This document proposes a three-layer cloud storage scheme based on fog computing to improve privacy protection. The scheme splits user data into three parts that are stored in the cloud server, fog server, and user's local machine. It uses a Hash-Solomon encoding technique to distribute the data in a way that original data cannot be reconstructed from partial information. The scheme leverages fog computing to both utilize cloud storage and securely protect data privacy against insider attacks. Theoretical analysis and experiments demonstrate that the proposed scheme effectively addresses privacy issues in existing cloud storage models.
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
This document proposes a three-layer security model for privacy-preserving cloud storage. The model uses encryption techniques like AES and Triple DES to encrypt user data before storing it in the cloud. The encrypted data is then divided into blocks that are distributed across different cloud, fog, and local storage locations. This prevents data leakage even if some blocks are lost or accessed. Computational intelligence paradigms help optimize the distribution of data blocks for efficiency and security. The model aims to provide stronger privacy protection compared to traditional cloud storage security methods.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
This document summarizes research on personality-based distributed provable data ownership in multi-cloud storage. It discusses how current provable data possession protocols have limitations such as authentication overhead and lack of flexibility. The proposed approach eliminates authentication management by using identity-based cryptography. It aims to provide a secure, efficient and adaptable protocol for integrity checking of outsourced data across multiple cloud servers.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
Cloud computing is a mechanism which provides us resources, information as per user requirement by the help of internet. Cloud is used to store important content material for a longer period of time which requires trust and safety of content that is stored in cloud. The main issue of cloud computing is security of data. Many techniques proposed earlier were beneficial for static archived data. Some encryption techniques were introduced later for dynamic data which includes masking technique, bilinear property with dynamic auditing. This paper proposed an effective auditing protocol to maintain the dynamic operations on data with RSA, MD5 and ID3 algorithms for enhancing data safety. The analysis and simulation results are effectual and protected as it incurs least communication cost and least computation cost of the auditor.
Survey on Data Security with Time Constraint in CloudsIRJET Journal
This document discusses a proposed key-policy attribute-based encryption scheme with time-specified attributes (KP-TSABE) that aims to provide secure self-destructing of sensitive data stored in the cloud. The KP-TSABE scheme labels each ciphertext with a time interval and associates each private key with a time instant. A ciphertext can only be decrypted if the time instant falls within the specified time interval and if the attributes associated with the ciphertext satisfy the key's access structure. This allows fine-grained access control for a user-defined authorization period and ensures sensitive data is securely destroyed after an expiration time. The scheme is proven secure under cryptographic assumptions and is intended to address privacy and security challenges with sharing
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
This document proposes a method for secure data storage and integrity auditing in the cloud using multi-level encryption and data deduplication. The method first checks for duplicate files using hash comparisons and avoids uploading duplicate data to save storage space. It then encrypts data using AES, DES and RSA algorithms sequentially, generating keys each time. The keys are then re-encrypted using AES and stored on separate servers. This multi-level encryption and distribution of encrypted data and keys across servers makes the data more secure. It also enables proof of storage and authentication of authorized users using time-based keys.
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
Final project presentation of Final year B.tech CSE Project APJ Abdul Kalam Technological University.
About the project
Cloud computing has now become a major trend, it is a new data hosting technology that is very popular in recent years. In this project, we are developing an web application that can securely store the files to a cloud server. We proposes a system that uses hybrid cryptography technique to securely store the data in cloud. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the users to fetch more trust of their data in the cloud. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable format. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server.
We provide a cloud storage that uses multiple crypotraphic technique which is known by hybrid cryptography. The product provides confidentiality by using security for both upload and download. The data will be secured since we use multi level security techniques and multiple servers for storage.
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
This document proposes a three-layer security model for privacy-preserving cloud storage. The model uses encryption techniques like AES and Triple DES to encrypt user data before storing it in the cloud. The encrypted data is then divided into blocks that are distributed across different cloud, fog, and local storage locations. This prevents data leakage even if some blocks are lost or accessed. Computational intelligence paradigms help optimize the distribution of data blocks for efficiency and security. The model aims to provide stronger privacy protection compared to traditional cloud storage security methods.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
This document summarizes research on personality-based distributed provable data ownership in multi-cloud storage. It discusses how current provable data possession protocols have limitations such as authentication overhead and lack of flexibility. The proposed approach eliminates authentication management by using identity-based cryptography. It aims to provide a secure, efficient and adaptable protocol for integrity checking of outsourced data across multiple cloud servers.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
Cloud computing is a mechanism which provides us resources, information as per user requirement by the help of internet. Cloud is used to store important content material for a longer period of time which requires trust and safety of content that is stored in cloud. The main issue of cloud computing is security of data. Many techniques proposed earlier were beneficial for static archived data. Some encryption techniques were introduced later for dynamic data which includes masking technique, bilinear property with dynamic auditing. This paper proposed an effective auditing protocol to maintain the dynamic operations on data with RSA, MD5 and ID3 algorithms for enhancing data safety. The analysis and simulation results are effectual and protected as it incurs least communication cost and least computation cost of the auditor.
Survey on Data Security with Time Constraint in CloudsIRJET Journal
This document discusses a proposed key-policy attribute-based encryption scheme with time-specified attributes (KP-TSABE) that aims to provide secure self-destructing of sensitive data stored in the cloud. The KP-TSABE scheme labels each ciphertext with a time interval and associates each private key with a time instant. A ciphertext can only be decrypted if the time instant falls within the specified time interval and if the attributes associated with the ciphertext satisfy the key's access structure. This allows fine-grained access control for a user-defined authorization period and ensures sensitive data is securely destroyed after an expiration time. The scheme is proven secure under cryptographic assumptions and is intended to address privacy and security challenges with sharing
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
This document proposes a method for secure data storage and integrity auditing in the cloud using multi-level encryption and data deduplication. The method first checks for duplicate files using hash comparisons and avoids uploading duplicate data to save storage space. It then encrypts data using AES, DES and RSA algorithms sequentially, generating keys each time. The keys are then re-encrypted using AES and stored on separate servers. This multi-level encryption and distribution of encrypted data and keys across servers makes the data more secure. It also enables proof of storage and authentication of authorized users using time-based keys.
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
Final project presentation of Final year B.tech CSE Project APJ Abdul Kalam Technological University.
About the project
Cloud computing has now become a major trend, it is a new data hosting technology that is very popular in recent years. In this project, we are developing an web application that can securely store the files to a cloud server. We proposes a system that uses hybrid cryptography technique to securely store the data in cloud. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the users to fetch more trust of their data in the cloud. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable format. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server.
We provide a cloud storage that uses multiple crypotraphic technique which is known by hybrid cryptography. The product provides confidentiality by using security for both upload and download. The data will be secured since we use multi level security techniques and multiple servers for storage.
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
This document summarizes a research paper that proposes a system for secure and private cloud storage using multiple encryption algorithms and third-party auditing. The system aims to preserve privacy while enabling public auditing of stored data. It utilizes homomorphic authenticators, random masking, and asymmetric (RSA) and symmetric (AES) encryption algorithms. A third-party auditor can efficiently audit user data in the cloud to ensure integrity without learning the actual data contents, and the system addresses potential data leaks from the auditor. The paper analyzes RSA and AES algorithms to determine which provides better performance and security for the system.
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses effective modular order preserving encryption on cloud using multivariate hypergeometric distribution (MHGD). It begins with an abstract that describes how order preserving encryption allows efficient range queries on encrypted data. It then provides background on cloud computing security concerns and discusses existing approaches to searchable encryption, including probabilistic encryption, deterministic encryption, homomorphic encryption, and order preserving encryption. The key proposed approach is to improve the security of existing modular order preserving encryption approaches by utilizing MHGD.
This document summarizes a research paper that proposes a security architecture for cloud computing that dynamically configures cryptographic algorithms and keys based on security policies and inputs like network access risk and data sensitivity. The architecture aims to improve security while reducing costs by only using the necessary level of encryption for each situation. It describes using the Blowfish algorithm instead of AES and adjusting the key size from 128 to 448 bits depending on factors like network type and data size. Results show Blowfish has better performance than AES, especially with larger keys on larger amounts of data. The goal is to provide flexible, efficient security tailored to each user's needs.
This document discusses processing private K-nearest neighbor (KNN) queries over untrusted cloud data. It proposes a framework that uses privacy homomorphism to securely process queries while preserving the privacy of both the data owner and the client submitting queries. The framework divides query processing into node traversal and distance computation steps. It encrypts the data index and uses the cloud to decrypt distances during computation, while preventing any party from accessing the actual query or result distances. The framework allows private querying without revealing sensitive information to the cloud or data owner.
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
This document proposes a novel approach to implementing data deduplication on the cloud using message locked encryption. It aims to overcome limitations of existing deduplication techniques like convergent encryption by using erasure code technology, encryption algorithms like DES and MD5 hashing, and tokenization to securely store and protect client data on the cloud. The proposed system gives clients proof of ownership of their data by allowing them to choose who can access their files and see any changes made over time. The system architecture involves a client uploading encrypted data to the cloud, and recipients selected by the client being able to access and retrieve encrypted pieces of the data.
This document discusses big data security issues and encryption techniques. It begins with introducing the authors and providing an abstract about addressing security issues related to data integrity, confidentiality and availability. The main body then covers authentication, data, network and generic security challenges with big data as well as proposed solutions like encryption, logging and honeypot nodes. The document focuses on describing symmetric and asymmetric encryption algorithms including DES, AES, RSA and ECC. It compares the algorithms and concludes that encryption techniques can help secure big data stored in clouds, though current security levels may be improved.
The document proposes new distributed deduplication systems with higher reliability for secure cloud storage. Data chunks are distributed across multiple cloud servers using a deterministic secret sharing scheme. This improves reliability over traditional deduplication systems that store only one copy of each file. The systems aim to achieve security requirements of data confidentiality and consistency while limiting overhead.
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is a most-effective data reduction technique that identifies and eliminates the redundant data. Dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However to protect the privacy of data, many users encrypt it before storing in CS. This method affects the deduplication process because encryption methods have varying characteristics. Convergent encryption (CE) scheme is widely used for secure data deduplication, but it destroys the message equality. Although, DupLESS provides strong privacy by enhancing CE, but it is also found insufficient. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This paper addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
This document presents a research paper that proposes a two-stage encryption algorithm to improve security of multimedia content stored in the cloud. The first stage encrypts multimedia content into ciphertext-1 using an asymmetric private key that is randomly generated. The ciphertext-1 is then encrypted again in the cloud using a symmetric public key. During decryption, the encrypted ciphertext is first decrypted using the randomly generated key to retrieve ciphertext-1, which is then decrypted using traditional encryption methods to recover the original multimedia content. The randomly generated key makes it difficult to extract the encryption key and access the encrypted information without authorization. The proposed algorithm aims to enhance security against negligent third parties and side channel attacks in cloud computing.
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
This document discusses data security in cloud computing using cryptographic algorithms. It begins by introducing cloud computing and cryptography. Cryptography is used to securely store and transmit data in the cloud since the data is no longer under the user's direct control. The document then discusses how AES (Advanced Encryption Standard) can be used to encrypt data for secure storage and transmission in cloud computing. It provides an overview of the AES algorithm, including the encryption process which involves sub-processes like byte substitution, shift rows, mix columns and adding round keys over multiple rounds. The document also provides pseudocode for the AES encryption process and discusses how AES encryption provides stronger security than other algorithms like DES.
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. The strives of environment is dynamic, customizable and reliable with the quality of services. Security issues in the cloud as it is anywhere else. Lots of people share different point of views in cloud computing. Some of the people believe that it is unsafe to use Cloud Computing .Clouds can be classified as public, private or hybrid. This paper handle security issue in cloud using blowfish algorithm.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
The document summarizes a research paper that proposes a system for securely performing operations like scaling and cropping on encrypted images stored in the cloud. The system uses a 2Dcrypt technique based on Paillier cryptosystem and tiling scheme. It aims to improve efficiency by avoiding data duplication using Shamir secret sharing algorithm. The system generates tokens using a timestamp for authorization and allows cloud servers to perform operations on encrypted images securely for a specific time period. It addresses limitations of existing systems like high storage usage and lack of collusion resistance.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
The document proposes a mutual key oversight procedure for cloud security and distribution of data based on a hierarchy method. It discusses using attribute-based encryption to encrypt data before outsourcing it to the cloud. The proposed scheme uses a hierarchical structure with a cloud authority, domain authorities, and users to provide security and scalability. It allows both private and public uploading and sharing of files within this hierarchy.
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
This document summarizes a research paper that proposes a system for secure and private cloud storage using multiple encryption algorithms and third-party auditing. The system aims to preserve privacy while enabling public auditing of stored data. It utilizes homomorphic authenticators, random masking, and asymmetric (RSA) and symmetric (AES) encryption algorithms. A third-party auditor can efficiently audit user data in the cloud to ensure integrity without learning the actual data contents, and the system addresses potential data leaks from the auditor. The paper analyzes RSA and AES algorithms to determine which provides better performance and security for the system.
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses effective modular order preserving encryption on cloud using multivariate hypergeometric distribution (MHGD). It begins with an abstract that describes how order preserving encryption allows efficient range queries on encrypted data. It then provides background on cloud computing security concerns and discusses existing approaches to searchable encryption, including probabilistic encryption, deterministic encryption, homomorphic encryption, and order preserving encryption. The key proposed approach is to improve the security of existing modular order preserving encryption approaches by utilizing MHGD.
This document summarizes a research paper that proposes a security architecture for cloud computing that dynamically configures cryptographic algorithms and keys based on security policies and inputs like network access risk and data sensitivity. The architecture aims to improve security while reducing costs by only using the necessary level of encryption for each situation. It describes using the Blowfish algorithm instead of AES and adjusting the key size from 128 to 448 bits depending on factors like network type and data size. Results show Blowfish has better performance than AES, especially with larger keys on larger amounts of data. The goal is to provide flexible, efficient security tailored to each user's needs.
This document discusses processing private K-nearest neighbor (KNN) queries over untrusted cloud data. It proposes a framework that uses privacy homomorphism to securely process queries while preserving the privacy of both the data owner and the client submitting queries. The framework divides query processing into node traversal and distance computation steps. It encrypts the data index and uses the cloud to decrypt distances during computation, while preventing any party from accessing the actual query or result distances. The framework allows private querying without revealing sensitive information to the cloud or data owner.
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
This document proposes a novel approach to implementing data deduplication on the cloud using message locked encryption. It aims to overcome limitations of existing deduplication techniques like convergent encryption by using erasure code technology, encryption algorithms like DES and MD5 hashing, and tokenization to securely store and protect client data on the cloud. The proposed system gives clients proof of ownership of their data by allowing them to choose who can access their files and see any changes made over time. The system architecture involves a client uploading encrypted data to the cloud, and recipients selected by the client being able to access and retrieve encrypted pieces of the data.
This document discusses big data security issues and encryption techniques. It begins with introducing the authors and providing an abstract about addressing security issues related to data integrity, confidentiality and availability. The main body then covers authentication, data, network and generic security challenges with big data as well as proposed solutions like encryption, logging and honeypot nodes. The document focuses on describing symmetric and asymmetric encryption algorithms including DES, AES, RSA and ECC. It compares the algorithms and concludes that encryption techniques can help secure big data stored in clouds, though current security levels may be improved.
The document proposes new distributed deduplication systems with higher reliability for secure cloud storage. Data chunks are distributed across multiple cloud servers using a deterministic secret sharing scheme. This improves reliability over traditional deduplication systems that store only one copy of each file. The systems aim to achieve security requirements of data confidentiality and consistency while limiting overhead.
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is a most-effective data reduction technique that identifies and eliminates the redundant data. Dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However to protect the privacy of data, many users encrypt it before storing in CS. This method affects the deduplication process because encryption methods have varying characteristics. Convergent encryption (CE) scheme is widely used for secure data deduplication, but it destroys the message equality. Although, DupLESS provides strong privacy by enhancing CE, but it is also found insufficient. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This paper addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
This document presents a research paper that proposes a two-stage encryption algorithm to improve security of multimedia content stored in the cloud. The first stage encrypts multimedia content into ciphertext-1 using an asymmetric private key that is randomly generated. The ciphertext-1 is then encrypted again in the cloud using a symmetric public key. During decryption, the encrypted ciphertext is first decrypted using the randomly generated key to retrieve ciphertext-1, which is then decrypted using traditional encryption methods to recover the original multimedia content. The randomly generated key makes it difficult to extract the encryption key and access the encrypted information without authorization. The proposed algorithm aims to enhance security against negligent third parties and side channel attacks in cloud computing.
