Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has presented using Petrinet production model. We present the designed SCTP petrinet models and its analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization, security and intruder prevention.
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...ijcisjournal
Cloud computing technology provides various internet-based services. Many cloud computing vendors are offering cloud services through their own service mechanism. These mechanisms consist of various service parameters such as authentication, security, performance, availability, etc. Customer can access these cloud services through web browsers using http protocols. Each protocol has its own way of achieving the request-response services, authentication, confidentiality and etc. Cloud computing is an internet-based technology, which provides Infrastructure, Storage, Platform services on demand through a browser using HTTP protocols. These protocol features can be enhanced using cloud specific protocol, which provides strong authentication, confidentiality, security, integrity, availability and accessibility. We are proposing and presenting the secure cloud transmission protocol (SCTP) engineering phases which sits on top of existing http protocols to provide strong authentication security and confidentiality using multi-models. SCTP has multi-level and multi-dimensional approach to achieve strong authentication and multi-level security technique to achieve secure channel. This protocol can add on to existing http protocols. It can be used in any cloud services. This paper presents proposed Protocol engineering phases such as Service Specification, Synthesis, Analysis, Modelling, and Implementation model with test suites. This paper is represents complete integration of our earlier proposed and published multilevel techniques
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud
The Difference Impact on QoS Parameters between the IPSEC and L2TPAM Publications
Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...ijcisjournal
Cloud computing technology provides various internet-based services. Many cloud computing vendors are offering cloud services through their own service mechanism. These mechanisms consist of various service parameters such as authentication, security, performance, availability, etc. Customer can access these cloud services through web browsers using http protocols. Each protocol has its own way of achieving the request-response services, authentication, confidentiality and etc. Cloud computing is an internet-based technology, which provides Infrastructure, Storage, Platform services on demand through a browser using HTTP protocols. These protocol features can be enhanced using cloud specific protocol, which provides strong authentication, confidentiality, security, integrity, availability and accessibility. We are proposing and presenting the secure cloud transmission protocol (SCTP) engineering phases which sits on top of existing http protocols to provide strong authentication security and confidentiality using multi-models. SCTP has multi-level and multi-dimensional approach to achieve strong authentication and multi-level security technique to achieve secure channel. This protocol can add on to existing http protocols. It can be used in any cloud services. This paper presents proposed Protocol engineering phases such as Service Specification, Synthesis, Analysis, Modelling, and Implementation model with test suites. This paper is represents complete integration of our earlier proposed and published multilevel techniques
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud
The Difference Impact on QoS Parameters between the IPSEC and L2TPAM Publications
Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
Hierarchal attribute based cryptographic model to handle security services in...IJECEIAES
The sharing of information in the cloud is a unique element of the environment, but there is a risk that the information may land with the wrong people. To counterattack this problem, security-associated methodologies were used to secure the information that was readily available to clients. Despite the lack of benefits, this provides productive/adaptability and dependability in access control strategies between clients in the sharing of information. The novel hierarchal attribute- based cryptographic security model (NHACSM) is being proposed to provide adaptability, versatility, and access control in sharing information in the appropriate climate. This model allows clients to share information in a hierarchal way, allowing for a productive assessment of access control strategy and improved security. The NHACSM method is used to reduce the total time values for different user instances compared to conventional approaches, for example, attribute-set-based encryption (ASBE), key-policy attribute-based encryption (KP-ABE), and ciphertext-policy attribute-based encryption (CP-ABE). With respect to 10 instances existing methods achieve 2.7, 2.5, and 2.3 respectively, and also compared to 20, 30, 40, and 50 instances, our proposed method is low. The encryption and decryption time evaluation values and performance evaluation of different approaches, ASBE, CP-ABE, were taken into account when increasing the user instance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing
services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses on
the applicability of a new fully homomorphic encryption scheme (FHE) in solving data security in cloud computing. Different types
of existing homomorphic encryption schemes, including both partial and fully homomorphic encryption schemes are reviewed. The
study was aimed at constructing a fully homomorphic encryption scheme that lessens the computational strain on the computing
assets as compared to Gentry’s contribution on partial homomorphic encryption schemes where he constructed homomorphic
encryption based on ideal lattices using both additive and multiplicative Homomorphisms. In this study both addition and
composition operations implementing a fully homomorphic encryption scheme that secures data within cloud computing is used. The
work is founded on mathematical theory that is translated into an algorithm implementable in JAVA. The work was tested by a single
computing hardware to ascertain its suitability. The newly developed FHE scheme posted better results that confirmed its suitability
for data security in cloud computing.
