Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saravanan, M.
- Strengthening Encryption Secrecy for Private Search Using Fully Homomorphic Encryption
Abstract Views :224 |
PDF Views:1
Authors
J. Ramya
1,
M. Saravanan
2
Affiliations
1 Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, IN
2 Department of Computer Science and Engineering, Sri Ramakrishna College of Engineering, IN
1 Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, IN
2 Department of Computer Science and Engineering, Sri Ramakrishna College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 7, No 1 (2016), Pagination: 1255-1260Abstract
A system for private searching on streaming data, allows client to send the encrypted search query to the remote server. The server uses the encrypted query on a stream of documents and returns the matching documents to the client without revealing the features of the query. A novel technique for private searching on streaming data is proposed which is based on keyword frequency that is the number of times that a keyword appears in the document is required to be higher or lower than a given threshold. This form of query searching can help the client in locating more related documents. Using fully homomorphic encryption techniques, the server can perform search for retrieving the related documents even though the search query is in encrypted form. Our scheme provides number of vital benefits for the client. They provide provable secrecy for encryption, in the view that the untrusted server cannot gather any information about the plaintext. They also reinforce hidden queries, so that the client may ask the remote server to search for a secret word without revealing the word to the server.Keywords
Homomorphic Encryption, Private Searching on Streaming Data, Trusted Security, Query Search, Efficient Retrieval.- Energy Efficient and Secure Data Transmission using Cooperative Routing in Networks
Abstract Views :180 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, IN
2 Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, IN
3 Department of Computer Science Engineering, Balaji Institute of Technology and Science, IN
1 Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, IN
2 Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, IN
3 Department of Computer Science Engineering, Balaji Institute of Technology and Science, IN
Source
ICTACT Journal on Communication Technology, Vol 11, No 1 (2020), Pagination: 2115-2120Abstract
Wireless Sensor Networks (WSNs) are emerging as a promising technology because of their wide range of applications in industrial, environmental monitoring, military and civilian domains. Due to economic considerations, the nodes are usually simple and low cost. They are often unattended, however, and are hence likely to suffer from different types of novel attack. WSNs are increasingly being deployed in security-critical applications. Due to their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. In this paper, using the recent advances in uncertain reasoning that has originated from the artificial intelligence community, we propose a trust management scheme named Hybrid and Efficient Intrusion Detection Systems that enhances the security in networks. Here, we have used two frameworks for Trust Calculation and Decision Making process. The trust value is derived using Bayesian Inference, and Decision Making is based on Dempster-Shafer theory, which is a mathematical theory of evidence.Keywords
WSN, Dempster-Shafer Theory, Intrusion Detection System, Artificial Intelligence.References
- S. Shakkottai, X. Liu and R. Srikant, “The Multicast Capacity of Large Multihop Wireless Networks”, IEEE/ACM Transactions on Networking, Vol. 18, No. 5, pp. 1691-1700, 2010.
- Z. Qian, X. Tian, X. Chen, W. Huang and X. Wang, “Multicast Capacity in MANET with Infrastructure Support”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 7, pp. 1808-1818, 2014.
- Z. Li, C. Wang, C. Jiang and X. Li, “Multicast Capacity Scaling for Inhomogeneous Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 11, No. 1, pp. 29-38, 2013.
- S. Zhou and L. Ying, “On Delay Constrained Multicast Capacity of Largescale Mobile Ad-Hoc Networks”, Proceedings of International Conference on Communications and Networks, pp. 1-7, 2010.
- J.P. Jeong, T. He and D.H.C. Du, “TMA: Trajectory-based Multicast Forwarding for Efficient Multicast Data Delivery in Vehicular Networks”, Computer Networks, Vol. 57, No. 13, pp. 662-672, 2013.
- X. Ge, J. Yang, H. Gharavi and Y. Sun, “Energy Efficiency Challenges of 5G Small Cell Networks”, IEEE Communications Magazine, Vol. 55, No. 5, pp. 184-191, 2017.
- T. Han, X. Ge, L. Wang, K.S. Kwak, Y. Han and X. Liu, “5G Converged Cell-Less Communications in Smart Cities”, IEEE Communications Magazine, Vol. 55, No. 3, pp. 44-50, 2017.
- X. Ge, S. Tu, G. Mao, C. Wang and T. Han, “5G Ultra-Dense Cellular Networks”, IEEE Wireless Communications, Vol. 23, No. 1, pp. 72-79, 2016.
- Z. Su, Q. Xu, Y. Hui, M. Wen and S. Guo, “A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, Vol. 66, No. 7, pp. 6461-6474, 2016.
- B. Yang, Y. Cai, Y. Chen and X. Jiang, “On the Exact Multicast Delay in Mobile Ad Hoc Networks with F-Cast Relay”, Ad Hoc Networks, Vol. 33, pp. 71-86, 2015.
- X. Wang, W. Huang, S. Wang, J. Zhang and C. Hu, “Delay and Capacity Tradeoff Analysis for Motioncast”, IEEE/ACM Transactions on Networking, Vol. 19, No. 5, pp. 1354-1367, 2011.
- C. Hu, X. Wang and F. Wu, “Motioncast: On the Capacity and Delay Tradeoffs”, Proceedings of 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 18-21, 2009.