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
This document discusses data security in cloud computing using cryptographic algorithms. It begins by introducing cloud computing and cryptography. Cryptography is used to securely store and transmit data in the cloud since the data is no longer under the user's direct control. The document then discusses how AES (Advanced Encryption Standard) can be used to encrypt data for secure storage and transmission in cloud computing. It provides an overview of the AES algorithm, including the encryption process which involves sub-processes like byte substitution, shift rows, mix columns and adding round keys over multiple rounds. The document also provides pseudocode for the AES encryption process and discusses how AES encryption provides stronger security than other algorithms like DES.
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. The strives of environment is dynamic, customizable and reliable with the quality of services. Security issues in the cloud as it is anywhere else. Lots of people share different point of views in cloud computing. Some of the people believe that it is unsafe to use Cloud Computing .Clouds can be classified as public, private or hybrid. This paper handle security issue in cloud using blowfish algorithm.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
The document summarizes a research paper that proposes a system for securely performing operations like scaling and cropping on encrypted images stored in the cloud. The system uses a 2Dcrypt technique based on Paillier cryptosystem and tiling scheme. It aims to improve efficiency by avoiding data duplication using Shamir secret sharing algorithm. The system generates tokens using a timestamp for authorization and allows cloud servers to perform operations on encrypted images securely for a specific time period. It addresses limitations of existing systems like high storage usage and lack of collusion resistance.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
The document proposes a mutual key oversight procedure for cloud security and distribution of data based on a hierarchy method. It discusses using attribute-based encryption to encrypt data before outsourcing it to the cloud. The proposed scheme uses a hierarchical structure with a cloud authority, domain authorities, and users to provide security and scalability. It allows both private and public uploading and sharing of files within this hierarchy.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
This document proposes a privacy-preserving authentication protocol for shared authority-based cloud computing. It discusses security and privacy issues with data sharing among users in cloud storage. The proposed protocol uses a shared authority-based privacy preservation authentication protocol (SecCloud) to address privacy and security concerns for cloud storage. It also uses SecCloud+ to remove data de-duplication. The protocol aims to provide scalability, integrity checking, secure de-duplication, and prevent shoulder surfing attacks during the authentication process in cloud computing.
This document discusses a proposed secure framework for multi-cloud computing. It begins with background on cloud computing and discusses some of the security issues with single cloud providers, including risks of data intrusion and loss of service availability. The proposed framework uses a multi-cloud architecture with Byzantine fault tolerance and encryption/decryption of user data across two cloud storage providers (Dropbox and CloudMe) to improve security and reduce risks. Blowfish encryption is suggested as an example of a strong security algorithm that could be used as part of the multi-cloud framework.
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient and Empiric Keyword Search Using CloudIRJET Journal
This document discusses efficient and empirical keyword search using cloud computing. It proposes a secure and reliable keyword search scheme across multiple clouds that allows users to search for files privately and reliably. The proposed system uses an iterative encryption approach to ensure file privacy even if multiple cloud servers collude. It implements a bloom filter tree index structure and integrity verification algorithm to securely search encrypted files across clouds and detect malicious servers. The system aims to provide an efficient and secure solution for keyword search on outsourced encrypted data stored in multiple cloud servers.
Security in multi cloud data storage with sic architectureeSAT Journals
Abstract Cloud computing is becoming an important thing to deal with, in many organizations around the world. It provides many benefits like 1. cost, 2.Reliability and 3.Ease in retrieval of data. Security in cloud computing is gaining more and more importance as organizations often store sensitive data and important data on the cloud. Security of data in cloud is an issue which should be focused carefully. Customers do not want to lose their sensitive data due to malicious insiders and hackers in the cloud. In addition, the loss of service availability has caused many problems for a large number of recently. Data intrusion technique create many problems for the users of cloud computing. The other issues such as data theft, data lost should be overcome to provide better services to the customers. It is observed that the research into the use of intercloud providers to maintain security has received less attention from the research community than has the use of single clouds. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability. The system aim to provide a framework to deploy a secure cloud database that will guarantee to avoid security risks facing the cloud computing community This paper suggests new architecture for cloud environment which will help in reducing the security threats. The efficient and secure use of cloud computing will provide many benefit to the organizations in terms of money and ease in access to the data. Keywords: Cloud computing, single cloud, multi-clouds, cloud Storage, data integrity, data intrusion, service availability, Performance, cost-reduction.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
This document proposes a method for providing privacy, integrity, and storage space management for files stored in the cloud. It aims to address confidentiality issues by encrypting files before uploading. To manage storage space, it arranges files in a complete binary tree based on size. File integrity is checked by a third party auditor comparing hash values of files stored in the cloud with those generated by the client. The method aims to provide confidentiality, integrity checking, and efficient use of storage space for cloud computing.
