Cloud computing is an Internet-based computing, whereby shared resources, software, and information are
provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have
positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term
used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures
servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing
describes applications that are extended to be accessible through the internet and for this purpose large data
centers and powerful servers are used to host the web applications and web services. Authentication is one the
most important security primitive [6]. Password authentication is most widely used authentication mechanism.
Password provides security mechanism for authentication and protection services against unwanted access to
resource. In this paper, we applied a technique to preserve our password using graphical authentication.
Cloud computing motivates organization and enterprise to outsource their data to third party cloud service provider. Some commercial cloud storage services are on-line data backup services of Amazon, and some practical cloud based software such as Memo pal, Mazy, Bitcasa, Drop box and Google have been built for cloud application. The data and software packages are stored in the cloud server. Multiple users in a group share the source code. The user can access, modify, compile and run that shared source code at any time and place. The collusion of revoked user, the cloud server will give chance to malicious cloud server data. Security issues would be provided in the public cloud storage server by encrypting the data by using encryption techniques. The scheme such as Key-Policy Attribute Based Encryption and Cipher Text- Policy Attribute Based Encryption provide security for the public storage cloud data. The Third Party Auditor maintains an audit log, keep track of malicious user details, and send back the details to the Data Owner are discussed.
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
Cloud computing motivates organization and enterprise to outsource their data to third party cloud service provider. Some commercial cloud storage services are on-line data backup services of Amazon, and some practical cloud based software such as Memo pal, Mazy, Bitcasa, Drop box and Google have been built for cloud application. The data and software packages are stored in the cloud server. Multiple users in a group share the source code. The user can access, modify, compile and run that shared source code at any time and place. The collusion of revoked user, the cloud server will give chance to malicious cloud server data. Security issues would be provided in the public cloud storage server by encrypting the data by using encryption techniques. The scheme such as Key-Policy Attribute Based Encryption and Cipher Text- Policy Attribute Based Encryption provide security for the public storage cloud data. The Third Party Auditor maintains an audit log, keep track of malicious user details, and send back the details to the Data Owner are discussed.
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
Abstract Data storage and data sharing is the most important aspect in cloud computing, so sharing data and storing it in a secure way is the biggest task when adopting cloud services. In this paper, we will discuss how to share and store data effectively which will prevent the third party to access the secure data in cloud storage. This article provides a survey of using multiple clouds to achieve a security. In this we are introducing a public-key encryption known as Key-aggregate Cryptosystem (KAC). Cryptography is a technique which encodes a data using some key and produces unreadable data so that only a desired party is able to decode that data. KAC produces a constant size ciphertexts (unreadable data) such that decryption right for any set of ciphertexts are possible, means one can aggregate any set of secret keys and make them as compact as single key, but encompassing the power of all the keys being aggregate. This aggregate key is sent to other via secure channel (or via email) for decrypting the ciphertext set and remaining files outside the set are remains secret. Keywords: Cloud, multicloud, key-aggregate encryption, data storage, data sharing and security.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Information Leakage Prevention In Cloud ComputingIJERA Editor
The cloud computing is still in it infancy.this is an emerging technology which will bring about innovations in
terms of businessmodels and applications.the widespread penetration of smartphones will be a major factor in
driving the adoption of cloude computing.however, cloud computing faces challenges related to privacy and
security. Due to varied degree of security features and management schemes within the cloud entities security in
the cloud is challenging. Security issues ranging from system misconfiguration, lack of proper updates, or
unwise user behaviour from remote data storage that can expose user ̳s private data and information to unwanted
access can plague a Cloud Computing. The intent of this paper is to investigate the security related issues and
challenges in Cloud computing environment . We also proposed a security scheme for protecting services
keeping in view the issues and challenges faced by cloud computing.
Scenario of Rural Electrification in India- Challenges and ImpactIJERA Editor
In this paper, the present scenario of rural electrification in India is taken into account. Basically, the electrification in this country is facing a lot of problem and is a growing matter of concern for all. The development in production is not reaching the one who need them. Also taking into picture the present sources of energy it is difficult to make the electricity available to the people belonging to rural areas who don’t have much source of income. To overcome this drawback we can utilise renewable sources of energy which is easily available and accessible. Also harvesting this will not cost much except the initial cost of setting up the device to utilise this type of energy. Many projects have been initiated by the government of India to provide subsidy and equipments like solar lantern and solar cooker etc. to the rural population but this didn’t turn out to be effective as the follow could not be done by the people to maintain the devices. This can be overcome by implementing off-grid projects which can be initiated at small levels so that people don’t have burden to maintain them and it even don’t have any adverse effect to environment or society.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Instrumentation and Automation of MechatronicIJERA Editor
This paper presents the methodology used for the automation of a mechanical system, which will be used to
perform scans on tooth surfaces, in this paper the mathematical modeling of the structure for further
implementation was carried out in order to get a reconfigurable device using specialized software. To carry out
this study various mathematical tools for developing the mathematical model were used, then control routines
that allow the manipulation mechanism for each axis independently performed. The implementation was carried
out by integrating various electrical, electronic and computer systems for an efficient control of the movement
and location of robot systems.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
Abstract Data storage and data sharing is the most important aspect in cloud computing, so sharing data and storing it in a secure way is the biggest task when adopting cloud services. In this paper, we will discuss how to share and store data effectively which will prevent the third party to access the secure data in cloud storage. This article provides a survey of using multiple clouds to achieve a security. In this we are introducing a public-key encryption known as Key-aggregate Cryptosystem (KAC). Cryptography is a technique which encodes a data using some key and produces unreadable data so that only a desired party is able to decode that data. KAC produces a constant size ciphertexts (unreadable data) such that decryption right for any set of ciphertexts are possible, means one can aggregate any set of secret keys and make them as compact as single key, but encompassing the power of all the keys being aggregate. This aggregate key is sent to other via secure channel (or via email) for decrypting the ciphertext set and remaining files outside the set are remains secret. Keywords: Cloud, multicloud, key-aggregate encryption, data storage, data sharing and security.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Information Leakage Prevention In Cloud ComputingIJERA Editor
The cloud computing is still in it infancy.this is an emerging technology which will bring about innovations in
terms of businessmodels and applications.the widespread penetration of smartphones will be a major factor in
driving the adoption of cloude computing.however, cloud computing faces challenges related to privacy and
security. Due to varied degree of security features and management schemes within the cloud entities security in
the cloud is challenging. Security issues ranging from system misconfiguration, lack of proper updates, or
unwise user behaviour from remote data storage that can expose user ̳s private data and information to unwanted
access can plague a Cloud Computing. The intent of this paper is to investigate the security related issues and
challenges in Cloud computing environment . We also proposed a security scheme for protecting services
keeping in view the issues and challenges faced by cloud computing.
Scenario of Rural Electrification in India- Challenges and ImpactIJERA Editor
In this paper, the present scenario of rural electrification in India is taken into account. Basically, the electrification in this country is facing a lot of problem and is a growing matter of concern for all. The development in production is not reaching the one who need them. Also taking into picture the present sources of energy it is difficult to make the electricity available to the people belonging to rural areas who don’t have much source of income. To overcome this drawback we can utilise renewable sources of energy which is easily available and accessible. Also harvesting this will not cost much except the initial cost of setting up the device to utilise this type of energy. Many projects have been initiated by the government of India to provide subsidy and equipments like solar lantern and solar cooker etc. to the rural population but this didn’t turn out to be effective as the follow could not be done by the people to maintain the devices. This can be overcome by implementing off-grid projects which can be initiated at small levels so that people don’t have burden to maintain them and it even don’t have any adverse effect to environment or society.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Instrumentation and Automation of MechatronicIJERA Editor
This paper presents the methodology used for the automation of a mechanical system, which will be used to
perform scans on tooth surfaces, in this paper the mathematical modeling of the structure for further
implementation was carried out in order to get a reconfigurable device using specialized software. To carry out
this study various mathematical tools for developing the mathematical model were used, then control routines
that allow the manipulation mechanism for each axis independently performed. The implementation was carried
out by integrating various electrical, electronic and computer systems for an efficient control of the movement
and location of robot systems.
Real Time Implementation Of Face Recognition SystemIJERA Editor
This paper proposes face recognition method using PCA for real time implementation. Nowadays security is
gaining importance as it is becoming necessary for people to keep passwords in their mind and carry cards. Such
implementations however, are becoming less secure and practical, also is becoming more problematic thus
leading to an increasing interest in techniques related to biometrics systems. Face recognition system is amongst
important subjects in biometrics systems. This system is very useful for security in particular and has been
widely used and developed in many countries. This study aims to achieve face recognition successfully by
detecting human face in real time, based on Principal Component Analysis (PCA) algorithm.
In this paper Low power low voltage CMOS analog multiplier circuit is proposed. It is based on flipped voltage
follower. It consists of four voltage adders and a multiplier core. The circuit is analyzed and designed in 0.18um
CMOS process model and simulation results have shown that, under single 0.9V supply voltage, and it
consumes only 31.8μW quiescent power and 110MHZ bandwidth.
The structural analysis is an important tool that allows the research for weight reduction, the choose of the best materials and to satisfy specifications and requirements. In an aircraft’s design, several analyzes are made to prove that this aircraft will stand the set of maneuvers that it was designed to accomplish. This work will consider the preliminar project of an aircraft seeking to check the behavior of the wing under certain loading conditions in the flight envelope.To get to this load set, it has been done all the process of specification of an aircraft, such as mission definition, calculation of weight and c.g. envelope, definition of the geometric characteristics of the aircraft, the airfoil choice, preliminary performance equations, aerodynamic coefficients and the aircraft’s balancing for the equilibrium condition, but such things will not be considered in this article. For the structural analysis of the wing will be considered an arbitrary flight condition, disregarding the effect of gusts loads. With the acquisition of the items mentioned, the main forces acting on the wing structure and their equations will be calculated. The use of finite element method will enable the application of loads obtained just as the development of a method of calculation, along with the construction of a three-dimensional model that represents a chosen condition. The results will be discussed in order to explain the influence of the applied loads in the structural behavior of the wing principal structure.
By combining the wireless network and E-commerce, suppliers can provide a more convenient and quicker
service on a human scale for their customers. The main advantages of such services are their high availability,
independence of physical location and time. Mobile commerce raises a number of security and privacy
challenges. However, security has always been the key issue for the development of mobile E-commerce, which
is more vulnerable than the traditional E-commerce mode. . In order to solve the problem of security gap in the
transmission of mobile E-commerce information, a framework based on J2ME/MIDP is proposed, which
combines double layer encryption schemes, stego-image and secure XML messages which transferred between
the mobile terminal and the server. Our method provide strong secure and invisible communication with high
security and high operating efficiency that compatible with many types of mobile terminal.
High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...IJERA Editor
This thesis presents High frequency Soft Switching DC-DC boost Converter. The circuit consists of a general Boost Converter with an additional resonant circuit which has a switch, inductor, capacitor and a diode.In general Boost Converter circuits have snubber circuits where switching losses are dissipated in external passive resistors; which is known as hard switching. As the switching frequency of PWM converters is increased its switching losses and conduction losses also increases. This restricts the use of PWM technique. New Zero Voltage Transition-Zero Current Transition (ZVT-ZCT) PWM converter equipped with the snubber provides the most desirable features of both ZVT and ZCT converters presented previously. Moreover all semiconductors devices operate with soft switching and hence losses are reduced.
Static Analysis of G+2 Institutional Building in BhopalIJERA Editor
A Seismic design is aimed at controlling the structural damage based on precise estimations of proper response
parameters. Seismic design explicitly evaluates how a building is likely to perform; given the potential hazard it
is likely to experience, considering uncertainties inherent in the quantification of potential hazard and
uncertainties in assessment of the actual building response. It is an interactive process that begins with the
selection of performance objectives, followed by the development of a preliminary design, an assessment as to
whether or not the design meets the performance objectives, and finally redesign and reassessment, if required,
until the desired performance level is achieved.
In this present study one R.C. buildings, of G + 2 storey institutional building (designed according to IS
456:2000) are analysed. Analysis and redesigning by changing the main reinforcement of various frame
elements and again analyzing. The structural analysis has been carried out using STAAD.Pro V8i, a product of
Structural Analysis and Design Program. A total of 1 cases for a particular G + 2 storey institutional building
located in Zone-II have been analyzed. The results of analysis are compared in terms of reinforcement in the
column and beam. The best possible combination of reinforcement that is economical, effective and whose
damage is limited to Grade 2 (slight structural damage, moderate non structural damage) in order to enable
Immediate Occupancy is determined and is termed as Seismic Design.
Extract the ancient letters from decoratedIJERA Editor
Nowadays, large databases of ornaments of the hand-press period are available and need efficient retrieval tools
for history specialists and general users. This article deals with document images analysis. The purpose of our
work is to automatically determine the letter represented in an ornamental letter image. Our process is divided
into two parts: Wavelet transformation: Segmentation of the ornamental letter followed by a recognition step.
The segmentation process uses multi-resolution analysis to filter background decorations followed by
binarisation and morphologic reconstruction of the expected letter.
Keywords - segmentation, multiresolution analysis, ornemental lettres, Wavelet transform
Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...IJERA Editor
The present paper is on the analysis of surface roughness characteristics Ra, Rq and Rz during the machining of
medium carbon steel EN19. The experiments have been done under dry environment by using a coated carbide
tool. For the optimization of process parameters Taguchi based Grey Relational Grade method was used.
Taguchi’s standard L9 Orthogonal Array was used for conducting the experiments. From the Grey analysis,
optimal parametric combination for multi-responses (Ra, Rq and Rz) was found at cutting speed: 225 mm/min,
feed: 0.05 mm/rev and depth of cut: 0.4 mm respectively. Analysis of variance (ANOVA) was used for analyse
the influence of process parameters on multi responses. From the analysis it is concluded that, speed has high
influence (F= 34.18, P= 0.025<0.05)>0.05). Regression models were developed for Ra, Rq and Rz, which are
very significant parameters from contact stiffness, fatigue strength and surface wear point of view. The models
prepared were highly significant because they have high coefficient of correlation values (R2 =0.992, 0.987 and
0.982 for Ra, Rq and Rz respectively). Hence, the models can be used for accurate prediction of surface
roughness characteristics.
Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...IJERA Editor
Flutter is an unstable oscillation which can lead to destruction. Flutter can occur on fixed surfaces, such as blades, wing or the stabilizer. By self-excited aeroelastic instability, flutter can lead to mechanical or structural failure of aircraft engine blades. The modern engines have been designed with increased pressure ratio and reduced weight in order to improve aerodynamic efficiency, resulting in severe aeroelastic problems. Particularly flutter in axial compressors with transonic flow can be characterized by a number of aerodynamic nonlinear effects such as shock boundary layer interaction, rotating stall, and tip vortex instability. Rotating blades operating under high centrifugal forces may also encounter structural nonlinearities due to friction damping and large deformations. In the future work a standard axial flow compressor blade will be taken for analysis, both Subsonic and Transonic range are taken for analysis. Fluid and Structure are two different domains which will be coupled by full system coupling technique to predict the fluttering effect on the compressor blade. ANSYS is a commercial simulation tool, which will be deployed in this work to perform FSI (Fluid Structure Interaction) and FSI coupled Modal to predict the flutter in the compressor blades
Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...IJERA Editor
In this paper, it is aimed to compare the performance of spectral based fault detection methods in quality control by testing on the same environment. The most widely used spectral based approaches as Fourier Transform, Wavelet Transform, Gabor Transform were used to extract features of the faulty fabric samples. By using statistical functions feature selection was done so huge dimensionality of features was decreased. The selected features are taken as inputs for feed-forward network (with the back propagation algorithm) to classify faulty fabrics in categories; weft, wrap and oil. All computations were performed in Matlab program so as to satisfy all conditions as the same. The analyses’ results show the Wavelet transform in terms of classification for three type defects was more efficient than the others, on other hand; Fourier transform in terms of processing time is faster than the others.
An Improved Parallel Activity scheduling algorithm for large datasetsIJERA Editor
Parallel processing is capable of executing a large number of tasks on a multiprocessor at the same time period, and it is also one of the emerging concepts. Complex and computational problems can be resolved in an efficient way with the help of parallel processing. The parallel processing system can be divided into two categories depending on the nature of tasks such are homogenous parallel system and the heterogeneous parallel processing system. In the homogeneous environment, the number of processors required for executing different tasks is similar in capacity. In case of heterogeneous environments, tasks are allocated to various processors with different capacity and speed. The main objective of parallel processing is to optimize the execution speed and to shorten the duration of task execution with independent of environment. In this proposed work, an optimized parallel project selection method was implemented to find the optimal resource utilization and project scheduling. The execution speeds of the task increases and the overall average execution time of the task decreases by allocating different tasks to various processors with the task scheduling algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
Cloud computing has recently emerged as new paradigm in field of technology. Cloud computing is attractive to business owners and IT people. It is still in its infancy and many issues are to be addressed. This paper covers the cloud computing basics and discusses load balancing in cloud computing environment as the one of the major challenges of cloud computing. It also discusses the various existing load balancing algorithms.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
Review on Security Techniques using Cloud ComputingEditor IJCATR
Cloud Computing is the nascent technology which is based on Pay-Per-Use Model. Cloud computing is emerging as a
model of “Everything as a Service” (XaaS). Cloud Computing is computing paradigm where applications, data bandwidth and IT
services are provided over the Internet. Cloud Computing is a relatively new computing model that provides on demand business
and IT services over the Internet. The main concerns in adapting Cloud Computing is its security, different security risks that
affects the cloud environment in the area of confidentiality, Integrity and computing on data is thoroughly investigated
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
ML for identifying fraud using open blockchain data.pptx
Password authentication in cloud
1. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 56 | P a g e
Password authentication in cloud
Indal Singh1
Rajesh Rai2
Sachin Murarkar3
M.Tech Scholar NRI Institute of Information Science & Technology Bhopal (M.P)-462021, India
Abstract
Cloud computing is an Internet-based computing, whereby shared resources, software, and information are
provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have
positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term
used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures
servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing
describes applications that are extended to be accessible through the internet and for this purpose large data
centers and powerful servers are used to host the web applications and web services. Authentication is one the
most important security primitive [6]. Password authentication is most widely used authentication mechanism.
Password provides security mechanism for authentication and protection services against unwanted access to
resource. In this paper, we applied a technique to preserve our password using graphical authentication.
Keywords- Cloud computing, Sender, Receiver, Data security.
I. Introduction
User authentication is a fundamental component
in most computer security contexts. It provides the
basis for access control and user accountability [2].
When anyone wants to access the network, for
security purposes every web application provides
user authentication. From ancient day’s secret data or
code is used for hiding and giving security to
information. In user authentication the process which
we have to pass through is username and password.
Authentication process divided into Token based
authentication, Biometric based authentication and
Knowledge based authentication. Most of the web
application provides knowledge based authentication
which include alphanumeric password as well as
graphical password. In today’s changing world when
we are having number of networks and personal
account some sort of easy authentication [3] schema
need to be provided.
II. Basics models of Cloud Computing
Service Models of Cloud Computing: - According
to NIST, the cloud model is composed of three
service models:
Software as a Service (SaaS): The capability
provided to the consumer is to use the provider’s
applications running on a cloud infrastructure. The
applications are accessible from various client
devices through either a thin client interface, such as
a web browser (e.g., web-based email), or a program
interface. The consumer does not manage or control
the underlying cloud infrastructure including
network, servers, operating systems, storage, or even
individual application capabilities, with the possible
exception of limited user-specific application
configuration settings [4].
Platform as a Service (PaaS): The capability
provided to the consumer is to deploy onto the cloud
infrastructure consumer-created or acquired
applications created using programming languages,
libraries, services, and tools supported by the
provider. The consumer does not manage or control
the underlying cloud infrastructure including
network, servers, operating systems, or storage, but
has control over the deployed applications and
possibly configuration settings for the application-
hosting environment [4].
Infrastructure as a Service (IaaS): The capability
provided to the consumer is to provision processing,
storage, networks, and other fundamental computing
resources where the consumer is able to deploy and
run arbitrary software, which can include operating
systems and applications. The consumer does not
manage or control the underlying cloud infrastructure
but has control over operating systems, storage, and
deployed applications; and possibly limited control of
select networking components (e.g., host firewalls)
[4].
Deployment Models of Cloud Computing: -
According to NIST, the cloud model is composed of
four deployment models:
Private cloud: The cloud infrastructure is
provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units).
It may be owned, managed, and operated by the
RESEARCH ARTICLE OPEN ACCESS
2. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 57 | P a g e
organization, a third party, or some combination of
them, and it may exist on or off premises [4].
Community cloud: The cloud infrastructure is
provisioned for exclusive use by a specific
community of consumers from organizations that
have shared concerns (e.g., mission, security
requirements, policy, and compliance
considerations). It may be owned, managed, and
operated by one or more of the organizations in the
community, a third party, or some combination of
them, and it may exist on or off premises [4].
Public cloud: The cloud infrastructure is provisioned
for open use by the general public. It may be owned,
managed, and operated by a business, academic, or
government organization, or some combination of
them. It exists on the premises of the cloud provider
[4].
Figure 1 Service & delivery models in cloud
Hybrid cloud: The cloud infrastructure is a
composition of two or more distinct cloud
infrastructures (private, community, or public) that
remain unique entities, but are bound together by
standardized or proprietary technology that enables
data and application portability (e.g., cloud bursting
for load balancing between clouds) [4].
III. Classification of Authentication
methods
Authentication is a process of determining
whether a particular individual or a device should be
allowed to access a system or an application or
simply an object running in a device. Authentication
process assures the basic security goals, i.e.
confidentiality and integrity. The first line of defense
for protecting any resource is Authentication [8].
Authentication is a process of validating who
you are to whom you claimed to be, or in other words
a process of identifying an individual, usually based
on a username and password. Currently what we have
in the field, are the following set of techniques [9]:
Human Authentication Techniques are as follows:
1. Knowledge Base (What you know)
2. Token Based (What you have)
3. Biometrics (What you are)
4. Recognition Based (What you recognize)
Computer Authentication Techniques are as follows:
1. Textual Passwords
2. Graphical Passwords
3. Biometric schemes (fingerprints, voice recognition
etc.)
Figure 2 Classification of Authentication methods
IV. Problem Formulated
In this paper, we had proposed a method of
password authentication by implementing double
authentication technique. In the first step of
authentication we apply the binary addition to our
chosen username & in the second step we send the
carry forward by OTP (One-Time Password) to the
receiver, so as to decode the sent data.
3. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 58 | P a g e
V. Proposed Methodology
Assigning the values: - First of all, we created a tree
diagram in which left arm (i.e. left sub-tree) is
assigned the value as 0 & right arm is assigned as 1.
On the basis of values so obtained, we obtained a
table.
Figure 3 Tree diagram
1 = 0
2 = 00
3 = 01
4 = 000
5 = 001
6 = 011
7 = 010
8 = 0010
9 = 0100
Table1 Positions of numeric values
Username calculation: - Enter username not more
than 6 characters.
Example
Figure 4 Binary values of positions 1234 according
to tree diagram
For username 1234
1 2 3 4
0 00 01 000
Now, by adding the redundancy bits 1111 to the
above generated bits, we get,
0 1111 00 1111 01 1111 000
Performing binary addition of the obtained binary
value of the username:
carry 1111111111111111
01111001111011111000
+11111111111111111111
101111001111011110111
The obtained result is 101111001111011110111.
We will now the obtained bit to the receiver and
send 1 of the first place of the data stream as OTP
(One Time Password) to the mobile of the receiver
for more secure authentication & the remaining 20
bits directly. When the user receives both the values,
he knows what to do next.
The receiver then add the carry 1 to the 20-bit
received values to obtain the desired value.
Here, 00000111(8-bit) and carry 1 will be added to
get desired result.
111
01111001111011110111
+1
01111001111011111000
Thus, the decoded password is
01111001111011111000.
Now, by removing the redundancy bits the original
data is found i.e. 0 00 01 000 = 1 2 3 4
Figure 5 Working and flow of bits from sender to
receiver
Algorithm for sender:
Step 1. Design tree for digit 1 to 9.
Step 2. Start from 1, assign left sub-tree as 0 and right
sub-tree as 1.
Step 3. Repeat the procedure up to 9.
Step 4. Enter the username.
Step 5. Assign values to the digits in the username
i.e. 1=0, 2=00, 3=01 etc.
Step 6. Insert redundancy bits between the values of
the username.
Step 7. Now, perform the binary addition of the
obtained data stream after adding redundancy bits.
Step 8. Send the 20-bits directly to the receiver and
the digit at the first place as OTP to the receiver’s
mobile.
4. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 59 | P a g e
Figure 6 Flow chart for sender
Algorithm for receiver:
Step 1. Received data and OTP at receiver’s side.
Step 2. Now, add this OTP bit to the received data
stream of 20-bits.
Step 3. By performing addition of OTP to the 20-bit
data stream, we get the data stream with added
redundancy.
Step 4. Perform removal of redundancy bits from the
original data.
Step 5. Now, assigns values to the obtained original
data.
Step 6. Thus, the original data is found.
Figure 7 Flow chart for receiver
VI. CONCLUSION
Lack of privacy and security is the main hurdle
in the wide adoption of cloud computing. We are
almost at the beginning of the cloud era; it is hard to
predict the impact of cloud computing on society.
Cloud computing is not fully mature and needs to be
explored [4].
This technique provides more secure password
authentication than usual graphical password
authentication techniques. Moreover, the extra bit
from the result which is sent as OTP adds more
security to password authentication technique.
References
[1] Mishra, R. ; Sch. of Comput. Eng., KIIT
Univ., Bhubaneswar, India ; Dash,
S.K. ; Mishra, D.P. ; Tripathy, A., A privacy
preserving repository for securing data
across the cloud, 2011.
[2] William Stallings and Lawrie Brown.
Computer Security: Principle and Practices.
Pearson Education, 2008.
[3] Authentication Using Graphical Passwords:
Effects of Tolerance and Image Choice
Susan Wiedenbeck Jim Waters College of
IST Drexel University Philadelphia.
[4] Peter Mell. (2011) 'The NIST Definition of
Cloud', Reports on Computer Systems
Technology, sept., p. 7.
[5] Matthew N.O. Sadiku, Sarhan M. Musa, and
OMonowo D. MoMOh, Cloud computing:
Opportunities and challenges, IEEE
potentials, pp. 34-36, January/February
2014.
[6] Virendra Singh Kushwah, Aradhana Saxena,
A Security approach for Data Migration in
Cloud Computing, 2013.
[7] http://www.thecloud.net.nz/go/what-is-cloud
-computing
[8] Ishwarya M.V, K.Ramesh Kumar, Secure
Anonymization for Privacy Measure, 2013.
[9] Grover Aman, Narang Winnie, 4-D
Password: Strengthening the Authentication
Scene, 2012.
[10] Deepika Singh, Puran Gour, Rajeev Thakur,
User Security in Cloud Using Password
Authentication, 2014.