CSIC Cyber Security
CSIC Cyber Security
CSIC Cyber Security
2 | May 2015
Cover Story
Cloud Security Challenges at a Glance 8 Research Front
Do You Need an Operating System to
Cover Story Run an Application 33
Improving Cybersecurity using NIST
Framework 11 Article
Cover Story Context Aware Intelligence: Approach
for Multi-Dimensional Security 36
Security, Privacy and Trust in Social
Networking Sites 14 CSI Communications | May 2015 | 1
Know Your CSI
Executive Committee (2015-16/17)
President Vice-President Hon. Secretary Hon. Treasurer
Prof. Bipin V Mehta Dr. Anirban Basu Mr. Sanjay Mohapatra Mr. R K Vyas
[email protected] [email protected] [email protected] [email protected]
Immd. Past President
Mr H R Mohan
[email protected]
Regional Vice-Presidents
Region - I Region - II Region - III Region - IV
Mr. Shiv Kumar Mr. Devaprasanna Sinha Dr. Vipin Tyagi Mr. Hari Shankar Mishra
Delhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh,
Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas in
Uttar Pradesh, Uttaranchal and and other areas in in Western India Central & South
other areas in Northern India. East & North East India [email protected] Eastern India
[email protected] [email protected] [email protected]
Region - V Region - VI Region - VII
Mr. Raju L kanchibhotla Dr. Shirish S Sane Mr. K. Govinda Publication Committee (2015-16)
Karnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry,
[email protected] [email protected] Andaman and Nicobar, Dr. A K Nayak Chairman
Kerala, Lakshadweep Prof. M N Hoda Member
[email protected] Dr. R Nadarajan Member
Mr. Ravikiran Mankikar Member
Division Chairpersons Dr. Durgesh Kumar Mishra Member
Dr. Suresh Chandra Satapathy Member
Division-I : Hardware (2015-17) Division-II : Software (2014-16) Division-III : Applications (2015-17)
Dr. Vipin Tyagi Member
Prof. M N Hoda Dr. R Nadarajan Mr. Ravikiran Mankikar
Dr. R N Satapathy Member
[email protected] [email protected] [email protected]
Division-IV : Communications Division-V : Education and Research
(2014-16) (2015-17)
Dr. Durgesh Kumar Mishra Dr. Suresh Chandra Satapathy
[email protected] [email protected]
Cover Story
Chief Editor
Dr. A K Nayak
8 Cloud Security Challenges at a Glance
R Sridaran, Disha H Parekh Doshi and Sudhir
29 Importance of Morality, Ethical
Practices and Cyber Laws as Prelude
to Cybersecurity
Guest Editor Kumar Suman D G Jha
Dr. Vipin Tyagi
Published by
Executive Secretary
11 Improving Cybersecurity using NIST
Framework
Sandeep Godbole
33
Research Front
Do You Need an Operating System
to Run an Application
Mr. Suchit Gogwekar
Biswajit Mohapatra and Debasis Roy
For Computer Society of India
Dispatch by
CyberMedia Services Limited 14 Security, Privacy and Trust in Social
Networking Sites
Richa Garg, Ravi Sankar Veerubhotla and
36
Article
Context Aware Intelligence:
Approach for Multi-Dimensional
Ashutosh Saxena Security
Amit Badheka
Please note:
CSI Communications is published by Computer
Society of India, a non-prot organization.
Views and opinions expressed in the CSI
Communications are those of individual authors,
contributors and advertisers and they may
differ from policies and official statements of
CSI. These should not be construed as legal or
professional advice. The CSI, the publisher, the
editors and the contributors are not responsible
for any decisions taken by readers on the basis of
these views and opinions.
Although every care is being taken to ensure
genuineness of the writings in this publication,
CSI Communications does not attest to the
originality of the respective authors content.
2012 CSI. All rights reserved.
PLUS
Instructors are permitted to photocopy isolated Brain Teaser
articles for non-commercial classroom use 44
without fee. For any other copying, reprint or
Dr. Durgesh Kumar Mishra
republication, permission must be obtained
in writing from the Society. Copying for other
A Report from CSI Division IV Communications 45
than personal use or internal reference, or of Dr. Durgesh Kumar Mishra
articles or columns not owned by the Society
without explicit permission of the Society or the CSI News 47
copyright owner is strictly prohibited.
Printed and Published by Suchit Shrikrishna Gogwekar on Behalf of Computer Soceity of India, Printed at G.P.Offset Pvt Ltd. Unit No.81, Plot No.14, Marol Co-Op. Industrial Estate, off
Andheri Kurla Road, Andheri (East), Mumbai 400059 and Published from Computer Society of India, Samruddhi Venture Park, Unit No. 3, 4th Floor, Marol Industrial Area Andheri
(East), Mumbai 400093. Editor: A K Nayak
Tel. : 022-2926 1700 Fax : 022-2830 2133 Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059.
The internet has changed the world completely. Now it is available This issue has come up with a new column Message from Vice-
for us for the fast data transmission, for doing all kind business and President. This issue has a number of good articles related to
satisfying needs. But at the same time, data passing from source Cyber Security. In the article by R. Sridaran, D.H.P. Doshi and
to destination securely is the important task. One of the necessary S. K. Suman, challenges in cloud security are described, while
requirements to prevent data theft and protect the same is S. Godbole has described the ways to improve cybersecurity
securing the information on the transmission channel and across using National Institute of Standards and Technology (NIST)
the network. Further, open access to the Internet has revolutionized framework. We have also provided gist of National Cyber
the way individuals communicate and collaborate, entrepreneurs Security Policy 2013. N. J. Rao has described cyber security
and corporations conduct business, and governments and citizens issues and challenges in his article. S. Chhabra and V.S. Dixit
interact. As number of internet users is about to touch three have done a study on Comparative Evidence of Cryptographic
billion, the number of cyber security threats is also increasing. based Algorithms under the Cloud Computing Environment to
Cyber threats are no longer restricted to fragments of malicious ensure Data/System Security to identify, analyze and report
code, aimed to exasperate, incite or stall; now the threats are the evidence of different cryptographic security algorithms.
strategic, targeted, organised and relentless. Such targeted
Social networking is very popular these days. M. Ulanat and
attacks, can cause signicant nancial losses as well as deep-
K. P. Jacob in Privacy Security Settings Challenges of Social
seated damage. In the age on internet, cybercriminality affects
Media and R. Garg, R.S. Veerubhotla and A. Saxena in Security,
everyone individuals, companies, institutions, governments. It has
Privacy and Trust in Social Networking Sites have described
become a curse of society.
security issues related to social networking sites. In the use of
As per a study of ASSOCHAM, the cyber crimes in India are likely the technology, there is a need of moral values and ethics in every
to cross the 3,00,000 at compounded annual growth rate (CAGR) citizen. D. G. Jha in his article has described the importance of
of about 107 per cent. As per the ndings, every month nearly morality and ethical practices. In an article, Amit Badhekha has
12,456 cyber crime cases are registered in India.What is causing given an approach for multidimensional security called context
even more concern is that the origin of these crimes is widely aware intelligence for enterprise applications.
based abroad in countries including China, Pakistan, Bangladesh
We have included a case study on e-learning for effective
and Algeria among others. Phishing attacks of online banking
classroom teaching by Sarika Sharma. Hope this study will help
accounts or cloning of ATM, Debit cards are common occurrences.
in planning of e-learning in schools, colleges and universities.