ISSN 2395-650X
IJLBPS provides an inclusive environment for researchers to share original research, reviews, case studies, and technical notes across a broad spectrum of life sciences, biotechnology, and pharmaceutical sciences.
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
This document discusses enhancing integrity preservation for cloud storage using a homomorphic encryption scheme. It begins with an abstract that outlines using MD5 algorithm for integrity checks on fully homomorphic encrypted data. It then provides background on issues with privacy and integrity in cloud computing. The document reviews related work on cloud security and integrity verification. It discusses challenges with ensuring data integrity when stored remotely in the cloud and proposes using a homomorphic encryption scheme along with MD5 for integrity preservation of outsourced data in the cloud.
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET Journal
This document proposes a three-layer privacy security approach for cloud storage using fog computing. The approach uses Hash-Solomon coding to split user data into multiple parts and store them in the cloud server, fog server, and local machine. This distribution of data across different layers helps secure privacy by making the full data non-recoverable from any single partial dataset. Computational intelligence is also used to determine the optimal distribution of data fragments across layers. The proposed approach provides stronger privacy protection than conventional encryption-based security methods, especially against insider attacks on the cloud server.
S.A.kalaiselvan toward secure and dependable storage serviceskalaiselvanresearch
This document proposes a scheme for ensuring data integrity and dependability for cloud storage systems. The scheme utilizes erasure coding to distribute data across multiple servers and generate verification tokens to enable lightweight auditing. It allows users to efficiently audit that their data is intact and to identify any misbehaving servers. The scheme also supports secure dynamic operations like updates, deletes and appends while maintaining the same level of integrity assurance. Analysis shows the scheme is efficient and resilient to various security threats from malicious servers.
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
This paper proposes an efficient data replication strategy to improve reliability of data stored in the Salesforce cloud environment. The strategy replicates data from Salesforce to the Amazon Web Services cloud for redundancy. It uses a lightweight time-series algorithm to predict which data files will be most frequently requested in the future and prioritizes those for replication. The number of replicas is determined dynamically based on availability thresholds. This strategy aims to improve fault tolerance, ensure data availability even if the primary Salesforce storage fails, and meet quality of service requirements in a cost effective manner for businesses using cloud computing.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth.
The document summarizes a proposed model for secured multi-cloud storage in cloud computing. The model divides user data into pieces that are distributed across multiple cloud storage providers. This prevents any single provider from accessing meaningful user data, improving security and availability. The model uses algorithms like Shamir secret sharing to split data and MD5 hashing to check data integrity upon retrieval. The goal is to provide improved security, availability, and cost-effectiveness over single cloud storage.
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
This document discusses using elliptic curve cryptography to improve data security in cloud computing. It begins with an abstract that introduces cloud computing and data security as major issues. Then, it provides background on cryptography and classifications of cryptographic algorithms like symmetric, asymmetric, and hash functions. The document also discusses security issues in cloud computing like data isolation, secure data transfer, secure interfaces and access control. It proposes using elliptic curve cryptography to address these issues and provide confidentiality, integrity and authentication for data in the cloud. Overall, the document examines how cryptography can enhance security for data stored in cloud computing environments.
Similar to A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing (20)
This document presents a study that uses linear regression to predict university freshmen's academic performance (GPA) based on their scores on the Joint Matriculation Examination (JME). The study finds a weak positive correlation (R=0.137) between GPA and JME scores, with the regression model only explaining 1.9% of variability in GPA. Statistical tests show no significant relationship between JME score and university GPA (p>0.05). The study concludes that JME score is not a strong predictor of freshmen academic performance.
This document describes a school bus tracking and security system that uses face recognition, GPS, and notification technologies. The system uses a camera to identify students as they board and exit the bus. A GPS module tracks the bus location and uploads coordinates to a database. Parents and school administrators can access this information through a mobile app to track students. When a student's face is recognized, a notification is sent to the parents. The system aims to increase student safety by monitoring their locations and notifying parents when they enter or exit the bus.
