Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
In today’s network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic algorithms to secure the data over the network through encryption and decryption
processes. The use of parallel processors is now common in both mobile and cloud computing scenarios.
Cryptographic algorithms are compute intensive and can significantly benefit from parallelism. This paper
introduces a parallel approach to symmetric stream cipher security algorithm known as RC4A, which is
one of the strong variants of RC4. We present an efficient parallel implementation to the compute intensive
PRGA that is pseudo-random generation algorithm portion of the RC4A algorithm and the resulted
algorithm will be named as PARC4-I. We have added some functionality in terms of lookup tables.
Modified algorithm is having four lookup tables instead of two and is capable of returning four distinct
output bytes at each iteration. Further, with the help of Parallel Additive Stream Cipher Structure and loop
unrolling method, encryption/decryption is being done on multi core machine. Finally, the results shows
that PARC4-I is a time efficient algorithm.
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
In today’s network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic algorithms to secure the data over the network through encryption and decryption
processes. The use of parallel processors is now common in both mobile and cloud computing scenarios.
Cryptographic algorithms are compute intensive and can significantly benefit from parallelism. This paper
introduces a parallel approach to symmetric stream cipher security algorithm known as RC4A, which is
one of the strong variants of RC4. We present an efficient parallel implementation to the compute intensive
PRGA that is pseudo-random generation algorithm portion of the RC4A algorithm and the resulted
algorithm will be named as PARC4-I. We have added some functionality in terms of lookup tables.
Modified algorithm is having four lookup tables instead of two and is capable of returning four distinct
output bytes at each iteration. Further, with the help of Parallel Additive Stream Cipher Structure and loop
unrolling method, encryption/decryption is being done on multi core machine. Finally, the results shows
that PARC4-I is a time efficient algorithm.
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
SPECTRUM SOLUTIONS is a Pondicherry based R&D firm which always looks forward in the field of science and technology to provide best technical support for the final year students. SPECTRUM has a great team of technical experts for the design development of Electronic and software Systems using Embedded, MATLAB, Java, Dot Net Technology.
SPECTRUM SOLUTIONS always concentrate us to provide quality products for various institutions and students. We offer the projects in all domains for the students of Diploma, B.Tech/B.E,M.Tech/M.E,MS,BCA,MCA etc. Our major concern is in the field of technical education to bridge the gap between Industry and Academics. We are always in the good eyes of the Educational Institutions in India to provide training & projects in Embedded Systems MATLAB and software technologies. We also provide interview training for free of cost. We never stop in going that extra mile ahead in providing greater value to own ideas of students, may it be in terms of providing adequate workforce proficient in highly application cost oriented Embedded Systems or Software Systems.
WEBSITE : www.spectrumpondicherry.blogspot.in/
FACEBOOK : https://www.facebook.com/pages/Spectrum-Solutions/548721691855495?ref=hl
Reactive Data Centric Architectures with DDSAngelo Corsaro
An increasing number of Software Architects realise that data is the most important asset of a system and start embracing the Data-Centric revolution (datacentricmanifesto.org) - setting data at the centre of their architecture and modelling applications as "visitors" to the data. At the same time, architects have also realised how reactive architectures (reactivemanifesto.org) facilitate the design of scalable, fault-tolerant and high performance systems. Few architects have yet realised how reactive and data-centric architectures are two sides of the same coin and as such should always go together. This presentation explains why reactive data-centric architecture is the future and how the OMG DDS Standard is uniquely positioned to support this paradigm shift. A series of case studies will highlight how the data-centric revolution is being applied in practice and what measurable benefits it is providing.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
The arrival of the cloud computing constructs cloud storage outsourcing turns out to be a mounting drift, which encourages the protected isolated data inspection an burning subject that materialize in the investigation writing. Newly a quantity of investigation regard as the trouble of protected and proficient public data truthfulness inspection for shared active data. Though, these methods are still not protected against the consent of cloud storage space server and invalidated group users through user invalidation in realistic cloud storage space method. Thus here in this paper, we Identify the conspiracy assault in the obtainable method and offer an well-organized public truthfulness inspection method with protected group user invalidation based on vector assurance and verifier-local invalidation group signature. We propose a tangible plan based on the our method explanation. Our method chains the public examination and well-organized user revocation and also some nice properties, such as confidently, efficiency, countability and traceability of secure group user invalidation. Finally, the security and experimental analysis show that,compared with its appropriate methods our scheme is also safe and well-organized.
Latest IEEE Projects on All Domains in Computer/ Electronics Engineering
____________________________________________
We develop projects for final year students in computer engineering. These are some topics which are feasible to implement.
For more topics please visit: www.ns2academy.in
Or call us on 9970186685/ 020 24394323
Or mail us: info@ns2academy.in
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingIJERA Editor
In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
Outsourced kp abe with chosen ciphertext securitycsandit
Key-Policy Attribute Based Encryption (KP-ABE) has always been criticized for its inefficiency
drawbacks. Based on the cloud computing technology, computation outsourcing is one of the
effective solution to this problem. Some papers have proposed their schemes; however,
adversaries in their attack models were divided into two categories and they are assumed not to
communicate with each other, which is obviously unrealistic. In this paper, we first proved there
exist severe security vulnerabilities in these schemes for such an assumption, and then proposed
a security enhanced Chosen Ciphertext Attack (SE-CCA) model, which eliminates the improper
limitations. By utilizing Proxy Re-Encryption (PRE) and one-time signature technology, we also
constructed a concrete KP-ABE outsourcing scheme (O-KP-ABE) and proved its security under
SE-CCA model. Comparisons with existing schemes show that our constructions have obvious
comprehensive advantages in security and efficiency.
But every organisation needs to make sure that it follows good health, safety and environmental practices.
Auditing is a structured comprehensive process used for verifying the efficiency, effectiveness and reliability of an organisation's occupational health, safety and environmental management system.
Green World Group in association BSCIC trains OHSAS 18001 Auditor courses. For further details Please visit http://greenwgroup.ae/
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
SPECTRUM SOLUTIONS is a Pondicherry based R&D firm which always looks forward in the field of science and technology to provide best technical support for the final year students. SPECTRUM has a great team of technical experts for the design development of Electronic and software Systems using Embedded, MATLAB, Java, Dot Net Technology.
SPECTRUM SOLUTIONS always concentrate us to provide quality products for various institutions and students. We offer the projects in all domains for the students of Diploma, B.Tech/B.E,M.Tech/M.E,MS,BCA,MCA etc. Our major concern is in the field of technical education to bridge the gap between Industry and Academics. We are always in the good eyes of the Educational Institutions in India to provide training & projects in Embedded Systems MATLAB and software technologies. We also provide interview training for free of cost. We never stop in going that extra mile ahead in providing greater value to own ideas of students, may it be in terms of providing adequate workforce proficient in highly application cost oriented Embedded Systems or Software Systems.
WEBSITE : www.spectrumpondicherry.blogspot.in/
FACEBOOK : https://www.facebook.com/pages/Spectrum-Solutions/548721691855495?ref=hl
Reactive Data Centric Architectures with DDSAngelo Corsaro
An increasing number of Software Architects realise that data is the most important asset of a system and start embracing the Data-Centric revolution (datacentricmanifesto.org) - setting data at the centre of their architecture and modelling applications as "visitors" to the data. At the same time, architects have also realised how reactive architectures (reactivemanifesto.org) facilitate the design of scalable, fault-tolerant and high performance systems. Few architects have yet realised how reactive and data-centric architectures are two sides of the same coin and as such should always go together. This presentation explains why reactive data-centric architecture is the future and how the OMG DDS Standard is uniquely positioned to support this paradigm shift. A series of case studies will highlight how the data-centric revolution is being applied in practice and what measurable benefits it is providing.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
The arrival of the cloud computing constructs cloud storage outsourcing turns out to be a mounting drift, which encourages the protected isolated data inspection an burning subject that materialize in the investigation writing. Newly a quantity of investigation regard as the trouble of protected and proficient public data truthfulness inspection for shared active data. Though, these methods are still not protected against the consent of cloud storage space server and invalidated group users through user invalidation in realistic cloud storage space method. Thus here in this paper, we Identify the conspiracy assault in the obtainable method and offer an well-organized public truthfulness inspection method with protected group user invalidation based on vector assurance and verifier-local invalidation group signature. We propose a tangible plan based on the our method explanation. Our method chains the public examination and well-organized user revocation and also some nice properties, such as confidently, efficiency, countability and traceability of secure group user invalidation. Finally, the security and experimental analysis show that,compared with its appropriate methods our scheme is also safe and well-organized.
Latest IEEE Projects on All Domains in Computer/ Electronics Engineering
____________________________________________
We develop projects for final year students in computer engineering. These are some topics which are feasible to implement.
For more topics please visit: www.ns2academy.in
Or call us on 9970186685/ 020 24394323
Or mail us: info@ns2academy.in
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingIJERA Editor
In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
Outsourced kp abe with chosen ciphertext securitycsandit
Key-Policy Attribute Based Encryption (KP-ABE) has always been criticized for its inefficiency
drawbacks. Based on the cloud computing technology, computation outsourcing is one of the
effective solution to this problem. Some papers have proposed their schemes; however,
adversaries in their attack models were divided into two categories and they are assumed not to
communicate with each other, which is obviously unrealistic. In this paper, we first proved there
exist severe security vulnerabilities in these schemes for such an assumption, and then proposed
a security enhanced Chosen Ciphertext Attack (SE-CCA) model, which eliminates the improper
limitations. By utilizing Proxy Re-Encryption (PRE) and one-time signature technology, we also
constructed a concrete KP-ABE outsourcing scheme (O-KP-ABE) and proved its security under
SE-CCA model. Comparisons with existing schemes show that our constructions have obvious
comprehensive advantages in security and efficiency.
But every organisation needs to make sure that it follows good health, safety and environmental practices.
Auditing is a structured comprehensive process used for verifying the efficiency, effectiveness and reliability of an organisation's occupational health, safety and environmental management system.
Green World Group in association BSCIC trains OHSAS 18001 Auditor courses. For further details Please visit http://greenwgroup.ae/
Parkinson's disease motor symptoms in machine learning a reviewhiij
This paper reviews related work and state-of-the-ar
t publications for recognizing motor symptoms of
Parkinson's Disease (PD). It presents research effo
rts that were undertaken to inform on how well
traditional machine learning algorithms can handle
this task. In particular, four PD related motor
symptoms are highlighted (i.e. tremor, bradykinesia
, freezing of gait and dyskinesia) and their detail
s
summarized. Thus the primary objective of this rese
arch is to provide a literary foundation for develo
pment
and improvement of algorithms for detecting PD rela
ted motor symptoms.
ELECTRONIC MEDICAL RECORD (EMR) SYSTEMS ARE BEING IMPLEMENTED INCREASINGLY WORLDWIDE. SAUDI
ARABIA IS ONE OF DEVELOPING COUNTRIES THAT COMMENCED IMPLEMENTING SUCH SYSTEMS IN 1988. WHILST
EMR UPTAKE HAS BEEN LOW IN SAUDI ARABIA UNTIL NOW, A NUMBER OF HOSPITALS HAVE IMPLEMENTED EMR
SYSTEMS SUCCESSFULLY. THIS PAPER ANALYSES AVAILABLE STUDIES (N=28) IN THE LITERATURE REGARDING EMR
IMPLEMENTATION IN SAUDI ARABIA TO IDENTIFY THE PROGRESS OF EMR IMPLEMENTATION TO DATE AND TO
IDENTIFY THE FACILITATORS AND BARRIERS TO IMPLEMENTATION.
IMPLEMENTING ELECTRONIC HEALTH RECORDS IN NEW ZEALAND: A CRITICAL APPRAISAL O...hiij
New Zealand health sector has increasing demands in theageing population and ongoing inflation of medical costs. These demands are growing, and the importance of technology could optimise the healthcare sector performance. Advancement in technology drives Electronic Health Records
implementation to add substantial value to health delivery systems. The investment and promotion of health informationinfrastructure have positioned New Zealand as a world leader in the field of primary care sector. Factors such as organisation structure, culture, leadership and workflow design are important to achieving successful implementation of Electronic Health Records. This review intends to critically appraise the advantages of EHRs over paper-based records (PBRs). It outlines the measures introduced by Ministry of Health to implement EHRs across the health sector in New Zealand. Furthermore, the review will provide an international comparison in implementing EHRs with that of New Zealand.
Survey of open source health information systemshiij
Due to the Health Information Technology for Economic and Clinical Health Act (HITECH), the US
medical industry has been given a directive to transition to electronic health records. Electronic Health
Records will enhance efficiency and quality of patient care. In this paper, open-source health information
systems are surveyed.These systems include electronic medical records, electronic health records and
personal health record systems. Their functionality, implementation technologies used, and security
features are discussed.
When most patients visit physicians in a clinic or a hospital, they are asked about their medical history and related medical tests’ results which might not exist or might simply have been lost over time. In emergency situations, many patients suffer or sadly die because of lack of pertinent medical information. Patient’s Health information (PHI) saved by Electronic Medical Record (EMR) could be accessible only by a hospital using their EMR system. Furthermore, Personal Health Record (PHR) information cannot be solely relied on since it is controlled solely by patients. This paper introduces a novel framework for accessing, sharing, and controlling the medical records for patients and their physicians globally, while patients’ PHI are securely stored and their privacy is taken into consideration. Based on the framework, a proof of concept prototype is implemented. Preliminary performance evaluation results indicate the validity and viability of the proposed framework.
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...ijcisjournal
Cloud computing technology provides various internet-based services. Many cloud computing vendors are offering cloud services through their own service mechanism. These mechanisms consist of various service parameters such as authentication, security, performance, availability, etc. Customer can access these cloud services through web browsers using http protocols. Each protocol has its own way of achieving the request-response services, authentication, confidentiality and etc. Cloud computing is an internet-based technology, which provides Infrastructure, Storage, Platform services on demand through a browser using HTTP protocols. These protocol features can be enhanced using cloud specific protocol, which provides strong authentication, confidentiality, security, integrity, availability and accessibility. We are proposing and presenting the secure cloud transmission protocol (SCTP) engineering phases which sits on top of existing http protocols to provide strong authentication security and confidentiality using multi-models. SCTP has multi-level and multi-dimensional approach to achieve strong authentication and multi-level security technique to achieve secure channel. This protocol can add on to existing http protocols. It can be used in any cloud services. This paper presents proposed Protocol engineering phases such as Service Specification, Synthesis, Analysis, Modelling, and Implementation model with test suites. This paper is represents complete integration of our earlier proposed and published multilevel techniques
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud
The Difference Impact on QoS Parameters between the IPSEC and L2TPAM Publications
Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
Hierarchal attribute based cryptographic model to handle security services in...IJECEIAES
The sharing of information in the cloud is a unique element of the environment, but there is a risk that the information may land with the wrong people. To counterattack this problem, security-associated methodologies were used to secure the information that was readily available to clients. Despite the lack of benefits, this provides productive/adaptability and dependability in access control strategies between clients in the sharing of information. The novel hierarchal attribute- based cryptographic security model (NHACSM) is being proposed to provide adaptability, versatility, and access control in sharing information in the appropriate climate. This model allows clients to share information in a hierarchal way, allowing for a productive assessment of access control strategy and improved security. The NHACSM method is used to reduce the total time values for different user instances compared to conventional approaches, for example, attribute-set-based encryption (ASBE), key-policy attribute-based encryption (KP-ABE), and ciphertext-policy attribute-based encryption (CP-ABE). With respect to 10 instances existing methods achieve 2.7, 2.5, and 2.3 respectively, and also compared to 20, 30, 40, and 50 instances, our proposed method is low. The encryption and decryption time evaluation values and performance evaluation of different approaches, ASBE, CP-ABE, were taken into account when increasing the user instance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing
services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses on
the applicability of a new fully homomorphic encryption scheme (FHE) in solving data security in cloud computing. Different types
of existing homomorphic encryption schemes, including both partial and fully homomorphic encryption schemes are reviewed. The
study was aimed at constructing a fully homomorphic encryption scheme that lessens the computational strain on the computing
assets as compared to Gentry’s contribution on partial homomorphic encryption schemes where he constructed homomorphic
encryption based on ideal lattices using both additive and multiplicative Homomorphisms. In this study both addition and
composition operations implementing a fully homomorphic encryption scheme that secures data within cloud computing is used. The
work is founded on mathematical theory that is translated into an algorithm implementable in JAVA. The work was tested by a single
computing hardware to ascertain its suitability. The newly developed FHE scheme posted better results that confirmed its suitability
for data security in cloud computing.
In general, the Cloud computing utilization becomes unavoidable in each and every data
communication as well as the service sharing center with various applications. Based on the requirements, the
clients are performing service selection (such as infrastructure, software or platforms) towards to fulfil their
needs in optimized manner. Whenever the data is going to be stored in a third party network, it automatically
brings a question mark for secure access along with its storage infrastructure. The security for data transaction
between cloud service providers and cloud clients is forever carry with the help of crypto graphic algorithms
either it may be an symmetric or asymmetric key generation mechanism with certain limitations . In this
research paper implement a new approach for ensure the secure data transaction by using Orthogonal
Handshaking Authentication Mechanism under cloud along with a proposed storage authentication protocol. It
creates a roadmap for data retrieval progress of authenticated cloud users among the service access in cloud
computing. Data on Cloud storage will get an encrypted format by using a symmetric key helps to maintain its
security and authentication will provide the cloud data utilization with appropriate cloud users.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and
service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
Similar to IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL (20)
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
HEALTH DISPARITIES: DIFFERENCES IN VETERAN AND NON-VETERAN POPULATIONS USING ...hiij
Introduction: This study investigated self-reported health status, health screenings, vision problems, and
vaccination rates among veteran and non-veteran groups to uncover health disparities that are critical for
informed health system planning for veteran populations.
Methods: Using public-use data from the National Health Interview Survey (2015-2018), this study adopts
an ecologic cross-sectional approach to conduct an in-depth analysis and visualization of the data assisted
by Generative AI, specifically ChatGPT-4. This integration of advanced AI tools with traditional
epidemiological principles enables systematic data management, analysis, and visualization, offering a
nuanced understanding of health dynamics across demographic segments and highlighting disparities
essential for veteran health system planning.
Findings: Disparities in self-reports of health outcomes, health screenings, vision problems, and
vaccination rates were identified, emphasizing the need for targeted interventions and policy adjustments.
Conclusion: Insights from this study could inform health system planning, using epidemiological data
assessment to suggest enhancements for veteran healthcare delivery. These findings highlight the value of
integrating Generative AI with epidemiological analysis in shaping public health policy and health
planning.
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...hiij
The COVID-19 pandemic has been a watershed moment in public health surveillance, highlighting the
crucial role of data-driven insights in informing health actions and policies. Revisiting key concepts—
public health, epidemiology in public health practice, public health surveillance, and public health
informatics—lays the foundation for understanding how these elements converge to create a robust public
health surveillance system framework. Especially during the COVID-19 pandemic, this integration was
exemplified by the WHO efforts in data dissemination and the subsequent global response. The role of
public health informatics emerged as instrumental in this context, enhancing data collection, management,
analysis, interpretation, and dissemination processes. A logic model for public health surveillance systems
encapsulates the integration of these concepts. It outlines the inputs and outcomes and emphasizes the
crucial actions and resources for effective system operation, including the imperative of training and
capacity development.
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTShiij
Glycated haemoglobin does not allow you to highlight the effects that food choices, physical activity and
medications have on your glycaemic control day by day. The best way to monitor and keep track of the
immediate effects that these have on your blood sugar levels is self-monitoring, therefore the use of a
glucometer. Thanks to this tool you have the possibility to promptly receive information that helps you to
intervene in the most appropriate way, bringing or keeping your blood sugar levels as close as possible to
the reference values indicated by your doctor. Currently, blood glucose meters are used to measure and
control blood glucose. Diabetes is a fairly complex disease and it is important for those who suffer from it
to check their blood sugar (blood sugar) periodically throughout the day to prevent dangerous
complications. Many children newly diagnosed with diabetes and their families may face unique challenges
when dealing with the everyday management of diabetes, including treatments, adapting to dietary
changes, and the routine monitoring of blood glucose. Many questions may also arise when selecting a
blood glucose meter for paediatric patients. With current blood glucose meters, even with multiple daily
self-tests, high and low blood glucose levels may not be detected. Key factors that may be considered when
selecting a meter include accuracy of the meter; size of the meter; small sample size required for testing;
ease of use and easy-to-follow testing procedure; ability for alternate testing sites; quick testing time and
availability of results; ease of portability to allow testing at school and during leisure time; easyto- read
numbers on display; memory options; cost of meter and supplies. In this study we will show a new
automatic portable, non-invasive device and painless for the daily continuous monitoring (24 hours a day)
of blood glucose in paediatric patients.
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMShiij
This review article examines the role of machine learning (ML) in enhancing Clinical Decision Support
Systems (CDSSs) within the modern healthcare landscape. Focusing on the integration of various ML
algorithms, such as regression, random forest, and neural networks, the review aims to showcase their
potential in advancing patient care. A rapid review methodology was utilized, involving a survey of recent
articles from PubMed and Google Scholar on ML applications in healthcare. Key findings include the
demonstration of ML's predictive power in patient outcomes, its ability to augment clinician knowledge,
and the effectiveness of ensemble algorithmic approaches. The review highlights specific applications of
diverse ML models, including moment kernel machines in predicting surgical outcomes, k-means clustering
in simplifying disease phenotypes, and extreme gradient boosting in estimating injury risk. Emphasizing
the potential of ML to tackle current healthcare challenges, the article highlights the critical role of ML in
evolving CDSSs for improved clinical decision-making and patient care. This comprehensive review also
addresses the challenges and limitations of integrating ML into healthcare systems, advocating for a
collaborative approach to refine these systems for safety, efficacy, and equity.
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...hiij
The COVID-19 pandemic has been a watershed moment in public health surveillance, highlighting the
crucial role of data-driven insights in informing health actions and policies. Revisiting key concepts—
public health, epidemiology in public health practice, public health surveillance, and public health
informatics—lays the foundation for understanding how these elements converge to create a robust public
health surveillance system framework. Especially during the COVID-19 pandemic, this integration was
exemplified by the WHO efforts in data dissemination and the subsequent global response. The role of
public health informatics emerged as instrumental in this context, enhancing data collection, management,
analysis, interpretation, and dissemination processes. A logic model for public health surveillance systems
encapsulates the integration of these concepts. It outlines the inputs and outcomes and emphasizes the
crucial actions and resources for effective system operation, including the imperative of training and
capacity development.
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMShiij
This review article examines the role of machine learning (ML) in enhancing Clinical Decision Support
Systems (CDSSs) within the modern healthcare landscape. Focusing on the integration of various ML
algorithms, such as regression, random forest, and neural networks, the review aims to showcase their
potential in advancing patient care. A rapid review methodology was utilized, involving a survey of recent
articles from PubMed and Google Scholar on ML applications in healthcare. Key findings include the
demonstration of ML's predictive power in patient outcomes, its ability to augment clinician knowledge,
and the effectiveness of ensemble algorithmic approaches. The review highlights specific applications of
diverse ML models, including moment kernel machines in predicting surgical outcomes, k-means clustering
in simplifying disease phenotypes, and extreme gradient boosting in estimating injury risk. Emphasizing
the potential of ML to tackle current healthcare challenges, the article highlights the critical role of ML in
evolving CDSSs for improved clinical decision-making and patient care. This comprehensive review also
addresses the challenges and limitations of integrating ML into healthcare systems, advocating for a
collaborative approach to refine these systems for safety, efficacy, and equity.
Health Informatics - An International Journal (HIIJ)hiij
Healthcare Informatics: An International Journal is a quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics. Original contributions are solicited on topics covered under the broad areas such as (but not limited to) listed below:
The Proposed Guidelines for Cloud Computing Migration for South African Rural...hiij
It is now overdue for the hospitals in South African rural areas to implement cloud computing technologies in order to access patient data quickly in an emergency. Sometimes medical practitioners take time to attend patients due to the unavailability of kept records, leading to either a loss of time or the reassembling of processes to recapture lost patient files. However, there are few studies that highlight challenges faced by rural hospitals but they do not recommend strategies on how they can migrate to cloud computing. The purpose of this paper was to review recent papers about the critical factors that influence South African hospitals in adopting cloud computing. The contribution of the study is to lay out the importance of cloud computing in the health sectors and to suggest guidelines that South African rural hospitals can follow in order to successfully relocate into cloud computing.The existing literature revealed that Hospitals may enhance their record-keeping procedures and conduct business more effectively with the help of the cloud computing. In conclusion, if hospitals in South African rural areas is to fully benefit from cloud-based records management systems, challenges relating to data storage, privacy, security, and the digital divide must be overcome.
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATAhiij
While online survey systems facilitate the collection on copious records on diet, exercise and other healthrelated data, scientists and other public health experts typically must download data from those systems
into external tools for conducting statistical analyses. A more convenient approach would enable
researchers to perform analyses online, without the need to coordinate additional analysis tools. This
paper presents a system illustrating such an approach, using as a testbed the WAVE project, which is a 5-
year childhood obesity prevention initiative being conducted at Oregon State University by health scientists
utilizing a web application called WavePipe. This web application has enabled health scientists to create
studies, enrol subjects, collect physical activity data, and collect nutritional data through online surveys.
This paper presents a new sub-system that enables health scientists to analyse and visualize nutritional
profiles based on large quantities of 24-hour dietary recall records for sub-groups of study subjects over
any desired period of time. In addition, the sub-system enables scientists to enter new food information
from food composition databases to build a comprehensive food profile. Interview feedback from novice
health science researchers using the new functionality indicated that it provided a usable interface and
generated high receptiveness to using the system in practice.
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEWhiij
#Health #clinic #education #StaySafe #pharmacy #healthylifestyle
call for papers..!
-----------------------------
Health Informatics: An International Journal (HIIJ)
ISSN : 2319 - 2046 (Online); 2319 - 3190 (Print)
Here's where you can reach us : hiij@aircconline.com
visit us on : https://airccse.org/journal/hiij/index.html
**************
published articles..!
AN EHEALTH ADOPTION FRAMEWORK FOR
DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
https://aircconline.com/hiij/V10N3/10321hiij01.pdf
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...hiij
The tuberculosis burden is higher in the population from low- and middle-income countries (LMICs) and
differently affects gender. This review explored risk factors that determine gender disparity in tuberculosis
in LMICs. The research design was a systematic review. Three databases; Google Scholar, PubMed, and
HINARI provided 69 eligible papers.The synthesized data were coded, grouped and written in a descriptive
narrative style. HIV-TB co-infected women had a higher risk of mortality than TB-HIV-infected men. The
risk of Vitamin-D deficiency-induced tuberculosis was higher in women than in men. Lymph node TB,
breast TB, and cutaneous and abdominal TB occurred commonly in women whereas pleuritis, miliary TB,
meningeal TB, pleural TB and bone and joint TB were common in men. Employed men had higher contact
with tuberculosis patients and an increased chance of getting the disease. Migrant women were more likely
to develop tuberculosis than migrant men. The TB programmers and policymakers should balance the
different gaps of gender in TB-related activities and consider more appropriate approaches to be genderbased and have equal access to every TB-associated healthcare.
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...hiij
Medical and health data that have been entered into an electronic data system in real-time cannot be
assumed to be accurate and of high quality without verification. The adoption of the electronic health
record (EHR) by many countries to the support care and treatment of patients illustrates the importance of
high quality data that can be shared for efficient patient care and the operation of healthcare systems.
This brief communication provides a high-level overview of an EHR system and practices related to high
data quality and data hygiene that could contribute to the analysis and interpretation of EHR data for use
in patient care and healthcare system administration.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
1. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
10.5121/ijccsa.2017.7103 17
IMPROVED SECURE CLOUD TRANSMISSION
PROTOCOL
Dinesha H A1
and D.H. Rao2
1
Assistant Professor, Department of CSE,
S.G. Balekundri Institute of Technology, Belagavi, India
2
Professor, Department of CSE,
S.G. Balekundri Institute of Technology, Belagavi, India
ABSTRACT
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
KEYWORDS
Authentication, Cryptography, Intruder, Multidimensional, Multilevel;
1. INTRODUCTION
Cloud computing offers many cloud services in internet world. Cloud computing can be accessed
through its own way. In literature many cloud protocol has been proposed to address many issues
in cloud computing. It could be auditing, accounting, authentication, security and etc. However
we surveyed many protocols proposed for cloud computing. Firstly, Cloud Gossip Protocol for
Dynamic Resource Management [1] addresses the problem of dynamic resource management for
a large-scale cloud environment. Research contribution including outlining distributed
middleware architecture and presenting one of its key elements: a gossip protocol that ensures fair
resource allocation among sites/applications, dynamically adapts the allocation to load changes
and scales both in the number of physical machines and sites/applications [1].In IEEE
Transaction on Parallel Distributed Systems[2], authors proposed a dynamic auditing protocol
that can support the dynamic operations of the data on the cloud servers. Disadvantage of this
method may leak the data content to the auditor because it requires the server to send the linear
combinations of data blocks to the auditor [2]. IEEE Transaction on Parallel Distributed Systems
[2] proposed an efficient and inherently secure dynamic auditing protocol. It protects the data
privacy against the auditor by combining the cryptography method with the bi-linearity property
of bilinear paring, rather than using the mask technique [2]. In IEEE conf Access Protocols-2013
2. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
18
[3], they developed nearby share retrieval protocols for single-version systems to improve the
read access latency [3]. Cloud Fault Tolerance Protocol [4] proposes a collaborative fault-tolerant
transfer protocol for replicated data available on the Cloud and the Grid during exceptional faults
[4]. Agent-Based User Authentication and Access Control-2013 [5] proposed model was named
ACUA (Access Control and User Authentication) model that contains appropriate tools for
validating user legal identities and acquiring their access control privileges for the resources
according to the role information. Limited to some platform, Compatibility issue [5].In IEEE
Nifco [6][7], authors extended their dynamic auditing scheme to be privacy preserving and
support the batch auditing for multiple owners. However, due to the large number of data tags,
their auditing protocols will incur a heavy storage overhead on the server [6][7]. IaaS
Authentication [8] presents a full system architecture allowing the authentication and secured
execution of binary files using hardware-assisted on-the-fly memory encryption/decryption. In a
context of general blurring of the physical relationship between a user and the computer which it
eventually interacts, this architecture has been thought so as to achieve a certain degree of
robustness against corruptions in a cloud computing [8]. Graphic Password Authentication [9]
depicts as a secure authentication mechanism using graphical password should be proposed in
this paper for improving traditional authentication mechanism and let users access cloud services
securely [9]. It is breakable by shoulder surfing attack. Secured Biometric Authentication [10], in
2012, An analyzed the authentication introduced by Das and claimed that the scheme of Das was
under various attacks and proposed an improvement [10]. Biometric Authentication [11] Propose
an improvement to overcome DOS and Server Spoofing security problems. The security analyses
and performance evaluations show that our scheme is more secure and efficient [11].
Complexities are separate device and infrastructure to be placed. RFID based authentication [12],
proposed cloud-based RFID authentication scheme enables readers anonymously access the cloud
through wired or wireless VPN connections [12]. An encrypted hash table is utilized to prevent
clients’ (readers and tags) secrets from revealing to the cloud. The first RFID authentication
protocol preserving readers and tags privacy against an un trusted database keeper is
proposed.[12]. Eid Authentication [13] proposed to close this gap for such cloud applications by
applying the STORK framework for secure cloud authentication using eIDs. The STORK
framework supports various national eID solutions and will be the relevant eID framework across
Europe in future. We demonstrated our approach by enabling eID authentication at two selected
public cloud service providers. Finally, we also moved the STORK framework to the cloud to
apply the full cloud computing paradigm [13]. Authentication Protocol [14] Reported issues and
proposed brief solutions on privileged access, authenticated access user types bug, vulnerability
of platforms. Multi-tenanted application isolation, authentication privileges to particular user Data
Protection, Integrity, vulnerability Physical security, Privileged access rights, control and
monitoring maintaining infrastructure, communication channel security, intruder detection[14] .
These protocols and its limitation motivates us to think for new protocol which can take care of
authentication, authorization, access control, security, confidentiality and intruder
detection/prevention system in a single protocol execution. Hence we proposed secure cloud
transmission protocol which can deal with all these issue.
This paper has organized in the following manner: Chapter 2 presents the proposed SCTP and its
techniques, Chapter 3, presents the SCTP Petrinet models and its mathematical analysis. Chapter
4 concludes the paper with its limitation.
2. SECURE CLOUD TRANSMISSION PROTOCOL
Proposed secure cloud transmission protocol (SCTP) has its own communication techniques
algorithms to achieve strong authentication, security, confidentiality and Intruder detection.
SCTP may be a solution to the many issues reported in literature. SCTP has two phases
3. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
19
initialization phase and execution phase as shown in figure 1. As shown in table 1, In
initialization phase, SCTP initializes the cloud application with SCTP multi-levels, inputs to
generate passwords, questionnaires for intruder detections and etc. In execution phase, it executes
all its proposed techniques [15][16][17]. SCTP performs strong authentications, secure channel
and intruder detection through its designed techniques which are described in table 2. SCTP
techniques research work summary and its significance have been presented in table 3.
Figure 1. SCTP Phases: Initialization & Execution
Table 1. SCTP Phases and Its Action
Table 2. SCTP Major Three Techniques
4. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
20
Table3. SCTP Technique Research Summary
3. SCTP PETRINET MODEL
Petrinet theory is used in modeling network and protocol [28]. Hence we selected petrinet model
in SCTP modeling, later this model helps to derive mathematical expression and easy analysis.
This section presents petrinet models for SCTP. Figure 2, presents overview of SCTP which
depicts the SCTP techniques and production flow based on different places and transitions. SCTP
Starts with its initialization phase then SCTP execution proceed. SCTP MLA derived in places
{P0, P1, P2, P9} and Transition {T0, T1, T2, T8, T11}. SCTP MLA Levels P0, P1 and P2
receive MDP from T5, T6 and T7 respectively. States P6, P7 and P8 Generates the MDP
passwords. After successful reaching P3 states with 3 token (MDP passwords), based on cloud
service types MLC and IM gets executes. SCTP ends at P5 state. Figure 3 presents, detailed
Petrinet Model for SCTP which describes detailed techniques of SCTP such as MLA [18], MDP
[21] , MLC[22] and IM[23]. Figure 4, presents the petrinet Model of SCTP without notation
which helps to derive mathematical expression of SCTP techniques.
5. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
21
Figure 2. Overview of SCTP
Figure 3. SCTP Detailed Petri net Model
6. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
22
Figure 4. SCTP Detailed Petri net Model without notation
Refer to figure 4, SCTP starts by firing transition T 28 at P0 and ends after firing transition T26 &
T27 at P26. Let us derive places and transition for each SCTP techniques discussed earlier, i) A
= MLA = {P0,P1,P2,P13,P12} {T20,T0,T1,T2,T5,T6,T7,T11,T12,T13}, ii) P = MDP =
{P6,P7,P8,P9,P10,P11} {T8,T9,T10}, iii) C = MLC = {P4,P14,P15,P16,P17,P18,P19,P20,P21}
{T3,T14,T15,T16,T17,T18,T19,T20,T26} iv) I = IM = {P5,P22,P23,P24,P25}
{T4,T22,T23,T24,T25,T27}. Hence SCTP= { AUPUCUI} {AUP} is to achieve Strong
Authentication, C to achieve Secure Channel, I to ensure Intruder Detection and Prevention.
DETAILED ANALYSIS
A Petri net graph is a 4 tuple (S,T,W,M0) where S is a finite set of places represents
states/conditions, T is a finite set of transitions represents action/execution. S &T are disjoint, that
means no object can be both a place and a transition. W:(S x T) U (T X S) -> N is a multiset of
arcs, i.e. it assigns to each arc a non-negative integer arc multiplicity. Refer to figure 3, N
represents SCTP. No arc may connect two places or two transitions. The flow relation is the set of
arcs, F={(x, y)| W(x, y) > 0}. In texts often define Petri nets using F instead of W. When using
this convention, a Petri net graph is a bipartite multigraph (S U T, F) with node partitions S and T.
The preset of a transition t is the set of its input places: t={s € S | W(s, t)>0}; its postset is the set
of its output places: t={s € S | W(t, s)>0}. SCTP each techniques places and transition described
in figure 3. M0 is the initial marking, a marking of the Petri net graph. Firing a transition t in a
marking M consumes W(s,t) tokens from each of its input places s, and produces W(t,s) tokens in
each of its output places s. SCTP each techniques tokens described in figure 3. We are generally
interested in what may happen when transitions may continually fire in arbitrary order. A firing
sequence for a Petri net with graph G and initial marking M0 is a sequence of transitions σ
=<ti1...tin> such that M0--> G,ti1 M1^...^Mn-1 --> Mn.
Formulation in terms of vectors and matrices, its transition relation can be described as a pair of
|S| by |T| matrices
• W-
, defined by ɏ,t:W-
[s, t] = W(s, t)
• W+
, defined by ɏ,t:W+
[s, t] = W(t, s)
The set of firing sequences is denoted as L(N). Firing sequence of SCTP techniques A, C & I are
derived below.
7. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
23
A= (P0,T0,P1,T1,P2,T2)
C =(P4,T14,P14,T15,P15,T16,P16,T20)
I = (P5,T23,P23,T14,P24,T25,P25,T27)
Then their difference WT
= W+
- W-
can be used to describe the reachable markings in terms of
matrix multiplication, as follows. For any sequence of transitions w, write 0(w) for the vector that
maps every transition to its number of occurrences in w. Then, we have R(N)={M | ᴲw:M=M0 +
WT . 0(w)^w is a firing sequence of N}.
SCTP MLA, MLC and IM reachability and technique firing sequence derivations illustrated in
table 4.
Let us apply probability and analyze the failure of SCTP technique execution. Let us take SCTP
as sample space S , its techniques(A,C & I) firing sequence as mutual disjoint subsets A1, A2,
A3, E are events (executions) and subset of S for technique execution. S= A U A2 U A3 Then E
=E ᴒ S, => E ᴒ (A U A2 U A3) => (E ᴒ A1) (E ᴒ A2) (E ᴒ A3). Since E ᴒ A are disjoint we
obtain P(E)= P(E ᴒ A1)+ P(E ᴒA2)+P(E ᴒ A3), using multiplication theorem we obtain,
P(E ᴒA3)=P(A3 ᴒ E)= P(A3)P(EA3). Thus we arrive total probability P(E)= P(A1)(P(EA1)+
(P(EA2)+ (P(EA3). Let us apply bayes theorem k =1,2,3 the multiplication theorem for
conditional probability tells that P(Ak ᴒE)=P(Ak)P(E|Ak). Therfore P(Ak|E) = P(Ak ᴒE)/P(E)
=> P(Ak)P(E/Ak)/P(E) use law of total probability for denominator P(E). Hence , P(Ak/E)=
P(Ak)P(E/Ak)/ P(A1)(P(EA1)+ (P(EA2)+ (P(EA3).
Considering MLC upload and MLC download independent events as P (AᴒB) = P (A) P (B)
Table 4 . SCTP Techniques firing sequence matrix analysis
4. CONCLUSION AND LIMITATION
SCTP techniques to achieve cloud specific strong authorization and authentication, secure
channel and intruder has been designed. SCTP MLA & MDP to ensure strong authentication,
SCTP MLC to achieve strong authentication and SCTP IM to achieve usage profile based
intruder detection & prevention has been designed. SCTP techniques complete design has been
presented using Petrinet production model. SCTP petrinet models and its analysis are presented.
SCTP performance analysis has been made to compares with existing techniques that are
proposed to achieve authentication, authorization, security and intruder prevention. SCTP
designed to protect against different attack mentioned in literature. SCTP can be used in cloud
application where it needs higher security such as defense, military, university marks database
8. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
23
and etc. Simpler application and generic application may not be required such a strong
authentication, secure channel and intruder detection as it leads to unnecessary complexity.
ACKNOWLEDGMENT
Our sincere thanks to Dr. Karisiddappa, Vice Chancellor and Dr. H. N. Jagannatha Reddy,
Registrar VTU Belagavi, for their constant encouragement & support.
REFERENCES
[1] Fetahi Wuhib, Rolf Stadler, and Mike Spreitzer, A Gossip Protocol for Dynamic Resource
Management in Large Cloud Environments, IEEE TRANSACTIONS ON NETWORK AND
SERVICE MANAGEMENT, VOL. 9, NO. 2, 1932-4537, 213-225,June-2012.
[2] Kan Yang, Xiaohua Jia, An Efficient and Secure Dynamic Auditing Protocol for Data Storage in
Cloud Computing, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 24, NO. 9, SEPTEMBER 2013, 1717-1726.
[3] Yunqi Ye, Liangliang Xiao, Yinzi Chen, I-Ling Yen, Farokh Bastani , Ing-Ray Chen, Access
Protocols in Data Partitioning Based Cloud Storage, 2013 IEEE Sixth International Conference on
Cloud Computing, 978-0-7695-5028-2/13, 398-397, 2013.
[4] Nader Mohamed and Jameela Al-Jaroodi, A Collaborative Fault-Tolerant Transfer Protocol for
Replicated Data in the Cloud,IEEE transaction, 978-1-4673-1382-7/12, 203-210, 2012.
[5] Mostafa Hajivali , Faraz Fatemi Moghaddam , Maen T. Alrashdan , Abdualeem Z. M. Alothmani ,
Applying an Agent-Based User Authentication and Access Control Model for Cloud Servers, ICTC
2013, 978-1-4799-0698-7/13, 807-902,2013.
[6] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for
Storage Security in Cloud Computing,” IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5,pp.
847-859, May 2011.
[7] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage
Security in Cloud Computing,”, Proc. IEEE INFOCOM, pp. 525-533, 2010
[8] Authentication and secured execution for the Infrastructure-as-a-Service layer of the Cloud
Computing model, Laurent Hubert, Renaud Sirdey, 2013 Eighth International Conference on P2P,
Parallel, Grid, Cloud and Internet Computing, 978-0-7695-5094-7, 291-296, 2013.
[9] Ming-Huang Guo, Horng-Twu Liaw, Li-Lin Hsiao, Chih-Ta Yen, Authentication Using Graphical
Password in Cloud, 177-181, 2013.
[10] Z. J. Zhu, Z. W. Gao, Y. Li, A SECURE BIOMETRIC-BASED AUTHENTICATION SCHEME
USING SMART CARD,IEEE, H. B. Tang39-43,2013.
[11] A. K. Das, “Analysis and improvement on an efficient biometric-based remote user authentication
scheme using smart cards”, IET Information Security, 5 (3), pp. 145-151, 2011.
[12] Wei Xie1, Lei Xie2, Chen Zhang1, Quan Zhang1, Chaojing Tang1, Cloud-based RFID
Authentication, 2013 IEEE International Conference on RFID, 978-1-4673-5750-0/13,168-175, 2013.
[13] Bernd Zwattendorfer, Arne Tauber,SECURE CLOUD AUTHENTICATION USING EIDS,
Proceedings of IEEE CCIS2012, 978-1-4673-1857-0/12/, 397-401, 2012.
[14] Safiriyu Eludiora1, Olatunde Abiona2, et. al, A User Identity Management Protocol for Cloud
Computing Paradigm , in Int. J. Communications, Network and System Sciences, 2011, 4, 152-163
[15] Dinesha H.A, D.H.Rao,"Evaluation of Secure Cloud Transmission Protocol", International Journal of
Computer Network and Information Security(IJCNIS), Vol.9, No.3, pp. 45-53, 2017.DOI:
10.5815/ijcnis.2017.03.06
[16] Dinesha H A, Dr.V.K Agrawal, “Development of Secure Cloud Transmission Protocol (SecCTP)
Engineering Phases: Multilevel Security & Cryptography”, International Journal on Cryptography and
Information Security (IJCIS) ISSN: 1839-8626, December 2015.
[17] Dinesha H A, Dr. V. K Agrawal, “Framework Design of Secure Cloud Transmission Protocol”, IJCSI
International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013, ISSN (Print):
1694- 0784 | ISSN (Online): 1694-0814,74-81.
[18] Dinesha H A, Dr.V.K.Agrawal, “Multi-level Authentication Technique for Accessing Cloud
Services”, IEEE International Conference on Computing, Communication and Applications (ICCCA-
2012), Dindigul, Tamilnadu, India, 22-24 February 2012, 978-1-4673-0270-8, 1 – 4.
9. International Journal On Cloud Computing: Services And Architecture (IJCCSA) Vol. 7, No. 1, February 2017
23
[19] R. Monica, Dinesha H A, Dr.V.K Agrawal, “Wireless Sensor-Cloud Integration Using Ant Colony
Routing Algorithm”, International Conference on cloud computing and service engineering
(CLUSE2012), held at Raja Rajeshwari College of Engineering & KINGSTON, UK, 11-13 April
2012, 294-298, Received Best Paper Award, Referred to ISEEC Journal.
[20] Dinesha H A, R Monica and V.K. Agrawal, “Formal Modeling for Multi-Level Authentication in
Sensor-Cloud Integration System”. International Journal of Applied Information Systems 2(3) (IJAIS)
Published by Foundation of Computer Science, New York, USA, May 2012, 16-21.
[21] Dinesha H A, Dr. V. K Agrawal, “Multi-dimensional Password Generation Technique for accessing
cloud services”, Special Issue on: "Cloud Computing and Web Services", International Journal on
Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.3, June 2012, 31-39.
[22] Dinesha H A, Dr.V.K Agrawal, “Multilevel Cryptography with Metadata and Lock Approach for
Storing Data in Cloud”, Springer Journal of Cryptographic Engineering (JCEN) (submitted).
[23] Dinesha H A, Dr.V.K Agrawal, “Usage Profile Based Intruder Detection System for accessing cloud
service”, Transactions on Networks and Communications, Volume 2, Issue 6, 10.14738/tnc.26.590.
Dec 2014.
[24] Ms. R Monica, Mr.Dinesha H.A,Prof.V.K Agrawal, “Cloud Computing – Phone Call as a Service: A
Concept”, to IEEE Internl.. Conference on Advances in Computing, Communications and Informatics
(ICACCI-2013), 978-1-4799-2432-5, 13861185, 22-25 Aug. 2013, 236 – 242.
[25] Abhishek A, Dinesha H A, Dr. V. K Agrawal, “Cloud Computing Technologies in Indian Rural
Schools and Engineering College Education “ , International conference on Intelligent computational
systems (ICICS’s2012), Dubai, January7-8, 2012, 67-70.
[26] Dinesha H A, Dr. V. K Agrawal, “Advanced Technologies and Tools for Indian Rural School
Education System”, International Journal of Computer Applications (IJCA) (0975 – 8887) Volume
36– No.10, December 2011, 54-60.
[27] Dinesha H A, Dr. V. K Agrawal, “Virtualization Technologies and Techniques in Education Learning
Applications “,International Conference on e-Education and e-Learning ICEEEL, held at World
Academy of Science, Engineering and Technology, PARIS-FRANCE on November 14-16, 2011,
984-991.
[28] Petri, Carl Adam; Reisig, Wolfgang (2008). "Petri net". Scholarpedia 3 (4): 6477.
doi:10.4249/scholarpedia.6477.
[29] Slawomir Grzonkowski and Peter M. Corcoran, Thomas Coughlin, Security Analysis of
Authentication Protocols for Next-Generation Mobile and CE Cloud Services, 2011 IEEE
International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 978-1-4577-0234-1/11,
83-87.
[30] Zhou Quan, Tang Chunming, Zhen Xianghan and Rong Chunming, Springer Quan et al. , A secure
user authentication protocol for sensor network in data capturing, Journal of Cloud Computing:
Advances, Systems and Applications (2015 May) 1-12.
AUTHORS
Dinesha H. A. has completed his bachelor of engineering from Malnad College of
Engineering, Hassan and Master of Technology from R.V.C.E, Bangalore. Presently,
he is pursuing his PhD on cloud computing security. He was working with VMware
pvt India ltd, PES Institute of Technology as Assistant Professor in ISE & CO**RI R
& D and DIAT-DRDO as a Officer In Charge Data Center. Presently he is working in
SGBIT as a Assistant Professor CSE dept. He has published cloud computing
research papers in many international journals and conferences. His research interest
areas are virtualization technology, cloud computing and software engineering. He is
a member in ISTE, IACSIT and IAEng., received best paper award in CLUSE2012. Ph: +91-7767076988,
Dr.D.H. Rao completed B.E, M.E, MBA, M.S, and Ph.D. He was working with
VTU, Jain College of Engineering, and GIT, Belagavi. He is a member of various
reputed bodies. He has published various papers in many reputed journals and
conferences. He was a chair in many international conferences. At present he is
working in SGBIT as a Professor CSE & Dean (Research and Skill), Belagavi.