Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography. The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give access to the encryption keys stored in cloud.
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...rahulmonikasharma
Cloud computing may be a computing ideas that allows once needed and low maintenance usage of resources, however the info is shares to some cloud servers and varied privacy connected issues emerge from it. Various schemes based on the Attribute-Based Encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. Anony Control decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
Secure Fog Computing System using Emoticon Techniquerahulmonikasharma
Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by unauthorized person, only encrypted data of original data can be viewed not the actual data.
In the past decade, big technical advances have appeared which can bring more comfort not only in the corporate sector but at the personal level of everyday life activities. The growth and deployment of cloud computing technologies by either private or public sectors were important. Recently it became apparent to many organizations and businesses that their workloads were moved to the cloud. However, protection for cloud providers focused on Internet connectivity is a major problem, leaving it vulnerable to numerous attacks. Although cloud storage protection mechanisms are being introduced in recent years. However, cloud protection remains a major concern. This survey paper tackles this problem by recent technology that enables confidentiality conscious outsourcing of the data to public cloud storage and analysis of sensitive data. In specific, as an advancement, we explore outsourced data strategies focused on data splitting, anonymization and cryptographic methods. We then compare these approaches for operations assisted by accuracy, overheads, masked outsourced data and data processing implications. Finally, we recognize excellent solutions to these cloud security issues.
Design and Implementation of Visual Cryptography System for Transmission of S...rahulmonikasharma
In recent period of time security of the transmitted data is most critical problem, as network technology is greatly advanced and heaps of information is transmitted via net. Visual cryptography strategy is one of the most secure technique for privacy auspices, that allow the encryption of secret image or data by transferring it into the secure percentage and such a strategy is able to recover the secret image or data. This behavior makes visual cryptography especially useful for the low computation load requirement. In this paper, we are providing the information regarding information security by using Visual Cryptography scheme by making use of exclusive new technique of splitting of images along with their pixels rotation with the help of generated random number. We also have made an attempt to overcome some of the disadvantages of preexisting techniques of encryption and decryption. Finally, successful transmission of the message from transmitting end to receiving end without any interception was done. Most importantly, it is very difficult to hack by use of any professional hacking techniques as the message is encrypted twice. Hence the data is highly secured under transmission path
A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and research areas etc.
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...rahulmonikasharma
Cloud computing may be a computing ideas that allows once needed and low maintenance usage of resources, however the info is shares to some cloud servers and varied privacy connected issues emerge from it. Various schemes based on the Attribute-Based Encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. Anony Control decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
Secure Fog Computing System using Emoticon Techniquerahulmonikasharma
Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by unauthorized person, only encrypted data of original data can be viewed not the actual data.
In the past decade, big technical advances have appeared which can bring more comfort not only in the corporate sector but at the personal level of everyday life activities. The growth and deployment of cloud computing technologies by either private or public sectors were important. Recently it became apparent to many organizations and businesses that their workloads were moved to the cloud. However, protection for cloud providers focused on Internet connectivity is a major problem, leaving it vulnerable to numerous attacks. Although cloud storage protection mechanisms are being introduced in recent years. However, cloud protection remains a major concern. This survey paper tackles this problem by recent technology that enables confidentiality conscious outsourcing of the data to public cloud storage and analysis of sensitive data. In specific, as an advancement, we explore outsourced data strategies focused on data splitting, anonymization and cryptographic methods. We then compare these approaches for operations assisted by accuracy, overheads, masked outsourced data and data processing implications. Finally, we recognize excellent solutions to these cloud security issues.
Design and Implementation of Visual Cryptography System for Transmission of S...rahulmonikasharma
In recent period of time security of the transmitted data is most critical problem, as network technology is greatly advanced and heaps of information is transmitted via net. Visual cryptography strategy is one of the most secure technique for privacy auspices, that allow the encryption of secret image or data by transferring it into the secure percentage and such a strategy is able to recover the secret image or data. This behavior makes visual cryptography especially useful for the low computation load requirement. In this paper, we are providing the information regarding information security by using Visual Cryptography scheme by making use of exclusive new technique of splitting of images along with their pixels rotation with the help of generated random number. We also have made an attempt to overcome some of the disadvantages of preexisting techniques of encryption and decryption. Finally, successful transmission of the message from transmitting end to receiving end without any interception was done. Most importantly, it is very difficult to hack by use of any professional hacking techniques as the message is encrypted twice. Hence the data is highly secured under transmission path
A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and research areas etc.
Privacy Preserving Approaches for High Dimensional Dataijtsrd
This paper proposes a model for hiding sensitive association rules for Privacy preserving in high dimensional data. Privacy preservation is a big challenge in data mining. The protection of sensitive information becomes a critical issue when releasing data to outside parties. Association rule mining could be very useful in such situations. It could be used to identify all the possible ways by which ˜non-confidential data can reveal ˜confidential data, which is commonly known as ˜inference problem. This issue is solved using Association Rule Hiding (ARH) techniques in Privacy Preserving Data Mining (PPDM). Association rule hiding aims to conceal these association rules so that no sensitive information can be mined from the database. Tata Gayathri | N Durga"Privacy Preserving Approaches for High Dimensional Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2430.pdf http://www.ijtsrd.com/engineering/computer-engineering/2430/privacy-preserving-approaches-for-high-dimensional-data/tata-gayathri
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...acijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
The volatile growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. The current IPS presents a less security. Unfortunately, our work combined with the work of others show that each of these mechanisms are completely futile. As a result, organizations with deployed wireless networks are vulnerable to illegal use of, and access to, their internal communications.
The Internet of Things (IoT) contains smart devices placed in different environments, connected with each other across networks and Internet. The integration between Things and Cloud Computing (CC) for monitoring and permanent storage is required for future IoT applications. Therefore, this paper proposes IoT architecture based Cloud for healthcare network when patients are remotely monitored by their family and physicians. This proposed architecture is different from the traditional IoT architecture that consists of Things, getaways, middleware, and application layers which in turn need connectivity insurance between them. The proposed architecture is designed and configured using Cisco Packet Tracer version 7.0 over two sites: Site 'A' located at smart home and site 'B' located at the smart hospital. The results show that the IoT based Cloud enhances the patient life style by using smart sensors and mobile application, as well as the physicians can remotely monitor the data in real time.
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
Cloud computing helps enterprises transform business and technology. Companies have begun to look for solutions that would help reduce their infrastructures costs and improve profitability. Cloud computing is becoming a foundation for benefits well beyond IT cost savings. Yet, many business leaders are concerned about cloud security, privacy, availability, and data protection. To discuss and address these issues, we invite researches who focus on cloud computing to shed more light on this emerging field. This peer-reviewed open access Journal aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including (but not limited to):
Online Votes and Fund analysis for political parties with Data SecurityIJERA Editor
With the traditional fund management and vote bank analysis, it was difficult to manage and analyze the details
of fund collection and vote bank where all the records and relevant details were maintained at manual level,
which is always a troublesome process. To overcome these problems, an online web application is being
developed which provide the means of maintaining the funds gathered, Analyzing vote bank generated, Analysis
of area wise grievances and providing data security using encryption algorithms like Advanced Encryption
standard enabling two step verification mechanisms such as legitimate user authentication and secured access to
data. Also various reports will be generated depicting graphical assessment of information gathered.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Abstract
In the infancy of Cryptography Mono-alphabetic Substitution Ciphers were considered good enough to baffle any potential attackers but with the advancements in technology & the upsurge of computing power those methods have become trivial. Even the very complex methods of encryption are vulnerable to the brute force attacks of contemporary computers and with Quantum computing on the horizon even the current state of the art cryptosystems are at risk. Lots of research is being done and every possible field is being explored in order to create that elusive unbreakable cipher. Among other subjects, Geometry is also being applied and various ciphers based on the properties of different geometrical figures have been developed. This paper ventures to investigate the recent research applying the concept of geometry to boost the caliber of pre-existing cryptosystems enhance the understanding of the subject.
Keywords: Cryptography, Geometry, Encryption, Decryption, ECC, Circle, Chakra, Ellipse, Hyperbola, HCCS
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
Now-a-Days Cloud Computing is an emerging technology, that works on the principle of pay-per-use. It offers services like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Storage as a Service and many more. Cloud computing used for database and software applications to centralize the data. All the cloud users openly store their data on the cloud service provider’s service centers. Here, the management of data and services are not fully confidential. So that the security of the cloud stored data becomes an open challenging task in the field of Cloud Computing. To increase the levels of data security in the cloud, this paper deals with some techniques like public auditability, Homomorphism Linear Authenticator (HLA).
Authentic and Anonymous Data Sharing with Data Partitioning in Big Datarahulmonikasharma
A Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have proposed ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it.