BigBasket encashing the Demonetisation: A big opportunityIJSRED
1. BigBasket is India's largest online grocery retailer, launched in 2011 when online grocery shopping was still nascent.
2. During India's 2016 demonetization, when cash was scarce, online grocery saw a major boost as consumers turned to sites like BigBasket for contactless digital payments.
3. However, BigBasket faced challenges in meeting consumer expectations for quick delivery while expanding partnerships with local vendors for fresh produce during this surge in demand.
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
This document discusses a technique for detecting plant leaf diseases using image processing. It begins with an introduction to plant pathology and the importance of identifying plant diseases. Common plant leaf diseases like Alternaria Alternata, Anthracnose, Bacterial blight, and Cercospora Leaf Spot are described along with their symptoms. The existing methods of disease identification are discussed. The proposed method uses various image processing techniques like filtering, histogram equalization, k-means clustering, and Gray Level Co-occurrence Matrix (GLCM) feature extraction to detect diseases. Image quality is then assessed to identify the affected regions of the leaf.
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
This document discusses the development of a DC fast charger and battery management system for electric vehicles. It aims to reduce charging times for EVs by designing an efficient charging mechanism. A PIC microcontroller controls the charging voltage and a battery management system monitors battery temperature, voltage, current and provides notifications. The system uses a step-down transformer, rectifier, voltage regulators and temperature sensor to charge lithium-ion batteries safely and quickly, while the battery management system protects the batteries from overcharging or overheating. Faster charging times through more charging stations could encourage greater adoption of electric vehicles.
France has experienced steady economic growth through policies that develop human capital and innovation. It has a highly organized education system that has increased enrollments over time, particularly in tertiary education. France also invests heavily in research and development, ranking highly in patents and innovative organizations. Infrastructure investment has also increased tangible capital stock. Additionally, factors like political stability, rule of law, and low corruption create an environment conducive to business investment and growth. Major events like the French Revolution helped shape France culturally, legally and technologically in ways that still influence its growth path today.
This document describes an acquisition system designed to make the examination process more efficient. The system uses a Raspberry Pi to control various hardware components including an RFID reader, rack and pinion assembly, and motor. It is intended to reduce the time and effort required of staff to distribute exam materials by automating the process. When examiners scan their RFID tags, the system verifies their identity and allows them to retrieve the appropriate exam bundles via a motorized rack and pinion assembly. The goal is to minimize manual labor and speed up exam distribution using an automated hardware and software solution controlled by a Raspberry Pi microcontroller.
Parallelization of Graceful Labeling Using Open MPIJSRED
This document summarizes research on parallelizing the graceful graph labeling problem using OpenMP on multi-core processors. It introduces the concepts of parallelization, multi-core architecture, and OpenMP. An algorithm is designed to parallelize graceful labeling by distributing graph vertices across processor cores. Execution time and speedup are measured for graphs of increasing size, showing improved speedup and reduced time with parallelization. Results show consistent performance gains as graph size increases due to better utilization of the multi-core architecture.
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
This study examines the phenotypic plasticity of fruits in the plant Luffa acutangula var. amara across different locations in Sindhudurg district, Maharashtra, India. The study found that the plant exhibited plasticity in growth cycle, flowering season, leaf shape, and fruit size depending on location. Maximum fruit weights and sizes were recorded at Talebazar village, while minimum sizes were found at Dahibav village. The variation in fruit morphology is an adaptation to the different environmental conditions at each site.
Understanding Architecture of Internet of ThingsIJSRED
The document discusses the architecture of the Internet of Things (IoT). It begins by introducing IoT and its key components. It then discusses three traditional IoT architectures: (1) a three-layer architecture consisting of a perception, network and application layer; (2) the TCP/IP four-layer model; and (3) the Telecommunications Management Network's five-layer logical layered architecture. The document proposes a new five-layer IoT architecture combining aspects of these models. The five layers are the business, application, processing, transport and perception layers. The perception layer collects data via sensors while the business layer manages the overall enterprise.
This document describes a project report submitted by three students for their bachelor's degree. The report outlines the development of a smart shopping cart system that utilizes RFID and Zigbee technologies. The smart cart is intended to enhance the shopping experience for customers by automatically billing items as they are added to the cart, providing real-time stock levels, and reducing checkout times. The system aims to benefit both customers through a more personalized shopping experience and retailers by improving stock management and reducing shoplifting. The document includes sections on requirements, system design, implementation, results and discussion, and conclusions.
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
This document discusses an empirical study on the importance of soft skills for management students' careers. It finds that while hard skills and academic performance were once prioritized by employers, soft skills like communication, teamwork, and emotional intelligence are now essential for success. The study surveyed 50 management students and faculty in Bangalore to understand how well soft skills training is incorporated and its benefits. It determined that soft skills like communication are crucial as they influence interactions and job performance. However, older teaching methods do not sufficiently develop these skills. Integrating soft skills training into courses could better prepare students for today's work challenges.
The document describes a proposed smart canteen management system that uses various technologies like a web application, barcode scanner, and thermal printer to automate the food ordering process. The system aims to reduce wait times for students and avoid food wastage by allowing online ordering and monitoring stock. A barcode scanner will be used to identify students during ordering and payment. Thermal printers will generate receipts. The system is expected to reduce workload for staff and provide detailed sales reports for management.
This document discusses Gandhi's concept of trusteeship as an alternative economic system. It summarizes that Gandhi did not distinguish between economics and ethics, and based trusteeship on religious ideas like non-possession and truth as well as Western ideas like stewardship. Trusteeship aimed to persuade wealthy property owners to hold wealth in trust for the benefit of society rather than personal gain. It was meant as a non-violent alternative to capitalism and communism that eliminated class conflict through cooperation and trust between rich and poor. The document provides background on the philosophical and religious influences on Gandhi's views before explaining the key aspects of his theory of trusteeship.
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
This document discusses the impacts of introducing a new spatial variable in black hole metrics. It begins by summarizing Einstein and Rosen's 1935 paper which introduced a variable ρ = r - 2M in the Schwarzschild metric to remove the singularity. The document then introduces a similar new variable p = r - 2√M and analyzes how this impacts the Schwarzschild metric. Specifically, it notes that this new variable allows for negative radii values and multiple asymptotic regions beyond just two, introducing concepts of probability and imaginary spatial coordinates. Overall, the document explores how different mathematical variables can impact theoretical physics concepts like wormholes.
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
This document summarizes a study that assessed the effectiveness of a planned teaching program on mothers' knowledge of preventing acute respiratory infections in children under 5. 50 mothers were surveyed before and after the program. Before, 36% had moderate knowledge, 62% had inadequate knowledge, and 2% had adequate knowledge. After, 34% had moderate knowledge, 0% had inadequate knowledge, and 66% had adequate knowledge, showing the program improved mothers' knowledge. The study found no significant association between mothers' knowledge and factors like age, education, or family type.
This document describes a proposed ingenuous Trafalgar contrivition system to improve traffic flow and emergency vehicle access. The system uses embedded technologies like a Raspberry Pi, RF transmitter and receiver, and an Android app. When an emergency vehicle is detected approaching a traffic light, the system will open the lights on its path without disrupting other signals. The app will also help identify hit-and-run vehicles through a brief tracking period. The goal is to reduce traffic congestion and response times to save lives.
This document discusses a proposed system called the Farmer's Analytical Assistant, which aims to help farmers in India maximize crop yields through predictive analysis and recommendations. It analyzes agricultural data on factors like soil properties, rainfall, and past crop performance using machine learning techniques to predict optimal crops for different regions based on the environmental conditions. The proposed system would allow farmers to input local data, receive personalized yield predictions and crop suggestions, and get advice from experts online. The methodology section describes how climate/rainfall and soil data is collected and analyzed using machine learning models to provide crop recommendations. The goal is to improve upon traditional crop selection methods and help increase farmers' incomes.
Functions of Forensic Engineering Investigator in IndiaIJSRED
Forensic engineering involves applying engineering principles and methodologies to answer legal questions, especially regarding accidents and failures. A forensic engineer investigates failures through failure analysis and root cause analysis to determine how and why something failed. The engineer must be familiar with relevant codes and standards, understand eyewitness testimony, apply the scientific method to reconstruct events, and report findings clearly to assist courts. A forensic engineering investigation follows the scientific method to methodically analyze evidence and test hypotheses to determine the cause and circumstances of a failure or accident.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs