IJCNIS Vol. 7, No. 11, Oct. 2015
Cover page and Table of Contents: PDF (size: 578KB)
REGULAR PAPERS
Digital forensics will always include at least human as the one who performs activities, digital evidence as the main object, and process as a reference for the activities followed. The existing framework has not provided a description of the interaction between human, interaction between human and digital evidence, as well as interaction between human and the process itself. A business model approach can be done to provide the idea regarding the interaction in question. In this case, what has been generated by the author in the previous study through a business model of the digital chain of custody becomes the first step in constructing a business model of a digital forensics. In principle, the proposed business model already accommodates major components of digital forensics (human, digital evidence, process) and also considers the interactions among the components. The business model suggested has contained several basic principles as described in The Regulation of Chief of Indonesian National Police (Perkap) No 10/2010. This will give support to law enforcement to deal with cybercrime cases that are more frequent and more sophisticated, and can be a reference for each institution and organization to implement digital forensics activities.
[...] Read more.Smart clouds allow every consumer and cloud service provider a two-way communication, thus enabling cloud service provider to generate a time dependent pricing model using a feedback loop. This model charges a consumer more in peak periods and less during off peak periods, which encourages consumers to reschedule their workload to less traffic (off-peak) periods. This helps service providers to practice a versatile pricing technique to increase their profits by covering off-peak demand and minimizing the provider’s cost optimization problem. It also minimizes the execution time in setting these prices by Compromised Cost-Time Based (CCTB) scheduling. Shifting workload is a probabilistic function which tells consumers to shift their workload. This paper presents a model to calculate day-ahead prices. The proposed model dynamically adjusts the rewards or discounts based on consumer behavior in the past, and helps providers to maximize their revenue by shifting the consumers’ workload.
[...] Read more.The article analyses the possibilities and techniques of modeling global cyber-attacks on an internetwork of small countries. The authors study the Distributed Denial of Service (DDoS) attack against Estonian internetwork, which took place in 2007, in an open-source Nessi2 simulator environment, as DDoS appears to be the most common type of informational attack on resources used todeay. Such a modeling can be replicated with a certain degree of accuracy because the most of powerful attacks have been relatively well-documented. The article covers the most lifelike attack scenarios accomplished by sophisticated modeling of underlying traffic cases. Conclusions drawn from the simulation show that even large-scale DDoS attacks can be successfully modeled using limited resources only. Future research directions, motivated by the research, underlying this article, are highlighted at the end.
[...] Read more.In today’s world mobile agents and mobile ad-hoc networks are the two technologies that are contributing towards better connectivity and communicability. When the two technologies used jointly, the interest is increased. Due to the properties like self-configuration and infrastructure-less, the mobile ad-hoc networks provide various remarkable features. But the various challenges are also associated with mobile ad-hoc networks like dynamic topology, mobility, energy constraint etc. Mobile agent provides solution to these challenges. A mobile agent is a new way of computer interactions and provides better options for the developers to create applications based on connectivity. Mobile agents move around the ad-hoc networks in a different and better way than the other widespread client server architecture based applications. Due to their mobility and autonomy these agents can perform various functions in mobile ad-hoc networks like topology discovery, routing, key management, congestion control etc. The paper reviews the role of the mobile agents in the mobile ad-hoc networks, and emphasizes its application on the various layers of a layered architecture of mobile ad-hoc networks and concludes its merits as compared to other conventional approaches.
[...] Read more.In recent years, applications of cloud services have been increasingly expanded. Cloud services, are distributed infrastructures which develop the communication and services. Auto scaling is one of the most important features of cloud services which dedicates and retakes the allocated dynamic resource in proportion to the volume of requests. Scaling tries to utilize maximum power of the available resources also to use idle resources, in order to maximize the efficiency or shut down unnecessary resources to reduce the cost of running requests. In this paper, we have suggested an approach based on learning automata auto- scaling, in order to manage and optimize factors like cost, rate of violations of user-level agreements (SLA Violation) as well as stability in the presence of traffic workload. Results of simulation show that proposed approach has been able to optimize cost and rate of SLA violation in order to manage their trade off. Also, it decreases number of operation needed for scaling to increase stability of system compared to the other approaches.
[...] Read more.The exponential growth of data and our dependence on it has increased security concerns over the protection of data. Various methodologies have been suggested to meet the security services namely; confidentiality, authentication and authorization. The (k:n) secret sharing scheme was recommended to isolate the dependence on a single entity for the safety of data. Random Grids Visual Secret Sharing (RGVSS), a category of a Visual Cryptography Secret Sharing scheme aims at encrypting a secret image into several shares using a simple algorithm. The encrypted information can be revealed by stacking the shares which can be recognized by the Human Visual System (HVS). The proposed VSS scheme exploits the geometrical configuration of the cube without distorting any of the secret information embedded on the shares. The rest of the secrets are decrypted by stacking the cubes and changing the orientation of one of the cube over the fixed one. Each side of the cube encrypts up to four secrets, the first secret can be decrypted by stacking the two cubical shares and rotating the stacked face of the cube at 90 degrees, 180 degrees and 270 degrees, reveals the other three shares respectively The proposed scheme increases the capacity of secret communication avoiding the pixel expansion problem which in turn reduces the overhead of storage and communication significantly without compromising on security and authenticity of the secret information.
[...] Read more.VANET deployment in real world has become a living reality by the successful allotment of 5.9GHz to Dedicated Short Range Communication (DSRC) by WLAN technologies. Dynamically changing topology and establishment of reliable path between nodes with minimum bandwidth consumption and lesser routing overheads are the main aims of ad- hoc network routing. To exploit effective and reliable communication among vehicles routing is a major factor which needs to be investigated. This paper intends to evaluate the performance of AODV and GOD routing protocols in city scenario under different application types and different fading environment using IEEE 802.11b MAC standard. Simulations are performed using NCTUns 6.0 (National Chung Tung University Network Simulator) and found that AODV performance is better in fading channel even if we increase rician factor. Also the performance of GOD is better in ideal fading (AWGN) channel, although the performance of routing protocols vary from one scenario to other and application traffic.
[...] Read more.In today’s world internet is used for data communication which is not secure enough to transfer highly confidential data so information hiding become a emerging research area. Steganography is an art to hiding secret message in a cover and it will also hide the fact that secret information is being sent over the communication network. In this paper a video steganography method is proposed using hash based round Least Significant Bit technique. Video steganography is a more secure than any other steganography technique in hiding information because of its complex structure it disables the intruder to attack. In this paper secret text message is embedded in the video file using proposed hash based round Least Significant Bit technique. This work will improve the information security and embedding capacity. The proposed technique hash based round Least Significant Bit will be compared with the hash based Least Significant Bit. The technique proposed in this paper is analysed in term of Peak Signal to Noise Ratio, Mean Square Error and Embedding capacity.
[...] Read more.