IITM Journal of Management and IT SOUVENIR National Conference on Emerging Trends in Information Technology Cyber Security: Contemporary Threats and Solutions Volume 7 Issue 1 January-June, 2016 CONTENTS Research Papers & Articles Page No. ● Security Enhancement in Wireless Menu Card with Network Attached Storage 3-7 - Stuti Saxena, Nargish Gupta, Sumit Gupta ● The Approach for the Prevention of Black Hole Attack in MANET 8-11 using DSR Protocol and Ant Colony Optimization Technique: A Review - Hashneet Kaur, Hardeep Kaur ● E-Commerce Frauds Using Parallel Imports 12-15 - Kartik Durga, Prachi Aggarwal, Anil Kumar ● Big Data and Cloud Security 16-24 - Sakshi Dewangan, Rajesh Singh Negi ● Cloud Computing: Security Issues and Challenges 25-31 - Sheetal Mavi ● An Effective Approach towards Encryption of Limited Data 32-36 - Ruchi Kawatra, Sapna Arora Saini ● Vulnerabilities of Data Storage Security in Big Data 37-41 - Govind Murari Upadhyay, Harsh Arora ● Cyber Security and Big Data Analytics 42-45 - Priya Bhardwaj, Nidhi ● Compartive Analysis of Visual Crptography Schemes 46-51 - Pramod Kumar Soni, Madhu Chauhan ● Securing Database using SQL Injection: A Review 52-56 - Isha Shingari, Priti Sharma ● Survey on Cloud Computing Security Issues 57-61 - Amanpreet Kaur Sara ● Survey Paper on Cyber Crime: A Threat to National Security 62-65 - Priyanka Khosla, Praveer Dubey IITM Journal of Management and IT Page No. ● Survey of Cyber Security in Smart Grid 66-73 - Nidhi Srivastava, Vivek Vikram Singh ● Cyber Crime – A Threat to Mankind 74-78 - Charul Nigam, Vaishali Singhal ● Enhancing ATM Security Using Fusion of Biometric Techniques 79-82 - Sakshi Singh, Simranjeet Kaur ● Comparative Analysis of IDS Approaches and their Techniques 83-88 - Osheen, Manpreet Singh, Raj Kumar Singh ● Big Data Security 89-94 - Dr. Prerna Mahajan, Geetika Gaba, Nagendra Singh Chauhan ● Biometrics: Human Body as a Password 95-99 - Shriya Jain, Ruby Dhaiya, Ashi Chauhan ● Artificial Intelligence Impact on Cyber Security 100-107 - Eshita Madhok, Ashutosh Gupta, Nidhi Grover ● A Comprehensive Study of Contemporary Tools and Techniques 108-120 in the Realm of Cyber Security - Dhananjay, Aishwarya Raman, Sheetal Kaushik ● Comparative Analysis of Intrusion Detection System Schemes for MANETs 121-124 - Ruby Dahiya, Manpreet Singh, Mohit Jalan ● Scientific Research and Development of Mobile Application 125-131 for Android Platform - Dimple Chawla, Rahul Aggarwal, Akansha Aggarwal ● Cyber Security: A Brief Encounter 132-133 - Anil Kumar Pandey 2 National Conference on Emerging Trends in Information Technology Security Enhancement in Wireless Menu Card with Network Attached Storage Stuti Saxena* Nargish Gupta** Sumit Gupta*** Abstract The presence of cellular technology and the development of portable devices provide a transparent yet potential framework for business purpose applications. M-commerce is considered as the new phase of e-commerce. This research work intends to propose a wireless menu card (WMC) for food chains. It refers that order will be placed using personal digital assistants (PDAs) such as Tablets or smart phones. This system will be using Wi-Fi storage device or say Network attached storage (NAS) which is virtually implemented on cloud through which you can store large data. So, through the use of PDAs and Wi-Fi storage device the system can provide increased capability, security, saving time, reduced human errors and hence will be able to provide better quality of service. Keywords: smart phones, Wi-Fi storage device, mobile application, wireless technology, business application, personal cloud, network attached storage. I. Introduction and information can be accessed anytime, anywhere [3]. In today’s ambitious world, people desire everything to take place at their door steps. The knowledge or As the wireless menu card system focusing on the food material which is saved in the system can be perceived chain, so without any technology, when customer over the mobile by the person anywhere in the world. places order the attendant needs to pen down orders. This encourages more to move towards wireless Then this order is taken to the kitchen, receipt is technology as the peoples are able to obtain generated, and place the requested menu. Such information anytime anywhere [1]. procedure view simple and easy, but this system leads Now a day there is an increase in users every day to human mistakes in communicating order when due to the fast growth in Wi-Fi telecommunication there is increase in customer’s number in course of and cyberspace [4]. Since mobile devices are becoming peak hours and also increases the work load on smaller, economical, better and more linked, they are attendants [6]. Thus to avoid all this problem the modifying the way people using and work with data. wireless menu card system uses tablets and Wi-Fi The ease and dynamic functionality provided by storage device. mobile devices, has lead to the inspiration for many In today’s time, smart phones are proficient of giving industries to interrogate the benefits of using connectivity where ever they are located