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...rahulmonikasharma
Cloud computing owes to its potency, value effectiveness, flexibility and quantifiability for being a trend setting technology. In this paper, a cloud computing and education based theory has been studied and analyzed. This paper is based on the utilizations of cloud computing services in network security and its applications.
Privacy Preserving Approaches for High Dimensional Dataijtsrd
This paper proposes a model for hiding sensitive association rules for Privacy preserving in high dimensional data. Privacy preservation is a big challenge in data mining. The protection of sensitive information becomes a critical issue when releasing data to outside parties. Association rule mining could be very useful in such situations. It could be used to identify all the possible ways by which ˜non-confidential data can reveal ˜confidential data, which is commonly known as ˜inference problem. This issue is solved using Association Rule Hiding (ARH) techniques in Privacy Preserving Data Mining (PPDM). Association rule hiding aims to conceal these association rules so that no sensitive information can be mined from the database. Tata Gayathri | N Durga"Privacy Preserving Approaches for High Dimensional Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2430.pdf http://www.ijtsrd.com/engineering/computer-engineering/2430/privacy-preserving-approaches-for-high-dimensional-data/tata-gayathri
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...acijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
The volatile growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. The current IPS presents a less security. Unfortunately, our work combined with the work of others show that each of these mechanisms are completely futile. As a result, organizations with deployed wireless networks are vulnerable to illegal use of, and access to, their internal communications.
The Internet of Things (IoT) contains smart devices placed in different environments, connected with each other across networks and Internet. The integration between Things and Cloud Computing (CC) for monitoring and permanent storage is required for future IoT applications. Therefore, this paper proposes IoT architecture based Cloud for healthcare network when patients are remotely monitored by their family and physicians. This proposed architecture is different from the traditional IoT architecture that consists of Things, getaways, middleware, and application layers which in turn need connectivity insurance between them. The proposed architecture is designed and configured using Cisco Packet Tracer version 7.0 over two sites: Site 'A' located at smart home and site 'B' located at the smart hospital. The results show that the IoT based Cloud enhances the patient life style by using smart sensors and mobile application, as well as the physicians can remotely monitor the data in real time.
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
Cloud computing helps enterprises transform business and technology. Companies have begun to look for solutions that would help reduce their infrastructures costs and improve profitability. Cloud computing is becoming a foundation for benefits well beyond IT cost savings. Yet, many business leaders are concerned about cloud security, privacy, availability, and data protection. To discuss and address these issues, we invite researches who focus on cloud computing to shed more light on this emerging field. This peer-reviewed open access Journal aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including (but not limited to):
Online Votes and Fund analysis for political parties with Data SecurityIJERA Editor
With the traditional fund management and vote bank analysis, it was difficult to manage and analyze the details
of fund collection and vote bank where all the records and relevant details were maintained at manual level,
which is always a troublesome process. To overcome these problems, an online web application is being
developed which provide the means of maintaining the funds gathered, Analyzing vote bank generated, Analysis
of area wise grievances and providing data security using encryption algorithms like Advanced Encryption
standard enabling two step verification mechanisms such as legitimate user authentication and secured access to
data. Also various reports will be generated depicting graphical assessment of information gathered.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Abstract
In the infancy of Cryptography Mono-alphabetic Substitution Ciphers were considered good enough to baffle any potential attackers but with the advancements in technology & the upsurge of computing power those methods have become trivial. Even the very complex methods of encryption are vulnerable to the brute force attacks of contemporary computers and with Quantum computing on the horizon even the current state of the art cryptosystems are at risk. Lots of research is being done and every possible field is being explored in order to create that elusive unbreakable cipher. Among other subjects, Geometry is also being applied and various ciphers based on the properties of different geometrical figures have been developed. This paper ventures to investigate the recent research applying the concept of geometry to boost the caliber of pre-existing cryptosystems enhance the understanding of the subject.
Keywords: Cryptography, Geometry, Encryption, Decryption, ECC, Circle, Chakra, Ellipse, Hyperbola, HCCS
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
Now-a-Days Cloud Computing is an emerging technology, that works on the principle of pay-per-use. It offers services like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Storage as a Service and many more. Cloud computing used for database and software applications to centralize the data. All the cloud users openly store their data on the cloud service provider’s service centers. Here, the management of data and services are not fully confidential. So that the security of the cloud stored data becomes an open challenging task in the field of Cloud Computing. To increase the levels of data security in the cloud, this paper deals with some techniques like public auditability, Homomorphism Linear Authenticator (HLA).
