Volume 08 Number 3 September 2018

    
Preserving Privacy of Social Networks Data Against Mutual Friends and Degree Attacks

Amardeep Singh, Divya Bansal, Sanjeev Sofat

https://doi.org/10.6025/jio/2018/8/3/83-97

Abstract Online social networks have become a predominant service on the web collecting huge amount of users’ information. It is drastically revolutionizing the way people interact. Publishing data of social network users for researchers, academicians, advertising organizations etc. has raised many serious privacy implications. Lots of techniques have been proposed for preserving privacy of individuals handling different types of attack scenarios used by adversaries.... Read More


A Modified Leach Routing Algorithm for Increasing Lifetime of the Wireless Sensor Network

Amer Abu Salem

https://doi.org/ 10.6025/jio/2018/8/3/114-123

Abstract Wireless sensor networks (WSNs) are composed of many low cost, low power devices with sensing, local processing and wireless communication capabilities. The major limitation of wireless sensor network is energy and network lifetime. In this paper, the cluster routing protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) is considered and enhanced. This paper proposes a clustering routing protocol named Enhanced LEACH, which... Read More


VRS-DB: Preserve Confidentiality of Users’ Data using Encryption Approach

Jitendra Rauthan, Kunwar Vaisla

https://doi.org/10.6025/jio/2018/8/2/98-113

Abstract We tackle stability problems within a cloud data-base frame that uses the Database as a Service display. In this a version, a data proprietor transactions its advice to a cloud data-base pro company. To offer advice stability, fragile data is authenticated from the Data-Owner until it’s moved into the Service Provider. Existing security ideas, whatever the situation, are simply largely homomorphic as in... Read More