Browsing by Author "Olanrewaju, Rashidah F."
Now showing 1 - 11 of 11
Results Per Page
Sort Options
Item Open Access Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review(Department of Computer Science, Nasarawa State University Keffi, 2017-09-10) Olanrewaju, Rashidah F.; Islam Khan, Burhan UI; Mueen, M. Islam Mattoo Islam UIObjectives: The goal of this paper is to comprehend the significance of adopting Cloud Computing (CC) in establishments of higher learning. This paper plots a portion of the advantages that can be conveyed to advanced education using cloud computing, analyzes probably the most imperative difficulties that can be faced by the academia due to its adoption, and proposes some early strides towards its adoption while alleviating the risks involved. Methods/Statistical Analysis: This paper recognizes an expansiveness of institutional variables and CC appropriation procedures by including the diverse perspectives of sources from various backgrounds and contexts on a single phenomenon. The different aids and contributions in this paper are based on the consolidation of research works available in various papers. Findings: The discoveries from this analysis demonstrate that the adoption of CC in establishments of higher learning can be comprehended through a few factors that have an essential impact on CC adoption methodologies like administrative bodies and governments, internal stakeholders, cloud suppliers, firm attributes, socio-political changes, IT framework, and so on. Applications/ Improvements: This investigation offers open doors for future research besides giving an understanding into how cloud suppliers, advisors, governments, and scholastics see several market requests, and how they react to these demands while advancing services offered by CC in higher learning institutions. The consequences for practice can help decision makers in adopting services provided by CC legitimately.Item Open Access Analysis of Packet Reordering Delay for Bandwidth Aggregation in Heterogeneous Wireless Networks(Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.Bandwidth aggregation in heterogeneous wireless networks (HWN) can be one of the effective solutions in providing quality data transmission for real-time applications. However, transmitting the data through multiple networks create packet reordering issues that result in transmission delay and degrades the overall quality of services. This paper addresses packet reordering issues both for single and multiple paths with a reordering delay in the transmission system. An algorithm has proposed to mitigate the associated delay that has been simulated in network simulator 3 (NS3). The simulation results have benchmarked with the well known Earliest Delivery Path First (EDPF) method and shown better performance over the EDPF results. Moreover, the simulation has been done to analyze the packet scheduling including to measuring packet reordering delay, and reordering entropy. CBR and VBR applications have been transmitted for 1800ms from sender to receiver in a heterogeneous wireless environment created in NS3. The results show the proposed method achieved to reduce the reordering delay and reordering entropy both for CBR and VBR applications.Item Open Access Bandwidth Allocation Policy using the Game Theory Model in Heterogeneous Wireless Networks(Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.In Heterogeneous Wireless Network (WHN), a Mobile Device (MD) can be connected with multiple access technologies available in a particular geographical area. Selection of appropriate access technology is a challenge for the MD where game theory policy can be applied. Shapley Value is one of the game-theoretic models that can be applied to allocate appropriate bandwidth for i number of users for k number of services from N access technologies. It proposes the fairest allocation of the collectively gained profits among the collaborative players in the game. The primary focus is to find the relative contribution of every player in a cooperative game. This paper has drawn a numerical analysis of Shapley Value for three wireless access technologies, namely WiFi, Cellular and WiMAX. It has been shown how much bandwidth can be allocated from an access technology for a required bandwidth for a specific service. It can be noted from the results that 225Kbps, 141.67Kbps and 233.33Kbps can be allocated from WiFi, Cellular and WiMAX respectively to transmit the 600Kbps data in an HWN network.Item Open Access A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem(Department of Computer Science, Nasarawa State University Keffi, 2020-03-03) Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Anwar, Farhat; Roohie, Naaz Mir; Najeeb, Rahman AthaurIncreasing proliferation of IoT has led to an evolution of various devices for realising the smart features of ubiquitous applications. However, the inclusion of such a massive pool of devices with different computational capabilities, network protocols, hardware configurations, etc. also