This document discusses using disruption tolerant network (DTN) technology to enable secure communication in military networks that experience intermittent connectivity. It proposes using ciphertext-policy attribute-based encryption (CP-ABE) to manage access to encrypted information in a DTN where attributes are managed by multiple independent authorities. The key challenges addressed are flexible access policies across attributes from different authorities, efficient revocation of user attributes, and preventing key escrow issues. The proposed approach allows an access policy to be expressed using attributes from any set of authorities and supports efficient revocation of user attributes without rekeying the entire private key. It analyzes the efficiency and security of the approach compared to previous multi-authority CP-ABE schemes.
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
Abstract— Mobile knots now armed atmospheres such equally battlefield or aggressive area remain expected toward smart after irregular net connectivity and regular panels. Disruption Tolerant Network (DTN) tools stay attractive positive keys that agree knots toward connect with each other in these dangerous interacting atmospheres.The problem of applying the security mechanisms to DTN introduces several security challenges.Since nearly handlers could modification their related characteristics by approximately argument and reliability of data should be changed otherwise around isolated secrets power remain bargained significant reversal aimed at respectively characteristic is essential in command toward create organisms safe in this research a novel approaches are used to overcome the above mentioned problems called secure data sharing algorithm. This algorithm calculate hash importance aimed at coded documents which is used to check the reliability of encrypted confidential data.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
Secure data retrieval for decentralized disruption tolerant military networksLeMeniz Infotech
Secure data retrieval for decentralized disruption tolerant military networks
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes.
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET Journal
This document proposes a secure data sharing system in cloud computing using revocable storage identity-based encryption (RS-IBE). It begins with an abstract that describes challenges with securing data shared in the cloud. It then discusses existing systems that use IBE but lack flexibility and security when user permissions are revoked. The proposed system uses RS-IBE to build a data sharing framework that satisfies security objectives of data secrecy, backward secrecy, and forward secrecy. It provides formal definitions for RS-IBE and its security model. The proposed scheme is shown to provide confidentiality and reverse/forward secrecy simultaneously, while withstanding decryption key exposure.
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
This document presents a proposed attribute-based secure information retrieval system for decentralized disruption tolerant military networks. It uses ciphertext-policy attribute-based encryption (CP-ABE) to allow fine-grained and secure access to encrypted data stored on intermediate nodes in disruption tolerant networks. The key challenges addressed are decentralized key management where different authorities manage user attributes independently, fast attribute revocation to improve forward and backward secrecy, and defining access policies over attributes from different authorities. The proposed system features a key issuing protocol using secure two-party computation to solve the key escrow problem, allows defining access policies in any monotonic access structure, and supports fast revocation of user attributes or keys. It aims to cryptographically ensure data privacy and prevent unauthorized
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
This document discusses attribute-based encryption in cloud computing with outsourced revocation. It proposes a pseudonym generation scheme for identity-based encryption and outsourced revocation in cloud computing. The scheme offloads most key generation operations to a Key Update Cloud Service Provider during key issuing and updating, leaving only simple operations for the Private Key Generator and users. It aims to reduce computation overhead at the Private Key Generator while using an untrusted cloud service provider.
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
This document summarizes a research paper that proposes a mediated certificateless public key encryption (mCL-PKE) scheme for secure data sharing in cloud storage. The key points are:
1) The mCL-PKE scheme solves problems of key escrow and certificate revocation without using computationally expensive bilinear pairing operations.
2) It uses a security mediator to instantly revoke compromised users and enforce access policies. The mediator also supports partial decryption to preserve data confidentiality.
3) The scheme extends mCL-PKE with an access control list to allow the data owner to encrypt data only once for multiple authorized users, improving efficiency over previous pairing-based schemes.
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
Abstract— Mobile knots now armed atmospheres such equally battlefield or aggressive area remain expected toward smart after irregular net connectivity and regular panels. Disruption Tolerant Network (DTN) tools stay attractive positive keys that agree knots toward connect with each other in these dangerous interacting atmospheres.The problem of applying the security mechanisms to DTN introduces several security challenges.Since nearly handlers could modification their related characteristics by approximately argument and reliability of data should be changed otherwise around isolated secrets power remain bargained significant reversal aimed at respectively characteristic is essential in command toward create organisms safe in this research a novel approaches are used to overcome the above mentioned problems called secure data sharing algorithm. This algorithm calculate hash importance aimed at coded documents which is used to check the reliability of encrypted confidential data.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
Secure data retrieval for decentralized disruption tolerant military networksLeMeniz Infotech
Secure data retrieval for decentralized disruption tolerant military networks
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes.
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET Journal
This document proposes a secure data sharing system in cloud computing using revocable storage identity-based encryption (RS-IBE). It begins with an abstract that describes challenges with securing data shared in the cloud. It then discusses existing systems that use IBE but lack flexibility and security when user permissions are revoked. The proposed system uses RS-IBE to build a data sharing framework that satisfies security objectives of data secrecy, backward secrecy, and forward secrecy. It provides formal definitions for RS-IBE and its security model. The proposed scheme is shown to provide confidentiality and reverse/forward secrecy simultaneously, while withstanding decryption key exposure.
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
This document presents a proposed attribute-based secure information retrieval system for decentralized disruption tolerant military networks. It uses ciphertext-policy attribute-based encryption (CP-ABE) to allow fine-grained and secure access to encrypted data stored on intermediate nodes in disruption tolerant networks. The key challenges addressed are decentralized key management where different authorities manage user attributes independently, fast attribute revocation to improve forward and backward secrecy, and defining access policies over attributes from different authorities. The proposed system features a key issuing protocol using secure two-party computation to solve the key escrow problem, allows defining access policies in any monotonic access structure, and supports fast revocation of user attributes or keys. It aims to cryptographically ensure data privacy and prevent unauthorized
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
This document discusses attribute-based encryption in cloud computing with outsourced revocation. It proposes a pseudonym generation scheme for identity-based encryption and outsourced revocation in cloud computing. The scheme offloads most key generation operations to a Key Update Cloud Service Provider during key issuing and updating, leaving only simple operations for the Private Key Generator and users. It aims to reduce computation overhead at the Private Key Generator while using an untrusted cloud service provider.
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
This document summarizes a research paper that proposes a mediated certificateless public key encryption (mCL-PKE) scheme for secure data sharing in cloud storage. The key points are:
1) The mCL-PKE scheme solves problems of key escrow and certificate revocation without using computationally expensive bilinear pairing operations.
2) It uses a security mediator to instantly revoke compromised users and enforce access policies. The mediator also supports partial decryption to preserve data confidentiality.
3) The scheme extends mCL-PKE with an access control list to allow the data owner to encrypt data only once for multiple authorized users, improving efficiency over previous pairing-based schemes.
The document proposes two novel techniques for authenticating short encrypted messages in mobile and pervasive computing applications. The techniques aim to be more efficient than existing message authentication codes by utilizing the security provided by the underlying encryption algorithm. Specifically, one technique appends a short random string during authentication to benefit from unconditional security without managing long keys. The second technique further improves efficiency by leveraging block cipher-based encryption. Security analyses show the techniques meet confidentiality and integrity requirements for authenticated encryption.
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...IRJET Journal
The document proposes a secure data retrieval scheme for disruption tolerant military networks using ciphertext-policy attribute-based encryption (CP-ABE) combined with a two-party computation protocol. Key challenges in decentralized disruption tolerant networks include attribute revocation, key escrow issues due to a single trusted authority, and coordination of attributes from multiple authorities. The proposed scheme addresses these by having multiple independent key authorities handle attributes and issue user keys using a two-party computation protocol, preventing any single authority from accessing encrypted data or combining attribute keys. This allows for secure and efficient access control and retrieval of confidential data distributed across disruption tolerant networks.
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
This document proposes an efficient data sharing scheme for mobile cloud computing using attribute-based encryption. It discusses challenges with securely storing data in the cloud, including ensuring data confidentiality and integrity. Existing techniques like fully homomorphic encryption and attribute-based encryption are reviewed, but have limitations for resource-constrained mobile devices. The proposed scheme aims to provide security while reducing computational overhead, through using proxy servers to handle intensive operations and a lazy re-encryption approach for user revocation. It also discusses using provable data possession techniques to verify the integrity of outsourced data.
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
This document proposes two novel techniques for authenticating short encrypted messages for mobile and pervasive applications. Existing message authentication codes (MACs) are not designed to utilize encryption functionality and are inefficient for short messages. The proposed techniques are more efficient by using the encryption process to generate authentication information, rather than applying encryption and a MAC separately. The first technique appends a short random string during encryption for authentication. The second improves on this by leveraging properties of block ciphers. Analysis shows the techniques provide security while maintaining efficiency needed for mobile applications.
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
This document proposes two identity-based secure distributed data storage schemes. The first scheme provides confidentiality against chosen plaintext attacks, while the second achieves confidentiality against chosen ciphertext attacks. The schemes allow a file owner to independently set access permissions for individual files without help from a private key generator. They also protect against collusion attacks between receivers and proxy servers. To the best of the author's knowledge, these are the first identity-based distributed storage schemes that allow file-level access control and protect against collusion in the standard model.
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
This document proposes a scheme for identity-based encryption with outsourced revocation in cloud computing. It introduces a Key Update Cloud Service Provider (KU-CSP) that handles most key generation operations during key issuing and updating, reducing the computation overhead on the Private Key Generator (PKG). The scheme uses a hybrid private key for each user consisting of an identity component from the PKG and a time component updated periodically by the KU-CSP. This allows revocation of compromised users by updating others' time components while keeping the PKG offline. The scheme aims to achieve this outsourced revocation efficiently and securely using the KU-CSP while preventing collusion.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
This document summarizes an article about attribute-based encryption for securing data access in cloud storage. It discusses how attribute-based encryption (ABE) can allow users to encrypt data in the cloud in a way that only authorized users who match certain attributes can decrypt and access the data. The document provides background on ABE and homomorphic encryption, which allows computations on encrypted data. It proposes a system using partial homomorphic encryption with RSA and user-generated keys to provide security while allowing data operations without decryption. Evaluation results show the proposed approach provides faster encryption times and less overhead compared to traditional methods.
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow
wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by
exploiting external storage nodes. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and
privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities.
In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage
their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the
confidential data distributed in the disruption-tolerant military network. Since some users may change their associated attributes at
some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each
attribute is necessary in order to make systems secure. This implies that revocation of any attribute or any single user in an attribute
group would affect the other users in the group. It may result in bottleneck during rekeying procedure, or security degradation due to
the windows of vulnerability if the previous attribute key is not updated immediately.
Distributed private key generator in ibcLokesh Gopu
This document proposes the first practical architecture and implementation for a distributed private-key generator (PKG) for identity-based cryptography over the Internet. It improves upon previous proactive secret sharing schemes by defining protocols for periodic master-key modification, secret share recovery, modifying the set of nodes, and changing the security threshold. The distributed PKG achieves forward secrecy of the master key through periodic key refreshing, and compares favorably to other architectures in terms of message efficiency and features. An implementation of the distributed PKG verifies its practical efficiency.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
The document proposes a scheme for circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. It aims to ensure data confidentiality, fine-grained access control, and verifiability of delegated computation results. The scheme uses a combination of ciphertext-policy attribute-based encryption, symmetric encryption, and verifiable computation. It is proven secure based on computational assumptions and simulations show it is practical for cloud computing applications.
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
The document discusses an identity-based proxy-oriented data uploading and remote data integrity checking model called IDPUIC. It proposes allowing clients to delegate proxies to upload and process data when clients cannot directly access public cloud servers. It also addresses remote data integrity checking, which allows clients to check if their outsourced data remains intact without downloading the whole data. The document then provides a formal definition, system model, and security model for IDPUIC before describing an efficient and flexible IDPUIC protocol based on bilinear pairings that is provably secure based on the computational Diffie-Hellman problem.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
The document proposes a Session Based Ciphertext Policy Attribute Based Encryption (SB-CP-ABE) method for access control in cloud storage. SB-CP-ABE aims to enable efficient key refreshing and revocation in ciphertext policy attribute based encryption (CP-ABE) schemes. It introduces the concept of associating private keys with sessions, so that key updates and revocations only need to be done at session boundaries, avoiding the need for frequent re-encryption of ciphertexts. The method can be generically applied to existing CP-ABE schemes to improve their practicality for cloud storage environments.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
Secure and efficient management of confidential data in the decentralized dis...theijes
Mobile Nodes in some difficult areas subjected to intermittent network property and frequent partitions for e.g. battlefield. Disruption Tolerant Network (DTN) technologies are designed to specific situations wherever it will tolerate noise, attacks etc which means that nodes will get confidential information with none loss. Many application situations need a security for data that has secure access to information hold on in storage nodes at intervals a DTN or to contents of the messages routed through the network. Here, we have a tendency to use a way that allows secure access of data that is referred to as Ciphertext Policy Attributed-Based Encryption (CP-ABE) approach. There are many problems during this state of affairs. Some of those are control of policies needed for correct authentication of user and therefore the policies to retrieve the information. Therefore we have a tendency to use a promising solution i.e. Ciphertext-policy attribute-based encoding (CP-ABE) to resolve the problem of accessing information. But, by applying CP-ABE in decentralized DTNs results into many security and privacy challenges with reference to the attribute revocation, key escrow, and coordination of attributes issued from multiple authorities. Here, we have a tendency to propose a secure and efficient management of data within the decentralized Disruption Tolerant Network (DTN) wherever multiple key authorities severally manage their attributes.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
The main purpose of this research is to study the optimal process parameters for thermal friction drilling process on AISI 304 stainless steel. The experiments were conducted based on Taguchi experimental design method, and the multiple performance characteristics correlated with the resultant axial force, radial force, hole diameter dimensional error, roundness error, and bushing length, were investigated by fuzzy logic technique. The significant process parameters that most intensively affected the multiple performance characteristics and the optimal combination levels of process parameters were determined through the analysis of variance and the response graph. A test rig was manufactured at Shoman Company ‒ Egypt to perform the experimental work, and the tools were offered by Flowdrill Company ‒ Germany. Experimental results confirm that this approach is simple, effective and efficient for simultaneous optimization of multiple quality characteristics in thermal friction drilling process, as the bushing length produced is more than five times the workpiece thickness.
Quest Trail: An Effective Approach for Construction of Personalized Search En...Editor IJCATR
This document discusses developing a personalized search engine for software development organizations. It proposes using semantic analysis and genetic algorithms to personalize search results. Semantic analysis resolves ambiguity in queries by understanding their meaning, while genetic algorithms use machine learning to better understand user preferences over time. Quest analysis is also used to identify the goal or task behind a user's search by analyzing search logs at the quest level rather than query or session levels. Together these approaches aim to increase search relevance for users in software organizations by creating group profiles based on domain or project rather than individual user profiles.
The document proposes two novel techniques for authenticating short encrypted messages in mobile and pervasive computing applications. The techniques aim to be more efficient than existing message authentication codes by utilizing the security provided by the underlying encryption algorithm. Specifically, one technique appends a short random string during authentication to benefit from unconditional security without managing long keys. The second technique further improves efficiency by leveraging block cipher-based encryption. Security analyses show the techniques meet confidentiality and integrity requirements for authenticated encryption.
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...IRJET Journal
The document proposes a secure data retrieval scheme for disruption tolerant military networks using ciphertext-policy attribute-based encryption (CP-ABE) combined with a two-party computation protocol. Key challenges in decentralized disruption tolerant networks include attribute revocation, key escrow issues due to a single trusted authority, and coordination of attributes from multiple authorities. The proposed scheme addresses these by having multiple independent key authorities handle attributes and issue user keys using a two-party computation protocol, preventing any single authority from accessing encrypted data or combining attribute keys. This allows for secure and efficient access control and retrieval of confidential data distributed across disruption tolerant networks.
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
This document proposes an efficient data sharing scheme for mobile cloud computing using attribute-based encryption. It discusses challenges with securely storing data in the cloud, including ensuring data confidentiality and integrity. Existing techniques like fully homomorphic encryption and attribute-based encryption are reviewed, but have limitations for resource-constrained mobile devices. The proposed scheme aims to provide security while reducing computational overhead, through using proxy servers to handle intensive operations and a lazy re-encryption approach for user revocation. It also discusses using provable data possession techniques to verify the integrity of outsourced data.
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
This document proposes two novel techniques for authenticating short encrypted messages for mobile and pervasive applications. Existing message authentication codes (MACs) are not designed to utilize encryption functionality and are inefficient for short messages. The proposed techniques are more efficient by using the encryption process to generate authentication information, rather than applying encryption and a MAC separately. The first technique appends a short random string during encryption for authentication. The second improves on this by leveraging properties of block ciphers. Analysis shows the techniques provide security while maintaining efficiency needed for mobile applications.
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
This document proposes two identity-based secure distributed data storage schemes. The first scheme provides confidentiality against chosen plaintext attacks, while the second achieves confidentiality against chosen ciphertext attacks. The schemes allow a file owner to independently set access permissions for individual files without help from a private key generator. They also protect against collusion attacks between receivers and proxy servers. To the best of the author's knowledge, these are the first identity-based distributed storage schemes that allow file-level access control and protect against collusion in the standard model.
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
This document proposes a scheme for identity-based encryption with outsourced revocation in cloud computing. It introduces a Key Update Cloud Service Provider (KU-CSP) that handles most key generation operations during key issuing and updating, reducing the computation overhead on the Private Key Generator (PKG). The scheme uses a hybrid private key for each user consisting of an identity component from the PKG and a time component updated periodically by the KU-CSP. This allows revocation of compromised users by updating others' time components while keeping the PKG offline. The scheme aims to achieve this outsourced revocation efficiently and securely using the KU-CSP while preventing collusion.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
This document summarizes an article about attribute-based encryption for securing data access in cloud storage. It discusses how attribute-based encryption (ABE) can allow users to encrypt data in the cloud in a way that only authorized users who match certain attributes can decrypt and access the data. The document provides background on ABE and homomorphic encryption, which allows computations on encrypted data. It proposes a system using partial homomorphic encryption with RSA and user-generated keys to provide security while allowing data operations without decryption. Evaluation results show the proposed approach provides faster encryption times and less overhead compared to traditional methods.
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow
wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by
exploiting external storage nodes. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and
privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities.
In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage
their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the
confidential data distributed in the disruption-tolerant military network. Since some users may change their associated attributes at
some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each
attribute is necessary in order to make systems secure. This implies that revocation of any attribute or any single user in an attribute
group would affect the other users in the group. It may result in bottleneck during rekeying procedure, or security degradation due to
the windows of vulnerability if the previous attribute key is not updated immediately.
Distributed private key generator in ibcLokesh Gopu
This document proposes the first practical architecture and implementation for a distributed private-key generator (PKG) for identity-based cryptography over the Internet. It improves upon previous proactive secret sharing schemes by defining protocols for periodic master-key modification, secret share recovery, modifying the set of nodes, and changing the security threshold. The distributed PKG achieves forward secrecy of the master key through periodic key refreshing, and compares favorably to other architectures in terms of message efficiency and features. An implementation of the distributed PKG verifies its practical efficiency.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
The document proposes a scheme for circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. It aims to ensure data confidentiality, fine-grained access control, and verifiability of delegated computation results. The scheme uses a combination of ciphertext-policy attribute-based encryption, symmetric encryption, and verifiable computation. It is proven secure based on computational assumptions and simulations show it is practical for cloud computing applications.
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
The document discusses an identity-based proxy-oriented data uploading and remote data integrity checking model called IDPUIC. It proposes allowing clients to delegate proxies to upload and process data when clients cannot directly access public cloud servers. It also addresses remote data integrity checking, which allows clients to check if their outsourced data remains intact without downloading the whole data. The document then provides a formal definition, system model, and security model for IDPUIC before describing an efficient and flexible IDPUIC protocol based on bilinear pairings that is provably secure based on the computational Diffie-Hellman problem.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
The document proposes a Session Based Ciphertext Policy Attribute Based Encryption (SB-CP-ABE) method for access control in cloud storage. SB-CP-ABE aims to enable efficient key refreshing and revocation in ciphertext policy attribute based encryption (CP-ABE) schemes. It introduces the concept of associating private keys with sessions, so that key updates and revocations only need to be done at session boundaries, avoiding the need for frequent re-encryption of ciphertexts. The method can be generically applied to existing CP-ABE schemes to improve their practicality for cloud storage environments.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
Secure and efficient management of confidential data in the decentralized dis...theijes
Mobile Nodes in some difficult areas subjected to intermittent network property and frequent partitions for e.g. battlefield. Disruption Tolerant Network (DTN) technologies are designed to specific situations wherever it will tolerate noise, attacks etc which means that nodes will get confidential information with none loss. Many application situations need a security for data that has secure access to information hold on in storage nodes at intervals a DTN or to contents of the messages routed through the network. Here, we have a tendency to use a way that allows secure access of data that is referred to as Ciphertext Policy Attributed-Based Encryption (CP-ABE) approach. There are many problems during this state of affairs. Some of those are control of policies needed for correct authentication of user and therefore the policies to retrieve the information. Therefore we have a tendency to use a promising solution i.e. Ciphertext-policy attribute-based encoding (CP-ABE) to resolve the problem of accessing information. But, by applying CP-ABE in decentralized DTNs results into many security and privacy challenges with reference to the attribute revocation, key escrow, and coordination of attributes issued from multiple authorities. Here, we have a tendency to propose a secure and efficient management of data within the decentralized Disruption Tolerant Network (DTN) wherever multiple key authorities severally manage their attributes.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
The main purpose of this research is to study the optimal process parameters for thermal friction drilling process on AISI 304 stainless steel. The experiments were conducted based on Taguchi experimental design method, and the multiple performance characteristics correlated with the resultant axial force, radial force, hole diameter dimensional error, roundness error, and bushing length, were investigated by fuzzy logic technique. The significant process parameters that most intensively affected the multiple performance characteristics and the optimal combination levels of process parameters were determined through the analysis of variance and the response graph. A test rig was manufactured at Shoman Company ‒ Egypt to perform the experimental work, and the tools were offered by Flowdrill Company ‒ Germany. Experimental results confirm that this approach is simple, effective and efficient for simultaneous optimization of multiple quality characteristics in thermal friction drilling process, as the bushing length produced is more than five times the workpiece thickness.
Quest Trail: An Effective Approach for Construction of Personalized Search En...Editor IJCATR
This document discusses developing a personalized search engine for software development organizations. It proposes using semantic analysis and genetic algorithms to personalize search results. Semantic analysis resolves ambiguity in queries by understanding their meaning, while genetic algorithms use machine learning to better understand user preferences over time. Quest analysis is also used to identify the goal or task behind a user's search by analyzing search logs at the quest level rather than query or session levels. Together these approaches aim to increase search relevance for users in software organizations by creating group profiles based on domain or project rather than individual user profiles.
An Inventory Model with Variable Demand Rate for Deteriorating Items under Pe...Editor IJCATR
A continuous production control inventory model for deteriorating items with variable demand rate is developed. Demand
rate is the linear function of time. In this paper we have done all work in the environment of permissible delay of payments. A number
of structural properties of the inventory system are studied analytically. We have discussed the minimum total system cost under the
condition of permissible delay is relaxed to that at the end of the credit period, the retailer will make a partial payment on total
purchasing cost to the supplier and pay off the remaining balance by loan from the bank. Numerical examples are taken to illustrate the
procedure of finding the optimal total inventory cost and production cycle time. Sensitivity analysis is carried out to demonstrate the
effects of changing parameter values on the optimal solution of the system.
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
In recent years, the Mobile Wireless Sensor Network
is the emerging solution for monitoring of a specified region of
interest. Several anomalies can occur in WSNs that impair their
desired functionalities resulting in the formation of different
kinds of holes, namely: coverage holes, routing holes. Our
ultimate aim is to cover total area without coverage hole in
wireless sensor networks. We propose a comprehensive solution,
called holes detection and healing. We divided our proposed
work into two phases. The first phase consists of three sub- tasks;
Hole-identification, Hole-discovery and border detection. The
second phase treats the Hole-healing with novel concept, hole
healing area. It consists of two sub-tasks; Hole healing area
determination and node relocation.
SOA for Dynamically Integrated Virtual Learning Environment Systems with Clou...Editor IJCATR
SOA is structural approach for creating services to be reused and shared, so it provides agility and cost saving in software
development by dividing the application into multiple software components to be reused in other systems. Cloud computing is truly scalable
and provide virtualized resources which users can subscribe. Using a cloud and SOA in virtual learning systems provide a great chance for
learners to enhance gained learning outcomes. The adoption of cloud services also assists in reducing the cost of software, hardware, human
resources and infrastructure. This paper will use SOA and cloud computing to transfer virtual learning systems in the cloud to be more
integrated and interoperable through showing a conceptual model of distributed virtual learning system and using cloud computing combined
with services oriented architecture, to contribute in interoperability and integration of e-learning systems in general
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research
in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are
slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...Editor IJCATR
In this paper we focus on some techniques for solving data mining tasks such as: Statistics, Decision Trees and Neural
Networks. The new approach has succeed in defining some new criteria for the evaluation process, and it has obtained valuable results
based on what the technique is, the environment of using each techniques, the advantages and disadvantages of each technique, the
consequences of choosing any of these techniques to extract hidden predictive information from large databases, and the methods of
implementation of each technique. Finally, the paper has presented some valuable recommendations in this field.
Location Provider with Privacy Using Localized Server and GPS Editor IJCATR
Maps are an essential part of any handheld device and use constantly used for navigation and other resources by application for providing location based data which can be used for customized examination outcomes, however these data are conservatively stowed on a L.B.S Server which are susceptible to attacks and misuse as these data’s are not usually have any significant security so these data’s can be sold or misused by some other parties. We try to eliminate the problem as well as provided added functionality to the conventional maps by providing a customizable map which has the added functionality of offline use mode in addition to the online mode
Excessive Increment in E-Waste System and its Prohibition through Green Compu...Editor IJCATR
In the current scenario, the information and communication technology have made drastic changes in our daily routine like
industries, institution and almost in each field. In today’s world there is a large amount of usage of electronic equipments which are
giving rise to many problems. The energy consumption from such devices also leading to various global warming issues. At the
same time they are leading to many problems like problems of massive amount 0of hazardous waste and other wastes which are
generated from electronic equipment
Therefore here we will discuss about various consequences of e-waste , their effects and management of these toxic ad dangerous wastes
so as to make the process energy efficient and environment friendly
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Illumination Invariant Face Recognition System using Local Directional Patter...Editor IJCATR
The document proposes an illumination-robust face recognition system using local directional pattern (LDP) images and two-dimensional principal component analysis (2D-PCA). It extracts LDP images from face images as inputs to 2D-PCA for feature extraction, instead of using LDP for histogram feature extraction like previous works. Experimental results on the Yale B and CMU-PIE databases show the proposed approach achieves higher recognition accuracy than PCA and LBP-based methods, demonstrating its effectiveness in handling illumination variations. The maximum recognition rates are 96.43% for Yale B and 100% for CMU-PIE illumination sets.
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
Now a days there are lots of inventions done in vehicles and some may in progress, these inventions help to resolve the
challenges caused by the increasing transportation issues. These modern vehicles equipped with a large amount of sensors, actuators
and communication devices e.g. GPS. New vehicles have possessed powerful sensing, networking, communication and data
processing capabilities and can communicate with other vehicles or exchange information with the external environments over various
protocols. This can be done with the help of Vehicular communication systems; these are the networks in which vehicle and roadside
units are the communicating node, with each other provide the information, such as safety warnings and traffic information. They can
be effective in avoiding accidents and traffic congestion. To solve these issue sending and receiving messages is an important factor.
All this things are good when the number of vehicles are less, system must be able to handle traffic spike or sudden demands caused
by special events or situations such as sport games or emergencies. This is nothing but a scalability challenge which is going to
overcome in this paper using routing protocol called Epidemic routing protocol.
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...Editor IJCATR
This paper examines the use of GIS in the development of a crime analysis information system for the Nigeria police. In recent times, criminality has been on the increase with criminals using new and more sophisticated ways to commit crime; resulting to fear and restlessness among the citizens. They police have found it difficult to manage and control these crimes largely due to the obsolete methods and resources they employ in doing so. The purpose of this study is to see how the Nigerian Police Force can adopt the use of crime maps in its operations and reap the benefits. The system will help the police in the analysis of crimes which will lead to crime hotspots identification. Using ArcGIS Software 10.0, we created a digital land use map of crime hotspots in the area and a crime-geospatial database. The results of the spatial analysis and a 500m buffering done on the data shows that areas that are more vulnerable to crime, have no police stations situated around them. This study shows that a GIS based Information system will give the police better insights into crime mapping and analysis which will be a tool to help them effectively manage and combat crime. This study recommends full government involvement in the area of human personnel and infrastructure development for the police to effectively change from the traditional to GIS based ways of combating crime.
Physical Characterization of a Method for Production of High Stability Suspen...Editor IJCATR
Suspensions/Dispersions are encountered in a wide range of
applications, e.g., liquid abrasive cleaners, ceramics, medicines,
inks, paints….etc. In most cases it is necessary to keep the
suspension stable for the product lifetime. A new modified
differential sedimentation measuring system is suggested and used
to identify physical parameters affecting the sedimentation in
suspensions. The technique is discussed in details. It is found that
particle sizes as well as viscosity of continuous phase are the most
important factors governing the stability of a suspension. Empirical
relations are extracted to quantitatively describe the weight effect of
each factor. The modified measuring system shows good accuracy
enough to detect fluctuations in concentration of suspended
particles due to their Brownian diffusion, as well as the particles
concentrations in the stable suspension. This study confirmed the
fact that particles diameters measured by Zetasizer are much
greater than those measured by the transmission electron
microscope. This study presents a proposal for new technique for
particle size separation based on the differential sedimentation in
viscose fluids. This new method is a differential viscosity column.
The proposed size separation technique may help to separate
engineered nano-particles with higher resolution
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
Satellite Image Resolution Enhancement Technique Using DWT and IWTEditor IJCATR
Now a days satellite images are widely used In many applications such as astronomy and
geographical information systems and geosciences studies .In this paper, We propose a new satellite image
resolution enhancement technique which generates sharper high resolution image .Based on the high
frequency sub-bands obtained from the dwt and iwt. We are not considering the LL sub-band here. In this
resolution-enhancement technique using interpolated DWT and IWT high-frequency sub band images and the
input low-resolution image. Inverse DWT (IDWT) has been applied to combine all these images to generate
the final resolution-enhanced image. The proposed technique has been tested on satellite bench mark images.
The quantitative (peak signal to noise ratio and mean square error) and visual results show the superiority of
the proposed technique over the conventional method and standard image enhancement technique WZP.
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
CP-ABE Scheme (Cipher text policy attribute-based encryption) can become the
promising cryptographic solution in distributed systems such as social network s and cloud
computing. The trending development of network and computing technology enables the user to
share their data through the online social networks such as Facebook, or uploading the personal data
on Google Vault. The people are using the advantages of new technologies but they are also concern
about their personal data security. The current issue with data sharing systems is the enforcement of
access policies. CP-ABE scheme enables the encryptor to define attribute set over a universe of
attributes that a decryptor needs to decrypt the cipher text, thus each user with a different set of
attributes is allowed to different pieces of data as per the security policy.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
This document discusses data-centric access control solutions for cloud computing. It proposes a solution called SecRBAC that uses identity-based encryption and proxy re-encryption techniques to protect data stored in the cloud from the cloud service provider. The key aspects of SecRBAC are that data is doubly encrypted before being stored in the cloud. Also, a role-based access control approach is used to assign privileges to users to access encrypted data from the cloud.
Data get to control is a powerful method to guarantee the data security in the cloud. Because of information
out sourcing and un confided in cloud servers, the information get to control turns into a testing issue in cloud
storage systems. Cipher text-Policy Attribute Based Encryption (CP-ABE) is viewed as a standout amongst
the most reasonable advancements for information get to control in distributed storage, since it gives
straightforward control access to the owners. It is hard to implement the existing CP-ABE schemes to access
the information from cloud storage systems. we propose a plan to structure the information securing control in
a revocable multi-expert CP-ABE conspire from cloud storage system
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...IJCERT JOURNAL
Cloud computing is one of the emerge technologies in order to outsource huge volume of data inters of storage and sharing. To protect the data and privacy of users the access control methods ensure that authorized users access the data and the system. Fine grained-approach is the appropriate method for data access control in cloud storage. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of the attribute revocation problem. Specifically, in this paper we investigate on revocable multi-authority Fine-grained-Scheme performance.
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...chennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
JPD1422 Secure Data Retrieval for Decentralized Disruption-Tolerant Military...chennaijp
We have best 2014 free dot not projects topics are available along with all document, you can easy to find out number of documents for various projects titles.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/dot-net-projects/
In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes. Now a days as cloud is most widely used in mostly all fields so there is need of keeping data more secure and confidential which is outsourced on the cloud. Security of the data in cloud database server is the key area of concern in the acceptance of cloud. It is required very high degree of privacy and authentication. In existing system used hierarchical authorization structure to reduce the burden and risk of a single authority .this paper proposes a hierarchical attribute based encryption which directly provides attribute value by user as well as data stored in different types of media.
The document proposes improvements to the reliability and load balancing of an existing CP-ABE encryption scheme for secure data sharing in distributed networks. The existing scheme addresses key escrow and revocation issues but lacks reliability factors and load balancing. The proposed approach aims to improve security and efficiency by introducing reliability factors like multiple key generation centers and distributed data storage. It also aims to balance load across the network to avoid overloading any single node. The document reviews related work and outlines the proposed framework, including use of an access structure to define user attributes and access policies for decryption.
Several Data Security Methodology has been noticed, with recent adoption and spreading of data sharing. One of the most interesting and definitive approach is Cipher text-Policy Attribute-Based Encryption (CP-ABE).CP-ABE provides us with the indulgement of the access policies and its updates. It is used to set or control outsourcing of data sharing; it deals with the issues in CP-ABE. This solution allows encryptor to deals with the access control with respect to the access formula. The lacking of reliability factor lead to weaken the system, therefore we will amplify CB-ABE by introducing some factor. Key Generation center (KGC) and data storing center are the highlighted factors. KGC deals with the drawback of Key escrow problem. As KGC can decrypt the users data as per KGC`s concerns, causing threat to the data sharing Systems. This is not favorable for the distributed scheme where KGC is not trustworthy. Along with the key escrow problem, we will be concerning with the problem of key-revocation that is degradation because of windows of vulnerability. These issues are solved by exploiting the features characteristics of Architecture. The problem of key-escrow is resolved using 2-pc protocol. And Key-revocation is proceeding by using proxy encryption.
The document proposes improvements to an existing CP-ABE scheme for secure data sharing in distributed networks. It aims to address issues of reliability and load balancing. The existing scheme relies heavily on a single key generation center, which poses security risks if the center fails or becomes corrupted. The proposed approach introduces factors like multiple key generation centers and data storage centers to improve reliability. It also uses a 2-party computation protocol to solve the key escrow problem without relying on a single trusted authority. The goal is to develop a more secure and efficient attribute-based encryption system for distributed data sharing that can scale to handle large numbers of users and requests.
Attribute based access to scalable media in cloud-assisted content sharing ne...JPINFOTECH JAYAPRAKASH
This paper proposes a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique to design an access control scheme for sharing scalable media based on user attributes. MCP-ABE allows encrypting multiple messages within a single ciphertext such that only users with attributes satisfying the access policy can decrypt it. This scheme offloads computation to cloud servers to support resource-limited mobile devices while maintaining data privacy. Existing solutions have issues like high complexity, inflexible policies, or only delivering one encrypted message per ciphertext. The proposed scheme addresses these through MCP-ABE's flexible attribute-based access and ability to encrypt multiple media units together efficiently.
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...IRJET Journal
This document discusses a proposed approach for access control management of data stored in a multi-authority cloud storage system. The approach uses a modified multi-authority ciphertext-policy attribute-based encryption (CP-ABE) scheme. It aims to efficiently handle both immediate confidentiality and backward privacy in the presence of dynamic attribute revocation, which is challenging for multi-authority cloud storage systems. The proposed access control scheme is secure against random attacks and more efficient than previous works, according to the analysis and simulation results presented in the document.
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable medi...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
This document reviews various data access control schemes for cloud computing. It discusses role-based access control (RBAC) and role-based encryption (RBE) which allows data owners to encrypt data such that only users with appropriate roles can decrypt it. Attribute-based encryption (ABE) is also covered, which allows fine-grained access control of encrypted data based on user attributes. The document also reviews user-based access control (UBAC) which applies access control lists to data to control access. It evaluates these schemes and their ability to efficiently handle user revocation while protecting data access and privacy in the cloud.
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This document discusses green computing practices and sustainable IT services. It provides an overview of factors driving adoption of green computing to reduce costs and environmental impact of data centers, such as rising energy costs and density. Green strategies discussed include improving infrastructure efficiency, power management, thermal management, efficient product design, and virtualization to optimize resource utilization. The document examines how green computing aims to lower costs and environmental footprint, and how sustainable IT services take a broader approach considering economic, environmental and social impacts.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Ijcatr04051007
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 368 - 373, 2015, ISSN:- 2319–8656
www.ijcat.com 368
Military Networks by Disruption Tolerant
Network Technology
K.V Srikanth
Dept. Of C.S.E.
Bharath University
Chennai, India
B.Aravindsamy
Dept. Of C.S.E.
Bharath University
Chennai, India
S.Pothumani
Dept. Of C.S.E.
Bharath University
Chennai, India
Abstract: Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from
intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave
become eminent solutions that enable wireless devices carried by troopers to speak with one another and access
the guidance or command faithfully by exploiting secondary storage nodes.a number of the
foremost difficult problems during this state of affairs ar the social control of authorization policiesand also
the policies update for secure information retrieval. Ciphertext- policy attribute-based secret writing (CP-ABE) could
be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE
in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally
different authorities. during this paper, we have a tendencyto propose se- cure information
retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their
attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with
efficiency manage confidential information distributed within the disruption-tolerant military network.
Keyworsds: DTN- Disruption tolerant network, CP-ABE- Cipher text-Policy Attribute-Based Encryption, IBE-
Identity Based Encryption2 PC-Protocol To Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets ,
DBDH- Decision Bilinear Diffie Hellman assumption, KGC-Key Generative Center.
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 368 - 373, 2015, ISSN:- 2319–8656
www.ijcat.com 369
I.INTRODUCTION
In several military network troopers is briefly
disconnected by jam,environmental. Disruption-
tolerant network (DTN) technologies have
become successful solutions that enable nodes to
speak with one another in these extreme networking
access services specified knowledge access
policies are outlined over user attributes or roles that
are managed by disruption-tolerant military network,
a commander might store a counseling at a 1” United
Nations agency are taking part in
“Region two.” during this case, it's an
inexpensive assumption that multiple key
authorities are possible to manage their own dynamic
attributes for troopers in their deployed regions or
echelons, (ABE) [11]–[14] could be a promising
approach that fulfills the wants forse-
cure knowledge retrieval in DTNs. ABE options a
mechanism that allows associate
degree access management over
encrypted knowledge exploitation access policies and
ascribed attributes among personal keys and
ciphertexts. Especially, ciphertext-policy ABE (CP-
ABE) provides a scalable method of
encrypting knowledge specified the encryptor defines
the attribute set that the decryptor must possess so
as to de-crypt the ciphertext [13].. However, the
matter of applying the ABE to DTNs
introduces many security their associated attributes at
some purpose (for ex-ample, moving their region), or
some personal keys could be compromised, key
revocation (or update) for every attribute is in any
single user in an attribute cluster would have an effect
on the opposite users within the cluster. For ex-ample,
if a user joins or leaves associate and decentralized to
all or any the opposite members within
the same cluster for backward or rekeying procedure,
or security degradation as a result of the windows of
vulnerability if the previous attribute key's not
updated directly.
2. LITERATURE SURVEY
Identity-Based Encryption With Efficient Revocation,
Identity-based encryption (IBE) is an exciting
alternative to public-key encryption, as IBE eliminates
the need for a Public Key Infrastructure (PKI). PKI-
or identity-based, Its provide a revoke users from the
system. Efficient revocation is a well-studied problem
in the traditional PKI setting. The setting of IBE has
been little work on studying the revocation
mechanisms. The most practical solution requires the
senders to also use time periods when encrypting, and
all the receivers (regardless of whether their keys have
been compromised or not) to update their private keys
regularly by contacting the trusted authority. That this
solution does not scale well – as the number of user’s
increases, the work on key updates becomes a
bottleneck.
Decentralizing Attribute-Based Encryption, Multi
Authority Attribute-Based Encryption (ABE) system.
Any party can become an authority and there is no
requirement for any global coordination other than the
creation of an initial set of common reference
parameters. A party can simply act as an ABE
authority by creating a public key and issuing private
keys to different users that react their attributes. A user
can encrypt data in terms of any Boolean formula over
attributes issued from any chosen set of authorities.
Finally, our system does not require any central
authority. In constructing our system .We create new
techniques to tie key components together and prevent
collusion attacks between users with different global
identifiers.
User-Driven Access Control: Rethinking Permission
Granting In Modern Operating Systems, Modern
client platforms, such as iOS, Android, Windows
Phone, Windows 8, and web browsers, run each
application in an isolated environment with limited
privileges. A pressing open problem in such systems
is how to allow users to grant applications access to
user-owned resources, e.g., to privacy- and cost-
sensitive devices like the camera or to user data
residing in other applications. A key challenge is to
enable such access in a way that is non-disruptive to
users while still maintaining least-privilege
restrictions on applications To allow the system to
precisely capture permission-granting intent in an
application’s context, we introduce access control
gadgets (ACGs). Each user-owned resource exposes
ACGs for applications to embed. The user’s authentic
UI interactions with an ACG grant the application
permission to access the corresponding resource. Our
prototyping and evaluation experience indicates that
user driven access control enables in-context, non-
disruptive, and least-privilege permission granting on
modern client platforms.
Efficient And Provable Secure Cipher Text-Policy
Attribute-Based Encryption Schemes, In CP-ABE
scheme, the data is encrypted under an access policy
defened by a user who encrypts the data and a user
secret key is associated with a set of at- tributes which
identify the user. A user can decrypt the ciphertext if
and only if his attributes satisfy the access policy. In
CP-ABE, the user enforces the access policy at the
encryption phase, the policy moves with the encrypted
data. It’s important for data storage servers where data
confidentiality must be preserved even if the server is
compromised or un-trusted. The scheme is secure
under Decision Bilinear Diffie Hellman assumption
(DBDH). The expressivity of the scheme by including
of (threshold) operator in addition to and operators.
Comparison with existing CP-ABE schemes and show
that our schemes are more efficient .The
computational work done by the decryptor is reduced.
Selective Group Broadcast In Vehicular Networks
Using Dynamic Abe ,CP-ABE) provides an encrypted
access control mechanism for broadcasting messages.
Basically, a sender encrypts a message with an access
control policy tree which is logically composed of
attributes; receivers are able to decrypt the message
when their attributes satisfy the policy tree. A user’s
attributes stand for the properties that he current has.
It is required for a user to keep his attributes up-to-
date. It is difficult in CP-ABE because one attribute
changes, the entire private key, which is based on all
the attributes, must be changed .We introduce fading
function, which renders attributes ”dynamic” and
allows us to update each one of them separately
.Choosing fading rate for fading function affects the
efficiency and security. We also compare our design
with CP-ABE and find our scheme performs
significantly better under certain circumstance.
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 368 - 373, 2015, ISSN:- 2319–8656
www.ijcat.com 370
3. RELATED WORK:
ABE comes in 2 flavors known as key-policy ABE
(KP-ABE) and ciphertext-policy ABE (CP-ABE). In
KP-ABE, the encryptor solely gets to label a
ciphertext with a collection of attributes. However, the
roles of the cipher texts and keys square
measure reversed in CP -ABE. In CP-ABE, the
ciphertext is encrypted with AN access policy chosen
by AN encryptor, however a key's merely created
with regard to an attributes set. CP-ABE
is additional acceptable to DTNs than KP-ABE as a
result of it allows en cipherors like a commander to
settle on AN access policy on attributes and to encrypt
confidential information below the access structure
via encrypting with the corresponding public keys or
attributes .
1).Attribute Revocation:
Bethencourt et al. [13] and Boldyreva et al.
[16] 1st recommended key revocation mechanisms in
CP-ABE and KP-ABE, severally. Their solutions area
unit to append to every attribute Associate in
Nursing expiration date (or time) and distribute a
brand new set of keys to valid users once the
expiration.The first drawback is that the security
degradation in terms of the backward and forward
secrecy it's a substantial scenario that
users like troopers could amendment the attributes
frequently, Then, a user World Health
Organization freshly holds the attribute could be able
to access the previous knowledge encrypted before he
obtains the attribute till the info is re-encrypted with
the freshly updated attribute keys by periodic rekeying
(backward secrecy). as an example, assume that
may be decrypted with a collection of attributes
(embedded within the users keys) for users with .
After time , say , a user freshly holds the attribute set
. albeit the new user ought to be disallowed
to decipher the ciphertext for the time instance ,
he will still decipher the previous ciphertext till it's re-
encrypted with the freshly updated attribute keys.
On the opposite hand, a revoked user would still
be able to access the
encrypted knowledge albeit he doesn't hold the
attribute any further till successive expiration time
(forward secrecy).
2). Key Escrow:
Most of the present ABE schemes square
measure constructed on
the design wherever one trusty authority has the
ability to get the complete non-public keys of users
with its master secret info[11], [13], [14], [21]–[23].
Thus, the key written agreement drawback is
inherent specified the key
authority will rewrite each ciphertext addressed to
users within the system by generating their secret keys
at anytime. Chase et al. [24] bestowed a distributed
KP-ABE theme that solves the key written agreement
drawback in an exceedingly multi authority
system. During this approach, all (disjoint) attribute
authorities square measure collaborating within
the key generation protocol in an exceedingly
distributed method specified they cannot pool
their information and link multiple attribute sets
happiness to a similar user. One disadvantage of
this totally distributed approach is that the
performance degradation. Since there's no centralized
authority with master secret info, all attribute
authorities ought to communicate with one
another within the system to get a user’s secret key.
This ends up in communication overhead on the
system setup and therefore the rekeying phases
and needs every user to store further auxiliary
key elements besides the attributes keys, wherever is
that the variety of authorities within the system.
3. ) Decentralized ABE:
Huang and Roy et al. [4] projected decentralized CP-
ABE schemes within the multi authority
network surroundings. They achieved a combined
access policy over the attributes issued from
completely different authorities
by merely encrypting information multiple times. the
most disadvantages of this approach area
unit potency and quality of access policy. for
instance, once a commander encrypts a secret mission
to troopers beneath the policy it can not
be expressed once every “Region” attribute is
managed by completely different authorities,
since merely multi encrypting approaches will by
no means that specific any general .
Therefore, they're somewhat restricted in terms
of quality of the access policy and need computation
and storage prices. Chase and Lewko et al.
[10] projected multi authority KP-ABE and CP-ABE
schemes, severally. However, their
schemes additionally suffer from the key written
agreement drawback just like the previous
decentralized
4. NETWORK ARCHITECTURE
In this section, we describe the DTN architecture and
define the security model
Fig. 1. Architecture of secure data retrieval in a disruption-tolerant
military network System Description and Assumptions.
1) Key Authorities: they're key generation centers that
generate public/secret parameters for CP-ABE. The
key authorities comprises a central authority and
multiple native authorities. we tend to assume that
there are secure and reliable communication channels
between a central authority and every
bureau throughout the initial key setup and
generation section. They grant differential access
rights to individual users supported the users’
attributes. The key authorities are assumed to be
honest-but-curious. That is, they're going to honestly
execute the allotted tasks within the system, but they
might prefer to learn data of encrypted contents the
maximum amount as potential.
2) Storage Node: this is often associate degree entity
that stores knowledge from senders and
supply corresponding access to users. it's going to be
mo-bile or static [4], [5]. almost like the previous
schemes, we tend to additionally assume the storage
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 368 - 373, 2015, ISSN:- 2319–8656
www.ijcat.com 371
node to be semi trusted , that's honest-but-curious.
3)Sender: This is often associate degree entity World
Health Organization owns confidential messages
or knowledge (e.g., a commander) and needs to store
them into the external knowledge storage node
for simple sharing or for reliable delivery to
users within the extreme networking environments. A
sender is chargeable for shaping (attribute-based)
access policy and implementing it on its own
4) User: this is often a mobile node World Health
Organization needs to access the info keep at the
storage node (e.g., a soldier). If a user possesses a
collection of attributes satisfying the access policy of
the encrypted knowledge outlined by the sender,
and isn't revoked in any of the attributes, then he are
going to be ready to rewrite the cip her text and
procure the info.
5. ANALYSIS
In this section, we have a tendency to first analyze and
compare the efficiency of the projected theme to the
previous multi authority CP-ABE schemes in
theoretical aspects. Then, the potency of the
projected theme is incontestable within the network
simulation in terms of the communication value . we
have a tendency to additionally discuss
its potency once enforced with specific parameters
and compare these results to those obtained by the
opposite schemes.
A.Efficiency:
Logic expressiveness of access structure which
will be outline dunderneath totally {different
|completely different} disjoint sets of attributes
(managed by different authorities), key escrow, and
revocation roughness of every CP-ABE theme. within
the projected theme, the logic are
often terribly communicative as within the single
authority system like BSW [13] specified the access
policy are often expressed with any monotone access
structure underneath attributes of any chosen set of
authorities; whereas HV [9] and RC [4]
schemes solelyenable the gate among the sets of
attributes managed by completely
different authorities. The revocation within
the projected theme are often wiped out an on the
spot method as against BSW. Therefore, attributes of
users are often revoked at any time even before the
expiration time that may be set summarizes
the potency comparison results among CP-ABE
schemes. within the comparison, rekeying message
size represents the communication price that the key
authority or the storage node has to send to update
non-revoked users’ keys for associate attribute. non-
public key size represents the
storage price required for every user to store attribute
keys or KEKs. Public key size represents the scale of
the system public parameters. during this comparison,
the access tree is built with attributes of completely
different authorities except in BSW of that total size
is capable that of the one access tree in BSW. As
shown in Table II,
the projected theme desires rekeying message size
of at the most to notice user-level
access management for every attribute within
the system .though RC doesn't got
to send extra rekeying message for user revocations
as against the opposite schemes, its cip her text size is
linear to the quantity of revoked users within
the system since the user revocation message
is enclosed within the cip her text.
The projected theme needs a user to
store additional KEKs than BSW. However, it's a
sway on reducing the rekeying message size.
The projected theme is as economical because
the basic BSW in terms of the cip her text size where
as realizing safer immediate rekeying in multi-
authority systems.
B. Simulation:
In this simulation, we have a tendency to take into
account DTN applications victimisation the net
protected by the attribute-based cryptography.
Almeroth and Anmar [32] incontestable the cluster
behavior within the Internet’s multicast backbone
network (MBone). They showed that the quantity of
users change of integrity a bunch follows a Poisson
distribution with rate , and therefore the
membership length time follows Associate in
Nursing exponential distribution with a mean length .
Since every attribute cluster may be shown
as Associate in Nursing freelance network multi cast
cluster wherever the members of the cluster share a
typical attribute, we have a tendency to show the
simulation result following this probabilistic behavior
distribution.
The amount of the key authorities is ten, and therefore
the average variety of attributes related to a
user’s secret is ten. For a good comparison
with relevancy the safety perspective, we have a
tendency to set the rekeying periods in HV as min. to
attain associate degree 80-bit security level, we set
. isn't additional to the simulation result as a result
of it's common altogether multi authority CP-ABE
schemes. As shown in Fig. 3, the
communication value in HV is a smaller amount than
RC within the starting of the simulation time
(until regarding thirty h). However, because the time
elapses, it will increase prominently as a result of the
amount of revoked users will increase accumulatively.
The projected theme needs the smallest
amount communication value within the network
system since the rekeying message in is
comparatively but the opposite multi authority
schemes.
C. Implementation:
Next, we tend to analyze and live the
computation price for encrypting (by a sender) and
decrypting (by a user) an information. we tend to used
a Type- A curve (in the pairing-based cryptography
(PBC) library [33]) providing teams within
which a additive map is outlined . Though such curves
give smart computational efficiency (especially for
pairing computation), an equivalent doesn't hold
from the purpose of read of the area needed to
represent cluster components .The implementation
uses a 160-bit elliptic curve cluster supported the
super singular curve over a 512 -bit finite field.
The process price is analyzed in terms of the
pairing, involution operations in and
the relatively negligible hash, cruciform key, and
multiplication operations within the cluster square
measure unheeded within the time result. during
this analysis, we tend to assume
Computation prices in Table III represent the edge of
every price. we are able to see that the overall
computation time to encrypt knowledge by a
sender within the planned theme is that the same as
BSW, whereas coding time by a
user needs exponentiations in a lot of.
5. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 368 - 373, 2015, ISSN:- 2319–8656
www.ijcat.com 372
6. SECURITY
In this section, we prove the security of our scheme
with regard to the security requirements discussed.
A. Collusion Resistance:
In CP-ABE, the key sharing should be embedded into
the cip her text instead to the non-public keys are
irregular with personalized random values selected by
the such they can't be combined within the projected
scheme .This price are often blind out if and providing
the user has the enough key parts to satisfy the key
sharing theme embedded within the cip her text.
Another collusion attack state of affairs is that the
collusion between revoked users so as to obtain the
valid attribute cluster keys for a few attributes that
they're not licensed to possess (e.g., because of
revocation). The at-tribute cluster key distribution
protocol, that is complete sub-tree methodology
within the projected theme, is secure in terms of the
key identity [29]. Thus, the colluding revoked users
will by no suggests that get any valid attribute cluster
keys for at-tributes that they're not licensed to carry.
Therefore, the colluding native authorities cannot
derive the total set of secret keys of users.
B Data Confidentiality:
In our trust model, the multiple key authorities are not
any longer absolutely trustworthy further because
the storage node even though they're honest Data
confidentiality on the keep knowledge against
unauthorized users are often trivially warranted. If the
set of attributes of a user cannot satisfy the access
tree within the cip her text, he cannot recover the
specified price throughout the secret
writing method, wherever could be a random price
unambiguously assigned to him. On the
opposite hand, once a user is revoked from some
attribute teams that satisfy the access policy, he
cannot rewrite the cip her text either unless the
remainder of the attributes of him satisfy the access
policy. so as to rewrite a node for AN attribute , the
user mustry from the cip her text and from
its personal key. However, this cannot end in the
worth , that is desired to get , since is blind by the
updated attribute cluster key that the revoked user
from the attribute cluster will by no suggests that get.
B. Backward and Forward Secrecy:
When a user involves hold a collection of attributes
that satisfy the access policy within the cip hertext
at your time instance, the corresponding
attribute cluster keys are updated and delivered to the
valid attribute cluster members firmly (including the
user). Additionally, all of the element sencrypted with
a secret key within the cip her text are re-encrypted by
the storage node with a random ,and also the cip her
text elements reminiscent of the attributes are re-
encrypted with the updated attribute cluster keys. even
though the user has keep the previous cip hertext ex-
changed before he obtains the attribute keys and also
the holding at-tributes satisfy the access policy, he
cannot re-write the pervious cip her text. this can be as
a result of, even though he will reach computing
from the present cip her text, it'll not facilitate to re-
cover the specified price for the previous cip her text
since it's unsighted by a random .On the
opposite hand, once a user involves drop a
collection of at-tributes that satisfy the access policy
at your time instance, the corresponding
attribute cluster keys are updated and delivered to the
valid attribute cluster members firmly (excluding the
user). Then, all of the elements encrypted with a secret
key within the cip her text are re encrypted by the
storage node with a random , and also the cip
hertext elements reminiscent of the attributes are re
encrypted with the updated attribute cluster keys.
7. CONCLUSION
DTN technologies have become self-made solutions
in military applications that permit wireless devices to
speak with one another and access
the counseling reliably by exploiting storage device
nodes. CP-ABE could be
a scalable science resolution to the
access management and secure
information retrieval problems .During this paper we
tend to planned Associate in Nursing economical and
secure information retrieval technique victimization
CP-ABE for localized DTNs wherever multiple key
authorities manage their attributes independently. The
inherent key written agreement drawback is
resolved specified the confidentiality of the hold
on information is secure deven underneath the
hostile atmosphere wherever key authorities could
be com-promised or not totally trust worthy .
Additionally, the fine -grained key revocation are
often finished every attribute cluster. we tend
to demonstrate the way to apply
the planned mechanism to firmly and
expeditiously manage the
confidential information distributed within
the disruption-tolerant military network.
REFERENCES
1. J. Burgess, B. Gallagher, D. Jensen, and B.
N. Levine, “Maxprop: Routing for vehicle-
based disruption tolerant networks,” in Proc.
IEEE INFOCOM, 2006, pp. 1–11.
2. M. Chuah and P. Yang, “Node density-based
adaptive routing scheme for disruption
tolerant networks,” in Proc. IEEE MILCOM,
2006, pp. 1–6.
3. M. M. B. Tariq, M. Ammar, and E. Zequra,
“Mesage ferry route de-sign for sparse ad hoc
networks with mobile nodes,” in Proc. ACM
MobiHoc, 2006, pp. 37–48.
4. S. Roy and M. Chuah, “Secure data retrieval
based on ciphertext policy attribute-based
encryption (CP-ABE) system for the DTNs,”
Lehigh CSE Tech. Rep., 2009.
5. M. Chuah and P. Yang, “Performance
evaluation of content-based information
retrieval schemes for DTNs,” in Proc. IEEE
MILCOM, 2007, pp. 1–7.
6. M. Kallahalla, E. Riedel, R. Swaminathan,
Q. Wang, and K. Fu, “Plutus: Scalable secure
file sharing on untrusted storage,” in Proc.
Conf. File Storage Technol., 2003, pp. 29–
42.
7. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel,
and W. Jonker, “Mediated ciphertext-policy
6. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 368 - 373, 2015, ISSN:- 2319–8656
www.ijcat.com 373
attribute-based encryption and its
application,” in Proc. WISA, 2009, LNCS
5932, pp. 309–323.
8. N. Chen, M. Gerla, D. Huang, and X. Hong,
“Secure, selective group broadcast in
vehicular networks using dynamic attribute
based encryption,” in Proc. Ad Hoc Netw.
Workshop, 2010, pp. 1–8.
9. D. Huang and M. Verma, “ASPE: Attribute-
based secure policy enforcement in vehicular
ad hoc networks,” Ad Hoc Netw., vol. 7, no.
8,
a. 1526–1535, 2009.
10. A. Lewko and B. Waters, “Decentralizing
attribute-based encryption,” Cryptology
ePrint Archive: Rep. 2010/351, 2010.
11. A. Sahai and B. Waters, “Fuzzy identity-
based encryption,” in Proc. Eurocrypt, 2005,
pp. 457–473.
12. V. Goyal, O. Pandey, A. Sahai, and B.
Waters, “Attribute-based encryption for fine-
grained access control of encrypted data,” in
Proc. ACM Conf. Comput. Commun.
Security, 2006, pp. 89–98.
13. J. Bethencourt, A. Sahai, and B. Waters,
“Ciphertext-policy attribute-based
encryption,” in Proc. IEEE Symp. Security
Privacy, 2007, pp. 321–334.
14. R. Ostrovsky, A. Sahai, and B. Waters,
“Attribute-based encryption with non-
monotonic access structures,” in Proc. ACM
Conf. Comput. Commun. Security, 2007, pp.
195–203.
15. S. Yu, C. Wang, K. Ren, and W. Lou,
“Attribute based data sharing with attribute
revocation,” in Proc. ASIACCS, 2010, pp.
261–270.
16. A. Boldyreva, V. Goyal, and V. Kumar,
“Identity-based encryption with efficient
revocation,” in Proc. ACM Conf. Comput.
Commun. Security, 2008, pp. 417–426.
17. M. Pirretti, P. Traynor, P. McDaniel, and B.
Waters, “Secure attribute-based systems,” in
Proc. ACM Conf. Comput. Commun.
Security, 2006,
18. 28 M.Belenkiy, J. Camenisch, M. Chase, M.
Kohlweiss,A.Hysyanskaya, and H. Shacham,
“Randomizable proofs and delegatable
anonymous credentials,” in Proc. Crypto,
LNCS 5677, pp. 108–125.
19. 29D. Naor, M. Naor, and J. Lotspiech,
“Revocation and tracing schemes for
stateless receivers,” in Proc. CRYPTO, 2001,
LNCS 2139, pp.41–62.
20. 30C. K.Wong,M. Gouda, and S. S. Lam,
“Secure group communications using key
graphs,” in Proc. ACM SIGCOMM, 1998, pp.
68–79.