Survey on Sensitive Data Storage and Deletion Methods Seminar Topic

Introduction to Survey on Sensitive Data Storage and Deletion Methods Seminar Topic:

This paper discussed about the survey which summarizes the methods of providing confidential storage of information in personal computing environments. Sensitive data is lost due to theft or improper disposal of storage media and there are many methods exist to protect the sensitive data from unauthorized storage or deletion. 

Overview:

Sensitive information is storing on electronic storage devices as the usage of paper is reduced gradually.  There are many incidences happened where the sensitive information has misused or deleted by an unauthorized users. The two components helps to safeguard the data privacy on electronic storage media are the data must be stored in a confidential manner without causing problem during normal use and at the time of disposal, confidential data must be removed from storage media in an irrecoverable manner.  This survey explains various confidential data storage and deletion techniques with the aim of find the best solution which provides protection to the sensitive data.

This survey focused on single-user and non-distributed computing environments. Always, the threat model assumes that attacks to recover confidential data when the computer is powered off.  But attacks occurred after the users logged in are out of scope of this survey.  Confidential storage methods are difficult to implement as these methods are very complex to implement on sensitive data.  Software-based solutions to confidential storage of data do not require any specialized hardware and these solutions are widely available in market today.  Bit locker encrypts a specific volume sector-by-sector with the help of a diffuser.

Conclusions:

This survey summarizes the benefits and limitation of confidential storage and deletion methods. Comparison of confidential data handling methods also takes place in this suvey, while comparing it considers the characteristics like confidentiality, limitations, performance and ease-of-use.  Also discussed the overall trends of various approaches and issues faced in the data lifetime problem. 

 Download  Survey on Sensitive Data Storage and Deletion Methods Seminar Topic.

Solution to Privacy Issues in RFID Item-level Applications

Introduction to Solution to Privacy Issues in RFID Item-level Applications Project:

This paper discussed about a solution that addresses the privacy issues of Radio Frequency Identification item-level applications and also demonstrates a solution which provides high security with low manufacturing and management cost. 

Overview: 

Automated identification is possible in RFID without the knowledge of tag bearer and it is one of the major privacy concerns of RFID.  In RFID item-level applications this unauthorized read can be prevented with the help of traditional cryptographic operations like authentication and encryption but these operations are too costly in RFID. Automated identification also raises privacy concerns like inventorying and clandestine tracking.

Many researches has been carried out to provide consumer privacy in the RFID world. Physical approaches such as peeling off tags antennas or physical triggers do not provide protection from clandestine inventorying. The trade-off between cryptographic operations and low-cost has become a major challenge in designing RFID tags.  With the new proposed RFID structure, the tags need not store more information. Tags need to carry only the ID numbers to avoid clandestine and eavesdropping tracking.  Information security, integrity and non-repudiation are protected by the database in the new RFID structure. 

Conclusions 

This paper proposed a solution to the privacy concerns in RFID in item-level applications at low manufacturing and maintenance cost. In this system, RFID tags do not need a PIN or a secret key authentication which in turn reduces the costly key distribution and management.  Tags carry only ID numbers and uses hash function to prevent clandestine tracking.  This eliminates eavesdropping attacks because no reader will get meaningful information from tag responses.  Information related to tags is so secured and stored in a back-end database.

This information will send to end-users along the supply chains through cryptographic operations. Burden of using cryptographic operations shifts from tags to database so tags are easy to manufacture and maintain.  Tags carry only ID numbers, which are divided into segments, which will helps to reduce computational complexity of database management. 

Smart Gateway Design for WSN Health Care System Project Report

Introduction to Smart Gateway Design for WSN Health Care System Project:

This paper discussed about a smart gateway design which designed especially for WSN health care systems at home environments by building a bridge between different networks to get faster response time during emergencies. The communication protocols are also designed between WSN, gateway and remote servers.  Researches has been carried out on this smart gateway with a wireless home e-health care sensor network in order to show that this gateway is reliable and has low power consumption and latency. 

Overview: 

Wireless Sensor Networks (WSN) have been used in many areas because of its numerous advantages. WSNs are also using in health care systems by integrating health care, sensor network and wireless communications together.  Smart gateway designed by following embedded system development processes and this resultant designed gateway is used in WSN health care systems.

