This document contains a table listing 14 projects with their titles, domains, platforms, and years. It provides contact information for Tema Solution at the top, including their address, phone number, website, and email. The projects cover various technical domains including cloud computing, image processing, neural networks, networking, and secure computing. They involve technologies such as Java, cloud computing, and parallel/distributed systems. The years of the projects range from 2012-2017.
This document discusses cloud computing, including its foundations, obstacles to adoption, and future expectations. It defines cloud computing as a model for enabling on-demand access to configurable computing resources over the internet. The document outlines essential cloud characteristics like on-demand self-service and rapid elasticity. While cloud offers benefits like reduced costs, experts cite major security concerns that businesses should consider when evaluating cloud adoption and hybrid models. The future of cloud computing may include more innovative data protection methods to address security risks and enable greater private use of public cloud resources.
The document summarizes recent advances in digital image watermarking techniques. It discusses how watermarking techniques can be classified based on the domain of embedding (spatial or transform), robustness to attacks (fragile or robust), and need for cover data during extraction (blind or non-blind). Specifically, it describes spatial domain techniques like least significant bit insertion and transform domain techniques using discrete Fourier transform, discrete cosine transform, and discrete wavelet transform. Transform techniques embed watermarks by modifying transform coefficients rather than pixel values.
This document provides an agenda for the "M2M for the Security Industry" conference taking place on May 8-9, 2013 in London. The conference will explore how machine-to-machine (M2M) technology is impacting the security industry, with keynote speakers from companies including Vodafone, Skywave, Sony, and ADT. Panel discussions will address topics such as the role of M2M in smart homes and critical infrastructure protection. Presentations will also cover M2M applications in security systems, cloud services, video monitoring, and asset management. The goal is to help security providers understand opportunities to enhance their solutions and business models with new M2M-enabled technologies.
This document discusses cloud computing and its benefits. Brent Stineman, a National Cloud Solution Specialist with nearly 20 years of IT experience, will be presenting on the topics of what cloud computing is, the different types and delivery models of cloud, and why organizations should consider cloud. The cloud allows organizations to access computing resources on-demand in a pay-as-you-go manner and gain benefits such as flexibility, scalability, and reducing the need for large up-front capital expenditures on infrastructure.
Cloud computing offers advantages but also security risks. Researchers are developing solutions to address these risks. One approach is to automate security management for groups of virtual machines using sensors to detect suspicious behavior and take mitigating actions. Another approach called virtual machine introspection places a protected security virtual machine on the same physical machine as guest virtual machines to monitor them without their knowledge. Both aim to improve security while maintaining the efficiencies of cloud computing.
IRJET - Gender Recognition from Facial ImagesIRJET Journal
This document discusses gender recognition from facial images using a Wide Residual Network model. The model is trained on a dataset from Kaggle to predict gender from live video stream faces detected by a webcam. When a male face is detected, it draws a red border and sounds an alarm, as the purpose is for male-restricted areas video surveillance. It preprocesses detected faces before predicting gender with the WideResNet model, which reduces depth and increases width compared to standard residual networks for faster training. Experimental results found it achieved good performance for male restricted area video monitoring.
This document contains a table listing 14 projects with their titles, domains, platforms, and years. It provides contact information for Tema Solution at the top, including their address, phone number, website, and email. The projects cover various technical domains including cloud computing, image processing, neural networks, networking, parallel and distributed systems, and secure computing. They involve platforms such as Java, cloud computing, and neural networks. The years listed range from 2012-2017.
This document discusses cloud computing, including its foundations, obstacles to adoption, and future expectations. It defines cloud computing as a model for enabling on-demand access to configurable computing resources over the internet. The document outlines essential cloud characteristics like on-demand self-service and rapid elasticity. While cloud offers benefits like reduced costs, experts cite major security concerns that businesses should consider when evaluating cloud adoption and hybrid models. The future of cloud computing may include more innovative data protection methods to address security risks and enable greater private use of public cloud resources.
The document summarizes recent advances in digital image watermarking techniques. It discusses how watermarking techniques can be classified based on the domain of embedding (spatial or transform), robustness to attacks (fragile or robust), and need for cover data during extraction (blind or non-blind). Specifically, it describes spatial domain techniques like least significant bit insertion and transform domain techniques using discrete Fourier transform, discrete cosine transform, and discrete wavelet transform. Transform techniques embed watermarks by modifying transform coefficients rather than pixel values.
This document provides an agenda for the "M2M for the Security Industry" conference taking place on May 8-9, 2013 in London. The conference will explore how machine-to-machine (M2M) technology is impacting the security industry, with keynote speakers from companies including Vodafone, Skywave, Sony, and ADT. Panel discussions will address topics such as the role of M2M in smart homes and critical infrastructure protection. Presentations will also cover M2M applications in security systems, cloud services, video monitoring, and asset management. The goal is to help security providers understand opportunities to enhance their solutions and business models with new M2M-enabled technologies.
This document discusses cloud computing and its benefits. Brent Stineman, a National Cloud Solution Specialist with nearly 20 years of IT experience, will be presenting on the topics of what cloud computing is, the different types and delivery models of cloud, and why organizations should consider cloud. The cloud allows organizations to access computing resources on-demand in a pay-as-you-go manner and gain benefits such as flexibility, scalability, and reducing the need for large up-front capital expenditures on infrastructure.
Cloud computing offers advantages but also security risks. Researchers are developing solutions to address these risks. One approach is to automate security management for groups of virtual machines using sensors to detect suspicious behavior and take mitigating actions. Another approach called virtual machine introspection places a protected security virtual machine on the same physical machine as guest virtual machines to monitor them without their knowledge. Both aim to improve security while maintaining the efficiencies of cloud computing.
IRJET - Gender Recognition from Facial ImagesIRJET Journal
This document discusses gender recognition from facial images using a Wide Residual Network model. The model is trained on a dataset from Kaggle to predict gender from live video stream faces detected by a webcam. When a male face is detected, it draws a red border and sounds an alarm, as the purpose is for male-restricted areas video surveillance. It preprocesses detected faces before predicting gender with the WideResNet model, which reduces depth and increases width compared to standard residual networks for faster training. Experimental results found it achieved good performance for male restricted area video monitoring.
This document contains a table listing 14 projects with their titles, domains, platforms, and years. It provides contact information for Tema Solution at the top, including their address, phone number, website, and email. The projects cover various technical domains including cloud computing, image processing, neural networks, networking, parallel and distributed systems, and secure computing. They involve platforms such as Java, cloud computing, and neural networks. The years listed range from 2012-2017.
This document contains a list of 123 projects from 2012 across various domains including cloud computing, knowledge and data engineering, mobile computing, network security, network routing, network attack and induction detection, and more. Each project is given a unique code and covers technical topics such as secure cloud storage, mobile cloud architectures, network intrusion detection, traffic analysis, and topology management. Contact details are provided at the top for more information.
This document contains a list of 123 projects from 2012 across various domains including cloud computing, knowledge and data engineering, mobile computing, network security, network routing, network attack and induction detection, and more. Each project is given a unique code and covers technical topics such as secure cloud storage, mobile cloud architectures, network intrusion detection, traffic analysis, and topology management. Contact details are provided at the top for more information.
The document lists research projects in various areas including cloud computing, grid computing, image processing, networking, network security, data mining, software engineering, and mobile computing. For cloud computing, projects involve secure erasure coding, access control, and keyword search. Grid computing projects focus on meeting deadlines, detecting firewall anomalies, and location-based routing. Image processing areas are action recognition, blurry image classification. Networking research includes resource allocation and media streaming. Network security work centers on intrusion detection, authentication, storage reliability, and data provenance. Data mining projects look at fault tolerance, moving object analysis, and privacy-preserving classification. Software engineering examines component reconfiguration and requirements elicitation. Mobile computing focuses on traffic
This document contains a table listing 14 projects with their titles, domains, platforms, and years. It provides contact information for Tema Solution at the top, including their address, phone number, website, and email. The projects cover various technical domains including cloud computing, image processing, neural networks, networking, and secure computing. They involve technologies such as Java, cloud computing, and parallel/distributed systems. The years of the projects range from 2012-2017.
SBGC provides IEEE projects for students in various domains including Java, J2ME, J2EE, .NET and MATLAB. It offers both existing projects from its list and assistance with new project ideas. It ensures students understand all aspects of their selected project. SBGC provides the latest IEEE projects for students in many fields including engineering, technology, science and business. It offers several deliverables and support for projects such as reports, presentations, installation and certificates.
This document contains a table listing 14 projects with their titles, domains, platforms, and years. It provides contact information for Tema Solution at the top, including their address, phone number, website, and email. The projects cover various technical domains including cloud computing, image processing, neural networks, networking, and secure computing. They involve technologies such as Java, cloud computing, and parallel/distributed systems. The years of the projects range from 2012-2017.
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
Keynote by Thierry Coupaye at the IEEE International Conference on Cloud Networking, Niagara Falls, Canada, October 2015.
Summary: Cloud computing emerged, a decade or so ago, from underused computing and storage ressources in Internet players mega data centres that were thought to be provided "as a service". As a result of this inception, Cloud is often considered as a synonym for massive data center, which somehow fuels a very centralised vision of (cloud) computing and storage provision. However, we might be at a time in which the pendulum begins to swing back. Indeed, several initiatives are emerging around a vision of more geographically distributed clouds where computing and storage resources are made available at the edge of the network, close to users, in complement or replacement of massive remote data centres. This presentation discusses, through some examples, the evolution of cloud architectures towards more distribution, the signs and stakes of these mutations.
Cloud computing provides on-demand access to computing resources and IT services over the Internet. While cloud computing provides scalability and cost savings, security is a major concern due to issues like data breaches, multi-tenant infrastructure sharing user data, and lack of governance over cloud provider control of resources. Virtualization is key to cloud computing but introduces vulnerabilities if not implemented securely. Data security risks include exposure of data at rest in cloud storage and data in transit between cloud systems. Strong authentication, encryption of data in transit and at rest, and use of private clouds can help address these security issues but securing cloud systems remains a major challenge.
Latest IEEE Projects on All Domains in Computer/ Electronics Engineering
____________________________________________
We develop projects for final year students in computer engineering. These are some topics which are feasible to implement.
For more topics please visit: www.ns2academy.in
Or call us on 9970186685/ 020 24394323
Or mail us: info@ns2academy.in
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Efficient and Empiric Keyword Search Using CloudIRJET Journal
This document discusses efficient and empirical keyword search using cloud computing. It proposes a secure and reliable keyword search scheme across multiple clouds that allows users to search for files privately and reliably. The proposed system uses an iterative encryption approach to ensure file privacy even if multiple cloud servers collude. It implements a bloom filter tree index structure and integrity verification algorithm to securely search encrypted files across clouds and detect malicious servers. The system aims to provide an efficient and secure solution for keyword search on outsourced encrypted data stored in multiple cloud servers.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
Intelligent System For Face Mask DetectionIRJET Journal
This document presents research on developing an intelligent system to detect whether people are wearing face masks or not using deep learning techniques. The system uses a convolutional neural network called MobileNetV2 trained on a dataset of 480 masked and unmasked face images. Data augmentation is used to increase the size of the dataset. OpenCV is used for face detection. The system achieves 99% accuracy on the test dataset and can classify images and video frames in real-time. Applications discussed include use in airports, hospitals, offices and by law enforcement to monitor compliance with mask mandates and prevent the spread of COVID-19.
The cloud computing paradigm has achieved widespread adoption in recent years. Its success is due largely to customers’ ability to use services on demand with a pay-as-you go pricing model, which has proved convenient in many respects. Low costs and high flexibility make migrating to the cloud compelling. Despite its obvious advantages, however, many companies hesitate to “move to the cloud,” mainly because of concerns related to service availability, data lock-in, and legal uncertainties. Lock in is particularly problematic. For one thing, even though public cloud availability is generally high, outages still occur
Businesses locked into such a cloud are essentially at a standstill until the cloud is back online. Moreover, public cloud providers generally don’t guarantee particular service level agreements (SLAs) — that is, businesses locked into a cloud have no guarantees that it will continue to provide the required quality of service (QoS). Finally, most public cloud providers’ terms of service let that provider unilaterally change pricing at any time. Hence, a business locked into a cloud has no mid- or long term control over its own IT costs. At the core of all these problems, we can identify a need for businesses to permanently monitor the cloud they’re using and be able to rapidly “change horses” — that is, migrate to a different cloud if they discover problems or if their estimates predict future issues.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
This document summarizes a research paper that proposes a new framework called Cloud Information Accountability (CIA) to improve accountability and security in cloud computing systems. The CIA framework uses identity-based encryption, logging of user access in "push" and "pull" modes, and accountability controls to allow data owners to monitor how their data is used in the cloud. This is an improvement over existing systems where data handling is opaque and users lack control. The framework aims to prevent "zombies" or unauthorized access by verifying user identities and logging all access for auditing purposes. It establishes accountability while avoiding interruptions to cloud services and applications.
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. This paper describes methods for enhancing security and reliability in decentralized cloud-based solutions, as well as suggests a few security solution methods of implementation.
This document proposes a new method for improving cloud computing security using RSA encryption with Fermat's Little Theorem. RSA is widely used for encryption but has drawbacks related to key generation time. Fermat's Little Theorem can help speed up the RSA key generation process. The document discusses cloud computing concepts and challenges, related work on encryption techniques for cloud security, an overview of the RSA algorithm and its security, and how the proposed method would integrate Fermat's Little Theorem into RSA key generation to improve encryption performance for cloud computing.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...sunda2011
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd
IEEE projects, final year projects, students project, be project, engineering projects, academic project, project center in madurai, trichy, chennai, kollam, coimbatore
This document contains a list of 123 projects from 2012 across various domains including cloud computing, knowledge and data engineering, mobile computing, network security, network routing, network attack and induction detection, and more. Each project is given a unique code and covers technical topics such as secure cloud storage, mobile cloud architectures, network intrusion detection, traffic analysis, and topology management. Contact details are provided at the top for more information.
This document contains a list of 123 projects from 2012 across various domains including cloud computing, knowledge and data engineering, mobile computing, network security, network routing, network attack and induction detection, and more. Each project is given a unique code and covers technical topics such as secure cloud storage, mobile cloud architectures, network intrusion detection, traffic analysis, and topology management. Contact details are provided at the top for more information.
The document lists research projects in various areas including cloud computing, grid computing, image processing, networking, network security, data mining, software engineering, and mobile computing. For cloud computing, projects involve secure erasure coding, access control, and keyword search. Grid computing projects focus on meeting deadlines, detecting firewall anomalies, and location-based routing. Image processing areas are action recognition, blurry image classification. Networking research includes resource allocation and media streaming. Network security work centers on intrusion detection, authentication, storage reliability, and data provenance. Data mining projects look at fault tolerance, moving object analysis, and privacy-preserving classification. Software engineering examines component reconfiguration and requirements elicitation. Mobile computing focuses on traffic
This document contains a table listing 14 projects with their titles, domains, platforms, and years. It provides contact information for Tema Solution at the top, including their address, phone number, website, and email. The projects cover various technical domains including cloud computing, image processing, neural networks, networking, and secure computing. They involve technologies such as Java, cloud computing, and parallel/distributed systems. The years of the projects range from 2012-2017.
SBGC provides IEEE projects for students in various domains including Java, J2ME, J2EE, .NET and MATLAB. It offers both existing projects from its list and assistance with new project ideas. It ensures students understand all aspects of their selected project. SBGC provides the latest IEEE projects for students in many fields including engineering, technology, science and business. It offers several deliverables and support for projects such as reports, presentations, installation and certificates.
This document contains a table listing 14 projects with their titles, domains, platforms, and years. It provides contact information for Tema Solution at the top, including their address, phone number, website, and email. The projects cover various technical domains including cloud computing, image processing, neural networks, networking, and secure computing. They involve technologies such as Java, cloud computing, and parallel/distributed systems. The years of the projects range from 2012-2017.
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
Keynote by Thierry Coupaye at the IEEE International Conference on Cloud Networking, Niagara Falls, Canada, October 2015.
Summary: Cloud computing emerged, a decade or so ago, from underused computing and storage ressources in Internet players mega data centres that were thought to be provided "as a service". As a result of this inception, Cloud is often considered as a synonym for massive data center, which somehow fuels a very centralised vision of (cloud) computing and storage provision. However, we might be at a time in which the pendulum begins to swing back. Indeed, several initiatives are emerging around a vision of more geographically distributed clouds where computing and storage resources are made available at the edge of the network, close to users, in complement or replacement of massive remote data centres. This presentation discusses, through some examples, the evolution of cloud architectures towards more distribution, the signs and stakes of these mutations.
Cloud computing provides on-demand access to computing resources and IT services over the Internet. While cloud computing provides scalability and cost savings, security is a major concern due to issues like data breaches, multi-tenant infrastructure sharing user data, and lack of governance over cloud provider control of resources. Virtualization is key to cloud computing but introduces vulnerabilities if not implemented securely. Data security risks include exposure of data at rest in cloud storage and data in transit between cloud systems. Strong authentication, encryption of data in transit and at rest, and use of private clouds can help address these security issues but securing cloud systems remains a major challenge.
Latest IEEE Projects on All Domains in Computer/ Electronics Engineering
____________________________________________
We develop projects for final year students in computer engineering. These are some topics which are feasible to implement.
For more topics please visit: www.ns2academy.in
Or call us on 9970186685/ 020 24394323
Or mail us: info@ns2academy.in
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Efficient and Empiric Keyword Search Using CloudIRJET Journal
This document discusses efficient and empirical keyword search using cloud computing. It proposes a secure and reliable keyword search scheme across multiple clouds that allows users to search for files privately and reliably. The proposed system uses an iterative encryption approach to ensure file privacy even if multiple cloud servers collude. It implements a bloom filter tree index structure and integrity verification algorithm to securely search encrypted files across clouds and detect malicious servers. The system aims to provide an efficient and secure solution for keyword search on outsourced encrypted data stored in multiple cloud servers.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
Intelligent System For Face Mask DetectionIRJET Journal
This document presents research on developing an intelligent system to detect whether people are wearing face masks or not using deep learning techniques. The system uses a convolutional neural network called MobileNetV2 trained on a dataset of 480 masked and unmasked face images. Data augmentation is used to increase the size of the dataset. OpenCV is used for face detection. The system achieves 99% accuracy on the test dataset and can classify images and video frames in real-time. Applications discussed include use in airports, hospitals, offices and by law enforcement to monitor compliance with mask mandates and prevent the spread of COVID-19.
The cloud computing paradigm has achieved widespread adoption in recent years. Its success is due largely to customers’ ability to use services on demand with a pay-as-you go pricing model, which has proved convenient in many respects. Low costs and high flexibility make migrating to the cloud compelling. Despite its obvious advantages, however, many companies hesitate to “move to the cloud,” mainly because of concerns related to service availability, data lock-in, and legal uncertainties. Lock in is particularly problematic. For one thing, even though public cloud availability is generally high, outages still occur
Businesses locked into such a cloud are essentially at a standstill until the cloud is back online. Moreover, public cloud providers generally don’t guarantee particular service level agreements (SLAs) — that is, businesses locked into a cloud have no guarantees that it will continue to provide the required quality of service (QoS). Finally, most public cloud providers’ terms of service let that provider unilaterally change pricing at any time. Hence, a business locked into a cloud has no mid- or long term control over its own IT costs. At the core of all these problems, we can identify a need for businesses to permanently monitor the cloud they’re using and be able to rapidly “change horses” — that is, migrate to a different cloud if they discover problems or if their estimates predict future issues.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
This document summarizes a research paper that proposes a new framework called Cloud Information Accountability (CIA) to improve accountability and security in cloud computing systems. The CIA framework uses identity-based encryption, logging of user access in "push" and "pull" modes, and accountability controls to allow data owners to monitor how their data is used in the cloud. This is an improvement over existing systems where data handling is opaque and users lack control. The framework aims to prevent "zombies" or unauthorized access by verifying user identities and logging all access for auditing purposes. It establishes accountability while avoiding interruptions to cloud services and applications.
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. This paper describes methods for enhancing security and reliability in decentralized cloud-based solutions, as well as suggests a few security solution methods of implementation.
This document proposes a new method for improving cloud computing security using RSA encryption with Fermat's Little Theorem. RSA is widely used for encryption but has drawbacks related to key generation time. Fermat's Little Theorem can help speed up the RSA key generation process. The document discusses cloud computing concepts and challenges, related work on encryption techniques for cloud security, an overview of the RSA algorithm and its security, and how the proposed method would integrate Fermat's Little Theorem into RSA key generation to improve encryption performance for cloud computing.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...sunda2011
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd
IEEE projects, final year projects, students project, be project, engineering projects, academic project, project center in madurai, trichy, chennai, kollam, coimbatore
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
This document discusses content-based retrieval in cloud storage and proposes an effective protection method. It begins with background on cloud computing and discusses traditional encrypted search methods and their limitations, including vulnerabilities to attacks. The proposed system design generates an order-preserving encrypted password and splits files and indexes into encrypted parts. It then splits an uploaded secure image into a source image and key image using a binocular visual cryptography algorithm. The encrypted files, source image, and password are stored in the cloud. When a user requests a file, the cloud verifies and sends the password and key image. To access the file, the user must submit the matching key image. This prevents unauthorized access while allowing efficient encrypted searching and retrieval from the cloud.
CA1038 - A Secure Data Sharing Strategy for Mobile Cloud Platform.pdfprinceharit48
The document discusses a proposed secure data sharing strategy for mobile cloud platforms. It aims to address privacy and security issues when storing and sharing data in mobile cloud computing. The existing approaches have high computational overhead and do not suit the mobile cloud environment well. The proposed Lightweight Data Sharing Scheme (LDSS) uses an improved ciphertext-policy attribute-based encryption technique to efficiently manage access control of data shared in the mobile cloud. LDSS offloads decryption tasks from mobile devices to intermediate servers to reduce computational overhead for users. It also introduces methods to handle consumer revocation and update access policies more efficiently. Experimental results show that LDSS can significantly reduce wireless communication overhead for users in mobile cloud computing.
Complexity Versus Comprehendability: Simplifying Wireless SecurityOlivia Moran
This paper will follow the use of unsecured wireless networks in the city of Derry. Derry established a city wide open access network in 2008, thereby providing ideal conditions for the study of security issues pertaining to unsecured open access networks.
The paper will attempt to uncover the
reasoning behind the failure of individuals to take suitable security measures in light of threats that exist.
The document lists 67 robotics projects with codes and years. The projects include search and rescue robots, inspection robots, solar vehicles, voice controlled robots, visitor guided robots, pick and place robots, and more. The projects were developed by Temasolutions, an engineering firm located in Chennai, India. Contact information is provided at the top for those seeking more details on the projects.
The document appears to be from Tema Solution, providing their contact information and listing 31 power electronics projects from 2012-2011. It includes the project title, code, and year for each project focused on topics like renewable energy, energy storage, grid integration, and power quality compensation technologies. More details on the projects can be found on Tema Solution's website by contacting them.
This document contains a list of 17 projects from 2011-2012 related to wireless networks and technologies. The projects focus on topics like load balancing in wireless sensor networks, secure routing, peer-to-peer networks, cognitive radio networks, resource allocation in OFDMA systems, network planning for cellular systems, and spectrum sensing for cognitive radio. The document provides the titles and years for each of the listed projects.
The document lists proposed mini project titles related to the design and fabrication of various fixtures, jigs, clamps, and machines for manufacturing processes. The projects involve creating fixtures and jigs to securely hold workpieces for operations like milling, drilling, and cutting, as well as designing and building machines like hydraulic jacks, presses, and lifting tables.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
This document lists several Java/J2EE/J2ME projects related to utility computing environments, schema matching, fuzzy ontology generation, wireless sensor networks, wireless MAC protocols, distributed cache updating, selfish routing, collaborative key agreement, TCP congestion control, global roaming in mobile networks, GPS-based emergency response systems, network intrusion detection, honey pots, voice over IP, vehicle tracking, SIP-based teleconferencing, online security systems, and location-aided routing in ad hoc networks. The projects cover a wide range of topics related to distributed systems, wireless networks, and Internet applications.
The document discusses several .NET based application projects, including:
1) A remote data access and enterprise manager tool that simplifies database administration.
2) An online bookstore that allows administrators to manage products and customers to search, order, and view order history.
3) Additional projects cover content management on WAP devices, database-free information retrieval using XML, logistics supply chain management, and more.
The document contains a list of 23 projects with their titles, codes, and year. The projects relate to topics in business administration such as customer satisfaction, job satisfaction, wage administration, employee safety, marketing, training and development, supplier relationships, recruitment, and employee engagement. The document also provides contact information for Temasolution, the organization that compiled the list of projects.
The document lists 37 papers related to image processing and 32 papers related to MATLAB communication. The papers are from 2012 and cover topics such as object tracking, image fusion, biometrics, segmentation, and feature extraction. Codes are provided to identify each paper (e.g. MAT01, MC01).
This document contains a list of 43 VLSI projects from 2012, with titles and codes for each project. It provides contact information for Tema Solution, including their address, phone number, website, and email for requesting more details about the VLSI projects. Visitors to the website can learn more about the projects listed.
This document contains a list of 127 image processing projects from 2012 with codes ranging from MAT01 to MAT127. It provides contact information for Temasolution, an organization that specializes in image processing projects. Visitors can find more details on the projects by visiting the listed website or contacting info@temasolution.com.
This document contains a list of 123 projects from 2012 across various domains including cloud computing, knowledge and data engineering, mobile computing, network security, network routing, network attack and induction detection, and more. Each project is given a unique code and covers technical topics such as secure cloud storage, mobile cloud architectures, network intrusion detection, traffic analysis, and topology management. Contact details are provided at the top for more information.
The document provides a list of printed circuit boards (PCBs), RF boards, interface boards, sensors, and wireless boards available from Tema Solutions located in Chennai, India. It includes over 30 PCB designs, 16 RF boards, 18 interface boards, 36 types of sensors, and 8 GSM/GPRS/GPS boards. Tema Solutions offers custom hardware design and manufacturing services.
email : temasolution@gmail.com
The document provides information on various embedded and biomedical projects available from Temasolution, an embedded systems company. It lists over 70 project codes covering areas like embedded projects, ARM controller projects, communication protocols, biomedical projects, and more. Each project code provides a 1-2 line description of the project. The document also provides contact information for Temasolution.
This document lists 28 projects from 2012 across various domains including cloud computing, networking, parallel and distributed systems, secure computing, wireless communication, multimedia, data mining, image processing, and internet computing. It provides the project title, domain, and year for each project. Contact information is also provided for Temasolution, the organization associated with these projects.
The document lists 19 building projects from 2012 with codes and titles like hostel, guest house, primary school. It provides contact information for Tema Solution, an engineering firm located in Chennai, India that offers planning, designing, and cost estimation services. The document directs the reader to the company website for more details on the projects and how to request information from Tema Solution.
The document lists 25 projects from 2012 related to planning, designing, and estimating buildings and structures. It includes projects for a hospital building, apartment building, marriage hall, hotel, jewelry building, IT park, restaurant, bank, car showroom, shopping mall, school, college, stadium, library, precast bridge, computer center, aquarium, underground building, subway with shops, box girder bridge, bridge I section, bridge T section, flyover, railway station, and airport building. It also provides contact information for the company Temasolution.
Automobile and hydraullic and pneumatic titles for 2012Soundar Msr
The document lists 167 mechanical engineering projects related to automobiles and hydraulic/pneumatic systems from 2012. The projects are listed with a project title, code, and year. They cover a wide range of automotive topics including engines, braking systems, emissions control, and alternative energy vehicles. Many projects also involve hydraulic or pneumatic systems for applications like lifting, cutting, and pressing.
The document discusses 6 projects related to mobile application development using Android platform. The projects are in domains like information science, wireless technologies, education, and information technology. They address topics such as image watermarking using Walsh coding, visual interactive and location based mobile learning, mine safety information system, teaching smartphone programming, violence mapping in social networks, and speed/direction estimation using GSM handovers.
This document contains a list of 43 VLSI projects from 2012, with titles and codes for each project. It provides contact information for Tema Solution, including their address, phone number, website, and email for requesting more details about the VLSI projects. Visitors to the website can learn more about the projects listed.
1. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
S.NO PROJECT TITLES DOMAIN Plate
form /
YEAR
1 Cloud Computing Security From Single to Multi-Clouds
The use of cloud computing has increased rapidly in
many organizations. Cloud computing provides many
benefits in terms of low cost and accessibility of data. JAVA
Ensuring the security of cloud computing is a major factor in
the cloud computing environment, as users often store Cloud 2012
sensitive information with cloud storage providers but these computing
providers may be untrusted. Dealing with “single cloud”
providers is predicted to become less popular with
customers due to risks of service availability failure and the
possibility of malicious insiders in the single cloud. A
movement towards “multi-clouds”, or in other words,
“interclouds” or “cloud-ofclouds” has emerged recently.
This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is
found that the research into the use of multicloud providers
to maintain security has received less attention from the
research community than has the use of single clouds. This
work aims to promote the use of multi-clouds due to its
ability to reduce security risks that affect the cloud
computing user.
2 Efficient Audit Service Outsourcing for Data Integrity in
Clouds.
The use of cloud computing has increased rapidly in
many organizations. Cloud computing provides many
benefits in terms of low cost and accessibility of data.
Ensuring the security of cloud computing is a major factor in JAVA
the cloud computing environment, as users often store
sensitive information with cloud storage providers but these 2012
providers may be untrusted. Dealing with “single cloud”
providers is predicted to become less popular with
customers due to risks of service availability failure and the
2. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
possibility of malicious insiders in the single cloud. A
movement towards “multi-clouds”, or in other words, “inter
clouds” or “cloud-of clouds” has emerged recently.
This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is
found that the research into the use of multicloud providers
to maintain security has received less attention from the
research community than has the use of single clouds. This
work aims to promote the use of multi-clouds due to its
ability to reduce security risks that affect the cloud
computing user.
3. Active Visual Segmentation
Attention is an integral part of the human visual
system and has been widely studied in the visual attention
literature. The human eyes fixate at important locations in
the scene, and every fixation point lies inside a particular
region of arbitrary shape and size, which can either be an Image
entire object or a part of it. Using that fixation point as an processing
identification marker on the object, we propose a
method to segment the object of interest by finding the JAVA
“optimal” closed contour around the fixation point in the
polar space, avoiding the perennial problem of scale in the
Cartesian space. The proposed segmentation process is
carried out in two separate steps: First, all visual cues are 2012
combined to generate the probabilistic boundary edge map
of the scene; second, in this edge map, the “optimal” closed
contour around a given fixation point is found. Having two
separate steps also makes it possible to establish a simple
feedback between the mid-level cue (regions) and the low-
level visual cues (edges). In fact, we propose a segmentation
refinement process based on such a feedback process.
Finally, our experiments show the promise of the proposed
method as an automatic segmentation framework for a
general purpose visual system.
4. Persuasive Cued Click-Points.
This paper presents an integrated evaluation of the
Persuasive Cued Click-Points graphical password scheme, JAVA
including usability and security evaluations, and
implementation considerations. An important usability goal 2012
for knowledge-based authentication systems is to support
users in selecting passwords of higher security, in the sense
of being from an expanded effective security space. We use
3. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
persuasion to influence user choice in click-based graphical
passwords, encouraging users to select more random, and
hence more difficult to guess, click- points.
5. Visual Cryptography.
The visual cryptography (VC) is a secret sharing scheme
where a secret image is encoded into transparencies, and
the stacking of any out of transparencies reveals the secret
image. The stacking of or fewer transparencies is unable to JAVA
extract any information about the secret .We discuss the
additions and deletions of users in a dynamic user group. To
reduce the overhead of generating and distributing
transparencies in user changes, this paper proposes a VC 2012
scheme with unlimited based on the probabilistic model.
The proposed scheme allows to change dynamically in order
to include new transparencies without regenerating and
redistributing the original transparencies. Specifically, an
extended VC scheme based on basis matrices and a
probabilistic model is proposed. An equation is derived from
the fundamental definitions of the VC scheme, and then the
VC scheme achieving maximal contrast can be designed by
using the derived equation. The maximal contrasts with to
are explicitly solved in this paper.
6.
A Secure Intrusion detection system against DDOS attack
in Wireless Mobile Ad1
Wireless Mobile ad-hoc network (MANET) is an emerging
technology and have great strength to be applied in critical
situations like battlefields and commercial applications such
as building, traffic surveillance, MANET is infrastructure less,
with no any centralized controller exist and also each node
contain routing capability, Each device in a MANET is JAVA
independently free to move in any direction, and will
therefore change its connections to other devices
frequently. So one of the major challenges wireless mobile
ad-hoc networks face today is security, because no central 2012
controller exists.
MANETs are a kind of wireless ad hoc networks that usually
has a routable networking environment on top of a link
layer ad hoc network. Ad hoc also contains wireless sensor
network so the problems is facing by sensor network is also
faced by MANET. While developing the sensor nodes in
unattended environment increases the chances of various
4. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
attacks. There are many security attacks in MANET and
DDoS (Distributed denial of service) is one of them. Our
main aim is seeing the effect of DDoS in routing load, packet
drop rate, end to end delay, i.e. maximizing due to attack on
network. And with these parameters and many more also
we build secure IDS to detect this kind of attack and block it.
In this paper we discussed some attacks on MANET and
DDOS also and provide the security against the DDOS attack
.
7. Fast Data Collection in Tree-Based Wireless Sensor
Networks
We investigate the following fundamental question - how
fast can information be collected from a wireless sensor
network organized as tree? To address this, we explore and
evaluate a number of different techniques using realistic JAVA
simulation models under the many-to-one communication
paradigm known as converge cast. We first consider time
scheduling on a single frequency channel with the aim of 2012
minimizing the number of time slots required (schedule
length) to complete a converge cast. Next, we combine
scheduling with transmission power control to mitigate the
effects of interference, and show that while power control
helps in reducing the schedule length under a single
frequency, scheduling transmissions using multiple
frequencies is more efficient. We give lower bounds on the
schedule length when interference is completely eliminated,
and propose algorithms that achieve these bounds. We also
evaluate the performance of various channel assignment
methods and find empirically that for moderate size
networks of about 100 nodes, the use of multi-frequency
scheduling can suffice to eliminate most of the interference.
Then, the data collection rate no longer remains limited by
interference but by the topology of the routing tree. To this
end, we construct degree-constrained spanning trees and
capacitated minimal spanning trees, and show significant
improvement in scheduling performance over different
deployment densities. Lastly, we evaluate the impact of
different interference and channel models on the schedule
length
8. An Improved Geocast for Mobile Ad Hoc Networks
Geographic addressing of packets within mobile ad hoc
networks enables novel applications, including hard real-
5. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
time engagement simulation in military training systems,
geographic command and control functions in training and
emergency communications, and commercial messaging
applications as well. The most scalable implementation of
geoaddressing is via a geocast protocol, where nodes JAVA
selectively retransmit packets based on local decision rules.
Well-designed retransmission heuristics yield scalable
geographic flooding that outperforms alternative
geoaddressing approaches. However, previous geocast 2012
implementations, while effective, fall into two categories.
Approaches based on flooding are unscalable due to the
high load they generate. Scalable approaches, on the other
hand, have trouble in complex environments, lacking
sufficient intelligence about the necessary directionality of
packet flow. The present paper defines a novel geocast
heuristic, the Center Distance with Priority (CD-P) Heuristic,
which both significantly improves on reliability of existing
scalable geocasts and yet also remains scalable as scenario
complexity increases. This paper describes the new
technique as well as an evaluation study comparing it to
previous approaches .
9. View-invariant action recognition based on Artificial
Neural Networks
In this paper, a novel view invariant action recognition
method based on neural network representation and
recognition is proposed. The novel representation of action
videos is based on learning spatially related human body Nerual JAVA
posture prototypes using Self Organizing Maps (SOM). Fuzzy Networks
distances from human body posture prototypes are used to 2012
produce a time invariant action representation. Multilayer
perceptrons are used for action classification.
The algorithm is trained using data from a multi-camera
setup. An arbitrary number of cameras can be
used in order to recognize actions using a Bayesian
framework. The proposed method can also be applied to
videos depicting interactions between humans, without any
modification. The use
of information captured from different viewing angles leads
to high classification performance. The proposed method is
the first one that has been tested in challenging
6. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
experimental setups, a
fact that denotes its effectiveness to deal with most of the
open issues in action recognition..
10 An Efficient Caching Scheme and Consistency Maintenance
in Hybrid P2P System
In this paper, a distributed adaptive Networking JAVA
opportunistic routing scheme for multi-hop wireless ad-hoc
networks is proposed.The proposed scheme utilizes a 2012
reinforcement learning framework to opportunistically
route the packets even in the absenceof reliable knowledge
about channel statistics and networkmodel. This scheme is
shown to be optimal with respect to an
expected average per packet reward criterion.
The proposed routing scheme jointly addresses the issues of
learning and routing in an opportunistic context, where the
network structure is characterized by the transmission
successprobabilities. In particular, this learning framework
leads toa stochastic routing scheme which optimally
“explores” and“exploits” the opportunities in the network
11. FireCol A Collaborative Protection Network for the
Detection of Flooding DDoS Attacks
Distributed denial-of-service (DDoS) attacks remain a major
security problem, the mitigation of which is very hard
especially when it comes to highly distributed botnet-based
attacks. The early discovery of these attacks, although
challenging, is necessary to protect end-users as well as the
expensive network infrastructure resources.
In this paper, we address the problem of DDoS attacks and
present the theoretical foundation, architecture, and
algorithms of FireCol. The core of FireCol is composed of
intrusion prevention systems (IPSs) located at the Internet
service providers (ISPs) level.
The IPSs form virtual protection rings around the hosts to
defend and collaborate by exchanging selected traffic
information. The evaluation of FireCol using extensive
simulations and a real dataset is presented, showing FireCol
effectiveness and low overhead, as well as its support for
incremental deployment in real network
12. Load Balancing Multipath Switching System with Flow
Slice.
7. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
Multipath switching systems (MPS) are intensely used in
state-of-the-art core routers to provide terabit or even
petabit switching capacity.
One of the most intractable issues in designing MPS is how
to load balance traffic across its multiple paths while not
disturbing the intraflow packet orders. Previous packet-
based solutions suffer from delay penalties or lead to
OðN2Þ hardware complexity, hence do not scale.
Flow-based hashing algorithms also perform badly due to
the heavy-tailed flow-size distribution. In this paper, we
develop a novel scheme, namely, Flow Slice (FS) that cuts off
each flow into flow slices at every intraflow interval larger
than a slicing threshold and balances the load on a finer
granularity. Based on the studies of tens of real Internet
traces,
we show that setting a slicing threshold of 1 4 ms, the FS
scheme achieves comparative load-balancing performance
to the optimal one. It also limits the probability of out-of-
order packets to a negligible level (106) on three popular
MPSes at the cost of little hardware complexity and an
internal speedup up to two
13. Online System for Grid Resource Monitoring.
Resource allocation and job scheduling are the core
functions of grid computing. These functions are based on
adequate information of available resources. Timely Parallel and
acquiring resource status information is of great importance Distributed
in ensuring overall performance of grid computing. This Systems
work aims at building a distributed system for grid resource
monitoring and prediction. In this paper, we present the
design and evaluation of system architecture for grid
resource monitoring and prediction. We discuss the key
issues for system implementation, including machine
learning-based methodologies for modeling and
optimization of resource prediction models. Evaluations are
performed on a prototype system. Our experimental results
indicate that the efficiency and accuracy of our system meet
the demand of online system for grid resource monitoring
and prediction.
14. Defenses Against Large Scale Online Password Guessing
Attacks by using Persuasive click Points
This paper presents an integrated evaluation of the
8. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
Persuasive Cued Click-Points graphical password scheme,
including usability and security evaluations, and Secure
implementation considerations. An important usability goal Computing JAVA
for knowledge-based authentication systems is to support
users in selecting passwords of higher security, in the sense 2012
of being from an expanded effective security space. We use
persuasion to influence user choice in click-based graphical
passwords, encouraging users to select more random, and
hence more difficult to guess, click-points
15. Ensuring Distributed Accountability for Data Sharing in the
Cloud
Cloud computing enables highly scalable services to be
easily consumed over the Internet on an as-needed basis. A
major feature of the cloud services is that users' data are
usually processed remotely in unknown machines that users
do not own or operate. While enjoying the convenience
brought by this new emerging technology, users' fears of
losing control of their own data (particularly, financial and
health data) can become a significant barrier to the wide
adoption of cloud services. To address this problem, in this
paper, we propose a novel highly decentralized
information accountability framework to keep track
of the actual usage
of the users'data in the cloud. In particular, we propose an
object-centered approach that enables enclosing our
logging mechanism together with users' data and policies.
We leverage the JAR programmable capabilities to both
create a dynamic and traveling object, and to ensure that
any access to users' data will trigger authentication and
automated logging local to the JARs. To strengthen user's
control, we also provide distributed auditing mechanisms.
We provide extensive experimental studies that
demonstrate the efficiency and effectiveness ofthe proposed
approaches.
16. Packet-Hiding Methods for Preventing Selective
The open nature of the wireless medium leaves it vulnerable
to intentional interference attacks, typically referred to as
jamming. This intentional interference with wireless
transmissions can be used as a launchpad for mounting
Denial-of-Service attacks on wireless networks. Typically,
jamming has been addressed under an external threat
9. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
model. However, adversaries with internal knowledge of
protocol specifications and network secrets can launch low-
effort jamming attacks that are difficult to detect and
counter. In this work, we address the problem of selective
jamming attacks in wireless networks. In these attacks, the
adversary is active only for a short period of time, selectively
targeting messages of high importance. We illustrate the
advantages of selective jamming in terms of network
performance degradation and adversary effort by
presenting two case studies; a selective attack on TCP and
one on routing.We show that selective jamming attacks can
be launched by performing real-time packet classification at
the physical layer. To mitigate these attacks, we develop
three schemes that prevent real-time packet classification
by combining cryptographic primitives with physical-layer
attributes. We analyze the security of our methods and
evaluate their computational and communication overhead.
17. Risk-Aware_Mitigation for MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly
vulnerable to attacks due to the dynamic nature of its
network infrastructure. Among these attacks, routing
attacks have received considerable attention since it could
cause the most devastating damage to MANET.
Even though there exist several intrusions response
techniques to mitigate such critical attacks, existing
solutions typically attempt to isolate malicious nodes based
on binary or naıve fuzzy response decisions. However,
binary responses may result in the unexpected network
partition, causing additional damages to the network
infrastructure, and naıve fuzzy responses could lead to
uncertainty in countering routing attacks inMANET.
In this paper, we propose a risk-aware response mechanism
to systematically cope with the identified routing attacks.
Our risk-aware approach is based on an extended
Dempster-Shafer mathematical theory of evidence
introducing a notion of importance factors.
In addition, our experiments demonstrate the effectiveness
of our approach with the consideration of several
performance metrics.
10. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
18. Topology Control in Mobile Ad Hoc Networks with
Cooperative Communications
Cooperative communication has received tremendous
interest for wireless networks. Most existing works on
cooperative communications are focused on link-level
physical layer issues. Consequently, the impacts of Wireless
cooperative communications on Communication
network-level upper layer issues, such as topology control, JAVA
routing and network capacity, are largely ignored. In this
article, we propose a Capacity-Optimized Cooperative 2012
(COCO) topology control scheme to improve the network
capacity in MANETs by jointly considering both upper layer
network capacity and physical layer cooperative
communications.
Through simulations, we show that physical layer
cooperative communications have significant impacts on the
network capacity, and the proposed topology control
scheme can substantially improve the network capacity in
MANETs with cooperative communications.
19. Privacy- and Integrity-Preserving Range Queries in Sensor
Networks (1)
The architecture of two-tiered sensor networks, where
storage nodes serve as an intermediate tier between
sensors and a sink for storing data and processing queries,
has been widely adopted because of the benefits of power
and storage saving for sensors as well as the efficiency of
query processing. However, the importance of storage
nodes also makes them attractive to attackers. In this paper,
we propose SafeQ, a protocol that prevents attackers from Networking JAVA
gaining information from both sensor collected data and
sink issued queries. SafeQ also allows a sink to detect
compromised storage nodes when they misbehave. To 2012
preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can
correctly process encoded queries over encoded data
without knowing their values. To preserve integrity, we
propose two schemes—one using Merkle hash trees and
another using a new data structure called neighborhood
chains—to generate integrity verification information so
that a sink can use this information to verify whether the
result of a query contains exactly the data items that satisfy
the query. To improve performance, we propose an
11. 28,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43855940
Mobile : +91-9042085008
Web : www.temasolution.com
email : temasolution@gmail.com
optimization technique using Bloom filters to reduce the
communication cost between sensors and storage nodes