Volume 6 Issue 9- September 2016
Page | Title | Full Text |
---|---|---|
311-316 | Xj-ASD: Towards a j-ASD DSL eXtension for
application deployment in cloud-based
environment KANGA Koffi, Babri Michel , Brou Konan Marcelin Abstract
In this paper, we propose an extension of the grammar of an application deployment constraints description language from a cloud computing platform. Keywords— application deployment, software component description language constraint, Cloud computing, deployment plan
|
Full Text PDF |
317-324 | SADAM: Sybil Attack Detection Approach In
Manets Using Testbed M.Ramesh and Dr.A.M.Sowjanya. Abstract
MANET is a collection of number of nodes that formulates; either, a temporary or permanent, self-organized wireless network that don’t rely on any pivotal central architecture or control. They are designed to use in situations where infrastructure network is either non-existent or its extremely costly to deploy. MANETs require a distinctive, unique and insistent identity for each node for its security protocols to be ef1'ective; Sybil attacks present a grave threat to such networks. We can create large number of logical identities in a Sybil attack on a single physical device by a selfish malicious node which gives a false impression to the network that they are different benign nodes and uses them to launch a harmonized attack against the network or a node. Node cooperation is very important for detection of Sybil attack, but unfortunately nodes may not always behave cooperatively and may collude in hostile environments for disrupting the detection accuracy of such systems. Sybil nodes cannot be accurately detected in the presence of malicious collusion which results in serious impact on detection accuracy of Sybil attacks. This paper proposed a novel scheme in order to detect a Sybil attack resistant to collusion by incorporating a trust based mechanism that would mitigate the benefit (the payof1' gained) from collusion. Experimental results show that our proposed scheme detects Sybil or whitewashers new identities accurately and reduces the benefits of collusion in the presence of mobility. Index Terms-Collusion Attack, Sybil Attack, Recommendation model, Malicious Recommendations. Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, there by affecting the routing table. The multiple virtual identities are obtained by spoofing the victim’s node or by creating an arbitrary node as there is no restriction to create an arbitrary node in MANET. In the existing system, used RSSI as a parameter to detect the Sybil node because of its lightweight but it has failed to detect the fast moving Sybil nodes. The proposed system works considering the Certification Authority as one parameter and RSSI as the other parameter. The RSSI is used to form the cluster and to elect the cluster head. The CA’s responsibility is given to the CH. Whenever huge variations occur in RSSI on neighbor’s entry and exit behavior, the Certification Authority comes into play. The CA checks the certification of a node. If it is not valid, its certificate is revoked otherwise it is free to communicate in the network.
|
Full Text PDF |
325-330 | Optimal Data Deduplication in Cloud with
Homomorphic Authenticated Tree V.Manothini , K.Karthick Abstract
Cloud computing has become a new platform for personal computing. Cloud computing provides high performance computing resources and mass storage resources.Data Deduplication involves finding and removing duplication within data without compromising its integrity. A practical multi-user cloud storage system needs the secure client-side cross-user Deduplication technique, which allows a user to skip the uploading process and obtain the ownership of the files immediately, when other owners of the same files have uploaded them to the cloud server. To the best of our knowledge, none of the existing dynamic PoSs can support this technique. In this paper, we introduce the concept of deduplicatable dynamic proof of storage and propose an efficient construction called DeyPoS, to achieve dynamic PoS and secure cross-user Deduplication, simultaneously. Considering the challenges of structure diversity and private tag generation, we exploit a novel tool called Homomorphic Authenticated Tree (HAT). We prove the security of our construction, and the theoretical analysis and experimental results show that our construction is efficient in practice. Keywords— Structure Diversity, Cloud Storage, Deduplication, Dynamic Proof of Storage.
|
Full Text PDF |
331-334 | Secure Outsourced Data Stream under Multiple
Keys Using Random Algorithm in Cloud
Computing M.Thangadurai , K.Baskar Abstract
Exchanging data streams to an advantage rich cloud server for internal thing evaluation, a basic building frustrate in various standard stream applications (e.g., quantifiable watching), is addressing various associations and individuals. On the other hand, checking the delayed consequence of the remote count accept an essential part in tending to the issue of trust. Since the outsourced data amassing likely starts from different data sources, it is needed for the structure to have the ability to pinpoint the originator of bungles by administering each data source a unique secret key, which requires the inward thing check to be performed under any two social occasions' differing keys. Regardless, the present game plans either depend on upon a lone key supposition or powerful yet practically inefficient totally homomorphic cryptosystems. In this paper, we focus on the all the more troublesome multi-key circumstance where data streams are exchanged by various data sources with unmistakable keys. We first present a novel homomorphic clear name framework to transparently affirm the outsourced inward thing count on the dynamic data streams, and after that extend it to support the check of network thing count. We exhibit the security of our arrangement in the discretionary prophet model. Furthermore, the exploratory result similarly shows the practicability of our arrangement. Keywords— Data stream, Computation outsourcing, Storage outsourcing, Multiple keys, Public verifiability
|
Full Text PDF |
335-338 | Development of Data Cleaning algorithm by Finding
Fuzzy Duplicates in Insurance Data Warehouse Rajshree Y. Patil Dr. R. V. Kulkarni Abstract
Data cleaning is the method of adjusting or eradicating information that is wrong, unfinished, inappropriately formatted or reproduced. A business in a data-intensive profession like banking, insurance, trade and telecommunication might use a data cleaning engine to methodically inspect data for errors by using set of laws, business rules and algorithms. Data cleaning is a vital undertaking for data warehouse experts, database managers and developers in insurance industry. In today's competitive environment, there is a need to make available a program for insurance industry which emphasizes on data quality by using methods and techniques for data cleaning. This will help companies to improve data preparation and reporting capabilities. This paper aims to facilitate the data cleaning process by addressing the problem of duplicate records detection pertaining to the name attributes of the data sets. It provides a sequence of algorithms through a novel framework for identifying duplicity in the 'name' attributes of the data sets of an already existing data warehouse.y
|
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net