IJCSWS-Menu
IJCSWS - Volume :07 Issue:02
Page No |
Title
|
---|
159-163 |
Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks --S.RameshKumar, S.Anitha |
Abstract
This paper proposes routing protocol based on context information for MANET. Context information represents the rate of change in connectivity, degree of mobility, battery level and available memory. This protocol follows the fully aware routing in which it context information for opportunistic routing and also provides mechanisms to use context information. In our work, we focus on route discovery and packet relay. Ours is a proactive protocol, which continuously monitor the network connectivity change. Our packet relay follows next hop routing. Here, only the destination address is provided and the corresponding path is determined as such. Also, a routing table is maintained. A route request message is sent to the promising carrier and it is updated in the routing table. This process continues until it a route is found. A route request message consists of source ID and a sequence number.. Keywords: Mobile Ad-Hoc Networks, MANET, data delivery, context information, MANET routing ![]() |
164-170 |
Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-based Mobile Ad Hoc Networks -- R.V.Marry Swapna, S.Ramkumar |
Abstract
Wireless communication has been around for over a century and has within the last decade become a regular mode of communication in people’s everyday lives, thanks to the success of cellular and WiFi communication. Recently, researchers have focused on eliminating the need for fixed infrastructures in wireless communication, which has led to the development of ad hoc networks. A mobile ad hoc network (MANET) further considers node mobility within the ad hoc setting. Efficient use of resources and adaptation are vital in order to create a high performance MANET. This dissertation addresses the efficient use of network resources to obtain the desired quality of service and performance in MANETs. Keywords: Mobile adhoc networks, bandwidth efficiency, distributed dynamic channel allocation . ![]() |
171-174 |
Privacy Preserving Multi Sharing Control for Big Data Storage --K.Archana, Dr. Krishna mohanta |
Abstract
security is a prime concern for any service that provides big data storage. The data of an individual should remain confidential and should be accessed only by any authenticated person. One of the aspects of security that is considered prior storing data is the anonymity of the service clients. The service that is used for storage should provide practical and fine-grained encrypted data sharing in such a way that only a ciphertext of data is shared among others by the data owner under some specified conditions. The required features are obtained by introduction a new technique for providing big data storage i,e, a privacy preserving ciphertext multi sharing mechanism. In this technique the advantages of proxy re-encryption technique are employed that enables ciphertext to be securely and conditionally shared multiple times and it also ensures that the knowledge of underlying message and the identity information of ciphertext senders and recipients is not leaked. The technique is also vulnerable to the chosen ciphertext attacks. Keywords: Encryption, Decryption, Privacy-Anonymity ![]() |
175-178 |
Building Virtual Instance Compatible with User’s Web Application in Openstack Cloud Provider --C.Sumathi, Dr.B.Chandramouli |
Abstract
When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users find it difficult to select the best one among the hundreds, if not thousands, of possible compositions available. Service composition in Cloud raises even new challenges caused by diversity of users with different expertise requiring their applications to be deployed across difference geographical locations with distinct legal constraints. The main difficulty lies in selecting a combination of virtual appliances(software images) and infrastructure services that are compatible and satisfy a user with vague preferences. Therefore, an algorithms which simplify Cloud service composition for unskilled users and develop an approach to analyze Cloud service compatibility by applying reasoning on the expert knowledge. In addition, to minimize effort of users in expressing their preferences . This lets users express their needs in linguistics terms which brings a great comfort to them compared to systems that force users to assign exact weights for all preferences. Keywords: Cloud Computing; Cloud Service Composition; Open Stack Cloud provider, PaaS IaaS ![]() |
179-185 |
Clone Node Detection in Wireless Sensor Networks --Mr.R.Rajaguru, Mr.P.Ramachandran |
Abstract
WSN (Wireless Sensor Network) is spatially distributed sensor that is used to monitor the physical conditions as well as environmental conditions such as sound, temperature, pressure to pass their information through the network to main place. Wireless Sensor Networks mainly involve in consumer and industrial such as security, control and several distributed protocols have been proposed to detect this attack in wireless sensor networks. In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. Although the DHT-based protocol incurs similar communication cost as previous approaches, it may be considered a little high for some scenarios. The protocol performance on efficient storage and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary adjustments for real application, are supported by the simulations The second distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination .Distributed detection, distributed hash table, node clone attack, randomly directed exploration, wireless sensor networks (WSNs). Keywords: Distributed detection, distributed hash table, node clone attack, randomly directed exploration, wireless sensor networks (WSNs). ![]() |
186-191 |
A Framework for Personal Mobile Commerce Pattern Mining and Prediction --A.Shyamala1, Dr.Anithaa2 |
Abstract
Due to a wide range of potential applications, research on mobile commerce has received a lot of interests from both of the industry and academia. Among them, one of the active topic areas is the mining and prediction of users’ mobile commerce behaviors such as their movements and purchase transactions. In this paper, we propose a novel framework, called Mobile Commerce Explorer (MCE), for mining and prediction of mobile users’ movements and purchase transactions under the context of mobile commerce. The MCE framework consists of three major components: 1) Similarity Inference Model (SIM) for measuring the similarities among stores and items, which are two basic mobile commerce entities considered in this paper; 2) Personal Mobile Commerce Pattern Mine (PMCP-Mine) algorithm for efficient discovery of mobile users’ Personal Mobile Commerce Patterns (PMCPs); and 3) Mobile Commerce Behavior Predictor (MCBP) for prediction of possible mobile user behaviors. To our best knowledge, this is the first work that facilitates mining and prediction of mobile users’ commerce behaviors in order to recommend stores and items previously unknown to a user. We perform an extensive experimental evaluation by simulation and show that our proposals produce excellent results. Keywords:Data mining, Mobile commerce. ![]() |
192-196 |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
--Mr. S.Rajadurai, Mr.D.Vinod |
Abstract
Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks. Since WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance of very low power processors dramatically improves, future aggregator nodes will be capable of performing more sophisticated data aggregation algorithms, thus making WSN less vulnerable. Iterative filtering algorithms hold great promise for such a purpose. Such algorithms simultaneously aggregate data from multiple sources and provide trust assessment of these sources, usually in a form of corresponding weight factors assigned to data provided by each source. In this paper we demonstrate that several existing iterative filtering algorithms, while significantly more robust against collusion attacks than the simple averaging methods, are nevertheless susceptive to a novel sophisticated collusion attack we introduce. To address this security issue, we propose an improvement for iterative filtering techniques by providing an initial approximation for such algorithms which makes them not only collusion robust, but also more accurate and faster converging. Keywords: Distributed detection, distributed hash table, node clone attack, randomly directed exploration, wireless sensor networks (WSNs). ![]() |
197-200 |
Providing Security For Distributed Access Control With Unauthorized Access Of Data Storage In Anonymous Cloud --B.Kavinilavan, K.Udaya kumar |
Abstract
The data storage in cloud that always supports the authentication .the privacy preserving in cloud is based on both encryption and decryption using same key. The new decentralized access control supports the privacy in proposed system .It prevents the attacks replays and modified the data and it can also read data storage in the cloud. The users take a centralized approach when the single key is distribution center KDC. It must be a secret key and attribute to all the accessible users. The user validity they stores the data is also verified in this proposed using a secure hash algorithm for privacy preserving purpose , the SHA algorithm is used to verify that a file has been unaltered. The Paillier crypto system is a probabilistic asymmetric algorithm for public key cryptography. Paillier algorithm use for Creation of access policy, file accessing and file restoring process. Our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.. Keywords: Access control, Authentication, Secure hash algorithm, pailler algorithm. ![]() |
201-205 |
Fine-grained Multi-keyword Search Over
Encrypted Cloud Data
--S.Vinotha, M.P.Sujatha |
Abstract
Data are stored in remote servers and can be shared for public access using cloud computing. Individuals when uploading data to shared remote servers usually encrypt their data from preventing the unauthorized users to access their sensitive information. This limits the information for searching the outsourced data. The above mentioned issue overcomes by developing the fine-grained multi-keyword search schemes over encrypted cloud data. First, to enable the precise keyword search and personalized user experience the relevance scores and preference factors upon keywords are derived. Second, a practical and efficient multi-keyword search scheme which supports complicated logic search using “AND”, “OR” and “NO” operations over keywords. To achieve better efficiency on index building, trapdoor generating and query, the system employes classified sub-dictionaries technique. using sub-dictionaries techniques searching process can be made easier . The trapdoor algorithm used to generate secret key to the user to access information from multi-cloud. The multi-cloud response the search result to the user. Keywords: Multi-keyword,Trapdoor,Cloud computing, Searchable encryption. ![]() |
206-210 |
Enabling Fine-Grained Multi-Keyword Search Supporting Over Encrypted Cloud Data
--S.Nareshkumar, R. Nanda kumar |
Abstract
Data are stored in remote servers and can be shared for public access using cloud computing. Individuals when uploading data to shared remote servers usually encrypt their data from preventing the unauthorized users to access their sensitive information. This limits the information for searching the outsourced data. The above mentioned issue overcomes by developing the fine-grained multi-keyword search schemes over encrypted cloud data. First, to enable the precise keyword search and personalized user experience the relevance scores and preference factors upon keywords are derived. Second, a practical and efficient multi-keyword search scheme which supports complicated logic search using “AND”, “OR” and “NO” operations over keywords. To achieve better efficiency on index building, trapdoor generating and query, the system employes classified sub-dictionaries technique. using sub-dictionaries techniques searching process can be made easier . The trapdoor algorithm used to generate secret key to the user to access information from multi-cloud. The multi-cloud response the search result to the user.. Keywords: Multi-keyword,Trapdoor,Cloud computing, Searchable encryption ![]() |
211-214 |
Internet Of Things Based Wearable Sensors For Healthcare Industry
--R.Indrakumari ,Dr. Justin Varghese |
Abstract
Wearable health devices are able to monitor a large amount of vital signs of human body, from advance sensor supervision in the case of infant respiratory to fitness applications or even soldiers on the battlefield. This particularity of WHDs creates a big excitement around this technology and many opportunities to continue its development. With new advances in new materials, electronics and telecommunication information technology, together with the entry of big multinational companies, such as Google, but also of small startups, WHDs are expected to overcome their challenges and enter in the consumer market with a higher impact. Keywords:Internet Of Things, Wearable Sensors , Healthcare Industry. ![]() |
-----.. |