The increasing use of smartphones, tablets for online banking,
In Research Front category we have selected an article by
nancial transactions has also increased the vulnerabilities to
B. Mohapatra and D.R. Choudhuri that describes allocation
a great extent. With increasing use of information technology
containerization in their article Do you need an OS. This issue
enabled services such as e-governance, online business and
also contains practitioners workbench, crosswords, CSI reports,
electronic transactions protection of personal and sensitive data
and news from divisions, chapters, student branches, and
have assumed paramount importance. The economic growth
calendar of events.
of any nation and its security whether internal or external and
competiveness depends on how well is its cyberspace secured I take this opportunity to credit of successfully bringing this issue
and protected. to guest editor Dr. Vipin Tyagi. I am thankful to Prof. M.N. Hoda
and Dr. Durgesh Mishra for their support in bringing out this issue.
Due to increase in internet penetration and use of online banking
On behalf of publication committee, I wish to express my sincere
India is becoming a favourite among the cybercriminals, who
gratitude to all authors and reviewers for their contribution to this
target online nancial transactions using malware. India ranks
issue.
third after Japan and US in the tally of countries most affected by
online banking malware during the year of 2014. Indian websites I hope this issue will be successful in its aim of creating awareness
are being hacked by various hacker group spread across worldwide about Cyber Security, providing information about latest trends in
and likely to touch 85,000 by now. cyber security research and provide new ideas for research in the
area.
The economic growth of a country depends on how well its
physical and cyber space is secured. Today we are living in a world Finally we look forward to receive the feedback, contribution,
that has virtually no privacy and a big number of cybercrimes. criticism, suggestions and reply from our esteemed members and
Due to nature of cyberspace cyber security is a very big challenge. readers at [email protected].
None of us is immune from the threat of cyberattacks. So there is
an urgent need of developing techniques to secure our cyberspace.
Apart from developing techniques awareness related to cyber
security is also needed. Computer Society of India selected theme
of CSI communications (The Knowledge Digest for IT Community)
Prof. A.K. Nayak
- May issue as Cyber Security to discuss various techniques and
create awareness about cyber security. Chief Editor
Dear Members
Column
overwhelming response. New Editorial team is getting
constituted for all the CSI journals. Efforts are on to ensure
the timely publication of Journal of Computing.
Students and members of the Academic Community have been
the main strength of CSI. For this the CSI Education Directorate
is being revamped, new procedures are being put in place for
timely response to queries and for processing membership
applications. Attempts are being made to start a Journal solely
dedicated to publishing papers by the students.
A call has been given to enlist a new team of student
coordinators both at the Region and at State levels. I am
happy that the response to the call has been extremely
good and a very large number of our members have shown
interest in contributing towards increasing our student
activities.
CSI Web site has not been working satisfactorily and there
have been numerous complaints about the difficulties the
members have been facing in using the web site. Prospective
For the last 50 years, the Computer Society of India, the largest members have failed to le their membership application
and oldest body of IT professionals in India has been working on and pay their fees by credit cards due to poor operation
promoting use of IT among the different segments of the society. of CSI web site. Decision has been taken to develop a new
CSI was considered to be the prime body of IT professionals web site at the earliest and to integrate all operations of CSI
few decades back and recognized by the Governments in the under the same software framework.
states and at the Centre as a prominent group with capability
It has been decided that Chapters when organizing any
to advise the Governments on framing policy matters. Now it is event will keep the relevant RVP in the Advisory Committee.
the high time to take the society to a greater height to contribute The RVPs are being encouraged to visit the Chapters and to
signicantly for transforming the nation to Digital India. interact with the members. All chapters have been asked to
use the official logo of CSI given below and misuse of CSI
The new ExecCom which assumed office effective April 1, logo will be taken seriously.
2015 is committed to bring more efficiency, transparency and
effectiveness in functioning of the society. The team comprises
of dynamic members who have been elected this year as Vice
President, Treasurer, Chairs of Division I,III and V and as Vice
Presidents of Regions I, III, V and VII. They along with the
incumbent President, Hony. Secretary, and Chairs of Division II
and IV and Vice Presidents of Regions II and VI are determined
to change the face of Computer Society of India. In this golden
jubilee year, we need to increase our membership substantially The procedure for publishing reports of various events
both from the corporate world and from the academic community. organized by different CSI Chapters and Student Branches
Although CSI has the biggest following among the student is being worked upon and the streamlined procedure will be
community, we need to have more Student Branches throughout announced soon.
the country. To attract more members we need to organize better Over the years, CSI has signed Memorandum of
quality events and improve the quality of our journals. Understanding with different bodies and international
societies. These are being looked into so that these MOUs
To achieve these: can be used more effectively for the benet of our Members.
ExecCom in its rst meeting decided to rationalize the To summarize, in the brief period that the new ExecCom has
Membership fee structure and decided to have an uniform fee taken over, a plan of work has been drawn to improve the
structure irrespective of the age. This has become essential working of CSI. In this endeavor, we hope to get the cooperation
to attract young IT professionals to CSI. An appeal is being of all sections of CSI Members. For any suggestions or issues,
made to CSI Members to approach their acquaintances in members can always approach the ExecCom members at any
the Industry and in the academic community to make them point of time.
members of CSI.
Let us work together to make a difference.
The Publication Committee has started their work in
the right earnest. Due to the resignation of the erstwhile
Members of Editorial Board of CSI Communications, all Best wishes,
efforts have been made to publish CSI Communications
in time. A Call for Editors was made which received an Dr Anirban Basu
Senior ExecCom Members (left to right) : Dr. Anirban Basu, Dr A K Nayak, Sri F C Kohli , Dr. M N Hoda, Mr. Sanjay Mohapatra .
