This document summarizes a research paper that proposes a secure cloud-based mobile health monitoring system called CAM. The system aims to protect patient privacy and the intellectual property of healthcare service providers. It incorporates techniques like anonymous identity-based encryption and outsourced decryption to encrypt health data and shift decryption tasks to the cloud. The system also randomizes diagnostic programs and decision thresholds stored in the cloud to protect provider content. The goal is to allow resource-constrained providers to participate in mobile healthcare via cloud support while preserving security and privacy.
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).
Enabling cloud storage auditing with verifiableKamal Spring
Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. Specifically, we leverage the third party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. In our design, TPA only needs to hold an encrypted version of the client’s secret key, while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, our design also equips the client with capability to further verify the validity of the encrypted secret keys provided by TPA. All these salient features are carefully designed to make the whole auditing procedure with key exposure resistance as transparent as possible for the client. We formalize the definition and the security model of this paradigm. The security proof and the performance simulation show that our detailed design instantiations are secure and efficient.
Architecture:
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
In this paper we propose a new cloud computing environment where we approach a trusted
cloud environment which is controlled by both the client and the cloud environment. Our
approach is mainly divided into two parts. First part is controlled by the normal user which gets
permission by the cloud environment for performing operation and for loading data. Second
part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the
data then it take permission from the client environment. This provides a way to hide the data
and normal user can protect their data from the cloud provider. This provides a two way
security which helps both the cloud and the normal user. For the above concept we propose a
java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).
Enabling cloud storage auditing with verifiableKamal Spring
Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. Specifically, we leverage the third party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. In our design, TPA only needs to hold an encrypted version of the client’s secret key, while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, our design also equips the client with capability to further verify the validity of the encrypted secret keys provided by TPA. All these salient features are carefully designed to make the whole auditing procedure with key exposure resistance as transparent as possible for the client. We formalize the definition and the security model of this paradigm. The security proof and the performance simulation show that our detailed design instantiations are secure and efficient.
Architecture:
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
In this paper we propose a new cloud computing environment where we approach a trusted
cloud environment which is controlled by both the client and the cloud environment. Our
approach is mainly divided into two parts. First part is controlled by the normal user which gets
permission by the cloud environment for performing operation and for loading data. Second
part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the
data then it take permission from the client environment. This provides a way to hide the data
and normal user can protect their data from the cloud provider. This provides a two way
security which helps both the cloud and the normal user. For the above concept we propose a
java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
Business Case and Capital Justification Presentation For
Application Performance Monitoring and Retrospective Network Analysis Implementation. *** This Presentation Has Been Sanitized of IP Information ***
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: kitechsolutions.in@gmail.com
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Token Based Packet Loss Control Mechanism for NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
Business Case and Capital Justification Presentation For
Application Performance Monitoring and Retrospective Network Analysis Implementation. *** This Presentation Has Been Sanitized of IP Information ***
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: kitechsolutions.in@gmail.com
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Token Based Packet Loss Control Mechanism for NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Optimization of Factors Affecting Glucuronic Acid Production in Yogurt Ferme...IJMER
Drinking yogurt fermentation with two bacteria strains Lactobacillus acidophilus and
Gluconacetobacter nataicola was optimized to get maximal glucuronic acid concentration. A Blackett –
Burman matrix was designed to screen the effect of seven factors to glucuronic acid concentration in
yogurt. The design in Response surface methodology (RSM) with Central composite design (CCD) was
applied to get maximum value of glucuronic acid concentration was 59.81mg/L in fermentation at 4.43
log CFU/mL of G. nataicola density, 5.1 log CFU/mL of L. acidophilus density, 9.96% sucrose, initial
pH 5 and incubation time 32°C.
Effectiveness of Internal Audits in Public Educational Institutions in Kenya...IJMER
Internal auditing has become a factor of the new accountability and control era. The
manner in which public sector entities maintain internal control and how they are held accountable has
evolved to require more transparency and more accountability from these organizations that spend
investor or taxpayer funds. This trend has significantly impacted how management implements,
monitors, and reports on internal control. Although internal auditors can be a valuable advisory
resource on internal control, the internal auditor should not be a substitute for a strong internal control
system. A system of internal control is the primary response to risks. The role of internal auditing has
evolved from an administrative procedure with a focus on compliance, to an important element of good
governance. In many cases the existence of internal auditing is mandatory (intosaigov 9140).
Noise Tolerant and Faster On Chip Communication Using Binoc ModelIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Structural Formation & Seismicity of Kopili Fault Region in North-East India ...IJMER
Abstract: In the North-East India region, Meghalaya plateau plays a distinct physical characteristic for its high rising
granitic rocks and rocks of Gondwana character. The exposed portion of the Indian peninsular shield is evident in
Meghalaya plateau and Mikir hills. Here in the plateau we mainly get Archaean gneissic complex, overlain by proterozoic
intracratonic sediments of Shillong group. Upper Cretaceous and Carbonatite ultramafic complex are also evident in Kopili
Fault region. The Kopili Fault, which extends from western part of Manipur up to the tri-junction of Bhutan, Arunachal
Pradesh and Assam, covers a distance of about 400 km. The Kopili fault bisects the Meghalaya Plateau and isolated the
Mishmi block from the main part of the plateau. The fault behaviour is studied using Global Positioning System (GPS)
techniques to understand the velocity of twelve (12) different points selected on both bank of the Kopili river, since the fault
is almost passing through the river. From a field study of four long years, it is observed that the Kopili Fault region is
moving in North-East direction at an average velocity of 28.397N(±1.167) mm/yr and 40.227E(±1.184) mm/yr. This paper
makes an attempt to understand the physical development or geological character of the region and its crustal velocity
studied on various parts of the Kopili Fault area.
Key words: Kopili fault region, global positioning system, Meghalaya plateau, crustal velocity
Comparative study on Garments dyeing process and Fabric dyeing process on var...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Total Ergonomics Model for integration of health, safety and work to improv...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
The cloud storage offers users with infrastructure flexibility, faster deployment of applications and data, cost
control, adaptation of cloud resources to real needs, improved productivity, etc. Inspite of these advantageous factors, there
are several deterrents to the widespread adoption of cloud computing remain. Among them, security towards the correctness
of the outsourced data and issues of privacy lead a major role. In order to avoid security risk for the outsourced data, we
propose the dynamic audit services that enables integrity verification of untrusted and outsourced storages. An interactive
proof system (IPS) with the zero knowledge property is introduced to provide public auditability without downloading raw
data and protect privacy of the data. In the proposed system data owner stores the large number of data in cloud after e
encrypting the data with private key and also send public key to third party auditor (TPA) for auditing purpose. TPA in
clouds and it’s maintained by CSP. An Authorized Application (AA), which holds a data owners secret key (sk) and
manipulate the outsourced data and update the associated IHT stored in TPA. Finally Cloud users access the services through
the AA. Our system also provides secure auditing while the data owner outsourcing the data in the cloud. And after
performing auditing operations, security solutions are enhanced for the purpose of detecting malicious users with the help of
Certificate Authority
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
SPECTRUM SOLUTIONS is a Pondicherry based R&D firm which always looks forward in the field of science and technology to provide best technical support for the final year students. SPECTRUM has a great team of technical experts for the design development of Electronic and software Systems using Embedded, MATLAB, Java, Dot Net Technology.
SPECTRUM SOLUTIONS always concentrate us to provide quality products for various institutions and students. We offer the projects in all domains for the students of Diploma, B.Tech/B.E,M.Tech/M.E,MS,BCA,MCA etc. Our major concern is in the field of technical education to bridge the gap between Industry and Academics. We are always in the good eyes of the Educational Institutions in India to provide training & projects in Embedded Systems MATLAB and software technologies. We also provide interview training for free of cost. We never stop in going that extra mile ahead in providing greater value to own ideas of students, may it be in terms of providing adequate workforce proficient in highly application cost oriented Embedded Systems or Software Systems.
WEBSITE : www.spectrumpondicherry.blogspot.in/
FACEBOOK : https://www.facebook.com/pages/Spectrum-Solutions/548721691855495?ref=hl
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
The present day technology demands eco-friendly developments. In this era the
composite material are playing a vital roal in different field of Engineering .The composite materials
are using as a principle materials. Nowaday the composite materials are utilizing as a important
component of engineering field .Where as the importance of the applications of composites is well
known, but thrust on the use of natural fibres in it for reinforcement has been given priority for some
times. But changing from synthetic fibres to natural fibres provides only half green-composites. A
partial green composite will be achieved if the matrix component is also eco-friendly. Keeping this in
view, a detailed literature surveyed has been carried out through various issues of the Journals
related to this field. The material systems used are sunnhemp fibres. Some epoxy and hardener has
been also added for stability and drying of the bio-composites. Various graphs and bar-charts are
super-imposed on each other for comparison among themselves and Graphs is plotted on MAT LAB
and ORIGIN 6.0 software. To determining tensile strengths, Various properties for different biocomposites
have been compared among themselves. Comparison of the behaviour of bio-composites of
this work has been also compare with other works. The bio-composites developed in this work are
likely to get applications in fall ceilings, partitions, bio-degradable packagings, automotive interiors,
sports things (e.g. rackets, nets, etc.), toys etc.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
The proposal of this paper is to present Spring Framework which is widely used in
developing enterprise applications. Considering the current state where applications are developed using
the EJB model, Spring Framework assert that ordinary java beans(POJO) can be utilize with minimal
modifications. This modular framework can be used to develop the application faster and can reduce
complexity. This paper will highlight the design overview of Spring Framework along with its features that
have made the framework useful. The integration of multiple frameworks for an E-commerce system has
also been addressed in this paper. This paper also proposes structure for a website based on integration of
Spring, Hibernate and Struts Framework.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
In this paper we introduce and characterize some new generalized locally closed sets
known as
δ
ˆ
s-locally closed sets and spaces are known as
δ
ˆ
s-normal space and
δ
ˆ
s-connected space and
discussed some of their properties
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
"Natural language processing" here refers to the use and ability of systems to process
sentences in a natural language such as English, rather than in a specialized artificial computer
language such as C++. The systems of real interest here are digital computers of the type we think of as
personal computers and mainframes. Of course humans can process natural languages, but for us the
question is whether digital computers can or ever will process natural languages. We have tried to
explore in depth and break down the types of ambiguities persistent throughout the natural languages
and provide an answer to the question “How it affects the machine translation process and thereby
machine learning as whole?” .
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
The focus of this paper is on implementation of Inter Integrated Circuit (I2C) protocol
following slave module for no data loss. In this paper, the principle and the operation of I2C bus protocol
will be introduced. It follows the I2C specification to provide device addressing, read/write operation and
an acknowledgement. The programmable nature of device provide users with the flexibility of configuring
the I2C slave device to any legal slave address to avoid the slave address collision on an I2C bus with
multiple slave devices. This paper demonstrates how I2C Master controller transmits and receives data to
and from the Slave with proper synchronization.
The module is designed in Verilog and simulated in ModelSim. The design is also synthesized in Xilinx
XST 14.1. This module acts as a slave for the microprocessor which can be customized for no data loss.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ijmer 41025357
1. International
OPEN
Journal
ACCESS
Of Modern Engineering Research (IJMER)
Secure Multi-Owner Group Signature Based Secure M-Health
Records in Cloud
B. Anitha1, V. Udhaya Kumar2
1
M.Tech Student Department of Computer Science and Engineering PRIST University Pondicherry, India
Assistant professor Department of Computer Science and Engineering PRIST University Pondicherry, India
2
ABSTRACT: Cloud-assisted mobile health monitoring, which applies the prevailing mobile
communications and cloud computing technologies to provide feedback decision support, has been
considered as a revolutionary approach to improving the quality of healthcare service while lowering
the healthcare cost. Unfortunately, it also poses a serious risk on both clients’ privacy and intellectual
property of monitoring service providers which could deter the wide adoption of mHealth technology.
Paper is to address this important problem and design a cloud assisted privacy preserving mobile
health monitoring system to protect the privacy of the involved parties and their data. Moreover, the
outsourcing decryption technique and a newly proposed key private proxy re-encryption are adapted to
shift the computational complexity of the involved parties to the cloud without compromising clients’
privacy and service providers ‘intellectual property. Finally, our security and performance analysis
demonstrates the effectiveness of our proposed design.
Keywords: MHealth, monitoring, decryption
I. Introduction
We design a cloud-assisted mobile health monitoring system (CAM). We first identify the design
problems on privacy preservation and then provide our solutions. To ease the understanding, we start with the
basic scheme so that we can identify the possible privacy breaches. We then provide an improved scheme by
addressing the identified privacy problems. The resulting improved scheme allows the mobile health service
provider (the company) to be offline after the setup stage and enables it to deliver its data or programs to the
cloud securely. To reduce clients’ decryption complexity, we incorporate the recently proposed outsourcing
decryption technique into the underlying multi-dimensional range queries system to shift clients’ computational
complexity to the cloud without revealing any information on either clients’ query input or the decrypted
decision to the cloud. To relieve the computational complexity on the company’s side, which is proportional to
the number of clients, we propose a further improvement, leading to our final scheme. It is based on a new
variant of key private proxy re-encryption scheme, in which the company only needs to accomplish encryption
once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy,
further reducing the computational and communication burden on clients and the cloud.
II. Problem Definition
Major problem in addressing security and privacy is the computational workload involved with the
cryptographic techniques. With the presence of cloud computing facilities, it will be wise to shift intensive
computations to cloud servers from resource-constrained mobile devices. However, how to achieve this
effectively without compromising privacy and security becomes a great challenge, which should be carefully
investigated.
The problem becomes especially trickier for cloud assisted mobile health systems because we need not
only to guarantee the privacy of clients’ input health data, but also that of the output decision results from both
cloud servers and healthcare service providers (which will be referred to as the company in the subsequent
development).
III. Problem Description
We first identify the design problems on privacy preservation and then provide our solutions. To ease
the understanding, we start with the basic scheme so that we can identify the possible privacy breaches. We then
provide an improved scheme by addressing the identified privacy problems. The resulting improved scheme
allows the mobile health service provider (the company) to be offline after the setup stage and enables it to
| IJMER | ISSN: 2249–6645 |
www.ijmer.com
| Vol. 4 | Iss. 1 | Jan. 2014 |53|
2. Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
deliver its data or programs to the cloud securely. To reduce clients’ decryption complexity, we incorporate the
recently proposed outsourcing decryption technique into the underlying multi-dimensional range queries system
to shift clients’ computational complexity to the cloud without revealing any information on either clients’ query
input or the decrypted decision to the cloud.
IV. Feasibility Study
Feasibility analysis tells how the present system is compatible with the resource present with
developing team. The objective is to determine quickly at the minimum expense how to solve a problem. The
following feasibility studies are conducted to the feasibility of proposed system.
The feasibility study is term in three ways as followed:
Technical feasibility
Behavioral feasibility
Economical feasibility
A. Technical Feasibility
Technical feasibility center on the computer system (hardware, software etc.) and to what extend it can
support the proposed system. This system uses ASP.NET with c# as front end and SQL as back end. Since the
system needs much user interface, the design and implementation can be done.
B. Behavioral Feasibility
The annotation overhead is very small. So that the performance of the fully automatic static verification
is acceptable, and that the performance overhead of the runtime checking is limit. So this system is operationally
feasible.
C. Economic Feasibility
The current project is economically feasible because the project duration is 6 months and the man
power is one. All the necessary hardware and software are provided in the organization.
The basic COCOMO estimation:
A development project is sized at 3.7 KLOC.
The basic COCOMO equation for effort (E) in staff-months(SM) is:
Effort(SM) = 2.4(KLOC) 1.05 = 2.4(3.7)1.05 = 2.4(3.885) = 9.324 staff-months.
Development time (TDEV): TDEV = 2.5(SM) 0.38 = 2.5(9.324)0.38 = 2.5(3.54312) = 6 months.
The average number of staff members(S):
Staff = Effort / TDEV = 10 staff-months / 6 months = 1. 5 staff members on average.
The productivity rate (P):
Productivity = Size / Effort = 3700 LOC / 9.324 staff-months = 396 LOC/staff-months
So the implementation of the project is no so costlier and the system is economically feasible.
V. Proposed System
In this paper, we design a cloud-assisted mobile health monitoring system (CAM). We first identify the
design problems on privacy preservation and then provide our solutions. We then provide an improved scheme
by addressing the identified privacy problems. The resulting improved scheme allows the mobile health service
provider (the company) to be offline after the setup stage and enables it to deliver its data or programs to the
cloud securely. To reduce clients’ decryption complexity, we incorporate the recently proposed outsourcing
decryption technique into the underlying multi-dimensional range queries system to shift clients’ computational
complexity to the cloud without revealing any information on either clients’ query input or the decrypted
decision to the cloud. It is based on a new variant of key private proxy re-encryption scheme, in which the
company only needs to accomplish encryption once at the setup phase while shifting the rest computational
tasks to the cloud without compromising privacy.
VI. System Architecture
The company stores its encrypted monitoring data or program (branching program) in the cloud.
Individual clients collect their medical data and store them in their mobile devices, which then transform the
data into attribute vectors. The attribute vectors are delivered as inputs to the monitoring program in the cloud
through a mobile (or smart) phone. TA is responsible for distributing private keys to clients and collecting
service fees from clients according to a certain business model such as “pay-peruse” model. TA can be
| IJMER | ISSN: 2249–6645 |
www.ijmer.com
| Vol. 4 | Iss. 1 | Jan. 2014 |54|
3. Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
considered as a collaborator or a management agent for a company (or several companies) and thus shares
certain level of mutual business interest with the company.
At the initial phase, TA runs the Setup phase and publishes the system parameters. Then, the company
first characterizes the flow chart of an mobile health monitoring program as a branching program which is
encrypted under the respective directed branching tree. Then the company will deliver the resulting cipher text
and its company index to the cloud, which corresponds to the Store algorithm in the context. When a client
wishes to query the cloud for a certain mobile health monitoring program, the i-th client and TA run the Token
Gen algorithm. The client sends the company index to TA, and then inputs its private query (which is the
attribute vector representing the collected health data) and TA inputs the master secret to the algorithm. The
client obtains the token corresponding to its query input while TA gets no useful information on the individual
query.
At the last phase, the client delivers the token for its query to the cloud, which runs the Query phase.
The cloud completes the major computationally intensive task for the client’s decryption and returns the
partially decrypted cipher text to the client. The client then completes the remaining decryption task after
receiving the partially decrypted cipher text and obtains its decryption result, which corresponds to the decision
from the monitoring program on the client’s input. The cloud obtains no useful information on either the client’s
private query input or decryption result after running the Query phase.
VII. Data Flow Diagram
A data flow diagram is graphical tool used to describe and analyze movement of data through a system.
VIII. Ims-Based Mobile Health Monitoring With Cloud Support
| IJMER | ISSN: 2249–6645 |
www.ijmer.com
| Vol. 4 | Iss. 1 | Jan. 2014 |55|
4. Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
A. Outsourcing Decryption
The basic CAM has the following security weaknesses .First, the identity representation set for a
client’s attribute vector v is known to TA, and hence TA can easily infer the client’s private attribute vector.
Second, the client cannot protect his privacy from the cloud either because the cloud can easily find out the
identity representation for the private key skvi, i ∈ [1, n] by running identity test in MDRQ. The cloud can
simply encrypt a random message under any attribute value v′ until it can use sky to successfully decrypt the
cipher text, which means there is a match between v′ = vi and hence it successfully finds out vi. Third, neither
can the data privacy of the company be guaranteed since the identity representation of the respective range is
revealed to the cloud whenever the decryption is successful due to the match revealing property (see Sec. II-D3)
of MDRQ. The cloud can finally find out the company’s branching program since it has the private keys of all
the system users.
To rectify these weaknesses in the basic CAM, we provide the following improvement in this module.
The high level idea is as follows: in order to avoid leaking the attribute vector to TA, the client obliviously
submits his attribute vectors to TA so that he can obtain the respective private keys without letting TA get any
useful information on his private vector. The client runs the outsourcing decryption of MDRQ to ensure the
cloud completes the major workload while obtaining no useful information on his private keys. On the other
hand, the company will permute and randomize its data using homomorphism encryption2 and MDRQ so that
neither the cloud nor a client can get any useful information on its private information on branching program
after a single query. Meanwhile, the company is also required to include the randomness in the randomization
step in the encryption sent to TA to ensure that TA can successfully generate tokens for clients.
B. Healthcare
Feature of Mobile Health All the major health failure problem classification to this page.
a. Login
i. Login the all authorized administrator user to login and give diagnosis the patient.
ii. Registration
iii. User Directory
iv. User Treatment Commands
v. User Profile
b. Privacy Block
In this Module, security tools and offers the necessary modifications to meet our design needs.
c. Bilinear Pairing:
Bilinear pairing is crucial to our design, which would further serve as the building block of the proposed CAM.
d. Homomorphic Encryption:
Another technique we will use for oblivious transfer protocol is homomorphic encryption, which is widely used
as an underlying tool for constructing secure protocols. CAM adopts a semantically secure additively
homomorphic public-key encryption technique.
C. Mobile Health Information
The proposed re-encryption scheme incorporates the outsourcing decryption so that the other security
and efficiency characteristics in the final CAM should be inherited here. By using our newly-proposed key
private proxy re-encryption, we are design our highly efficient CAM with full Privacy in this module.
D. Cloud user
We create a local Cloud and provide priced abundant storage services. The users can upload their data
in the cloud. We develop this module, where the cloud storage can be made secure. However, the cloud is not
fully trusted by users since the CSPs are very likely to be outside of the cloud users’ trusted domain. Similar to
we assume that the cloud server is honest but curious. That is, the cloud server will not maliciously delete or
modify user data due to the protection of data auditing schemes, but will try to learn the content of the stored
data and the identities of cloud users.
E. Group Manager
Group manager takes charge of followings,
1. System parameters generation,
2. User registration,
3. User revocation, and
4. Revealing the real identity of a dispute data owner.
| IJMER | ISSN: 2249–6645 |
www.ijmer.com
| Vol. 4 | Iss. 1 | Jan. 2014 |56|
5. Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Therefore, we assume that the group manager is fully trusted by the other parties. The Group manager is the
admin. The group manager has the logs of each and every process in the cloud. The group manager is
responsible for user registration and also user revocation too.
F. Group Member
Group members are a set of registered users that will
1. Store their private data into the cloud server and
2. Share them with others in the group.
Note that, the group membership is dynamically changed, due to the staff resignation and new employee
participation in the company. The group member has the ownership of changing the files in the group. Whoever
in the group can view the files which are uploaded in their group and also modify it. The group meme
G. File Security
Encrypting the data file.
File stored in the cloud can be deleted by either the group manager or the data owner. (i.e., the member
who uploaded the file into the server).
H. Group Signature
A group signature scheme allows any member of the group to sign messages while keeping the identity
secret from verifiers. Besides, the designated group manager can reveal the identity of the signature’s originator
when a dispute occurs, which is denoted as traceability.
I. User Revocation
User revocation is performed by the group manager via a public available revocation list (RL), based
on which group members can encrypt their data files and ensure the confidentiality against the revoked users.
XI.
CONCLUSION
In this paper, we design a cloud-assisted privacy preserving mobile health monitoring system, called
CAM, which can effectively protect the privacy of clients and the intellectual property of mobile health service
providers. To protect the clients’ privacy, we apply the anonymous Boneh-Franklin identity based encryption
(IBE) in medical diagnostic branching programs. To reduce the decryption complexity due to the use of IBE, we
apply recently proposed decryption outsourcing with privacy protection to shift clients’ pairing computation to
the cloud server. To protect m Heath service providers’ programs, we expand the branching program tree by
using the random permutation and randomize the decision thresholds used at the decision branching nodes.
Finally, to enable resource constrained small companies to participate in mobile health business.
REFERENCES
[1].
[2].
[3].
[4].
[5].
[6].
[7].
[1] P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with
diabetes and cardiovascular disease using mobile telephony,” in Engineering in Medicine and Biology Society, 2008.
EMBS 2008. 30th Annual International Conference of the IEEE. IEEE, 2008, pp. 755–758.
[2] A. Tanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by
noninvasive speech tests,” Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884– 893, 2010.
[3] G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of
Medicine, vol. 63, pp. 479–492, 2012.
[4] L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj,” 2010.
[5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. Van Beijnum, and P. D. Stefanis, “End-user perception towards
pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in Pervasive
Health, 2011, pp. 478–484.
[6] M. Delgado, “The evolution of health care it: Are current U.S. privacy policies ready for the clouds?” in
SERVICES, 2011, pp. 371–378.
[7] N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009.
| IJMER | ISSN: 2249–6645 |
www.ijmer.com
| Vol. 4 | Iss. 1 | Jan. 2014 |57|