Gosain A.,Guru Gobind Singh Indraprastha University |
Arora A.,National Informatics Center
Procedia Computer Science | Year: 2015
As Data Warehouse store huge amount of data with the span of more than decades, the security of this huge information base is crucial for the sustainability and reliability of data warehouse. Since its advent the data warehouse has gone through various technological changes, which has prompted changes in the security strategies as well. This article, is taking a deep look at the various changes in the security mechanisms of the Data Warehouse, along with the changes in the strategies for the data warehouse development. It helps in understanding the various security aspects related to Data Warehouse, in coherence with the different methodologies employed for its development and functioning. © 2015 The Authors. Published by Elsevier B.V.
Elekar K.S.,National Informatics Center
IEEE International Conference on Computer Communication and Control, IC4 2015 | Year: 2015
As Internet continues to influence our day to day activities like eCommerce, eGoverence, eEducation etc. the threat from hackers has also increased. Due to which many researcher thinking intrusion detection systems as fundamental line of defense. However, many commercially available intrusion detection systems are predominantly signature-based that are designed to detect known attacks. These systems require frequent updates of signature or rules and they are not capable of detecting unknown attacks. One of the solution is use of anomaly base intrusion detection systems which are extremely effective in detecting known as well as unknown attacks. One of the major problem with anomaly base intrusion detection systems is detection of high false alarm rate. In this paper, we provide solution to increase attack detection rate while minimizing high false alarm rate by combining various data mining techniques. © 2015 IEEE.
Das R.K.,National Informatics Center |
Patra M.R.,Berhampur University
International Journal of Electronic Governance | Year: 2010
This paper puts forth our experience while implementing the 'e-Grama' project in one of the relatively developed districts of Orissa Province in India which was later extended to other underdeveloped districts of the province. Further the paper describes how the project helped as a tool to bridge the digital divide and capacity building in the rural areas. It also highlights the role of youth clubs and NGOs in the successful implementation of the project. Further, it is shown how the problems encountered during project implementation in the rural areas could be solved through the public-private-people partnership model of 'e-Grama'. © Copyright 2010 Inderscience Enterprises Ltd.
Kundu A.,National Informatics Center
2012 International Conference on Informatics, Electronics and Vision, ICIEV 2012 | Year: 2012
The paper introduces a decentralized chat system (developed in J2SE - Java Server Edition) for both intranet and internet. It is a zero-configuration model allowing users to simply run the application to communicate. Core to the system is an index table which notifies each user about the presence of other peers using the application over the network. Features include: Simultaneous communication between 'n' numbers of peers, multi-user communication invitees, conference, and file transfer between two peers. The communication system is based on simple Socket programming with IP and Port Address being detected by the Index. The user interface is prepared using Swing and AWT functionality. © 2012 IEEE.
Banik S.,Technical University of Denmark |
Jha S.,National Informatics Center
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015
Over the past few years, an attractive design paradigm has emerged, that aims to produce new stream cipher designs, by combining one or more independently produced RC4 states. The ciphers so produced turn out to be faster than RC4 on any software platform, mainly because the average number of internal operations used in the cipher per byte of keystream produced is usually lesser than RC4. One of the main efforts of the designers is to ensure that the existing weaknesses of RC4 are not carried over to the new ciphers so designed. In this work we will look at two such ciphers RC4B (proposed by Zhang et. al.) and Quad-RC4/m-RC4 (proposed by Maitra et. al.). We will propose distinguishing attacks against all these ciphers, and look at certain design flaws that made these ciphers vulnerable. © Springer International Publishing Switzerland 2015.
Muttoo S.K.,University of Delhi |
Kumar V.,National Informatics Center
International Journal of Information Security and Privacy | Year: 2010
In this paper, an algorithm to embed information in a map along Hamiltonian path is presented. A file based data structure in which a graph is treated as a composition of three components, node, segment and intermediate points that constitute a segment, is used to store a graph. In a map with N nodes, each node can repre sent ⌈log 2N⌉ bits from message bit strings. Any bits (≥ 0) from message between bit strings represented by adjacent nodes are embedded in a segment. In the case of a multi graph, a segment is selected based on the last two bits in the nodes. A pre Hamiltonian path is determined in the map starting from node represented by the first ⌈log 2N⌉ bits from message string to the last bit string ⌈log 2N⌉. The method is tested on different maps and messages of different sizes and robust results have been observed. Retrieval is based on the key (S, |m|, Σ) and traversing along the pre Hamiltonian path starting from node S. Copyright © 2010, IGI Global.
Suri P.K.,National Informatics Center |
Sushil,Indian Institute of Technology Delhi
Electronic Government | Year: 2012
This paper attempts to study the conventional planning and implementation framework and examine its suitability for handling the dynamic context of e-governance. The SAP-LAP framework is used to conduct a qualitative gap analysis. Illustrative empirical evidence is drawn from independent surveys of government officials and intended beneficiaries pertaining to select agriculture related e-governance projects in India. Learning issues have been synthesised to bring out strategic recommendations for refining the conventional framework to suit the context of e-governance. The gap analysis has led to conceptualisation of two research frameworks, which need to be validated empirically. Cross case analysis of a few ongoing projects, based on interpretation of the validated frameworks, is expected to provide the necessary foundation for further research for evolving an adaptive strategic framework for improving the performance of e-governance projects. Copyright © 2012 Inderscience Enterprises Ltd.
Sharma R.,Himachal Pradesh University |
Sood M.,Himachal Pradesh University |
Sharma D.,National Informatics Center
Communications in Computer and Information Science | Year: 2011
Cloud computing, a more recent computing paradigm, has evolved from a variety of legacy technologies that include Service oriented Architecture (SOA) and Web services besides several others. The software services in a cloud must be developed based on the service-oriented approach, in order to derive their full potential and benefits. Since, SOA inherently nurtures interoperability; it will enhance the integration and interaction among the cloud software services. Also, leveraging the Model Driven Architecture (MDA) approach to develop individual cloud software services will result in services that are more robust, flexible and agile in the wake of ever changing technologies. This paper is an attempt by the authors to lay emphasis on the convergence of Cloud computing, SOA and MDA in development of optimum business solutions. © 2011 Springer-Verlag.
Gosain A.,Guru Gobind Singh Indraprastha University |
Arora A.,National Informatics Center
Communications in Computer and Information Science | Year: 2016
Data Warehouse (DW) security has emerged as a crucial aspect since for the sake of high availability data warehouses started connected to internet. In order to comply with the security requirements, the authentication of legitimate users by verification of user credentials like username, password, etc. has become a standard. On successful verification, different variations of Role Based Access Control (RBAC) techniques are being used restricting user access to the facts and dimensions. But these RBAC’s can only restrict the user access as per their respective roles and there is no check on the behavior pattern of the user access. In this paper, a two level signature based behavior analysis model has been introduced to keep a check on the user’s access pattern. At the first level, the user provides its authentication credentials. On successful verification of these credentials, the user has been allowed to access elements as per its role. Once the user tries to access the DW elements his access pattern will be recorded to form usage access signature. Over the period of time user access profile is created which is used to match the signature of the user. If in case, the user’s signature does not fit in the user access profile created over the period of time, the second level of verification will be performed in a form of secret question etc. The user query will be processed only on successful clearing of the second authentication level; else the current query will be suspended with regret message from the system. This further strengthens the security of the DW even on the compromise of the user’s initial entry credentials. © Springer Nature Singapore Pte Ltd. 2016.
National Informatics Center | Date: 2011-05-24
Computer software, namely, for collaborative use with computer aided design and computer aided manufacturing which can be accessed via a global computer network.