Volume 2:
Section 3:Big Data and Cloud Computing 32 A Survey on Big Data Analytics using Apache Hadoop Praveen Sahu, Shikha Agrawal, Raju Barasker Department of CSE, UIT RGPV, Bhopal, India praveenuit15@gmail.com, shikha@rgtu.net, rajubaraskar@rgtu.net 33 A Review of Anomaly Detection in Hadoop Platform Using Machine Learning Technique Anushka Bhargava, Varsha Sharma, Sanjeev Sharma School of IT, UTD, RGPV, Bhopal anushka.bhargava858@gmail.com, varshasharma@rgtu.net, sanjeev@rgtu.net 34 Efficient Map-Reduce Framework Using Summation Sahiba Suryawanshi, Department of Computer Science and Engineering Maulana Azad National Institute of Technology (MANIT), Bhopal, India sahiba686@gmail.com, kaushikp@manit.ac.in Dr. Praveen Kaushik 35 Secret image sharing over cloud using one dimensional chaotic map Priyamwada Sharma School of IT, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal,India priyamwada14@gmail.com, vedant1998@gmail.com Vedant Sharma Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India 36 Design and Development of a Cloud-based Electronic Medical Records (EMR) System Victoria SAMUELa,1 Adewole ADEWUMI a Benjamin DADA Nicholas Omoregbe and Sanjay MISRA Center of ICT/ICE Research, CUCRID Building, Covenant University, Nigeria 37 Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography Bappaditya Jana, Saptarshi Mitra, Jayanta Poray Techno India University West Bengal Kolkata, West Bengal,India bappaditya.j.in@ieee.org, mitra.saptarshi89@gmail.com, jayanta.poray@gmail.com 38 Log-based Approach for Security Implementation in Cloud CRM’s Madhur Patidar, Dr Pratosh Bansal Department of Information Technology, Devi Ahilya Vishwavidyalaya, Indore, MP, India
madhurpatidar15@gmail.com, pratosh@hotmail.com 39 Performance Analysis of Scheduling Algorithms in Apache Hadoop Ankit Shah Shankersinh Vaghela Bapu Institute of Technology, Gandhinagar, India shah_ankit101@yahoo.co.in, mpadole29@rediffmail.com Dr. Mamta Padole The Maharaja Sayajjirao University of Baroda, India 40 Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment Durga Patel, Rajeev Kumar Gupta, R. K. Pateriya Department of CSE, MANIT, Bhopal, India durgapatel28@gmail.com, rajeevmanit12276@gmail.com,pateriyark@gmail.com 41 ObjectRecognitionwithLocalDifferenceBinaryApproachUsing Grid Technique Reema Dhar, Swati Sharma Jodhpur National University, Rajasthan India reema.etrx@gmail.com,swati.sharma15@gmail.com,deepak@cripac.ia.ac.cn Deepak Kumar Jain University of Chinese and Academy of Science, Beijing, China Section 4:Network and Securities 42 Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network Praveen Gupta* Pratosh Bansal PITM, Indore IET, DAVV, Indore 43 Certificate Revocation in Hybrid Ad-hoc Network Anubha Chaturvedi, Brijesh Kumar Chaurasia Department of Computer Science & Engineering, ITM University Gwalior, Gwalior, M. P. India er.anubha.chobey@gmail.com, bkchaurasia.itm@gmail.com 44 NB tree based Intrusion detection technique using Rough set theory model Neha Gupta, Ritu Prasad Technocrats Institute of Technology (Excellence), Bhopal, India neha.guptainfo92@gmail.com, rit7ndm@gmail.com, praneetsaurabh@gmail.com, bkverma3@gmail.com Praneet Saurabh, Bhupendra Verma Technocrats Institute of Technology, Bhopal, India 45 AN ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET Preeti Pandey, Atul Barve Oriental Institute of Science & Technology, Bhopal India preetipandey940785@gmail.com, barve.atul@gmail.com
46 DDoS Attack Mitigation using Random and Flow Based Scheme Bansidhar Joshi Jaypee Institute of Information Technology, Noida, India bansidhar.joshi@jiit.ac.in, bineetjoshi@gmail.com, kritika.rani17@gmail.com Bineet Joshi SRHU, Dehradun, India Kritika Rani Jaypee Institute of Information Technology, Noida, India 47 Digital Image Watermarking Against Geometrical Attack Sandeep Rai , Rajesh Boghey, Dipesh Shahane, Priyanka Saxena Computer Science and Engineering
Technocrats Institute Technology (Excellence)
Bhopal, India
sandtec@gmail.com, rajeshboghey@gmail.com, dipeshshahane@gmail.com, priyanka_0789@yahoo.com 48 Reverse Image Data Hiding Using Transform Techniques Nishi Vishwakarma , Neelesh Gupta , Neetu Sharma TRUBA Bhopal neelesh.gupta@trubainstitute.ac.in,neetusharma85@gmail.com 49 Efficient key Management Approach for Vehicular Ad-hoc Network ShikhaRathore,Jitendra Agrawal, Sanjeev Sharma, Santosh Sahu School of IT, UTD, RGPV, Bhopal Shikharathore257@gmail.com, jitendra@rgtu.net, sanjeev@rgtu.net, santoshsahu@rgtu.net 50 Image Forgery Detection: Survey and Future directions Kunj Bihari Meena and Vipin Tyagi Jaypee University of Engineering and Technology Raghogarh, Guna - MP INDIA dr.vipin.tyagi@gmail.com 51 Comparative Study of Digital Forensic Tools MayankLovanshi, Pratosh Bansal Department of Information Technology
Devi Ahilya vishwavidyalaya,Indore,MP, India
lovanshi123mayank@gmail.com, pratosh@hotmail.com 52 A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications Nirneeta Gupchup and Dr. Nishchol Mishra School of Information Technology, RGPV University, Bhopal India nirneeta.gupchup@gmail.com, nishchol@rgtu.net 53 Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique Aumreesh Kumar Saxena, Dr. Sitesh Kumar Sinha
Dr. Piyush Shukla AISECT University, Bhopal, India, aumreesh@gmail.com , phdpwd@gmail.com , siteshkumarsinha@gmail.com UIT RGPV. Bhopal,India 54 New Chaos-Based Algorithm for Bmp Image Encryption and Decryption using chaotic logistic map Pooja Kathil*, sachin goyal, Ratish Agrawal, Mahesh Pawar Dept. of Information Technology, Rajiv Gandhi Technical University Bhopal (M.P.), India kathil1995pooja@gmail.com, sachingoyal@rgtu.net, ratish@rgtu.net , mkpawar24@gmail.com 55 Performance Evaluation of Efficient Coverage and Connectivity Preservation with Load Balance for WSN Bharti Yaduwanshi , IEEE Member Ramnath Narhete Onprice Infotech Pvt. Limited bhartisarni@rediffmail.com, ramnath@dstarena.com 56 Formal Veri?cation of Causal Order Based Load Distribution Mechanism Using Event-B
Raghuraj Suryavanshi Pranveer Singh Institute of Technology, Kanpur, India raghuraj_singh09@yahoo.co.in;aksingh_uptu@rediffmail.com;divakar_yadav@ rediffmail.com Arun Kumar Singh
Goel Institute of T