- Filter by:
-
Content Type
-
Topic
-
In the approach of network management, Wireless Sensor Networks (WSNs) has been a consistent focus of analysis because of its potential data aggregation procedures in unfriendly and unsecured environment. As of now, remote sensor system is still under innovative work and development with regards to security and energy productivity. The...
Download Now -
Securing Privacy Assistance for Protecting Location Based Queries Using Enhanced Symmetric Key
While satisfying security requirements is crucial for secure group communications in wireless systems, mobile group applications often have application-specific performance requirements in terms of timeliness, reliability, and system re-configurability. Often there exists a tradeoff between security versus performance goals since security protocols may introduce undue computational and network overheads which...
Download Now -
A Privacy-Preserving Access Control with Robust Data Authenticity for Cloud Group
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to...
Download Now -
Cloud storage is most advanced technology. Now-a-days, everyone using the cloud storage thinks about the security of sensitive data. To solve this issue cloud providers taking lot of approaches as TPA, client side and server side encryption. Here, the authors propose a novel architecture that integrates with cloud databases services...
Download Now -
Large-Scale Data Processing Platform Based on a Peer-to-Peer Platform
The organizations are utilized corporate system to shares the data among every single taking part companies. These technologies are chiefly used to lessen the operational cost and build the income. The organizations have some interesting difficulties when sharing and preparing the data in data administration framework, for example, versatility, execution,...
Download Now -
A Survey on VM Consolidation for Energy Efficient Green Cloud Computing
Energy consumption has been a main concern to the environment as the scale of cloud data centers become larger due to the ease of internet usage, storage and processing on cloud. As a consequence of establishment of large number of data centers, the energy consumption grows rapidly. Also they contribute...
Download Now -
Alert Aggregation Based Pattern Classifier for Effective Network Intrusion Detection System
Pattern classification can be characterized as "The demonstration of taking in crude information and making a move in light of the gathering of the method". Mostly the pattern classification techniques are utilized as a part of security applications, for example, biometrics based individual recognition and interruption recognition in PC networks...
Download Now -
Wireless ad hoc network is a network formed without any central infrastructure which consists of nodes that use a wireless interface to send packet data. Linkage error and malicious packet dropping are two sources for packet losses in wireless ad hoc network. A sequence of packet losses are present in...
Download Now -
A Study on MAC Protocols for Wireless Ad Hoc Network
Wireless ad hoc networks are one of recent most interesting rising technologies. An ad hoc network consists of nodes that must communicate with each other without relying on any infrastructure or pre-defined hierarchy. Medium Access Control (MAC) protocols provide a means to nodes to access the wireless medium efficiently and...
Download Now -
Data Integrity and Security in Cloud Computing Using Cryptography Mechanism
Modern technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to...
Download Now