This document discusses domain data security on cloud computing. It begins by defining domains as a way to partition data for security, notifications, and reporting purposes. Data is highly secure within a domain. The document then discusses how distributing data across different domains based on regions can improve security and access. It analyzes security issues in cloud environments and discusses authentication, encryption, and other techniques used for data security in cloud computing. Segregating data by domain allows for faster access, easier maintenance, and higher security according to the document.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
This document discusses techniques for securing data in multi-cloud computing simulations. It proposes a protocol for securely transferring data between cloud servers and storage nodes using encryption and digital signatures. The protocol uses cryptographic algorithms like elliptic curve cryptography to encrypt data, generate digital signatures for authentication, and distribute encrypted data fragments across multiple clouds for redundancy and access control. A simulation of the protocol shows how cloudlets are distributed across different data centers and virtual machines using encrypted channels and access controls. The protocol aims to provide secure data transmission and storage in multi-cloud environments.
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
1) Homomorphic encryption allows processing of encrypted data without decrypting it first, enabling secure computations on outsourced data in cloud computing.
2) A homomorphic encryption scheme is proposed that uses a large integer ring as the plaintext space and a single key for encryption and decryption, providing confidentiality even when a non-trusted cloud server processes encrypted data.
3) The scheme could enable applications like private queries to a search engine, private information retrieval from databases, and secure electronic voting by allowing computations on encrypted data.
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
This document discusses security concerns in cloud computing. It analyzes various encryption techniques that can be used to enhance security and reliability of data stored in the cloud. The paper provides a literature review of techniques such as homomorphic encryption, digital signatures, and block-level encryption. It then compares the techniques based on parameters like execution time, space utilization, and overhead. The analysis found that homomorphic encryption coupled with redundancy handling could provide more secure data storage while reducing costs. Future work may involve applying this hybrid approach to further enhance cloud security.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
This document summarizes a research paper that proposes a new password management system called Security Blanket Algorithm. The system uses strong encryption to securely store user logins, passwords, credit cards and other sensitive information in the cloud or locally on a device. When adding a new device, the system implements two-factor authentication for security. All data and communications are encrypted using AES-256. The system aims to provide secure password management while hiding encryption keys and passwords from cloud servers or third parties.
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
This document presents a system approach for single keyword search of encrypted data files stored in the cloud. It proposes using order-preserving encryption to achieve security and efficiency. The system architecture involves a cloud owner uploading and encrypting files, storing them in the cloud storage, and a user searching for files by encrypting keywords. It aims to address security concerns with cloud storage while allowing efficient searches. Evaluation shows the approach allows authentication, file uploads and downloads, and keyword searches of encrypted files in the cloud.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
This document discusses techniques for securing data in multi-cloud computing simulations. It proposes a protocol for securely transferring data between cloud servers and storage nodes using encryption and digital signatures. The protocol uses cryptographic algorithms like elliptic curve cryptography to encrypt data, generate digital signatures for authentication, and distribute encrypted data fragments across multiple clouds for redundancy and access control. A simulation of the protocol shows how cloudlets are distributed across different data centers and virtual machines using encrypted channels and access controls. The protocol aims to provide secure data transmission and storage in multi-cloud environments.
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
1) Homomorphic encryption allows processing of encrypted data without decrypting it first, enabling secure computations on outsourced data in cloud computing.
2) A homomorphic encryption scheme is proposed that uses a large integer ring as the plaintext space and a single key for encryption and decryption, providing confidentiality even when a non-trusted cloud server processes encrypted data.
3) The scheme could enable applications like private queries to a search engine, private information retrieval from databases, and secure electronic voting by allowing computations on encrypted data.
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
This document discusses security concerns in cloud computing. It analyzes various encryption techniques that can be used to enhance security and reliability of data stored in the cloud. The paper provides a literature review of techniques such as homomorphic encryption, digital signatures, and block-level encryption. It then compares the techniques based on parameters like execution time, space utilization, and overhead. The analysis found that homomorphic encryption coupled with redundancy handling could provide more secure data storage while reducing costs. Future work may involve applying this hybrid approach to further enhance cloud security.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
This document summarizes a research paper that proposes a new password management system called Security Blanket Algorithm. The system uses strong encryption to securely store user logins, passwords, credit cards and other sensitive information in the cloud or locally on a device. When adding a new device, the system implements two-factor authentication for security. All data and communications are encrypted using AES-256. The system aims to provide secure password management while hiding encryption keys and passwords from cloud servers or third parties.
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
This document presents a system approach for single keyword search of encrypted data files stored in the cloud. It proposes using order-preserving encryption to achieve security and efficiency. The system architecture involves a cloud owner uploading and encrypting files, storing them in the cloud storage, and a user searching for files by encrypting keywords. It aims to address security concerns with cloud storage while allowing efficient searches. Evaluation shows the approach allows authentication, file uploads and downloads, and keyword searches of encrypted files in the cloud.
Security policy enforcement in cloud infrastructurecsandit
This document proposes an architecture for implementing security in cloud computing systems, particularly for Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) models. It discusses key security issues like confidentiality, integrity, and authentication in cloud systems. It then proposes a framework that incorporates solutions like homomorphic encryption to ensure confidentiality while still allowing data processing, as well as using standards like XACML for flexible policy-based access control and authentication. The goal is to provide an integrated security solution as a service for cloud platforms.
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
This document proposes a double stage encryption algorithm to securely store multimedia content like images, audio, and video in the cloud. In the first stage, multimedia content is encrypted into ciphertext using AES symmetric encryption. The ciphertext is then encrypted again in the cloud using a randomly generated symmetric key for added security. This makes it difficult for attackers to extract the encryption key and recover the original multimedia content even if they obtain the ciphertext. The algorithm aims to provide security against side channel attacks in cloud computing through its use of random key generation and double encryption. It is described as having low complexity and wide applicability for safeguarding multimedia content in the cloud.
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
This document proposes and evaluates a solution to securely disseminate sensitive IoT data using FIWARE and Intel SGX. The solution uses FIWARE components for authentication and authorization, and introduces a new Key Vault component that uses Intel SGX to securely store and manage encryption keys. Sensitive IoT data from smart meters is encrypted before being sent to the FIWARE Orion Context Broker for processing. Consumers that are SGX applications can decrypt and process the data securely within the SGX enclave. The evaluation shows the solution provides privacy and security guarantees without harming scalability or availability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enforcing multi user access policies in cloud computingIAEME Publication
This document discusses enforcing multi-user access policies in cloud computing. It describes how encryption techniques can be used to securely store data in the cloud and allow authorized users to access encrypted data through key management. The document also discusses security risks in cloud computing like authentication, access control and data leaks. It argues that a policy-based approach is needed to define and enforce access policies for users to access encrypted data securely in the cloud.
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
This document proposes a system to securely store data in the cloud by using honeypot technology and cryptographic algorithms. The proposed system aims to provide better data security for users by only allowing authenticated users to access encrypted data stored in the cloud. If an unauthenticated user attempts to access the data, the system will send them garbage files using honeypot technology to detect unauthorized access attempts. The system uses RSA encryption to encrypt user files before storing them in the cloud, requiring the private key to decrypt files, ensuring only authenticated users can access the encrypted user data stored remotely.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
This document discusses cloud computing and its security aspects. It begins by defining cloud computing as a new computing paradigm that provides hosted services over the internet on demand. Security is identified as a major concern for cloud computing since data and services are distributed over an open environment. The document then examines different types of clouds and cloud providers, and explores some common security issues in cloud computing including confidentiality, integrity, availability, and privacy. It emphasizes that security needs to be carefully considered for cloud computing to gain wider acceptance.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
This document proposes a model for enhancing data storage security in cloud computing systems. It discusses threats and attacks to cloud data storage from external and internal sources. It then describes three common cloud deployment models: public clouds, private clouds, and hybrid clouds. The document proposes that cloud systems should include cloud service providers, users, and third party auditors. It also outlines two types of potential adversaries (weak and strong). Finally, it proposes design goals for secure cloud data storage systems, including ensuring storage correctness, fast error localization, dynamic data support, dependability, and lightweight verification.
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security threats in cloud computing like denial of service attacks, side channel attacks, and man-in-the-middle cryptographic attacks. The document proposes a layered framework for assured cloud computing and techniques for secure publication of data in the cloud, including encryption. It concludes that achieving end-to-end security in cloud computing will be challenging due to complexity, but that more secure operations can be ensured even if some parts of the cloud fail.
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security attacks to clouds like denial of service attacks and man-in-the-middle attacks. Security concerns with moving data and applications to the cloud are outlined. Techniques for securely publishing data in the cloud are also presented. The document concludes that security in cloud computing is challenging due to the complexity of clouds but that assurance of secure and mission-critical operations is important.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out by Mamarajabov Odil Elmurzayevich 2020. Cloud technology to ensure the protection of fundamental methods and use of information. International Journal on Integrated Education. 3, 10 (Oct. 2020), 313-315. DOI:https://doi.org/10.31149/ijie.v3i10.780 https://journals.researchparks.org/index.php/IJIE/article/view/780/750 https://journals.researchparks.org/index.php/IJIE/article/view/780
Cloud Computing is benefiting to both cloud hosts and consumers by providing elastic services as a utility. These
services are provided on the basis of Service Level Agreement (SLA). Security and privacy are major issues when dealing with a multi - tenant model of cloud. Consumers are provided computing power in terms of virtual machines (VMs). A consumer can have many VMs at a time. Multiple consumers can get different VMs from the same server. This may lead to cross-VM attacks. This paper introduces a new framework: SAFETY (Security Awareness Framework for Everyone's Task with You), for maintaining security from cross-VM attacks, Data
leakage, VM theft, VM escape, Hyper jacking and VM Hopping. Experiments and results show that this framework is suitable and can be used for secure operations at cloud host side.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
This document discusses enforcing multi-user security policies in cloud computing. It describes using key-policy attribute-based encryption (KP-ABE) to allow flexible and fine-grained access control of encrypted data stored on cloud servers. The database is encrypted using KP-ABE before being stored. The key management authority generates key sets for authorized users that determine which attributes they can access. This allows complex queries to be run on the encrypted database while maintaining security and privacy.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
This document discusses data security in cloud computing environments using encryption techniques. It proposes a system that encrypts and decrypts text files using AES encryption to securely store and access data in the cloud. The system provides three main functions: registration and login for user authentication, encryption of selected files before uploading to the cloud, and decryption of encrypted files downloaded from the cloud. Encrypting data in the cloud with AES aims to ensure confidentiality, integrity and availability of user information.
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
This document proposes a new auditing mechanism to improve the efficiency and security of attribute-based encryption for securing cloud data. The existing single attribute authority model results in long wait times for users to obtain secret keys. The proposed approach employs multiple attribute authorities that can share the work of key distribution to reduce wait times. A central authority generates keys for verified users, while each attribute is managed by its own authority. The mechanism can also detect incorrectly verified users to enhance security. Analysis shows the auditing mechanism improves cloud security performance compared to previous single authority schemes.
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
This document presents a proposed Trusted Third Party Auditing (TPA) model called the Trusted TPA Model (TTM) to improve security and reliability for cloud storage. The TTM uses AES-256 encryption and SHA-1 hashing to provide two-way security by maintaining both data security and integrity. It aims to improve over existing methods by providing more efficient encryption/decryption, better computation times, optimal storage costs, and stronger privacy and integrity. The TTM uses AES-256 and SHA-1, Diffie-Hellman key exchange, and involves modules for data upload, key generation/exchange, encryption/hashing, and TPA verification. An evaluation shows the TTM provides better results than
Security policy enforcement in cloud infrastructurecsandit
This document proposes an architecture for implementing security in cloud computing systems, particularly for Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) models. It discusses key security issues like confidentiality, integrity, and authentication in cloud systems. It then proposes a framework that incorporates solutions like homomorphic encryption to ensure confidentiality while still allowing data processing, as well as using standards like XACML for flexible policy-based access control and authentication. The goal is to provide an integrated security solution as a service for cloud platforms.
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
This document proposes a double stage encryption algorithm to securely store multimedia content like images, audio, and video in the cloud. In the first stage, multimedia content is encrypted into ciphertext using AES symmetric encryption. The ciphertext is then encrypted again in the cloud using a randomly generated symmetric key for added security. This makes it difficult for attackers to extract the encryption key and recover the original multimedia content even if they obtain the ciphertext. The algorithm aims to provide security against side channel attacks in cloud computing through its use of random key generation and double encryption. It is described as having low complexity and wide applicability for safeguarding multimedia content in the cloud.
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
This document proposes and evaluates a solution to securely disseminate sensitive IoT data using FIWARE and Intel SGX. The solution uses FIWARE components for authentication and authorization, and introduces a new Key Vault component that uses Intel SGX to securely store and manage encryption keys. Sensitive IoT data from smart meters is encrypted before being sent to the FIWARE Orion Context Broker for processing. Consumers that are SGX applications can decrypt and process the data securely within the SGX enclave. The evaluation shows the solution provides privacy and security guarantees without harming scalability or availability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enforcing multi user access policies in cloud computingIAEME Publication
This document discusses enforcing multi-user access policies in cloud computing. It describes how encryption techniques can be used to securely store data in the cloud and allow authorized users to access encrypted data through key management. The document also discusses security risks in cloud computing like authentication, access control and data leaks. It argues that a policy-based approach is needed to define and enforce access policies for users to access encrypted data securely in the cloud.
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
This document proposes a system to securely store data in the cloud by using honeypot technology and cryptographic algorithms. The proposed system aims to provide better data security for users by only allowing authenticated users to access encrypted data stored in the cloud. If an unauthenticated user attempts to access the data, the system will send them garbage files using honeypot technology to detect unauthorized access attempts. The system uses RSA encryption to encrypt user files before storing them in the cloud, requiring the private key to decrypt files, ensuring only authenticated users can access the encrypted user data stored remotely.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
This document discusses cloud computing and its security aspects. It begins by defining cloud computing as a new computing paradigm that provides hosted services over the internet on demand. Security is identified as a major concern for cloud computing since data and services are distributed over an open environment. The document then examines different types of clouds and cloud providers, and explores some common security issues in cloud computing including confidentiality, integrity, availability, and privacy. It emphasizes that security needs to be carefully considered for cloud computing to gain wider acceptance.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
This document proposes a model for enhancing data storage security in cloud computing systems. It discusses threats and attacks to cloud data storage from external and internal sources. It then describes three common cloud deployment models: public clouds, private clouds, and hybrid clouds. The document proposes that cloud systems should include cloud service providers, users, and third party auditors. It also outlines two types of potential adversaries (weak and strong). Finally, it proposes design goals for secure cloud data storage systems, including ensuring storage correctness, fast error localization, dynamic data support, dependability, and lightweight verification.
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security threats in cloud computing like denial of service attacks, side channel attacks, and man-in-the-middle cryptographic attacks. The document proposes a layered framework for assured cloud computing and techniques for secure publication of data in the cloud, including encryption. It concludes that achieving end-to-end security in cloud computing will be challenging due to complexity, but that more secure operations can be ensured even if some parts of the cloud fail.
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security attacks to clouds like denial of service attacks and man-in-the-middle attacks. Security concerns with moving data and applications to the cloud are outlined. Techniques for securely publishing data in the cloud are also presented. The document concludes that security in cloud computing is challenging due to the complexity of clouds but that assurance of secure and mission-critical operations is important.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out by Mamarajabov Odil Elmurzayevich 2020. Cloud technology to ensure the protection of fundamental methods and use of information. International Journal on Integrated Education. 3, 10 (Oct. 2020), 313-315. DOI:https://doi.org/10.31149/ijie.v3i10.780 https://journals.researchparks.org/index.php/IJIE/article/view/780/750 https://journals.researchparks.org/index.php/IJIE/article/view/780
Cloud Computing is benefiting to both cloud hosts and consumers by providing elastic services as a utility. These
services are provided on the basis of Service Level Agreement (SLA). Security and privacy are major issues when dealing with a multi - tenant model of cloud. Consumers are provided computing power in terms of virtual machines (VMs). A consumer can have many VMs at a time. Multiple consumers can get different VMs from the same server. This may lead to cross-VM attacks. This paper introduces a new framework: SAFETY (Security Awareness Framework for Everyone's Task with You), for maintaining security from cross-VM attacks, Data
leakage, VM theft, VM escape, Hyper jacking and VM Hopping. Experiments and results show that this framework is suitable and can be used for secure operations at cloud host side.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
This document discusses enforcing multi-user security policies in cloud computing. It describes using key-policy attribute-based encryption (KP-ABE) to allow flexible and fine-grained access control of encrypted data stored on cloud servers. The database is encrypted using KP-ABE before being stored. The key management authority generates key sets for authorized users that determine which attributes they can access. This allows complex queries to be run on the encrypted database while maintaining security and privacy.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
This document discusses data security in cloud computing environments using encryption techniques. It proposes a system that encrypts and decrypts text files using AES encryption to securely store and access data in the cloud. The system provides three main functions: registration and login for user authentication, encryption of selected files before uploading to the cloud, and decryption of encrypted files downloaded from the cloud. Encrypting data in the cloud with AES aims to ensure confidentiality, integrity and availability of user information.
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
This document proposes a new auditing mechanism to improve the efficiency and security of attribute-based encryption for securing cloud data. The existing single attribute authority model results in long wait times for users to obtain secret keys. The proposed approach employs multiple attribute authorities that can share the work of key distribution to reduce wait times. A central authority generates keys for verified users, while each attribute is managed by its own authority. The mechanism can also detect incorrectly verified users to enhance security. Analysis shows the auditing mechanism improves cloud security performance compared to previous single authority schemes.
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
This document presents a proposed Trusted Third Party Auditing (TPA) model called the Trusted TPA Model (TTM) to improve security and reliability for cloud storage. The TTM uses AES-256 encryption and SHA-1 hashing to provide two-way security by maintaining both data security and integrity. It aims to improve over existing methods by providing more efficient encryption/decryption, better computation times, optimal storage costs, and stronger privacy and integrity. The TTM uses AES-256 and SHA-1, Diffie-Hellman key exchange, and involves modules for data upload, key generation/exchange, encryption/hashing, and TPA verification. An evaluation shows the TTM provides better results than
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
This document discusses multitenancy in cloud computing. It begins with an abstract describing multitenancy as the sharing of computing infrastructure like databases, processors and storage among multiple customers and organizations, providing cost and performance advantages. It then provides background on cloud computing and its advantages over traditional server systems. The document outlines the various components of a multitenant cloud computing system including users, providers and modules. It discusses requirements analysis and describes the system architecture and a multi-cloud system approach. In conclusion, it states that cloud computing will be extremely useful in the future for both testing startup projects and moving existing technology to reduce costs through a pay-per-use model.
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
This document presents a privacy preserving and efficient identity search technique for cloud data security. It proposes a scheme using visual-encryption techniques to overcome issues with untrusted cloud storage. The existing methodology uses data signing algorithms but has limitations as the private key depends on the security of one computer. The proposed system uses visual-cryptographic encryption, which scrambles data using an algorithm requiring a key to decrypt. It involves users uploading encrypted files, administrators approving requests to view files through live video verification, and decryption using the appropriate key. The scheme aims to securely store large volumes of data while allowing identity verification for file access on the cloud.
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET Journal
This document summarizes a research paper that proposes a method for securely sharing session keys to retrieve private data stored in the cloud. The method aims to address privacy and security issues when third parties need temporary access to user data in the cloud. A session key with time and usage limitations is shared instead of granting full access. The key is encrypted so only authorized parties can decrypt and access the data for a limited time, improving security of cloud data retrieval.
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
This document proposes an approach to secure data stored in the cloud by using data shuffling, access control policies, and deduplication. It discusses encrypting user data using AES before uploading it to the cloud. An administrator can control the shuffling of encrypted data between servers at regular intervals to avoid tampering. Access control policies require authorized users to authenticate with a secret key before performing file operations. Deduplication prevents duplicate files from being stored to reduce storage usage by hashing and comparing file contents. The proposed approach aims to enhance security, prevent data tampering and duplication, and efficiently use cloud storage.
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
This document proposes a two-factor validation control framework for online distributed services. Specifically, it implements an attribute-based access control framework that requires both a customer secret key and a lightweight security device. This two-factor authentication mechanism enhances security, especially when multiple customers share the same computer. It also allows fine-grained access control based on user attributes while preserving privacy, as the cloud server only knows that a user satisfies certain attributes, not their identity. A simulation is performed to demonstrate the feasibility of the proposed two-factor framework.
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
This document proposes a system for secure and efficient file sharing and shared ownership in cloud systems. It introduces the concept of shared ownership where multiple users can jointly own a file. For a file access request to be granted, approval is required from a predefined threshold of the file's owners. The system uses AES-128 encryption to encrypt files for security. It allows owners to share files and ownership with other authorized users, who can then read from and write to the shared file. This provides more flexibility than systems with only single user file ownership.
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
This document proposes a system to securely store personal user files on distributed cloud servers using biometric authentication. The system splits user files into encrypted fragments that are stored across multiple cloud storages like AWS and Google Drive. When the user wants to access a file, their fingerprint is authenticated and the encrypted fragments are retrieved from the clouds, decrypted using Rijndael encryption, and merged back into the original file which is then downloaded to the user. The system aims to improve security over storing files on a single cloud by distributing encrypted fragments across multiple clouds and requiring biometric authentication to access the decrypted files.
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
This document proposes an efficient and privacy-preserving approach for outsourced data from resource-constrained mobile devices in cloud computing. It employs probabilistic public key encryption to encrypt the data and performs ranked keyword search over the encrypted data to retrieve files from the cloud. The approach aims to achieve efficient encryption without sacrificing data privacy. The ranked keyword search improves usability by returning the most relevant files and ensuring retrieval accuracy, while reducing computation and communication overhead. A thorough security and performance analysis proves the approach is semantically secure and efficient.
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
This document discusses using homomorphic encryption to securely store and process data in the cloud. It begins with an introduction to cloud computing and data security challenges. The proposed system would encrypt user data before transferring it to the cloud server using homomorphic encryption. This allows computations to be performed on the encrypted data without decrypting it first, protecting data privacy. The document reviews related work on authentication schemes and secure file storage using encryption. It presents the proposed system architecture and concludes that homomorphic encryption can help address cloud computing security issues by allowing operations on encrypted user data.
This document proposes a method to improve data storage security in cloud computing using Identity-Based Cryptography (IBC) and Elliptic Curve Cryptography (ECC). IBC reduces key management complexity and eliminates the need for certificates by using a user's identity as their public key. ECC provides data confidentiality through encryption and data integrity is provided by Elliptic Curve Digital Signature Algorithm (ECDS). The proposed method involves a Private Key Generator (PKG) that generates user keys, a Trusted Cloud (TC) that stores encrypted user data, and users who encrypt data using IBC and ECC before storing it on the TC. This is intended to provide secure and flexible data storage in cloud computing.
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
This document summarizes a research paper that proposes a new method for secure group data sharing and key agreement in cloud computing. The proposed method uses block design to distribute keys without requiring a secure communication channel. It stores encrypted data across multiple clouds to prevent collusion attacks. The system provides two layers of encryption and fine-grained access control for dynamic groups. It aims to address security issues with existing approaches like single cloud storage and insecure key distribution.
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
This document reviews a proposed lightweight secure data sharing scheme (LDSS) for mobile cloud computing. It aims to address the problems of high computational overhead for mobile devices and lack of security when data is stored and shared in the cloud. The proposed LDSS framework uses attribute-based encryption and proxy servers to perform intensive encryption and decryption tasks, reducing the computational load on mobile clients. It also introduces lazy re-encryption and attribute fields to help efficiently revoke user access privileges. The goal is to provide secure yet lightweight data sharing capabilities for mobile cloud applications and services.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
This document discusses enforcing multi-user security policies in cloud computing. It describes using key-policy attribute-based encryption (KP-ABE) to allow flexible and fine-grained access control of encrypted data stored on cloud servers. The database is encrypted using KP-ABE before being stored. A key management authority generates key sets for authorized users to decrypt portions of the database according to assigned access policies. This allows complex queries to be run on the encrypted database while protecting data confidentiality even from the cloud server.
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
This document discusses security and efficiency challenges with sharing data in the cloud. It notes that while cloud computing allows easy storage and sharing of data, this exposes user data to security attacks. When data is shared in the cloud, cryptographic and authentication techniques are needed to protect user data. Mechanisms for sharing data must also be efficient so they do not reduce cloud service performance or waste resources. The document reviews several existing approaches for secure and efficient data sharing in cloud computing and their limitations, noting the need for improved techniques that can handle multiple users and owners dynamically sharing data.
Cloud computing provides on-demand access to computing resources and IT services over the Internet. While cloud computing provides scalability and cost savings, security is a major concern due to issues like data breaches, multi-tenant infrastructure sharing user data, and lack of governance over cloud provider control of resources. Virtualization is key to cloud computing but introduces vulnerabilities if not implemented securely. Data security risks include exposure of data at rest in cloud storage and data in transit between cloud systems. Strong authentication, encryption of data in transit and at rest, and use of private clouds can help address these security issues but securing cloud systems remains a major challenge.
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
The document proposes a mutual key oversight procedure for cloud security and distribution of data based on a hierarchy method. It discusses using attribute-based encryption to encrypt data before outsourcing it to the cloud. The proposed scheme uses a hierarchical structure with a cloud authority, domain authorities, and users to provide security and scalability. It allows both private and public uploading and sharing of files within this hierarchy.
Similar to IRJET-Domain Data Security on Cloud (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.