Story *Dean & Faculty of Computer Applications, Marwadi Education Foundations Group of Institutions, Rajkot, Gujarat
**Assistant Professor & Faculty of Computer Applications, Marwadi Education Foundations Group of Institutions, Rajkot
***Assistant Professor & Faculty of Computer Applications, Marwadi Education Foundations Group of Institutions, Rajkot
Dr. R. Sridaran is a Dean, Faculty of Computer Applications, at Marwadi Education Foundations Group of Institutions, Rajkot,
Gujarat. He is a life member of CSI and also the Founder Chairman for CSI, Rajkot Chapter. He has 15 years of teaching experience,
7 years of industry experience. His areas of interest are Software Engineering, Cloud Computing and E-Learning.
About the Authors
Mrs. Disha H. Parekh Doshi is an Assistant Professor, Faculty of Computer Applications, at Marwadi Education Foundations
Group of Institutions, Rajkot, Gujarat and also a research scholar of Bharathiar University. She has 6 years of teaching experience.
Her areas of interest are Cloud Computing, Virtualization and Applications of Cloud.
Mr. Sudhir Kumar Suman is an Assistant Professor, Faculty of Computer Applications, at Marwadi Education Foundations
Group of Institutions, Rajkot, Gujarat. He has having 2 years of teaching experience.
OBITUARY
Mr. V V P Swamy,
Member, Computer Society of India.
Mr. V.V.P. Swamy passed away on 28th March 2015, in Hyderabad at the age of 72.
Mr. V. V. P. Swamy was one of the early members of the Computer Society of India, Ranchi chapter, along
with other IT stalwarts in Ranchi, such as Mr. R. K. Sandhir of MECON, Prof. Kanta Rao of BIT Mesra,
Mr. Kaushik Roy of HEC. He contributed signicantly to the chapter by bringing in on the table, the then
fast emerging role of computerization in coal mining, explorations, mine planning and development, MIS
and Office Automation. He has given talks in CSI seminars/workshops.
After his retirement from the industry in 2001 till the last days of his life, he kept himself active teaching in several engineering
colleges in and around Hyderabad. While in Delhi, he also worked on themes like Modernization, Mechanization, Automation, and
Computerization in Asian Coal mines.
Mr. V.V.P.Swamy is survived by his wife, Sita Devi and two well-settled daughters, Lakshmipriya and Krishnapriya with their families in
Delhi and Hyderabad respectively. CSI deeply mourns his death and conveys condolence to the bereaved members of his family and
friends. May Gods grace grants his soul to rest in peace.
***
Congratulations!!!
Dr. G. Satheesh Reddy, Hony. Fellow - Computer Society of India, Distinguished Scientist & Director, Research
Centre Imarat, DRDO has been conferred with the prestigious Fellowship of the Royal Institute of Navigation for
his signicant contributions in the elds of inertial and satellite-based Navigation and avionics technologies.
As on date Dr. Satheesh Reddy is the only one to be elected from India for this award.
CSI congratulates Dr. Reddy on receiving this honor.
RS RS .AN Analysis
RS .MI Mitigation
RS .IM Improvements
Recover RC .RP Recovery Planning
RC RC .IM Improvements
RC .CO Communications
sub-categories that can map to or spawn comes from implementing preventive References
specic processes. Eg the sub category (Identify, Protect), detective (Detect) and [1] Framework for Improving Critical
Event data are aggregated and correlated corrective (Respond, Recover) measures Infrastructure Cybersecurity
from multiple sources and sensors requires against cyber attacks. Processes, by NIST (http://www.nist.
that organizations dene and implement controls and technology that ensure that g o v/c y b e r f r a m e w o r k /u p l o a d /
comprehensive processes and capabilities requirements dened by the categories/ cybersecurity-framework-021214.pdf )
for log/alert denition, generation, sub categories are addressed help to [2] Notication on National Cyber
collection and correlation. The Framework build an organization that is secure and Security Policy -2013, Govt of India
provides for informational references that resilient from cyber attacks. NIST has (http://deity.gov.in/sites/upload_
can be useful in this regard. thus provided a reference and framework f i l e s /d i t / f i l e s / N a t i o n a l % 2 0
The framework underscores the that organizations can adopt to evaluate Cyber%20Security%20Policy%20
point that there is no silver bullet themselves and build cyber security (1).pdf)
against cyberattacks. The capability capability. n
About the Author
Sandeep Godbole works as Dy General Manager, Information Security at Syntel. He is a Past President of ISACA
Pune Chapter. Sandeep is a speaker at national and international events and conferences. He can be reached at
[email protected]. The views expressed in the article are his own and do not necessarily reect those of
his employer or anybody else.
Story Vice Chancellor, Jaypee University of Engineering and Technology, Raghogarh, Guna - MP
Richa Garg is a Senior Associate at Cognizant Technology Solutions. Prior to that, she was a part of Infosys Labs at Infosys
Limited. She received her Master of Engineering (M.E) degree from Panjab University, Chandigarh in summer 2007. She
is also a certicated SSCP Professional. Her primary research interests include PKI, Key Management, DRM and Strong
Authentication.
Ravi Sankar Veerubhotla is a Research Scientist at Infosys Labs, Hyderabad. Prior to that he worked as a Principal consultant
(Security Practice) in a multi-national company. Ravi received a PhD (2006) in Computer Science from University of
Hyderabad, India. He also obtained his MPhil Computational Physics (2000) and MSc Electronics (1998) degrees from the
About the Authors
same university. He is also a certied CISSP, CISA and PMP professional. His primary research interests include Digital Rights
Management, Digital Fingerprinting, Public key Cryptography and Encryption Technologies.
Ashutosh Saxena is an Associate Vice President at Infosys Labs, Infosys Ltd., Hyderabad, India, and received his MSc (1990),
MTech (1992) and PhD in Computer Science (1999). The Indian government awarded him the post-doctorate BOYSCAST
Fellowship in 2002 to research on Security Framework for E-Commerce at ISRC, QUT, Brisbane, Australia He has authored
the book titled PKI Concepts, Design and Deployment, published by Tata McGraw-Hill. He also co-authored more than 80
research papers and several patents. His research interests are in the areas of authentication technologies, data privacy, key
management and security assurance.