causes a higher number of security threats. Security professionals, organisations, and researchers are consistently investigating the security problems associated with IoT ecosystem and are coming up with different forms of solution sets. This paper presents a snapshot of the existing research work being carried out towards the security of IoT and assesses their strengths and weaknesses. The paper also explores the current research trend and presents the latest security methods being implemented and outlines the open research issues associated with it. The paper contributes to offering an accurate picture of the effectiveness of the existing security system in IoT.Item Open Access Data in Transit Validation for Cloud Computing Using Cloud- Based Algorithm Detection of Injected Objects(Department of Computer Science, Nasarawa State University Keffi, 2018-05-15) Olanrewaju, Rashidah F.; Islam, Thouhedul; Khalifa, Othman O.; Fajingbesi, Fawwaz EniolaThe recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detectedItem Open Access Design and Fabrication of an Intelligent Walking Staff for Visually Impaired Subjects(Department of Computer Science, Nasarawa State University Keffi, 2018-03-24) Olanrewaju, Rashidah F.; Muhammad, Luqman Azzaki Mohd Radzi; Rehab, Mariam; Fawwaz, Eniola Fajingbesihe joy we derive from our ability to commute and interact freely with the world as a result of our possession of sight with the naked eyes are enormous however the Visually impaired people find great difficulty in moving around freely without a human guide, especially in a new terrain. This research reports the design and fabrication process of an intelligent walking staff (iWalk) specially designed for the visually disabled individuals to argument their loss of sight, improve and ease their navigation. iWalk was designed around water and ultrasonic sensors to detect obstacles and water ahead. iWalk also has a wireless RF remote control buzzer for localization and detection in case it gets misplaced. The proposed system operability and efficiency was adequately tested using physical dataset composed of randomized locations with random obstacles and water. The proposed algorithm achieves an overall efficiency of 90% detection rate for water and ultrasonic sensor and 85.75% for the RF wireless remote control.Item Open Access Intelligent Cooperative Adaptive Weight Ranking Policy via dynamic aging based on NB and J48 classifiers(Department of Computer Science, Nasarawa State University Keffi, 2017-10-27) Al-Qudah, Dua'a Mahmoud; Olanrewaju, Rashidah F.; Azman, Wong AmeliaThe increased usage of World Wide Web leads to increase in network traffic and create a bottleneck over the internet performance. For most people, the accessing speed or the response time is the most critical factor when using the internet. Reducing response time was done by using web proxy cache technique that storing a copy of pages between client and server sides. If requested pages are cached in the proxy, there is no need to access the server. But, the cache size is limited, so cache replacement algorithms are used to remove pages from the cache when it is full. On the other hand, the conventional algorithms for replacement such as Least Recently Use (LRU), First in First Out (FIFO), Least Frequently Use (LFU), Randomised Policy, etc. may discard essential pages just before use. Furthermore, using conventional algorithms cannot be well optimized since it requires some decision to evict intelligently before a page is replaced. Hence, this paper proposes an integration of Adaptive Weight Ranking Policy (AWRP) with intelligent classifiers (NB-AWRP-DA and J48-AWRP-DA) via dynamic aging factor. To enhance classifiers power of prediction before integrating them with AWRP, particle swarm optimization (PSO) automated wrapper feature selection methods are used to choose the best subset of features that are relevant and influence classifiers prediction accuracy. Experimental Result shows that NB-AWRP-DA enhances the performance of web proxy cache across multi proxy datasets by 4.008%,4.087% and 14.022% over LRU, LFU, and FIFO while, J48-AWRP-DA increases HR by 0.483%, 0.563% and 10.497% over LRU, LFU, and FIFO respectively. Meanwhile, BHR of NB-AWRP-DA rises by 0.9911%,1.008% and 11.5842% over LRU, LFU, and FIFO respectively while 0.0204%, 0.0379% and 10.6136 for LRU, LFU, FIFO respectively using J48-AWRP-DA.Item Open Access Mitigating Storage Security Threats in Mobile Phones(Department of Computer Science, Nasarawa State University Keffi, 2018-04-04) Hussain, Sabahat; Olanrewaju, Rashidah F.; Ismail, Ahmad Fadzil BinObjectives: This paper discusses the proposed system which provides the user the ability to run the application on Android phones for encrypting all types of files before they are stored. Methods/Statistical Analysis: In the proposed system, Advanced Encryption Standard (AES) is employed for encryption as well as decryption of the files stored by users in mobile phones. All types of files including docx, text, pdf, image, ppt, audio and video files can be encrypted and later regenerated as well. Findings: The use of AES in encrypting and decrypting data in this system provides good security as well as higher speed. An added advantage is that it is implementable on several platforms particularly in small gadgets like smartphones. As compared to the traditional computers, smartphones can be carried more easily and provide similar functionalities as that of a computer like data storage and processing, communication and other services including video call, wireless network, web browser, GPS, audio or video player. Application/Improvements: Data is transmitted, shared and stored for various purposes including production, banking, development, and research. Therefore, security is a must for information which can be provided by encryption using AES as proposed in this system.Item Open Access Secure Annihilation of Out-of-Band Authorization for Online Transactions(Department of Computer Science, Nasarawa State University Keffi, 2018-02-02) Hussain, Sabahat; Islam Khan, Burhan UI; Anwar, Farhat; Olanrewaju, Rashidah F.Objectives: In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-Time- Password (OTP) generation mechanism employing two Secure Hash Algorithms viz. SHA3 and SHA2, followed by dynamic truncation to produce human-readable OTP. An inimitable authentication scheme has been presented in which a unique initial seed is used for generating a series of OTPs on the user’s handheld gadget (i.e. a mobile phone). Findings: The proposed scheme demonstrated better results than the previous schemes of authorization after a security analysis was conducted on it. This is attributed to the eradication of cellular network within the authorization process. A high level of performance and efficiency in authentication and authorization was evident from the results that are vital for transacting online. Applications/Improvements: In the proposed system, the inherent features of the user’s device (mobile phone) are utilized to form the initial seed. The application of hash functions to that seed eliminates the necessity to send one time passwords to the users via Short Message Service and decreases the limitations posed by out-of-band systems, thus making it suitable to be employed in online banking and other financial organizationsItem Open Access Snort-Based Smart and Swift Intrusion Detection System(Department of Computer Science, Nasarawa State University Keffi, 2017-01-01) Olanrewaju, Rashidah F.; Islam Khan, Burhan UI; Najeeb, Rahman Athaur; Zahir, Ku Afiza Ku Nor; Hussain, SabahatObjectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance. Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. Then, only these relevant features are trained with the help of multi-layer perceptron supervised neural network. The simulation is performed using MATLAB. Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. Besides, the intrusions have been classified into four categories as Denial-of-Service (DoS), User-to-root (U2R), Remote-to-Local (R2L) and Probe attacks; and the alerts are stored and shared via a central log. Thus, the unknown attacks detected by other Intrusion Detection Systems can be sensed by any IDS in the network thereby reducing computational cost as well as enhancing the overall detection rate. Applications/Improvements: The proposed system does not waste time by considering and analysing all the features but takes into consideration only relevant ones for the specific attack and supervised learning neural network is used for intrusion detection. By the application of Snort before backpropagation algorithm, the latter has only one function to perform – detection of unknown attacks. In this way, the time for attack detection is reduced.Item Open Access SSM: Secure-Split-Merge Data Distribution in Cloud Infrastructure(Department of Computer Science, Nasarawa State University Keffi, 2015-02-02) Islam Khan, Burhan UI; Baba, Asifa Mehraj; Olanrewaju, Rashidah F.; Lone, Sajad Ahmad; Zulkurnain, Nurul FarizaWith the advancement of cloud storage services the vulnerabilities associated with cloud-related data has increased. It affects the cloud distributed data servers that are not only used for data storage, but also used for managing a huge amount of data with distributed file structures in collaborative sharing. The data sharing processes of cloud computing infrastructure are susceptible to various kinds of attacks where many traditional cryptographic techniques fail to provide a proper and efficient authentication mechanism. In this paper, a novel approach namely Secure-Split-Merge (SSM) is introduced for the security of data. The proposed SSM scheme uses a unique mechanism of performing splitting of data using AES 128 bit encryption key. The chunks of encrypted splits are being maintained on various rack servers of different types of cloud zones. The comparative analysis shows that the proposed system gives effective outcomes as compared to various existing and traditional security standards.