This document discusses security techniques for multimedia content systems stored in the cloud. It analyzes homomorphic encryption and secure hash techniques. The document provides an overview of homomorphic encryption, describing how it allows computation on encrypted data while preserving privacy. It also reviews related work applying homomorphic encryption and searchable encryption to securely store and process multimedia files in cloud systems. The goal is to push workloads in a fully homomorphic encrypted form to cloud storage while maintaining privacy and flexibility.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
Homomorphic encryption algorithms and schemes for secure computations in the ...MajedahAlkharji
This article provides:
1. A detailed survey of homomorphic encryption (HE) using public key algorithms such as RSA, El-Gamal, and Paillier algorithms.
2. Fully homomorphic encryption (FHE) schemes.
This work can be helpful as a guide to principles, properties of FHE as researchers believe in the possibility of advancement in the FHE area.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
Security Aspects of the Information Centric Networks ModelCSCJournals
With development of internet and the enormous growth of contents over networks, that motivated the researchers to proposed new paradigm model called Information Centric Networks ICN , the most features of ICN model is based on the content itself, instead, of the server located the contents over internet. This new model has a lot of challenges such as, mobility of contents, naming, replications, cashing, communications, and the security issue to secure the contents, customer, and providers. In this paper we will focus on ICN Model and propose solutions of security to protect the network elements, since the security is based on the packet itself rather than the host-centric.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
Homomorphic encryption algorithms and schemes for secure computations in the ...MajedahAlkharji
This article provides:
1. A detailed survey of homomorphic encryption (HE) using public key algorithms such as RSA, El-Gamal, and Paillier algorithms.
2. Fully homomorphic encryption (FHE) schemes.
This work can be helpful as a guide to principles, properties of FHE as researchers believe in the possibility of advancement in the FHE area.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
Security Aspects of the Information Centric Networks ModelCSCJournals
With development of internet and the enormous growth of contents over networks, that motivated the researchers to proposed new paradigm model called Information Centric Networks ICN , the most features of ICN model is based on the content itself, instead, of the server located the contents over internet. This new model has a lot of challenges such as, mobility of contents, naming, replications, cashing, communications, and the security issue to secure the contents, customer, and providers. In this paper we will focus on ICN Model and propose solutions of security to protect the network elements, since the security is based on the packet itself rather than the host-centric.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
ith the rapid development of cloud computing, the privacy security incidents occur frequently, especially
data security issues. Cloud users would like to upload their sensitive information to cloud service providers
in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to
securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for
cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional
homomorphic encryption schemes with many limitations, which are not suitable for cloud computing
applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also
prove the correctness and security of our protocols, and analyze the advantages and performance by comparing
with some latest works.
Cloud computing is an advanced computing technology used by different organization or individuals for
transferring, overseeing and storing over the internet. Security is an important issue that needs to be studied deeply and
accurately when designing the digital library. Security shortcomings in libraries, combined with assaults or different sorts
of disappointments, can prompt private data being improperly gotten to, or loss of honesty and integrity of the
information put away. This paper will be introduced the concept and characteristics of cloud computing, the relationship
between cloud computing and digital library will be analysis, the cloud computing security management problems under
the environment of digital libraries will be studied , the availability level will be taken into research consideration while
studying security management problems in digital library cloud computing. The main goal will be trying to present a
possible solution for the preventing security threats and hackers on a digital library management system based on cloud
computing.
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
Existing architecture of Internet is IP-centric, having capability to cope with the needs of the Internet users. Due to the recent advancements and emerging technologies, a need to have ubiquitous connectivity has become the primary focus. Increasing demands for location-independent content raised the requirement of a new architecture and hence it became a research challenge. Content Centric Networking (CCN) paradigm emerges as an alternative to IP-centric model and is based on name-based forwarding and in-network data caching. It is likely to address certain challenges that have not been solved by IP-based protocols in wireless networks. Three important factors that require significant research related to CCN are mobility, security, and caching. While a number of studies have been conducted on CCN and its proposed technologies, none of the studies target all three significant research directions in a single article, to the best of our knowledge. This paper is an attempt to discuss the three factors together within context of each other. In this paper, we discuss and analyze basics of CCN principles with distributed properties of caching, mobility, and secure access control. Different comparisons are made to examine the strengths and weaknesses of each aforementioned aspect in detail. The final discussion aims to identify the open research challenges and some future trends for CCN deployment on a large scale.
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
Securing the data over a cloud network is always a challenging problem
for the researcher over the past one decade. There exist many conventional
algorithms/techniques which proclaim to ensure secure transmission, storage
and retrieval of data over the cloud platform. All these mechanisms mainly
focus on ensuring privacy preserve for of client / user‟s data. This research
work aims to propose distinctive elliptic curve cryptography. DECC is based
on the algebraic structure of elliptic curves in the finite fields. The DECC is
used for privacy preserving since smaller keys are used when compared to all
the rest of the existing cryptographic algorithms. Performance metrics such as
average relative error, time, anonymization time and information loss are
taken into account. Implementations are carried out in MATLAB tool. Results
portrays that the proposed DECC outperforms the existing methods.
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
A comprehensive study of fhe schemes ijact journalMajedahAlkharji
This article provides a comprehensive survey of:
1. Homomorphic encryption schemes using public key algorithms.
2. Fully homomorphic encryption (FHE) schemes.
This work can be helpful as a guide to principles, properties of FHE
Data Security in Mobile Cloud Computing A State of the Art ReviewRida Qayyum
Due to tremendous use of smartphones the concern of cloud computing in mobile devices emerges, which is known as Mobile Cloud Computing (MCC). It involves the usage of mobile devices and cloud computing to perform resource intensive tasks using the internet with minimum impact on cellular resources. Nowadays, people are relying on mobile devices due to their small size and user friendly interface but due to its limited storage capacity, people can no more rely on internal RAM. Therefore, this promotes a drastic need for technology to make it possible for anyone to access their data anywhere anytime. As a result, Mobile Cloud Computing facilitates mobile users with its enticing technology by providing its on-demand and scalable services. But privacy and security are the main concern for a mobile user in the modern era. Thus, issues regarding security can be divided into cloud security and mobile network user’s security, respectively. However, the primary focus of this study is to analyze how to secure the user's data in a mobile cloud. Leading to objectives, the current study presents a comprehensive analysis of existing techniques that can be considered for securing data in MCC efficiently. Moreover, this work will contribute a state-of-the-art roadmap to research and development communities for the right selection of proposed approach.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Topic: Cloud Computing
Type: Research Paper Subject: Information Technology
Academic Level: Undergraduate
Style: MLA
Language: English (U.S)
Number of pages: 8 (double spaced, Times New Roman, Font 12)
Number of sources: 5
Task details
Write a 2000-word research paper that discusses the current state-of-the-art in cloud computing. The paper should discuss both the currently available technology and possible
New developments and designs to come in the next decade. The sources for your paper
are limited to the primary articles (not columns) in IEEE publications that have appeared
Since Jan. 2009:
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
The process of protecting information by transformi
ng (encrypting) it into an unreadable format is cal
led
cryptography. Only those who possess secret key can
decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by crypt
analysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for
securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable,
sometimes they also tend to attack.
As the Internet, big data, cloud data storage and
other forms of electronic communication become more
prevalent, electronic security is becoming increasi
ngly important. Cryptography is used to protect e-m
ail
messages, credit card information, corporate data,
cloud data and big data so on... So there is a need
for
best and fast cryptographic methods for protecting
the data. In this paper a method is proposed to pro
tect
the data in faster way by using classical cryptogra
phy. The encryption and decryption are done in par
allel
using threads with the help of underlying hardware.
The time taken by sequential and parallel method i
s
analysed
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional homomorphic encryption schemes with many limitations, which are not suitable for cloud computing applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also prove the correctness and security of our protocols, and analyze the advantages and performance by comparing with some latest works.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
ith the rapid development of cloud computing, the privacy security incidents occur frequently, especially
data security issues. Cloud users would like to upload their sensitive information to cloud service providers
in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to
securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for
cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional
homomorphic encryption schemes with many limitations, which are not suitable for cloud computing
applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also
prove the correctness and security of our protocols, and analyze the advantages and performance by comparing
with some latest works.
