A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Anbumani, P.
- Secured Cloud Based Healthcare System for Transformation Infrastructure
Authors
Source
Networking and Communication Engineering, Vol 8, No 6 (2016), Pagination: 207-212Abstract
The use of Cloud Computing in healthcare system increased rapidly because it reduces the cost and accessibility of data. The major factor in the cloud environment is to ensure the security of data in healthcare system. The healthcare system uses cloud computing, as an user often stores sensitive information and classified medical data with cloud service providers. Dealing with “single-cloud” is far more vulnerable to failure of service unavailability. Storing the data in single-cloud, there is a possibility of malicious insiders. So due to this reason it is less popular in healthcare, as medical healthcare systems needs security. For security concern an advanced model is “multi-cloud”. This paper provides insecurity in single-cloud has received more focus from researchers in terms of security vulnerabilities rather than a multi- cloud environment.
Keywords
Byzantine Protocols, Depsky, Multi-Clouds, Secret Sharing Scheme.- Data Dissemination in Mobile Computing
Authors
1 Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 8, No 10 (2016), Pagination: 331-335Abstract
The use of mobile computing has made reality in advance in wireless communication technology with the help of powerful and portable computers. The mobile computing has been used in many applications including data management also. The challenges that are faced in mobile computing are prototyping, bandwidth utilization, transactional properties, data visualization and optimization of location dependent query processing. In data consistency and data dissemination they data can be processed with mobile clients. For mobile computing environment, various components such as mobile and stationary can be used in it. The following issues used in mobile computing, such as mobility issues, portability issues and security issues. For the past few years, there will be a research in the area of data management in mobile computing. This research can develop in many areas such as data dissemination for bandwidth with limited channels, querying of data for location-dependent and new trendy interface with mobile computers.Keywords
Challenges, Data Consistency, Data Dissemination, Issues, Mobile Computing Environment.- A Traceback Attack OnFreenet
Authors
Source
Networking and Communication Engineering, Vol 10, No 6 (2018), Pagination: 113-116Abstract
Freenet is a popular anonymous peer-to-peer content exchange network, with the goal of providing the anonymity of content editors and retrievers. Despite over a decade of active development and implementation and the adoption of cryptographic algorithms consolidated on Freenet, the degree of anonymity of Freenet initial project remains unanswered. The tracking attack exploited some fine-grained development and design decisions made on Freenet, including the unique identifier-based mechanism (UID) to circumvent the routing loops of the content request message. Develop a traceback attack on Freenet and show that it is possible to identify the source machine of a content request message on Freenet; that is, the anonymity of a content retriever can be broken, even if the retriever has issued a single request message. In this paper present the design of the tracking attack and conducted experimental and simulation studies to confirm the feasibility and effectiveness of the attack.