 In a health care system, time required detecting patient’s health state and informing the same to care givers is very important.  In WSN, sensor nodes always must be in working mode and less interfere channel. Data from WSN is analyzed by the proposed gateway or by any central server.  With the help of WSN, the data about health state of patient’s must reach health care takers on time.  Health care takers must get notice when patient’s health is in danger. 

            Smart gateway is classified into simple and intelligent models. In simple model, connection exists between WSN and smart gateway, and between smart gateway and health care takers. Communication protocol exists between WSN and PCN in transport layers and it should exist between WSN and HCC in application layer. 

Data transfers to HCC from WSN and commands received from HCC which need to be implemented. In intelligent model, connection exists between WSN and smart gateway, and between smart gateway and remote server.  Onboard database plays an important role in receiving and storing data from WSN and informing the same to HCC.  Reporting of patient’s health state to remote server takes place periodically. 

 Download  Smart Gateway Design for WSN Health Care System Project Report.

Secure Routing Protocol for Mobile ADHOC Network CSE Project

Introduction:

This paper discussed about the challenges in Mobile Adhoc Network and proposed a secure algorithm to defend attacks on routing protocols.

Overview:

The main challenge in MANET is that a mobile link is most susceptible to attacks. There are both external and internal attacks acts against routing protocols.  An external attack generates by a router which pretends as a trusted router and not participates in the actual routing process.  These routers may cause Denial of Service attack or can advertise false routing information.  An internal attack generates by a malicious or faulty router inside a network domain. There is a need to design and develop secure routing protocols for MANET. These secure protocols are divided into two categories. 1. Protocols adding security mechanisms to the existing routing protocols, 2. Protocols are designed to detect and defect specific attacks.

Key management mechanism, Route discovery and attack detection are the three major tasks involved in designing a secure network protocol over MANET.  Attacks can be done using Modification and Impersonation. If the contents of routing packet are modified by including some incorrect information in the network leads to an attack in the network.  If a malicious node tries to impersonate a node and send data on its behalf, then we can consider such attach as attack using impersonation. This attack will combines with modification attack and then comes as an attack in a network.

Conclusion:

One of the challenging problems in network is how to detect and defend attacks on routing protocols.  This paper proposed an algorithm which can detects the internal attacks with the help of message and route redundancy. This paper also proposed an optimal routing algorithm with specific routing metric which based on a node’s performance and trustworthiness. These two proposed algorithms are integrated with existing AODV and DSR routing protocols for MANETs (Mobile Adhoc Networks) 

 Download  Secure Routing Protocol for Mobile ADHOC Network CSE Project.

Image Steganography Technique -Based On Block-DCT and Huffman Encoding

Introduction: 

This paper describes about a Image steganography technique to hide information into a cover page based on Block-DCT, and Huffman coding. Huffman encoding is on the secret messages/images before embedding and each bit of secret message/image is embedded in the frequency domain by modifying the least significant bit of cover image blocks DCT coefficients. This algorithm has a good invisibility and capacity. Peak signal to Noise Radio of cover image with stego-image gives better results when compared to that of existing steganography approaches. The secret message/image cannot be extracted without knowing Huffman table and decoding rules. 

Image Steganography Algorithm: 

The main objective of Steganography is the true message cannot able to observe by an observer. Unauthorized users are not supports to differentiate a cover-image i.e., an image does not contain an secret message and stego-mage i.e., cover-image is modified and results a stego-image with secret message.  Now-a-days steganograhpy is widely used in computer where digital data acts as carriers and networks acts as speed delivery channels.  

 Image steganography schemes are classified spatial-domain based category and transform-domain based category.  In spatial domain approaches, the embedding of secret messages takes place directly. The simplest stegonographic method in spatial domain is Least Significant Bits Insertion method.   Secret image is encoded using Huffman coding and then the secret image is embedded into cover image. Huffman codes are optimal codes in which one symbol maps to one code word. 

Conclusion: 

In spatial domain, a steganography process improved security and image quality, compared to that of existing algorithms. It is very difficult to differentiate original image with the steganography algorithm resultant stego-image.  This algorithm also provides 3 layers of security to cover image transformation. But the demand for image robustness in steganography is not as much as in watermarking field.  Image in steganography process neglects the basic demand of robustness. This algorithm performs few operations and Huffman encoding of secret image helps to protect the images from stealing or misuse by unintended users. 

 Download  Image Steganography Technique -Based On Block-DCT and Huffman Encoding.