along with them. Connectionless and handheld devices are supporting ranges of services and applications. They gaining attention as vendors are using the common are furnished with any wireless interfaces which can points of over tone computing, instant delivery be jointly oppressed to develop advanced enhancement Stuti Saxena* techniques that can increase throughput, improve Quality Analyst quality, capability [2]. The combination of mobile and NewZen Software Ltd., Noida, India Wi-Fi technologies can promote pervasive platform for developing business purpose applications [6] . Nargish Gupta** Department of IT Use of Wi-Fi storage device is just for creating your IITM, New Delhi, India own personal cloud with network attached storage. Sumit Gupta*** When we accumulate anything “in the cloud”, such Department of CSE, LNCT, Bhopal, India as storing music files, movies, documents and data on IITM Journal of Management and IT gigantic internet servers around the world. That way When the customer is over with his/ her ordering you can approach to your files wherever you are, process. These details are sent to the server from the whenever you want, on your laptop or smart phone device. Now the PDA used by a user is to be taken by or even a different computer. This is the basic idea of the waiter to be utilized by the other user. Thus CBTB, cloud storage. iMenu, WOS and FIWOS are good solution for the problems of traditional food ordering system. But these A personal cloud is necessarily your very own cloud systems have some limitations, so to overcome this storage [8]. Instead of using public clouds, a personal other system was developed called CWOS-RTF [6]. cloud helps you to manage all your information in In this system the problem of the waiter and the one secure place on your network so that you can share administrator is reduced as they had introduced the data, multimedia files, and access your content smart phones. Smart phone converges two portable pervasively. technologies i.e. Cell phones and PDAs to produce You can build your own personal cloud by either using products. CWOS-RTF consists of four modules. a Network Attached Storage (NAS) or by granting to (cid:2) The application for user’s to make order in smart an online cloud storage service. There are several phones. benefits of using a NAS as your personal cloud. For (cid:2) The web application for keeping track by the example, there is no need of monthly fees or due to owner. growth in data there are no increase costs. Also, you had an exact idea about your data that where it is and (cid:2) The database for owner to maintain the order details, and to update the menu. how or who can access it. (cid:2) The connectionless framework to support network Use of mobile telecommunication may tend to two communications. kinds of effects on business purpose operations: Now waiter need not to roam about to take order the (cid:2) It eases the connection among employee, customer customer will themselves place an order using their and owner. As a result better communication can own smart phones. Thus in this now the customer increases the capability and profitability. must possess the smart phones, this leads to its (cid:2) Due to changing data access patterns it renovates limitation. business processes [5]. Smart phone technologies are implemented to support telemedicine services for different health problems like II. Related Work urinary incontinence, diabetes and blood coagulation. To improve the traditional food ordering system many There are powerful smart phone applications refined previous work had been made by using wireless for healthcare purposes to detect the heart failure, to technology, such as iMenu[7], FIWOS [3], ,and WOS monitor medicine intake, and to confront the obesity [4]. Many lounges and restaurants had implemented challenges etc [9]. There is a system called Wedjat [10]. and developed many PDA-based mobile applications This system is developed to issue reminders to patients, for commercial use. Easy- Order is an initial e- record time of medicine in-take informs medicine commerce approaches developed on pervasive intake directions, and informs medicine intake technology designed to combine with mainframe directions. Moreover, machine vision can also be computers. iMenu is an initial wireless web-based combined with smart phones to perceive traffic signage approach for ordering system which builds pervasive for safety at road [11]. Disaster Alert System is one of computing systems using connectionless multi-tiered the smart phone applications that can provide effective internet framework [7]. measures in detecting disaster situations [12]. The smart phones also fulfill the graphical demands of the Color by the Bay (CBTB) is another PDA- based customers. connectionless food ordering system which is used at Singapore. In this system the users at CBTB can give Concentrating on the discussed limitations, we order with the help of PDA provided by the restaurant. proposed our work. We had also used smart phones as 4 National Conference on Emerging Trends in Information Technology IITM Journal of Management and IT tablet. In this the customer’s not having smart phones (cid:2) A Desktop Application for owner to make can also place order as all the tables will have their updating in storage device and to see details. own tablets provided by the food outlet itself. As we have mentioned that we are using Wi-Fi storage device. This device helps us to create our own personal III. Proposed Work cloud with network attached storage. That way we can As we have already discussed the conventional food approach to our files wherever we are, whenever we ordering system i.e. taking note of customer’s order want. Instead of using public clouds, a personal cloud using paper and pen. These systems are usually prone helps you to manage all your information in one secure to manual mistakes. Oder can be mislaid or even place on your network so that you can share data, wrongly noted at the time of rush. Receipts are multimedia files, and access your content pervasively generated in written form which leads to difficulty in An Application for tablets which can read the content maintaining record for future use. The objective of from NAS for customer’s to make order. Thus we will this proposed system is to overcome such hassle and develop an application which can easily read the data the limitation of related work. In our Wireless Menu from Wi-Fi Storage device. The Application will do Card (WMC) system we had different modules: the following activities: (cid:2) Must display the name of the storage device in (cid:2) Use of Wi-Fi storage device as a network attached range storage. (cid:2) Upon selecting the particular storage device the (cid:2) An Application for tablets which can read the content from the Wi-Fi device will be displayed content from NAS for customer’s to make order. on the screen on welcome screen. Fig. 1: Flow of process at user side Volume 7, Issue 1 • January-June, 2016 5 IITM Journal of Management and IT Fig. 2: Flow of process at admin side (cid:2) Once user taps the welcome screen it should show (cid:2) This content must be encrypted in a bundle and the list of categories in a drop down list with related the file format should be readable by the mobile food items ex: Starters, Drinks and Main Course app and desktop application only. etc. (cid:2) Owner should have ability to add any number of (cid:2) Once the user selects a category (Ex Starter from categories, items, columns, etc. And the App should above example), it should show the list of items be intelligent enough to accommodate these changes. from that category – this screen must have a back/ As this wireless menu card system is basically focusing home button. on the food outlets. Thus, when a customer will come to food outlets there will be a tablet on their table (cid:2) Once user selects an item, the product details which will show the outlets name. Then the customer should be displayed (ex: an image of the product, will select the respective outlet in which he/she more description, etc.) – this screen must have interested to order and will place the order. The device back/home navigation button. will show all the respective menu details with the resent Now the user can place the order through the tablet. offers. If there is any changes in the menu any day the The order will be received at the kitchen end. The respective content will be updated with the help of Desktop Application will be a simple, easy to use desktop application. application installed in each food outlet so they can easily update the menu on-demand on their own. This IV. Conclusion application will be cloud enabled and it will update In this paper, we have proposed a wireless menu card the content in Wi-Fi storage device. However, this system with network attached storage. We have focused application should adhere to the following high level on use of smart phones i.e. tablet in place of using standard requirements: PDAs to provide efficient interface for customers to (cid:2) Authentication (so that only manager’s can update order and view menu. With Wi-Fi storage device we the menu). have introduced network attached storage to store data on private cloud. This system also overcomes the (cid:2) Once the restaurant owner makes the changes in limitation that every customer must carry its own smart the desktop application, there should be a button phone instead in this it will be provided by the food which allows the manager to publish the content outlet itself. Thus through this system we had tried to to the device. improve the service efficiency. 6 National Conference on Emerging Trends in Information Technology IITM Journal of Management and IT References 1. D.Shiny Irene, R.Dhanalakshmi, “Video Surveillance System And Content Sharing Between PC And Mobile Using Android”, IEEE, December 2011. 2. Sanaa Sharafeddine, Karim Jahed, Nadine Abbas, Elias Yaacoub, and Zaher Dawy, “Exploiting Multiple Wireless Interfaces in Smartphones for Traffic Offloading” , First International Black Sea Conference on Communications and Networking, 2013 3. K. J. Patel, et al., “PDA-based Wireless Food Ordering System for Hospitality Industry - A Case Study of Box Hill Institute,” in Wireless Telecommunications Symposium 2007, Pomona, CA, 2007. 4. K. Kamarudin, et al.,”The Application of Wireless Food Ordering System,” MASAUM Journal of Computing, vol. 1, pp. 178-184, 2009. 5. T.-P. Liang, et al., “Adoption of mobile technology in business: a fitviability model,” Industrial Management & Data Systems, vol. 107, pp. 1154-1169, 2007. 6. Noor Azah Samsudin, Shamsul Kamal Ahmad Khalid, Mohd Fikry Akmal Mohd Kohar, Zulkifli Senin, Mohd Nor Ihkasan, “A customizable wireless food ordering system with realtime customer feedback”, IEEE, 2011. 7. Y. Xiang, W. Zhou and M. Chowdhury, “Toward pervasive computing in restaurant”, First International Conference on E-Business and Telecommunication Networks (ICETE 2004), Setubal, Portugal, 25-28 August, 2004. 8. Bhushan A.Ugale, Piyush Soni, Tsering Pema, and Anirudha Patil “Role of Cloud Computing for Smart Grid of India and its Cyber Security”, IEEE, December, 2011. 9. A. Holopainen, et al., “Use of smart phone technologies to offer easy-touse and cost-effective telemedicine services,” in Proceedings of the First International Conference on the Digital Society (ICDS’07), 2007. 10. J. K. Zao, et al., “Smart Phone Based Medicine In-take Scheduler, Reminder and Monitor, July 2010, Poster Session, 2010.,” in Proceedings of IEEE HealthCom, 2010. 11. W. H. Ling and W. C. Seng, “Traffic sign recognition model on mobile device,” in IEEE Symposium on Computers and Informatics, 2011. 12. J. Lee, et al., “A GIS based design for a smartphone disaster information service application,” in 1st ACIS/GNU International Conference on Computers, Networks, Systems, and Industrial Engineering, 2011. Volume 7, Issue 1 (cid:129) January-June, 2016 7 The Approach for the Prevention of Black Hole Attack in MANET using DSR Protocol and Ant Colony Optimization Technique: A Review Hashneet Kaur* Hardeep Kaur** Abstract Ad Hoc Networks (MANETs) are self-organized network where nodes are free to move in any direction. MANET doesn’t need any centralized system. Due to its dynamicity, Black hole attack is a serious security issue to be resolved. It takes place when a malicious node called as black hole enters into the network. Black hole node shows its fake behaviour during the process of route discovery. Today, many prevention techniques have been proposed for MANET. However, in the presence of fake nodes, the networks are subjected to different kinds of attacks.In this problem, a fake node advertises itself of having a shortest path to another node whose packets the fake node want to drop. In this flooding process, if the reply from the actual node reaches later than the fake node reply as requested by the main node .A forging path is created via a fake node. An ideal path is one in which the packet reach to destination with minimum delay and lesser overhead. In this paper we apply Dynamic Source Routing (DSR) protocol in order to prevent black hole attack using Ant Colony Optimization. Keywords: Black Hole Attack, Dynamic Source Routing, Ant Colony Optimization. I. Introduction Whenever a node requires sending data from source to destination, it runs an appropriate path finding Wireless network is the network in which nodes are algorithm. connected via a wireless link having no fixed infrastructure. All nodes are having with same Hence in addition to acting as hosts, each mobile node processing power .In MANETs all the nodes are does the function of routing and forward messages cooperate in distributed manner. The main advantage for other mobile nodes [1]. Most important of wireless network is the number of clients is networking operations include routing and network connected in a wide range. Limited bandwidth, open management [2].There are three types of routing medium and memory are the main disadvantages of protocols broadly classified as proactive routing wireless network. The two basic models are fixed protocol, reactive routing protocol, Hybrid routing backbone wireless system and Wireless Mobile Ad hoc protocol. Network (MANET). An adhoc network is(decentralized) i.e. they have no central control for II. Routing Protocols network operation as well as handling it is a multi- In order to find out suitable routes between hop routing process and also a light weight terminal communication nodes routing protocols act as second with small memory size and low CPU capability. hand. It is a self-directed collection of mobile users MANETs should be self-configured as well as self built. that speak moderately over bandwidth constraint Hashneet Kaur* wireless link [3].THE network topology keeps on Student – MTech. changing unpredictably over time and place as nodes Department of Electronics Technology are free to move. The network is de-centralized and all Guru Nanak Dev University, Amritsar the network activities like discover the topology and delivering messages must be execute by the nodes [4]. Hardeep Kaur** Routing protocols are broadly classified into two Department of Electronics Technology categories mainly [proactive, reactive]. Guru Nanak Dev University, Amritsar
Description: