Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arockiam, L.
- PBCOPSO: A Parallel Optimization Algorithm for Task Scheduling in Cloud Environment
Abstract Views :250 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, St. Joseph’s College, Trichirapalli - 620002, Tamil Nadu, IN
1 Department of Computer Science, St. Joseph’s College, Trichirapalli - 620002, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 16 (2015), Pagination:Abstract
Objectives: Cloud environment requires scheduling of independent tasks with the available resources to minimize the total execution time and to optimize the resource utilization in cloud environment. Methods: Evolutionary algorithms are widely used to find the suboptimal solution of a problem. This work adopts a parallel approach that considers Bee Colony Optimization (BCO) in parallel with Particle Swarm Optimization (PSO) for cloud task scheduling. The proposed approach is named as Parallel Bee Colony Optimization Particle Swarm Optimization (PBCOPSO). Findings: The results show that the proposed approach minimizes Makespan with optimized resource utilization. It is observed that the proposed method improved resource utilization by an average of 5.0383% when compared with Min-Min algorithm and by an average of 3.7243% when compared with Improved Bee Colony Optimization (IBCO). Novelty of the Study: The proposed hybrid PBCOPSO enables improved search in the solution space due to the parallel execution of BCO and PSO leading to better final solution quality and lower execution time. Conclusion: Thus two metrics namely makespan and resource utilization are evaluated and an optimal task to resource mapping is achieved with hybridization.Keywords
Bee Colony Optimization, Optimization, Particle Swarm Optimization, Resource Utilization, Scheduling- EnBloAES: A Unified Framework to Preserve Confidentiality of Data in Public Cloud Storage
Abstract Views :227 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Karpagam University, Coimbatore - 641021, Tamil Nadu, IN
2 Department of Computer Science, St. Joseph’s College, Tiruchirappalli - 620002,Tamil Nadu, IN
1 Department of Computer Science, Karpagam University, Coimbatore - 641021, Tamil Nadu, IN
2 Department of Computer Science, St. Joseph’s College, Tiruchirappalli - 620002,Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 19 (2015), Pagination:Abstract
Objective: Cloud storage reduces the cost of IT infrastructure for businesses by sharing resources through internet. However, data stored on cloud has security issues and vulnerable to attacks by malicious hackers. The main objective of this paper is to propose a framework to address issues and attacks which compromise the confidentiality of outsourced data. Methods: The significant factor to ensure data security is confidentiality. Data partitioning, shuffling and encryption techniques are taken in this study to preserve confidentiality. Specifically blowfish and AES encryption techniques are modified to have better performance in terms of encryption time, decryption time, overall processing time, throughput and the degree of security. Findings: In the proposed framework, the data is split into multiple chunks and the chunks of data are shuffled. Then the shuffled chunks are encrypted using a hybrid technique which comprises of Enhanced Blowfish (EnBlo) and Enhanced Advanced Encryption Standard (EnAES) in order to provide data confidentiality. It further proposes an efficient retrieval scheme by appropriate decryption and a system to rearrange data chunks in order to get the original data at the client side. Conclusion: This research concludes, the EnBloAES provides extensive data security and adept at retrieval scheme by incorporating data confidentiality.Keywords
Cloud Storage, Confidentiality, Data Outsourcing, Data Partition, Encryption, Shuffling- Confidentiality Technique to Enhance Security of Data in Public Cloud Storage using Data Obfuscation
Abstract Views :215 |
PDF Views:0
Authors
S. Monikandan
1,
L. Arockiam
2
Affiliations
1 Department of MCA, Christhu Raj College, Panjappur, Tiruchirappalli – 620012, Tamil Nadu, IN
2 Departmentof Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620102, Tamil Nadu, IN
1 Department of MCA, Christhu Raj College, Panjappur, Tiruchirappalli – 620012, Tamil Nadu, IN
2 Departmentof Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620102, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 24 (2015), Pagination:Abstract
Security of data stored in the cloud is most important challenge in public cloud environment. Users are outsourced their data to cloud for efficient, reliable and flexible storage. Due the security issues, data are disclosed by Cloud Service Providers (CSP) and others users of cloud. To protect the data from unauthorized disclosure, this paper proposes a confidentiality technique as a Security Service Algorithm (SSA), named MONcryptto secure the data in cloud storage. This proposed confidentiality technique is based on data obfuscation technique. The MONcrypt SSA is availed from Security as a Service (SEaaS). Users could use this security service from SEaaS to secure their data at any time. Simulations were conducted in cloud environment (Amazon EC2) for analysis the security of proposed MONcrypt SSA. A security analysis tool is used for measure the security of proposed and existing obfuscation techniques. MONcrypt compares with existing obfuscation techniques like Base32, Base64 and Hexadecimal Encoding. The proposed technique provides better performance and good security when compared with existing obfuscation techniques. Unlike the existing technique, MONcrypt reduces the size of data being uploaded to the cloud storage.Keywords
Cloud Service Providers, Cloud Storage, Confidentiality, Obfuscation, Security, Security Service Algorithm.- PBUA: A Dynamic User Authentication Mechanism for Secure MobiCloud Environment
Abstract Views :168 |
PDF Views:0
Authors
Affiliations
1 Computer Science, St. Joseph’s College, Trichy - 620002, Tamil Nadu, IN
1 Computer Science, St. Joseph’s College, Trichy - 620002, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 35 (2016), Pagination:Abstract
Objectives: Authenticating the MobiCloud users using traditional passwords, biometrics is prone to shoulder surfing attack and need external device. Pattern Based User Authentication (PBUA) mechanism is introduced to identify and authenticate the users in MobiCloud environment. Methods/ Statistical Analysis: To authenticate the users, the whole process is divided into two phases namely, identification and authentication. Dynamic patterns are generated using random mathematical function to select the patterns from the Identity Management (IdM) Server. Pattern matching operation is done using the hash-based technique to match the image pattern sequences quickly with the actual pattern. Findings: Experimental results show that the proposed PBUA is strong enough against shoulder surfing attack. The time taken for pattern matching is very less when compared to existing pattern matching mechanisms. Application/Improvement: PBUA does not need any intermediate table as the patterns are matched directly with original patterns. The complexity of the algorithm is reduced by , thus the efficiency is improved n2 times. Pattern updation is not required which reduces the user’s burden.Keywords
Authentication, Identity Management, Identification, Mobile Cloud, Pattern Matching.- User Identity based Authentication as a Service (UIDAaaS) for Public Cloud Environment
Abstract Views :148 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620002, Tamil Nadu, IN
1 Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620002, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: In today's Technological World, Information Security is an essential aspect for the internet applications. Cloud computing is an increasing current class of services for any type of users of the internet. Authentication is a major security problem in the cloud system and internet. This paper proposes an Authentication Password Generation (APG) algorithm, Authentication Key Generation (AKG) and Authentication Verification Algorithm (Auth_V) for security in the cloud system. Methods/Statistical Analysis: Authentication is more important among other security parameters such as integrity, confidentiality and privacy. Authentication mechanism includes different cryptography techniques that can be used for securing the data in cloud systems. These proposed three algorithms are used in the authentication process of cloud environment. It executes the ASCII code of each value in the original data. Findings: Proposed APG, AKG and Auth_V authentication algorithms are implemented in .NET and deployed on the windows azures platform of cloud environment. These proposed authentication algorithms easily fit into any type of service in the cloud system. APG is used to create a password which generates the alphabets along the special characters. Application/Improvements: Security is more important in the cloud computing. The proposed APG, AKG and Auth_V algorithms have provided better authentication mechanism to the cloud user. These techniques are suitable for education, healthcare and agriculture based applications to securely access the data in a cloud computing environment.Keywords
Authentication, Authentication Key Generation, Authentication Password Generation, Authentication Verification, Cloud Security, Cryptography.- Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud
Abstract Views :138 |
PDF Views:0
Authors
Affiliations
1 Periyar University, Salem - 636011, Tamil Nadu, IN
2 Computer Science, St. Joseph’s College, Trichy - 620002, Tamil Nadu, IN
1 Periyar University, Salem - 636011, Tamil Nadu, IN
2 Computer Science, St. Joseph’s College, Trichy - 620002, Tamil Nadu, IN