Story *Department of Computer Science, Acharya Narendra Dev College, University of Delhi, India, [email protected]
**Department of Computer Science, Atma Ram Sanatan Dharma College, University of Delhi, India, [email protected]
Introduction Elasticity: This provides exibility of Private Cloud: The enterprises can
Cloud Computing is an emerging allocation and de-allocation of resources have their dedicated cloud infrastructure.
technology which provides on-demand as the requirements expand and shrink of This provides data security to the cloud
resources over the Network. Cloud users the Organization[3]. users.
can access resources and services anytime Measured Services: Cloud Hybrid Cloud: Such clouds are a
and anywhere as per requirement. The Computing applies pay-per-use model. combination of the private and public
resources can be in the form of storage, This requires keeping track of usage of cloud. Sensitive information is placed on
software applications, servers, network, services or resources by the user and thus the private cloud and rest on public cloud.
etc. The customers have to pay just for the maintaining transparency between both Community Cloud: Organizations
services availed by them i.e. according to the CSP and the cloud user. with common interest or motive like policy
pay-per-use utility model. An Organization Cloud Business Models considerations or security requirements
providing Cloud Computing services is Cloud computing also offers various forms the community cloud.
known as Cloud Service Provider (CSP). business models for the customer to Cloud Security Issues
Cloud services have to be reliable and choose from[7]: Despite of various benets and services
scalable to provide ubiquitous network Software as a Service (SaaS): Allows provided by Cloud Computing, there are
access and dynamic resource allocation to access to an application and its data several security issues related to it:
the clients. center without the need to install it. The Data security: CSP are responsible
The nature and Quality of Service application can be accessed via a network. for securing data of the customers.
(QoS) expected by the customer and Platform as a Service (PaaS): The security threats can be due to data
other details are specied in a negotiation Provides the platform to the software leakage, attacks by customers, lack of CSP
agreement known as Service Level developers of the organization to build security, etc[5].
Agreement (SLA)[2]. CSP is responsible their own software applications. The Physical security: Physical data
for meeting various QoS parameters of platform includes operating system, centers can be attacked by intruders
clients as per agreed and mentioned in database server, and programming (malicious internal employees and
their respective SLAs. language execution environment. external people). Natural disasters like
Benets of Cloud Computing Infrastructure as a Service (IaaS): oods, re and theft can also damage data
As per NIST, Cloud Computing provides Provides the complete infrastructural centers[4, 5].
several benets to the organizations[1]. resources such as Servers, network, Malicious Insider: Data can be
They are: software applications and virtual misused by the employees of the
On-demand resources: A customer networks. organization who have authorized access
can avail resources from the cloud as per Cloud Deployment Models to the data[7].
requirement[4]. Cloud Computing gives the users Account Hijack: By stealing the
Ubiquitous network: Resources capability to choose amongst various username and password of the account,
can be accessed via a network using any deployment models[7]: the intruders can misuse the sensitive
device (mobile, laptop, tablet, PC) having Public Cloud: The resources are data of the cloud user.
Internet connection on it[4]. provided by the CSP publicly on the Denial of service: The resources can
Multi-tenancy: Cloud Computing Internet. This raises concerns for data be used by the attacker such that only
allows several users to share resources security as the malicious users can try to few are left for the cloud user, making the
from the resource pool provided by the CSP. access it. system slow. Such kind of attack is termed
P = D (K, E (K, P)) [23] Error High: An error will affect Low: An error during transformation
These algorithms are divided into two propagation the entire block during will affect only that symbol.
types: transformation.
Block Cipher: A block of plain text is
Malicious Less susceptible: Full block More Susceptible: As only one
taken as an input, whose size depends
insertions is transformed, so any symbol is transformed, malicious
upon the symmetric encryption
insertion makes the block intruder can insert other characters
algorithm and cipher text of the same
size incorrect and reveals that may look authentic.
block length is generated as an output.
the error.
Usually, block size of 64 or 128 bits is
taken. Few examples of Block ciphers are Table 1 : Comparison of Block Cipher and Stream Cipher
DES, AES [22].
Founded Transformation
Attribute Designers Key Size Data Size Keys Used
Year Rounds
AES Joan Daemen and Dec 2001 128/ 192/ 256 Block of 128 bits 10/ 12/ 14 rounds Single key
(Advanced Vincent Riimen, bits
Encryption submitted to NIST
Standard)
DES (Data IBM and submitted to Jan 1977 56 bits Block of 64 bits 16 rounds Single key
Encryption NIST
Standard)
TDES NIST 1998 3 keys of 56 bits Block of 64 bits 16 * 3 = 48 rounds Three Keys
(Triple Data each
Encryption
Standard)
Blowsh Bruce Schneier 1993 Vary from 32 to Block of 64 bits 16 Single key
448 bits
Camellia Mitsubishi, NTT 2000 128/192/ 256 128 bits 18/24 Single key
bits
Serpent Ross Anderson, Eli 1998 128/192/ 256 128 bits 32 Single key
Biham, Lars Knudsen bits
Clea Sony 2007 128/192/ 256 128 bits 18/22/26 Single key
bits
Simon Ray Beaulieu, Douglas 2013 64/72/ 96/ 32/ 48/ 64/ 32/36/ 42/ 44/ Single key
Shors, Jason Smith, 128/ 144/ 192/ 96/128 bits 52/ 54/68/69/72
Stefan Treatman- 256 bits
Clark, Bryan Weeks,
Louis Wingers
(National Security
Agency)
Threesh Bruce Schneier,Niels 2008 256/ 512/ 1024 256/ 512/ 1024 72/80 (for 1024 Single key
Ferguson,Stefan bits bits bits)
Lucks,Doug
Whiting,Mihir
Bellare,Tadayoshi
Kohno,Jon
Callas,Jesse Walker
Attribute Designer(s) Founded Key Size Initial Vector Block Size Transformation
Year Rounds
RSA Ronald Rivest, Adi Shamir, 1978 Used for secure data transmission.
(Rivest, Shamir, Leonard Adleman Factoring large numbers
Adleman)
Diffie-Hellman Key Whiteld Diffie and Martin 1976 Discrete logarithm problems
Exchange Hellman Provides perfect security in Transport Layer
Ceilidh Alice SilverbergandKarl Rubin 2003 Discrete logarithm problem in algebraic torus
ElGamal Encryption Taher Elgamal 1985 Discrete logarithm problem in cyclic groups
System Hybrid cryptosystems
DSA (Digital Signature David W. Kravitz 1991 Digital Signature Standard
Algorithm) Uses two hash functions
generate keys, encrypt data and transmit length and short data sizes are insecure Inspite of several benets, major concern
over the network. This also involves and can be attacked by the intruder. faced by the users is of security. To provide
overheads associated with it [3, 13]: Therefore, CSP should make adequate data security, cryptography
a. Transformation Speed: provisions to provide security in can be implemented. Cryptography is a
Encryption involves converting generation, assignment, storage, technology having different encryption
plain text to cipher text which replacement and use of keys. algorithms under different categories.
causes delay in time. User can choose the best one according
Hash Functions
b. Power Consumption: Processors Hash function helps to maintain integrity to their requirements. We have studied
consume more power in of the data. It provides a seal/ shield to the and compared several cryptographic
generating keys and encrypting data before transmission. If the seal is found based security algorithms on certain
the plain text. to be broken at the receiving end, it will characteristics. Though only few
c. Less Bandwidth: Limited state that something has been changed in characteristics were examined, there are
bandwidth is used by the clients the le. Hash function can be a checksum, signicant other characteristics which
as additional bits of the keys are index data in hash table, etc. They are used can help us in understanding the true
also present. in Message Authentication Codes (MAC), potential, strengths and limitations of the
Cloud Computing services are used Digital Signatures and many information cryptographic security algorithms from
by several organizations and users all over security applications [22]. the perspective of the cloud computing
the world. Data security is the primary technology.
There are many hash functions
goal of CSP and the user. Keys used in the available such as Message Digest (MD) References
cryptography needs to be secret for each and Secure Hash Algorithms (SHA). [1] The The NIST denition of Cloud
and every user. Therefore, number of keys, Various versions of hash functions have Computing, http://csrc.nist.gov/
their length, generation and transportation been published like MD-2, MD-4, MD-5, publications/nistpubs/800-145/
are to be considered for the data security. SHA-1, SHA-224, SHA-256, SHA-384 and SP800-145.pdf
Longer key length and data size SHA-512. Comparison between the hash [2] Rajkumar Buyya, Chee Shin Yeoa,
requires more power consumption, functions are summarized in the table [18, 21]. Srikumar Venugopal, James Broberg,
generating more heat. Also more Conclusion Ivona Brandic, Cloud computing and
computation time is required to encrypt Cloud computing is being adopted by emerging IT platforms: Vision, hype,
and decrypt the data. Whereas, short key various organizations over worldwide. and reality for delivering computing
Can we think of a day without checking our and public. Messages on social media trend is only expected to increase over the
messages on Whatsapp? Updating our can reach massive audience organically coming years.
status or reading what is new happening without any nancial commitments for This volume of users and the
in the life of our family and friends through organisation. Social networking sites information that gets posted on social
this medium? Social media today has facilitate collaborating, sharing that allow media sites has opened a new avenue
integrated technology, content, social individuals to construct a public or prole. for people with wrong intentions to use
interaction and revolutionised the way The type of social media that is the most social engineering methods to gain access
humans communicate. This participatory used in India are sites like Facebook, to the accounts of individuals. The more
medium has found a new way of sharing Twitter and Whatsapp. Being top in the information is posted, the more the
and extracting information. This has user base, this article primarily focus on security and privacy of the individual is at
become a new community space to Facebook. risk. Criminals are increasingly using this
interact with friends and relatives. Social Though they have become a part platform to get connected to potential
life has migrated to online communities. of the rhythm of our daily life, have we victims. The networked nature of social
This platform has got into the social stopped and wondered about the privacy media makes available a substantial
space helping people to get connected, issues therein? When posting information amount of information about any single
stay in touch, reconnect with old friends to a social network, a user probably individual. This indiscriminately posted
and also it has permitted creation of expects authorized contacts to be able to information gets collected and analysed
new friendships. With more and more view it. Little are the users aware of the by marketers, identity thieves, and state
people joining the bandwagon, the strong potential risks of wilfully disclosing their actors. Security professionals have
presence of social media has created a own information to public domain. This is to look beyond defending its network
new community culture. Social media relevant market information gathered for and infrastructure. Social media is a
has also democratized the tools of self organizations who are seeking to secure growing challenge posing new risks for
expression. These technologies have a place in both the traditional and digital organisations in the new ecosystem of
grown in leaps and bounds during the marketplace. European Commissions interconnected world.
last few years. Twitter, Facebook and project on Privacy Challenges in Social Facebook acquired and created
other social networks are used to share Media[3] is an ongoing project exploring various new apps over the past years.
information, but the smartphone has privacy issues associated with social Facebook with acquisition of popular
become responsible for revolutionising media at the level of the individual, Whatsapp and Instagram became a
how the information is collected and the enterprise and society. It aims at multidisciplinary online conglomerate
distributed to the masses. Smartphone generating effective solutions, from built on the massive success of Facebook.
penetration which made devices providing users with technical safeguards com. WhatsApp focused on instant
affordable and the wireless networks more and informed consent,to establishing communication without any frills
ubiquitous and faster can be attributed as corporate guidelines for protecting became hit among common masses. The
the most inuential factor for this change. privacy, to developing and testing combination of WhatsApp and Facebook
Facebook[1] has become part of life, recommendations for public policy. will allow us to connect many more people
inuencing our day to day activities and The reach and impact of this digital round the world, according to Marc
decision making. The size and reach of media is visible in India also. Social media Zuckerberg , CEO. WhatsApp is actually
Facebook speaks about the acceptability is promoting a lot of discussions on critical the worlds most popular messaging with
and adoption rate. The Facebook or sensitive issues like politics, corruption, 27 billion messages sent each day.
Newsroom[2] conrms that there are 1.44 poverty and economy including the latest Though Facebook has active security
billion monthly active users as on March debate on Net neutrality. India which is monitoring with the site actively scanning
31, 2015 and 936 million daily active conventionally an orthodox society, has for malware and offering security options,
users of which 798 million are mobile utilised the advantage of social media there has been increased reports of
daily active users. The value of Facebook in 2014 elections. We saw candidates malware attacks through this site. Just
lies in these numbers and database of and parties increasingly engaging over like spams affecting email, on social
information they hold. The social media Facebook, twitter and similar like forums media, scammers and spammers always
technologies like blogs, wikis, twitter, like never before. Political parties started nd a place to creep in. Many third party
Facebook are increasingly used by understanding the new way of reaching applications, which interact with users,
different organisations to improve visibility out to people without any geographical becomes a breeding ground for these
and knowledge sharing with customers differentiation of urban and rural. This kind of unexpected behaviours. With
Mini Ulanat, Systems Manager of Cochin University of Science & Technology is a senior Life Member CSI and Chapter
Patron, CSI Cochin Chapter. She was the National Student Coordinator of CSI for 2013-2015. Ms. Ulanat is the reciepient
of Chevening TCS Cyber Security fellowship and is undergoing training on Cyber Security and Information Assurance at
UK Defence Academy, Craneld University, UK.
