Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Narasimha Rao, P. V.
- A Unique Light Weight Time Stamp Based Distributed Security Protocol for Wireless Ad hoc Network
Abstract Views :159 |
PDF Views:3
Authors
Affiliations
1 Jawaharlal Nehru Institute of Technology (JNIT), Hyderabad, IN
2 Tenali Engineering College, Tenali, Department of Computer Science, IN
3 Jawaharlal Nehru Institute of Technology (JNIT), Department of Computer Science, Hyderabad, IN
4 Jawaharlal Nehru Institute of Technology (JNIT), Department of Engineering Sciences, Hyderabad, IN
1 Jawaharlal Nehru Institute of Technology (JNIT), Hyderabad, IN
2 Tenali Engineering College, Tenali, Department of Computer Science, IN
3 Jawaharlal Nehru Institute of Technology (JNIT), Department of Computer Science, Hyderabad, IN
4 Jawaharlal Nehru Institute of Technology (JNIT), Department of Engineering Sciences, Hyderabad, IN
Source
Wireless Communication, Vol 3, No 2 (2011), Pagination: 95-102Abstract
A wireless network is one where two or more nodes communicate with each other over a wireless medium like air. Such communications which do not require any specialized central station or base station are known as Mobile Adhoc NETwork (MANET). Security is a major concern in such networks as the wireless data are prone to more vulnerability and eavesdropping. Security in such networks is provided by MAC layer as encryption and authentication. Several encryption and authentication schemes are proposed to strengthen the security of the network. But stronger encryption technique leads to more energy loss due to nodes because of higher processing cycles and also contribute to higher delay due to longer time the packets spends in the queue. In this work a unique timestamp based network security technique is proposed. The technique minimizes the encryption packet overflow which is induced due to public key exchange, and derives the public key directly from the neighbor‘s information which is propagated through routing information exchange. The simulation is performed with omnet++ simulator and the results show that the energy overhead due to encryption or performance compromise are minimum in the proposed system. Further as the protocol is embedded in the network layer it is easily adoptable to any existing architecture without modifying the MAC or Physical layer standard or protocol.Keywords
AODV, Cryptography, MANET, Time Stamp, Wireless Security.- An Optimization Procedure for Dropping Information Deduplication in Crossbreed Cloud Technique
Abstract Views :219 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Institute of Aeronautical Engineering, Dundigal − 500043, Hyderabad, Telangana, IN
1 Department of Computer Science and Engineering, Institute of Aeronautical Engineering, Dundigal − 500043, Hyderabad, Telangana, IN
Source
Indian Journal of Science and Technology, Vol 11, No 44 (2018), Pagination: 1-8Abstract
Objectives: In computing, facts/data deduplication is a particular statistics firmness method for removing reproduction copy of repeating records. Intelligent compression or single-instance storage technique make sure that merely single sole request of information is retained on storage space media, such as disk, flash or tape. Unneeded data blocks are replaced with a pointer to the sole data copy. Methods: This study introduces focus on comparing the clouds via authorization steps, which incorporates file token technology and proportion token generation, in competition. To the convergent encryption and document add steps. We compare the overhead through using quite a lot of distinctive reasons. Findings: In cloud computing reproduction copies of repeat facts within the cloud referred to as Data Deduplication, and broadly used in cloud garage to decrease the amount of garage space and stay bandwidth. Data deduplication removes reproduction copies of equal documents can be existed in Cloud, if so best one reproduction is maintained and replacing the alternative copies with the original reproduction. To defend the privateness of sensitive Information on similar instance as maintaining deduplication, security algorithm is proposed for statistics safety. Application: We enforce a prototype of our proposed legal replica test scheme and behavior tested experiments the usage of our prototype. It shows planned legal duplicate test scheme incurs minimum overhead in comparison to ordinary operations.References
- Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. A hybrid cloud approach for secure authorized de duplication, IEEE Transactions on Parallel and Distributed System. 2015; 26(5):1−12. https://doi.org/10.1109/TPDS.2014.2318320.
- Kakariya G, Rangdale S. A hybrid cloud approach for secure authorized de duplication, International Journal of Computer Engineering and Applications. 2014; 8(1): 1−7.
- Leavitt N. Hybrid clouds move to the forefront, Computer. 2013; 46(5):15−18. https://www.researchgate.net/publication/ 260584421_Hybrid_Clouds_Move_to_the_Forefront.
- Zhang H, Jiang G, Yoshihira K, Chen H, Saxena A. Intelligent Workload Factoring for a Hybrid Cloud Computing Model. Proceedings of the 2009 Congress on Services, Washington, DC.; 2009. p. 701−08. https://doi.org/10.1109/SERVICES-I.2009.26. PMCid: PMC2630577.
- Sotomayor B, Montero RS, Llorente IM, Foster I. Virtual infrastructure management in private and hybrid clouds, IEEE Internet Computing. 2009; 13(5):14−22. https://doi.org/10.1109/MIC.2009.119.
- Bugiel S, Nurnberger S, Sadeghi A, Schneider T. Twin clouds: An architecture for secure cloud computing. In: Workshop on Cryptography and Security in Clouds; 2011.p. 32−44.
- Douceur JR, Adya A, Bolosky WJ, Simon D, Theimer M. Reclaiming space from duplicate files in a server less distributed file system. In: ICDCS; 2002. p. 617–24.