This document proposes an efficient file hierarchy attribute-based encryption scheme for cloud computing. It aims to address some limitations of traditional ciphertext-policy attribute-based encryption (CP-ABE) schemes, such as high encryption and decryption costs as the number of attributes increases. The proposed scheme, called file hierarchy CP-ABE (FH-CP-ABE), integrates the layered access structures of hierarchical files into a single access structure. It then encrypts the hierarchical files with the integrated access structure. This allows ciphertext components related to attributes to be shared among files, reducing both ciphertext storage costs and encryption time costs. The scheme is proven secure under standard cryptographic assumptions. If implemented, it could provide a more efficient encryption scheme
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
This document proposes an efficient data sharing scheme for mobile cloud computing using attribute-based encryption. It discusses challenges with securely storing data in the cloud, including ensuring data confidentiality and integrity. Existing techniques like fully homomorphic encryption and attribute-based encryption are reviewed, but have limitations for resource-constrained mobile devices. The proposed scheme aims to provide security while reducing computational overhead, through using proxy servers to handle intensive operations and a lazy re-encryption approach for user revocation. It also discusses using provable data possession techniques to verify the integrity of outsourced data.
This document discusses secure data access and sharing in cloud computing environments. It first outlines some security requirements for data sharing in clouds, including data security, privacy, confidentiality, access control, user revocation, and scalability. It then surveys several cryptographic techniques for secure data sharing, including attribute-based encryption (ABE), key-policy attribute-based encryption (KP-ABE), and identity-based encryption (IBE). It also discusses proxy re-encryption as another technique that supports secure data sharing using a semi-trusted proxy to convert ciphertexts between users' public keys.
This document summarizes research on personality-based distributed provable data ownership in multi-cloud storage. It discusses how current provable data possession protocols have limitations such as authentication overhead and lack of flexibility. The proposed approach eliminates authentication management by using identity-based cryptography. It aims to provide a secure, efficient and adaptable protocol for integrity checking of outsourced data across multiple cloud servers.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
This document proposes a system for secure and efficient file sharing and shared ownership in cloud systems. It introduces the concept of shared ownership where multiple users can jointly own a file. For a file access request to be granted, approval is required from a predefined threshold of the file's owners. The system uses AES-128 encryption to encrypt files for security. It allows owners to share files and ownership with other authorized users, who can then read from and write to the shared file. This provides more flexibility than systems with only single user file ownership.
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
This document proposes a system for secure cloud data storage using attribute-based encryption. It aims to address challenges of key management, defining and enforcing access policies based on data attributes, and enabling keyword search over encrypted data. The system uses multi-authority attribute-based access control (MA-ABAC) to reduce key management complexity for data owners and users. Patient medical records are encrypted and access is determined based on user attributes from professional and personal domains. Attribute-based encryption, proxy re-encryption, and uniquely combining techniques are used to achieve security, key management, user revocation and efficient searches of encrypted data on the cloud.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
This document summarizes a research paper that proposes a new password management system called Security Blanket Algorithm. The system uses strong encryption to securely store user logins, passwords, credit cards and other sensitive information in the cloud or locally on a device. When adding a new device, the system implements two-factor authentication for security. All data and communications are encrypted using AES-256. The system aims to provide secure password management while hiding encryption keys and passwords from cloud servers or third parties.
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
This document proposes an efficient data sharing scheme for mobile cloud computing using attribute-based encryption. It discusses challenges with securely storing data in the cloud, including ensuring data confidentiality and integrity. Existing techniques like fully homomorphic encryption and attribute-based encryption are reviewed, but have limitations for resource-constrained mobile devices. The proposed scheme aims to provide security while reducing computational overhead, through using proxy servers to handle intensive operations and a lazy re-encryption approach for user revocation. It also discusses using provable data possession techniques to verify the integrity of outsourced data.
This document discusses secure data access and sharing in cloud computing environments. It first outlines some security requirements for data sharing in clouds, including data security, privacy, confidentiality, access control, user revocation, and scalability. It then surveys several cryptographic techniques for secure data sharing, including attribute-based encryption (ABE), key-policy attribute-based encryption (KP-ABE), and identity-based encryption (IBE). It also discusses proxy re-encryption as another technique that supports secure data sharing using a semi-trusted proxy to convert ciphertexts between users' public keys.
This document summarizes research on personality-based distributed provable data ownership in multi-cloud storage. It discusses how current provable data possession protocols have limitations such as authentication overhead and lack of flexibility. The proposed approach eliminates authentication management by using identity-based cryptography. It aims to provide a secure, efficient and adaptable protocol for integrity checking of outsourced data across multiple cloud servers.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
This document proposes a system for secure and efficient file sharing and shared ownership in cloud systems. It introduces the concept of shared ownership where multiple users can jointly own a file. For a file access request to be granted, approval is required from a predefined threshold of the file's owners. The system uses AES-128 encryption to encrypt files for security. It allows owners to share files and ownership with other authorized users, who can then read from and write to the shared file. This provides more flexibility than systems with only single user file ownership.
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
This document proposes a system for secure cloud data storage using attribute-based encryption. It aims to address challenges of key management, defining and enforcing access policies based on data attributes, and enabling keyword search over encrypted data. The system uses multi-authority attribute-based access control (MA-ABAC) to reduce key management complexity for data owners and users. Patient medical records are encrypted and access is determined based on user attributes from professional and personal domains. Attribute-based encryption, proxy re-encryption, and uniquely combining techniques are used to achieve security, key management, user revocation and efficient searches of encrypted data on the cloud.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
This document summarizes a research paper that proposes a new password management system called Security Blanket Algorithm. The system uses strong encryption to securely store user logins, passwords, credit cards and other sensitive information in the cloud or locally on a device. When adding a new device, the system implements two-factor authentication for security. All data and communications are encrypted using AES-256. The system aims to provide secure password management while hiding encryption keys and passwords from cloud servers or third parties.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
This document discusses using elliptic curve cryptography to improve data security in cloud computing. It begins with an abstract that introduces cloud computing and data security as major issues. Then, it provides background on cryptography and classifications of cryptographic algorithms like symmetric, asymmetric, and hash functions. The document also discusses security issues in cloud computing like data isolation, secure data transfer, secure interfaces and access control. It proposes using elliptic curve cryptography to address these issues and provide confidentiality, integrity and authentication for data in the cloud. Overall, the document examines how cryptography can enhance security for data stored in cloud computing environments.
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
The document proposes a technique for privacy-preserving publishing of set-valued data on cloud computing. It extends the existing Extended Quasi Identifier Partitioning (EQI-partitioning) technique by incorporating l-diversity and k-anonymity to reduce information loss. A multi-level accessibility model is also developed to provide security based on user access levels. Identity-based proxy re-encryption is used to encrypt the data according to sensitivity values and provide access to different user levels. The proposed method aims to reduce information loss while improving security when outsourcing sensitive set-valued data to the cloud.
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
This document proposes a new auditing mechanism to improve the efficiency and security of attribute-based encryption for securing cloud data. The existing single attribute authority model results in long wait times for users to obtain secret keys. The proposed approach employs multiple attribute authorities that can share the work of key distribution to reduce wait times. A central authority generates keys for verified users, while each attribute is managed by its own authority. The mechanism can also detect incorrectly verified users to enhance security. Analysis shows the auditing mechanism improves cloud security performance compared to previous single authority schemes.
The document proposes an adaptable wildcard searchable encryption system for secure cloud storage. It allows multiple keyword search with auto-generated wildcards and wildcard keyword queries. The proposed system includes a proxy server to recover lost data due to malicious activities. It encrypts data before storing it on the cloud to ensure security and privacy. The system automatically generates wildcards for all files and allows users to search and download encrypted files using private keys provided by a third-party authorizer.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
The document proposes a mutual key oversight procedure for cloud security and distribution of data based on a hierarchy method. It discusses using attribute-based encryption to encrypt data before outsourcing it to the cloud. The proposed scheme uses a hierarchical structure with a cloud authority, domain authorities, and users to provide security and scalability. It allows both private and public uploading and sharing of files within this hierarchy.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) It encrypts files with a single key, and generates two shares of the key - one given to the user and the other stored by a trusted third party, to prevent insider threats from malicious users.
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
This document discusses data security in cloud computing using cryptographic algorithms. It begins by introducing cloud computing and cryptography. Cryptography is used to securely store and transmit data in the cloud since the data is no longer under the user's direct control. The document then discusses how AES (Advanced Encryption Standard) can be used to encrypt data for secure storage and transmission in cloud computing. It provides an overview of the AES algorithm, including the encryption process which involves sub-processes like byte substitution, shift rows, mix columns and adding round keys over multiple rounds. The document also provides pseudocode for the AES encryption process and discusses how AES encryption provides stronger security than other algorithms like DES.
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
This document proposes a novel technique that combines encryption and digital watermarking to securely transmit medical images over public networks like the cloud. The algorithm divides images into regions of interest and non-interest, and embeds cryptographic watermarks and patient data in the non-interest regions before transmission. At the receiver end, the watermarks and data can be extracted to authenticate the image and verify that it has not been tampered with. The algorithm was tested on medical images and provided security, integrity and authenticity of transmitted medical information.
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
This document presents a key-policy attribute-based temporary keyword search scheme for secure cloud storage. It introduces a new cryptographic primitive called key-policy attribute-based temporary keyword search (KP-ABTKS) that allows authorized users to generate search tokens to search for ciphertexts encrypted within a specified time interval that contain a given keyword. The proposed scheme is constructed using bilinear pairing and is proven to be secure against selectively chosen keyword attacks under the decisional Diffie-Hellman assumption. It consists of five algorithms: setup, key generation, encryption, token generation, and search. The performance evaluation shows the scheme is practical in terms of computational complexity and execution time.
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
This document summarizes and evaluates several existing approaches for securely sharing data stored in the cloud. It discusses key aggregate cryptosystems that allow a user to generate a single aggregate key to decrypt a set of ciphertexts. It also reviews other techniques such as attribute-based encryption with proxy re-encryption, dynamic auditing services using random sampling and fragment structures, the Oruta system using ring signatures for public auditing of shared data, and privacy-preserving public auditing using message authentication codes. The document analyzes the advantages and disadvantages of each approach, such as increased key sizes with attribute-based encryption and the storage overhead of fragment structures.
The document proposes an improved identity-based encryption scheme with a secured revocation mechanism for cloud computing. It aims to address the difficulties of existing symmetric encryption approaches which may allow data collision and retrieval of entire file contents. The proposed scheme introduces outsourced computation for identity-based encryption revocation. It formalizes the security definition and proposes a novel key issuing technique using a hybrid private key to realize revocation through key updates. This offloads key generation operations to a key update cloud service provider, reducing overhead for the private key generator and users. Experimental results show the proposed scheme provides better security and performance than existing methods.
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
This document discusses security techniques for multimedia content systems stored in the cloud. It analyzes homomorphic encryption and secure hash techniques. The document provides an overview of homomorphic encryption, describing how it allows computation on encrypted data while preserving privacy. It also reviews related work applying homomorphic encryption and searchable encryption to securely store and process multimedia files in cloud systems. The goal is to push workloads in a fully homomorphic encrypted form to cloud storage while maintaining privacy and flexibility.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
A Secure & Scalable Access Method in Cloud Computingijsrd.com
This document proposes a new scheme for secure and scalable access control in cloud computing. It extends ciphertext-policy attribute-set based encryption (CP-ASBE) by incorporating a hierarchical structure of system users using a delegation algorithm. The proposed scheme allows a trusted authority and multiple domain authorities to generate keys for data owners and consumers. It defines access structures for encrypting files and issuing user keys with associated attributes. The scheme supports flexible attribute combinations, efficient revocation, and fine-grained access control for outsourced data in cloud computing.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) The methodology encrypts files with a single encryption key and distributes key shares to users and a cryptographic server to counter insider threats while allowing authorized access.
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
This document presents a privacy preserving and efficient identity search technique for cloud data security. It proposes a scheme using visual-encryption techniques to overcome issues with untrusted cloud storage. The existing methodology uses data signing algorithms but has limitations as the private key depends on the security of one computer. The proposed system uses visual-cryptographic encryption, which scrambles data using an algorithm requiring a key to decrypt. It involves users uploading encrypted files, administrators approving requests to view files through live video verification, and decryption using the appropriate key. The scheme aims to securely store large volumes of data while allowing identity verification for file access on the cloud.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
This document discusses using elliptic curve cryptography to improve data security in cloud computing. It begins with an abstract that introduces cloud computing and data security as major issues. Then, it provides background on cryptography and classifications of cryptographic algorithms like symmetric, asymmetric, and hash functions. The document also discusses security issues in cloud computing like data isolation, secure data transfer, secure interfaces and access control. It proposes using elliptic curve cryptography to address these issues and provide confidentiality, integrity and authentication for data in the cloud. Overall, the document examines how cryptography can enhance security for data stored in cloud computing environments.
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
The document proposes a technique for privacy-preserving publishing of set-valued data on cloud computing. It extends the existing Extended Quasi Identifier Partitioning (EQI-partitioning) technique by incorporating l-diversity and k-anonymity to reduce information loss. A multi-level accessibility model is also developed to provide security based on user access levels. Identity-based proxy re-encryption is used to encrypt the data according to sensitivity values and provide access to different user levels. The proposed method aims to reduce information loss while improving security when outsourcing sensitive set-valued data to the cloud.
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
This document proposes a new auditing mechanism to improve the efficiency and security of attribute-based encryption for securing cloud data. The existing single attribute authority model results in long wait times for users to obtain secret keys. The proposed approach employs multiple attribute authorities that can share the work of key distribution to reduce wait times. A central authority generates keys for verified users, while each attribute is managed by its own authority. The mechanism can also detect incorrectly verified users to enhance security. Analysis shows the auditing mechanism improves cloud security performance compared to previous single authority schemes.
The document proposes an adaptable wildcard searchable encryption system for secure cloud storage. It allows multiple keyword search with auto-generated wildcards and wildcard keyword queries. The proposed system includes a proxy server to recover lost data due to malicious activities. It encrypts data before storing it on the cloud to ensure security and privacy. The system automatically generates wildcards for all files and allows users to search and download encrypted files using private keys provided by a third-party authorizer.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
The document proposes a mutual key oversight procedure for cloud security and distribution of data based on a hierarchy method. It discusses using attribute-based encryption to encrypt data before outsourcing it to the cloud. The proposed scheme uses a hierarchical structure with a cloud authority, domain authorities, and users to provide security and scalability. It allows both private and public uploading and sharing of files within this hierarchy.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) It encrypts files with a single key, and generates two shares of the key - one given to the user and the other stored by a trusted third party, to prevent insider threats from malicious users.
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
This document discusses data security in cloud computing using cryptographic algorithms. It begins by introducing cloud computing and cryptography. Cryptography is used to securely store and transmit data in the cloud since the data is no longer under the user's direct control. The document then discusses how AES (Advanced Encryption Standard) can be used to encrypt data for secure storage and transmission in cloud computing. It provides an overview of the AES algorithm, including the encryption process which involves sub-processes like byte substitution, shift rows, mix columns and adding round keys over multiple rounds. The document also provides pseudocode for the AES encryption process and discusses how AES encryption provides stronger security than other algorithms like DES.
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
This document proposes a novel technique that combines encryption and digital watermarking to securely transmit medical images over public networks like the cloud. The algorithm divides images into regions of interest and non-interest, and embeds cryptographic watermarks and patient data in the non-interest regions before transmission. At the receiver end, the watermarks and data can be extracted to authenticate the image and verify that it has not been tampered with. The algorithm was tested on medical images and provided security, integrity and authenticity of transmitted medical information.
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
This document presents a key-policy attribute-based temporary keyword search scheme for secure cloud storage. It introduces a new cryptographic primitive called key-policy attribute-based temporary keyword search (KP-ABTKS) that allows authorized users to generate search tokens to search for ciphertexts encrypted within a specified time interval that contain a given keyword. The proposed scheme is constructed using bilinear pairing and is proven to be secure against selectively chosen keyword attacks under the decisional Diffie-Hellman assumption. It consists of five algorithms: setup, key generation, encryption, token generation, and search. The performance evaluation shows the scheme is practical in terms of computational complexity and execution time.
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
This document summarizes and evaluates several existing approaches for securely sharing data stored in the cloud. It discusses key aggregate cryptosystems that allow a user to generate a single aggregate key to decrypt a set of ciphertexts. It also reviews other techniques such as attribute-based encryption with proxy re-encryption, dynamic auditing services using random sampling and fragment structures, the Oruta system using ring signatures for public auditing of shared data, and privacy-preserving public auditing using message authentication codes. The document analyzes the advantages and disadvantages of each approach, such as increased key sizes with attribute-based encryption and the storage overhead of fragment structures.
The document proposes an improved identity-based encryption scheme with a secured revocation mechanism for cloud computing. It aims to address the difficulties of existing symmetric encryption approaches which may allow data collision and retrieval of entire file contents. The proposed scheme introduces outsourced computation for identity-based encryption revocation. It formalizes the security definition and proposes a novel key issuing technique using a hybrid private key to realize revocation through key updates. This offloads key generation operations to a key update cloud service provider, reducing overhead for the private key generator and users. Experimental results show the proposed scheme provides better security and performance than existing methods.
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
This document discusses security techniques for multimedia content systems stored in the cloud. It analyzes homomorphic encryption and secure hash techniques. The document provides an overview of homomorphic encryption, describing how it allows computation on encrypted data while preserving privacy. It also reviews related work applying homomorphic encryption and searchable encryption to securely store and process multimedia files in cloud systems. The goal is to push workloads in a fully homomorphic encrypted form to cloud storage while maintaining privacy and flexibility.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
A Secure & Scalable Access Method in Cloud Computingijsrd.com
This document proposes a new scheme for secure and scalable access control in cloud computing. It extends ciphertext-policy attribute-set based encryption (CP-ASBE) by incorporating a hierarchical structure of system users using a delegation algorithm. The proposed scheme allows a trusted authority and multiple domain authorities to generate keys for data owners and consumers. It defines access structures for encrypting files and issuing user keys with associated attributes. The scheme supports flexible attribute combinations, efficient revocation, and fine-grained access control for outsourced data in cloud computing.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) The methodology encrypts files with a single encryption key and distributes key shares to users and a cryptographic server to counter insider threats while allowing authorized access.
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
This document presents a privacy preserving and efficient identity search technique for cloud data security. It proposes a scheme using visual-encryption techniques to overcome issues with untrusted cloud storage. The existing methodology uses data signing algorithms but has limitations as the private key depends on the security of one computer. The proposed system uses visual-cryptographic encryption, which scrambles data using an algorithm requiring a key to decrypt. It involves users uploading encrypted files, administrators approving requests to view files through live video verification, and decryption using the appropriate key. The scheme aims to securely store large volumes of data while allowing identity verification for file access on the cloud.
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
This document proposes and compares two encryption algorithms, Key Policy Attribute-Based Encryption (KP-ABE) and Ciphertext Policy Attribute-Based Encryption (CP-ABE), for secure data sharing in mobile cloud computing. KP-ABE allows data to be encrypted with user attributes but does not allow the encryptor to choose who can decrypt. CP-ABE addresses this limitation by allowing the encryptor to define an access policy that must be satisfied by user attributes for decryption. The document concludes that CP-ABE provides more secure access control compared to KP-ABE by giving encryptors control over who can decrypt ciphertext.
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
This document summarizes a proposed lightweight secured data sharing scheme for cloud computing. It discusses issues with securely sharing data over cloud systems, including lack of control over data and potential for exploitation. The proposed system uses a combination of Attribute-Based Encryption (ABE) and Byte Rotation Encryption to encrypt data before uploading it to the cloud. This allows users to securely store and share encrypted data. The system aims to work efficiently on devices with limited resources by encrypting data in parallel threads. The encrypted data is decrypted using a randomly generated key that is shared only with authorized users.
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
This document proposes a secure tree-based search scheme for encrypted cloud data that supports multi-keyword ranked search and dynamic operations like deletion and insertion of documents. It combines the vector space model and TF-IDF model to construct a tree-based index and propose a "Greedy Depth-first Search" algorithm for efficient multi-keyword search. The scheme uses PEKS to encrypt the file index and queries while ensuring accurate relevance scoring between encrypted data. It aims to overcome security threats to keyword privacy in existing searchable encryption schemes and provide flexible dynamic operations on document collections in the cloud.
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
This document proposes a system to securely store data in the cloud by using honeypot technology and cryptographic algorithms. The proposed system aims to provide better data security for users by only allowing authenticated users to access encrypted data stored in the cloud. If an unauthenticated user attempts to access the data, the system will send them garbage files using honeypot technology to detect unauthorized access attempts. The system uses RSA encryption to encrypt user files before storing them in the cloud, requiring the private key to decrypt files, ensuring only authenticated users can access the encrypted user data stored remotely.
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
This document reviews a proposed lightweight secure data sharing scheme (LDSS) for mobile cloud computing. It aims to address the problems of high computational overhead for mobile devices and lack of security when data is stored and shared in the cloud. The proposed LDSS framework uses attribute-based encryption and proxy servers to perform intensive encryption and decryption tasks, reducing the computational load on mobile clients. It also introduces lazy re-encryption and attribute fields to help efficiently revoke user access privileges. The goal is to provide secure yet lightweight data sharing capabilities for mobile cloud applications and services.
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
This document presents a system approach for single keyword search of encrypted data files stored in the cloud. It proposes using order-preserving encryption to achieve security and efficiency. The system architecture involves a cloud owner uploading and encrypting files, storing them in the cloud storage, and a user searching for files by encrypting keywords. It aims to address security concerns with cloud storage while allowing efficient searches. Evaluation shows the approach allows authentication, file uploads and downloads, and keyword searches of encrypted files in the cloud.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
cloud computing is also facing many challenges that, if not well resolved, may impede its fast growth. Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users. Data confidential against cloud servers is hence frequently desired when users outsource data for storage in the cloud.
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
This document proposes an efficient and privacy-preserving approach for outsourced data from resource-constrained mobile devices in cloud computing. It employs probabilistic public key encryption to encrypt the data and performs ranked keyword search over the encrypted data to retrieve files from the cloud. The approach aims to achieve efficient encryption without sacrificing data privacy. The ranked keyword search improves usability by returning the most relevant files and ensuring retrieval accuracy, while reducing computation and communication overhead. A thorough security and performance analysis proves the approach is semantically secure and efficient.
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
This document proposes a two-factor validation control framework for online distributed services. Specifically, it implements an attribute-based access control framework that requires both a customer secret key and a lightweight security device. This two-factor authentication mechanism enhances security, especially when multiple customers share the same computer. It also allows fine-grained access control based on user attributes while preserving privacy, as the cloud server only knows that a user satisfies certain attributes, not their identity. A simulation is performed to demonstrate the feasibility of the proposed two-factor framework.
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
The document proposes a secured data integrity technique for cloud storage using 3DES encryption algorithm. 3DES is a symmetric cryptosystem that encrypts data using three iterations of the DES algorithm. The proposed system uses 3DES along with a random key generator and graphical password to add extra security layers. This makes the system difficult to hack by protecting the data stored in the cloud. The document discusses related work on ensuring data integrity and possession in cloud storage. It then describes the proposed methodology which uses cryptography algorithms like 3DES to encrypt data sent over the network, making intercepted or replaced data impossible. The system is designed to be acceptably secure against current threats but may require stronger encryption with increasing computing power over time.
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
This document summarizes 6 research papers related to security in mobile cloud computing. It discusses issues like data integrity, authentication, and access control when mobile devices' data and computations are integrated with cloud computing. Several cryptographic techniques are described that can help ensure privacy and security, such as proxy provable data possession, attribute-based encryption, and proxy re-encryption. The document concludes that while mobile cloud computing provides benefits, security of user data shared in the cloud is the main challenge, and various frameworks have been proposed but no single system addresses all security aspects.
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
This document summarizes a research paper that proposes a system for secure and private cloud storage using multiple encryption algorithms and third-party auditing. The system aims to preserve privacy while enabling public auditing of stored data. It utilizes homomorphic authenticators, random masking, and asymmetric (RSA) and symmetric (AES) encryption algorithms. A third-party auditor can efficiently audit user data in the cloud to ensure integrity without learning the actual data contents, and the system addresses potential data leaks from the auditor. The paper analyzes RSA and AES algorithms to determine which provides better performance and security for the system.
Encryption is the most important concept to
enhance the security in cloud access policies. Encryption
data in the cloud is the procedure of transforming or
encrypted data or information before it’s moved to
cloud storage. Normally, in cloud service sources give
encrypted services ranging from an encoding
connection to limited encode sensitive information and
provide encode key to decode the data as
required.Several security problems and some of their
solution are examined and are concentrating primarily
in public security problems and their solutions. In this
paper, we’ve implemented a hybrid approach, where
access policies won’t leak any privacy data and to
enhance the security and performance parameters like
decryption time, encryption time and accuracy and
compared with existing performance
parameters.Security is the main limitation while storing
data over cloud server. The introduced approach is
implemented appropriately even if the tenant could
access the information all that would appear is gabble.,
Hijacking of sessions while accessing data, insider
threats, outsider malicious attacks, data loss, loss of
control, and service disruption. Therefore enhancing
the security for multimedia data storage in a cloud
center is of paramount importance.
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
This document presents a novel framework for improving privacy and efficiency in support vector machine (SVM) classification. The framework uses a lightweight multiparty random masking protocol to encrypt user data before it is sent to a server for SVM classification. The classification results are then stored in the cloud. A polynomial aggregation protocol is also used to prevent data leakage while maintaining privacy. The proposed approach is evaluated using two real datasets and is shown to achieve higher accuracy and efficiency compared to conventional methods, while ensuring user data privacy.
Secure Data Self-Destructing with Time Constraint in CloudsIRJET Journal
This document proposes a new scheme called Key-Policy Time-Specified Attribute-Based Encryption (KP-TSABE) for secure self-destructing of sensitive data shared in clouds. KP-TSABE aims to provide fine-grained access control over user-defined authorization periods and ensure data is automatically destroyed after expiration. It encrypts data with attributes and time constraints, so that ciphertext can only be decrypted if the time period is valid and attributes match the key's access structure. The scheme is proven secure under the decisional l-bilinear Diffie-Hellman inversion assumption. KP-TSABE addresses limitations of prior work and provides stronger security and privacy for sensitive data lifecycles in
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
Attribute-based Encryption is observed as a promising cryptographic leading tool to assurance data owners’ direct
regulator over their data in public cloud storage. The former ABE schemes include only one authority to maintain the whole
attribute set, which can carry a single-point bottleneck on both security and performance. Then, certain multi-authority
schemes are planned, in which numerous authorities distinctly maintain split attribute subsets. However, the single-point
bottleneck problem remains unsolved. In this survey paper, from another perspective, we conduct a threshold multi-authority
CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a
uniform attribute set. In TMACS, taking advantage of (t, n) threshold secret allocation, the master key can be shared among
multiple authorities, and a lawful user can generate his/her secret key by interacting with any t authorities. Security and
performance analysis results show that TMACS is not only verifiable secure when less than t authorities are compromised, but
also robust when no less than t authorities are alive in the system. Also, by efficiently combining the traditional multi-authority
scheme with TMACS, we construct a hybrid one, which satisfies the scenario of attributes coming from different authorities as
well as achieving security and system-level robustness.
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
This document presents a proposed Trusted Third Party Auditing (TPA) model called the Trusted TPA Model (TTM) to improve security and reliability for cloud storage. The TTM uses AES-256 encryption and SHA-1 hashing to provide two-way security by maintaining both data security and integrity. It aims to improve over existing methods by providing more efficient encryption/decryption, better computation times, optimal storage costs, and stronger privacy and integrity. The TTM uses AES-256 and SHA-1, Diffie-Hellman key exchange, and involves modules for data upload, key generation/exchange, encryption/hashing, and TPA verification. An evaluation shows the TTM provides better results than
Similar to IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network