A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vimala, M.
- Voltage Stability Improvement in a Weak Distribution System by Integrating the Wind Power Using UPQC
Authors
1 Adhiyamaan College of Engineering, Hosur, Tamil Nadu 635 109, IN
2 Adhiyamaan College of Engineering, Hosur, Tamil Nadu 635109, IN
3 Department of EEE, Adhiyamaan College of Engineering, Hosur, Tamil Nadu 635 109, IN
Source
Programmable Device Circuits and Systems, Vol 3, No 4 (2011), Pagination: 225-229Abstract
At present, it is very common to find renewable energy resources, especially wind power, connected to distribution systems, but this also bring new integration related power quality issues, which mainly consist of voltage regulation and reactive power compensation. Induction machines are used in wind power based generations. Induction generators draw reactive power from the system. Therefore, voltage control and reactive power compensation in a weak distribution networks for integration of wind power represent main concern of this paper. The problem is viewed from MATLAB/Simulink simulation of weak distribution network and wind power integration. UPQC is used at a point of interconnection of wind farm and the network; the system absorbs the generated wind power while maintaining its voltage level. UPQC is one of the best devices which are used for power quality improvement in power networks. The UPQC, which has two inverters that share one DC link capacitor, can compensate the power flow and improve the voltage stability.Keywords
UPQC, Voltage Regulation, Wind Energy, MATLAP.- A Survey on Data Security Mechanism for Cloud Storage System
Authors
1 Dept. of Computer Science, KPR Institute of Engineering and Technology, Coimbatore-6411407, TN, IN
Source
Indian Journal of Innovations and Developments, Vol 5, No 9 (2016), Pagination: 1-4Abstract
Objectives: To analysis various mechanisms to improve the security of cloud storage system.
Methods: The methods such as unidirectional proxy re-encryption schemes, Identity-Based Proxy Re-Encryption system, third party auditor scheme, NCCloud, certificate based signature scheme and two-factor data security protection mechanism are analyzed in this paper.
Findings: In this paper various cloud storage data security protection techniques are compared through their merits and demerits of the technique to prove two-factor data security protection is better than other techniques. Encryption is the most effective technique to transmit the sensitive data in cloud environment. The findings of this work prove that the two-factor data security protection mechanism provides better result than other approaches.
Keywords
Cloud Storage System, Cloud Security, Cloud Protection, Two-Factor Data Security Protection.References
- H. Ziglari, S. Yahya. Deployment models: Enhancing security in cloud computing environment. In: 2016 22nd Asia-Pacific Conference on Communications (APCC), IEEE. 2016; 204-209.
- F. F. Moghaddam, M. B. Rohani, M. Ahmadi, T. Khodadadi, K. Madadipouya. Cloud computing: Vision, architecture and Characteristics. In: 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC), IEEE. 2015; 1-6.
- X. Wu, M. C. Wang, W. Zhang, Y. Guo. Cloud program with a pricing strategy for IaaS in cloud computing. In Parallel and Distributed Processing Symposium Workshops & Ph.D. Forum (IPDPSW), 2012 IEEE 26th International, IEEE. 2012; 2316-2319.
- Y. Jinzhou, H. Jin, Z. Kai, W. Zhijun. Discussion on private cloud PaaS construction of large scale enterprise. In: 2016 IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), IEEE. 2016; pp. 273-278.
- X. Cao, L. Xu, Y. Zhang, W. Wu. Identity-based proxy signature for cloud service in saas. In: 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE. 2012; 594-599.
- L. Ferretti, M. Colajanni, M. Marchetti. Distributed, concurrent, and independent access to encrypted cloud databases. IEEE transactions on parallel and distributed systems, 2014; 25(2), 437-446.
- B. Libert, D. Vergnaud. Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Transactions on Information Theory. 2011; 57(3), 1786-1802.
- J. H. Seo, K. Emura. Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Cryptographers’ Track at the RSA Conference. Springer Berlin Heidelberg. 2013; 343-358.
- R. R. Pavithra, V. R. Nagarajan. A survey on certificate revocation scheme using various approaches. Indian Journal of Innovations and Developments. 2016; 5(5), 1-3.
- K. Liang, Z. Liu, X. Tan, D. S. Wong, C. Tang. A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: International Conference on Information Security and Cryptology. Springer Berlin Heidelberg. 2012; 231-246.
- H. Guo, Z. Zhang, J. Zhang, C. Chen. Towards a secure certificateless proxy re-encryption scheme. In: International Conference on Provable Security. Springer Berlin Heidelberg. 2013; 8209, 330-346.
- J. Shao, Z. Cao. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences, 2012; 206, 83-95.
- C.K. Chu, S.S. Chow, W.G. Tzeng, J. Zhou, R.H. Deng. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems. 2014; 25(2), 468-477.
- C. Wang, S.S. Chow, Q. Wang, K. Ren, W. Lou. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on computers. 2013; 62(2), 362-375.
- H.C. Chen, Y. Hu, P.P. Lee, Y. Tang. NCCloud: a network-coding-based storage system in a cloud-of-clouds. IEEE Transactions on Computers, 2014; 63(1), 31-44.
- J.K. Liu, F. Bao, J. Zhou. Short and efficient certificate-based signature. In: International Conference on Research in Networking. Springer Berlin Heidelberg. 2011; 167-178.
- A. Sahai, H. Seyalioglu, B. Waters. Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology–CRYPTO 2012. Springer Berlin Heidelberg. 2012; 199-217.
- J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang. Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Transactions on Computers, 2016; 65(6), 1992-2004.