Prof. K Poulose Jacob is the Pro-Vice-Chancellor of Cochin University of Science & Technology. He is senior Life Member
About the Authors
CSI and Chapter Patron, CSI Cochin Chapter. He was Professor of Computer Science at Cochin University of Science
and Technology since 1994, and Director of the School of Computer Science Studies prior to this. Dr. K Poulose Jacob
is an active researcher and has published more than 100 publications in refereed journals, conference proceedings,
several edited books. He has given several invited talks at various conferences in Europe, USA, UK, Australia and other
countries.
Story Professor and Area Chairperson - IT; Programme Coordinator MCA: K J Somaiya Institute of Management Studies and Research,
Vidyanagar, Vidyavihar, Mumbai
Schwalbe[4] produces the media basis for launching litigation in a need to deal with the ethical issues of
snapshot indicating the menace the court of law, therefore companies their employees, customers and suppliers.
computer viruses (hacking) have caused and individuals should be careful Ethical issues are important because they
across the globe (see table 2) and the while sending e-mails. can damage the image of an organisation.
anecdote is What do Melisa, Anna Digital Signature: Digital signature What makes ethics difficult is that what
Kournikovo, Code Red, and Sobig have to do refers to authentication of any is ethical to one person or in one country
with quality and information technology? electronic record by a subscriber may not be so in another. Law indicates
They are all the names of the recent computer with the help of an electronic method the rule and regulations to be obeyed in
viruses that have cost companies million of or procedure. the organisation. It makes it binding on
dollars. A quality issue faced by computer Electronic records: Electronic all the employees to follow it. The fact
users around the world is lost productivity records refers to ling of any form that an action is legally permissible does
due to computer viruses and spam or application (on line/or in any not mean that it is morally and ethically
unsolicited e-mail sent to multiple mailing other electronic form) in a particular permissible. Legal provisions make
lists, individuals or newsgroups. Spam manner with any office or appropriate working for computer professionals, users
currently accounts for more than 70 percent government department. Table 2.4.4 and society easier.
of the total e-mail volume worldwide. provides the importance of the References
attribution, acknowledgement and
Information Technology Act of India [1] Brien, J A, 2004. Management
dispatch of electronic records
2000 (IT Act): Some Preliminary Facts Information Systems: Managing
Electronic Gazette: Publication of
IT Act 2000 apart from providing legal Information Technology in the Business
rules, regulations, order, bye-law
recognition for transactions (see Table Enterprise.6th ed. New Delhi: Tata
notications, or any other matters
3) carried out by means of Electronic McGraw-Hill Publishing Company
published in the electronic gazette.
Data Interchange (EDI) and by electronic Limited.
The date of publication shall be
communication (referred to as electronic [2] Leon, A & Leon, M, 2008.
deemed to be the date of the gazette
commerce) also: Introduction to Information Systems.
which was rst published in any form
encourages paper-less office i.e., Noida (Uttar Pradesh, India):
(paper or electronic).
involves the use of alternatives McGraw-Hill Education (India) Pvt.
to paper-based methods of Conclusions Ltd.
communication and storage of Business ethics are moral principles that [3] Murthy. CSV., 2009. Business Ethics:
information, dene right or wrong behavior in the world Text & Cases. Mumbai: Himalaya
facilitate electronic ling of of business. What constitutes right or Publishing House.
documents with the government wrong behavior in business is determined [4] Schwalbe, K, 2007. Information
agencies. by the public interest groups, and business Technology: Project Management.
IT acts covers the following areas: organisations, as well as an individuals 4th ed. Haryana: Thomson Course
E-mail: E-mails could become the personal morals and values organizations Technology. n
About the Author
Prof (Dr) D G Jha is currently working as Professor and Area Chairperson - IT at K J Somaiya Institute of Management
Studies and Research. He has over 25 years of experience and has authored a text book in the area of computing
concepts and Management Information System. He is a Ph.D from University of Mumbai. He is also the programme
coordinator of MCA. His area of interests are computing concepts, DBMS, Information systems, and HRIS.
Debasis Roychoudhuri is an IBM Certied Senior Architect and Enterprise Solution Architect of Cloud Modernization in IBM Australia.
He has 16 years Industry experience, encompassing roles across the verticals, specializing in application infrastructure design,
server consolidation and workload migration from legacy IT environment to various virtualized and cloud environment. He has been
instrumental in IBM Global Delivery for developing several cloud computing initiatives such as open source Cloud integration with
IBM software, enabling client and business partners in various cloud environment. He is involved in several cloud education initiative
in various universities and engineering institutes as part of IBM University Relationship program. He is also Certication Review Board
member for Architecture Review Board (India). He is currently supporting large nancial and mining organization of Australia as a lead
architect, modernization. He can be reached at [email protected].
About the Authors
Biswajit Mohapatra is an IBM Certied Consultant and Global Integrated Delivery Leader for IBM Application Development and
Innovation Digital Modernization Service (DMS) practice. He is IBM India Competency Head for Global Specialized Application
Modernization, Application Workload Optimization and Cloud Migration Competency. Biswajit is a known thought leader in Indian
IT community for leading Application Modernization and Cloud modernization initiatives from concept to realization. Biswajit leads
consulting, solution architecting, offering incubation, technology innovation and delivery of large cloud modernization engagements
at IBM. Biswajit is founder member of IBM Faculty of Academy specializing in creating signature client experience, passionate
participant of various Industry Academia initiatives around Cloud Computing and has several international journal publications on
cloud modernization. He can be reached at [email protected]
Introduction applications can implement security main groups that we have considered
Enterprise security includes the measures features that uses context to take security are physical vs. geographical.
taken to ensure security of enterprise decisions. We present a conceptual Physical location is related to
applications and sensitive data. Earlier, framework for modeling Context Aware a global geographic coordinate
security was thought of as physical Intelligence[6] (CAI). The architecture of system and provides an absolute,
security, and emphasis was on securing our platform, based on this framework, accurate, grid based position in the
physical space and premises that contained is discussed in the next section. How form of a <latitude, longitude> pair.
enterprise application infrastructure. such a platform can be used to enhance Geographical location is used to
However, increasing exposure of applications application security is also described deal with natural geographic objects,
over cloud has resulted in application data through a case study in subsequent such as countries, cities, and also zip
being highly vulnerable to a wide variety of sections. codes, postal addresses and so on.
threats. The enterprise security space has Time Context This category
Context Aware Intelligence & Security
already gone through one transformation deals with information required
Context Aware Intelligence (CAI)
with a shift in focus from parameterized to to handle dynamic environment
framework helps enterprises identify and
de-parameterized security solutions that in the application such as change
develop adaptive enterprise applications.
protect the point of access to the data, rather of situation over time, support for
The CAI framework is designed to dene
than the physical database and servers. The inference on various changes that
situations that can be evaluated based on
next wave of transformation will be the use may take place over a period of time,
current context any point of time. Due to
of more than one dimension of the users time zones, time interval and so on.
its highly adaptable design, the framework
in order to take security-related decisions. Environment Context This category
has wide level of applicability across various
The use of context aware intelligence for deals with physical objects and
domains including enterprise security. The
security, as described in this paper, is a step devices that exist in an application
in that direction. section below explains the key concepts of environment, and participate in data
Context awareness originated as a CAI and how it can be used in implementing acquisition, reasoning and action.
term from ubiquitous computing and has security features.
Conceptual Security Framework
been a topic of research since the last Context Aware Intelligence Framework The core security model is not very different
few decades[1, 2, 3, 4, 5]. However, recent Context Aware Intelligence (CAI) from industry norms as shown in Fig. 1.
developments in smart mobile devices, framework provides a scalable and exible Hence, the core functions of the framework
ubiquitous presence of sensors, affordable solution for integrating information from are:
wireless communications, big data different sources, and incorporating context Identify Identify risk, critical resources
technologies and proliferation of social awareness within an enterprise application. and systems performing critical
networks enable organizations to leverage For simplicity and completeness of context business function. The functions such
technologies related to location tracking, modeling in enterprise applications, CAI as identity and content management
proximity awareness, voice recognition, classies contexts into the following four could be dened by this core function.
social media integration and so on, to categories:
build context aware intelligent solutions. Identity Context This category
The contextualization in security will bring considers data about an entity such
in more than one aspect of the user, e.g. as user prole, intent, actions,
access to other information such as users characteristics, demographics,
location, to take well informed security preferences, interest and history.
policy decisions. Also, by leveraging data Location Context Location can
about what is happening in real-time, be described in different ways,
enterprises can better prioritize their depending on the application
policy adaptations, remediation activities requirements such as local vs. remote,
and attack-response practices. relative vs. absolute, location point
Fig. 1: Security model
This paper describes how enterprise vs. location area, and so on. The two
Dr.Sarika Sharma is Director at JSPMs Eniac Institute of Computer Application, Pune, She has done MCA from
Banasthali Vidyapith, Rajasthan and Ph.d. in Data Mining from GGSIP University, New Delhi. She is also life
member of professional bodies like Computer Society of India, Indian Science Congress, ACMs Computer Science
Teachers Association, New York,
Crossword
Test your knowledge on Cyber Security
Solution to the crossword with name of all correct solution providers(s) will appear in the next issue. Send your answer to CSI
Communications at email address [email protected] with subject: Crossword Solution CSIC May Issue.
CLUES
ACROSS
1. A mathematical process applied on a set of data to represent that data.
4. A property achieved through cryptographic methods to protect against an
individual or entity falsely denying having performed a particular action
related to data.
5. The protocol which provides security at the network layer
8. A characteristic or specic weakness that renders an organization or
asset open to exploitation by a given threat.
9. An attack which tries to make services and resources unavailable.
12. The device which checks all incoming and outgoing traffic for dened
security
16. A malicious program which does not need a host program.
17. A network point that acts as an entrance to another network.
18. The property that ensures that the information is not modied.
19. The protocol used for email security.
20. A tool installed after a compromise to give an attacker easier access to the
compromised system around any security. mechanisms that are in place.
21. A collection of compromised computers.
22. Any computer that has full two-way access to other computers on the
Internet
23. A message in encrypted form.
24. The information gathering and analysis of assets to ensure such things as
policy compliance and security from vulnerabilities.
25. The mathematical science that deals with cryptanalysis and cryptography.
DOWN
2. Passive wiretapping, usually on a local area network, to gain knowledge of
passwords.
3. A computer connected to the Internet that has been secretly compromised
with malicious logic to perform activities under remote control of a remote
administrator.
6. A digital form of social engineering to deceive individuals into providing
sensitive information.
7. Software that compromises the operation of a system by performing an
unauthorized function or process.
10. Faking the sending address of a transmission to gain illegal entry into a secure
Did you know How to create strong password? system.
Creating strong password is very important 11. An authentication service.
13. An unauthorized act of bypassing the security mechanisms of a network or
while making an account anywhere as the information system.
attacker tries different combinations to hack 14. Listening to a private conversation which may reveal information which can
your account. As a counter measure your provide access to a facility or network.
password must contain as many characters as 15. The process of verifying the user.
possible (typically minimum 8). Your password 19. A small update released by a software manufacturer to x bugs in existing
must be a combination of alphabets, special symbols, and numbers. programs.
It will become more difcult to crack if it is a combination of
upper and lower letters. Do not use names, date of birth or
Solution to April 2015 crossword
mobile number with passwords as they can be easily guessed.
Based on above suggestions if your password is weak, please
change your password right now.
Rashid Sheikh
Associate Professor, Sri Aurobindo Institute of Technology
Indore
Computer Society of India Rajkot Chapter, arranged a two The session targeted many PG students, Research Scholars and
hour Knowledge Forum Session on Layer-3 Switching. Total 35 doctorates of Rajkot Chapter. It added a feather in the list of
participants attended this workshop. successes by the CSI Rajkot Chapter.
The session taken by a very renowned personality, Dr. Atul Gonsai, Dr. Atul Gonsai provided different evolutions of networks devices
Associate Professor, MCA Department, Saurashtra University. This and gave insight to Layer-2-3 switching. The Vice-President
seminar was conducted by CSI, Rajkot Chapter, under Knowledge Prof. Nilesh Advani presented vote of thanks. Prof. Jobi Jose,
Forum Session. The session got inaugurated by Dr. R. Sridaran, Chapter secretory has made all the arrangements in connection
Immediate Past Chairman, CSI Rajkot Chapter. He welcomed new with session.
chairman, Prof. Sunil Bajeja, who further talked about CSI Rajkot
All participants were provided with certicates for their
Chapter and its various roles and achieved milestones. He also
participation.
introduced and welcomed the speaker.
20 & 21-2-2015 - National Workshop on Big Data Analytics and Data 25-3-2015 during Expert talkon the New Generation Technologies : A
Mining Tools Paradigm Shift
19-3-2015 during Inter College Programming Competition : Code 26 to 28-2-2015 Participants during Annual Inter College Technical
Combat 15 Festival
(REGION-V) (REGION-V)
SRINIVAS INSTITUTE OF TECHNOLOGY, MANGALORE BNM INSTITUTE OF TECHNOLOGY, BANGALORE
4-4-2015 Mr. Kartheek Kangala, Senior Engineer, Cisco during the 20-3-2015 during Seminar on Awareness of secure programming
workshop SDN and Data Center Networking
(REGION-V) (REGION-V)
SRI KRISHNA INSTITUTE OF TECHNOLOGY, BANGALURU BLDEAS ENGINEERING COLLEGE, BIJAPUR
11-3-2015 during one day workshop on Android Applications 18 & 19-3-2015 during Tech Fest on TECHSTORM 2K15
Development
(REGION-V) (REGION-VI)
BVRIT, HYDERABAD PIIT, NEW PANVEL
9-4-2015 - Dr. Shekar Muddana, Google, Hyderabad during Guest Lecture 27-3-2015 during Magazine Launch event
on Computational Complexity and Theory of NP Completeness
20-1-2015 Dr Vijayaragavan Vishwanathan distributed certicates 20-3-2015 Dr Vijaya Chamundeeswari, Mr Somasundaram Jambunathan,
during the contest on Reverse Coding and Ethical Hacking Dr Duraipandian & Mr Muralidhar during National Conference on
Advanced Computing Technologies
(REGION-VII) (REGION-VII)
M P NACHIMUTHU M JAGANATHAN ENGINEERING COLLEGE, CHENNIMALAI, ERODE DR. N G P INSTITUTE OF TECHNOLOGY, COIMBATORE
24-3-2015 During National Level Conference on Emerging Trends in 19 & 20-3-2015 During National Level Technical Workshop on Scalable
Information & Computer Science 15 Realtime NoSQL Datastores
(REGION-VII) (REGION-VII)
NANDHA COLLEGE OF TECHNOLOGY, ERODE EINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI
1-4-2015 During National Conference Recent Trends in Computing 21-3-2015 Prof. Sivaganesh, Dr. Velayutham, Mr. Karthick Natarajan,
Technologies & Applications Mr. Mathivanan & Dr Ramar during seminar on Advanced Java Programming
(REGION-VII) (REGION-VII)
SHRI SHANKARLAL SUNDARBAI SHASUN JAIN COLLEGE FOR WOMEN, CHENNAI SRM UNIVERSITY, RAMAPURAM CAMPUS, CHENNAI
20-2-2015 Participants during the event on Research Forum 10-4-2015 During the event on Acquisition or Innovation: Which is
more favoured today
Please send your student branch news to Education Director at [email protected]. News sent to any other email id will not be considered.
Please send only 1 photo per event, not more.
Babaria Institute of Technology, CSE department has organized CSI Project Competition cum Exhibition held on 18th April, 2015 under the umbrella
of CSI Vadodara Chapter in which a total of 12 best projects were presented in front of IT Experts from different industries in the esteemed presence
of Mr. A M Nayak, Chairman, Vadodara Chapter.
Projects demonstration to Jury members Felicitation of Mr. A M Nayak by Prof. Saurabh Shah
2015
Date Event Details & Organizers Contact Information
07-09 May 2015 International Workshop on Intelligent Approaches for Object Oriented Modeling in Component Dr. Shishir Kumar
Based Software Engineering (IAOOM-2015) to be organized at Jaypee University of Engineering [email protected]
& Technology, Guna (MP)http://www.juet.ac.in
1517 May 2015 International Conference on Emerging Trend in Network and Computer Communication Prof. Dharm Singh
(ETNCC2015) at Department of Computer Science, School of Computing and Informatics [email protected]
Polytechnic of Namibia in Association with Computer Society of India Division IV.
http://etncc2015.org/
17 May 2015 WTISD 2015 - Telecommunications and ICTs: Drivers of Innovations at CSI Udaipur Chapter, Dr. Y C Bhatt
IE(I) ULC At Udaipur [email protected]
Amit Joshi [email protected]
30-31 May 2015 Two Day National Conference on ICT Applications CONICTA-2015 at IIBM Auditorium, Prof. A K Nayak
Patna organized by CSI Patna Chapter in association with Division III ad Division IV of aknayak@iibm,in
Computer Society of India. Dr. Durgesh Kumar Mishra
[email protected]
3-4 July 2015 International Conference on ICT for Sustainable Development, organized by CSI Division Amit Joshi [email protected]
IV, Ahmedabad Chapter, ASSOCHAM Gujarat Chapter and Sabar Institute of Technology for Dr. Nisarg Pathaknisarg.pathak@
Girls, Gujarat At Ahmedabad http://www.ict4sd.in gmail.com
24-25 July 2015 International Conference on ICT in Health Care and E-Governance, at Sri Aurobindo Institute Dr. Durgesh Kumar Mishra
of Technology, Indore in association with Computer Society of India Division III, Division IV, [email protected]
Indore Chapter, ACM Udaipur Chapter. www.csi-udaipur.org/icthc-2015/ Dr. AK Nayak
[email protected]
Mr. Amit Josi
[email protected]
7-8 Aug 2015 International Conference on Innovations in Computer Science & Engineering (ICICSE-2015) Dr. H S Saini
Organized by Guru Nanak Institution, Hyderabad in association with Computer Society of [email protected]
India Division IV and Hyderabad Dr. D D Sharma
Chapter. www.icicse2015.org [email protected]
10-12 Sep 2015 International Conference on Computer Communication and Control (IC4-2015) at Medicaps Dr. Promod Nair
Group of Institutions, Indore in association with Computer Society of India Division IV, CSI Mitm,[email protected]
Indore Chapter and IEEE MP subsection. Prof. Pankaj Dahore
[email protected]
9-10 Oct 2015 International Congress on Information and Communication Technology (ICICT-2015) at Dr. Y C Bhatt
Udaipur, organized by CSI Udaipur Chapter, CSI Division IV, SIG-WNs, SIG-e-Agriculture and [email protected]
ACM Udaipur Chapter. www.csi-udaipur.org/icict-2015 Mr. Amit Josi
[email protected]
16-17 Oct 2015 6th Edition of the International Conference on Transforming Healthcare with IT to be held at Mr. Suresh Kotchatill,Conference
Hotel Lalit Ashok, Bangalore, India. http://transformhealth-it.org/ Coordinator, [email protected]
submission