Cloud computing is an advanced computing technology used by different organization or individuals for
transferring, overseeing and storing over the internet. Security is an important issue that needs to be studied deeply and
accurately when designing the digital library. Security shortcomings in libraries, combined with assaults or different sorts
of disappointments, can prompt private data being improperly gotten to, or loss of honesty and integrity of the
information put away. This paper will be introduced the concept and characteristics of cloud computing, the relationship
between cloud computing and digital library will be analysis, the cloud computing security management problems under
the environment of digital libraries will be studied , the availability level will be taken into research consideration while
studying security management problems in digital library cloud computing. The main goal will be trying to present a
possible solution for the preventing security threats and hackers on a digital library management system based on cloud
computing.
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
Existing architecture of Internet is IP-centric, having capability to cope with the needs of the Internet users. Due to the recent advancements and emerging technologies, a need to have ubiquitous connectivity has become the primary focus. Increasing demands for location-independent content raised the requirement of a new architecture and hence it became a research challenge. Content Centric Networking (CCN) paradigm emerges as an alternative to IP-centric model and is based on name-based forwarding and in-network data caching. It is likely to address certain challenges that have not been solved by IP-based protocols in wireless networks. Three important factors that require significant research related to CCN are mobility, security, and caching. While a number of studies have been conducted on CCN and its proposed technologies, none of the studies target all three significant research directions in a single article, to the best of our knowledge. This paper is an attempt to discuss the three factors together within context of each other. In this paper, we discuss and analyze basics of CCN principles with distributed properties of caching, mobility, and secure access control. Different comparisons are made to examine the strengths and weaknesses of each aforementioned aspect in detail. The final discussion aims to identify the open research challenges and some future trends for CCN deployment on a large scale.
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
Securing the data over a cloud network is always a challenging problem
for the researcher over the past one decade. There exist many conventional
algorithms/techniques which proclaim to ensure secure transmission, storage
and retrieval of data over the cloud platform. All these mechanisms mainly
focus on ensuring privacy preserve for of client / user‟s data. This research
work aims to propose distinctive elliptic curve cryptography. DECC is based
on the algebraic structure of elliptic curves in the finite fields. The DECC is
used for privacy preserving since smaller keys are used when compared to all
the rest of the existing cryptographic algorithms. Performance metrics such as
average relative error, time, anonymization time and information loss are
taken into account. Implementations are carried out in MATLAB tool. Results
portrays that the proposed DECC outperforms the existing methods.
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
A comprehensive study of fhe schemes ijact journalMajedahAlkharji
This article provides a comprehensive survey of:
1. Homomorphic encryption schemes using public key algorithms.
2. Fully homomorphic encryption (FHE) schemes.
This work can be helpful as a guide to principles, properties of FHE
Data Security in Mobile Cloud Computing A State of the Art ReviewRida Qayyum
Due to tremendous use of smartphones the concern of cloud computing in mobile devices emerges, which is known as Mobile Cloud Computing (MCC). It involves the usage of mobile devices and cloud computing to perform resource intensive tasks using the internet with minimum impact on cellular resources. Nowadays, people are relying on mobile devices due to their small size and user friendly interface but due to its limited storage capacity, people can no more rely on internal RAM. Therefore, this promotes a drastic need for technology to make it possible for anyone to access their data anywhere anytime. As a result, Mobile Cloud Computing facilitates mobile users with its enticing technology by providing its on-demand and scalable services. But privacy and security are the main concern for a mobile user in the modern era. Thus, issues regarding security can be divided into cloud security and mobile network user’s security, respectively. However, the primary focus of this study is to analyze how to secure the user's data in a mobile cloud. Leading to objectives, the current study presents a comprehensive analysis of existing techniques that can be considered for securing data in MCC efficiently. Moreover, this work will contribute a state-of-the-art roadmap to research and development communities for the right selection of proposed approach.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Topic: Cloud Computing
Type: Research Paper Subject: Information Technology
Academic Level: Undergraduate
Style: MLA
Language: English (U.S)
Number of pages: 8 (double spaced, Times New Roman, Font 12)
Number of sources: 5
Task details
Write a 2000-word research paper that discusses the current state-of-the-art in cloud computing. The paper should discuss both the currently available technology and possible
New developments and designs to come in the next decade. The sources for your paper
are limited to the primary articles (not columns) in IEEE publications that have appeared
Since Jan. 2009:
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
The process of protecting information by transformi
ng (encrypting) it into an unreadable format is cal
led
cryptography. Only those who possess secret key can
decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by crypt
analysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for
securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable,
sometimes they also tend to attack.
As the Internet, big data, cloud data storage and
other forms of electronic communication become more
prevalent, electronic security is becoming increasi
ngly important. Cryptography is used to protect e-m
ail
messages, credit card information, corporate data,
cloud data and big data so on... So there is a need
for
best and fast cryptographic methods for protecting
the data. In this paper a method is proposed to pro
tect
the data in faster way by using classical cryptogra
phy. The encryption and decryption are done in par
allel
using threads with the help of underlying hardware.
The time taken by sequential and parallel method i
s
analysed
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional homomorphic encryption schemes with many limitations, which are not suitable for cloud computing applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also prove the correctness and security of our protocols, and analyze the advantages and performance by comparing with some latest works.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
A novel cloud storage system with support of sensitive data applicationijmnct
Most users are willing to store their data in the c
loud storage system and use many facilities of clou
d. But
their sensitive data applications faces with potent
ial serious security threats. In this paper, securi
ty
requirements of sensitive data application in the c
loud are analyzed and improved structure for the ty
pical
cloud storage system architecture is proposed. The
hardware USB-Key is used in the proposed architectu
re
for purpose of enhancing security of user identity
and interaction security between the users and the
cloud
storage system. Moreover, drawn from the idea of da
ta active protection, a data security container is
introduced in the system to enhance the security of
the data transmission process; by encapsulating th
e
encrypted data, increasing appropriate access contr
ol and data management functions. The static data
blocks are replaced with a dynamic executable data
security container. Then, an enhanced security
architecture for software of cloud storage terminal
is proposed for more adaptation with the user's sp
ecific
requirements, and its functions and components can
be customizable. Moreover, the proposed architectur
e
have capability of detecting whether the execution
environment is according with the pre-defined
environment requirements.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
This is a common fact nowadays to use the external third party resources for data storage and
sharing among multiple personnel of the same organization or different organizations. Such external
resources are collectively known as Cloud Computing resources. Cloud Computing resources save
time, cost and efforts required to manage the huge data of organizations. Due to the rapid growth of
using cloud services in many organizations or individuals, there are many concerns resulted. The
major concerns are data sharing, security and efficiency. Since from last 15 years, there are number
of solutions and researches were conducted and applied. Data sharing both single user and multi-user
in Cloud Computing, and hence it is required that data sharing is strongly secured, number of recent
cryptography base methods such as Identity Based Encryption or Attributed Based Encryption are
designed for secure data sharing among multiple users. All the recent methods have some limitations
and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security
and their comparative analysis first. At we discussed the research limitations of those methods.
Security and Privacy of Big Data in Mobile DevicesIOSRjournaljce
Presently, the volume of data generated via mobile devices is at an exponential rate due to the rapid advancement in internet-enabled mobile devices, which makes it complex to ensure the privacy and security of this data. Cloud-based server is currently considered one of the most reliable solutions to address these issues. Nevertheless, the increasing uncertainties of storing useful and sensitive big data in a public cloud have suppressed the exploration of this option. In our paper, we meticulously reviewed the drawbacks in the current adopted solutions for security and privacy of big data within mobile devices. As the utilization of mobile platforms is increasingly generating large data, the current traditional methods of cryptography will not be able to efficiently ensure the security and privacy of this big data. Therefore, this paper will propose the utilization of Federated Identity Management that is Openstack cloud-based as an effective solution that can ensure the privacy and security of big data within mobile device ecosystem.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Content System
1. Jyoti .V. Ighare . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 5, ( Part -3) May 2017, pp.10-14
www.ijera.com DOI: 10.9790/9622-0705031014 10 | P a g e
Analysis of Homomorphic Technique and Secure Hash Technique
for Multimedia Content System
Jyoti .V. Ighare
ME (CSE) Student CSE Department, P.E.S college of Engineering Aurangabad India, Maharashtra
I. INTRODUCTION
To modernize the content management
system, security of multimedia documents and
applications are an active research area. While one
motivation for this is to reduce operational costs of
the organization by eliminating the data centers
managed by the centers. It is defined in our paper to
store and dispense data quickly to the user for long
term data as digitized measurements of a multimedia
vitals over the course of his/her requirements that is
longer than what can be obtained within the
organization in paper format.
The system can be used to protect various
multimedia content types, including regular 2-D
videos, new 3-D videos, images, audio clips, songs,
and music clips. The system can run on private
clouds. The design is cost effective since it uses the
computing resources on demand. The design can be
scaled up and down to support varying amounts of
multimedia content being protected.
To turn this vision into reality, the privacy
and security of the data is at the topmost priority. In
phase-I acquisition, data are acquired and given to the
system as input. In phase-II the storage, where the
data is stored permanently for future use, is deployed.
In third phase computation, where the data is
processed, is taken care. While existing FHE-based
encryption techniques can ensure data privacy in
phases-I and phase-II, achieving computation
requires operating on encrypted data.
Here a feasibility study was conduct for
achieving phase-III by using the emerging Fully
Homomorphic Encryption (FHE) techniques on a
restricted set of multimedia documents. It was
focused on the case, where there has no resources
allocated to the storage or computation, which strictly
act as the graphical user interface (GUI) devices.
Proposed system is where input data is Homomorphic
Encrypted and stored. Without loss of generality, it is
specifically focused on multimedia documents
security for the used applications and the resulting
secured data storage and retrieval. The goal of the
system is to push the entire workload in FHE form on
storage. To best knowledge, this is the first kind of
techniques that focuses on the application of Fully
Homomorphic Encryption to multimedia documents.
This deployment model was used to show
the flexibility of our system, which enables it to
efficiently utilize varying computing resources and
minimize the cost, since cloud providers offer unlike
pricing models for computing and network resources.
Through extensive experiments with real
deployment, we show the high accuracy (in terms of
precision and recall) as well as the scalability and
elasticity of the proposed system.
The rest of this paper is organized as
follows. We summarize the related works in Section
II. In Section III, we present the design goals and a
high-level description of the proposed system. In
Section IV, we present the analysis of the proposed
method. We conclude in Section V.
II. LITERATURE REVIEW
Cloud computing is a new computing model
that will interconnect the large-scale computing
resources to effectively integrate, and to computing
resources as a service to users. Users can use the
broad band network at any time on demand access to
virtual computers and storage systems, without the
need to consider the complexities of the
implementation and management, greatly reducing
the difficulty and hardware to achieve the user's
investment.
Cloud computing effectively the actual
separation of physical and virtual services, a variety
of business services reduced costs, improved
utilization of network resources. With cloud
computing applications and research at home and
abroad continue to advance the development of cloud
computing faces many critical issues, and bear the
brunt of security issues and, with the growing
popularity of cloud computing, security issues,
showing the importance of a gradual upward trend,
has restricted its important factor in development.
Recently, Amazon, Google and other cloud
computing sponsors a variety of security incidents
continue to burst exacerbated people's fears. For
example, in March 2009, Google place a large list of
user files leak, in February 2009 and July, Amazon's
"Simple Storage Service i.e. simple storage service,
called S3)" depends on two break lead to a single
storage network Service's website was forced to a
standstill, etc. Thus, to make businesses and
RESEARCH ARTICLE OPEN ACCESS
2. Jyoti .V. Ighare . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 5, ( Part -3) May 2017, pp.10-14
www.ijera.com DOI: 10.9790/9622-0705031014 11 | P a g e
organizations with large-scale application of cloud
computing platform, safely delivered to their own
data management in the cloud service provider, we
must fully analyze and address the cloud computing
security issues facing.
Ovunc Kocabas et. al. [1] proposed system
where phase I (Acquisition) of the long-term health
monitoring is achieved via the purpose of remote
sensors that are capable of regular FHE encryption
and transmission to the cloud via existing wireless
access points. They formulate Full Homomorphic
Encryption (FHE) as the core of this idea. They
identified the challenges in making this possible for a
specific application based on remote-ECG
monitoring. They determined what is possible within
the following few years while FHE acceleration is
being widely researched. Jiadi Yu et. al. [2] proposed
the concepts of similarity relevance and scheme
robustness. We, thus, perform the first attempt to
develop the privacy issue in searchable encryption,
and we show server-side ranking based on order-
preserving encryption (OPE) inevitably violates data
privacy. Mohd Rizuan Baharon et. al. [3] in their
work proposed a new FHE scheme based on a finite
field that supports n-multilinear maps. The scheme is
constructed based on an open problem raised by
Boneh et al. in their scheme that supports a bilinear
map. Scott et. al. [4] took advantage of both
homomorphic encryption and searchable encryption.
On one hand, the homomorphic property is exploited
in order to preserve users’ privacy, as the cloud (or
the sink in adhoc / sensor networks) handles only
encrypted data. The cloud only provides operation as
well as storage services and it has no knowledge
about what kind of information is being processed.
Therefore, users’ privacy is preserved this way. On
the other hand, due to the large amount of data,
efficient retrieval of users’ data is supported through
the use of searchable encryption. Moreover, the
support for searchable encryption cannot compromise
users’ privacy. Qingjie Meng et. al. [5] discussed in
their study Cloud computing leads the development
of industry informatization and society
informatization, along with the popularity of Internet
of things and mobile internet, the permeation of cloud
computing in various industries was becoming
increasingly apparent. But cloud computing security
issue has become a bottleneck restricting its
application, mainly related to information security
and privacy protection issues, which involves
encryption, information isolation, authentication, key
management and access control and other issues, it is
the current cloud computing security research hotspot
also. Y Govinda Ramaiah, et. al. [7, 8] gives Fully
Homomorphic Encryption (FHE), which allows
processing the data in encrypted form. Whereas FHE
is yet to be practical, several theoretical results have
been proposed for various cloud security problems
based on it. Also, research is actively going on in
developing the cryptographic trust mechanisms such
as verifying the computation performed over the
cloud resident data called. Ankita Lathey et. al. [6]
proposed a novel and efficient SSS based method to
perform the arithmetic division operation for non-
terminating quotients (involved in LPF for image
enhancement by smoothing and removing noise) over
cloud in ED. This allows an authorized user to
reconstruct the improved quality images from the
CDCs. They developed scheme that uses a (T, N)-
SSS scheme to divide the original (noisy) images
(called ‘secret’) into N modified images (called
‘shares’). The N shares are stored at N different
CDCs. In order to view the original image, an
authorized user first obtains the share images from
any (T ≤ N) CDCs and then reconstructs an improved
quality LPF image. NIU Yukun et. al. [9] introduced
a new data checking way which is based on additive
homomorphic encryption and the characteristic of
SM data. Obviously, user’s consumption data is the
difference of SM reading value in different time, that
is to say, SM reading in the current time is the sum of
consumption data and SM reading in the last time.
Using additive homomorphic encryption, they made
the equation still valid. In this way, we can find
whether the data is tampered because the equation
will not be valid if it is tempered by adversary. An-
Ping Xiong et. al. [10] proposes CP-ABE (Cipher-
text-Policy Attribute-Based Encryption) that owners
which encryptors can define their own data access
policies by themselves, that more suitable for the
implementation of access control to shared data in the
cloud storage environment. At present, a large
number of research on the CP-ABE access control,
and these scheme give more consideration to the
flexibility of the attribute-based access control, or
focus on fine-grained access control of encrypted
data, and they less consider the result of cipher-text
redundancy, or the keys update frequently.
The prominent technology is emerged by the
multimedia computing to generate, edit, process, and
search media contents, such as images, video, audio,
graphics. The internet and mobile wireless networks
over for the multimedia requisition and services,
cloud computing for this strong requirement is
available because serving millions of internet or
mobile users is required expressive amount of
computation at the same time [11]. Great challenges
is imposes in a cloud of the multimedia processing.
The multimedia computing of the cloud has several
fundamental investigation is highlighted as follows
[12].
3. Jyoti .V. Ighare . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 5, ( Part -3) May 2017, pp.10-14
www.ijera.com DOI: 10.9790/9622-0705031014 12 | P a g e
III. DETAILS OF WORK
Figure 1: Block diagram for proposed system
The block diagram shows multimedia
content protection system in Fig. 1. The block
diagram has multiple blocks as construction company
that creates data, encryption module where FHE
encryption is done on the multimedia document,
Certificate generation module generate a signature
components that as to be matched, retrieval system
decrypts the data and outputs it for the use.
