Accepted Papers

  • A Secret Sharing Based Verifiable Searchable Encryption Scheme for Cloud Storage
    Wenqi Ma, Qingbo Wu, Yusong Tan, Xiaoli Sun and Huaping Hu, National University of Defense Technology, China

    The increasing popularity of cloud storage services has lead companies and users to think about using these services for their storage needs. For the protection of data confidentiality, sensitive data has to be encrypted before outsourcing, which makes effective data utilization a very challenging task such as searching on these data. Although there are many searchable encryption schemes, most of them focus on how to search over encrypted data and how to support more advanced search queries but ignore how to verify the correctness of the search result. In this paper, we propose a searchable encryption scheme which can search on the encrypted documents while maintaining the ability to verify that the result is correct. In our scheme, the words of documents are encrypted with a secret sharing scheme and stored in different clouds. It provides a strong guarantee for the confidentiality of documents and keywords. In addition, the redundancy characteristic of secret sharing can be used to verify the correctness of the search result.

  • File Synchronization Systems Survey
    Zulqarnain Mehdi and Hani Ragab-Hassen, Heriot-Watt University, UAE

    Several solutions exist for file storage, sharing, and synchronization. Many of them involve a central server, or a collection of servers, that either store the files, or act as a gateway for them to be shared. Some systems take a decentralized approach, wherein interconnected users form a peer-to-peer (P2P) network, and partake in the sharing process: they share the files they possess with others, and can obtain the files owned by other peers.

    In this paper, we survey various technologies, both cloud-based and P2P-based, that users use to synchronize their files across the network, and discuss their strengths and weaknesses.

  • Automatic Detection of Moving Objects in Video Surveillance
    Larbi GUEZOULI and Hanane BELHANI, University of Batna 2, Algeria

    This work is in the field of video surveillance including motion detection. The video surveillance is one of essential techniques for automatic video analysis to extract crucial information or relevant scenes in video surveillance systems. The aim of our work is to propose solutions for the automatic detection of moving objects in real time with a surveillance camera. The detected objects are objects that have some geometric shape (circle, ellipse, square, and rectangle).

  • A Literature Review on Semantic Web - Understanding The Pioneers Perspective
    Salih Ismail and Talal Shaikh, Heriot Watt University, UAE

    There are various definitions, view and explanations about Semantic Web, its usage and its underlying architecture. However the various flavours of explanations seem to have swayed way off-topic to the real purpose of Semantic Web. In this paper, we try to review the literature of Semantic Web based on the original views of the pioneers of Semantic Web which includes, Sir Tim Berners-Lee, Dean Allemang, Ora Lassila and James Hendler. Understanding the vision of the pioneers of any technology is cornerstone to the development. Perhaps one of the reason why Semantic Web is not mainstream is because we have gone off-topic.

  • The Efficient Railway Signal Management System based on ZigBee Wireless Communication
    V. Vivek, D. Murugan and K. Rajalakshmi, Manonmaniam Sundaranar University, India

    This paper describes more efficient railway signal management system to provide easy handling and power consumption in railways. a method of intelligent railway signal controlling system based on ZigBee wireless communication technology is introduced in this paper, and the unique design scheme is also presented. base-station having a ZigBee hub to control and managing the in and out locomotives, the ZigBee hub has an unique code transmission function to educate the multiple locomotives by its own ZigBee based reception that is already developed. The system can normally achieve the railway signals with help of signal base-station control by the use of respective command like red, green. This system is more intelligent and humanized then the traditional railway signal controlling environment.

  • Investigation of Efficient cryptic Algorithm for cloud storage
    Ashok Sharma1, S.Jaloree2 and R.S.Thakur3, 1Barkatullah University, India, 2SATI, India and 3MANIT, India

    The unmatchable progress in Information Technology based Products has encouraged the customers to use free limited and ever available storage. It avoids users to invest in hardware for storage. Rapid data migration into cloud storages had been expected by IT industry with all of this development. However, the growth of data migration has not picked the pace as expected because of data security and speed of cryptographic algorithm’s issues in cloud. This paper, presents AES based encryption and decryption of various types of files to be uploaded in cloud for ensuring data security and confidentiality in clouding addition to it, we are introducing the in house developed crypter tools deployed in Amazon Cloud and through this tool; we are giving different types of files to AES and analyzing speed of AES in turns of time taken depending upon different types of files. Analysis of result produced will help to take decision regarding the selection of symmetric algorithm to be used while uploading data in cloud.

  • Evaluation and Study of Software Degradation in the Evolution of six Versions of Stable and Matured Open Source Software Framework
    Sayyed Garba Maisikeli, Al-Imam Muhammad Ibn Saud Islamic University, Kingdom of Saudi Arabia

    When a software system evolves, new requirements may be added, existing functionalities modified, or some structural change introduced. During such evolution, disorder may be introduced, complexity increased or unintended consequences introduced, producing ripple-effect across the system. JHotDraw (JHD), a well-tested and widely used open source Java-based graphics framework developed with the best software engineering practice was selected as a test suite. Six versions were profiled and data collected dynamically, from which two metrics were derived namely entropy and software maturity index. These metrics were used to investigate degradation as the software transitions from one version to another. This study observed that entropy tends to decrease as the software evolves. It was also found that a software product attains its lowest decrease in entropy at the turning point where its highest maturity index is attained, implying a possible correlation between the point of lowest decrease in entropy and software maturity index.

  • Success or Failure Identification for GitHub’s Open Source Projects
    Junaid Maqsood1, Syed Sarmad Ali2 and Iman Eshraghi3, 1Carleton University, Canada, 2Coventry University, United Kingdom and 3University of Ottawa, Canada

    In this research we have tried to identify successful and unsuccessful projects on GitHub from a sample of 5000 randomly picked projects in a number of randomly selected languages (Java, PHP, JavaScript, C#/C++, HTML). We have selected 1000 projects for each of these languages through the publicly available GitHub API, refined our dataset, and applied different machine learning algorithms to achieve our aim. We initially ran numerous queries against the dataset and found meaningful relationships and correlations between some of the fetched attributes which have an effect on the popularity of these projects. Later we could develop an application that will determine the success or failure of a specific open source project.

  • Automated Drone for Road Anomaly Detection (ADRAD)
    Kausic Gunasekar, Alex Noel Joseph Raj and Vijaylakshmi GV, VIT University, India

    The aim of this project is to build an automated system using drones (quad copters in this case) to identify abnormalities on the road such as speed-breakers and potholes which could be dangerous when they are not clearly visible during bad weather conditions or in the absence of proper lighting. The anomalies are identified and detected using a computer vision algorithm and after detection the anomalies are geo-tagged and the information is updated to a server for further use and display.