Authentic and Anonymous Data Sharing with Data Partitioning in Big Datarahulmonikasharma
A Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have proposed ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it.
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...rahulmonikasharma
Cloud computing owes to its potency, value effectiveness, flexibility and quantifiability for being a trend setting technology. In this paper, a cloud computing and education based theory has been studied and analyzed. This paper is based on the utilizations of cloud computing services in network security and its applications.
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloudrahulmonikasharma
Cloud computing now a day’s provides numerous number of benefits to their users. As the Cloud infrastructure is not directly under control of user its seems to be difficult for user to have a better security. Other side as the number of user grow even it become more difficult to manage a data such a way that user needs for any data are satisfied efficiently. There are lots of chances to misuse the data of user. So, here Cloud providers need to balance this two fundamental of Privacy handling and efficient analysis of data together is become very important. When we talk about the health records of patient or medical firm and available on remote machine issue of privacy of record provided by the anonymization fundamental. Here various researcher provided a technique T- Closeness to achieve this goal. It also important to provide the security of stored data using obfuscation mechanism . Some time full obfuscation of file consume more time so many researcher provided scheme of attribute based obfuscation which lessen the burden of Cloud server by providing adequate security and also help to execute user query faster. In this paper we aim to provide survey on various fundamental given by the different researcher.
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017rahulmonikasharma
Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have implemented ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it.
New Approach to Implement Authentication and Key Distribution on WI-Max Networksrahulmonikasharma
Wi-Max is utilized for the remote system. This innovation will be a developing innovation for remote innovation in future. It is like Wi-Fi however its territory of scope and transfer speed is considerably higher than the Wi-Fi. So the security turns out to be vital issue. Wi-Max innovation incorporates some security components, for example, Key administration, Authentication and privacy. For security first need is crosswise over remote system and other is to give get to control to the system and the get to control can be given utilizing access control conventions. Major issues are in WiMax difficult to handle the security problems. In this paper proposed implementing authentication and distribution of keys in secure manner on open networks and also providing confidentiality.
Safeguarding Data Privacy by Placing Multi-level Access Restrictionsrahulmonikasharma
People always tend to protect assets regardless of what they are. For example, a user may keep a memorable picture of his parents in a safe place. However, the degree of protection he provides is directly based on how much he values the assets. If the user highly value the picture of his great-grandparents, he might take an extra measure of precaution by copying it and placing it in a fireproof safe where it is guarded from most natural disasters and from theft, or he may just put it in a frame because he has many similar pictures or because he can reproduce it. Usage of Database management systems to store information in every aspect of an enterprise is rapidly growing. Every company need to protect all tangible assets like valuable information stored in a DBMS is often vital to the business interests of the organization and is regarded as a corporate asset of the company that must be protected. There is no doubt that a password is the key to opening a user account. The Stronger the password, the longer it takes a hacker to break in. User authentication depends on a password to ensure the user account’s identity. Since organizations increase their implementation of database systems as the key data management technology for regular operations and decision making, the security of data managed by these systems is an important task.
A Review on Various Methods of Cryptography for Cyber Securityrahulmonikasharma
In the today’s world of digital communication networks, the privacy and security of the transmitted data has become a basic necessity for communication. Data Security is the science and study of techniques of securing data in computer and communication systems from unknown users, disclosures and modifications. Cyber security issues plays a vital role in moving towards digital information age. Therefore, the encryption and decryption systems have been implemented for protecting information. The internet users are rapidly increasing day by day which causes a lot of cyber-criminals. The security of not only the single system but the entire systems will be ensured by the task of network security and controlled by network administrator. In this paper, an attempt has been made to review the various methods of Cryptography and how these methods will help to secure data from unauthenticated users. This paper has primarily focused on Cyber Security and Cryptographic concepts. This paper has also discusses the various attacks and cryptographic algorithms that are used in various applications of cyber security.
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsAM Publications
Stopping unauthorized access to corporate information systems is crucial for many organizations. In which
Communication security is playing one of the key area of interest to protect the sensitive/valuable data. The data used in
communication is very sensitive/valuable and needs to be protected and made abstract from intruders of system or over the
network. The recent way to provide precious security mechanism of Network security is Cryptography using Elliptic Curve
architectures which is based on the arithmetic of elliptic curves and discrete logarithmic problems. ECC schemes are public-key
based mechanisms that provide Cipher text (Encryption), digital signatures and key exchange algorithms. The most crucial
operation in the cryptosystem is the scalar multiplication operation. In this paper, we study various scalar multiplication
algorithms with respect to the efficiency, weight and features etc. This paper gives an idea about algorithms and the areas where
we need to researchers can proceed further in the computation of cryptosystem.