The figure shows a general case where one
or more cloud providers can be used by the system.
This is because some cloud providers are more useful
and/or provide more cost saving for different
computing and communication tasks. For example, a
cloud provider offers lower cost for inbound
bandwidth and storage can be used for downlink and
temporarily storing videos from online sites, while
another cloud provider offers better compute nodes at
lower costs can be used to maintain the circulate
index and to perform the copy detection process. For
storing the images and other data such as audio cloud
is used for it. In this cloud storage the major use is
that only publically can used the data but private user
can used the authenticate data. Image is stored on
cloud in this framework in the encrypted form and
then transform. This framework is responsible for
providing the certification authority for the public
key to the data holder. This design supports creating
composite signatures that include of one or more of
the following elements:
In this two types of techniques is
implemented first is homomorphic technique second
is secure hash technique. In homomorphic technique
it is form of encryption that allows computations to
be carried out on ciphertext, thus generating an
encrypted result which when decrypted, matches the
result of operations performed on the plaintext.
In secure hash technique is a family of
cryptographic hash functions published by the
national institute of standard and technology (NIST).
SHA-256 and SHA-512 are novel hash functions
computed with 32-bit and 64-bit words, respectively.
They use different shift amounts and additive
constants, but their structures are otherwise virtually
identical, differing only in the number of rounds.
The scope of the proposed technique in this
multimedia content protection system illegally made
copies of the multimedia objects over the internet that
illegally copies are find out. It is large scale and
complex with multiple involved parties. Due to this
we select some approaches and goals of this project.
Accuracy, computational, efficiency, scalability, and
cost efficiency all this are goals
IV. ANALYSIS
The processing speed and time complexity
of the system was considered. Ticks were measured
at various operations and statistical data table is
generated. Table 1 show the request and response
date time. Here file ID and request date time
associated with the file is in column 1 & 2. In column
3 the time required to upload that particular file in the
terms of Ticks is measured. Here tick is measure unit
of time. Similarly in column 4 total response time of
the same file and the time taken to recall the file are
measured in millisecond.
Table 1: Recall Information of Homomorphic
Technique
Graph1: Recall Information of Homomorphic
technique
Table 2: Recall Information of Secure Hash
Technique
4. Jyoti .V. Ighare . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 5, ( Part -3) May 2017, pp.10-14
www.ijera.com DOI: 10.9790/9622-0705031014 13 | P a g e
Graph 2: Recall Information of Secure Hash
Technique Graph
In this the total response time is calculated
by difference between request time and response time
is saved in ticks. The ticks are divided by 1000 so get
the result in millisecond.
Ticks/1000=millisecond
This system captures the depth signal of the
3-D video, without explicitly computing the exact
depth map, which is computationally expensive. Our
experiments showed that the proposed 3-D signature
creates high accuracy in terms of both precision and
recall and it is robust to many video transformations
including new ones that are specific to 3-D videos
such as synthesizing new views. Our experiments
showed that it can elastically utilize varying amount
of computing resources and it produces high
accuracy. The experiments also showed that it
outperforms the closest system in the literature in
terms of accuracy and computational efficiency.
In this Homomorphic encryption technique
with SHA hash technique. The secure hash algorithm
is a family of cryptographic hash functions published
by the national institute of standard and technology
(NIST) as a U.S federal information processing
standard (FIPS).
Table 3: Comparison with Secure Hash Technique
with Homomorphic Technique
Graph 3: Comparison total response time in milli
second
In this homomorphic technique compare
with secure hash technique file id there request date
time and response date time and how much take time
to uploading the file there total response time shown
in the table. For 3-D videos homomorphic technique
takes time 79661 millisecond whereas secure hash
technique take time 82121 millisecond. In the graph
sum of performance analysis total response time of
both techniques shown in the graph. In this
comparison secure hash technique take more time
then homomorphic technique to uploading the files so
that homomorphic technique is better than secure
hash technique.
V. CONCLUSION AND FUTURE WORK
We presented in this paper a new design for
multimedia content protection systems. The system
supports different multimedia content types and it can
be deployed on private and/or public clouds. We
proposed two key components of the system. The
first one is of creating a signature of 3-D videos and
second key component in our system is the
distributed index, which is used to match multimedia
objects characterized by high dimensions.
Furthermore, the crawler component needs to be
customized to find online sites that offer pirated
video streams and obtain segments of these streams
for checking against reference streams, for which the
signatures would also require to be generated online.
Another future direction for the work in this paper is
to design signatures for recent and complex formats
of 3-D videos such as multi-view plus depth. A
multi-view plus depth video has multiple texture and
depth components, which allow users to view a scene
from different angles. Signatures for these videos
would need to capture this complexity, while being
efficient to compute, compare, and store.
REFERENCES
[1]. Ovunc Kocabas, Tolga Soyata, Jean-
Philippe Couderc, Mehmet Aktas, Jean Xia,
Michael Huang (2013) Assessment of
Cloud-based Health Monitoring using
Homomorphic Encryption, 978-1-4799-
2987-0/13 2013 IEEE, pp. 443-446
5. Jyoti .V. Ighare . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 5, ( Part -3) May 2017, pp.10-14
www.ijera.com DOI: 10.9790/9622-0705031014 14 | P a g e
[2]. Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao
Xue, Minglu Li (2013), Toward Secure
Multi key word Top-k Retrieval over
Encrypted Cloud Data, IEEE transactions on
dependable and secure computing, Vol. 10,
no. 4, july/august 2013, 1545-5971/13, pp.
239-250
[3]. Mohd Rizuan Baharon, Qi Shi, David
Llewellyn-Jones, Madjid Merabti (2013)
Secure Rendering Process in Cloud
Computing, 2013 Eleventh Annual
Conference on Privacy, Security and Trust
(PST), 978-1-4673-5839-2/13 2013 IEEE ,
pp82-87
[4]. Scott C.-H. Huang_y, Qiao-Wei Liny, Chih-
Kai Changy (2013) Secure Homomorphic
and Searchable Encryption in Ad Hoc
Networks, 0190-3918/13 2013 IEEE DOI
10.1109/ICPP.2013.135 pp. 937-942
[5]. Qingjie MENG, Changqing (2013) GONG
Research of cloud computing security in
digital library, 2013 6th International
Conference on Information Management,
Innovation Management and Industrial
Engineering, 978-1-4799-0245-3/13 2013
IEEE, pp. 41-44
[6]. Ankita Lathey, Pradeep K. Atrey, Nishant
Joshi (2013), Homomorphic Low Pass
Filtering on Encrypted Multimedia over
Cloud, 2013 IEEE Seventh International
Conference on Semantic Computing, 978-0-
7695-5119-7/19 5119 IEEE DOI
10.1109/ICSC.2013.60 pp. 310-313
[7]. Y Govinda Ramaiah, G Vijaya Kumari
(2013) Efficient Public key Homomorphic
Encryption Over Integer Plaintexts 978-1-
4673-2588-2/12 2012 IEEE pp. 123-128
[8]. Y Govinda Ramaiah, G Vijaya Kumari
(2013) Complete Privacy Preserving
Auditing for Data Integrity in Cloud
Computing 2013 12th IEEE International
Conference on Trust, Security and Privacy
in Computing and Communications 978-0-
7695-5022-0/13 2013 IEEE DOI
10.1109/TrustCom.2013.191 pp. 1559-1566
[9]. NIU Yukun, TAN Xiaobin, CHEN Shi,
WANG Haifeng, YU Kai, BU Zhiyong
(2013) A Security Privacy Protection
Scheme for Data Collection of Smart Meters
Based on Homomorphic Encryption, 978-1-
4673-2232-4/13 2013 IEEE EuroCon 2013
14 July 2013 Zagreb, Croatia pp. 1401-
1405
[10]. An-Ping Xiong, Qi-Xian Gan, Xin-Xin He,
Quan Zhao (2013) A Searchable Encryption
Of Cp-Abe Scheme In Cloud Storage, 978-
1-4799-2446-2/13 2013 IEEE pp. 345-349
[11]. J.Nich and S.J.Yang, “Measuring the
Multimedia Performance of Server Based
Computing”
[12]. Wenwu Zhu, Chong Luo, Jianfeng Wang,
and Shipeng Li, “Multimedia Cloud
Computing”, 19 April 2011.