CFP last date
20 January 2025
Reseach Article

Evidence based Access Control over Web Services using Multi Security

by E. S. Shameem Sulthana, S.Kanmani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 3
Year of Publication: 2011
Authors: E. S. Shameem Sulthana, S.Kanmani
10.5120/2204-2798

E. S. Shameem Sulthana, S.Kanmani . Evidence based Access Control over Web Services using Multi Security. International Journal of Computer Applications. 17, 3 ( March 2011), 1-7. DOI=10.5120/2204-2798

@article{ 10.5120/2204-2798,
author = { E. S. Shameem Sulthana, S.Kanmani },
title = { Evidence based Access Control over Web Services using Multi Security },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 3 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number3/2204-2798/ },
doi = { 10.5120/2204-2798 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:38.120168+05:30
%A E. S. Shameem Sulthana
%A S.Kanmani
%T Evidence based Access Control over Web Services using Multi Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 3
%P 1-7
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In previous research the proposed system has determined the identity proof for the voters using hashing algorithms (MD5 and SHA1) through internet. From those results it founds that the security is not sufficient for the data. To protect the election accuracy, different methods have been proposed for hiding information. In this paper the proposed system embedded the information. The embedding is typically parameterized by a separate key. Without Knowledge about this key, it is difficult for a third party to detect or remove the embedded material. In this paper we are proposing a single text or a binary image is automatically scattered and embedded in video frames with BPCS method, genetic distortion audio tracks and text image with automated dynamic key for every transaction. The Dynamic key is generated by the calculation of the time stamp and efficient key is classified by the RSA cryptographic algorithm and managed in wireless networks. Here a single key is compressed of all the three keys make the user to be more convenient to encrypt and decrypt. According to the third party, a single packet is transfer for every transaction, but it has the fused format. This paper explains on voting through internet, with facial detection integrated with finger print authentication and automated load balancing, fused with data hiding security. A data hiding method, which is applicable through steganography, and the biometric concepts provide full security for data that is passed through the network from different places. The main goal of this work is it supports a remote voter registration scheme that increases the accuracy of the current systems. In this scheme the voter identification is carried out by biometric systems. This work evaluates how to take advantage from the most usable biometrics to carry out the voter registration process in a more effective way. Biometrics is also used to prevent impersonation, detect multiple registrations from the same person and protect from alterations of the registration information. This modification ensures higher payload and security.

References
  1. Shashikala Channalli, Ajay Jadhav, Steganography An Art of Hiding Data, International Journal on Computer Science and Engineering, Sinhgad College of Engineering, Pune. Vol.1(3), 2009, 137-141 137
  2. Stanislaw Badura, Slawomir Rymaszewski, Transform domain steganography in DVD video and audio content, IEEE International Workshop on Imaging Systems and Techniques - IST 2007 Krakow, Poland, May 4-5, 2007, Information Technology and Electronics Department, Warsaw University of Technology.
  3. Mohammed Khasawneh , Mohammad Malkawi , A Biometric-Secure e-Voting System for Election Processes, Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08), Amman, Jordan, May 27-29, 2008.
  4. F.Song, H.Liu,David Zhang,J.Yang , A Highly scalable incremental facial feature extraction method, Neurocomputing, Proceedings of International Conference in Biometric and Neurocomputing Technology, vol:71(2008) pg:1883-1888.
  5. Qingzhong Liu , Andrew H. Sung, Mengyu Qiao, Detecting Information-Hiding in WAV Audios, Computer Science Department and Institute for Complex Additive Systems Analysis, New Mexico Tech IEEE 978-1-4244-2175-6/08/, 2008.
  6. X. Ru, Y. Zhang and F. Wu., Audio Steganalysis Based on “Negative Resonance Phenomenon” Caused by Steganographic Tools. Journal of Zhejiang University SCIENCE A, 7(4):577-583, 2006.
  7. W. Mazurczyk, J. Lubacz, LACK - a VoIP Steganographic Method, In: Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 45, Numbers 2-3, 2010, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 1123,
  8. K. Szczypiorski, W. Mazurczyk, and et al., Steganographic Routing in Multi Agent System Environment, Special Issue "Secured Information Systems" of Journal of Information Assurance and Security (JIAS), Dynamic Publishers Inc., Atlanta, GA 30362, USA, Volume 2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010.also in: Computing Research Repository (CoRR), abs/0806.0576, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), submitted on 3 June 2008, published on 4 June 2008.
  9. Rengarajan Amirtharajan, R Jithamanyu, An Invisible Communication for Secret Sharing against Transmission Error ,A Steganographic Perspective Universal Journal of Computer Science and Engineering Technology, 117-121, Nov. 2010. UniCSE, ISSN: 2219-2158.
  10. Saurabh Singh, Gaurav Agarwal, Use of image to secure text message with the help of LSB replacement, international journal of applied engineering research, Volume 1, No1, 2010, research article, ISSN-0976-4259
  11. Sujay Narayana and Gaurav Prasad, Two new approaches for secured image steganography using cryptographic techniques and type conversions, Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010, DOI : 10.5121/sipij.2010.1206 60
  12. Walaa Abu-Marie, Adnan Gutub, Hussein Abu-Mansour , Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator, International Journal of Signal and Image Processing (Vol.1-2010/Iss.3).
  13. Prosanta Gope, Anil Kumar and Gaurav Luthra, An Enhanced JPEG Steganography Scheme with Encryption Technique International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010 1793-8163.
  14. Victor Morales-Rocha1, Jordi Puiggalí1 and Miguel Soriano, Secure Remote Voter Registration -. Proceeding of 3rd international Conference on Electronic Voting 2008, GI-Edition Lecture Notes in Informatics August 6th- 9th, 2008 in Castle Hofen, Bregenz, Austria. pg 95-108.
  15. Hamid.A.Jalab, A.A.Zaidan, B.B.Zaidan, New Design for Information Hiding with in Steganography Using Distortion Techniques IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February, 2010 ISSN: 1793-8236.
  16. Seunglim Yong, MPEG Video Content protection based on Fingerprinting Scheme, IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.10, October 2007 161, Manuscript received October 5, 2007, Manuscript revised October 20, 2007
  17. VenkataSubbaReddy Poli Nagaraja Arcot Jyothsna Charapanamjeri, Evaluation of Biometrics, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.9, September 2009 261, Manuscript received September 5, 2009, Manuscript revised September 20, 2009
  18. Yousra BEN JEMAA, Sana KHANFIR, Automatic local Gabor features extraction for face recognition, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 3, No. 1, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

E-voting Steganography Evidence Security Web Services