The volatile growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. The current IPS presents a less security. Unfortunately, our work combined with the work of others show that each of these mechanisms are completely futile. As a result, organizations with deployed wireless networks are vulnerable to illegal use of, and access to, their internal communications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...rahulmonikasharma
In wireless mobile ad hoc network, mainly, two approaches are followed to protect the security such as prevention-based approaches and detection-based approaches. A Mobile Ad hoc Network (MANET) is a collection of autonomous wireless mobile nodes forming temporary network to interchange data (data packets) without using any fixed topology or centralized administration. In this dynamic network, each node changes its geographical position and acts as a router for forwarding packets to the other node. Current MANETs are basically vulnerable to different types of attacks. The multimodal biometric technology gives possible resolves for continuous user authentication and vulnerability in high security mobile ad hoc networks (MANETs). Dempster’s rule for combination gives a numerical method for combining multiple pieces of data from unreliable observers. This paper studies biometric authentication and intrusion detection system with data fusion using Dempster–Shafer theory in such MANETs. Multimodal biometric technologies are arrayed to work with intrusion detection to improve the limitations of unimodal biometric technique.
Mediated certificateless cryptosystem for the security of data in public cloudeSAT Journals
Abstract Security is a serious issue in cloud computing. Encryption is the solution for the security in cloud. There are many encryption techniques. Each one has its own merits and demerits. In the case of identity based encryption it is free from security mediator, predefined keys are there, and have the problem of key escrow and certificate revocation. Then the arrival of mediated certificateless scheme eliminates the key escrow problem, and certificate revocation problem. In certificateless encryption scheme, key generation process is divided in between the user and the cloud. In our system data owner encrypt the data using its secret key. Then the data owner encrypt the secret key twice. Hence formed intermediate keys. Then send this encrypted data and intermediate keys to cloud. The cloud partially decrypt the intermediate key and send partially decrypted data and encrypted data to required user. The user decrypt the partialy decrypted data. Then the user will get the required key for decryption. so the user can decrypt it completly.The main advantage of our system is, the data owner can send same data to multiple clients with minimum cost. Keywords: Cloud computing, Certificateless cryptography, Key escrow, Certificate revocation.
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
Advancement in Abrasive Water Jet Machining - A Studyrahulmonikasharma
The abrasive water-jet machining is an unconventional and eco-friendly technology used for hard and brittle material in industrial purpose. As the only cold high-energy beam machining technology, abrasive water-jet (AWJ) is one of the most rapidly developed techniques in material manufacturing industry and can be applied for wide variety of materials. Energy transformation is used to get pressurized jet and to have plastic deformation and fracture, results wear ratio is infinite. The study is focused on abrasive water jet lag info and recharging of abrasives and process parameter such as Influence of pressure, traverse rate, and abrasive flow rate, depth of cut and surface roughness and size and shape of abrasive particles and effectiveness of process to get higher surface finish. Advantageous and comparison will also be part of the concern study.AWJM technique has suitable for precise machining such as polishing, drilling, turning and milling. This technique has sought the benefits of combining with other material removal methods to further expand its applications.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Immunizing Image Classifiers Against Localized Adversary Attacks
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
117
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Application of Elliptical Curve Cryptography in Empowering Cloud Data
Security
T. Venkat Narayana Rao1
Professor, Dept. of Computer Science and Engineering
Sreenidhi Institute of Science and Technology
Hyderabad, India
Vanaparthy Sai Praneeth2
Student, Dept. of Computer Science and Engineering
Sreenidhi Institute of Science and Technology
Hyderabad, India
K. Sai Sharath 3
Student, Dept. of Computer Science and Engineering
Sreenidhi Institute of Science and Technology
Hyderabad, India.
Abstract: Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to
cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based
on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and
authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also
known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and
unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This
paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography.
The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give
access to the encryption keys stored in cloud.
Keywords: Cloud Computing, Data security, Cloud security, Encryption, Decryption, Elliptical Curve Cryptography, Digital signature, Elliptic
Curve Theory.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Cloud is basically a combination of servers at very high
level. Cloud computing allows us to access the internet
applications and services over internet. It allows us to create,
configure and customize online applications. Cloud computing
refers to accessing and making use of the hardware and
software resources remotely. It provides online data storage of
data. Cloud computing enables executing application directly on
the cloud without being application to be installed on the local
machine as shown in figure 1. This paper focus on the data
security and cloud protection inside the cloud processing that
can be attained by the application of cryptographic algorithms.
Fig 1: Cloud Computing
A. CRYPTOGRAPHY
Cryptography is the discipline or art of changing the text to
an encoded form that makes text ineligible for those who need
not read. This process of plaintext conversion using a
mechanism known as encryption. Decryption is to re-
conversion of cipher text back plaintext. In a private key
cryptography process, the encryption and decryption are
performed using a alike key which is secret key. The popular
examples are AES and DES algorithms. Public key
cryptography is also called as asymmetric key cryptographic
systems. A key is basically a value used in a cryptography
algorithm to translate raw text to cipher text. This has great
value and is measured in several parts. It is observed that the
more the key size used in the public key cryptography, the more
the secure the cryptographic mechanism would be.
B. DATA SECURITY
To produce data, most systems employ a combination
of methods, that includes:
1. Encryption means using a complex expression to encode the
data. In order to decode the encrypted data files, a user requires
an encryption key. While a user can obtain a cipher text but it is
in illegible format in order to decrypt the cipher text any user
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
118
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
needs a key , unauthorized users are prevented to access the
encryption key to offer security to private data.
2. Authentication procedure deal with creation of a user name
and security password.
3. Authorization practices - the cloud service providers(CSP)
enlist the users who are authorized to access information placed
on the cloud server. To secure user information every time on
different application diverse cryptographic algorithms and
authentication procedures are employed. Due to small processor
speed and run time memory; the devices require an algorithm
which can be utilized in small computer devices also. Security
of stored data and data in transition might be a concern while
storing sensitive data on the cloud storage.
C. CLOUD SECURITY ISSUES
There are 3 basic problems with cloud computing safety ,
that are: confidentiality, integrity and availability as shown in
figure 2.
Fig 2: Cloud Security Issues
Confidentiality: Confidentiality refers to authenticated person
would be able to access and retrieve the data. So in order to
protect the confidentiality of information, the information is
encrypted by the authorized person and later be able to decrypt
it as the information as key being known to him only. There
are two main threats of confidentiality those are snooping and
traffic analysis. Other ways to ensure information
confidentiality include enforcing file permissions and access
control list to restrict the access to sensitive information[4][8].
Integrity: Integrity is a act of protecting information from
being modified by unauthorized parties. This is a commonly
used method to protect data integrity which includes hashing the
data received and comparing it with the hash of the
initial/original message. However, this means that the hash of
the original data must be provided in a secure fashion. More
convenient methods could be to use existing schemes such as
GPG to digitally sign the data.
Availability: Availability is the information that is needed to
the authorized user whenever needed. There is need to worry
about confidentiality and integrity if the approved users cannot
get the information they are entitled to. It is one of the most
important feature of information security.
II. Basic Concepts and Literature
This paper provides an overview of the security issues of data
protection and privacy associated with cloud computing. The
methods presented in this study focus on enhancing security in
cloud computing and privacy protection by offering digital
signature generation and verification , encryption and
decryption mechanisms[1]. This approach offers cloud and data
security by providing protection to keys that are employed in
encryption and decryption. It is the combination of digital
signature algorithm of Diffie Hellman and Elliptical Curve
Cryptography encryption [4]. This method can be used to
prevent any unauthorized access to the privately data stored on
the cloud by any user. It is noticeable that usage of Elliptical
Curve Cryptography in wireless devices is superior to public
key encryption techniques. It aids in minimizing the processing
time of the devices[1][2].
The existing system uses Elliptical Curve Cryptography
algorithm for provisioning security to user’s data but it do have
some limitations in terms of key distribution and number of
keys shared under different attacks. In the existing system
private key is stored by partitioning private key into 3 different
parts and this is stored on three different storage locations,
hence, there is huge possibility that the hackers might perform
several attacks to access authenticated user’s data that is stored
on diverse locations in the cloud[2]. All these processes are
shown in existing model i.e. in figure 3.
Fig 3: Existing Model of security
III. IMPLEMENTATION AND EVALUATION
In the proposed system the digital signature is utilized for
authentication and AES algorithm is employed for encryption in
order to make the data safe in cloud environment [5][6].
