ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
This document discusses security techniques for data transmission in ad-hoc networks, specifically encrypted data transmission and steganography. It proposes a system that enables encrypted data transmission between nodes and uses steganography to hide encrypted data in cover files like images, audio, and video during transmission for additional security. The system architecture includes modules for user interface, embedding secret data in cover files, extracting secret data, sending files between nodes, and receiving files. It aims to securely transmit data in ad-hoc networks using both encryption and steganography to protect confidentiality and integrity of transmitted data.
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
This document describes an efficient VLSI design for AES cryptography using a true random number generator (TRNG) and DNA encoding. It aims to improve security and reduce area and delay compared to standard AES. The design generates random round keys using a TRNG instead of the standard key expansion process. It further encodes a partial key from the TRNG using DNA encoding to produce the full 128-bit key, strengthening security. Simulation and synthesis results show the TRNG-based AES has lower area and delay than standard AES. Combining the TRNG with DNA encoding further optimizes the design.
This document proposes a cloud-based system to remotely monitor vital health statistics using Internet of Things (IoT). The system would allow children living abroad to monitor parents' health statistics. IoT devices like thermometers and blood pressure monitors would send readings to a smartphone app. The app would send anonymized data like user ID, device ID, and readings to a cloud database. Authorized users could access the aggregate data on a web portal. The system would also send reminders to users and monitors to ensure regular health checks. The goal is to help people remotely monitor loved ones' health with consistency and reliability despite long distances.
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
This document proposes a new technique for securing medical IoT devices that collects sensitive patient data. It involves using a Kerberos-like authentication server as a central hub that IoT devices connect to over an intranet, rather than connecting directly to an online database. The IoT devices will encrypt sensor data using Elliptic Curve Digital Signature Algorithm (ECDSA) before sending it to the authentication server. The server will decrypt and validate the digital signature before uploading valid data to the online database. This helps prevent man-in-the-middle and replay attacks while only allowing authorized users access to the medical data and devices based on access privileges.
An electronic Medical record (EHR) is a of a computerized version of a patient's paper record. Our reality
has been drastically changed by advanced innovation like – PDAs, tablets, and web-empowered gadgets
have changed our day to day lives and the manner in which we impart. Medication is a data rich enterprise.
EHR incorporate the clinical and treatment chronicles of patients, an EHR framework is worked to go past
standard clinical information gathered in a supplier's office and can be a more extensive perspective on a
patient's consideration. Electronic Health Record (EHR) frameworks face issues with respect toinformation
security, honesty and the board. We could execute blockchain innovation to change the EHR frameworks
and could be an answer of these issues. The main goal of our proposed structure is to implement and
execute blockchain innovation for EHR and furthermore to give secure capacity of electronic records by
characterizing granular access rules for the clients of the proposed framework. Thus this structure furnishes
the EHR framework with the advantages of having a versatile, secure and necessary integral chain-based
arrangement
Healthcare Monitoring System by using iSense Device& IOT PlatformIJMTST Journal
In the recent years Wireless Sensor Network have given rise to many healthcare applications. As the cost and size of sensor devices are decreasing fast, the application areas of wireless sensor networks have also expanded rapidly.iSense are the WSN devises works under the 802.15.4 IEEE standard iSense gives both hardware and software solution to build wireless sensor application. So in this paper we used both hardware and software part of the iSense. We connected our Sensor data to the internet of things (IOT). We use some of cloud services to stores patient’s records over the cloudDatabse. MongoDB is a schema less database tool which gives interface to store patient’s records on cloud.In this paper we use cloud service as DaaS (Database as a Service). The MongoLab provides the DaaS from different service providers like Microsoft Azure, Google etc, so that our sensor data can stored on cloud by getting the services. Finally the patient’s body temperature, body activity status, alcohol content in the body all these records processed by the isenseCoremodule and can stores data on cloud, so that respective patient’s physicians can take effective and quick decisions to improve patient life by accessing cloud data from different remote locations.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
This document discusses security techniques for data transmission in ad-hoc networks, specifically encrypted data transmission and steganography. It proposes a system that enables encrypted data transmission between nodes and uses steganography to hide encrypted data in cover files like images, audio, and video during transmission for additional security. The system architecture includes modules for user interface, embedding secret data in cover files, extracting secret data, sending files between nodes, and receiving files. It aims to securely transmit data in ad-hoc networks using both encryption and steganography to protect confidentiality and integrity of transmitted data.
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
This document describes an efficient VLSI design for AES cryptography using a true random number generator (TRNG) and DNA encoding. It aims to improve security and reduce area and delay compared to standard AES. The design generates random round keys using a TRNG instead of the standard key expansion process. It further encodes a partial key from the TRNG using DNA encoding to produce the full 128-bit key, strengthening security. Simulation and synthesis results show the TRNG-based AES has lower area and delay than standard AES. Combining the TRNG with DNA encoding further optimizes the design.
This document proposes a cloud-based system to remotely monitor vital health statistics using Internet of Things (IoT). The system would allow children living abroad to monitor parents' health statistics. IoT devices like thermometers and blood pressure monitors would send readings to a smartphone app. The app would send anonymized data like user ID, device ID, and readings to a cloud database. Authorized users could access the aggregate data on a web portal. The system would also send reminders to users and monitors to ensure regular health checks. The goal is to help people remotely monitor loved ones' health with consistency and reliability despite long distances.
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
This document proposes a new technique for securing medical IoT devices that collects sensitive patient data. It involves using a Kerberos-like authentication server as a central hub that IoT devices connect to over an intranet, rather than connecting directly to an online database. The IoT devices will encrypt sensor data using Elliptic Curve Digital Signature Algorithm (ECDSA) before sending it to the authentication server. The server will decrypt and validate the digital signature before uploading valid data to the online database. This helps prevent man-in-the-middle and replay attacks while only allowing authorized users access to the medical data and devices based on access privileges.
An electronic Medical record (EHR) is a of a computerized version of a patient's paper record. Our reality
has been drastically changed by advanced innovation like – PDAs, tablets, and web-empowered gadgets
have changed our day to day lives and the manner in which we impart. Medication is a data rich enterprise.
EHR incorporate the clinical and treatment chronicles of patients, an EHR framework is worked to go past
standard clinical information gathered in a supplier's office and can be a more extensive perspective on a
patient's consideration. Electronic Health Record (EHR) frameworks face issues with respect toinformation
security, honesty and the board. We could execute blockchain innovation to change the EHR frameworks
and could be an answer of these issues. The main goal of our proposed structure is to implement and
execute blockchain innovation for EHR and furthermore to give secure capacity of electronic records by
characterizing granular access rules for the clients of the proposed framework. Thus this structure furnishes
the EHR framework with the advantages of having a versatile, secure and necessary integral chain-based
arrangement
Healthcare Monitoring System by using iSense Device& IOT PlatformIJMTST Journal
In the recent years Wireless Sensor Network have given rise to many healthcare applications. As the cost and size of sensor devices are decreasing fast, the application areas of wireless sensor networks have also expanded rapidly.iSense are the WSN devises works under the 802.15.4 IEEE standard iSense gives both hardware and software solution to build wireless sensor application. So in this paper we used both hardware and software part of the iSense. We connected our Sensor data to the internet of things (IOT). We use some of cloud services to stores patient’s records over the cloudDatabse. MongoDB is a schema less database tool which gives interface to store patient’s records on cloud.In this paper we use cloud service as DaaS (Database as a Service). The MongoLab provides the DaaS from different service providers like Microsoft Azure, Google etc, so that our sensor data can stored on cloud by getting the services. Finally the patient’s body temperature, body activity status, alcohol content in the body all these records processed by the isenseCoremodule and can stores data on cloud, so that respective patient’s physicians can take effective and quick decisions to improve patient life by accessing cloud data from different remote locations.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
The document describes a method for fish recognition and detection using deep learning and the R-CNN algorithm. A raspberry pi camera is used to capture underwater images of fish as input datasets. These images are preprocessed using techniques like resizing and background removal. The preprocessed datasets are then trained using the R-CNN deep learning model. This trained model can detect and recognize fish in the images with 85% accuracy. The detected results are stored in an IoT cloud for further use. The proposed method provides high accuracy for fish detection with minimal human intervention.
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...IJCSEA Journal
Fingerprints are considered to be the best and fastest method for checking attendance. They are secured to use, unique to every person, and do not change in one’s lifetime barring accident. The objective of this paper was to improve on the fingerprint identification system for implementation on a large database. The main objective of this paper was to design and construct an attendance system using a fingerprint module. In this system, Arduino Wemos D1 R2 ESP8266 (microcontroller) and Adafruit fingerprint reader are the main components used to insert records into a database
Multilevel authentication using gps and otp techniqueseSAT Journals
Abstract Regression Testing is type of testing which is used to cut off the directly price associated with testing of different modules. Generally regression testing performs on test cases so that the resource utilization should be very low. Test cases in it are challenging task to achieve and suitable test cases for regression testing are difficult to judge and process. Optimization of various testing processes is done by optimization algorithms such as Genetic and Ant colony which usually provide solution to the good regression testing. Still these algorithms lack of some features which are required for better optimization of test cases in regression testing. The regression testing is the most expensive phase of the software testing, regression testing reduction eliminates the redundant test cases in the regression testing suite and saves the cost of the regression testing. In our proposed work, we will focus on optimization of regression testing with multi-objective genetic algorithm which will cover parameters like simplicity and complexity for test cases for regression testing. The complexity and simplicity for test cases will be judged and according to a common fitness function threshold we will proceed with optimization of the regression testing phases. Finally the paper evaluates the basic genetic algorithm for optimizing the test cases based on execution time; implement the multi-objective genetic algorithm with simplicity and complexity of the test cases along with execution time for test case prioritization for regression testing. Index Terms: Genetic Algorithm, Regression Testing Reduction, Test Cases, and Fitness Function etc…
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
This document describes a door lock control system that uses wireless biometrics. The system uses fingerprint recognition technology to unlock a door. An Arduino board controls a servo motor that locks and unlocks the door. It communicates wirelessly with an Android application over Bluetooth. When a matching fingerprint is detected by the app, it sends a signal to the Arduino board to unlock the door by turning the servo motor. This provides secure, contactless access to doors without requiring keys. The system aims to provide biometric security access at a lower cost than traditional solutions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Image Watermarking using QR CodeIRJET Journal
This document presents a technique for digital image watermarking using QR codes. It aims to provide copyright protection and authentication of digital images. The technique works by encrypting an image using AES encryption and embedding the encrypted data in a QR code. The QR code is then hidden behind a cover image using steganography. This makes it difficult for unauthorized users to detect the hidden watermark or tamper with the encrypted image data. The document discusses related work on image watermarking and steganography techniques. It also provides details of the proposed system architecture, classification of digital watermarking techniques, the AES encryption algorithm used, and potential applications of the presented image watermarking approach.
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
This document describes a smart attendance management system using RFID technology. The system uses RFID cards distributed to students that are read by an RFID reader module connected to a microcontroller. When a student taps their card, the unique ID is sent to a server for verification and their attendance is recorded in a MySQL database. If a student is absent or late, an SMS is sent to their parents. Staff can access student attendance data from a dashboard website. The system aims to automate the attendance process and make it faster and more secure than conventional paper-based methods.
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
This document proposes a proximity detection warning system using ray casting and pathfinding algorithms. The system would detect obstacles in an environment beforehand using ray casting to calculate distances between objects. It would then find an optimal shortest path for a user to navigate safely using the A* pathfinding algorithm. The system architecture involves object detection with ray casting, data preprocessing of threats, continuously tracking objects, and calculating a safe route using A*. The goal is to allow autonomous objects like drones to traverse environments without collisions.
This document summarizes a research paper that proposes a phishing detector plugin called PHISCAN that uses machine learning to detect phishing websites. The plugin is developed for the Chrome browser using JavaScript and HTML. It extracts features from URLs to train classifiers like random forest that can accurately classify URLs as phishing or benign in less than a second while maintaining user privacy. The paper conducts a literature review of existing phishing detection systems and techniques using blacklists, heuristics, or machine learning. It motivates the need for the proposed plugin by discussing the increasing prevalence and sophistication of phishing attacks.
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
This document discusses securing e-medical documents using QR codes. It proposes a system where hospitals can upload medical records to the cloud with a patient ID. This ID is then converted to a QR code using the QRDroid function. Patients can then scan the QR code to download their medical document. The system aims to securely transmit medical data between hospitals and patients in a paperless manner using encrypted QR codes. It describes modules for user registration, database creation, QR code generation, scanning and file uploading/downloading. The goal is to provide a more secure, flexible and easy way for patients to access medical records electronically.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
This document describes a smart yoga instructor system that uses accelerometer sensors and an IoT platform to detect a user's yoga postures and provide feedback on correctness. Sensors placed on the user's limbs measure orientation data, which is sent to a microcontroller and then to the cloud. A mobile app accesses the cloud data to compare real-time poses to predefined poses and instruct the user. The system aims to help users practice yoga correctly anywhere without an in-person instructor.
1. The document discusses the design of an inexpensive home security system using Internet of Things (IoT) technology.
2. It proposes using a microcontroller, magnetic reed sensor to monitor doors/windows, a buzzer for alarms, and WiFi to connect and send notifications. This allows for easy setup and low maintenance at a low cost.
3. Previous research on IoT home security is reviewed, discussing methods using cameras, GSM, fingerprints, as well as robust and energy efficient systems. Each has advantages and disadvantages in terms of cost, functionality, and security.
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
This document proposes a novel technique that combines encryption and digital watermarking to securely transmit medical images over public networks like the cloud. The algorithm divides images into regions of interest and non-interest, and embeds cryptographic watermarks and patient data in the non-interest regions before transmission. At the receiver end, the watermarks and data can be extracted to authenticate the image and verify that it has not been tampered with. The algorithm was tested on medical images and provided security, integrity and authenticity of transmitted medical information.
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET Journal
This document proposes an algorithm for granting authentication and permission to access sensitive information stored in the cloud using QR codes. The algorithm allows medical records and other confidential documents to be stored remotely in the cloud while only permitting authenticated users to access and download particular documents. When an admin uploads a medical record to the cloud along with a patient ID, the ID is automatically converted to a QR code. An authenticated user can then scan the QR code to access and download the corresponding medical document. Signatures are used to verify the integrity of files during the auditing process and ensure only authorized access is granted, protecting sensitive information from exposure to unauthorized third parties.
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
This document discusses detecting false data injection attacks in networks using k-means clustering. It proposes a system that uses a camera to detect inside attacks on a sub-network. When an outside person pauses the camera for a certain period of time, the server will detect this as an inside attack and inform the administrator. The system aims to improve network security by identifying these inside attacks using k-means clustering algorithm to classify sensor measurements and detect false data injected by attackers.
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
Data security is an important task in today‟s life. Data security can be done using GPS device. Among computer user mostly
use data in electronic format. How to provide a security for data is important. In this paper, we propose a Location Based Data-
Security System to secure data by applying Encryption-Algorithm and co-ordinate using GPS device. Encryption means of efficient
secure integer comparison. The encryption technology cannot restrict the location of data decryption. In order to meet the demand of a
location-dependent approach location-dependent data encryption algorithm is needed. A target latitude/longitude co-ordinate is
determined firstly. The co-ordinate is incorporated with a random key for data encryption. The receiver can only decrypt the cipher
text when the co-ordinate acquired from GPS receiver is matched with the target co-ordinate. GPS-based encryption is an innovative
technique that uses GPS-technology to encode location information into the encryption keys to provide location based security. GPSbased
encryption adds another layer of security on top of existing encryption methods by restricting the decryption of a message to a
particular location. Our experimental results not only validate the effectiveness of our scheme, but also demonstrate that the proposed
integer comparison scheme performs better than previous bitwise comparison scheme.
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
This document proposes and compares two encryption algorithms, Key Policy Attribute-Based Encryption (KP-ABE) and Ciphertext Policy Attribute-Based Encryption (CP-ABE), for secure data sharing in mobile cloud computing. KP-ABE allows data to be encrypted with user attributes but does not allow the encryptor to choose who can decrypt. CP-ABE addresses this limitation by allowing the encryptor to define an access policy that must be satisfied by user attributes for decryption. The document concludes that CP-ABE provides more secure access control compared to KP-ABE by giving encryptors control over who can decrypt ciphertext.
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
The document describes a method for fish recognition and detection using deep learning and the R-CNN algorithm. A raspberry pi camera is used to capture underwater images of fish as input datasets. These images are preprocessed using techniques like resizing and background removal. The preprocessed datasets are then trained using the R-CNN deep learning model. This trained model can detect and recognize fish in the images with 85% accuracy. The detected results are stored in an IoT cloud for further use. The proposed method provides high accuracy for fish detection with minimal human intervention.
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...IJCSEA Journal
Fingerprints are considered to be the best and fastest method for checking attendance. They are secured to use, unique to every person, and do not change in one’s lifetime barring accident. The objective of this paper was to improve on the fingerprint identification system for implementation on a large database. The main objective of this paper was to design and construct an attendance system using a fingerprint module. In this system, Arduino Wemos D1 R2 ESP8266 (microcontroller) and Adafruit fingerprint reader are the main components used to insert records into a database
Multilevel authentication using gps and otp techniqueseSAT Journals
Abstract Regression Testing is type of testing which is used to cut off the directly price associated with testing of different modules. Generally regression testing performs on test cases so that the resource utilization should be very low. Test cases in it are challenging task to achieve and suitable test cases for regression testing are difficult to judge and process. Optimization of various testing processes is done by optimization algorithms such as Genetic and Ant colony which usually provide solution to the good regression testing. Still these algorithms lack of some features which are required for better optimization of test cases in regression testing. The regression testing is the most expensive phase of the software testing, regression testing reduction eliminates the redundant test cases in the regression testing suite and saves the cost of the regression testing. In our proposed work, we will focus on optimization of regression testing with multi-objective genetic algorithm which will cover parameters like simplicity and complexity for test cases for regression testing. The complexity and simplicity for test cases will be judged and according to a common fitness function threshold we will proceed with optimization of the regression testing phases. Finally the paper evaluates the basic genetic algorithm for optimizing the test cases based on execution time; implement the multi-objective genetic algorithm with simplicity and complexity of the test cases along with execution time for test case prioritization for regression testing. Index Terms: Genetic Algorithm, Regression Testing Reduction, Test Cases, and Fitness Function etc…
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
This document describes a door lock control system that uses wireless biometrics. The system uses fingerprint recognition technology to unlock a door. An Arduino board controls a servo motor that locks and unlocks the door. It communicates wirelessly with an Android application over Bluetooth. When a matching fingerprint is detected by the app, it sends a signal to the Arduino board to unlock the door by turning the servo motor. This provides secure, contactless access to doors without requiring keys. The system aims to provide biometric security access at a lower cost than traditional solutions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Image Watermarking using QR CodeIRJET Journal
This document presents a technique for digital image watermarking using QR codes. It aims to provide copyright protection and authentication of digital images. The technique works by encrypting an image using AES encryption and embedding the encrypted data in a QR code. The QR code is then hidden behind a cover image using steganography. This makes it difficult for unauthorized users to detect the hidden watermark or tamper with the encrypted image data. The document discusses related work on image watermarking and steganography techniques. It also provides details of the proposed system architecture, classification of digital watermarking techniques, the AES encryption algorithm used, and potential applications of the presented image watermarking approach.
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
This document describes a smart attendance management system using RFID technology. The system uses RFID cards distributed to students that are read by an RFID reader module connected to a microcontroller. When a student taps their card, the unique ID is sent to a server for verification and their attendance is recorded in a MySQL database. If a student is absent or late, an SMS is sent to their parents. Staff can access student attendance data from a dashboard website. The system aims to automate the attendance process and make it faster and more secure than conventional paper-based methods.
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
This document proposes a proximity detection warning system using ray casting and pathfinding algorithms. The system would detect obstacles in an environment beforehand using ray casting to calculate distances between objects. It would then find an optimal shortest path for a user to navigate safely using the A* pathfinding algorithm. The system architecture involves object detection with ray casting, data preprocessing of threats, continuously tracking objects, and calculating a safe route using A*. The goal is to allow autonomous objects like drones to traverse environments without collisions.
This document summarizes a research paper that proposes a phishing detector plugin called PHISCAN that uses machine learning to detect phishing websites. The plugin is developed for the Chrome browser using JavaScript and HTML. It extracts features from URLs to train classifiers like random forest that can accurately classify URLs as phishing or benign in less than a second while maintaining user privacy. The paper conducts a literature review of existing phishing detection systems and techniques using blacklists, heuristics, or machine learning. It motivates the need for the proposed plugin by discussing the increasing prevalence and sophistication of phishing attacks.
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
This document discusses securing e-medical documents using QR codes. It proposes a system where hospitals can upload medical records to the cloud with a patient ID. This ID is then converted to a QR code using the QRDroid function. Patients can then scan the QR code to download their medical document. The system aims to securely transmit medical data between hospitals and patients in a paperless manner using encrypted QR codes. It describes modules for user registration, database creation, QR code generation, scanning and file uploading/downloading. The goal is to provide a more secure, flexible and easy way for patients to access medical records electronically.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
This document describes a smart yoga instructor system that uses accelerometer sensors and an IoT platform to detect a user's yoga postures and provide feedback on correctness. Sensors placed on the user's limbs measure orientation data, which is sent to a microcontroller and then to the cloud. A mobile app accesses the cloud data to compare real-time poses to predefined poses and instruct the user. The system aims to help users practice yoga correctly anywhere without an in-person instructor.
1. The document discusses the design of an inexpensive home security system using Internet of Things (IoT) technology.
2. It proposes using a microcontroller, magnetic reed sensor to monitor doors/windows, a buzzer for alarms, and WiFi to connect and send notifications. This allows for easy setup and low maintenance at a low cost.
3. Previous research on IoT home security is reviewed, discussing methods using cameras, GSM, fingerprints, as well as robust and energy efficient systems. Each has advantages and disadvantages in terms of cost, functionality, and security.
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
This document proposes a novel technique that combines encryption and digital watermarking to securely transmit medical images over public networks like the cloud. The algorithm divides images into regions of interest and non-interest, and embeds cryptographic watermarks and patient data in the non-interest regions before transmission. At the receiver end, the watermarks and data can be extracted to authenticate the image and verify that it has not been tampered with. The algorithm was tested on medical images and provided security, integrity and authenticity of transmitted medical information.
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET Journal
This document proposes an algorithm for granting authentication and permission to access sensitive information stored in the cloud using QR codes. The algorithm allows medical records and other confidential documents to be stored remotely in the cloud while only permitting authenticated users to access and download particular documents. When an admin uploads a medical record to the cloud along with a patient ID, the ID is automatically converted to a QR code. An authenticated user can then scan the QR code to access and download the corresponding medical document. Signatures are used to verify the integrity of files during the auditing process and ensure only authorized access is granted, protecting sensitive information from exposure to unauthorized third parties.
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
This document discusses detecting false data injection attacks in networks using k-means clustering. It proposes a system that uses a camera to detect inside attacks on a sub-network. When an outside person pauses the camera for a certain period of time, the server will detect this as an inside attack and inform the administrator. The system aims to improve network security by identifying these inside attacks using k-means clustering algorithm to classify sensor measurements and detect false data injected by attackers.
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
Data security is an important task in today‟s life. Data security can be done using GPS device. Among computer user mostly
use data in electronic format. How to provide a security for data is important. In this paper, we propose a Location Based Data-
Security System to secure data by applying Encryption-Algorithm and co-ordinate using GPS device. Encryption means of efficient
secure integer comparison. The encryption technology cannot restrict the location of data decryption. In order to meet the demand of a
location-dependent approach location-dependent data encryption algorithm is needed. A target latitude/longitude co-ordinate is
determined firstly. The co-ordinate is incorporated with a random key for data encryption. The receiver can only decrypt the cipher
text when the co-ordinate acquired from GPS receiver is matched with the target co-ordinate. GPS-based encryption is an innovative
technique that uses GPS-technology to encode location information into the encryption keys to provide location based security. GPSbased
encryption adds another layer of security on top of existing encryption methods by restricting the decryption of a message to a
particular location. Our experimental results not only validate the effectiveness of our scheme, but also demonstrate that the proposed
integer comparison scheme performs better than previous bitwise comparison scheme.
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
This document proposes and compares two encryption algorithms, Key Policy Attribute-Based Encryption (KP-ABE) and Ciphertext Policy Attribute-Based Encryption (CP-ABE), for secure data sharing in mobile cloud computing. KP-ABE allows data to be encrypted with user attributes but does not allow the encryptor to choose who can decrypt. CP-ABE addresses this limitation by allowing the encryptor to define an access policy that must be satisfied by user attributes for decryption. The document concludes that CP-ABE provides more secure access control compared to KP-ABE by giving encryptors control over who can decrypt ciphertext.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
This document proposes an efficient data sharing scheme for mobile cloud computing using attribute-based encryption. It discusses challenges with securely storing data in the cloud, including ensuring data confidentiality and integrity. Existing techniques like fully homomorphic encryption and attribute-based encryption are reviewed, but have limitations for resource-constrained mobile devices. The proposed scheme aims to provide security while reducing computational overhead, through using proxy servers to handle intensive operations and a lazy re-encryption approach for user revocation. It also discusses using provable data possession techniques to verify the integrity of outsourced data.
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
This document reviews key-based encryption schemes for secure data sharing on cloud. It discusses how traditional encryption techniques are not suitable for large scale data sharing due to complex key management. A key-based encryption scheme is proposed that allows a data owner to generate an aggregate encryption key and submit a single aggregate trapdoor for keyword search. This reduces key management complexity and the number of trapdoors needed compared to traditional techniques. The proposed scheme uses seven polynomial algorithms for security including key generation, encryption, key extraction and trapdoor generation. It aims to provide an effective solution for secure and scalable data sharing using cloud storage.
This document proposes a new method for improving cloud computing security using RSA encryption with Fermat's Little Theorem. RSA is widely used for encryption but has drawbacks related to key generation time. Fermat's Little Theorem can help speed up the RSA key generation process. The document discusses cloud computing concepts and challenges, related work on encryption techniques for cloud security, an overview of the RSA algorithm and its security, and how the proposed method would integrate Fermat's Little Theorem into RSA key generation to improve encryption performance for cloud computing.
Define and solve the problem of effective and secure ranked keyword search over encrypted cloud data.
Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to
certain relevance criteria (e.g., keyword frequency), thus making one step closer towards practical deployment of
privecy- preserving data hosting services in Cloud Computing. To improve the security for the data retrieval from
cloud environment, the One Time Password is used. The One Time Passwod is sent to the user mail to view the
original data. The Model exhibits the Querying Process over the cloud computing infrastructure using Secured and
Encrypted Data access and Ranking over the results would benefit the usre for the getting better results.
This document proposes and compares several privacy-preserving encrypted keyword search schemes for cloud storage. It introduces three main participants in such schemes: users, a key server, and a cloud service provider (CSP). It then describes three specific schemes - Public Key Encryption with Keyword Search (PEKS), Efficient and Privacy Preserving Keyword Search (EPPKS), and Secure and Privacy Preserving Keyword Search (SPKS). PEKS allows searching on encrypted keywords but requires the user to decrypt files. EPPKS offloads some computation to the CSP but is not resistant to statistical attacks. SPKS enables partial decryption by the CSP, reducing user computation costs while preserving privacy and flexibility. The document argues that SPKS provides the
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
This document proposes a decentralized access control method for data stored in the cloud using key policy attribute-based encryption (KP-ABE). It aims to allow fine-grained access control while maintaining data confidentiality and scaling efficiently. The method defines and implements access policies based on data attributes. It also allows the data owner to delegate access control tasks to cloud servers without revealing data contents. This is achieved using a combination of decentralized KP-ABE and a time-based file deletion scheme. The proposed approach is analyzed and shown to be highly secure and efficient.
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the proposed paper. This paper can help to solve the user authentication problem in Cloud environment. Kyaw Swar Hlaing | Nay Aung Aung "Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28037.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28037/secure-one-time-password-otp-generation-for-user-authentication-in-cloud-environment/kyaw-swar-hlaing
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
This document summarizes a research paper that proposes a method for managing sensitive user data in cloud computing through measurable and secure data access controls. It discusses privacy issues with current data storage practices in cloud computing. The proposed method uses attribute-based encryption to assign users fine-grained access permissions to limited amounts of data for a specific time period. This aims to address issues with data leakage, privacy, and lack of data owner control in existing cloud data systems. The method was implemented in a simulation using .NET technologies to test access permissions between cloud service providers, consumers, and users.
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
This document discusses a proposed scheme for secure and dynamic multi-keyword ranked search over encrypted cloud data. The scheme allows data owners to encrypt and outsource their data to the cloud while still enabling authorized users to perform keyword searches. It utilizes a tree-based index structure and "Greedy Depth-first Search" algorithm to provide efficient multi-keyword ranked search. The k-nearest neighbor algorithm is used to encrypt the index and query vectors while still allowing accurate relevance scoring of encrypted results. Phantom keywords are added to blind search results and prevent statistical attacks. The scheme also enables dynamic updates like deletion and insertion of files by the data owner. Experimental results demonstrate the performance of the proposed scheme.
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
This document discusses secure data storage in multiple cloud storage providers. It proposes a method for users to store encrypted data across multiple cloud storage providers using splitting and merging concepts. Private keys are generated during file access using a pseudo key generator and encrypted using 3DES for transmission. The method aims to increase data availability, confidentiality and reduce costs by distributing data across multiple cloud providers. It also discusses using image compression with reversible data hiding techniques to provide data confidentiality when storing images in the cloud.
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
This document proposes an efficient and privacy-preserving approach for outsourced data from resource-constrained mobile devices in cloud computing. It employs probabilistic public key encryption to encrypt the data and performs ranked keyword search over the encrypted data to retrieve files from the cloud. The approach aims to achieve efficient encryption without sacrificing data privacy. The ranked keyword search improves usability by returning the most relevant files and ensuring retrieval accuracy, while reducing computation and communication overhead. A thorough security and performance analysis proves the approach is semantically secure and efficient.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
This document discusses advances in information technology that have enabled the rapid scaling of data center systems. It presents a multiple path routing configuration protocol and analyzes its performance in terms of flexibility, backup path lengths, and load distribution after a failure. It also shows how estimating traffic demands in the network can be used to improve the distribution of recovered traffic and thus reduce the risk of congestion when multiple path routing is used. The proposed system aims to design a new strategy for privacy preservation in software defined networks that has lower computational time and is more secure without disclosing any private data.
Similar to verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage (20)
This document reviews the behavior of reinforced concrete deep beams. Deep beams are defined as having a shear span to depth ratio of less than 5. The response of deep beams differs from regular beams due to the influence of shear deformations and stresses. Failure modes include flexure, flexural-shear, and diagonal cracking. Previous studies investigated factors affecting shear strength such as concrete strength, reinforcement, and loading conditions. Equations have been proposed to predict shear strength based on test results.
Subcutaneous administration of toluene to rabbits for 6 weeks resulted in significant increases in liver enzyme levels and histopathological changes in the liver tissue. Liver sections from toluene-treated rabbits showed congested central veins, flattening and vacuolation of hepatocytes, and disarrangement of hepatic architecture. In contrast, liver sections from control rabbits appeared normal. Toluene exposure is known to cause oxidative stress and damage cell membranes in the liver through its metabolism.
This document summarizes a research paper that proposes a system to analyze crop phenology (growth stages) using IoT to support parallel agriculture management. The system would use sensors to collect data on soil moisture, temperature, humidity and other parameters. This data would be input to a database. Then, a multiple linear regression model trained on past data would predict the optimal crop and expected yield based on the tested sensor data and parameters. This system aims to help farmers select crops and fertilization practices tailored to their specific fields' conditions.
This document summarizes a study that determined the liberation size of gold ore from the Iperindo-Ilesha deposit in Nigeria and assessed its amenability to froth flotation. Samples of the ore were collected and subjected to sieve analysis to determine particle size fractions. Chemical analysis found that the actual and economic liberation sizes were 45μm and 250μm, respectively. Froth flotation experiments at 45μm particle size and varying collector dosages achieved a maximum gold recovery of 78.93% at 0.3 mol/dm3 collector dosage, with concentrate grade of 115 ppm Au. These parameters will be used for further processing to extract gold from this deposit.
This document presents a proposal for an IOT-based intelligent baby care system with a web application for remote baby monitoring. The system uses sensors to automatically swing a cradle when a baby cries, sound alarms if the baby cries for too long or the mattress is wet, and sends alerts to a web page for parents to monitor the baby's status from anywhere via internet connection. The proposed system aims to help working parents manage childcare remotely using sensors, a Raspberry Pi, web camera, and cloud server to detect the baby's activities and notify parents through a web application on their phone.
This document discusses various sources of water pollution and new techniques being developed for water purification. It begins by outlining how water pollution occurs from industrial wastes like mining and manufacturing, agricultural runoff containing pesticides, and domestic waste. It then examines some specific pollutants in more depth from these sources. New techniques under research for water purification are also mentioned, with the goal of developing more affordable methods. The document aims to analyze the impact of pollutants on water and introduce promising new purification techniques.
This document summarizes a research paper on using big data methodologies with IoT and its applications. It discusses how big data analytics is being used across various fields like engineering, data management, and more. It also discusses how IoT enables the collection of massive amounts of data from sensors and devices. Machine learning techniques are used to analyze this big data from IoT and enable communication between devices. The document provides examples of domains where big data and IoT are being applied, such as healthcare, energy, transportation, and others. It analyzes the similarities and differences in how big data techniques are used across these IoT domains.
The document describes a proposed smart library automation and monitoring system using RFID technology. The system uses RFID tags attached to books and student ID cards. An RFID scanner reads the tags to automate processes like tracking student entry and exit, book check-in/check-out, and inventory management. This allows transactions to occur without manual intervention. The system also includes an Android app for students to search books and check availability. The goals are to streamline library operations, prevent unauthorized access, and help locate misplaced books. Raspberry Pi hardware and a MySQL database are part of the proposed implementation.
This document discusses congestion control techniques for vehicular ad hoc networks (VANETs). It first provides background on VANETs, noting their use of vehicle-to-vehicle communication to share information. Congestion can occur when there is a sudden increase in data from nodes in the network. The document then reviews different existing congestion control schemes, which vary in how they adjust source sending rates and handle transient congestion. It proposes a priority-based congestion control technique using dual queues, one for transit packets and one for locally generated packets. This approach aims to route packets along less congested paths when congestion is detected based on buffer occupancy.
This document summarizes a research paper that proposes applying principles of Vedic mathematics to optimize the design of multipliers, squarers, and cubers. It begins by providing background on multipliers and their importance in electronic systems. It then reviews related work applying Vedic mathematics to multiplier design. The document outlines the methodology for performing multiplication, squaring, and cubing according to Vedic mathematics principles. It presents simulation and synthesis results comparing the proposed Vedic designs to traditional array-based designs, finding improvements in speed, power, and area. The document concludes that Vedic mathematics provides an effective approach for optimizing the design of these fundamental arithmetic components.
Cloud computing is the one of the emerging techniques to process the big data. Large collection of set or large
volume of data is known as big data. Processing of big data (MRI images and DICOM images) normally takes
more time compare with other data. The main tasks such as handling big data can be solved by using the concepts
of hadoop. Enhancing the hadoop concept it will help the user to process the large set of images or data. The
Advanced Hadoop Distributed File System (AHDF) and MapReduce are the two default main functions which
are used to enhance hadoop. HDF method is a hadoop file storing system, which is used for storing and retrieving
the data. MapReduce is the combinations of two functions namely maps and reduce. Map is the process of
splitting the inputs and reduce is the process of integrating the output of map’s input. Recently, in medical fields
the experienced problems like machine failure and fault tolerance while processing the result for the scanned
data. A unique optimized time scheduling algorithm, called Advanced Dynamic Handover Reduce Function
(ADHRF) algorithm is introduced in the reduce function. Enhancement of hadoop and cloud introduction of
ADHRF helps to overcome the processing risks, to get optimized result with less waiting time and reduction in
error percentage of the output image
Text mining has turned out to be one of the in vogue handle that has been joined in a few research
fields, for example, computational etymology, Information Retrieval (IR) and data mining. Natural
Language Processing (NLP) methods were utilized to extricate learning from the textual text that is
composed by people. Text mining peruses an unstructured form of data to give important
information designs in a most brief day and age. Long range interpersonal communication locales
are an awesome wellspring of correspondence as the vast majority of the general population in this
day and age utilize these destinations in their everyday lives to keep associated with each other. It
turns into a typical practice to not compose a sentence with remedy punctuation and spelling. This
training may prompt various types of ambiguities like lexical, syntactic, and semantic and because of
this kind of indistinct data; it is elusive out the genuine data arrange. As needs be, we are directing
an examination with the point of searching for various text mining techniques to get different
textual requests via web-based networking media sites. This review expects to depict how
contemplates in online networking have utilized text investigation and text mining methods to
identify the key topics in the data. This study concentrated on examining the text mining
contemplates identified with Facebook and Twitter; the two prevailing web-based social networking
on the planet. Aftereffects of this overview can fill in as the baselines for future text mining research.
Colorectal cancer (CRC) has potential to spread within the peritoneal cavity, and this transcoelomic
dissemination is termed “peritoneal metastases” (PM).The aim of this article was to summarise the current
evidence regarding CRC patients at high risk of PM. Colorectal cancer is the second most common cause of cancer
death in the UK. Prompt investigation of suspicious symptoms is important, but there is increasing evidence that
screening for the disease can produce significant reductions in mortality.High quality surgery is of paramount
importance in achieving good outcomes, particularly in rectal cancer, but adjuvant radiotherapy and chemotherapy
have important parts to play. The treatment of advanced disease is still essentially palliative, although surgery for
limited hepatic metastases may be curative in a small proportion of patients.
This document summarizes a research paper on the thermal performance of air conditioners using nanofluids compared to base fluids. Key points:
- Nanofluids, which are liquids containing nanoparticles, can improve heat transfer in heat pipes and cooling systems due to their higher thermal conductivity compared to base fluids.
- The document reviews how factors like nanofluid type, nanoparticle size and concentration affect thermal efficiency and heat transfer limits. It also examines using nanofluids to enhance heat exchange in transmission fluids.
- An experimental setup is described to study heat transfer and friction factors of water-based Al2O3 nanofluids in a horizontal tube under constant heat flux. Temperature, pressure and flow rate are measured
Now-a-day’s pedal powered grinding machine is used only for grinding purpose. Also, it requires lots of efforts
and limited for single application use. Another problem in existing model is that it consumed more time and also has
lower efficiency. Our aim is to design a human powered grinding machine which can also be used for many purposes
like pumping, grinding, washing, cutting, etc. it can carry water to a height 8 meter and produces 4 ampere of electricity
in most effective way. The system is also useful for the health conscious work out purpose. The purpose of this technical
study is to increase the performance and output capacity of pedal powered grinding machine.
This document summarizes a research paper that proposes using distributed control of multiple energy storage units (ESUs) to manage voltage and loading in electric distribution networks with renewable energy sources like solar and wind. The distributed control approach coordinates the ESUs to store excess power generated during peak periods and discharge it during peak load periods. Each ESU can provide both active and reactive power to support voltage and manage power flows. The distributed control strategy uses a consensus algorithm to divide the required active power reduction equally among ESUs based on their available capacity. Simulation results are presented to analyze the coordinated control of ESU active and reactive power outputs over time.
The steady increase in non-linear loads on the power supply network such as, AC variable speed drives,
DC variable Speed drives, UPS, Inverter and SMPS raises issues about power quality and reliability. In this
subject, attention has been focused on harmonics . Harmonics overload the power system network and cause
reliability problems on equipment and system and also waste energy. Passive and active harmonic filters are
used to mitigate harmonic problems. The use of both active and passive filter is justified to mitigate the
harmonics. The difficulty for practicing engineers is to select and deploy correct harmonic filters , This paper
explains which solutions are suitable when it comes to choosing active and passive harmonic filters and also
explains the mistakes need to be avoided.
This Paper is aimed at analyzing the few important Power System equipment failures generally
occurring in the Industrial Power Distribution system. Many such general problems if not resolved it may
lead to huge production stoppage and unforeseen equipment damages. We can improve the reliability of
Power system by simply applying the problem solving tool for every case study and finding out the root cause
of the problem, validation of root cause and elimination by corrective measures. This problem solving
approach to be practiced by every day to improve the power system reliability. This paper will throw the light
and will be a guide for the Practicing Electrical Engineers to find out the solution for every problem which
they come across in their day to day maintenance activity.
Today internet security is a serious problem. For every consumer and business that is on the Internet,
viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security
professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but
these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools
used or even the methods employed. Given all of these security questions honeypots are a novel approach to
network security and security research alike. It is a resource, which is intended to be attacked and compromised to
gain more information about the attacker and the used tools. It can also be deployed to attract and divert an
attacker from their real targets. Honeypots is an additional layer of security. Honeypots have the big advantage that
they do not generate false alerts as each observed traffic is suspicious, because no productive components are
running on the system. The levels of interaction determines the amount of functionality a honeypots provides that
is low and high interactions.
Smart systems aimed at detecting the fall of a person have increased significantly due to recent technological
advances and availability of modular electronics. This work presents the use of em-bedded accelerometer and gyroscope in mobile
phones to accurately detect and classify the type of fall a person is experiencing before suffering an impact. Early classification of
fall type helps in optimizing the algorithm of the fall detection. User acceptance, feasibility and the limitations in the accuracy of
the existing devices have also been considered in this study. High efficiency and low power approaches were emphasized with
wireless capability that enhanced the system per-formance for variety of applications. There is a need of reducing the time for
analyzing the smart algorithms designed. It is also emphasized that this application will be a good platform that can be used to test
various algorithms and multiple sensors at a time with ease and obtain data analysis in a short period
More from IJET - International Journal of Engineering and Techniques (20)
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Recycled Concrete Aggregate in Construction Part III
verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage
1. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE-
BASED ENCRYPTION SCHEME FOR CLOUD STORAGE
Dr.E.Punarselvam1
,Mr.M.Dhamodaran2
, M.Saravanan3
, S.Sasidharan3
,
S.Sreedhar3
, K.Vignesh3
E-Mail:1.hod.it@mec.edu.in,punarselvam83@gmail.com,2.dhamodaran.m.it@mec.edu.in
1. Head of the department, 2.Assistant Professor, 3.Final Year student
Department of Information Technology, Muthayammal Engineering College, Tamilnadu.
ABSTRACT
The success of the cloud computing paradigm is due to its on-demand, self-service, and
pay-by-use nature. Public key encryption with keyword search applies only to the certain
circumstances that keyword cipher text can only be retrieved by a specific user and only supports
single-keyword matching. In the existing searchable encryption schemes, either the
communication mode is one-to-one, or only single-keyword search is supported. This paper
proposes a searchable encryption that is based on attributes and supports multi-keyword search.
Searchable encryption is a primitive, which not only protects data privacy of data owners but
also enables data users to search over the encrypted data. Most existing searchable encryption
schemes are in the single-user setting. There are only few schemes in the multiple data users
setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend
on a trusted third party with interactive search protocols or need cumbersome key management.
To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption
to enable attribute-based keyword search (ABKS).
KEYWORDS: Public Key, Encryption Schemes, ABKS,Data Sharing.
2. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
1. INTRODUCTION
With the development of cloud
computing, many of information can be
shared through computer networks. The
cloud server (CS) can provide users with a
variety of services, such as outsourcing
commission calculations and data storage.
Users can store their large amounts of data
to the CS and share data with other users.
For the purpose of the security of storage
data and user’s privacy, data is usually
stored in encrypted form in CS. However,
under this environment users will encounter
a difficulty problem of how to search
keyword in cipher text. Searchable
Encryption (SE) is a cryptographic
technology that has been developed for
many years, which supports users’ keyword
search in cipher text. In the meanwhile, it
can save a lot of network and computational
overhead for user, and take advantage of the
huge computing power of CS. The SE
technology mainly solves the problem of
how to use the server to complete the search
for interesting keywords when the data is
encrypted and stored in CS, but CS is not
completely trusted. How to improve the
efficiency of keyword search while reducing
local computing load is still a problem to be
solved. Most of existing schemes support
single-keyword search. Single-keyword
search waste network bandwidth and
computing resources, as this search method
returns a large number of results, this means
that the search result is not accurate. That is,
when a data user uses multi- keyword
search, the cloud sever will return relatively
few number of files containing these
multikeyword, thus the search result is much
more accurate than when a data user uses
one keyword search. In order to solve this
problem, multi-keyword search is proposed.
Most of existing attribute-based encryption
(ABE) schemes have high computational
costs at user client. These problems greatly
limit the applications of ABE schemes in
practice.
Specifically, our scheme supports
three functions: (1) multiple keyword
searches; (2) full outsourcing; (3)
verifiability of outsourced private keys.
Therefore, by changing some specific
constructions of the algorithm, the three
main advantages of our scheme can be
extended to the general attribute-based
encryption scheme (such as the encryption
scheme without considering the local
computing burden, or the encryption scheme
lacking the cipher text search). Achieve the
ability to reduce local computing storage
and accurately search cipher text.
3. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
Cloud computing is the use of
computing resources (hardware and
software) that are delivered as a service over
a network (typically the Internet). The name
comes from the common use of a cloud-
shaped symbol as an abstraction for the
complex infrastructure it contains in system
diagrams. Cloud computing entrusts remote
services with a user's data, software and
computation. Cloud computing consists of
hardware and software resources made
available on the Internet as managed third-
party services. These services typically
provide access to advanced software
applications and high-end networks of
server computers.
Figure 1 Structure of cloud computing
Cloud Computing Works
The goal of cloud computing is to
apply traditional supercomputing, or high-
performance computing power, normally
used by military and research facilities, to
perform tens of trillions of computations per
second, in consumer-oriented applications
such as financial portfolios, to deliver
personalized information, to provide data
storage or to power large, immersive
computer games.
The cloud computing uses networks of large
groups of servers typically running low-cost
consumer PC technology with specialized
connections to spread data-processing
chores across them. This
shared IT infrastructure contains large pools
of systems that are linked together.
Often, virtualization techniques are used to
maximize the power of cloud computing.
2.CHARACTERISTICSAND SERVICES
MODELS
The salient characteristics of cloud
computing based on the definitions provided
by the National Institute of Standards and
Terminology (NIST) are outlined below:
On-demand self-service: A
consumer can unilaterally provision
computing capabilities, such as
server time and network storage, as
needed automatically without
requiring human interaction with
each service’s provider.
4. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
Broad network access: Capabilities
are available over the network and
accessed through standard
mechanisms that promote use by
heterogeneous thin or thick client
platforms (e.g., mobile phones,
laptops, and PDAs).
Resource pooling: The provider’s
computing resources are pooled to
serve multiple consumers using a
multi-tenant model, with different
physical and virtual resources
dynamically assigned and reassigned
according to consumer demand.
There is a sense of location-
independence in that the customer
generally has no control or
knowledge over the exact location of
the provided resources but may be
able to specify location at a higher
level of abstraction (e.g., country,
state, or data center). Examples of
resources include storage,
processing, memory, network
bandwidth, and virtual machines.
Rapid elasticity: Capabilities can be
rapidly and elastically provisioned,
in some cases automatically, to
quickly scale out and rapidly
released to quickly scale in. To the
consumer, the capabilities available
for provisioning often appear to be
unlimited and can be purchased in
any quantity at any time.
Measured service: Cloud systems
automatically control and optimize
resource use by leveraging a
metering capability at some level of
abstraction appropriate to the type of
service (e.g., storage, processing,
bandwidth, and active user
accounts). Resource usage can be
managed, controlled, and reported
providing transparency for both the
provider and consumer of the
utilized service.
3. SERVICES MODELS
Cloud Computing comprises three
different service models, namely
Infrastructure-as-a-Service (IaaS), Platform-
as-a-Service (PaaS), and Software-as-a-
Service (SaaS). The three service models or
layer are completed by an end user layer that
encapsulates the end user perspective on
cloud services. The model is shown in figure
below. If a cloud user accesses services on
the infrastructure layer, for instance, she can
run her own applications on the resources of
a cloud infrastructure and remain
responsible for the support, maintenance,
and security of these applications herself. If
5. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
she accesses a service on the application
layer, these tasks are normally taken care of
by the cloud service provider.
4.EXISTING SYSTEM
Public Key Encryption (PKE), the
privacy required by means of the patients
could stand ensured. Up in conformity with
now, much cryptographic encryptions
strategies bear been proposed after fulfill the
necessities about privacy- retaining in
tremendous records storage. However, near
encryption strategies such as like the masses
key encryption are no longer anonymous,
i.e., salvo the adversaries reap the cipher
texts, that may effortlessly be aware of the
owner regarding the cipher text as like
nicely as whoever desire get hold of the
cipher text. The PKE can't acquire the
anonymity concerning the customer’s ship
then get hold of the cipher text, hence
private facts may additionally remain
leaked. If an opposite is capable after
achieve the cipher text, that perform
recognize whose solution the cipher textual
content is encrypted under, accordingly
understanding the proprietor of the cipher
text.
4.1 DISADVANTAGES
Encryption strategies such so the
populace authorization encryption
are not anonymous.
The adversaries reap the cipher texts,
he do without problems are aware of
the proprietor regarding the cipher
text so nicely as whomever intention
gets hold of the cipher text.
They might also will according part
records only including receivers who
have certain attributes. Data carriers
then receivers hold to affirm the truth
concerning each lousy according to
redact sure that data or the identity
won’t keep leaked out.
The attributes additionally need
according to keep protected.
5. PROPOSED SYSTEM
This proposes a searchable
encryption that is based on attributes and
supports multi-keyword search. Searchable
encryption is a primitive, which not only
protects data privacy of data owners but also
enables data users to search over the
encrypted data. Most existing searchable
encryption schemes are in the single-user
setting. There are only few schemes in the
multiple data users setting, i.e., encrypted
data sharing. Among these schemes, most of
6. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
the early techniques depend on a trusted
third party with interactive search protocols
or need cumbersome key management. To
remedy the defects, the most recent
approaches borrow ideas from attribute-
based encryption to enable attribute-based
keyword search (ABKS).
5.1ADVANTAGES
First proposed the notion about the
privacy about the keys is high
secure.
The most recent approaches borrow
ideas from attribute-based encryption
to enable attribute-based keyword
search (ABKS).
Achieving attributes authentication
earlier than re-encryption, or
ensuring the protection over the
attributes and data.
Receivers whoever are certified in
imitation of know the information do
use their keys in conformity with
decrypt the cipher text, however
others cannot, consequently data
providers’ privations be able stand
protected.
To perfect the current PRE system
considered the scenario to that
amount information companies may
additionally need the records to stay
conditionally shared. That capability
receiver just gains a quantity on the
facts as an alternative on the whole.
Such deference is greater close in
imitation of the reality.
6.METHODOLOGYS
• Attribute Authority
• Cloud Server
• Key Generation Server
• Data Owner
• Data User
Attribute Authority (AA)
The AA is attribute authority, which
is responsible for system's initial
establishment and the local secret key
generation of data user. Simultaneously, it
distributes corresponding secret key
according to attribute set for data user.
When an attribute is revoked, AA generates
an update key and completes partial secret
key update.
Cloud Server (CS)
The CS stores cipher text which
containing encrypted files and keyword
indexes generated by data owners.
Afterwards, when a data user tends to search
cipher text, CS completes a matching of data
user's token and keyword index. If matching
7. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
succeeds, it sends cipher text to data user.
Additionally, in attribute revocation phase,
CS is responsible for updating cipher text.
Key Generation Server (KGS)
The KGS generates data user's
partial secret key, namely outsourced secret
key, which effectively reduces the
computational burden of AA. Besides, KGS
is responsible for completing the update of
outsourced secret key when attribute
revocation happens.
Data Owner (DO)
The DO encrypts keyword set and
file to be shared, uploads cipher text to
cloud server. Only attribute set of data user
who wants to access data satisfies access
structure in cipher text. The encrypted data
will be shared with data user. To be specific,
the encryption operation to be completed by
DO includes: the keyword index generation,
the file encryption, and the encryption of
key for encrypted file, hence cipher text
consists of three parts.
Data User (DU)
When data user's attribute set
satisfies access structure in cipher text, then
data user DU is able to access encrypted
data and recover original plaintext.
Specifically, DU generates desired keyword
token and sends to cloud server CS, the CS
makes a matching between search token and
keyword index, if matching succeeds, DU
can download corresponding cipher text. In
other words, DU is responsible for
generating keyword token which he is
interested in and decrypting cipher text.
7. CONCLUSION
In this article we proposed VMKS-
ABE scheme. In our scheme, we combine
the verifiable of the correctness of
outsourced private key with multi-keyword
search based on attribute encryption. In the
general group model, the security of
keyword index is proved. Under the random
oracle model, the cipher text is proved to be
selectively secure. In this article we
proposed VMKS-ABE scheme. In our
scheme, we combine the verifiable of the
correctness of outsourced private key with
multi-keyword search based on attribute
encryption. In the general group model, the
security Since the security in the general
group model is much weak than in the
standard model, it is worth constructing
verifiable and multi-keyword searchable
scheme in the standard model.
8. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
8. FUTURE ENHANCEMENTS
The verifiable of the correctness of
outsourced private key with multi-keyword
search based on attribute encryption. In the
general group model, the security of
keyword index is proved. Under the random
oracle model, the cipher text is proved to be
selectively secure.
9.REFERENCES
[1] M. C. Mont, K. McCorry, N.
Papanikolaou, and S. Pearson, “Security and
privacy governance in cloud computing via
SLAS and a policy orchestration service,” in
Proc. 2nd Int. Conf. Cloud Comput. Serv.
Sci., 2012, pp. 670–674.
[2] E.Punarselvam,“Bio-Medical Analysis of
lumbar spine image using Gobar filter and
canny edge detection algorithm of MRI”,
International Journal of Research in
computer applications and Robotics,Vol.1
Issue No.8 Nov 2013 PP(42-50)
ISSN:2320-7345.
[3] C. Metz. (2009, Oct.).DDoS attack rains
down on Amazon Cloud [Online].
Available:
http://www.theregister.co.uk/2009/10/05/am
azon_bitbucket_outage/S
[4] K. Lu, D. Wu, J. Fan, S. Todorovic, and
A. Nucci, “Robust and efficient detection of
DDoS attacks for large-scale internet,”
Comput.Netw., vol. 51, no. 18, pp. 5036–
5056, 2007.
[5] E.Punarselvam,”Comparative analysis of
Bio-CAD Technique and Canny Edge
detection Algorithm for Lumbar spine
images using Finite Element Method”,
International Journal of Engineering
Research and Management, Vol. 1 Issue
No.8 November 2014 PP(165-168)
ISSN:2349-2058..
[6] J. Li, Q.Wang,C.Wang,N. Cao,K. Ren,
and W. Lou, "Fuzzy keyword search over
encrypted data in cloud computing,"
International Journal of Engineering
Research and Applications, vol. 4, no. 7, pp.
441-445, May 2014, doi:
10.1109/INFCOM.2010.5462196.
[7] W. Sun, S. Yu, W. Lou, Y. Hou, and H.
Li, "Protecting Your Right: Verifiable
Attribute-BasedKeywordSearchwith Fine-
Grained Owner- Enforced Search
Authorization in the Cloud," IEEE
INFOCOM, vol. 27, no. 4, pp. 226-234, Jul.
2014, doi:
10.1109/INFOCOM.2014.6847943.
9. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
[8] Dr.E.Punarselvam,“Robust Data
Collection with Multiple Sink Zone In 3-D
Underwater Sensor Networks”, in
International Journal on Applications in
Basic and Applied Sciences, vol. 5, Issue
no. 1, December 2019,PP 8-14.ISSN 2455 –
1007
[9] Y. Ye, J. Han,W. Susilo, T. H. Yuen,
and J. Li, "ABKS-CSC: attributebased
keyword search with constant-size
ciphertexts," Security & Communication
Networks, vol. 9, no. 18, pp. 5003-5015,
Oct. 2016, doi: org/10.1002/sec.1671.
[10] Dr.E.Punarselvam,“Effective and
Efficient Traffic Scrutiny in Sweet Server
with Data Privacy”, International Journal on
Applications in Information and
Communication Engineering Volume 5 :
Issue 2: November 2019, PP 1 – 5
[11] A. Sahai and B. Waters, "Fuzzy
identity-based encryption," In Advances in
Cryptology – EUROCRYPT, Cramer R.
Eds. Berlin, Germany: Springer, 2005, pp.
457-473.
[12] V. Goyal, O. Pandey, A. Sahai, and B.
Waters, "Attribute -based encryption for
fine-grained access control of encrypted
data," in Proc. 13th ACM Conf. Comput.
Commun.Secur.(CCS), New York, NY,
USA: ACM, 2006, pp. 89-98.
[13] E.Punarselvam, “Privacy and Secured
Multiparty Data Categorization using Cloud
Resources”, International Journal of
Innovative Research in Science, Engineering
and Technology, ISSN(Online) : 2319 –
8753,ISSN (Print) : 2347-6710 Vol. 4,
Special Issue 6,May 2015,pp 336-343 [14]
B. Waters, "Ciphertext-Policy Attribute-
Based Encryption: An Expressive, Efficient,
and Provably Secure Realization," In Public
Key Cryptography – PKC, D. Catalano, N.
Fazio, R. Gennaro, A. Nicolosi Eds. Berlin,
Germany: Springer, 2011, pp. 53-70.
[15] Dr.E.Punarselvam,“Heart Attack
Recognition and Heart Rate Monitoring
System Using IOT”,in International Journal
on Applications in Engineering and
Technology, Vol. 5, Issue no.
2, December 2019,PP.5-10.ISSN 2455 -
0523