OSUOLALE FESTUS ADEYINKA  picture
OSUOLALE FESTUS ADEYINKA

Publication

Publisher:
 International Journal Of Research Studies In Computer Science And Engineering (IJRSCSE)
Publication Type:
 Journal
Publication Title:
 Data Finding, Sharing And Duplication Removal In The Cloud Using File Checksum Algorithm
Publication Authors:
 OSUOLALE A. FESTUS
Year Published:
 2019
Abstract:
Cloud computing is a powerful technology that provides a way of storing voluminous data that can easily be accessed anywhere and at any time by eliminating the need to maintain expensive computing hardware, dedicated space, and software. Addressing increasing storage needs is challenging and a time demanding task that requires large computational infrastructure to ensure successful data processing and analysis. With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. This project provides an overview on cloud computing, cloud file services, its accessibility, and storage. It also considers storage optimization by de-duplication studying the existing data de-duplication strategies, processes, and implementations for the benefit of the cloud service providers and the cloud users. The project also proposes an efficient method for detecting and removing duplicates using file checksum algorithms by calculating the digest of files which takes less time than other pre-implemented methods. 
Publisher:
 Computer Science & Engineering Journal - Global Scientific Journals (GSJ)
Publication Type:
 Journal
Publication Title:
 A Mobile System For Information Dissemination Via GSM-Microcontroller Technologies
Publication Authors:
 Oluwaseun I. Owadayo; Festus A. Osuolale
Year Published:
 2019
Abstract:
Mobile and Wireless dissemination of information is becoming big business and also becoming critical in the public places because of the convenience the system affords. This technology is useful in advertisements, stock market information dissemination and so on. Information has lifespan; therefore opportunities are wasted daily as a result of lack of timely dissemination of information and the convectional system of disseminating notices, of advertising to the general public or changing and managing information from time-to-time is a difficult and cumbersome process. There is therefore a need to develop a system that can be used to disseminate information on time anywhere the user is. A prototype of the system has been developed in the computer science department, Federal University of Technology Akure. The prototype aims at using microcontroller and Smartphone to wirelessly send information to a digital display board using GSM Technology. The hardware board at the heart of the system contains ATMEGA 328P microcontroller. The microcontroller is interfaced with GSM Modem via MAX232 level converter which is used to convert RS232voltage levels to TTL voltage levels and vice versa. A 16x2 Character LCD display and alphanumeric panel is attached to microcontroller for display. Microcontroller coding is done using Embedded C and MicroC software package. A test case carried out on the prototype developed performs excellently. 
Publisher:
 International Journal Of Computer Trends And Technology (IJCTT)
Publication Type:
 Journal
Publication Title:
 Comparative Security Vulnerability Analysis Of NoSQL And SQL Database Using MongoDB And MariaDB
Publication Authors:
 Jeremiah Oluwagbemi Abimbola; Osuolale A. Festus
Year Published:
 2019
Abstract:
Security is a growing concern for any system from desktop to web applications. As data increases, there must be a database system that can safely deal with the current need. However, with update in database systems, comes vulnerabilities. Hence, the need to continuously keep this research in motion. This paper presents a comprehensive study of potential security vulnerabilities and challenges for two databases. A detailed comparison between traditional SQL and NoSQL databases is provided and identification of a set of vulnerabilities specific to representative database applications using MongoDB and MariaDB.Examples of attacks and mitigation techniques are also provided, the discussion and results shown helps database administrators and application developers increase awareness of arising threats while deploying SQL and NoSQL databases. 
Publisher:
 SciTechnol
Publication Type:
 Journal
Publication Title:
 Multidimensional Analysis And Mining Of Call Detail Records Using Pattern Cube Algorithm
Publication Authors:
 Elusade O M And Osuolale A Festus
Year Published:
 2017
Abstract:

In the emerging and keenly competitive telecommunications market, it is imperative for mobile telecom operators to carry out regular analysis of their massive stored call logs to maintain and manage their numerous subscribers. Such sequential stream data analysis requires an efficient data mining algorithm and techniques bearing in mind the challenges posed by its massive size. Many data mining applications have been adapted for similar purposes. However, there has not been much emphasis on an in-depth mining of call detail records (CDR) as a multidimensional sequential stream data with its attending storage overhead. This paper proposes a novel algorithm for the multidimensional analysis of call records. Pattern Cube Algorithm (PCA) was implemented with a computer program and established empirically that: a massive CDR can be meaningfully summarized into a handy record as data mart with a gain of about 90% reduction in size and the possibility of processing a huge data from any server irrespective of the size of the target data. A quantitative exploration of the various gains in IT resources is conducted through an extensive experimental study on a sample of CDR adapted from MTN Communications Nigeria Limited.

 
Publisher:
 European Scientific Journal
Publication Type:
 Journal
Publication Title:
 Schematic Structure Of National Data Harmonization System For Identity Management
Publication Authors:
 Osuolale A Festus, Adewale, O. S And Abimbola, J. O
Year Published:
 2017
Abstract:

Imagine a web-application in which a user can query varieties of information about an individual (like name, age, state of origin, driver’s license number, national identification number, etc.). This information would be stored on different databases, each having its own schema. Often times, these resources are replicated in different locations and on different platforms. Hence, the need for data harmonization or integration. Data harmonization addresses this issue by considering these external resources as materialized views over a virtual mediated schema resulting in “virtual data integration”. When mediated schema is queried, the solution transforms the result into appropriate queries over the various and existing data sources. This paper focuses on data harmonization that cuts across different governmental database and incorporating them all into a centralized view and this is possible as a result of development and implementation of a web-based databank application.

 
Publisher:
 IJSER - International Journal Of Scientific & Engineering Research Volume 8, Issue 12, December-2017. ISSN 2229-5518
Publication Type:
 Journal
Publication Title:
 Secure Data Transfer Over The Internet Using Image CryptoSteganography
Publication Authors:
 Osuolale, A. Festus
Year Published:
 2017
Abstract:

The art of hiding information has been on for centuries and improvement and advancement have always accompanied information security to ensure the message gets to the intended recipient without compromise. Over the years, cryptography and steganography are the two major methods for securing, hiding and transmission of messages separately. The methods used information in order to cipher or cover their existence respectively. Cryptography is an art and science of hiding messages to introduce secrecy in data and/or information security while steganography is simply the art of secret writing, Crypto-steganographic method is aimed at amalgamating both the cryptography and steganography methods for a better information security. The primary purpose of this paper is to build up a new method of hiding secret text messages in an image, by combining cryptography and steganography. A new algorithm is proposed and implemented to achieve this. LSB method is used to hide the encrypted message into images while MSE and PSNR are used to acquire the quality of images.

 
Publisher:
 InSITE
Publication Type:
 Conference
Publication Title:
 An Enhanced Graphical Password Technique Using Fake Pointers
Publication Authors:
 Alese, B. K., Omojowo, A. A., Adesuyi, A. T., Thompson, A. F., Adewale O. S., And Osuolale F. O
Year Published:
 2015
Abstract:

Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Consequently, this paper designs a new graphical password technique based on images, rather than alphanumeric strings. Although, graphical password technique is more secure than textual password. It is also vulnerable to attacks. The most common problem therefore with Graphical Password is the Shoulder Surfing problem, also called “PEEPING ATTACK”. In this paper, we proposed a user authentication technique called “FAKEPOINTER”- a user authentication technique that conceals users’ authentication secret regardless of a shoulder surfer success by video camera(s). In the software designed, a graphical password fake indicator (pointer) is incorporated to enhance users’ login (password) against attack. The system is designed to run on windows platform with .Net support with Microsoft Structured Query Language Server as the back end, C# as front end. The system performs better when compared to existing system.

 
Publisher:
 Infonomics Society
Publication Type:
 Journal
Publication Title:
 A Web Based Information Security Risks Assessment Model
Publication Authors:
 B. K. Alese, O. Oyebade, O. Iyare, Osuolale A. Festus, A. F. Thompson
Year Published:
 2015
Abstract:

A risk is the possibility that an undesirable event could happen. Different methodologies have been proposed to assess and manage IT risks each of which is divided into processes and steps. Two specific methods of interest in this work are: “Risk Matrices” and “Risk Registers”. A generic Risk Register application module and an updatable Risk Matrix module were designed. This work studies risk management techniques and employs a custom model for the automated assessment of IS risks. This model was implemented in phases corresponding to its aspects. The “Assessment methods” of interest to this work are Risk Registers, Risk Matrices and the Scenario Geek”. What-if analysis is a data-intensive simulation whose goal is to inspect the behavior of a complex system under some given hypotheses called scenarios. What-ifs are used to generate qualitative descriptions of potential problems in the form of questions and responses lists of recommendations for preventing problems. The Risk Assessor was developed using Microsoft’s Visual Basic.Net with Active Server Pages (ASP.Net) Technologies on .Net Framework 4.0. The solution propounded in this work is a good risk management application that provides upward assurance from information technology security issues, business activities and administrative functions and ultimately to anyone that chooses to adopt it.

 
Publisher:
 InSITE
Publication Type:
 Conference
Publication Title:
 Design Of Circuit System-based Cryptography
Publication Authors:
 Akinwonmi, F. C, Alese, B. K., Dahunsi, F. M, Osuolale, F. A And Odo, A. E
Year Published:
 2015
Abstract:

Cryptography is the science of writing in secret codes which can be achieved either by using software encrypter or hardware encrypter. This study presents the development of a pair of circuit system-based (hardware) cryptographic processor. The hardware encryption in this study was achieved using the bitwise logic operations in the registers of the microcontroller and messages are streamed as serial ASCII data from the PC through the USB port to the microcontroller unit. The encryption is performed on each ASCII representation using a pass key embedded in the microcontroller unit. Decryption process is similar but in the reverse order. A comparative analysis of the encryption time for the hardware-based data encryption was made and findings recorded. The processor was implemented using PIC18F4550 microcontroller mounted on a Printed Circuit Board alongside other components to achieve the hardware based circuitry. The software end of the encryption and decryption algorithm was developed based on a library built into C Language Visual Studio version 2010 and the CCS C compiler for communication protocol stack.

 
Publisher:
 Infonomics Society
Publication Type:
 Journal
Publication Title:
 A Robust Multicast Authentication Scheme Based OnAsymmetric Key Signature
Publication Authors:
 Opayinka C. A, Alese B. K, Thompson A. F, Alowolodu O. D And Osuolale, A. Festus
Year Published:
 2014
Abstract:

Multicast packets authentication major challenges are high computation overhead incurred while signing multicast streams and authentication difficulty when there is one or more packet losses. In this paper, Information Dispersal Algorithm was used to construct the hash of each packet with the hash values of individual packets concatenated over multiple packets. Authentication scheme for Multicast message packets design was based on signature amortization technique. This reduces the computation overhead and ensures verification when there is packet loss. The design was simulated with a number of messages sent to a chosen number of receivers. Probabilities of loss were calculated for each transmission. The performance was compared with three other existing schemes to ascertain its efficiency. It was observed that our technique is efficient in packets authentication in a lossy environment especially with reduced space overhead.