Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Prasad Babu, B. R.
- Trusted Platform Module Based User Attestation Architecture for Cloud Infrastructure
Abstract Views :167 |
PDF Views:0
Authors
Pramod
1,
B. R. Prasad Babu
2
Affiliations
1 CSE Department, EPCET, VTU, Bangalore, IN
2 CSE Department, EPCET, Bangalore, IN
1 CSE Department, EPCET, VTU, Bangalore, IN
2 CSE Department, EPCET, Bangalore, IN
Source
International Journal of Engineering Research, Vol 5, No SP 5 (2016), Pagination: 992-997Abstract
Cloud computing is s major shift in the IT industry. Many Research topics indicate that the cloud computing industry is substantial and growing rapidly. Numerous technologies have been developed, and now there are many ways to virtualizes IT systems and to get the needed applications on the Internet, through web based applications. Cloud users now can avail their data any time and at any place with Cloud Storage service. With all various benefits of cloud computing, security is always a major concern. Despite the fact that the cloud computing gives getting to the information put away in distributed storage in an adaptable and versatile way, the primary test it countenances is with the security issues. Thus cloud user may think cloud in not secure, because the encryption keys are completely managed by the software; hence there is no attestation on the integrity of client software. The cloud users who needs to send in the dependable and secure environment ought to be affirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by mischievous acts. Thus, the traditional user identification such as user ID and password can be easily compromised. Besides from the traditional network security solutions, (TCG) trusted computing technology is combined into cloud computing environment to make ensure that the integrity key of platform and offer attestation mechanism for trustworthy services. Thus, enhance the confidence of the IaaS provider. The cryptographic convention received by the Trusted Computing Group empowers the remote confirmation which protects the security of the user in view of the trusted stage. Hence we propose a structure which characterizes Trusted Platform Module (TPM), a trusted registering bunch which demonstrates the protected information access control in the cloud storage with enhance security. In this paper, we define the TPM-enabled key management, remote user attestation and a secure sharing of key across multiple users. We also study various challenges with the current TPM based attestation based techniques. The Portable TPM which is proposed in this paper is not embedded to VMS (Virtual Machines) in order to offer efficiency to the cloud users. Utilizing this methodology, security of the user is taken care in efficient way. We demonstrate proposed scheme effectiveness and efficiency, through extensive experimental evaluation on the live Microsoft Windows Azure platform.Keywords
TPM, IaaS, vTPM, cTPM, SMRR, SMM, TCG, TED, DRTM, VLR, DRTM, CA.- An Overview on Resource Manager Agent to increase the Efficiency in Cloud Distributed Computing Using BigData Application
Abstract Views :159 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, East Point College of Engg. & Technology, IN
1 Department of CSE, East Point College of Engg. & Technology, IN
Source
International Journal of Engineering Research, Vol 5, No SP 4 (2016), Pagination: 818-821Abstract
A distributed computing environment offers a disentangled, concentrated stage or assets for use when required effortlessly. One of the key functionalities of this sort of processing is to assign the assets on an individual interest. Numerous undertakings are devoted to vast scale conveyed figuring frameworks that have composed and created asset allotment instruments with an assortment of models and administrations. In this study, through examination, an extensive review for depicting asset distribution in different worldview is accounted for with respect to manager agent system.Keywords
Cloud Computing, High Proficient Computing, Data Sharing, Access Control, Deduplication, Security Preservation.- A Tool for Extirpateing Defenseless Software Vulnerability Superintend in Programs
Abstract Views :154 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, R&D Centre, East Point College of Engg. & Technology, IN
2 Department of CSE,R&D Centre, East Point College of Engg. & Technology, IN
3 Department of CSE, East Point College of Engg. & Technology, IN
1 Department of CSE, R&D Centre, East Point College of Engg. & Technology, IN
2 Department of CSE,R&D Centre, East Point College of Engg. & Technology, IN
3 Department of CSE, East Point College of Engg. & Technology, IN
Source
International Journal of Engineering Research, Vol 5, No SP 4 (2016), Pagination: 880-884Abstract
Research has revealed that Software can inherently have weaknesses which can be exploited by hackers. The global IT community has formed a group who are trying to detect constructs in a program which makes the software weak. These programming constructs which make software weak are grouped as in CWE.Keywords
Vulnerability, SecCheck, CWE, Degree of Insecurity, ISM.- A Tool for Analyzing the UML Diagrams Using UMLSECCheck 3.0 and Detecting Vulnerabilities
Abstract Views :123 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, IN
1 Department of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, IN
Source
International Journal of Engineering Research, Vol 5, No SP 4 (2016), Pagination: 914-917Abstract
The depiction of the useful, behavioral, and basic framework essentials structure focal parts of any genuine necessities detail. In the UML, for instance, practical prerequisites are communicated by use cases, their conduct demonstrated by e.g. action diagrams, and auxiliary prerequisites are caught by class models. Tragically, any product advancement strategy managing distinctive models confronts troubles guaranteeing consistency of the details and culmination as for each other. To defeat these lacks, we refine movement charts to address the issues of an appropriate displaying component for use case conduct. The refinement specifically bolsters the correct coupling of movement charts and the class model. Granularity and semantics of the methodology take into consideration a consistent, traceable move of utilization cases to area classes and for the confirmation of the space class model against the utilization case model. The approval of the utilization case model and parts of the area class model is upheld also.Keywords
Parser, Schema, Rule File UML Models, XMI Data.- An Approach for Detecting and Correcting Errors of Big Sensor Data
Abstract Views :105 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, R&D Centre, East Point College of Engg. & Technology, IN
2 Department of CSE, East Point College of Engg. & Technology, IN
3 East Point College of Engg. & Technology, IN
1 Department of CSE, R&D Centre, East Point College of Engg. & Technology, IN
2 Department of CSE, East Point College of Engg. & Technology, IN
3 East Point College of Engg. & Technology, IN
Source
International Journal of Engineering Research, Vol 5, No SP 4 (2016), Pagination: 945-947Abstract
Sensor data in scientific analysis applications with high volume, velocity, is difficult to handle using database management tools. For instant data error detection and correction, we develop novel data error detection approach which exploits computation power of hadoop-big data platform, network feature of WSN that is temporial-spatial data blocks.Keywords
Sensor Networks, Error Detection, Map Reduce, Cloud.- A Tool for Ferreting Out Software Vulnerability in Aegis & Armament Programs Redemption
Abstract Views :113 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, R&D Centre, East Point College of Engg. & Technology, IN
2 Department of CSE, East Point College of Engg. & Technology, IN
1 Department of CSE, R&D Centre, East Point College of Engg. & Technology, IN
2 Department of CSE, East Point College of Engg. & Technology, IN