A Flexible Auditing Mechanism for Storages in Cloud Computing

Size: px
Start display at page:

Download "A Flexible Auditing Mechanism for Storages in Cloud Computing"

Transcription

1 ISSN (Onlne : ISSN (Prnt : Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology Volume 3, Specal Issue 3, March Internatonal Conference on Innovatons n Engneerng and Technology (ICIET 14 On 21 st & 22 nd March Organzed by K.L.N. College of Engneerng, Madura, Taml Nadu, Inda A Flexble Audtng Mechansm for Storages n Cloud Computng Saranya C, Vnoth P PG Scholar, Dept of Computer Scence Engneerng, Mepco Schlenk Engneerng, College Svakas, Inda. Assstant Professor, Dept of Computer Scence Engneerng, Mepco Schlenk Engneerng, College Svakas, Inda. Abstract-In recent years, Cloud Computng has acheved greater heghts. Cloud storage s more preferable than normal local storage, as when we use global nternet based storage, t s easy to use wherever we go. But these cloud nfrastructures are prone to threats lke Cloud Servce Provder may behave unfathful towards the users data and also users may faulty perform mproper operatons that leads to loss of data. The soluton for the above problem s that a Flexble Audtng Mechansm was proposed whch allows a Thrd Party Audtor (TPA to verfy the ntegrty of data stored n the cloud.it uses the fragment structure and secure tag generaton method for perodc samplng audt process.it also supports audt for dynamc operatons. Ths audt servce can provde publc audtablty wthout downloadng raw data and protect prvacy of the data. Therefore, through ths audt system the dynamc data operatons and tmely anomaly detecton can be supported at low storage and communcaton cost. The next ssue s that the cloud servce provder would behave unfathful towards the cloud data. They may dscard the data that are rarely accessed or not accessed to save storage space and clam that the owner s data are correctly stored n the cloud. The other ssue s that users may perform mproper operatons that s they may accdently delete the data and clam the cloud servce provder s responsble for the data loss. So, t s necessary for the servce provder to have a flexble audtng servce to check the correctness of the data stored n the cloud. Audt nvolves the trackng of all actvtes that ncludes data accesses, securty volatons, and attacks and so on. However, tradtonal cryptographc schemes lack to support ntegrty verfcaton wthout the local copy of the data. If the audt servces are desgned to download the whole data whch ncurs storage and communcaton cost. Ths stuaton should be managed so, the man obectves of the flexble audtng servces are: Keywords-Storage Audtng, data ntegrty, cloud storage systems. I.INTRODUCTION Effcent Audtablty. To have a thrd party audtor (TPA to verfy the correctness of the data wthout downloadng the whole data. Dynamc Audtablty. To support audtng for dynamc operatons done by the user. Perodc detecton of errors and losses. To perform a perodc samplng audt on the data stored n the cloud. Forensc Evdences. To provde forensc evdences for the anomales those occur n the cloud. Lghtweght Audt Tasks. Cloud computng s an upcomng technology where the computng resources are shared across nternet for usage, that s we can pay as we use. There s no need for any local storage.the storage n clouds has become a popular way of storng and mantanng the data. The ntegrty of stored data should be preserved. But cloud nfrastructures are prone to threats. These threats can be nternal threat, caused by vrtual machne falure or external threat, caused by system holes. Ths damages the ntegrty of data. M.R. Thansekhar and N. Bala (Eds.: ICIET

2 To ncur the less cost computaton audt tasks. A Flexble Audtng Mechansm for Storages n Cloud Computng To acheve these obectves, a flexble audtng servce was ntroduced to provde effcent ntegrty verfcaton. Ths audt system supports dynamc data operatons and tmely anomaly detecton. The technques used are fragment structure, random samplng and ndex-hash table. The rest of the paper s organzed as follows: Secton 2 descrbes the research background and related work. Secton 3 descrbes the audt system archtecture and the technques used. Secton 4 descrbes the defnton and the algorthms. Secton 5, we present the performance of the expermental results. Fnally, we conclude the paper n Secton 6. II.BACKGROUND AND RELATED WORK Tradtonal schemes based on the hash functons and sgnature methods can t work wthout downloadng the whole data. That results n expensve communcaton especally for large-sze fles. As the work of audtng the cloud data are really expensve and complex. Ths audtng work of verfyng the correctness of the data s moved from cloud servce provder (CSP to the thrd party audtor (TPA.TPA has the capablty for perodcally audtng the data.ths servce gves data assurance and acts as a dgtal forenscs. Many researchers proposed new notatons for publc audtablty lke the notons of proof of retrevablty (POR[2] and PDP[5]. Anyone can use these schemes to prove the correctness of the data and offer a publcly accessble remote nterface to check large amount of data. Some audt servces solutons are there. Xe et al. [10] proposed a content comparablty method but t s not sutable for rregular data. Wang et al. [11] proposed a prvacy preservng property for outsourced data. In ths scheme, a fle s drectly splt nto n blocks and a verfcaton tag s generated for each block. Here, the sze of the block s equal to the cryptosystem.for,160 bts whch s 20 bytes. That s,1m bytes fle s splt nto 50,000 blocks and generates 50,000 tags, ths storage of tags s 1M bytes. So, t s neffcent to construct a system usng ths scheme. To overcome ths problem, a fragment structure technque s used to reduce the extra storage. Usng ths scheme, the data can be dynamcally updated by the clents. The block operatons lke modfcaton, deleton and nserton. Fg. 1.Archtecture of Cloud Audt Servce. In the exstng schemes, securty ssues arse a lot. Hence, to develop a secure mechansm for dynamc audt servces, a flexble scheme s requred. III.ARCHITECTURE AND TECHNIQUES Audt system archtecture for outsourced data n clouds s shown n Fg. 1.Ths archtecture the audt archtecture conssts of fve enttes. Cloud Servce Provder(CSP CSP provdes data storage servce and has enough storage space and computaton resources. Authentcated Applcatons(AA AA has the rght to access and manpulate the stored data Data Owner (DO DO have a large amount of data to be stored n the cloud. Thrd Party Audtor(TPA TPA has capabltes to manage or montor the outsourced data under the delegaton of DO. Applcaton User s Cloud User s enoy varous cloud applcaton servces va the AA s. TPA s relable and ndepent through the followng audt functons: TPA should be able to make regular checks on the ntegrty and avalablty of the delegated data at approprate ntervals. TPA should be able to organze, manage, and mantan the outsourced data nstead of DO TPA support dynamc data operatons for AAs. TPA should be able to take the evdences for dsputes about the nconsstency of M.R. Thansekhar and N. Bala (Eds.: ICIET

3 data n terms of authentc records for all data operatons. A Flexble Audtng Mechansm for Storages n Cloud Computng To acheve these functons, our audt servces has 3 processes: Tag Generaton And User s Verfcaton: The clent (DO uses a secret key s k to preprocess a fle, whch conssts of a collecton of n blocks, generates a set of publc verfcaton parameters (PVP s and IHT that are stored n TPA, transmts the fle and some verfcaton tags to CSP, and may delete ts local copy(see Fg.2a; Perodc Samplng Audt: By usng an nteractve proof protocol of retrevablty, TPA ssues a random samplng challenge to audt the ntegrty and avalablty of the outsourced data n terms of verfcaton nformaton (nvolvng PVP and IHT stored n TPA(see Fg. 2b;and Audt For Dynamc Data Operatons: An AA, who holds a DO s secret key λ, can manpulate the outsourced data and update the assocated IHT stored n TPA. The prvacy of λ and the checkng algorthm ensure that the storage server cannot cheat the AAs and forge the vald audt records(see Fg. 2c; The Authorzed Applcaton s provdes the cloud applcaton servces, must be authorzed by the DOs. Therefore, any AAs must gve TPA the authorzed nformaton to perform the dynamc operatons on the data. If any unauthorzed applcatons occur then the audtng servce should detect t. So, ths s a strong authentcaton-verfcaton mechansm. (a Tag Generaton and User Verfcaton Workflow (b Perodc Samplng Audt Workflow (c Dynamc operatons Audt Workflow Fg. 2. Three processes of the audt system. The entre goal of ths audt structure s to provde the credtablty n cloud. So, the burden of the DO and CSP are greatly reduced. The entre audtng servce s handled by a Trusted Thrd Party Audtor (TTPA.There s no addtonal cost for usng ths mechansm. Ths process nvolves the followng algorthms: KeyGen, TagGen, Update, and Delete, Insert algorthms. The followng technques are requred to construct a ths algorthms. The technques are Fragment structure, Blnear Mappng and Index table (ITable. 3.1 Fragment Structure and Secure Tags To maxmze the performance the audt system, a general fragment structure s used.a fle F s splt nto n data components {m 1,.,m n }.Each data block m s further splt nto s sectors. 1. Select the maxmum no. of sectors s max among all the sector numbers s. 2. m has s max sectors Set m =0 for s < < _ s max 3. Sze of each sector s constant and equal to securty parameter p. 4. Calculate the number of data blocks. 5. Encrypted data component s M { m} [1, n], [1, s] where s = number of sectors n each data block. p= securty parameter. M.R. Thansekhar and N. Bala (Eds.: ICIET

4 3.2 Blnear Mappng Let G 1,G 2 and G T be multplcatve groups wth same prme order p. Blnear map s gven by Let g 1 and g 2 be the generators of G 1 and G 2.. Keyed secure hash functon 1.3 Index table (ITable ITable s used to record the abstract nformaton of the data.it conssts of 4 components Index -Current block number of data block m.. B -Orgnal block number of data block m. V -Current verson number of data block m. T -Tmestamp used for generatng the data tag. TABLE 3ITable of the Abstract Informaton of Data M Index B V T T T2 IV.ALGORITHMS FOR AUDIT SYSTEM The algorthms for tag generaton process: 1. Key Generaton Algorthm - KeyGen(λ Algorthm KeyGen (λ //Input: λ securty parameter //Output: sk h secret hash key // sk t secret publc tag key // pk t publc tag key begn Choose 2 random numbers sk t, sk h Є Z p skt Compute pkt g2 G2 2. Tag Generaton Algorthm -TagGen(M, sk t, sk h Algorthm TagGen (M, sk t, sk h //Input: M encrypted fle // sk h secret hash key // sk t secret publc tag key //Output: T set of tags begn Choose s random values x 1, x 2, x s. Є Z p Compute x u for each data block m Compute for e: G1G2 h :{0,1} G GT g1 G1 [1, s] s t ( h( skh, W. u 1 1 A Flexble Audtng Mechansm for Storages n Cloud Computng m skt W = FID. FID = dentfer of data. = block number of m. 3. Challenge Algorthm - Chall (M nfo Algorthm Chall (M nfo // Input: M nfo Abstract nformaton of data // Output: C Challenge begn Select some data blocks and construct challenge set Q for each chosen block m Generate random numbers v Є Z p Compute challenge stamp for return C=({,v } ЄQ,R where r = randomly chosen number 4. Proof Algorthm - Prove (M,T,C Algorthm Prove (M,T,C //Input: M Fle // T Tag from audtor // C Challenge //Output: P= (TP,DP Proof // TP Tag Proof // DP Data Proof begn Generate tag proof v Compute sector lnear combnaton Generate data proof where r DP. e( H chal, pkt e( TP, g2 M.R. Thansekhar and N. Bala (Eds.: ICIET End R ( pkt 5. Verfcaton Algorthm - Verfy (C,P, sk h, pk t,m nfo The output of ths algorthm s 0 means then, the ntegrty of the cloud data s compromsed. Algorthm Verfy (C,P, sk h, pk t, M nfo // Input: T tag from audtor // C challenge // sk h secret hash key // pk t publc tag key // M nfo abstract nformaton of data // Output: 0 or 1 begn Compute dentfer hash values h=(sk h,w. Compute challenge hash r TP DP Q r Z p Verfes the proof by verfcaton equaton t MP v. m Q s 1 Q e( u, R H h( skh, W chal MP rv

5 A Flexble Audtng Mechansm for Storages n Cloud Computng f both the values are equal then return 1 else return 0 f V.CONSTRUCTION OF THE AUDIT SCHEME Ths scheme ncludes a 2-move nteractve proof protocol, whch also provdes prvacy protecton property to ensure the confdentalty of secret data. 5.1 Notatons Let be a keyed hash famly of functons H k : The collson resstance hash functon SHA1 s used, where the probablty s over random choce s made. Ths hash functon can be obtaned from n {0,1} {0,1} H { H k } hash functon of BLS sgnatures.blnear parngs proposed by Boneh and Frankln [11] s used. Let G and G T be two multplcatve groups usng ellptc curve conventons wth a large prme order p. The functon e be a computable blnear map e : G x G-> G T. wth the followng propertes: 1 Blnearty2 Nondegeneracy and 3 Computablty. The fle s encrypted usng collson resstance algorthm by usng the blnear mappng and then the tags are generated for ths fle whch s fragmented. 5.2 Constructon for Dynamc Audtng Data update. There are three types of data update operatons that can be used by the owner: modfcaton, nserton, and deleton. For each update operaton, there s a correspondng algorthm n the dynamc audtng to process the operaton and facltate the future audtng, defned as follows: Data update. There are three types of data update Operatons that can be used by the owner: modfcaton, nserton, and deleton. For each update operaton, there s a correspondng algorthm n the dynamc audtng to process the operaton and facltate the future audtng, defned as follows: Modfy( m, sk t, sk ( Msg h modfy The modfcaton algorthm takes as nputs the new verson of data block m,the secret tag key sk t, and the secret hash key sk h. Itgenerates a new verson number V, new tme stamp T,and calls the TagGen to generate a new data tag t for data. Insert ( m, sk, sk t h ( Msg, t nsert The nserton algorthm takes as nputs the new data block m, the secret tag key sk t, and the secret hash key sk h. It nserts a new data block m before the th, t poston. It generates an orgnal number B, a new verson number V, and a new tme stamp T. Then, t calls the TagGen to generate a new data tag t for the new data block m. It outputs the new tag t and the update message Then, t nserts the new par of data block and tag (m,t on the server and ss the update message Msg nsert to the audtor. Msg (, B, V, T nsert Delete( m Msg delete The deleton algorthm takes as nput the data block m. It outputs the update message Msg delete (, B, V, T. It then deletes the par of data block and ts tag (m, t from the server and ss the update message Msg delete to the audtor. VI CONCLUSION In ths paper, a flexble audtng mechansm was proposed by usng Blnearty property of blnear parng and also supports audt for dynamc operatons. Ths enhances the performance of TPAs. REFERENCES [1] Yan Zhu, Gal-Joon Ahn, Hongxn Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu, Dynamc Audt Servces for Outsourced Storages n Clouds, IEEE Transactons on Servces Computng, Vol. 6, No. 2, Aprl-June [2] A. Juels and B.S. Kalsk Jr., PORs: Proofs of Retrevablty for Large Fles, Proc. ACM Conf. Computer and Communcatons Securty (CCS 07, pp , [3] M. Mowbray, The Fog over the Grmpen Mre: Cloud Computng and the Law, Techncal Report HPL , HP Lab., [4] A.A. Yavuz and P. Nng, BAF: An Effcent Publcly Verfable Secure Audt Loggng Scheme for Dstrbuted Systems, Proc. Ann. Computer Securty Applcatons Conf. (ACSAC, pp , [5] G. Atenese, R.C. Burns, R. Curtmola, J. Herrng, L. Kssner, Z.N.J. Peterson, and D.X. Song, Provable Data Possesson at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm.Securty, pp , [6] G. Atenese, R.D. Petro, L.V. Mancn, and G. Tsudk, Scalable and Effcent Provable Data Possesson, Proc. Fourth Int l Conf. Securty and Prvacy n Comm. Netowrks (SecureComm, pp. 1-10,2008. [7] C.C. Erway, A. Ku pc u, C. Papamanthou, and R. Tamassa, Dynamc Provable Data Possesson, Proc. 16th ACM Conf. Computer and Comm. Securty, pp , [8] H. Shacham and B. Waters, Compact Proofs of Retrevablty, Proc. 14th Int l Conf. Theory and Applcaton of Cryptology and Informaton Securty: Advances n Cryptology Advances n Cryptology,(ASIACRYPT 08, J. Peprzyk, ed., pp , [9] A.R. Yumeref and J.S. Chase, Strong Accountablty for Network Storage, Proc. Sxth USENIX Conf. Fle and Storage Technologes (FAST, pp , [10] M. Xe, H. Wang, J. Yn, and X. Meng, Integrty Audtng of Outsourced Data, Proc. 33rd Int l Conf. Very Large Databases (VLDB, pp , [11] C. Wang, Q. Wang, K. Ren, and W. Lou, Prvacy-Preservng Publc Audtng for Data Storage Securty n Cloud Computng, Proc. IEEE INFOCOM, pp. 1-9, M.R. Thansekhar and N. Bala (Eds.: ICIET

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,

More information

Security of Data Dynamics in Cloud Computing

Security of Data Dynamics in Cloud Computing M.Yughar et al, / (IJCSIT) Internatonal Journal of Computer Scence Informaton Technologes, Vol. 3 (4), 202,4868-4873 Securty of Data Dynamcs n Cloud Computng M.Yughar, D. Subhramanya Sharma Dept. of CSE,

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

New Remote Mutual Authentication Scheme using Smart Cards

New Remote Mutual Authentication Scheme using Smart Cards 141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Storage Data Security of Data in Cloud Computing

Storage Data Security of Data in Cloud Computing IOSR Journal of Comuter Engneerng (IOSR-JCE) e-issn: 2278-066,-ISSN: 2278-8727, Volume 6, Issue 4, Ver. VI (Jul Aug. 204), PP 7-77 www.osrjournals.org Storage Data Securty of Data n Cloud Comutng Srnvasulu.B,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A new attack on Jakobsson Hybrid Mix-Net

A new attack on Jakobsson Hybrid Mix-Net A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Implement Public Audit ability and Data Dynamics with Security in Cloud Computing

Implement Public Audit ability and Data Dynamics with Security in Cloud Computing Internatonal Journal of Modern Engneerng Research (IJMER) www.jmer.com Vol. 3, Issue. 6, Nov - Dec. 203-3786-379 ISSN: 2249-6645 Imlement Publc Audt ablty and Data Dynamcs wth Securty n Cloud Comutng P.

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage

Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage COMPUTER SYSTEM SECURITY Decentralzed Attrbute-Based Encrypton and Data Sharng Scheme n Cloud Storage Xehua L*, Yanlong Wang, Mng Xu, Yapng Cu College of Computer Scence and Electronc Engneerng, Hunan

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (

More information

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

A software agent enabled biometric security algorithm for secure file access in consumer storage devices A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

An enhanced dynamic-id-based remote user authentication protocol with smart card

An enhanced dynamic-id-based remote user authentication protocol with smart card Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks Int. J. Vehcle Informaton and Communcaton Systems, Vol. 2, Nos. 1/2, 2009 1 A broadcast protocol wth drvers anonymty for vehcle-to-vehcle communcaton networks Nader Mazen Rabad and Syed Masud Mahmud* Electrcal

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text) Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

arxiv: v1 [cs.cr] 28 May 2013

arxiv: v1 [cs.cr] 28 May 2013 arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud

Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud 1 Protectng Your Rght: Verfable Attrbute-based Keyword Search wth Fne-graned Owner-enforced Search Authorzaton n the Cloud Wenha Sun, Student Member, IEEE, Shucheng Yu, Member, IEEE, Wenjng Lou, Senor

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

A Distributed Private-Key Generator for Identity-Based Cryptography

A Distributed Private-Key Generator for Identity-Based Cryptography A Dstrbuted Prvate-Key Generator for Identty-Based Cryptography Anket Kate Ian Goldberg Davd R. Cherton School of Computer Scence Unversty of Waterloo Waterloo, ON, Canada N2L 3G1 {akate,ang}@cs.uwaterloo.ca

More information

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Fuzzy Keyword Search over Encrypted Data in Cloud Computing Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L, Qan Wang, Cong Wang, Nng Cao, Ku Ren, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

APRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha

APRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha JAIST Repos https://dspace.j Ttle APRAP: Another Prvacy Preservng RF Authentcaton Protocol Author(s)Myaj, Atsuko; Rahman, Mohammad Sha Ctaton 2010 6th IEEE Workshop on Secure Net Protocols (NPSec): 13-18

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds

Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Yan Zhu 1,2, Huaixi Wang 3, Zexing Hu 1, Gail-Joon Ahn 4, Hongxin Hu 4, Stephen S Yau 4 1 Institute of Computer Science

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

An Optimized Pseudorandom Generator using Packed Matrices

An Optimized Pseudorandom Generator using Packed Matrices An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Security analysis and design of an efficient ECC-based two-factor password authentication scheme SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE A Survey on Data Integrity Auditing Schemes in Cloud Computing Purnima [1], Deepak Kumar Verma [2] Student of MTech. [1] Computer Science Department [2] IEC College of Engineering and

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds

Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Yan Zhu 1,2, Huaixi Wang 3, Zexing Hu 1, Gail-Joon Ahn 4, Hongxin Hu 4, Stephen S. Yau 4 1 Institute of Computer Science

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Fine-Grained Data Updates on Cloud with Authorized Public Auditing IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi

More information

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN Rsk-Based Packet Routng for Prvacy and Complance-Preservng SDN Karan K. Budhraja Abhshek Malvankar Mehd Bahram Chnmay Kundu Ashsh Kundu Mukesh Snghal, Unversty of Maryland, Baltmore County, MD, USA Emal:

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

arxiv: v1 [cs.cr] 20 Jun 2013

arxiv: v1 [cs.cr] 20 Jun 2013 arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Batch Verification Scheme for Economic Cloud Storage Services

Batch Verification Scheme for Economic Cloud Storage Services Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

Massive XML Data Mining in Cloud Computing Environment

Massive XML Data Mining in Cloud Computing Environment JOURNAL OF MULTIMEDIA, VOL. 9, NO. 8, AUGUST 2014 1011 Massve XML Data Mnng n Cloud Computng Envronment Zhao L Department of Computer Scence, Xnyang College of Agrculture and Forestry, Xnyang, Chna Emal:

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information