In general, the Cloud computing utilization becomes unavoidable in each and every data
communication as well as the service sharing center with various applications. Based on the requirements, the
clients are performing service selection (such as infrastructure, software or platforms) towards to fulfil their
needs in optimized manner. Whenever the data is going to be stored in a third party network, it automatically
brings a question mark for secure access along with its storage infrastructure. The security for data transaction
between cloud service providers and cloud clients is forever carry with the help of crypto graphic algorithms
either it may be an symmetric or asymmetric key generation mechanism with certain limitations . In this
research paper implement a new approach for ensure the secure data transaction by using Orthogonal
Handshaking Authentication Mechanism under cloud along with a proposed storage authentication protocol. It
creates a roadmap for data retrieval progress of authenticated cloud users among the service access in cloud
computing. Data on Cloud storage will get an encrypted format by using a symmetric key helps to maintain its
security and authentication will provide the cloud data utilization with appropriate cloud users.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and
service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
EVALUATING GALOIS COUNTER MODE IN LINK LAYER SECURITY ARCHITECTURE FOR WIRELE...IJNSA Journal
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and message integrity, the overall efficiency of a security protocol can be improved by using the Authenticated Encryption (AE) block cipher mode of operation as compared to the conventional sequential encryption and authentication. Amongst the AE block cipher modes, the Galois Counter mode (GCM) is the latest recommended AE mode by the NIST. In this paper, we attempt at evaluating the performance of the GCM mode in the link layer security protocol for a WSN viz. TinySec and compare it with the default conventional block cipher modes of operation used therein. To the best of our knowledge ours is the first experimental evaluation of Galois Counter Mode with Advanced Encryption Standard Cipher at the link layer security architecture for WSNs.
Willie Nelson Net Worth: A Journey Through Music, Movies, and Business Venturesgreendigital
Willie Nelson is a name that resonates within the world of music and entertainment. Known for his unique voice, and masterful guitar skills. and an extraordinary career spanning several decades. Nelson has become a legend in the country music scene. But, his influence extends far beyond the realm of music. with ventures in acting, writing, activism, and business. This comprehensive article delves into Willie Nelson net worth. exploring the various facets of his career that have contributed to his large fortune.
Follow us on: Pinterest
Introduction
Willie Nelson net worth is a testament to his enduring influence and success in many fields. Born on April 29, 1933, in Abbott, Texas. Nelson's journey from a humble beginning to becoming one of the most iconic figures in American music is nothing short of inspirational. His net worth, which estimated to be around $25 million as of 2024. reflects a career that is as diverse as it is prolific.
Early Life and Musical Beginnings
Humble Origins
Willie Hugh Nelson was born during the Great Depression. a time of significant economic hardship in the United States. Raised by his grandparents. Nelson found solace and inspiration in music from an early age. His grandmother taught him to play the guitar. setting the stage for what would become an illustrious career.
First Steps in Music
Nelson's initial foray into the music industry was fraught with challenges. He moved to Nashville, Tennessee, to pursue his dreams, but success did not come . Working as a songwriter, Nelson penned hits for other artists. which helped him gain a foothold in the competitive music scene. His songwriting skills contributed to his early earnings. laying the foundation for his net worth.
Rise to Stardom
Breakthrough Albums
The 1970s marked a turning point in Willie Nelson's career. His albums "Shotgun Willie" (1973), "Red Headed Stranger" (1975). and "Stardust" (1978) received critical acclaim and commercial success. These albums not only solidified his position in the country music genre. but also introduced his music to a broader audience. The success of these albums played a crucial role in boosting Willie Nelson net worth.
Iconic Songs
Willie Nelson net worth is also attributed to his extensive catalog of hit songs. Tracks like "Blue Eyes Crying in the Rain," "On the Road Again," and "Always on My Mind" have become timeless classics. These songs have not only earned Nelson large royalties but have also ensured his continued relevance in the music industry.
Acting and Film Career
Hollywood Ventures
In addition to his music career, Willie Nelson has also made a mark in Hollywood. His distinctive personality and on-screen presence have landed him roles in several films and television shows. Notable appearances include roles in "The Electric Horseman" (1979), "Honeysuckle Rose" (1980), and "Barbarosa" (1982). These acting gigs have added a significant amount to Willie Nelson net worth.
Television Appearances
Nelson's char
Hierarchal attribute based cryptographic model to handle security services in...IJECEIAES
The sharing of information in the cloud is a unique element of the environment, but there is a risk that the information may land with the wrong people. To counterattack this problem, security-associated methodologies were used to secure the information that was readily available to clients. Despite the lack of benefits, this provides productive/adaptability and dependability in access control strategies between clients in the sharing of information. The novel hierarchal attribute- based cryptographic security model (NHACSM) is being proposed to provide adaptability, versatility, and access control in sharing information in the appropriate climate. This model allows clients to share information in a hierarchal way, allowing for a productive assessment of access control strategy and improved security. The NHACSM method is used to reduce the total time values for different user instances compared to conventional approaches, for example, attribute-set-based encryption (ASBE), key-policy attribute-based encryption (KP-ABE), and ciphertext-policy attribute-based encryption (CP-ABE). With respect to 10 instances existing methods achieve 2.7, 2.5, and 2.3 respectively, and also compared to 20, 30, 40, and 50 instances, our proposed method is low. The encryption and decryption time evaluation values and performance evaluation of different approaches, ASBE, CP-ABE, were taken into account when increasing the user instance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing
services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses on
the applicability of a new fully homomorphic encryption scheme (FHE) in solving data security in cloud computing. Different types
of existing homomorphic encryption schemes, including both partial and fully homomorphic encryption schemes are reviewed. The
study was aimed at constructing a fully homomorphic encryption scheme that lessens the computational strain on the computing
assets as compared to Gentry’s contribution on partial homomorphic encryption schemes where he constructed homomorphic
encryption based on ideal lattices using both additive and multiplicative Homomorphisms. In this study both addition and
composition operations implementing a fully homomorphic encryption scheme that secures data within cloud computing is used. The
work is founded on mathematical theory that is translated into an algorithm implementable in JAVA. The work was tested by a single
computing hardware to ascertain its suitability. The newly developed FHE scheme posted better results that confirmed its suitability
for data security in cloud computing.
In general, the Cloud computing utilization becomes unavoidable in each and every data
communication as well as the service sharing center with various applications. Based on the requirements, the
clients are performing service selection (such as infrastructure, software or platforms) towards to fulfil their
needs in optimized manner. Whenever the data is going to be stored in a third party network, it automatically
brings a question mark for secure access along with its storage infrastructure. The security for data transaction
between cloud service providers and cloud clients is forever carry with the help of crypto graphic algorithms
either it may be an symmetric or asymmetric key generation mechanism with certain limitations . In this
research paper implement a new approach for ensure the secure data transaction by using Orthogonal
Handshaking Authentication Mechanism under cloud along with a proposed storage authentication protocol. It
creates a roadmap for data retrieval progress of authenticated cloud users among the service access in cloud
computing. Data on Cloud storage will get an encrypted format by using a symmetric key helps to maintain its
security and authentication will provide the cloud data utilization with appropriate cloud users.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and
service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
EVALUATING GALOIS COUNTER MODE IN LINK LAYER SECURITY ARCHITECTURE FOR WIRELE...IJNSA Journal
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and message integrity, the overall efficiency of a security protocol can be improved by using the Authenticated Encryption (AE) block cipher mode of operation as compared to the conventional sequential encryption and authentication. Amongst the AE block cipher modes, the Galois Counter mode (GCM) is the latest recommended AE mode by the NIST. In this paper, we attempt at evaluating the performance of the GCM mode in the link layer security protocol for a WSN viz. TinySec and compare it with the default conventional block cipher modes of operation used therein. To the best of our knowledge ours is the first experimental evaluation of Galois Counter Mode with Advanced Encryption Standard Cipher at the link layer security architecture for WSNs.
Willie Nelson Net Worth: A Journey Through Music, Movies, and Business Venturesgreendigital
Willie Nelson is a name that resonates within the world of music and entertainment. Known for his unique voice, and masterful guitar skills. and an extraordinary career spanning several decades. Nelson has become a legend in the country music scene. But, his influence extends far beyond the realm of music. with ventures in acting, writing, activism, and business. This comprehensive article delves into Willie Nelson net worth. exploring the various facets of his career that have contributed to his large fortune.
Follow us on: Pinterest
Introduction
Willie Nelson net worth is a testament to his enduring influence and success in many fields. Born on April 29, 1933, in Abbott, Texas. Nelson's journey from a humble beginning to becoming one of the most iconic figures in American music is nothing short of inspirational. His net worth, which estimated to be around $25 million as of 2024. reflects a career that is as diverse as it is prolific.
Early Life and Musical Beginnings
Humble Origins
Willie Hugh Nelson was born during the Great Depression. a time of significant economic hardship in the United States. Raised by his grandparents. Nelson found solace and inspiration in music from an early age. His grandmother taught him to play the guitar. setting the stage for what would become an illustrious career.
First Steps in Music
Nelson's initial foray into the music industry was fraught with challenges. He moved to Nashville, Tennessee, to pursue his dreams, but success did not come . Working as a songwriter, Nelson penned hits for other artists. which helped him gain a foothold in the competitive music scene. His songwriting skills contributed to his early earnings. laying the foundation for his net worth.
Rise to Stardom
Breakthrough Albums
The 1970s marked a turning point in Willie Nelson's career. His albums "Shotgun Willie" (1973), "Red Headed Stranger" (1975). and "Stardust" (1978) received critical acclaim and commercial success. These albums not only solidified his position in the country music genre. but also introduced his music to a broader audience. The success of these albums played a crucial role in boosting Willie Nelson net worth.
Iconic Songs
Willie Nelson net worth is also attributed to his extensive catalog of hit songs. Tracks like "Blue Eyes Crying in the Rain," "On the Road Again," and "Always on My Mind" have become timeless classics. These songs have not only earned Nelson large royalties but have also ensured his continued relevance in the music industry.
Acting and Film Career
Hollywood Ventures
In addition to his music career, Willie Nelson has also made a mark in Hollywood. His distinctive personality and on-screen presence have landed him roles in several films and television shows. Notable appearances include roles in "The Electric Horseman" (1979), "Honeysuckle Rose" (1980), and "Barbarosa" (1982). These acting gigs have added a significant amount to Willie Nelson net worth.
Television Appearances
Nelson's char
Characterization and the Kinetics of drying at the drying oven and with micro...Open Access Research Paper
The objective of this work is to contribute to valorization de Nephelium lappaceum by the characterization of kinetics of drying of seeds of Nephelium lappaceum. The seeds were dehydrated until a constant mass respectively in a drying oven and a microwawe oven. The temperatures and the powers of drying are respectively: 50, 60 and 70°C and 140, 280 and 420 W. The results show that the curves of drying of seeds of Nephelium lappaceum do not present a phase of constant kinetics. The coefficients of diffusion vary between 2.09.10-8 to 2.98. 10-8m-2/s in the interval of 50°C at 70°C and between 4.83×10-07 at 9.04×10-07 m-8/s for the powers going of 140 W with 420 W the relation between Arrhenius and a value of energy of activation of 16.49 kJ. mol-1 expressed the effect of the temperature on effective diffusivity.
UNDERSTANDING WHAT GREEN WASHING IS!.pdfJulietMogola
Many companies today use green washing to lure the public into thinking they are conserving the environment but in real sense they are doing more harm. There have been such several cases from very big companies here in Kenya and also globally. This ranges from various sectors from manufacturing and goes to consumer products. Educating people on greenwashing will enable people to make better choices based on their analysis and not on what they see on marketing sites.
"Understanding the Carbon Cycle: Processes, Human Impacts, and Strategies for...MMariSelvam4
The carbon cycle is a critical component of Earth's environmental system, governing the movement and transformation of carbon through various reservoirs, including the atmosphere, oceans, soil, and living organisms. This complex cycle involves several key processes such as photosynthesis, respiration, decomposition, and carbon sequestration, each contributing to the regulation of carbon levels on the planet.
Human activities, particularly fossil fuel combustion and deforestation, have significantly altered the natural carbon cycle, leading to increased atmospheric carbon dioxide concentrations and driving climate change. Understanding the intricacies of the carbon cycle is essential for assessing the impacts of these changes and developing effective mitigation strategies.
By studying the carbon cycle, scientists can identify carbon sources and sinks, measure carbon fluxes, and predict future trends. This knowledge is crucial for crafting policies aimed at reducing carbon emissions, enhancing carbon storage, and promoting sustainable practices. The carbon cycle's interplay with climate systems, ecosystems, and human activities underscores its importance in maintaining a stable and healthy planet.
In-depth exploration of the carbon cycle reveals the delicate balance required to sustain life and the urgent need to address anthropogenic influences. Through research, education, and policy, we can work towards restoring equilibrium in the carbon cycle and ensuring a sustainable future for generations to come.
Natural farming @ Dr. Siddhartha S. Jena.pptxsidjena70
A brief about organic farming/ Natural farming/ Zero budget natural farming/ Subash Palekar Natural farming which keeps us and environment safe and healthy. Next gen Agricultural practices of chemical free farming.
1. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
10.5121/ijccsa.2017.7103 17
IMPROVED SECURE CLOUD TRANSMISSION
PROTOCOL
Dinesha H A1
and D.H. Rao2
1
Assistant Professor, Department of CSE,
S.G. Balekundri Institute of Technology, Belagavi, India
2
Professor, Department of CSE,
S.G. Balekundri Institute of Technology, Belagavi, India
ABSTRACT
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
KEYWORDS
Authentication, Cryptography, Intruder, Multidimensional, Multilevel;
1. INTRODUCTION
Cloud computing offers many cloud services in internet world. Cloud computing can be accessed
through its own way. In literature many cloud protocol has been proposed to address many issues
in cloud computing. It could be auditing, accounting, authentication, security and etc. However
we surveyed many protocols proposed for cloud computing. Firstly, Cloud Gossip Protocol for
Dynamic Resource Management [1] addresses the problem of dynamic resource management for
a large-scale cloud environment. Research contribution including outlining distributed
middleware architecture and presenting one of its key elements: a gossip protocol that ensures fair
resource allocation among sites/applications, dynamically adapts the allocation to load changes
and scales both in the number of physical machines and sites/applications [1].In IEEE
Transaction on Parallel Distributed Systems[2], authors proposed a dynamic auditing protocol
that can support the dynamic operations of the data on the cloud servers. Disadvantage of this
method may leak the data content to the auditor because it requires the server to send the linear
combinations of data blocks to the auditor [2]. IEEE Transaction on Parallel Distributed Systems
[2] proposed an efficient and inherently secure dynamic auditing protocol. It protects the data
privacy against the auditor by combining the cryptography method with the bi-linearity property
of bilinear paring, rather than using the mask technique [2]. In IEEE conf Access Protocols-2013
2. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
18
[3], they developed nearby share retrieval protocols for single-version systems to improve the
read access latency [3]. Cloud Fault Tolerance Protocol [4] proposes a collaborative fault-tolerant
transfer protocol for replicated data available on the Cloud and the Grid during exceptional faults
[4]. Agent-Based User Authentication and Access Control-2013 [5] proposed model was named
ACUA (Access Control and User Authentication) model that contains appropriate tools for
validating user legal identities and acquiring their access control privileges for the resources
according to the role information. Limited to some platform, Compatibility issue [5].In IEEE
Nifco [6][7], authors extended their dynamic auditing scheme to be privacy preserving and
support the batch auditing for multiple owners. However, due to the large number of data tags,
their auditing protocols will incur a heavy storage overhead on the server [6][7]. IaaS
Authentication [8] presents a full system architecture allowing the authentication and secured
execution of binary files using hardware-assisted on-the-fly memory encryption/decryption. In a
context of general blurring of the physical relationship between a user and the computer which it
eventually interacts, this architecture has been thought so as to achieve a certain degree of
robustness against corruptions in a cloud computing [8]. Graphic Password Authentication [9]
depicts as a secure authentication mechanism using graphical password should be proposed in
this paper for improving traditional authentication mechanism and let users access cloud services
securely [9]. It is breakable by shoulder surfing attack. Secured Biometric Authentication [10], in
2012, An analyzed the authentication introduced by Das and claimed that the scheme of Das was
under various attacks and proposed an improvement [10]. Biometric Authentication [11] Propose
an improvement to overcome DOS and Server Spoofing security problems. The security analyses
and performance evaluations show that our scheme is more secure and efficient [11].
Complexities are separate device and infrastructure to be placed. RFID based authentication [12],
proposed cloud-based RFID authentication scheme enables readers anonymously access the cloud
through wired or wireless VPN connections [12]. An encrypted hash table is utilized to prevent
clients’ (readers and tags) secrets from revealing to the cloud. The first RFID authentication
protocol preserving readers and tags privacy against an un trusted database keeper is
proposed.[12]. Eid Authentication [13] proposed to close this gap for such cloud applications by
applying the STORK framework for secure cloud authentication using eIDs. The STORK
framework supports various national eID solutions and will be the relevant eID framework across
Europe in future. We demonstrated our approach by enabling eID authentication at two selected
public cloud service providers. Finally, we also moved the STORK framework to the cloud to
apply the full cloud computing paradigm [13]. Authentication Protocol [14] Reported issues and
proposed brief solutions on privileged access, authenticated access user types bug, vulnerability
of platforms. Multi-tenanted application isolation, authentication privileges to particular user Data
Protection, Integrity, vulnerability Physical security, Privileged access rights, control and
monitoring maintaining infrastructure, communication channel security, intruder detection[14] .
These protocols and its limitation motivates us to think for new protocol which can take care of
authentication, authorization, access control, security, confidentiality and intruder
detection/prevention system in a single protocol execution. Hence we proposed secure cloud
transmission protocol which can deal with all these issue.
This paper has organized in the following manner: Chapter 2 presents the proposed SCTP and its
techniques, Chapter 3, presents the SCTP Petrinet models and its mathematical analysis. Chapter
4 concludes the paper with its limitation.
2. SECURE CLOUD TRANSMISSION PROTOCOL
Proposed secure cloud transmission protocol (SCTP) has its own communication techniques
algorithms to achieve strong authentication, security, confidentiality and Intruder detection.
SCTP may be a solution to the many issues reported in literature. SCTP has two phases
3. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
19
initialization phase and execution phase as shown in figure 1. As shown in table 1, In
initialization phase, SCTP initializes the cloud application with SCTP multi-levels, inputs to
generate passwords, questionnaires for intruder detections and etc. In execution phase, it executes
all its proposed techniques [15][16][17]. SCTP performs strong authentications, secure channel
and intruder detection through its designed techniques which are described in table 2. SCTP
techniques research work summary and its significance have been presented in table 3.
Figure 1. SCTP Phases: Initialization & Execution
Table 1. SCTP Phases and Its Action
Table 2. SCTP Major Three Techniques
4. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
20
Table3. SCTP Technique Research Summary
3. SCTP PETRINET MODEL
Petrinet theory is used in modeling network and protocol [28]. Hence we selected petrinet model
in SCTP modeling, later this model helps to derive mathematical expression and easy analysis.
This section presents petrinet models for SCTP. Figure 2, presents overview of SCTP which
depicts the SCTP techniques and production flow based on different places and transitions. SCTP
Starts with its initialization phase then SCTP execution proceed. SCTP MLA derived in places
{P0, P1, P2, P9} and Transition {T0, T1, T2, T8, T11}. SCTP MLA Levels P0, P1 and P2
receive MDP from T5, T6 and T7 respectively. States P6, P7 and P8 Generates the MDP
passwords. After successful reaching P3 states with 3 token (MDP passwords), based on cloud
service types MLC and IM gets executes. SCTP ends at P5 state. Figure 3 presents, detailed
Petrinet Model for SCTP which describes detailed techniques of SCTP such as MLA [18], MDP
[21] , MLC[22] and IM[23]. Figure 4, presents the petrinet Model of SCTP without notation
which helps to derive mathematical expression of SCTP techniques.
5. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
21
Figure 2. Overview of SCTP
Figure 3. SCTP Detailed Petri net Model
6. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
22
Figure 4. SCTP Detailed Petri net Model without notation
Refer to figure 4, SCTP starts by firing transition T 28 at P0 and ends after firing transition T26 &
T27 at P26. Let us derive places and transition for each SCTP techniques discussed earlier, i) A
= MLA = {P0,P1,P2,P13,P12} {T20,T0,T1,T2,T5,T6,T7,T11,T12,T13}, ii) P = MDP =
{P6,P7,P8,P9,P10,P11} {T8,T9,T10}, iii) C = MLC = {P4,P14,P15,P16,P17,P18,P19,P20,P21}
{T3,T14,T15,T16,T17,T18,T19,T20,T26} iv) I = IM = {P5,P22,P23,P24,P25}
{T4,T22,T23,T24,T25,T27}. Hence SCTP= { AUPUCUI} {AUP} is to achieve Strong
Authentication, C to achieve Secure Channel, I to ensure Intruder Detection and Prevention.
DETAILED ANALYSIS
A Petri net graph is a 4 tuple (S,T,W,M0) where S is a finite set of places represents
states/conditions, T is a finite set of transitions represents action/execution. S &T are disjoint, that
means no object can be both a place and a transition. W:(S x T) U (T X S) -> N is a multiset of
arcs, i.e. it assigns to each arc a non-negative integer arc multiplicity. Refer to figure 3, N
represents SCTP. No arc may connect two places or two transitions. The flow relation is the set of
arcs, F={(x, y)| W(x, y) > 0}. In texts often define Petri nets using F instead of W. When using
this convention, a Petri net graph is a bipartite multigraph (S U T, F) with node partitions S and T.
The preset of a transition t is the set of its input places: t={s € S | W(s, t)>0}; its postset is the set
of its output places: t={s € S | W(t, s)>0}. SCTP each techniques places and transition described
in figure 3. M0 is the initial marking, a marking of the Petri net graph. Firing a transition t in a
marking M consumes W(s,t) tokens from each of its input places s, and produces W(t,s) tokens in
each of its output places s. SCTP each techniques tokens described in figure 3. We are generally
interested in what may happen when transitions may continually fire in arbitrary order. A firing
sequence for a Petri net with graph G and initial marking M0 is a sequence of transitions σ
=<ti1...tin> such that M0--> G,ti1 M1^...^Mn-1 --> Mn.
Formulation in terms of vectors and matrices, its transition relation can be described as a pair of
|S| by |T| matrices
• W-
, defined by ɏ,t:W-
[s, t] = W(s, t)
• W+
, defined by ɏ,t:W+
[s, t] = W(t, s)
The set of firing sequences is denoted as L(N). Firing sequence of SCTP techniques A, C & I are
derived below.
7. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
23
A= (P0,T0,P1,T1,P2,T2)
C =(P4,T14,P14,T15,P15,T16,P16,T20)
I = (P5,T23,P23,T14,P24,T25,P25,T27)
Then their difference WT
= W+
- W-
can be used to describe the reachable markings in terms of
matrix multiplication, as follows. For any sequence of transitions w, write 0(w) for the vector that
maps every transition to its number of occurrences in w. Then, we have R(N)={M | ᴲw:M=M0 +
WT . 0(w)^w is a firing sequence of N}.
SCTP MLA, MLC and IM reachability and technique firing sequence derivations illustrated in
table 4.
Let us apply probability and analyze the failure of SCTP technique execution. Let us take SCTP
as sample space S , its techniques(A,C & I) firing sequence as mutual disjoint subsets A1, A2,
A3, E are events (executions) and subset of S for technique execution. S= A U A2 U A3 Then E
=E ᴒ S, => E ᴒ (A U A2 U A3) => (E ᴒ A1) (E ᴒ A2) (E ᴒ A3). Since E ᴒ A are disjoint we
obtain P(E)= P(E ᴒ A1)+ P(E ᴒA2)+P(E ᴒ A3), using multiplication theorem we obtain,
P(E ᴒA3)=P(A3 ᴒ E)= P(A3)P(EA3). Thus we arrive total probability P(E)= P(A1)(P(EA1)+
(P(EA2)+ (P(EA3). Let us apply bayes theorem k =1,2,3 the multiplication theorem for
conditional probability tells that P(Ak ᴒE)=P(Ak)P(E|Ak). Therfore P(Ak|E) = P(Ak ᴒE)/P(E)
=> P(Ak)P(E/Ak)/P(E) use law of total probability for denominator P(E). Hence , P(Ak/E)=
P(Ak)P(E/Ak)/ P(A1)(P(EA1)+ (P(EA2)+ (P(EA3).
Considering MLC upload and MLC download independent events as P (AᴒB) = P (A) P (B)
Table 4 . SCTP Techniques firing sequence matrix analysis
4. CONCLUSION AND LIMITATION
SCTP techniques to achieve cloud specific strong authorization and authentication, secure
channel and intruder has been designed. SCTP MLA & MDP to ensure strong authentication,
SCTP MLC to achieve strong authentication and SCTP IM to achieve usage profile based
intruder detection & prevention has been designed. SCTP techniques complete design has been
presented using Petrinet production model. SCTP petrinet models and its analysis are presented.
SCTP performance analysis has been made to compares with existing techniques that are
proposed to achieve authentication, authorization, security and intruder prevention. SCTP
designed to protect against different attack mentioned in literature. SCTP can be used in cloud
application where it needs higher security such as defense, military, university marks database
8. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
23
and etc. Simpler application and generic application may not be required such a strong
authentication, secure channel and intruder detection as it leads to unnecessary complexity.
ACKNOWLEDGMENT
Our sincere thanks to Dr. Karisiddappa, Vice Chancellor and Dr. H. N. Jagannatha Reddy,
Registrar VTU Belagavi, for their constant encouragement & support.
REFERENCES
[1] Fetahi Wuhib, Rolf Stadler, and Mike Spreitzer, A Gossip Protocol for Dynamic Resource
Management in Large Cloud Environments, IEEE TRANSACTIONS ON NETWORK AND
SERVICE MANAGEMENT, VOL. 9, NO. 2, 1932-4537, 213-225,June-2012.
[2] Kan Yang, Xiaohua Jia, An Efficient and Secure Dynamic Auditing Protocol for Data Storage in
Cloud Computing, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 24, NO. 9, SEPTEMBER 2013, 1717-1726.
[3] Yunqi Ye, Liangliang Xiao, Yinzi Chen, I-Ling Yen, Farokh Bastani , Ing-Ray Chen, Access
Protocols in Data Partitioning Based Cloud Storage, 2013 IEEE Sixth International Conference on
Cloud Computing, 978-0-7695-5028-2/13, 398-397, 2013.
[4] Nader Mohamed and Jameela Al-Jaroodi, A Collaborative Fault-Tolerant Transfer Protocol for
Replicated Data in the Cloud,IEEE transaction, 978-1-4673-1382-7/12, 203-210, 2012.
[5] Mostafa Hajivali , Faraz Fatemi Moghaddam , Maen T. Alrashdan , Abdualeem Z. M. Alothmani ,
Applying an Agent-Based User Authentication and Access Control Model for Cloud Servers, ICTC
2013, 978-1-4799-0698-7/13, 807-902,2013.
[6] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for
Storage Security in Cloud Computing,” IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5,pp.
847-859, May 2011.
[7] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage
Security in Cloud Computing,”, Proc. IEEE INFOCOM, pp. 525-533, 2010
[8] Authentication and secured execution for the Infrastructure-as-a-Service layer of the Cloud
Computing model, Laurent Hubert, Renaud Sirdey, 2013 Eighth International Conference on P2P,
Parallel, Grid, Cloud and Internet Computing, 978-0-7695-5094-7, 291-296, 2013.
[9] Ming-Huang Guo, Horng-Twu Liaw, Li-Lin Hsiao, Chih-Ta Yen, Authentication Using Graphical
Password in Cloud, 177-181, 2013.
[10] Z. J. Zhu, Z. W. Gao, Y. Li, A SECURE BIOMETRIC-BASED AUTHENTICATION SCHEME
USING SMART CARD,IEEE, H. B. Tang39-43,2013.
[11] A. K. Das, “Analysis and improvement on an efficient biometric-based remote user authentication
scheme using smart cards”, IET Information Security, 5 (3), pp. 145-151, 2011.
[12] Wei Xie1, Lei Xie2, Chen Zhang1, Quan Zhang1, Chaojing Tang1, Cloud-based RFID
Authentication, 2013 IEEE International Conference on RFID, 978-1-4673-5750-0/13,168-175, 2013.
[13] Bernd Zwattendorfer, Arne Tauber,SECURE CLOUD AUTHENTICATION USING EIDS,
Proceedings of IEEE CCIS2012, 978-1-4673-1857-0/12/, 397-401, 2012.
[14] Safiriyu Eludiora1, Olatunde Abiona2, et. al, A User Identity Management Protocol for Cloud
Computing Paradigm , in Int. J. Communications, Network and System Sciences, 2011, 4, 152-163
[15] Dinesha H.A, D.H.Rao,"Evaluation of Secure Cloud Transmission Protocol", International Journal of
Computer Network and Information Security(IJCNIS), Vol.9, No.3, pp. 45-53, 2017.DOI:
10.5815/ijcnis.2017.03.06
[16] Dinesha H A, Dr.V.K Agrawal, “Development of Secure Cloud Transmission Protocol (SecCTP)
Engineering Phases: Multilevel Security & Cryptography”, International Journal on Cryptography and
Information Security (IJCIS) ISSN: 1839-8626, December 2015.
[17] Dinesha H A, Dr. V. K Agrawal, “Framework Design of Secure Cloud Transmission Protocol”, IJCSI
International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013, ISSN (Print):
1694- 0784 | ISSN (Online): 1694-0814,74-81.
[18] Dinesha H A, Dr.V.K.Agrawal, “Multi-level Authentication Technique for Accessing Cloud
Services”, IEEE International Conference on Computing, Communication and Applications (ICCCA-
2012), Dindigul, Tamilnadu, India, 22-24 February 2012, 978-1-4673-0270-8, 1 – 4.
9. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
23
[19] R. Monica, Dinesha H A, Dr.V.K Agrawal, “Wireless Sensor-Cloud Integration Using Ant Colony
Routing Algorithm”, International Conference on cloud computing and service engineering
(CLUSE2012), held at Raja Rajeshwari College of Engineering & KINGSTON, UK, 11-13 April
2012, 294-298, Received Best Paper Award, Referred to ISEEC Journal.
[20] Dinesha H A, R Monica and V.K. Agrawal, “Formal Modeling for Multi-Level Authentication in
Sensor-Cloud Integration System”. International Journal of Applied Information Systems 2(3) (IJAIS)
Published by Foundation of Computer Science, New York, USA, May 2012, 16-21.
[21] Dinesha H A, Dr. V. K Agrawal, “Multi-dimensional Password Generation Technique for accessing
cloud services”, Special Issue on: "Cloud Computing and Web Services", International Journal on
Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.3, June 2012, 31-39.
[22] Dinesha H A, Dr.V.K Agrawal, “Multilevel Cryptography with Metadata and Lock Approach for
Storing Data in Cloud”, Springer Journal of Cryptographic Engineering (JCEN) (submitted).
[23] Dinesha H A, Dr.V.K Agrawal, “Usage Profile Based Intruder Detection System for accessing cloud
service”, Transactions on Networks and Communications, Volume 2, Issue 6, 10.14738/tnc.26.590.
Dec 2014.
[24] Ms. R Monica, Mr.Dinesha H.A,Prof.V.K Agrawal, “Cloud Computing – Phone Call as a Service: A
Concept”, to IEEE Internl.. Conference on Advances in Computing, Communications and Informatics
(ICACCI-2013), 978-1-4799-2432-5, 13861185, 22-25 Aug. 2013, 236 – 242.
[25] Abhishek A, Dinesha H A, Dr. V. K Agrawal, “Cloud Computing Technologies in Indian Rural
Schools and Engineering College Education “ , International conference on Intelligent computational
systems (ICICS’s2012), Dubai, January7-8, 2012, 67-70.
[26] Dinesha H A, Dr. V. K Agrawal, “Advanced Technologies and Tools for Indian Rural School
Education System”, International Journal of Computer Applications (IJCA) (0975 – 8887) Volume
36– No.10, December 2011, 54-60.
[27] Dinesha H A, Dr. V. K Agrawal, “Virtualization Technologies and Techniques in Education Learning
Applications “,International Conference on e-Education and e-Learning ICEEEL, held at World
Academy of Science, Engineering and Technology, PARIS-FRANCE on November 14-16, 2011,
984-991.
[28] Petri, Carl Adam; Reisig, Wolfgang (2008). "Petri net". Scholarpedia 3 (4): 6477.
doi:10.4249/scholarpedia.6477.
[29] Slawomir Grzonkowski and Peter M. Corcoran, Thomas Coughlin, Security Analysis of
Authentication Protocols for Next-Generation Mobile and CE Cloud Services, 2011 IEEE
International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 978-1-4577-0234-1/11,
83-87.
[30] Zhou Quan, Tang Chunming, Zhen Xianghan and Rong Chunming, Springer Quan et al. , A secure
user authentication protocol for sensor network in data capturing, Journal of Cloud Computing:
Advances, Systems and Applications (2015 May) 1-12.
AUTHORS
Dinesha H. A. has completed his bachelor of engineering from Malnad College of
Engineering, Hassan and Master of Technology from R.V.C.E, Bangalore. Presently,
he is pursuing his PhD on cloud computing security. He was working with VMware
pvt India ltd, PES Institute of Technology as Assistant Professor in ISE & CO**RI R
& D and DIAT-DRDO as a Officer In Charge Data Center. Presently he is working in
SGBIT as a Assistant Professor CSE dept. He has published cloud computing
research papers in many international journals and conferences. His research interest
areas are virtualization technology, cloud computing and software engineering. He is
a member in ISTE, IACSIT and IAEng., received best paper award in CLUSE2012. Ph: +91-7767076988,
Dr.D.H. Rao completed B.E, M.E, MBA, M.S, and Ph.D. He was working with
VTU, Jain College of Engineering, and GIT, Belagavi. He is a member of various
reputed bodies. He has published various papers in many reputed journals and
conferences. He was a chair in many international conferences. At present he is
working in SGBIT as a Professor CSE & Dean (Research and Skill), Belagavi.