1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
This document discusses secure data access and sharing in cloud computing environments. It first outlines some security requirements for data sharing in clouds, including data security, privacy, confidentiality, access control, user revocation, and scalability. It then surveys several cryptographic techniques for secure data sharing, including attribute-based encryption (ABE), key-policy attribute-based encryption (KP-ABE), and identity-based encryption (IBE). It also discusses proxy re-encryption as another technique that supports secure data sharing using a semi-trusted proxy to convert ciphertexts between users' public keys.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
Abstract: Cloud computing provides an economical and efficient solution for sharing data among the cloud users in the group , users sharing data in a multi-attorney manner preserving data and identity privacy from an untrusted cloud, it is still a challenging issue, due to frequent change of the membership in the group. In this paper, we propose a multi-attorney data sharing scheme for the dynamic groups in the cloud. By combing group signature and Tripple DES encryption techniques, any cloud user anonymously share the data with others. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.Keywords: cloud computing, data sharing, privacy-preserving, access control, and dynamic groups.
Title: Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Author: Vijaya Kumar Patil C, Manjunath H
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
The document summarizes key-aggregate cryptosystem (KAC), which allows efficient and flexible sharing of encrypted
data in cloud storage. KAC encrypts data under a public key and ciphertext class. The key owner can generate an
aggregate decryption key that decrypts any ciphertext whose class is contained in the key, while keeping a constant size.
This compact aggregate key can be shared to delegate decryption rights for a set of ciphertexts, without sharing individual
keys. KAC schemes aim to achieve constant-size ciphertexts, public keys, master secrets and aggregate keys to enable
flexible and efficient data sharing in cloud storage.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
This summary provides the key details from the document in 3 sentences:
The document proposes a secure multi-owner data sharing scheme for dynamic groups in cloud computing. The scheme allows any user in a group to securely store and share data files with others through the untrusted cloud. It uses techniques like group signature and dynamic broadcast encryption to provide anonymous access control while enabling the group manager to trace real identities when needed, and allows efficient user revocation and participation of new users.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
This document proposes a cloud-based access control model for selectively encrypting documents with traitor detection. It aims to address the high computational overhead of key management and secret sharing in existing attribute-based encryption approaches for cloud data security. The proposed model uses efficient algorithms and protocols like aggregate equality oblivious commitment-based envelope protocol and fast access control vector broadcast group key management to reduce overhead. It also introduces a traitor tracing technique to identify any traitors in the two-layer encryption environment for cloud computing.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
This document discusses secure data access and sharing in cloud computing environments. It first outlines some security requirements for data sharing in clouds, including data security, privacy, confidentiality, access control, user revocation, and scalability. It then surveys several cryptographic techniques for secure data sharing, including attribute-based encryption (ABE), key-policy attribute-based encryption (KP-ABE), and identity-based encryption (IBE). It also discusses proxy re-encryption as another technique that supports secure data sharing using a semi-trusted proxy to convert ciphertexts between users' public keys.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
Abstract: Cloud computing provides an economical and efficient solution for sharing data among the cloud users in the group , users sharing data in a multi-attorney manner preserving data and identity privacy from an untrusted cloud, it is still a challenging issue, due to frequent change of the membership in the group. In this paper, we propose a multi-attorney data sharing scheme for the dynamic groups in the cloud. By combing group signature and Tripple DES encryption techniques, any cloud user anonymously share the data with others. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.Keywords: cloud computing, data sharing, privacy-preserving, access control, and dynamic groups.
Title: Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Author: Vijaya Kumar Patil C, Manjunath H
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
The document summarizes key-aggregate cryptosystem (KAC), which allows efficient and flexible sharing of encrypted
data in cloud storage. KAC encrypts data under a public key and ciphertext class. The key owner can generate an
aggregate decryption key that decrypts any ciphertext whose class is contained in the key, while keeping a constant size.
This compact aggregate key can be shared to delegate decryption rights for a set of ciphertexts, without sharing individual
keys. KAC schemes aim to achieve constant-size ciphertexts, public keys, master secrets and aggregate keys to enable
flexible and efficient data sharing in cloud storage.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
This summary provides the key details from the document in 3 sentences:
The document proposes a secure multi-owner data sharing scheme for dynamic groups in cloud computing. The scheme allows any user in a group to securely store and share data files with others through the untrusted cloud. It uses techniques like group signature and dynamic broadcast encryption to provide anonymous access control while enabling the group manager to trace real identities when needed, and allows efficient user revocation and participation of new users.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
This document proposes a cloud-based access control model for selectively encrypting documents with traitor detection. It aims to address the high computational overhead of key management and secret sharing in existing attribute-based encryption approaches for cloud data security. The proposed model uses efficient algorithms and protocols like aggregate equality oblivious commitment-based envelope protocol and fast access control vector broadcast group key management to reduce overhead. It also introduces a traitor tracing technique to identify any traitors in the two-layer encryption environment for cloud computing.
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
This document summarizes a seminar presentation on secure data sharing for dynamic groups in multi-owner cloud environments. The presentation covered cloud computing fundamentals and challenges with identity privacy. It proposed a system called MONA that allows any group member to securely store and share encrypted data files on an untrusted cloud. Key features of MONA include dynamic group management such that new users can access previous data, anonymous yet traceable access control, and efficient user revocation. The presentation discussed the system architecture, models, modules including registration, login and file sharing, relevant algorithms, applications, advantages, and future work concerning reliability.
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
This document proposes a secure multi-owner data sharing scheme for dynamic groups in the cloud. It allows any user in a group to securely store and share data with others in the cloud. The key contributions are:
1) Any user can store and share data files with others through the cloud in a multi-owner manner.
2) The computation overhead and ciphertext size are constant and independent of the number of revoked users.
3) User revocation can be achieved without updating remaining users' private keys.
4) New users can directly decrypt files stored before their participation.
The proposed scheme uses group signatures for anonymous authentication and dynamic broadcast encryption for secure data sharing. It aims to address challenges like
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
This document proposes a secure multi-owner attribute authorities based data sharing scheme for dynamic groups in the cloud. It aims to enable secure data sharing in dynamic groups where there is no fixed attribute authority, using a key policy attribute-based encryption method to select dynamic attribute authorities. The proposed scheme uses group signatures, signed receipts, and dynamic broadcast encryption to allow cloud users to anonymously share data. It reduces computation cost and storage overhead compared to existing works, as the encryption computation cost and storage overhead are independent of the number of revoked users.
The Recent Trend: Vigorous unidentified validation access control system with...IJERA Editor
Service Providers can grow their business by selling our cloud authentication service that can be fully branded
to the Service Provider or if required a Service. The proposed enhanced decentralized access control scheme for
secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies
the authenticity of the series without knowing the user’s identity before storing data. The scheme also has the
added feature of access control in which only valid users are able to decrypt the stored information. The scheme
prevents replay attacks and supports creation, modification, and reading data stored in the cloud. It addresses
user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike
other access control schemes designed for clouds which are centralized. The communication, hiding attributes,
increasing high security in access, computation, and storage overheads are comparable to centralized
approaches.
In Existing, it is based on ABE (attribute based encryption) technique which is a centralized approach, where a
single Key Distribution Centre (KDC) distributes secret keys and attributes to all users using asymmetric key
approach. We propose a new decentralized access control method for storing data by providing security in
clouds and also we hide the attributes and access rule of a user. The cloud validates the authentication of the
sequence without knowing the users characteristics previous to the data store. By using this approach only
certified users have right to use the suitable attributes. In future, time based file revocation scheme can be used
to assure the deletion of a file. When time limit of a file expires, we implement the policy based renewal of time
to that file.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) It encrypts files with a single key, and generates two shares of the key - one given to the user and the other stored by a trusted third party, to prevent insider threats from malicious users.
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
This document discusses a proposed scheme called Blowfish Encryption (BE) to securely store data in public clouds using encryption. The BE scheme addresses weaknesses in an existing mCL-PKE scheme. In the BE scheme, users must register with the data owner before accessing data. The owner encrypts data using the Blowfish algorithm and secret key before storing it in the cloud. When a registered user requests data, the cloud verifies the user and retrieves the encrypted data without decrypting it. The user then decrypts the data using the secret key. The BE scheme improves security over mCL-PKE by requiring registration and keeping decryption with the user instead of the cloud. It also speeds up the process using the fast
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to the group of each department. The Group members can access the stored data from cloud. The encryption-decryption technique is used to store the data. Any cloud user can anonymously share data with others by providing group signature and dynamic broadcast encryption techniques. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners. Proposing a new model for Sharing Secure Data in the Cloud for the Multiuser Group.
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
The document proposes a secure group data sharing scheme on cloud using key aggregate search encryption (KASE). In the proposed scheme, a data owner can generate a single download token (DT) to share a group of encrypted files with multiple users. The users only need to upload the DT to the cloud to search and download the shared files. This reduces the complexity of managing multiple encryption keys compared to traditional schemes. The scheme provides security, dynamic changes, low computation and communication costs for file access and key updates.
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
This document reviews key-based encryption schemes for secure data sharing on cloud. It discusses how traditional encryption techniques are not suitable for large scale data sharing due to complex key management. A key-based encryption scheme is proposed that allows a data owner to generate an aggregate encryption key and submit a single aggregate trapdoor for keyword search. This reduces key management complexity and the number of trapdoors needed compared to traditional techniques. The proposed scheme uses seven polynomial algorithms for security including key generation, encryption, key extraction and trapdoor generation. It aims to provide an effective solution for secure and scalable data sharing using cloud storage.
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
1) The document proposes a secure data sharing scheme for sharing data within group members in the cloud. It aims to prevent collusion attacks and allow for secure sharing of data even as group membership changes dynamically.
2) The scheme uses encryption with private keys so that if a user's key is leaked, it will be difficult for others to access the shared data. A trusted authority authenticates users and stores encryption keys to determine responsibility if issues arise.
3) The scheme achieves secure key distribution without requiring secure communication channels by using public key verification. It also allows for fine-grained access control and secure revocation such that revoked users cannot access shared data even by colluding with the cloud.
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
Abstract Cloud computing provides much-known services for storing user data over cloud server and it provides attention towards a broad set of technologies, rules and controls deployed to provide security for applications and data. As the more and more firm uses the cloud, security in cloud environment is becoming very important issue. It is much needed that companies should work with partners doing best practices of cloud security and which facilitate transparency for their solutions. Number of security solutions today depends on the authentication for security but it did not provide solution for the privacy problems while sharing data in the cloud environment. Data access request from the user itself may expose users’ private data no matter his request approved or not. So this becomes very important in sharing data in the cloud environment. In this paper we proposed a system which provides attention towards the above mentioned problem. In proposed system we used the concept of data anonymity for sending data access request to data owner and also provide the data auditing facility to detect fraud in the integrity of users shared data. Keywords: Cloud computing, privacy preservation, data integrity, data sharing, authentication
Face Image Restoration based on sample patterns using MLP Neural NetworkIOSR Journals
This document presents a face image restoration method using MLP neural networks. Low resolution face images are generated from a high resolution image using an observation model. Patches are extracted from the high and low resolution images and used to train an MLP network. After training, the model can be used to restore low resolution images. The method is tested on images from the ORL database. Results show the proposed method has better performance than other methods in terms of statistical metrics and visual quality, especially when there are only geometric changes between images. When noise levels are varied, performance decreases.
1) The document describes a metal detection system that uses microcontrollers and GSM technology. It detects metallic objects and sends an alert SMS message to a security phone number.
2) The system includes metal detectors, a GSM modem, an LCD display, a microcontroller, and a multiplexer to select detector ports. It was designed and tested to detect unwanted metals like guns.
3) If implemented in restricted areas, it could help reduce crime by detecting dangerous objects carried by suspicious persons and alerting security personnel via SMS.
This document proposes a location dependent cryptographic approach for encrypting and decrypting data on GPS mobile receivers based on target coordinates and distance tolerance. The encryption incorporates a target latitude and longitude coordinate with a random key. The receiver can only decrypt the ciphertext if the coordinates from its GPS receiver match the target coordinates within an allowed distance tolerance, to account for GPS inaccuracy. The proposed approach aims to restrict decryption to a particular location specified by the sender. It describes the encryption and decryption process in detail and presents experimental results analyzing decryption success rates with different distance tolerances.
This document discusses a study investigating the influence of polypropylene fiber (PPF) and silica fume (SF) on the compressive and tensile strengths of concrete. Sixteen concrete mixes were tested with varying amounts of PPF (0.25-0.75% by volume) and SF (6-18% replacing cement by mass). Test results showed that SF increased compressive and tensile strengths up to 45% and 24.5% respectively, while PPF generally decreased strengths, with higher PPF contents causing greater decreases in strength. When both materials were used, strengths were highest with SF only and lowest with higher amounts of both PPF and SF. The study concluded that SF improves concrete strengths
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
This document summarizes a seminar presentation on secure data sharing for dynamic groups in multi-owner cloud environments. The presentation covered cloud computing fundamentals and challenges with identity privacy. It proposed a system called MONA that allows any group member to securely store and share encrypted data files on an untrusted cloud. Key features of MONA include dynamic group management such that new users can access previous data, anonymous yet traceable access control, and efficient user revocation. The presentation discussed the system architecture, models, modules including registration, login and file sharing, relevant algorithms, applications, advantages, and future work concerning reliability.
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
This document proposes a secure multi-owner data sharing scheme for dynamic groups in the cloud. It allows any user in a group to securely store and share data with others in the cloud. The key contributions are:
1) Any user can store and share data files with others through the cloud in a multi-owner manner.
2) The computation overhead and ciphertext size are constant and independent of the number of revoked users.
3) User revocation can be achieved without updating remaining users' private keys.
4) New users can directly decrypt files stored before their participation.
The proposed scheme uses group signatures for anonymous authentication and dynamic broadcast encryption for secure data sharing. It aims to address challenges like
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
This document proposes a secure multi-owner attribute authorities based data sharing scheme for dynamic groups in the cloud. It aims to enable secure data sharing in dynamic groups where there is no fixed attribute authority, using a key policy attribute-based encryption method to select dynamic attribute authorities. The proposed scheme uses group signatures, signed receipts, and dynamic broadcast encryption to allow cloud users to anonymously share data. It reduces computation cost and storage overhead compared to existing works, as the encryption computation cost and storage overhead are independent of the number of revoked users.
The Recent Trend: Vigorous unidentified validation access control system with...IJERA Editor
Service Providers can grow their business by selling our cloud authentication service that can be fully branded
to the Service Provider or if required a Service. The proposed enhanced decentralized access control scheme for
secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies
the authenticity of the series without knowing the user’s identity before storing data. The scheme also has the
added feature of access control in which only valid users are able to decrypt the stored information. The scheme
prevents replay attacks and supports creation, modification, and reading data stored in the cloud. It addresses
user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike
other access control schemes designed for clouds which are centralized. The communication, hiding attributes,
increasing high security in access, computation, and storage overheads are comparable to centralized
approaches.
In Existing, it is based on ABE (attribute based encryption) technique which is a centralized approach, where a
single Key Distribution Centre (KDC) distributes secret keys and attributes to all users using asymmetric key
approach. We propose a new decentralized access control method for storing data by providing security in
clouds and also we hide the attributes and access rule of a user. The cloud validates the authentication of the
sequence without knowing the users characteristics previous to the data store. By using this approach only
certified users have right to use the suitable attributes. In future, time based file revocation scheme can be used
to assure the deletion of a file. When time limit of a file expires, we implement the policy based renewal of time
to that file.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) It encrypts files with a single key, and generates two shares of the key - one given to the user and the other stored by a trusted third party, to prevent insider threats from malicious users.
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
This document discusses a proposed scheme called Blowfish Encryption (BE) to securely store data in public clouds using encryption. The BE scheme addresses weaknesses in an existing mCL-PKE scheme. In the BE scheme, users must register with the data owner before accessing data. The owner encrypts data using the Blowfish algorithm and secret key before storing it in the cloud. When a registered user requests data, the cloud verifies the user and retrieves the encrypted data without decrypting it. The user then decrypts the data using the secret key. The BE scheme improves security over mCL-PKE by requiring registration and keeping decryption with the user instead of the cloud. It also speeds up the process using the fast
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to the group of each department. The Group members can access the stored data from cloud. The encryption-decryption technique is used to store the data. Any cloud user can anonymously share data with others by providing group signature and dynamic broadcast encryption techniques. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners. Proposing a new model for Sharing Secure Data in the Cloud for the Multiuser Group.
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
The document proposes a secure group data sharing scheme on cloud using key aggregate search encryption (KASE). In the proposed scheme, a data owner can generate a single download token (DT) to share a group of encrypted files with multiple users. The users only need to upload the DT to the cloud to search and download the shared files. This reduces the complexity of managing multiple encryption keys compared to traditional schemes. The scheme provides security, dynamic changes, low computation and communication costs for file access and key updates.
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
This document reviews key-based encryption schemes for secure data sharing on cloud. It discusses how traditional encryption techniques are not suitable for large scale data sharing due to complex key management. A key-based encryption scheme is proposed that allows a data owner to generate an aggregate encryption key and submit a single aggregate trapdoor for keyword search. This reduces key management complexity and the number of trapdoors needed compared to traditional techniques. The proposed scheme uses seven polynomial algorithms for security including key generation, encryption, key extraction and trapdoor generation. It aims to provide an effective solution for secure and scalable data sharing using cloud storage.
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
1) The document proposes a secure data sharing scheme for sharing data within group members in the cloud. It aims to prevent collusion attacks and allow for secure sharing of data even as group membership changes dynamically.
2) The scheme uses encryption with private keys so that if a user's key is leaked, it will be difficult for others to access the shared data. A trusted authority authenticates users and stores encryption keys to determine responsibility if issues arise.
3) The scheme achieves secure key distribution without requiring secure communication channels by using public key verification. It also allows for fine-grained access control and secure revocation such that revoked users cannot access shared data even by colluding with the cloud.
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
Abstract Cloud computing provides much-known services for storing user data over cloud server and it provides attention towards a broad set of technologies, rules and controls deployed to provide security for applications and data. As the more and more firm uses the cloud, security in cloud environment is becoming very important issue. It is much needed that companies should work with partners doing best practices of cloud security and which facilitate transparency for their solutions. Number of security solutions today depends on the authentication for security but it did not provide solution for the privacy problems while sharing data in the cloud environment. Data access request from the user itself may expose users’ private data no matter his request approved or not. So this becomes very important in sharing data in the cloud environment. In this paper we proposed a system which provides attention towards the above mentioned problem. In proposed system we used the concept of data anonymity for sending data access request to data owner and also provide the data auditing facility to detect fraud in the integrity of users shared data. Keywords: Cloud computing, privacy preservation, data integrity, data sharing, authentication
Face Image Restoration based on sample patterns using MLP Neural NetworkIOSR Journals
This document presents a face image restoration method using MLP neural networks. Low resolution face images are generated from a high resolution image using an observation model. Patches are extracted from the high and low resolution images and used to train an MLP network. After training, the model can be used to restore low resolution images. The method is tested on images from the ORL database. Results show the proposed method has better performance than other methods in terms of statistical metrics and visual quality, especially when there are only geometric changes between images. When noise levels are varied, performance decreases.
1) The document describes a metal detection system that uses microcontrollers and GSM technology. It detects metallic objects and sends an alert SMS message to a security phone number.
2) The system includes metal detectors, a GSM modem, an LCD display, a microcontroller, and a multiplexer to select detector ports. It was designed and tested to detect unwanted metals like guns.
3) If implemented in restricted areas, it could help reduce crime by detecting dangerous objects carried by suspicious persons and alerting security personnel via SMS.
This document proposes a location dependent cryptographic approach for encrypting and decrypting data on GPS mobile receivers based on target coordinates and distance tolerance. The encryption incorporates a target latitude and longitude coordinate with a random key. The receiver can only decrypt the ciphertext if the coordinates from its GPS receiver match the target coordinates within an allowed distance tolerance, to account for GPS inaccuracy. The proposed approach aims to restrict decryption to a particular location specified by the sender. It describes the encryption and decryption process in detail and presents experimental results analyzing decryption success rates with different distance tolerances.
This document discusses a study investigating the influence of polypropylene fiber (PPF) and silica fume (SF) on the compressive and tensile strengths of concrete. Sixteen concrete mixes were tested with varying amounts of PPF (0.25-0.75% by volume) and SF (6-18% replacing cement by mass). Test results showed that SF increased compressive and tensile strengths up to 45% and 24.5% respectively, while PPF generally decreased strengths, with higher PPF contents causing greater decreases in strength. When both materials were used, strengths were highest with SF only and lowest with higher amounts of both PPF and SF. The study concluded that SF improves concrete strengths
This document presents an experimental study to optimize the wire electrical discharge machining (WEDM) process parameters for machining EN47 spring steel based on minimizing surface roughness. Experiments were conducted using an L27 orthogonal array with four process parameters (pulse on time, pulse off time, wire feed rate, and gap voltage) at three levels. The optimal combination found was the highest levels of pulse on time and pulse off time along with the lower level of wire feed and gap voltage. Analysis of variance showed pulse on time and wire feed rate had the most significant influence on surface roughness. A confirmation test found roughness was reduced by 26% from the initial to optimal conditions.
This document summarizes a study on designing a model test for the nuclear reactor core of a small modular reactor using computational fluid dynamics (CFD). The study involved designing test equipment components using CAD software and simulating fluid flow and heat transfer in a hexagonal subchannel structure with water as the coolant fluid. The simulation examined temperature changes under conditions of natural convection and forced convection at varying fluid velocities and constant heat flux. Results showed that fluid temperature increased with decreasing velocity and increasing heat flux due to more efficient heat transfer at higher flow rates. The design and simulation provide a model for testing small modular reactor core designs.
1. The document analyzes and compares the thermo-mechanical and vibration properties of an internal combustion engine piston made from three different materials (structural steel, cast iron, and aluminum alloy A2618) under static loading conditions using finite element analysis software ANSYS.
2. Von Mises stresses, strains, heat flux, and natural frequencies are calculated and compared for pistons made of each material. The structural steel piston experiences the highest von Mises stresses and strains while the aluminum alloy piston experiences the lowest values.
3. Material properties such as Young's modulus, Poisson's ratio, density, coefficient of thermal expansion, and shear modulus are provided for each material to be used as inputs for the finite
Performance and Emission Characteristics of Twin Cylinder CI Engine Using Cot...IOSR Journals
This document summarizes research conducted on the performance and emissions of a twin cylinder compression ignition engine using blends of cottonseed oil and methanol as fuel. The researchers tested blends with 30% methanol and 70% cottonseed oil. They measured engine performance parameters like fuel consumption and exhaust emissions of hydrocarbons, carbon monoxide using a gas analyzer. Their results showed that the blended fuel reduced hydrocarbons and carbon monoxide emissions compared to diesel fuel. The document provides background on methanol and cottonseed oil as biofuels, describes the experimental setup and procedures, and presents some results from testing the blended fuel in the CI engine.
This document summarizes a study on retrofitting an existing reinforced concrete (R.C.) building using different non-destructive testing (NDT) methods. The study assessed the condition of the existing structure using NDTs like ultrasonic pulse velocity testing and Schmidt rebound hammer testing. The results from these tests showed the concrete quality was medium to doubtful. The study then proposes to strengthen and retrofit the structural elements like columns using reinforced concrete jacketing to allow for additional loads from a three-story building extension. The retrofitted structure is then designed to meet the required load carrying capacity.
This document analyzes the seismic performance of a 13-story reinforced concrete building with different types of concrete and steel bracing systems. The bracing systems studied include diagonal, V-type, inverted V-type, combined V-type, K-type, and X-type bracings. The building is analyzed using ETAB software according to Indian seismic design standards. Results show that X-type concrete bracing and combined V-type steel bracing most effectively reduce story drift and displacement. Both systems increase the building's base shear, stiffness, strength, and displacement capacity when bracing is provided on all sides or any two parallel sides of the building. The study concludes that concrete and steel bracing are effective techniques for
This document discusses using GIS and fuzzy multi-criteria decision making (MCDM) approaches to analyze real estate investment locations in Surat, India. Specifically, it analyzes three developing areas - Vesu, Pal, and Unn - to determine the best area for investment. GIS is used to extract location-based data on built-up areas and growth rates. Fuzzy analytic hierarchy process (AHP) and fuzzy technique for order preference by similarity to ideal solution (TOPSIS) are then applied to evaluate the areas based on criteria like growth rate, return on investment, land value, facilities, and transportation. Pairwise comparison matrices are formed and analyzed to determine criteria weights and alternative rankings to identify the optimum real
This document analyzes speech coding algorithms for Hindi and English languages. It discusses Linear Predictive Coding (LPC), an algorithm that accurately estimates speech parameters and represents speech signals at reduced bit rates while preserving quality. The paper proposes a voice-excited LPC algorithm and implements it on Hindi and English male and female voices. It analyzes tradeoffs between bit rates, delay, signal-to-noise ratio, and complexity. The results show low bit-rates and better signal-to-noise ratio with this algorithm.
This document summarizes a research paper that proposes a new method for removing random valued impulse noise from grayscale images while preserving edge details. The method has two stages: 1) noisy pixel detection using adaptive thresholds calculated from row and column medians, and 2) noisy pixel replacement twice using the median value. The method is tested on images corrupted with 50-90% noise and achieves better peak signal-to-noise and mean square error results than other filters, especially at higher noise densities. Experimental results on Mandrill images demonstrate its effectiveness at removing random valued impulse noise while preserving edges.
This document analyzes the impact of packet size on the performance of IEEE 802.11 MAC protocol in wireless sensor networks. It discusses how packet size influences energy consumption patterns and finds that neither too long nor too short packets are optimal. The document describes simulations conducted to evaluate how packet delivery ratio, end-to-end delay, and energy consumption of sensor nodes vary with different packet sizes. The results show that performance can be improved by selecting an optimum packet size.
The document describes optimizing an automatic generation control (AGC) scheme for a two-area power system using a particle swarm optimization (PSO) tuned fuzzy PID controller. A linearized model of the two-area power system is presented. A fuzzy PID controller is used to regulate the area control error of each area. The gains of the fuzzy PID controller are optimized using PSO to minimize time-domain performance metrics. Simulation results show the PSO tuned fuzzy PID controller provides better dynamic response than a conventional PSO PID controller, with lower error and faster settling time. Comparisons of tie-line power deviation also show improved performance with the PSO tuned fuzzy approach. The paper concludes the proposed method efficiently tunes fuzzy PID parameters
Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...IOSR Journals
This document evaluates the synchronization of a chaotic encryption scheme using different channel parameters through simulation. It simulates a chaotic encryption system based on Chua's chaotic oscillator circuits using Multisim software. The paper investigates the robustness of synchronization between a master-slave system by varying the resistance of the connecting line. The results show that synchronization can be achieved when the line resistance is below 3.5kΩ, but not above that value, limiting the potential distance between transmitter and receiver. Maintaining synchronization over channels is important for decrypting encrypted signals at the receiver.
Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...IOSR Journals
The document discusses the use of polyvinylindene fluoride (PVDF) and lead zirconate titanate (PZT) in structural health monitoring. Smart composite systems have been developed using surface mounted and embedded PZT and PVDF to sense and actuate vibrations in braided composite cantilever beams. Testing showed that PZT structures were effective for vibration measurement and actuation, while delamination between PZT and the structure affected this. PVDF composites were very effective for vibration sensing but not as good for actuation. The document provides background on piezoelectric materials and discusses previous related research on using piezoelectrics in composite structures.
This document analyzes the energy and exergy of an organic Rankine cycle (ORC) using different working fluids including HFO-1234yf, HFC-134a, HFC-245fa, ethanol, and iso-pentane. The study evaluates the thermal and exergetic efficiencies of saturated and trilateral ORC models at varying expander inlet temperatures from 30-160°C. Results show HFO-1234yf has the highest thermal efficiency, close to HFC-134a, making it a promising low-to-medium temperature working fluid due to its low global warming and ozone depletion potentials. The paper also examines exergy destruction in ORC components like the expander, evaporator
This document proposes a smart GNC (guidance, navigation, control) scheme for autonomous planetary landing. It discusses the need for autonomous GNC due to long communication delays with Earth. The proposed scheme uses onboard sensors and computers to generate a 3D terrain map, detect hazards in the landing area, select a safe landing site, and generate a trajectory to guide the lander. It reviews past planetary landing missions and traditional autonomous navigation techniques. The proposed scheme aims to achieve hazard detection and avoidance for safe planetary landing in real-time using range image measurements from a laser rangefinder.
The document summarizes an experimental study that investigated the effectiveness of micro-jets at controlling base pressure in an axi-symmetric duct with a sudden expansion. The study examined the effects of Mach number, nozzle pressure ratio, area ratio, and duct length-to-diameter ratio on base pressure both with and without micro-jet control. Results showed that micro-jets were generally effective at increasing base pressure across conditions, except at the highest Mach numbers where they sometimes decreased base pressure. The maximum base pressure increase of 30% was observed for a Mach number of 2.6 and nozzle pressure ratio of 11 with a duct length-to-diameter ratio of 10.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) The methodology encrypts files with a single encryption key and distributes key shares to users and a cryptographic server to counter insider threats while allowing authorized access.
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
This document proposes a Shared Authority based Privacy preserving Authentication protocol (SAPA) for handling privacy issues in cloud storage. SAPA achieves shared access authority through an anonymous access request matching mechanism. It applies attribute-based access control to allow users to reliably access their own data fields. It also uses proxy re-encryption to provide temporary authorized data sharing among multiple users. The goal is to preserve user privacy during data access and sharing in the cloud.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
This summarizes a research paper about an encryption-based secure data sharing and storage scheme for multi-user dynamic groups in the cloud. The proposed scheme leverages group signatures and dynamic broadcast encryption to allow any cloud user to anonymously share data while preserving identity privacy. It ensures storage overhead and encryption costs are independent of the number of users. The scheme provides security analysis and experiments demonstrating efficiency.
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
This document discusses encryption techniques for securing data in cloud computing environments. It begins with an introduction to cloud deployment models (public, private, hybrid, community) and service models (IaaS, PaaS, SaaS). It then addresses security concerns with cloud computing including data theft, incomplete data uploads, and lack of notification about infrastructure changes. The document proposes encrypting data before uploading it to cloud servers using algorithms like AES to protect data even if stolen. It reviews older encryption techniques like the Caesar cipher and argues stronger algorithms are needed for cloud security.
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
This document summarizes an encryption technique for securing data in cloud computing environments. It begins by introducing cloud computing and some of the security concerns with storing data in the cloud. It then discusses previous encryption algorithms like the Caesar cipher, Vigenere cipher, and Playfair cipher and their limitations. The document proposes using the Advanced Encryption Standard (AES) algorithm with Rijndael cipher to encrypt data before uploading it to cloud servers. It describes implementing AES encryption in two steps: 1) using an authentication channel to verify user identities, and 2) encrypting the data using the AES Rijndael algorithm in 9 to 13 rounds depending on the key size. The AES Rijndael algorithm uses byte substitution, shift rows
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
This document summarizes an encryption technique for ensuring security in cloud computing environments. It begins by introducing cloud computing and some of the security concerns with storing data in the cloud. These include lack of transparency about security measures, incomplete or corrupted data uploads, and potential data theft without the user's knowledge. The document then reviews some traditional encryption algorithms like the Caesar cipher, Vigenere cipher, and Playfair cipher and their limitations. It proposes using the Advanced Encryption Standard (AES) algorithm with Rijndael, which is more secure than older standards. The technique implements AES encryption with an authentication channel using challenge-response and encrypts the data before uploading to the cloud. This ensures the encrypted data is useless even if stolen,
This document summarizes an encryption technique for securing data in cloud computing environments. It begins by introducing cloud computing and some of the security concerns with storing data in the cloud. It then discusses previous encryption algorithms like the Caesar cipher, Vigenere cipher, and Playfair cipher and their limitations. The document proposes using the Advanced Encryption Standard (AES) algorithm with Rijndael cipher to encrypt data before uploading it to cloud servers. It describes implementing AES encryption in two steps: 1) using an authentication channel to verify user identities, and 2) encrypting the data using the AES Rijndael algorithm in 9 to 13 rounds depending on the key size. The document argues this encryption technique can help make customer data in the
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
This document discusses a proposed system for reliable and efficient revocation and data sharing using identity-based encryption over cloud. The system aims to securely store and share data in the cloud while allowing revocation of user access. It proposes using identity-based encryption where a user's public key is generated from unique identity information like their email address, without needing to pre-share keys. When a user's authorization expires, they can be revoked to prevent future access. The system encrypts files with keys generated from user identities before uploading to cloud servers. Authorized users can download and decrypt data, while unauthorized users and servers cannot access plaintext.
Enforcing multi user access policies in cloud computingIAEME Publication
This document discusses enforcing multi-user access policies in cloud computing. It describes how encryption techniques can be used to securely store data in the cloud and allow authorized users to access encrypted data through key management. The document also discusses security risks in cloud computing like authentication, access control and data leaks. It argues that a policy-based approach is needed to define and enforce access policies for users to access encrypted data securely in the cloud.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
This document summarizes a proposed lightweight secured data sharing scheme for cloud computing. It discusses issues with securely sharing data over cloud systems, including lack of control over data and potential for exploitation. The proposed system uses a combination of Attribute-Based Encryption (ABE) and Byte Rotation Encryption to encrypt data before uploading it to the cloud. This allows users to securely store and share encrypted data. The system aims to work efficiently on devices with limited resources by encrypting data in parallel threads. The encrypted data is decrypted using a randomly generated key that is shared only with authorized users.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing.
This document summarizes a proposed scheme for secure data sharing in dynamic groups in the cloud. It addresses key challenges including how to securely share data with fine-grained access control when group membership changes frequently. The proposed scheme uses key policy attribute-based encryption (KP-ABE) and group signatures to allow any cloud user to anonymously share data. It leverages techniques like dynamic broadcast encryption and signed receipts to reduce computation and storage overhead, making the costs independent of the number of revoked users. The scheme aims to enable secure multi-owner data sharing where attribute authorities are also dynamic.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. IV (Jan – Feb. 2016), PP 58-62
www.iosrjournals.org
DOI: 10.9790/0661-18145862 www.iosrjournals.org 58 | Page
Secure Data Sharing Using Cryptography in Cloud Environment
Anjali Patel1
, Nimisha Patel2
, Dr. Hiren Patel3
1
PG Student, Computer Engineering Department, S.P. College of Engineering, Visnagar, Gujarat, India,
2
Phd Scholar ,Rai University, Ahmadabad, Associate Professor, Computer Engineering, S.P. College of
Engineering, Visnagar, Gujarat, India,
3
Professor, Computer Engineering Department, S.P. College of Engineering, Visnagar, Gujarat, India,
Abstract : Cloud computing is rapidly growing due to the provisioning of elastic, flexible, and on-demand
storage and computing services for users. In cloud based storage concept, data owner does not have full control
over own data because data controlled by the third party called cloud service providers (CSP). Data security is
challenging problem when data owner shares own data to another known as data sharer on cloud. Many
researchers have addressed this issue by cryptography with different encryption schemes that provides secure
data sharing on cloud. Here, we propose system model for secure data sharing on cloud with intension to
provides data confidentiality, access control of share data, removes the burden of key management and file
encryption/decryption by users, support dynamically changes of users membership, owner not be always online
when the user wants to access the data.
Keywords: Cloud Computing, Data security, Cloud Service Providers (CSP), Secure Sharing, Cryptography,
Access control
I. Introduction
The National institute of standard and technology(NIST) that defines the, "Cloud computing is a model
for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction. This cloud model is composed of five essential
characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured
Service), three service models (SaaS, PaaS, IaaS), and four deployment models (Public, Private, Hybrid,
Community). [1]
Organizations use the high storage and computing services within own budget without investing in
infrastructure and maintenance for required services but using that services provided by cloud users losses the
control over on data and computing take place on cloud that raises data security issues for organizations,
thwarting the wide adaptability of the public cloud. [2]
So, the loss of control over own data on storage platform provided by cloud motivates cloud customers
to maintain the access control over own data. Security of data is more concerns when sharing (individual data or
data shared among a group of users) of data is take place on cloud.
The rest of this paper is organized as follows. Section 2 presents the background theory. Section 3
presents the related work done towards secure sharing with cryptography techniques on cloud. Section 4
presents our proposed system model for secure data sharing on cloud and in section 5 conclusion is shown.
II. Background Theory
For sharing data on cloud main three entities that are involved is data owner who want to share own
data to another person is known as data sharer and cloud service provider (CSP) that provides storage,
computational facilities related to data. Here, CSP is untrusted third party which provides data storage facilities,
computational facilities. So, it is necessary requirements of cloud users to not disclose original credentials to
CSP.
For making data share securely on the Cloud, the data owner want to share data is first encrypted then
store encrypted on the Cloud after owner send encryption key to sharers to whom with he want to share data.
Using encryption key sharers decrypt the shared data put on cloud by owner. [9] This way of sharing data on
cloud guarantees confidentiality of data, but the problem with this is that the key management between all the
communicating parties to whom with share data is cumbersome. In some situation system users with poor
computing capabilities devices becomes a bottleneck.
Here shows the overview of some of the dominant methods used for secure data exchange.
1. Public Key/Asymmetric encryption in public key encryption each users have own private and public key.
sender encrypt the own data by the using own private key and receiver receivers that original data by
decrypt received data using sender public key which provides authentication of sender on that data and for
2. Secure Data Sharing Using Cryptography In Cloud Environment
DOI: 10.9790/0661-18145862 www.iosrjournals.org 59 | Page
provides data confidentiality sender encrypt the own data by the using receiver public key and receiver
receivers that original data by decrypt received data using own private key.
2. Private Key/Symmetric encryption.
In private key encryption both sender and receiver use the same key for file encryption and decryption
respectively.
3. Proxy re-encryption
Proxy re-encryption scheme that enable re-encryption of some ciphertext encrypted by one user such that
another user will be able to decrypt it , which is useful when some user wants to forward some encrypted
data to another user without the need of key forwarding.[3]
4. Identity Based encryption (IBE)
IBE sender can encrypt a message using only identity without need of public key certificate. In IBE, ones
publicly known identity (ex. email address) is being used as his/her public key where as corresponding
private key is generated from the known identity.[7]
5. Attribute Based encryption (ABE)
Attribute-based encryption (ABE) is a public-key based one to many encryption that allows users to encrypt
and decrypt data based on user attributes. In which the secret key of a user and the ciphertext are dependent
upon attributes. In such a system, the decryption of a ciphertext is possible only if the set of attributes
associated at receivers key are match with the attributes associated at the ciphertext.[4]
So, for secure sharing data on cloud requirements to be considered is explain below:
1. Data confidentiality: Any cloud service provides or unauthorized users not able to learn any credentials in
the encrypted data files.[2]
2. Fine-grained access control: For users in the same group or different groups, each user can be associated
with different access rights which will make the scheme more reliable and efficient as a real life solution.
[8]
3. Scalability: The system should efficiently work even though numbers of authorized system user increases.
[3]
4. User revocation: System must be able to denied access the shared data for revoked user and it should be
work properly without affect other user‟s services or no need to change the encryption key.[3]
5. User rejoin: It refers capability that revoked user to include back in the system without affect other user‟s
services or no need to change the encryption key.[3]
So, in this paper we will propose system model for secure data sharing on cloud with this objectives,
Provides data confidentiality and access control on share data.
Removes the burden of encrypt/decrypt files by users.
Key management and exchange with sharers by owner.
Owner online is not necessary when the sharers wants to access the share data and,
Not disclose any original credentials of users to CSP.
III. Related Work
Md Mozammil et al.[5]: The mobile device is used for uploading, downloading and sharing of data but
it has limited capacity of computation. so, when mobile user want to share own mobile device data to another on
cloud by secure way can follow the proposed solution by this researchers where data owner encrypts the data
using blowfish algorithm which is fast and required small amount of memory which is suitable for mobile
devices and sends it to cloud storage. The data owner sends email of encrypted file to the sharer then privately
provide secret key to the data sharer. Sharer decrypt the file received in mail using secret key and get the
original data.
Uma et al. [6]: In Cloud computing, maintain data confidentiality, authentication and integrity is main
problem when data sharing take place with another person on cloud. so, as per proposed solution by researchers
message digest of plain text is signed by owner with RSA algorithm and plaintext message is encrypted by the
public key of recipient. Recipient will decrypt the cipher text to plaintext with his private key, and from that
compute the message digest code ,which is compare with the singed message digest code by owner if both are
identical then signature is valid and data say data share securely. This technique solves the problem of data
confidentiality, authentication and integrity.
Mazhar et al. [2]: For share data in group on cloud access control of user, forward and backward
secrecy problem is comes which is solved by researchers. They have proposed SeDaSC methodology by
introducing CS (cryptographic server), encryption/decryption operations are performed at the CS which is a
trusted party in the SeDaSC. When user want to upload/ download the shared file on cloud comes along with
own secret key provided by CS and CS will takes the appropriate actions on the plaintext/cipher text file. The
proposed SeDaSC provides confidentiality of data, securely share data, access control of user and control the
forward and backward access.
3. Secure Data Sharing Using Cryptography In Cloud Environment
DOI: 10.9790/0661-18145862 www.iosrjournals.org 60 | Page
Ching-Hung et al.[10]: Using public key cryptography PKI share data in group is cumbersome and if
use private key cryptography key distribution is main problem and also solve the problem of forward and
backward secrecy. As per proposed model by researchers for secure data sharing on cloud Only 1 public key
which is common in group using that encrypt data which want to share by any group member and another
member in group can get that data using own private key which is assigned by group leader. Here, Group leader
takes all responsibilities of key generation and updating it when any member leave or join/rejoin the group
leader update public and private key.
Criteria based on below summary of literatures review table is constructed are, data Confidentiality for protect
private data and only authenticated users can show it, data integrity checking mechanism provide on data sharer
side ,data sharing model suitable is suitable for data share in group or peer-to-peer, access rights which are
assigned by owner to sharer for data on cloud is only read or all (read,write,delete etc.) and owner should be
always online or not when the user wants to access the data.
Table: Summary of literatures review.
Criteria Data
Confidentiality
Data
integrity
Data
Sharing
Access
Rights
Online
Md Mozammil et al.[5] Yes No Peer-to-
Peer
Read Yes
Uma et al.[6] Yes Yes Peer-to-
Peer
Read Yes
Mazhar et al.[2] Yes No Group All No
Ching-Hung Yeh.[10] Yes No Group No Yes
IV. Proposed System Model
CSP is untrusted third party which provides data storage facilities, computational facilities. so,for
secure sharing data on cloud we introduce new entity call as „Cryptserver‟, which is trusted party and take
responsibility of encrypt/decrypt the file, secret key management and send encrypted/decrypted file to
entity(users,CSP) and removes burden of encrypt/decrypt files by users,key management and exchange key with
users by owner, owner not be always online when the user wants access the data and not disclose any original
credentials to CSP.
Cloud Service
Provider(CSP)
Owner Friend
Cryptserver
1.F and PRowner(M1)
3.assign/synchronize
ACL by PRowner(ACL)
2.F‟ and PRcs(M1)
8.F‟ and PRcs(M2)
5.F‟and PRcsp(M2)
4.Request for file by PRF(M2)
6.F
7.Updated F
And PRF(M2)
Fid Friend-id Access control
Fid Friend-id Access control
Owner-id File id
Fid Last updated by On
Fid Owner-id Secret-key
Table 2.Access Control List.(ACL)
Table 1.Access Control List.(ACL)
Table 3.Owner information
Table 4.Last Update on File
Table 5 File secret key information
Fig.1. Proposed system model for secure data sharing on cloud
Mainly 3 entities in our proposed model:
i. Users: users of the system users is divided into two types.
• Owner: parson want to share own data to other parsons and also want to assign access rights to parsons,
access control list (ACL) is assigned by owner to CSP based on CSP control access on shared data.
• Friend: access the shared file by owner based on access rights assigned by owner.
ii. Crypt-server: Trusted Party take all responsibilities encrypt, decrypt of shared files ,generation and
management of the encryption key K.
4. Secure Data Sharing Using Cryptography In Cloud Environment
DOI: 10.9790/0661-18145862 www.iosrjournals.org 61 | Page
iii. CSP: Untrusted party provide store facilities and for sharing data ,maintain ACL assigned by user and based
on that control access of encrypted store file.
Fig.1 shows the all entities in system along with the information which entity maintains which tables. Table 1
ACL is maintained by file Owner, CSP maintain Table 2 ACL for control the access of the shared file where
ACL is assigned by the file Owner,Table3 store owner information and Table 4 for last update on file. Crypt-
server maintains Table 5 for File secret key information using which file is encrypted. Below Table shows the
information available in message which we have use in our proposed system.
Table: Information in Message
Message-id Information in Message
M1 fid, owner-id
M2 fid, owner-id, Friend-id
We use secure communication channel that could be Secure Sockets Layer (SSL)channels for
communication between users and Crypt server. We assume there is publically available dynamic directory from
that public key of any users is available.
Proposed system model in Fig 1 is explain in detail by divide into 3 phase below:
I. Uploading file and assign/synchronize ACL on cloud by owner.
II. Downloading file from cloud by users (Owner, Friend).
III. Updating file on cloud by users(owner, Friend).
Table: List of notations with description
Notation Description
K Secret key of symmetric encryption
Fid File id
F Plain text file
F‟ Cipher text file
CSP Cloud service provider
Owner-id, Friend-id Uniquely identify users in system
ACL Access Control list
Friend To whom with owner has share data
M1,M2 Message
M1‟,M2‟ Cipher Message
PUcsp,PRcsp Public and private key of CSP
PUuser,PRuser Public and private key of user
PUcs,PRcs Public and private key of Crypt-server.
I. Uploading file and assign/synchronize ACL on cloud by owner as shown in Fig.1 by Step 1 to 3is explain in
detail below.
1. Owner send F and M1‟=PRowner(M1) to Crypt-server.
2. Crypt-server Receive information in M1 (Fid and owner-id) by M1= PUowner (M1‟) and store that
information in Table 5, generate new K and encrypt F by K and generate F‟.
3. Crypt-servers send F‟ and forward M1‟=PRcs(M1) toCSP.
4. CSP Store F' and store fid,owner-id information in M1=PUcs(M1‟) into Table 2.
5. For assign/synchronize ACL with CSP ,Owner send ACL‟=PRowner(ACL).
6. CSP receives ACL= PUowner(ACL‟) and store all information in Table 1 maintain by itself.
II. Downloding file from cloud by Users as shown in Fig.1 by Step 4 to 6 is explain in detail below.
1. User send request for F by sending M2‟=PRuser(M2) to CSP.
2. CSP receive M2=PUuser(M2‟).
3. CSP check
if owner-id and own-id in M2 are match then request send by file owner
if owner-id and fid in M2 are match with owner-id and fid in Table 3.
then generate M2‟=PUcsp(M2) where owner-id and Friend-id are same and send M2‟and F‟ to Crypt-
server.
Else request send by Friend
If Friend-id and fid in M2 are match with Friend-id and fid in Table 2 ACL maintained by own
then generate M2‟=PUcsp(M2) where owner-id and Friend-id are different and send M2‟and F‟ to
Crypt-server.
4. Crypt-server receives K from Table 5 based on fid and owner-id specified in M2=PUcsp(M2‟) and using K
decrypt F‟ and generate F.
5. Secure Data Sharing Using Cryptography In Cloud Environment
DOI: 10.9790/0661-18145862 www.iosrjournals.org 62 | Page
5. Crypt-server forward F to user which is specified in M2 as Friend-id by CSP.
III. Updating file on cloud by Users as shown in Fig.1 by Step 7 and 8is explain in detail below.
1. User send updated F with M2‟=PRuser(M2) to Crypt-server.
2. Crypt-server receives K from Table 5 based on fid and owner-id specified in M2=PUuser(M2‟)and using K
encrypt F and generate F‟.
3. Crypt-server send F‟ and M2‟=PRcs(M2) which is send by user to CSP.
4. CSP generate M2=PUcs(M2‟) and check
if Owner-id and Friend-id in M2 are match then file Owner is file updator
if owner-id and fid in M2 are match with owner-id and fid in Table 3
then update F' and maintain information in Table 4.
Else file updated by Friend
if Friend-id and fid in M2 are match with Friend-id and fid in Table 2 ACL maintained by own
then update F' and maintain information in Table 4.
In future, we want to implement this proposed system model using blowfish symmetric encryption
algorithm for file encryption and ECC(Elliptic Curve Cryptography) asymmetric encryption for user
authentication on data because both algorithms gives best performance as per computational speed and security
which are suitable for this proposed system model. [11-12]
V. Conclusion
Cloud computing is emerging paradigm because of rapidly assigned and released with minimal
management effort or service provider interaction for required services of users with on-demand-self-services
and pay-as-you-go model. Data confidentiality,access control, Scalability, user revocation and re-join in group
are necessary requirements for secure sharing data on cloud. so, we proposed system model for secure data
sharing on cloud which provides data confidentiality, access control of share data, removes the burden of key
management and file encryption/decryption by users, support dynamically changes of users membership, Owner
should not be online when the Friend wants to access the data.
References
[1] Mell P. and Grane T. (September 2011), “The NIST Definition of Cloud Computing,” National Institute ofStandards and
Technology (NIST) [Online], Available:http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[2] Mazhar Ali, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li and Albert Y. Zomaya,SeDaSC:
Secure Data Sharing in Clouds,SYSTEMS JOURNAL PP,no.99,2015,1-10.
[3] Hussain Aljafera, Zaki Malika, Mohammed Alodibb and Abdelmounaam Rezguic,A brief overview and an experimental evaluation
of data confidentiality measures on the cloud,JOURNAL OF INNOVATION IN DIGITAL ECOSYSTEMS 1, no.1-2,2014,1–
11.
[4] Minu George, Dr. C.Suresh Gnanadhas and Saranya.K,A Survey on Attribute Based Encryption Scheme in Cloud Computing ,
International Journal of Advanced Research in Computer and Communication Engineering 2, no. 11,2013,4408-4412.
[5] Md Mozammil Alam, Sourav Hati, Debashis De and Samiran Chattopadhyay,Secure Sharing of Mobile Device Data using Public
Cloud,Confluence The Next Generation Information Technology Summit,2014,149 – 154.
[6] Uma Somani,Kanika Lakhani and Manish Mundra, Implementing Digital Signature with RSA Encryption Algorithm to Enhance the
Data Security of Cloud in Cloud Computing ,Parallel Distributed and Grid Computing ,2010,211-216.
[7] Raseena M , Harikrishnan G R ,Secure Sharing of Data over Cloud Computing using Different Encryption Schemes An Overview,
International Journal of Computing and Technology 1,no. 2,2014,8-11.
[8] Ronald L. Krutz Russell Dean Vines, Cloud Security:A Comprehensive Guide to Secure Cloud Computing(Wiley Publishing
,2010).
[9] Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo, Secure Data Sharing in the Cloud, springer ,2014,45-72.
[10] Ching-Hung Yeh,A Secure Shared Group Model of Cloud Storage,Advanced Information Networking and Applications
Workshops,2013,663 - 667.
[11] O P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi,Peformance Analysis Of Data Encryption Algorithms,Electronics
Computer Technology (ICECT) 5, 2011,399-403.
[12] Kristin Lauter, Microsoft Corporation,The Advantages Of Elliptic Curve Cryptography For Wireless Security,Wireless
Communications 11,no. 1 ,2004,62-67.