This document proposes a novel approach for secure group data sharing in cloud computing using a symmetric balanced incomplete block design (SBIBD). The approach aims to enable anonymous yet traceable data sharing among group members in the cloud. It uses the concept of group signature and SBIBD to efficiently generate a common group key for encrypting and decrypting shared data, providing security while supporting group data sharing. The SBIBD and group signature techniques are used to achieve privacy, security, traceability and efficient access control. Experimental results demonstrate the effectiveness of generating the group key and uploading/accessing encrypted files through the group manager. The proposed approach supports dynamic membership changes and is secure and efficient for group data sharing in cloud computing.
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
This document presents a research paper on reliability of data sharing in cloud computing. It discusses how identity-based remote data integrity checking can securely verify that a cloud server is storing data honestly without privacy issues. The proposed method uses key-homomorphic cryptographic primitives to reduce complexity compared to traditional public key infrastructure approaches. It formalizes the security model and properties of the new primitive. The researchers present a construction of their identity-based remote data integrity checking protocol and prove it achieves soundness and perfect data privacy. They analyze the security and efficiency of the protocol, finding it to be secure and practical for real-world applications. The paper concludes by discussing future work on group management with forward and backward secrecy over time durations and recovery
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
This document proposes a privacy-preserving authentication protocol for shared authority-based cloud computing. It discusses security and privacy issues with data sharing among users in cloud storage. The proposed protocol uses a shared authority-based privacy preservation authentication protocol (SecCloud) to address privacy and security concerns for cloud storage. It also uses SecCloud+ to remove data de-duplication. The protocol aims to provide scalability, integrity checking, secure de-duplication, and prevent shoulder surfing attacks during the authentication process in cloud computing.
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
This document discusses implementing a threshold-based cryptographic technique for data and key storage security over cloud computing. It proposes a system that encrypts data stored on the cloud to prevent unauthorized access and data attacks by the cloud service provider. The system uses a threshold-based cryptographic approach that distributes encryption keys among multiple users, requiring a threshold number of keys to decrypt the data. This prevents collusion attacks and ensures data remains secure even if some user keys are compromised. The implementation results show the system can effectively secure data on the cloud and protect legitimate users from cheating or attacks from the cloud service provider or other users.
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
This document discusses enhancing integrity preservation for cloud storage using a homomorphic encryption scheme. It begins with an abstract that outlines using MD5 algorithm for integrity checks on fully homomorphic encrypted data. It then provides background on issues with privacy and integrity in cloud computing. The document reviews related work on cloud security and integrity verification. It discusses challenges with ensuring data integrity when stored remotely in the cloud and proposes using a homomorphic encryption scheme along with MD5 for integrity preservation of outsourced data in the cloud.
This document summarizes a research paper on improving user navigation through website structure using the CURE clustering algorithm. The paper proposes using CURE to group related website pages into clusters to minimize changes to the existing structure while enhancing navigation. Currently, k-means is often used but it does not account for website designers' lack of user understanding. CURE is evaluated on real website data and shown to provide navigation improvements with only minor link additions. The results indicate CURE is effective for clustering website pages in a way that guides users more efficiently.
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017rahulmonikasharma
Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have implemented ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
This document presents a research paper on reliability of data sharing in cloud computing. It discusses how identity-based remote data integrity checking can securely verify that a cloud server is storing data honestly without privacy issues. The proposed method uses key-homomorphic cryptographic primitives to reduce complexity compared to traditional public key infrastructure approaches. It formalizes the security model and properties of the new primitive. The researchers present a construction of their identity-based remote data integrity checking protocol and prove it achieves soundness and perfect data privacy. They analyze the security and efficiency of the protocol, finding it to be secure and practical for real-world applications. The paper concludes by discussing future work on group management with forward and backward secrecy over time durations and recovery
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
This document proposes a privacy-preserving authentication protocol for shared authority-based cloud computing. It discusses security and privacy issues with data sharing among users in cloud storage. The proposed protocol uses a shared authority-based privacy preservation authentication protocol (SecCloud) to address privacy and security concerns for cloud storage. It also uses SecCloud+ to remove data de-duplication. The protocol aims to provide scalability, integrity checking, secure de-duplication, and prevent shoulder surfing attacks during the authentication process in cloud computing.
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
This document discusses implementing a threshold-based cryptographic technique for data and key storage security over cloud computing. It proposes a system that encrypts data stored on the cloud to prevent unauthorized access and data attacks by the cloud service provider. The system uses a threshold-based cryptographic approach that distributes encryption keys among multiple users, requiring a threshold number of keys to decrypt the data. This prevents collusion attacks and ensures data remains secure even if some user keys are compromised. The implementation results show the system can effectively secure data on the cloud and protect legitimate users from cheating or attacks from the cloud service provider or other users.
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
This document discusses enhancing integrity preservation for cloud storage using a homomorphic encryption scheme. It begins with an abstract that outlines using MD5 algorithm for integrity checks on fully homomorphic encrypted data. It then provides background on issues with privacy and integrity in cloud computing. The document reviews related work on cloud security and integrity verification. It discusses challenges with ensuring data integrity when stored remotely in the cloud and proposes using a homomorphic encryption scheme along with MD5 for integrity preservation of outsourced data in the cloud.
This document summarizes a research paper on improving user navigation through website structure using the CURE clustering algorithm. The paper proposes using CURE to group related website pages into clusters to minimize changes to the existing structure while enhancing navigation. Currently, k-means is often used but it does not account for website designers' lack of user understanding. CURE is evaluated on real website data and shown to provide navigation improvements with only minor link additions. The results indicate CURE is effective for clustering website pages in a way that guides users more efficiently.
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017rahulmonikasharma
Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have implemented ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
This document discusses efficient and cost-effective methods for hosting data across multiple cloud storage providers (multi-cloud) to ensure high data availability and reduce costs. It proposes distributing data among different cloud providers using replication and erasure coding techniques. This approach guarantees data availability even if one cloud provider fails and minimizes monetary costs by taking advantage of varying cloud pricing models and data access patterns. The technique is shown to save around 20% of costs while providing high flexibility to handle data and pricing changes over time.
This document summarizes recent research on security issues related to single cloud and multi-cloud storage models. It finds that relying on a single cloud service provider poses risks to data availability and integrity if the provider experiences an outage. Storing data across multiple cloud providers (a multi-cloud model) can help address these issues but may increase costs. The document surveys various techniques proposed in recent research to improve security, availability, and integrity in single and multi-cloud environments, such as homomorphic tokens, file division, and the Depsky model. It concludes that while single cloud has been more widely researched, multi-cloud is an important area of ongoing work to help overcome the security and cost challenges of cloud storage.
Assessing the Business Value of SDN Datacenter Security Solutionsxband
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
This document summarizes a research paper that proposes a new method for secure group data sharing and key agreement in cloud computing. The proposed method uses block design to distribute keys without requiring a secure communication channel. It stores encrypted data across multiple clouds to prevent collusion attacks. The system provides two layers of encryption and fine-grained access control for dynamic groups. It aims to address security issues with existing approaches like single cloud storage and insecure key distribution.
Data Anonymization for Privacy Preservation in Big Datarahulmonikasharma
Cloud computing provides capable ascendable IT edifice to provision numerous processing of a various big data applications in sectors such as healthcare and business. Mainly electronic health records data sets and in such applications generally contain privacy-sensitive data. The most popular technique for data privacy preservation is anonymizing the data through generalization. Proposal is to examine the issue against proximity privacy breaches for big data anonymization and try to recognize a scalable solution to this issue. Scalable clustering approach with two phase consisting of clustering algorithm and K-Anonymity scheme with Generalisation and suppression is intended to work on this problem. Design of the algorithms is done with MapReduce to increase high scalability by carrying out dataparallel execution in cloud. Wide-ranging researches on actual data sets substantiate that the method deliberately advances the competence of defensive proximity privacy breaks, the scalability and the efficiency of anonymization over existing methods. Anonymizing data sets through generalization to gratify some of the privacy attributes like k- Anonymity is a popularly-used type of privacy preserving methods. Currently, the gauge of data in numerous cloud surges extremely in agreement with the Big Data, making it a dare for frequently used tools to actually get, manage, and process large-scale data for a particular accepted time scale. Hence, it is a trial for prevailing anonymization approaches to attain privacy conservation for big data private information due to scalabilty issues.
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONcscpconf
Huge Volumes of detailed personal data is regularly collected and analyzed by applications
using data mining, sharing of these data is beneficial to the application users. On one hand it is
an important asset to business organizations and governments for decision making at the same
time analysing such data opens treats to privacy if not done properly. This paper aims to reveal
the information by protecting sensitive data. We are using Vector quantization technique for
preserving privacy. Quantization will be performed on training data samples it will produce
transformed data set. This transformed data set does not reveal the original data. Hence privacy
is preserved
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
Cloud Trust Management Framework Based On Cloud Market spacesIJERA Editor
Nowadays, applications running in virtual or cloud-based environments are all susceptible to exploitation. However, traditional trust solutions have not been fully optimized for virtualized third party environments. In this situation, the selection of an appropriate cloud service provider is an issue. This paper introduces a completely novel idea on most appropriate cloud service selection through an intermediator. It is based on the new notion of a marketspace. Our paper is devoted to the investigation of a novel architecture suggested for a marketspace. Several theoretical notions related to trust have also been explained extensively in the paper for Cloud service provider selection.
IRJET- Cross User Bigdata DeduplicationIRJET Journal
This document summarizes and reviews various techniques for cross-user big data deduplication. It proposes a model that performs deduplication of data for multiple users to achieve uniqueness of textual data uploaded by users while maintaining efficient data access and privacy. The model uses a fixed-size blocking algorithm and hashing algorithm to divide files into blocks, generate hash keys for each block, and perform intra-user and inter-user deduplication checking in two phases to identify and eliminate redundant data across users. It reviews related work that uses techniques like MapReduce, clustering, variable size chunking and metadata to implement parallel and application-driven deduplication.
A hybrid cloud approach for secure authorizedNinad Samel
This document summarizes a research paper that proposes a hybrid cloud approach for secure authorized data deduplication. The paper presents a scheme that uses convergent encryption to encrypt files before uploading them to cloud storage. It also considers the differential privileges of users when performing duplicate checks, in addition to file content. A prototype is implemented to test the proposed authorized duplicate check scheme. Experimental results show the scheme incurs minimal overhead compared to normal cloud storage operations. The goal is to better protect data security while supporting deduplication in a hybrid cloud architecture.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
This document summarizes a research paper that proposes a new password management system called Security Blanket Algorithm. The system uses strong encryption to securely store user logins, passwords, credit cards and other sensitive information in the cloud or locally on a device. When adding a new device, the system implements two-factor authentication for security. All data and communications are encrypted using AES-256. The system aims to provide secure password management while hiding encryption keys and passwords from cloud servers or third parties.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
This document summarizes a research paper that proposes a method for managing sensitive user data in cloud computing through measurable and secure data access controls. It discusses privacy issues with current data storage practices in cloud computing. The proposed method uses attribute-based encryption to assign users fine-grained access permissions to limited amounts of data for a specific time period. This aims to address issues with data leakage, privacy, and lack of data owner control in existing cloud data systems. The method was implemented in a simulation using .NET technologies to test access permissions between cloud service providers, consumers, and users.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
The document discusses the challenges of cloud forensics. Some key challenges discussed are:
1) Physical inaccessibility of digital evidence stored in the cloud makes evidence collection difficult as investigators do not have direct access to cloud servers.
2) Dynamic IP addresses in the cloud make it challenging to map IP addresses for search warrants as locations cannot be precisely tracked.
3) Volatile cloud data can be lost if storage instances are shutdown, as data only exists in memory and lacks persistence. This poses issues for forensic investigation.
The document also examines limitations of current forensic tools for cloud environments and issues of trust when relying on cloud providers' employees to collect forensic data. Overall, the challenges discussed center around the lack
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes a research paper that proposes a privacy-preserving model called BSS Homomorphic Encryption for outsourcing the mining of frequent patterns from large transactional databases. The model aims to encrypt transaction data in a way that protects both individual data items and mined patterns. It works by grouping data items, adding fake transactions, and converting the encrypted database into a matrix format to prevent guessing attacks. Experimental results on a real transactional database show the technique effectively protects privacy while remaining scalable.
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...IRJET Journal
This document proposes a novel approach for secure group data sharing and storage in cloud computing. It aims to enable anonymous data sharing within a group in the cloud with high security and efficiency. The approach uses group signatures and key agreement to allow group members to secretly share data about the group, while a common group key is determined based on key agreement to allow secure sharing and storage of group data in the cloud. Both theoretical and experimental analysis show that the proposed scheme is secure and efficient for group data sharing in cloud computing.
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
This document summarizes and reviews several research papers on providing anonymous authentication and access control for securely storing user data in the cloud. It discusses how traditional access control schemes used for clouds are centralized, while the proposed decentralized approach supports anonymous verification of user identities by the cloud before storing data, and only allows authorized users to decrypt stored information. The scheme prevents replay attacks and enables creation, modification and reading of stored data, while also addressing user revocation. Communication, computation and storage overhead are similar to centralized approaches. Attribute-based encryption techniques are explored that allow flexible access policies based on user attributes.
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...IRJET Journal
The document proposes a Secret Sharing Group Key Management Protocol (SSGK) to secure data sharing in cloud storage and minimize privacy and security risks of big data. SSGK uses a group key to encrypt shared data and a secret sharing scheme to distribute the group key to legitimate sharers. It aims to control access permissions for shared data and only allow authorized participants to access and re-encrypt keys. The protocol takes measures like using symmetric encryption for data and re-encryption for keys to enhance security of shared data in cloud storage. It provides a secure way for information owners to share data and users to access data on demand in cloud-based healthcare and other information systems.
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
This document summarizes a research paper that proposes an effective and secure distributed storage structure for cloud computing. The proposed structure classifies user data into three categories based on importance. More important data is encrypted with stronger encryption algorithms and larger key sizes, while less important data uses lighter encryption. This reduces complexity and cost compared to encrypting all data with the same encryption. The structure aims to provide security for data transmission and storage in the cloud while balancing efficiency. It was found to have better performance than other existing cloud storage structures.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
This document discusses efficient and cost-effective methods for hosting data across multiple cloud storage providers (multi-cloud) to ensure high data availability and reduce costs. It proposes distributing data among different cloud providers using replication and erasure coding techniques. This approach guarantees data availability even if one cloud provider fails and minimizes monetary costs by taking advantage of varying cloud pricing models and data access patterns. The technique is shown to save around 20% of costs while providing high flexibility to handle data and pricing changes over time.
This document summarizes recent research on security issues related to single cloud and multi-cloud storage models. It finds that relying on a single cloud service provider poses risks to data availability and integrity if the provider experiences an outage. Storing data across multiple cloud providers (a multi-cloud model) can help address these issues but may increase costs. The document surveys various techniques proposed in recent research to improve security, availability, and integrity in single and multi-cloud environments, such as homomorphic tokens, file division, and the Depsky model. It concludes that while single cloud has been more widely researched, multi-cloud is an important area of ongoing work to help overcome the security and cost challenges of cloud storage.
Assessing the Business Value of SDN Datacenter Security Solutionsxband
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
This document summarizes a research paper that proposes a new method for secure group data sharing and key agreement in cloud computing. The proposed method uses block design to distribute keys without requiring a secure communication channel. It stores encrypted data across multiple clouds to prevent collusion attacks. The system provides two layers of encryption and fine-grained access control for dynamic groups. It aims to address security issues with existing approaches like single cloud storage and insecure key distribution.
Data Anonymization for Privacy Preservation in Big Datarahulmonikasharma
Cloud computing provides capable ascendable IT edifice to provision numerous processing of a various big data applications in sectors such as healthcare and business. Mainly electronic health records data sets and in such applications generally contain privacy-sensitive data. The most popular technique for data privacy preservation is anonymizing the data through generalization. Proposal is to examine the issue against proximity privacy breaches for big data anonymization and try to recognize a scalable solution to this issue. Scalable clustering approach with two phase consisting of clustering algorithm and K-Anonymity scheme with Generalisation and suppression is intended to work on this problem. Design of the algorithms is done with MapReduce to increase high scalability by carrying out dataparallel execution in cloud. Wide-ranging researches on actual data sets substantiate that the method deliberately advances the competence of defensive proximity privacy breaks, the scalability and the efficiency of anonymization over existing methods. Anonymizing data sets through generalization to gratify some of the privacy attributes like k- Anonymity is a popularly-used type of privacy preserving methods. Currently, the gauge of data in numerous cloud surges extremely in agreement with the Big Data, making it a dare for frequently used tools to actually get, manage, and process large-scale data for a particular accepted time scale. Hence, it is a trial for prevailing anonymization approaches to attain privacy conservation for big data private information due to scalabilty issues.
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONcscpconf
Huge Volumes of detailed personal data is regularly collected and analyzed by applications
using data mining, sharing of these data is beneficial to the application users. On one hand it is
an important asset to business organizations and governments for decision making at the same
time analysing such data opens treats to privacy if not done properly. This paper aims to reveal
the information by protecting sensitive data. We are using Vector quantization technique for
preserving privacy. Quantization will be performed on training data samples it will produce
transformed data set. This transformed data set does not reveal the original data. Hence privacy
is preserved
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
Cloud Trust Management Framework Based On Cloud Market spacesIJERA Editor
Nowadays, applications running in virtual or cloud-based environments are all susceptible to exploitation. However, traditional trust solutions have not been fully optimized for virtualized third party environments. In this situation, the selection of an appropriate cloud service provider is an issue. This paper introduces a completely novel idea on most appropriate cloud service selection through an intermediator. It is based on the new notion of a marketspace. Our paper is devoted to the investigation of a novel architecture suggested for a marketspace. Several theoretical notions related to trust have also been explained extensively in the paper for Cloud service provider selection.
IRJET- Cross User Bigdata DeduplicationIRJET Journal
This document summarizes and reviews various techniques for cross-user big data deduplication. It proposes a model that performs deduplication of data for multiple users to achieve uniqueness of textual data uploaded by users while maintaining efficient data access and privacy. The model uses a fixed-size blocking algorithm and hashing algorithm to divide files into blocks, generate hash keys for each block, and perform intra-user and inter-user deduplication checking in two phases to identify and eliminate redundant data across users. It reviews related work that uses techniques like MapReduce, clustering, variable size chunking and metadata to implement parallel and application-driven deduplication.
A hybrid cloud approach for secure authorizedNinad Samel
This document summarizes a research paper that proposes a hybrid cloud approach for secure authorized data deduplication. The paper presents a scheme that uses convergent encryption to encrypt files before uploading them to cloud storage. It also considers the differential privileges of users when performing duplicate checks, in addition to file content. A prototype is implemented to test the proposed authorized duplicate check scheme. Experimental results show the scheme incurs minimal overhead compared to normal cloud storage operations. The goal is to better protect data security while supporting deduplication in a hybrid cloud architecture.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
This document summarizes a research paper that proposes a new password management system called Security Blanket Algorithm. The system uses strong encryption to securely store user logins, passwords, credit cards and other sensitive information in the cloud or locally on a device. When adding a new device, the system implements two-factor authentication for security. All data and communications are encrypted using AES-256. The system aims to provide secure password management while hiding encryption keys and passwords from cloud servers or third parties.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
This document summarizes a research paper that proposes a method for managing sensitive user data in cloud computing through measurable and secure data access controls. It discusses privacy issues with current data storage practices in cloud computing. The proposed method uses attribute-based encryption to assign users fine-grained access permissions to limited amounts of data for a specific time period. This aims to address issues with data leakage, privacy, and lack of data owner control in existing cloud data systems. The method was implemented in a simulation using .NET technologies to test access permissions between cloud service providers, consumers, and users.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
The document discusses the challenges of cloud forensics. Some key challenges discussed are:
1) Physical inaccessibility of digital evidence stored in the cloud makes evidence collection difficult as investigators do not have direct access to cloud servers.
2) Dynamic IP addresses in the cloud make it challenging to map IP addresses for search warrants as locations cannot be precisely tracked.
3) Volatile cloud data can be lost if storage instances are shutdown, as data only exists in memory and lacks persistence. This poses issues for forensic investigation.
The document also examines limitations of current forensic tools for cloud environments and issues of trust when relying on cloud providers' employees to collect forensic data. Overall, the challenges discussed center around the lack
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes a research paper that proposes a privacy-preserving model called BSS Homomorphic Encryption for outsourcing the mining of frequent patterns from large transactional databases. The model aims to encrypt transaction data in a way that protects both individual data items and mined patterns. It works by grouping data items, adding fake transactions, and converting the encrypted database into a matrix format to prevent guessing attacks. Experimental results on a real transactional database show the technique effectively protects privacy while remaining scalable.
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...IRJET Journal
This document proposes a novel approach for secure group data sharing and storage in cloud computing. It aims to enable anonymous data sharing within a group in the cloud with high security and efficiency. The approach uses group signatures and key agreement to allow group members to secretly share data about the group, while a common group key is determined based on key agreement to allow secure sharing and storage of group data in the cloud. Both theoretical and experimental analysis show that the proposed scheme is secure and efficient for group data sharing in cloud computing.
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
This document summarizes and reviews several research papers on providing anonymous authentication and access control for securely storing user data in the cloud. It discusses how traditional access control schemes used for clouds are centralized, while the proposed decentralized approach supports anonymous verification of user identities by the cloud before storing data, and only allows authorized users to decrypt stored information. The scheme prevents replay attacks and enables creation, modification and reading of stored data, while also addressing user revocation. Communication, computation and storage overhead are similar to centralized approaches. Attribute-based encryption techniques are explored that allow flexible access policies based on user attributes.
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...IRJET Journal
The document proposes a Secret Sharing Group Key Management Protocol (SSGK) to secure data sharing in cloud storage and minimize privacy and security risks of big data. SSGK uses a group key to encrypt shared data and a secret sharing scheme to distribute the group key to legitimate sharers. It aims to control access permissions for shared data and only allow authorized participants to access and re-encrypt keys. The protocol takes measures like using symmetric encryption for data and re-encryption for keys to enhance security of shared data in cloud storage. It provides a secure way for information owners to share data and users to access data on demand in cloud-based healthcare and other information systems.
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
This document summarizes a research paper that proposes an effective and secure distributed storage structure for cloud computing. The proposed structure classifies user data into three categories based on importance. More important data is encrypted with stronger encryption algorithms and larger key sizes, while less important data uses lighter encryption. This reduces complexity and cost compared to encrypting all data with the same encryption. The structure aims to provide security for data transmission and storage in the cloud while balancing efficiency. It was found to have better performance than other existing cloud storage structures.
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
This document summarizes several papers related to secure data sharing schemes for dynamic groups in the cloud. It discusses key distribution methods using a key manager to distribute keys to group members. The document also reviews papers on revoking members from a group without compromising past signatures, verifying computations on outsourced data, variations of computational and decisional Diffie-Hellman problems, and proofs of retrievability for verifying intact files stored remotely. The conclusion is that mobile cloud computing can extend the boundaries of mobile applications but must satisfy security parameters like integrity, authorization and access control.
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
This document discusses deduplication of encrypted big data stored in the cloud. It proposes a scheme for secure and efficient deduplication of encrypted data in cloud storage based on ownership challenge and BLS signature based homomorphic linear authenticator. The scheme allows for reducing storage needs by eliminating duplicate encrypted data files, while preserving data privacy and enabling public auditing of data integrity. It evaluates the performance and security of the proposed scheme through analysis and simulations, finding it to be more efficient than existing solutions at supporting both deduplication and auditing of encrypted data in cloud storage, especially for big data.
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
This document proposes an anti-collusion data sharing scheme for centralized groups in the cloud. It aims to securely distribute keys without a secure communication channel and enable fine-grained access control and secure revocation of users. The scheme distributes private keys from the group manager to users and supports dynamic groups efficiently. It protects against collusion attacks where revoked users cannot access shared data even when conspiring with the untrusted cloud. The scheme achieves secure key distribution, access control and user revocation with low computation and storage costs compared to other schemes. It analyzes the security of the scheme and simulations demonstrate its efficiency.
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
This document proposes a novel three-level isolation framework for cloud storage based on fog computing. The framework aims to address privacy and security issues in cloud storage by distributing user data across three layers - cloud servers, fog servers, and local machines. It uses a hash-Solomon encoding algorithm to split user data into multiple shares and store each share in a different layer. This provides three-way redundancy to protect against data loss and enhances security by isolating data across multiple environments. Theoretical analysis and experimental evaluation demonstrate the feasibility and security improvements of the proposed three-level isolation framework compared to existing cloud storage schemes.
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMIRJET Journal
This document discusses implementing blockchain technology in an educational system to securely store student data such as subject selections. It proposes a system using distributed databases and data encryption to store identical student records across multiple database instances. When a student selects a subject, their information would be encrypted and stored in a new "block" across different databases to prevent tampering. This creates an immutable and transparent record of subject selections that all relevant authorities and students can access in real-time.
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
This document discusses multi-owner keyword search over encrypted data stored in the cloud. It notes that most existing schemes only consider a single data owner, and require secure channels to transmit secret keys. It proposes that allowing multiple data owners to share encrypted data and enable keyword searches across this shared data addresses these limitations. The document outlines challenges like ensuring data privacy and confidentiality when outsourcing encrypted data to remote cloud servers. It reviews related work on searchable encryption schemes and their limitations in multi-owner settings. The goal is to enable efficient keyword searches across large encrypted datasets from multiple data owners stored in the cloud.
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
This document discusses security and privacy issues related to cloud computing. It begins by providing background on cloud computing architectures and infrastructures. It then reviews existing literature on common security issues in cloud computing like confidentiality, authentication, access control, and privacy. It also discusses potential solutions that have been proposed, such as virtualization, encryption, access control frameworks, and risk-adaptable access control models. Finally, it proposes a two-tier authentication scheme within a risk-adaptable access control framework to help address security and privacy challenges in cloud computing.
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
Cloud unlocks a different era in Information technology where it has the capability of providing the customers with a variety of scalable and flexible services. Cloud provides these services through a prepaid system, which helps the customers cut down on large investments on IT hardware
and other infrastructure. Also according to the Cloud viewpoint, customers don’t have control on their
respective data. Hence security of data is a big issue of using a Cloud service. Present work shows that
the data auditing can be done by any third party agent who is trusted and known as auditor. The auditor can verify the integrity of the data without having the ownership of the actual data. There are many disadvantages for the above approach. One of them is the absence of a required verification procedure among the auditor and service provider which means any person can ask for the verification of the file which puts this auditing at certain risk. Also in the existing scheme the data updates can be
done only for coarse granular updates i.e. blocks with the uneven size. And hence resulting in repeated communication and updating of auditor for a whole file block causing higher communication costs and
requires more storage space. In this paper, the emphasis is to give a proper breakdown for types of
fixed granular updates and put forward a design that will be capable to maintain authenticated and unrestricted auditing. Based on this system, there is also an approach for remarkably decreasing the communication costs for auditing little updates
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
This document proposes an anti-collusion data sharing scheme for centralized groups in the cloud. It aims to securely share data among dynamic group members while outsourcing the data to an untrusted cloud.
The proposed scheme has three key aspects: 1) It introduces a secure key distribution method without requiring secure communication channels, allowing users to securely obtain private keys. 2) It enables fine-grained access management where current group members can access cloud data and revoked users are blocked. 3) It protects against collusion attacks where revoked users cannot access the original data even when conspiring with the untrusted cloud. The scheme achieves secure user revocation through polynomial operations.
The scheme is designed to provide security for data
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
1. The document discusses auditing and resisting key exposure in cloud storage. It proposes a new framework called an auditing protocol with key-exposure resilience that allows integrity of stored data to still be verified even if the client's current secret key is exposed.
2. It formalizes the definition and security model for such a protocol and proposes an efficient practical construction. The security proof and asymptotic performance analysis show the proposed protocol is secure and efficient.
3. Key techniques used include periodic key updates, homomorphic linear authenticators, and a novel authenticator construction to boost forward security and provide proof of retrievability with the current design.
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
This document proposes a new efficient solitude securing ranked keyword search technique for cloud computing. It presents a Multi-keyword Ranked Search over Encrypted Hierarchical Clustering Index (MRSE-HCI) architecture that uses quality hierarchical clustering to organize documents and support fast keyword searches in an encrypted cloud environment. The technique uses a minimum hash subtree to verify the correctness and freshness of search results to address integrity and security issues. Experimental results demonstrate that the proposed technique improves search efficiency, accuracy, and rank privacy compared to traditional methods.
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
This document proposes an efficient and privacy-preserving approach for outsourced data from resource-constrained mobile devices in cloud computing. It employs probabilistic public key encryption to encrypt the data and performs ranked keyword search over the encrypted data to retrieve files from the cloud. The approach aims to achieve efficient encryption without sacrificing data privacy. The ranked keyword search improves usability by returning the most relevant files and ensuring retrieval accuracy, while reducing computation and communication overhead. A thorough security and performance analysis proves the approach is semantically secure and efficient.
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
This document proposes a scheme for efficient and verifiable queries over encrypted data stored in the cloud. It aims to allow an authorized user to query encrypted documents of interest while maintaining privacy. The scheme provides a verification mechanism to allow users to check the correctness of query results and identify any valid results omitted by a potentially untrustworthy cloud server. The document reviews related work on searchable encryption and verifiable queries. It then outlines the proposed approach to build secure verifiable queries for encrypted cloud data.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
This document summarizes a research paper that proposes a method for ensuring data integrity and privacy when data is stored on cloud computing systems. The method uses blockchain techniques and distributed verification to provide redundancy and guarantee data reliability. It allows both data owners and public verifiers to check data integrity without downloading the entire dataset. The technique utilizes homomorphic tokens and ring signatures to enable auditing while preventing privacy leaks about user identities or data contents. Prior works on remote data integrity lacked either public auditing or support for dynamic data operations, but the proposed method achieves both.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
Similar to IRJET- An Data Sharing in Group Member with High Security using Symmetric Balanced Incomplete Block Design (SBIBD) in Cloud Computing (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.