Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Padmakumari, P.
- Location as Attribute and Re-Encryption-Based Secure and Scalable Mechanism for Mobile based Applications in Cloud
Abstract Views :176 |
PDF Views:0
Authors
Chavali Sai Koushik
1,
Koripelli Rohith Reddy
1,
Yeradoddi Rohith Reddy
1,
P. Padmakumari
1,
A. i Umamakeswar
1
Affiliations
1 Department of CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 Department of CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 12 (2015), Pagination:Abstract
When outsourcing the data on to public cloud by data owner from mobile devices which are resource constrained a secure method of encryption model has to be used. As the mobile devices are resource constrained a trusted model is been deployed as an intermediate between mobile user and cloud service provider. The trusted model takes care of securely encrypting, Re-encrypting (upon the criticality of data) the data and uploading on to the cloud and then providing the data to the authenticated user upon his request. Different type of encryption techniques provide security for the data. The choice of encryption technique is made by comparative analysis between different attribute based encryption techniques like Cipher Policy based Encryption (CP-ABE), Location as a attribute encryption key policy based Encryption (KP-ABE). It is found to be the best to provide the required level of security for data outsourcing. The parameters that play a significant role in this technique is obtaining the current latitude and longitude position of the user who want to access the data. If the user is in authenticated location then access can be granted for the data. For this an android application has been developed and a trusted model with data base for storing the data, Re-encrypted data and secure keys for data security. The algorithm used for encrypting the data is RSA algorithm which is a public key encryption technique. If user wants to retrieve his data which is uploaded onto cloud he sends the filename to trusted model and he downloads the encrypted text from cloud, runs decryption algorithm and sends user data to user. If any exceptional case where user tries to access other user’s data trusted model simply sends an error message to user who is trying to hack the data and trusted model intimates data owner regarding data hack and Mac-Id of device who is trying to hack. So we can confirm that data encryption is done based on Mac-Id of device.Keywords
Cloud Computing, Cryptography, Mobile Computing, Scalability, Security- Psychotherapy for Character Strength Development
Abstract Views :242 |
PDF Views:1
Authors
Dolly Jose
1,
P. Padmakumari
2
Affiliations
1 Department of Psychology, Christ University, Bangalore, IN
2 Department of Psychology, Christ University, Bangalore, Karnataka, IN
1 Department of Psychology, Christ University, Bangalore, IN
2 Department of Psychology, Christ University, Bangalore, Karnataka, IN
Source
Indian Journal of Positive Psychology, Vol 7, No 1 (2016), Pagination: 119-123Abstract
Psychotherapy is a clinical tool which deals with problems while character strength development therapy is a pedagogical tool which deals with the mystery of the person. The goal of character strength development therapy is to help the person to internalise the 24 character strengths defined by Seligman and Peterson (2004). The techniques used in character strength development therapy are attentive listening, clarification, confrontation, interpretation and working through. In character strength development therapy the process includes that recreate a situation whereby the person can reread the life experiences, reinterpret it and 'working through' the new insights. In the initial phase, an assessment, which helps both client and therapist to prepare a frame work for character strength development therapy, has to be done. The goal of middle phase is to provide deep insight and understanding on their strength use, help them to realise the unrealised strengths and maximise it, and thus moderate the use of learned inappropriate behaviours as well as learn to handle cautiously the weaknesses. The present paper provides a conceptual frame work for character strength development therapy.Keywords
Character Strengths, Human Mystery, Psychotherapy, Genetic-Pedagogic-Transcendental Method.- Methodical Review on Various Fault Tolerant and Monitoring Mechanisms to improve Reliability on Cloud Environment
Abstract Views :232 |
PDF Views:0
Authors
Affiliations
1 CSE, School of Computing, SASTRA University,Thanjavur - 613401,Tamilnadu, IN
1 CSE, School of Computing, SASTRA University,Thanjavur - 613401,Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Background/Objectives: Cloud computing is an emerging area that is currently pulling towards many of us. Cloud deployment is a difficult task in this layered structure. Handling the cloud environment itself an optimally a challenging job. This can be made feasible by using fault tolerance and monitoring services. Methods/Statistical Analysis: Fault Tolerance (FT) facilitates the process or the component to work smoothly even though in the occurrence of failure. Monitoring is a technique collects the information and to predict the fault before it occurs. Proactive and reactive measures can take place to run the cloud environment with tolerance in failure occurrence. Reviewing the potential of FT and monitoring services is to make out the technique that serves in certain purpose. Fault tolerance systems are important for both cloud provider and cloud customer. Findings: Based on this idea, this paper provides the different or diverse fault tolerance and monitoring mechanism to improve the reliability in a cloud environment. Applications/Improvements: It presents the information about the various techniques and methods used in the FT and also a future research direction in cloud FT.Keywords
Cloud Computing, Fault Tolerance, Reactive and Proactive, Reliability- Evaluation of Seed Mucilage of Hibiscus Sabdariffa Linn as Tablet Binder
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Malla Reddy Institute of Pharmaceutical Sciences, Department of Pharmaceutics, JNTU University, Mysammaguda, Andhra Pradesh, IN
2 Malla Reddy Institute of Pharmaceutical Sciences, Andhra Pradesh, IN
3 CMR College of Pharmacy, Andhra Pradesh, IN
1 Malla Reddy Institute of Pharmaceutical Sciences, Department of Pharmaceutics, JNTU University, Mysammaguda, Andhra Pradesh, IN
2 Malla Reddy Institute of Pharmaceutical Sciences, Andhra Pradesh, IN
3 CMR College of Pharmacy, Andhra Pradesh, IN
Source
Research Journal of Pharmaceutical Dosage Form and Technology, Vol 2, No 6 (2010), Pagination: 381-383Abstract
The aim of present study is to evaluate the mucilage of Hibiscus sabdariffa seeds as tablet binder using Diclofenac sodium as standard drug .To the best of our knowledge no significant work has been reported on seed mucilage as tablet binder. Physicochemical characteristics of mucilage were studied which confirmed the mucilage nature. The tablets were prepared by wet granulation technique using mucilage as tablet binder. The prepared tablets were evaluated for their granulating and binding properties. The tablets exhibited good uniformity and drug release was more than 85% in 90 min. Tablet's hardness and disintegration time was increased with increasing binder concentration and friability values were decreased with increase in binder concentration. All these confirm the use of Hibiscus sabdariffa as binder in tablet formulation.Keywords
Hibiscus sabdariffa, Mucilage, Binder.- Intrusion Detection and Prevention using Lockout policy with ACL on Cloud Computing
Abstract Views :153 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Background/Objectives: Cloud computing supports many enterprise and government organizations in business perspective due to its advantage such as high scalability and high flexibility. However, despite potential gains that can be achieved, security is fundamental issue. Denial of service attack attempted by attacker to exhausts the resources available to a network, application or service. The orchestrated flow of attack patterns by attacker affect the customers in terms of financial cost cause service inability to legitimate users, attacker overloads target system with massive amount of request, which results in loss of equipment resources affecting network bandwidth. Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users. Findings: The proposed technique helps in differentiating legitimate and illegitimate users. The attack can be controlled by locking out malicious user access. Thereby the financial cost can be controlled by preventing the resource consumption by malicious node. Applications The proposed methodology can be applied in signature based analysis and strong user identification. There by providing security by building Anti-spam devices at customer site such as E-commerce application. Applications: The proposed methodology can be applied in the signature based analysis and strong user identification. Thus providing security by building Anti-spam devices at customer site, such as in an e-commerce application.Keywords
Access Control List, Attack Pattern, DDoS, DoS, Lockout Policy, Service Inability.- Evaluation of Antibacterial, Analgesic and Antipyretic Activity of Leucas aspera Spreng
Abstract Views :168 |
PDF Views:0
Authors
Affiliations
1 Malla Reddy Institute of Pharmaceutical Sciences, Secunderabad, Andhra Pradesh, IN
1 Malla Reddy Institute of Pharmaceutical Sciences, Secunderabad, Andhra Pradesh, IN
Source
Research Journal of Pharmacognosy and Phytochemistry, Vol 4, No 3 (2012), Pagination: 186-190Abstract
Aim of the present study is to investigate preliminary phyto-chemical screening and to evaluate plant extracts for analgesic, antipyretic and antimicrobial activities of different parts of Leucas aspera spreng by standard experimental methods which include anti-writhing method for analgesic activity, cup-plate diffusion method for antimicrobial activity and baker's yeast induced pyrexia method for antipyretic activity. Different parts of the plant like bud, ischolar_main, leaf, and stem were selected and extracted by cold maceration for 72 hrs. by using ethyl acetate and methanol as solvents. All crude extracts were used for preliminary phyto chemical screening. Ethyl acetate extracts were found be positive for alkaloids, glycosides, steroids, carbohydrates and terpenes. Methonolic extracts were found to be positive for alkaloids, glycosides, carbohydrates and terpenes and negative for steroids, flavonoids. In antimicrobial study all crude extract were found to be active against tested organisms. Ethyl acetate extracts were active against Gram-negative bacteria. Methonolic extracts were active against Grampositive bacteria .Among all the parts bud has maximum anti-bacterial activity followed by ischolar_main, leaf, stem .In analgesic activity ethyl acetate extracts of bud produce significant inhibition in acetic acid induced writhing's in mice at the dose of 100mg/kg and 200mg/kg. The same ethyl acetate extracts also showed significant antipyretic activity than methonolic extracts. These results suggest conformation of its traditional uses (antimicrobial, analgesic as well as antipyretic activities) of a plant and among different parts of plant bud has shown maximum activity.Keywords
Leucas aspera, Cup-Plate Method, Writhing Method, Brewer’s Induced Pyrexia Method.- Energy Aware Fault Tolerant Clustering and Routing Mechanism for Wireless Sensor Networks
Abstract Views :127 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: The key constructions of Wireless Sensor Networks (WSN) are energy conservation and battery depletion of the sensor nodes which are restricted and irreplaceable. Designing an economical clustering and routing mechanism ought to incorporate these problems for large scale WSN. Methods: “Energy Aware Fault Tolerant Clustering and Routing Mechanism” is proposed in this work for efficient clustering and fault-tolerant routing. The main idea behind this mechanism is to spot a node which lies in next position to cluster head in terms of energy and configuring it to sleep mode. Findings: This is chiefly done to realize fault tolerance by activating the node in sleep mode during the failure of the cluster head. Intensive experiments were performed on this technique and the results are compared with the previous algorithms. Applications/Improvements: Energy-Aware Fault Tolerant techniques are effectively used in applications of WSN like army reconnaissance, environmental monitoring etc.Keywords
Base Station (BS), Cluster Head (CH), Fault Tolerance, Wireless Sensor Networks (WSN).- Hybrid Fault Tolerant Scheme to Manage VM Failure in the Cloud
Abstract Views :140 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN