and Research Centre, Pampady, Thiruvilawamala, Kerala, India.

.

Abstract — The multihop cellular network uses nodes to relay packets of data which helps in enhancing the network performance. Selfish node do not usually take part and this increases the load on cooperative nodes. This paper provides a fair charging policy which also includes hashing operations, public key cryptography, authentications to provide a secure and efficient communication.

.

Keywords- cryptography; fescim; hashing; selfish nodes; checks; networks;

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31071335: Multidimensional Analysis applied to WSN Case study: routing Protocol (pp. 53-56)

Full Text: PDF

.

Ziyati Elhoussaine, Rachid Haboub, Mohammed Ouzzif, and Khadija Bami

RITM laboratory, Computer science and Networks team, ENSEM - ESTC - UH2C, Casablanca, Morocco

.

Abstract — Mobile Ad-hoc Network is a kind of wireless adhoc network where nodes are connected wirelessly and the network is self configuring [1]. This paper shows the use of data warehouse as an alternative for managing data collected by Wireless Sensor Networks. In general Wireless Sensor Network is used to produce a large amount of data that need to be analyzed and normalized, so as to help researchers and other people interested in the information. These data managed and compared with information from other sources and systems could contribute in technical decision processes. This paper proposes a model to extract, transform and normalize data collected by Wireless Sensor Networks by implementing a multidimensional warehouse for comparing many aspects in WSN such as (routing protocol[4], sensor, sensor mobility, cluster ….). Hence, data warehouse applied to the context above is detached as a useful alternative that helps specialists to obtain information for decision processes and navigate from one aspect to another.

.

Keywords- WSN, Data Warehouse, multidimentional design, OLAP, Routing Protocol

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31071337: “People Are the Answer to Security”: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization (pp. 57-64)

Full Text: PDF

.

Oyelami Julius Olusegun, Norafida Binti Ithnin

Department of Information systems, University Technology Malaysia, Faculty of Computing, Skudai, Johor Bahru 81310,

.

Abstract - Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute. At the University Technology Malaysia (UTM), we have recognized the fact that, it is about time information security should no longer be a lacking factor in productivity, both information security and productivity must work together in closed proximity. We have recently implemented a broad campus information security awareness program to educate faculty member, staff, students and non-academic staff on this essential topic of information security. The program consists of training based on web, personal or individual training with a specific monthly topic, campus campaigns, guest speakers and direct presentations to specialized groups. The goal and the objective are to educate the users on the challenges that are specific to information security and to create total awareness that will change the perceptions of people thinking and ultimately their reactions when it comes to information security. In this paper, we explain how we created and implemented our information security awareness training (ISAT) program and discuss the impediment we encountered along the process. We explore different methods of deliveries such as target audiences, and probably the contents as we believe might be vital to a successful information security program. Finally, we discuss the importance and the flexibility of establishing a sustainable information security training program that could be adopted to meet current and future needs and demands while still relevant to our current users.

.

Keywords: Information Security, Awareness, End-User, Education and Training

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31071338: Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing (pp. 65-76)

Full Text: PDF

.

Oyelami Julius Olusegun, Norafida Binti Ithnin

Department of Information systems, University Technology Malaysia, Faculty of Computing, Skudai, Johor Bahru 81310,

.

Abstract - Information sharing in organization has been considered as an important approach in increasing organizational efficiency, performance and decision making. With the present and advances in information and communication technology, sharing information and exchanging of data across organizations has become more feasible in organization. However, information sharing has been a complex task over the years and identifying factors that influence information sharing across organization has becomes crucial and critical. Researchers have taken several methods and approaches to resolve problems in information sharing at all levels without a lasting solution, as sharing is best understood as a practice that reflects behavior, social, economic, legal and technological influences. Due to the limitation of the conventional ISM3 standards to address culture, social, legislation and human behavior, the findings in this paper suggest that, a centralized information structure without human practice, distribution of information and coordination is not effective. This paper reviews the previous information sharing research, outlines the factors affecting information sharing and the different practices needed to improve the management of information security by recommending several combinations of information security and coordination mechanism for reducing uncertainty during sharing of information .This thesis proposes information security management protocol (ISMP) as an enhancement towards ISM3 to resolve the above problems. This protocol provides a means for practitioners to identify key factors involved in successful information sharing. The first one is the identification of all stakeholders to be incorporated into information flow. The second is the integration of the existing information sharing legal frameworks, information sharing protocols, information security standards from the ISO/IEC 27001 and management standard ISO9001 with the existing information security management model (ISM3). An experiment was conducted to evaluate the performance of the proposed protocol. The results revealed that interoperability, culture and behavior towards information sharing improved by an average of 10 percent.

.

Keywords: Information Security Management, Information Sharing and Human Factors.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31071346: Robinson Edge Detector Based On FPGA (pp. 77-81)

Full Text: PDF

.

Farah Saad Al-Mukhtar, M. Sc. Student in Computer Science Dept. / College of Computer Sciences and Mathematics / University of Mosul. Mosul, Iraq

Dr. Maha Abdul-Rahman Hasso, Computer Science Dept. / College of Computer Sciences and Mathematics / University of Mosul. Mosul, Iraq

.

Abstract — Edge detection is one of image enhancement techniques that are used to extract important features from the edges of an image (e.g., corners, lines, curves). The aim of image enhancement is to improve the interpretability of information in images for human viewers, or to provide "better" input for other automated image processing techniques. The proposed work presents Programmable Gate Array (FPGA) based architecture for Edge Detection using Robinson edge detection operator in respect of both time and space complexity. The algorithm are implemented using MATLAB 2010 language code as well as the VHDL language to deal with use of FPGA device, which was of a kind (Xilinx XC3S500E Spartan-3E), and it implemented on 8 bit grayscale image data, Robinson edge detection algorithm is produced using the pixel windows (3×3 windows) to calculate its output, make a comparison between the resultant image in MATLAB and VHDL by calculate the Peak Signal-to-Noise Ratio (PNSR), Root Mean Square error (RMSE) and the correlation between resultant images from MATLAB and VHDL.

.

Keywords - component; FPGA; Robinson Edge Detectot, VHDL, Windowing.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31071318: Profile Cloning in Online Social Networks (pp. 82-86)

Full Text: PDF

.

Fatemeh Salehi Rizi, Department of Computer and IT, Sheikh Bahaei University of Isfahan, Isfahan, Iran

Mohammad Reza Khayyambashi, Department of Computer, Faculty of Engineering, University of Isfahan, Isfahan, Iran

.

Abstract — Today, Online Social Networks (OSNs) are becoming important due to the recent explosive growth in online interactions. They allow their users to express their personality and to meet people with similar interests. Meanwhile, there are also many potential privacy threats posed by these websites, such as identity theft and the revealing of personal information. However, many users have not yet been made aware of these threats, and the privacy setting that is provided by OSNs’service providers is not flexible enough to preserve users’ data. Furthermore, users do not have control over what others share about them. One of the recently emerging attacks is the impersonation of a real user, instead of creating a fake account for a non-existing user, which is called Identity Theft Attack (ICA) or profile cloning. The purpose of cloned profiles is to try to steal real users’ identities by making contact with their friends in order to financially abuse them or misuse their reputation. In this paper profile cloning attacks and some possible ways of detecting them are discussed. Then, based on the recent techniques and attack strategies further directions in research are proposed.

.

Keywords - Profile Cloning, Online Social Networks, Security

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31071343: Software Cost Estimation using Fuzzy-swarm Intelligence (pp. 87-91)

Full Text: PDF

.

Mustafa shakir mahmood Al-Sabaway, Software Engineering Dept., University of Mosul, Mosul, Iraq

Dr.Jamal Salahaldeen Majeed Al-Neamy, Assistant professor, Software Engineering Dept., University of Mosul, Mosul, Iraq

.

Abstract — Estimation is the most challenging and emerging field in software engineering development life cycle. Software cost estimation is a part of it. In this paper, Software cost estimation techniques were used to estimate cost of software development, the proposed system was built from four phases, Fuzzification, Fuzzy Inference, Parameter Tuning (using PSO) & Defuzzification, compute Cost.

.

Index Terms— Lines of Code, Fuzzy Logic System, Particle Swarm Optimization, Software cost Estimation.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31071312: An Operating System-based Model for Mobile Agent Deployment (pp. 92-96)

Full Text: PDF

.

Oyatokun B.O. , Department of Mathematical Sciences, Redeemer’s University, Mowe Ogun State, Nigeria

Osofisan A. O., Department of Computer Science, University of Ibadan, Ibadan, Nigeria

Aderounmu G.A, Obafemi Awolowo University, Ile-Ife, Osun State Nigeria

.

Abstract — Mobile agent technology has grown in acceptance over the years for distributed applications, but it is yet to be adopted as ubiquitous solution technique. This is due to its complexity and lack of interoperability. Mobile agent executes on mobile agent platform, these platforms from different vendors are design, and language specific, and are thus non interoperable. In other words mobile agent built on one platform cannot interact with or execute on any other platform. There is a need to provide a common base on which agents from different vendors can interact and interoperate. This work presents a framework for mobile agent interoperability by providing an Embedded Mobile Agent (EMA) system into the Windows Operating System kernel so that it can run as a service; this was done to eliminate the overheads associated with the agent platforms and enhance mobile agents’ interoperability. The targeted OS were Windows XP, Windows Vista and Windows7.

.

Index Terms— embedded mobile agent, mobile agent platform, interoperability, operating system service.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 31051333: Pre-SOA Models (pp. 97-100)

Full Text: PDF

.

Safa Talal Hasan Al-Ramadani

Software engineering. Mosul University, Mosul University, Mosul, Iraq

.

Abstract— In this paper I propose a number of steps as a starting point to any SOA project. First we talk about SOA and its importance in nowadays, then listing other researches opinions in the first step to SOA. After that I'll lists my proposed practical approach to start the way toward any SOA system, and enforce that by a practical case study for a technical institution system.

.

Keywords-component; formatting; SOA : Service Oriented Architecture, Pre-SOA Model.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 31071324: Performance Analysis of Call Admission Control Schemes in WCDMA Network (pp. 101-104)

Full Text: PDF

.

Syed Foysol Islam, Faculty of Engineering, University of Development Alternative (UODA), Dhaka, Bangladesh

Mohammad Shahinur Islam, Faculty of Engineering, University of Development Alternative (UODA), Dhaka, Bangladesh

.

Abstract — The main objective of this research is to derive a numerical model of call admission control in WCDMA network and examines its performance. Three important call admission algorithms: wideband power based (WPB), throughput based (TB) and adaptive call admission control (ACAC) algorithms are investigated along with their performance analyzed throughout this paper and a little comparison between them is presented.

.

Key Words: Wide Band Code Division Multiple Access (WCDMA), Wideband power based (WPB), Throughput based (TB) and Adaptive call admission control (ACAC)

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------