A Novel Algorithm for Hiding Sensitive Frequent Item Sets

Introduction to A Novel Algorithm for Hiding Sensitive Frequent Item Sets Project:

This paper discussed about fast hiding sensitive frequent itemsets (FHSFI) approach to hide sensitive frequent itemsets with one database scan and generate limited side effects. 

Overview: 

In a database, with an association analyzer, if an itemset with support above a given minimal support then that itemset is called a frequent itemset.  There is a need to analyze the correlations between the sensitive itemsets and each transaction in a database.  The transactions order to be altered can be decided based on the each transaction weight which is given by heuristic function. 

So by this there is a possibility of saving time by only consider the actual required transactions to modified and then hide the given sensitive frequent itemsets. There is no need to deal with all the transactions to hide the sensitive frequent itemsets.  FHSFI provides the facility to hide the SFI without generating many side effects but still there is loss in rule sets, so researches have been takes place to overcome this issue. The main goal of FHSFI is to hide sensitive frequent itemsets by allowing minimum support thresholds, by limited side effects and by executed only one database scan. 

Conclusions: 

In network and data mining world, there is a severe need to protect the confidentiality of sensitive information in a database. The relationships hidden among large data sets are in a form of frequent item sets or association rules.  Privacypreserving data mining is an important issue which needs the immediate attentions in the current industry. 

When the support of each given sensitive itemsets are reduced then it will help to hide sensitive frequent itemsets, and this can be achieved by modifying transaction in database but at the same time will have enough side effects due to it.  So FHSFI emerged to hide sensitive frequent itemsets with limited side effects.

 Download  A Novel Algorithm for Hiding Sensitive Frequent Item Sets.

Forward-Secure Digital Signature Scheme Project Abstract

Introduction to Forward-Secure Digital Signature Scheme Project:

This paper discussed about “forward security” , that is a security approach which ensures using secrets for short time periods and also reduces the damage when the secrets are exposed. This paper also describes how to design a forward-secure signature scheme.

Overview:

In a forward-secure signature scheme, if the current secret key is compromised, signatures from past time periods can still be trusted. A forward-secure digital signature scheme is a key-evolving digital signature scheme. Like a standard signature scheme, a key-evolving digital signature scheme contains algorithms related to key generation, signing and verification. Throughout the lifetime of this scheme, the public key remains unchanged. In this scheme, operations are divided into certain time periods and each period uses a different secret key to sign a message.

A public update algorithm in this scheme is used to computes the secret key for the new time period based on the previous period. But in this scheme we can able to get the secret key for the current period but not able to get any previously used secret keys. So, in order to overcome this drawback a forward-secure signature scheme comes into picture.
The public key for the forward-secure scheme is located at the root of the tree. In order to sign a message in a certain time period there is a need to use the secret key of the corresponding leaf and attach to the signature a certification chain depends on the root path to that leaf.  In this scheme nodes are created dynamically to maintain forward security. 

Transformation form secure identification scheme into a secure signature scheme without depends on random oracles is based on the concept of authentication trees.      Forward-secure signature scheme is designed by not relying on random oracles.  In this scheme whole tree nodes are created dynamically similar to that of GMR scheme.

The resulting scheme needs to remember previous message signature to compute the next signature. The length of each signature grows along with the signed messages. The main advantage of Forward-Secure Digital Signature Scheme is that we can obtain a signature scheme which is forward secured based on the security of the corresponding identification scheme.

A New Approach to Intrusion Detection System Evaluation in Distributed Real-Time Systems

Introduction: 

This paper describes about a metric-based approach which will help Real-Time systems to get the best facilities by making use of best intrusion detection system.  This metric-based approach addresses all real-time and distributed processing issues. Also, this paper discussed about the metric scorecard to test 3 commercial intrusion detections systems. 

Intrusion Detection Systems:

Always Intrusion detection systems checks the effectiveness of other access controls and by this provides defense-in-depth.  ID’s detects both internal misuse of computer and network resources and also external attacks. ID technologies always points to a soft real-time problems. To prevent the damages from intrusion there is a severe need that arrived data must be analyzed and alerts must be issued in equal intervals of time. Besides, IDs considers the needs of real-time and distributed system before providing protection to those.

IDs must not disturb system performance.  IDS are classified into three types signature-based, anomaly-based and hybrid based on the corresponding detection mechanisms.  Anomaly-based or behavior-based IDS are helpful to detect behavior which is inconsistent with normal behavior. Anomaly-based IDS generates a suspicious activity alert when it detects hundreds of login within a few seconds.  A signature-based ID detects patterns in network traffic. Signature-based IDS are also known as “misuse-based” or “knowledge-based” IDS.  A hybrid IDS uses either series or parallel technologies. Based on monitoring scope IDS are characterized further. IDs that monitors one or more or both hosts in a network.  IDS monitors a network collects and also analyzes the packets from network.

Conclusions:

Information security services frequently have conflicts with the highly distributed and real-time systems performance. These systems grow more complex and constrained. These issues can be overcome by intrusion detection. Intrusion detections assure integrity by keeping it clear whenever access controls have failed. This paper also proposed a testing technology to test ID products as per user-definable and dynamically-changing standards.

An Efficient Wireless Architecture to Connect Rural Regions Project

Introduction to An Efficient Wireless Architecture to Connect Rural Regions Project:

This paper discussed about a new wireless network architecture WiRE (Wi-Fi-based Rural Extensions), which provides connectivity to rural regions at very low costs. To enhance the features of WiRE architectural, this paper also addressed the challenges at various protocols. Operations costs of WiMAX and cellular networks are higher in rural areas, because significant power consumption requires covering large areas with low user densities. So there is a need of WiRE network to provide connectivity to rural areas at low cost. 

WiRE Network Architecture: 

The main working principle of WiRE is to provide coverage to specific rural regions where connectivity is more required rather than providing broad coverage. The six important network components of WiRE are wireless nodes, point-to-multipoint links, low cost computing devices, point-to-point links, multi-radio mesh links and large local storage.  The scope of WiRE network architecture is much broader when compared to that of WiLD networks. A wiRE network provides rural connectivity, supports wide range of applications and also focuses on challenges across different protocol layers. WiRE network provider uses unlicensed spectrum so there is no need to pay spectrum costs.

As the manufactures of Wi-Fi chipsets supports open source drivers which help to tailor the protocol in order to meet our needs.  Low power single board computers are used by every wireless router in a WiRE network. PCs/ kiosks or the cell phones are the end-devices of WiRE. WiRE architecture is helpful to enable specific services like telephony services, tele consultation and telemedicine services, interactive distance learning service and mobile banking services to rural regions. But in order to provide the above mentioned services, WiRE network has to face some challenges which come across network and transport layers.  WiRE network is designed in a way to tolerate all failures and address all challenges in these two layers. 

Conclusions:

The WiRE architecture is developed for the typical rural regions to connect them to the city. WiRE is a wireless distribution network which extends connectivity from the city to village.

 Download  An Efficient Wireless Architecture to Connect Rural Regions Project.

Property Management System Implementation for a Organization Project

Introduction to Property Management System Implementation for a Organization Project:

This paper discussed about the how to manage the property in an organization and discussed about the importance of Property management system. Locating, tracking and controlling fixed assets can be called as Property Management. Solid Benefits can be obtained by an organization with the help of effective Controlling and Tracking of Property.

Overview:

When there is a tracking of fixed assets then can obtain benefits with the proper utilization of those fixed assets.  Property Managements includes few tasks like controlling the property, accounting the fixed asset, managing the maintenance, control the inventory, security control, Warranty control, Calibration system control, billing and invoicing and tool control. A Property Management Program helps in accurate accounting and efficient compilation.  Ultimately, the success of a Property Management Program depends on the support of top management and the commitment of an entire organization. 

Across a wide range of organizational activities and concerns, using Property identification Program yields effective and numerous benefits. For implementing an effective tracking and controlling program there is a need to gather inputs from the employees during planning of the program and whose support is needed for implementing and perpetuating the program.  

NPMA and ASTM organizations can assist the organization employees in implementing property management Program. Need to determine what property information records are needed and also determine what are the rules and regulations that applies to that organization.  Determine the number of assets to be located recorded and estimate the cost for identification and protection of those assets from unauthorized usage. 

There is a need to define which software should use for organization property identification. Should prepare a detailed written copy about the assets and must make it as a part of company’s policy.  A Property Management program with procedures documents will help the organization to meet ISO standards.  Each asset should be recorded in a detailed manner with necessary details like when the assets is purchased , from where it is purchased,  current cost and asset benefits.

 Download  Property Management System Implementation for a Organization Project.