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
119
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Storing data and security of data is the major liability of the
cloud provider. Hence, for competent data security and
consistency a mechanism is needed which offers secured data
encryption and decryption to provide a shield against the theft
and attacker. So, this system is implemented to provide
improved cloud data security in cloud computing using
Elliptical Curve Cryptography that provides additionally
security on data transmission, storage, authorization, and
authentication processes [6][7].
In the existing system, private data is encrypted using
encryption keys, and the encryption keys are partitioned into
numerous parts and are stored in dissimilar locations of cloud.
Hackers can perform many attacks and acquire the access of
encryption keys stored in various locations of cloud database. In
the proposed system in order to enhance the security in the
cloud data storage an attempt is made to keep a lock on the
encryption key from illegal access. An access control list is
arranged for the encryption key so that only permitted users
nominated in the access control list can obtain the access to the
encryption keys used for encryption and decryption of private
data stored in cloud. Encryption key is safe guarded by a lock,
whenever an user need to access key, validation occurs and
checks in the access control list to ascertain the user eligibility
to access the key stored in the cloud database. If the user is
found to be appropriate then only access the key, lock is
released on a particular key, upon conclusion the key is yet
again protected by the lock as shown in figure 4.
Figure 4: Proposed Control Access List Model
The Elliptical Curve Cryptography
Elliptic Curve cryptography (ECC) is a cryptographic
scheme that employs the features of elliptic curve to produce
cryptographic calculations[3][5]. In 1980s Koblitz and Miller
had proposed the elliptic curve cryptography. Over a restricted
field in discrete logarithmic cryptosystems , an elliptic curve is
the arrangement over a non-particular cubic polynomial
mathematical statement with two questions over a field F.
In short terms it is discretized set of outcomes for a curve that is
in the following structure:
y2 = x3 + ax + b (1)
If points P1 and P2 lie on the curve E, P3 = P1 + P2. Assume
both the clients follow a mathematical statement as given here
under in the pseudo-code :
1. The elliptic curve mathematical statement
2. Estimation of values a and b
3. Assume a prime number , p
4. The elliptical curve figure is produced from elliptic curve
equation
5. A base point, B is drawn from the elliptic gathering.
Key generation process:
1. UserA chooses a whole number dA i.e. UserA‘s private key.
2. UserA generates public key PA= dA*B
3. UserB correspondingly selects a private key dB and compute
public key PB= dB *B
4. UserA generates a security key K= dA *PB. UserB produces
the security key i.e. K= dB *PA.
Signature Generation: For marking a message m by UserA, use
UserA‘s private key dA :
1. Compute e=HASH (m), wherein, HASH means
cryptographic hash function, such as SHA-1
2. Opt for an arbitrary whole number k from the range [1, n −
1]
3. Calculate r=x1(mod n), where (x1, y1) =k*B and If r=0,
Then go to step 2
4. Computes k−1(e+dAr)(mod n).If s=0, then go to step2
5. The signature is a couple as (r, s).
6. Send signature (r, s) to client UserB.
The Encryption algorithm: Suppose UserA intends to transmit
encrypted message UserB.
1. UserA takes plaintext message M, and encodes it onto a
point, PM, from the elliptic gathering.
2. UserA picks another arbitrary whole number, k from the
interval ranging [1, p-1]
3. The cipher text is a couple of points i.e.
PC = [ (kB), (PM + kPB) ]
5. Send cipher text PC to UserB.
The Decryption algorithm: UserB assumes following steps to
decrypt the cipher text PC.
1. UserB computes the result of the main point from PC and his
private key i.e. dB dB * (kB)
2. UserB then takes this data item and subtracts it from the
second point from PC
3. (PM + kPB) – [dB(kB)] = PM + k(dBB) – dB(kB) = PM
4. UserB might deciphers PM to get the originalmessage, M.
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
120
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Signature Verification: Inm a process for UserB client to
authenticate UserA's signature, UserB must have UserA‘s
public key PA
1. Confirm that r and s values are whole numbers in the range of
[1, n − 1]. If not, the signature is invalid.
2. Evaluate value e = HASH (m), wherein HASH is the same
function utilized in the signature generation.
3. Evaluate value w = s −1 (mod n)
4. calculate u1 = ew (mod n) and u2 = rw (mod n)
5. calculate (x1, y1) = u1B + u2PA
6. The signature is valid if the value of x1 = r (mod n),
otherwise invalid.
Fig 5:Elliptic Curve
As shown in the above figure 5, let P=(x1, y1), Q=(x2, y2),
R=(x3,y3) and P not equals Q.
To find the insertion with E. we get
Example:
P=(-2.35, -1.86)
Q=(-0.10, 0.836)
–R(3.89, 5.62) and R(3.89, -5.62)
P+Q=R=(3.890, -5.620)
For Example:
P(2, 2.65),
–R(-1.11, -2.64),
R(-1.11, 2.64)
2P=R=(-1.11, -2.64)
For Example:
UserA Encrypts:
1 .Suppose UseA wants to send a message to UserB.
2. Plaintext is x=(10,9) which is a point in E
3. Select a random value for k, k=3
4. Now compute (y1,y2):
y1=3(2.0,7.00)=(8.00,3.00)
y2=(10,9)+3(7,2)
=(10,9)+(3,5)
=(10.0,2.00)
5. UserA transmits y=((8,3),(10,2))
UserB Decrypts:
1.UserB receives y=((8,3),(10,2))
2.Compute x=(10,2)-7(8,3)
=(10,2)-(3,5)
=(10,2)+(3,6)
=(10,9)
(10,9) which is the plaintext. In this way UserB is able to find
original message (10,9) which is delivered by UserA to UserB.
Application of ECC
Many devices are small and have limited storage and
computational power. Following are the key devices used in the
present scenario.
1.Wireless communication devices
2. Smart digital cards
3.Web servers that need to handle many encryption sessions.
Any application that need security usually lacks in power,
storage and computational power which happens to be very
much necessary for the current cryptosystems.
IV.CONCLUSION AND FUTURE WORK
Elliptic Curve Cryptography provides better security
and has shown efficient performance compared to first
generation public key cryptography techniques like RSA which
is now in use. After comparing the RSA and ECC ciphers, the
ECC has manifested a feature to withstand complex scenarios
5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
121
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
and has exhibited less overheads as compared to RSA. The ECC
has many merits due to its ability to provide the same level of
security using less key size. ECC is suitable for many devices
that are small and have limited storage and computational
power to implement encryption and decryption on private data.
The future of ECC looks brighter than other algorithms as
today’s applications include smart cards, pagers, and cell
phones and do not witness overheads introduced by RSA
algorithm. Although ECC’s security has not been completely
evaluated, it is expected to come into widespread use in diverse
fields in the future. Before introducing ECC onto larger
networks, it must be thoroughly tested to improve the security
and efficiency i.e in terms of application to application.
REFERENCES
[1] Deyen Chen Hong Zhao, Data Security and Privacy Protection
Issues in Cloud Computing, Computer Science and Electronics
Engineering (ICCSE), 2012 International Conference on
(Vol.:1) ePrint-23-25 Mar.2012.
[2] Ramgovind, S. Eloff, M. ; Smith, E, The management of
security of Cloud computing, Information Security for South
Africa (ISSA), 2010, ePrint 2/4August.
[3] Parsi Kalpana , Sudha Singaraju, Data Security in Cloud
Computing using RSA Algorithm, International Journal of
Research in Computer and Communication tech., IJRCCT,
Sept. 2012.
[4] Neha Tirthani, and Ganesan.R R, Data Security in Cloud
Architecture Based on Diffie Hellman and Elliptical Curve
Cryptography, International Association for Cryptologic
Research Cryptology vol. 4-9, 2014.
[5] Prof Swarnalata Bolavarapu, Bharat Gupta, Data Security in
Cloud Computing, Int’l Journal of Advanced Research in
Computer Science and Software Engineering , Vol.4/ 3, March
2014.
[6] Dhaval Patel, M.B.Chaudhri, Data Security In Cloud
Computing Using Digital Signature, International Journal For
Technological Research In Engineering , June-2014.
[7] N. Koblitz, elliptic curve cryptosystem, Mathematics of
Computation, Vol. 48-1987, PP-203-209.
[8] Ms. Bhavana Sharma, Security Architecture Of Cloud
Computing Based On Elliptic Curve Cryptography (ECC),
International Journal of Advances in Engineering Sciences
Vol.3/3, July, 2013.
[9] Ms. Priyanka Shaarda, Providing data security in cloud
computing using elliptical curve cryptography, Int’l Journal on
Recent and innovation trends in computing and
communication, volume3/2, 2015.