Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Padmakumari, P.
- Location as Attribute and Re-Encryption-Based Secure and Scalable Mechanism for Mobile based Applications in Cloud
Abstract Views :177 |
PDF Views:0
Authors
Chavali Sai Koushik
1,
Koripelli Rohith Reddy
1,
Yeradoddi Rohith Reddy
1,
P. Padmakumari
1,
A. i Umamakeswar
1
Affiliations
1 Department of CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 Department of CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 12 (2015), Pagination:Abstract
When outsourcing the data on to public cloud by data owner from mobile devices which are resource constrained a secure method of encryption model has to be used. As the mobile devices are resource constrained a trusted model is been deployed as an intermediate between mobile user and cloud service provider. The trusted model takes care of securely encrypting, Re-encrypting (upon the criticality of data) the data and uploading on to the cloud and then providing the data to the authenticated user upon his request. Different type of encryption techniques provide security for the data. The choice of encryption technique is made by comparative analysis between different attribute based encryption techniques like Cipher Policy based Encryption (CP-ABE), Location as a attribute encryption key policy based Encryption (KP-ABE). It is found to be the best to provide the required level of security for data outsourcing. The parameters that play a significant role in this technique is obtaining the current latitude and longitude position of the user who want to access the data. If the user is in authenticated location then access can be granted for the data. For this an android application has been developed and a trusted model with data base for storing the data, Re-encrypted data and secure keys for data security. The algorithm used for encrypting the data is RSA algorithm which is a public key encryption technique. If user wants to retrieve his data which is uploaded onto cloud he sends the filename to trusted model and he downloads the encrypted text from cloud, runs decryption algorithm and sends user data to user. If any exceptional case where user tries to access other user’s data trusted model simply sends an error message to user who is trying to hack the data and trusted model intimates data owner regarding data hack and Mac-Id of device who is trying to hack. So we can confirm that data encryption is done based on Mac-Id of device.Keywords
Cloud Computing, Cryptography, Mobile Computing, Scalability, Security- Methodical Review on Various Fault Tolerant and Monitoring Mechanisms to improve Reliability on Cloud Environment
Abstract Views :232 |
PDF Views:0
Authors
Affiliations
1 CSE, School of Computing, SASTRA University,Thanjavur - 613401,Tamilnadu, IN
1 CSE, School of Computing, SASTRA University,Thanjavur - 613401,Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Background/Objectives: Cloud computing is an emerging area that is currently pulling towards many of us. Cloud deployment is a difficult task in this layered structure. Handling the cloud environment itself an optimally a challenging job. This can be made feasible by using fault tolerance and monitoring services. Methods/Statistical Analysis: Fault Tolerance (FT) facilitates the process or the component to work smoothly even though in the occurrence of failure. Monitoring is a technique collects the information and to predict the fault before it occurs. Proactive and reactive measures can take place to run the cloud environment with tolerance in failure occurrence. Reviewing the potential of FT and monitoring services is to make out the technique that serves in certain purpose. Fault tolerance systems are important for both cloud provider and cloud customer. Findings: Based on this idea, this paper provides the different or diverse fault tolerance and monitoring mechanism to improve the reliability in a cloud environment. Applications/Improvements: It presents the information about the various techniques and methods used in the FT and also a future research direction in cloud FT.Keywords
Cloud Computing, Fault Tolerance, Reactive and Proactive, Reliability- Intrusion Detection and Prevention using Lockout policy with ACL on Cloud Computing
Abstract Views :153 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Background/Objectives: Cloud computing supports many enterprise and government organizations in business perspective due to its advantage such as high scalability and high flexibility. However, despite potential gains that can be achieved, security is fundamental issue. Denial of service attack attempted by attacker to exhausts the resources available to a network, application or service. The orchestrated flow of attack patterns by attacker affect the customers in terms of financial cost cause service inability to legitimate users, attacker overloads target system with massive amount of request, which results in loss of equipment resources affecting network bandwidth. Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users. Findings: The proposed technique helps in differentiating legitimate and illegitimate users. The attack can be controlled by locking out malicious user access. Thereby the financial cost can be controlled by preventing the resource consumption by malicious node. Applications The proposed methodology can be applied in signature based analysis and strong user identification. There by providing security by building Anti-spam devices at customer site such as E-commerce application. Applications: The proposed methodology can be applied in the signature based analysis and strong user identification. Thus providing security by building Anti-spam devices at customer site, such as in an e-commerce application.Keywords
Access Control List, Attack Pattern, DDoS, DoS, Lockout Policy, Service Inability.- Energy Aware Fault Tolerant Clustering and Routing Mechanism for Wireless Sensor Networks
Abstract Views :127 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: The key constructions of Wireless Sensor Networks (WSN) are energy conservation and battery depletion of the sensor nodes which are restricted and irreplaceable. Designing an economical clustering and routing mechanism ought to incorporate these problems for large scale WSN. Methods: “Energy Aware Fault Tolerant Clustering and Routing Mechanism” is proposed in this work for efficient clustering and fault-tolerant routing. The main idea behind this mechanism is to spot a node which lies in next position to cluster head in terms of energy and configuring it to sleep mode. Findings: This is chiefly done to realize fault tolerance by activating the node in sleep mode during the failure of the cluster head. Intensive experiments were performed on this technique and the results are compared with the previous algorithms. Applications/Improvements: Energy-Aware Fault Tolerant techniques are effectively used in applications of WSN like army reconnaissance, environmental monitoring etc.Keywords
Base Station (BS), Cluster Head (CH), Fault Tolerance, Wireless Sensor Networks (WSN).- Hybrid Fault Tolerant Scheme to Manage VM Failure in the Cloud
Abstract Views :140 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN