International Conference On Progressive Research In Applied Sciences, Engineering And Technology (ICPRASET 2K18)
(Volume-4)

CSE

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Cloud Based Secured Health Record Storage System With Key Generation And Attribute Based Encryption
Country
::
India
Authors
::
P.Arun kumar || S.Santhosh kumar || A.ShahulAmeed || Dr.A.jagan,
Page
::
01-05

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. We first introduce a baseline approach in which each user holds an independent master key for encrypting the convergent keys and outsourcing them to the cloud.................

 

Keywords: -................

[1]. M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in SecureComm'10, Sept. 2010, pp. 89–106.
[2]. H. L¨ohr, A.-R. Sadeghi, and M. Winandy, "Securing the e-health cloud," in Proceedings of the 1st ACM International Health
Informatics Symposium, ser. IHI '10, 2010, pp. 220–229.
[3]. M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud
computing," in ICDCS '11, Jun. 2011.
[4]. "The health insurance portability and accountability act." [Online]. Available:http://www.cms.hhs.gov/HIPAAGenInfo/01
Overview.asp
[5]. "Google, microsoft say hipaa stimulus rule doesn't apply to them," http://www.ihealthbeat.org/Articles/2009/4/8/.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Optimizing The Cloud Service Provider And Its User In Cloud Computing
Country
::
india
Authors
::
N.Mohamedrufai || K.Vishnuprasad Narayanan || T.Deepak Kumar || Mrs.B.Lakshmidevi
Page
::
06-08

In this paper, we try to design a service mechanism for profit optimizations of both a cloud provider and its multiple users. We consider the problem from a game theoretic perspective and characterize the relationship between the cloud provider and its multiple users as a Stackelberg game, in which the strategies of all users are subject to that of the cloud provider. The cloud provider triesto select and provision appropriate servers and configure a proper request allocation strategy to reduce energy cost while satisfying its cloud users at the same time. We approximate its servers selection space by adding a controlling parameter and configure an optimal request allocation strategy. For each user, we design a utility function which combines the net profit with time efficiency and try to maximize its value under the strategy of the cloud provider. We formulate the competitions among all users as a generalized Nash equilibrium problem (GNEP). We solve the problem by employing variation inequality (VI) theory and prove that there exists a generalized Nash equilibrium solution set for the formulated GNEP. Finally, we propose an iterative algorithm (IA), which characterizes the whole process of our proposed service mechanism. We conduct some numerical calculations to verify our theoretical analyses. The experimental results show that our IA algorithm can benefit both of a cloud provider and its multiple users by configuring proper strategies.

[1]. D. Cox, E. Jovanov, and A. Milenkovic, ―Time synchronization for ZigBee networks,‖ in Proc. of the Thirty-Seventh Southeastern Symposium, System Theory, pp. 135-138, 2005.
[2]. Wireless Medium Access Control (MAC) and Physical Layer Specifications for Low Rate Wireless Personal Area Networks
(LRWPANS), IEEE standard for Information Technology-Part 802.15.4- 2003.
[3]. Wireless Medium AccessControl (MAC)and Physical Layer (PHY) Specifications for Low–Rate Wireless Personal Area Net2 works (LRWPANs), IEEE Standards 802.15.4TM-2003.
[4]. Wireless Medium Access Control (MAC) and Physical Layer( PHY) specifications for low———Rate Wireless Personal Area Networks (LR - WPANs), IEEE 802. 15. 4.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Patterns And Machine Learning For The Extraction Of Action Relations In Discharge
Country
::
India
Authors
::
B. Jayashree || V.Kalpana || Mrs.T.Uma mageswari
Page
::
09-14

This paper focuses on the mapping of natural language sentences in written stories to a structured knowledge representation. This process yields an exponential explosion of instance combinations since each sentence may contain a set of ambiguous terms, each one giving place to a set of instance candidates. The selection of the best combination of instances is a structured classification problem that yields a high demanding combinatorial optimization problem which, in this paper, is approached by a novel and efficient formulation of a genetic algorithm, which is able to exploit the conditional independence among variables, while improving the parallel scalability. The automatic rating of the resulting set of instance combinations, i.e. possible text interpretations, demands an exhaustive exploitation..............

 

Keywords: - Natural language, State-of-the-art, Structured knowledge representations

[1]. Efficient Estimation of Word Representations in VectorSpace -Tomas Mikolov,2013.
[2]. Minimal Narrative Annotation Schemes and The Applications Elahe Rahimtoroghi, Thomas Corcoran, Reid Swanson, and Marilyn A. WalkerKenji Sagae and Andrew S. Gordon ,2014.
[3]. Vincenzo Lombardo. and Antonio Pizzo. Ontology based visualization of characters intentions. In Alex Mitchell, Clara Fernndez- Vara, and David Thue, editors, Interactive Storytelling.
[4]. On the Need for Imagistic Modeling in Story Understanding. Eric Bigelow1, Daniel Scarafoni2, Lenhart Schubert3∗, and Alex Wilson4,2015
[5]. Karl Pichotta and Raymond J Mooney. Learning statistical scripts with lstm recurrent neural networks. In Proceedings of the
30th AAAI Conference on Artificial Intelligence, 2015

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Secure Multi Owner Data Sharing For Dynamic Groups In The Cloud
Country
::
India
Authors
::
S.Seethalakshmi || S. Saraswathi || Dr.V.Raji
Page
::
15-19

The main purpose of our paper is to share the data in the cloud. In this paper, we shown that how to share information securely, efficiently and flexibly with others on cloud storage. For this, we propose key aggregate cryptosystem, which creates a standard size cyber text, which can assign them to such encryption rights. By combining a secret key, we can create a small single key. By using this compact key, we can send others or save in a much less secure storage. First, setting up the next general layout of the data owner The KeyGen algorithm creates a general or master / secret key. By using this key, a user can convert simple text to speech. The next user will give input as the primary secret key through the extract function; It produces output as the overall cryptographic force...............

 

Keywords - Data Sharing, Dynamic Groups, Cloud, Cryptosystem.

[1]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,"A view of cloud computing," Commun. ACM, vol. 53, no. 4,pp. 50–58, Apr. 2010.

[2]. S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proc.Int. Conf. Financial Cryptography Data Security, Jan. 2010, pp. 136–149.

[3]. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,"Plutus: Scalable secure file sharing on untrusted storage,"in Proc. USENIX Conf. File Storage Technol., 2003, pp. 29–42.

[4]. E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securingremote untrusted storage," in Proc. Netw. Distrib. Syst. SecuritySymp., 2003, pp. 131–145.

[5]. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improvedproxy re-encryption schemes with applications to secure distributedstorage," in Proc. Netw. Distrib. Syst. Security Symp., 2005,pp. 29–43.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Energy Efficient Routing In Sensor Network Through Clustering
Country
::
India
Authors
::
G.Manimegalai || P.Santhiya || P.Shanmugam
Page
::
20-25

In recent years, Data Gathering plays an important role in wireless sensor network. The data can be gathered using two methods. First, Static Sink can be used to collect data from sensors and routed to mobile station via multi hop communication. This increases the delay and consumes high energy. To reduce the consumption of energy, An cluster Algorithm With Energy Efficient Technique, is proposed. In this method, the multiple tinybee are dispatched from the mobile element and comes back to the mobile element with aggregated data. Thus it reduces the tour length of the mobile element and energy can be efficiently utilized. In this paper, we will be proposing an energy efficient technique that can be used to find out shortest path from a source node to the destination node using cluster algorithm. Cluster collects the data and then sends to base station. This proposed method achieves the energy efficient

 

Keywords -Networks,Mobile element,cluster algorithm, tinybee, energy efficient,wireless sensor network.

[1]. C. Fok, G. Roman, and C. Lu, "Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications," Proceedings of 25th IEEE International Conference on Distributed Computing Systems 2005, pp.653-62.
[2]. Crossbow Technology, Inc. Available: http://www.xbow.com
[3]. DUST Networks, Inc. Available: http://www.dustnetworks.com
[4]. U.C. Berkeley EECS Department. TinyOS Community Forum, Available: http://www.tinyos.net
[5]. C. Fok, G. Roman, and C. Lu, Agilla, Available: http://mobilab.wustl.edu/projects/agilla

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Traffic Decorrelation Techniques For Countering A Global Eavesdropper In Wsns
Country
::
India
Authors
::
R.Sindhuja || S.Subasri || M.Thilagavathi || Mrs.K.subha
Page
::
26-29

We address the problem of preventing the inference of contextual information in event-driven wireless sensor networks (WSNs). The problem is considered under a global eavesdropper who analyzes lowlevel RF transmission attributes, such as the number of transmitted packets, inter-packet times, and traffic directionality, to infer event location, its occurrence time, and the sink location. We devise a general traffic analysis method for inferring contextual information by correlating transmission times with eavesdropping locations. Our analysis shows that most existing countermeasures either fail to provide adequate protection, or incur high communication and delay overheads. To mitigate the impact of eavesdropping, we propose resourceefficient traffic normalization schemes. In comparison to the state-of-the-art, our methods reduce the communication overhead by more than 50%; and the end-to-end delay by more than 30%. To do so, we partition the WSN to minimum connected dominating sets that operate in a round-robin fashion. This allows us to reduce the number of traffic sources active at a given time, while providing routing paths to any node in the WSN. We further reduce packet delay by loosely coordinating packet relaying, without revealing the traffic directionality.

[1] D. Cox, E. Jovanov, and A. Milenkovic, ―Time synchronization for ZigBee networks,‖ in Proc. of the Thirty-Seventh Southeastern Symposium, System Theory, pp. 135-138, 2005.
[2] Wireless Medium Access Control (MAC) and Physical Layer Specifications for Low Rate Wireless Personal Area Networks
(LRWPANS), IEEE standard for Information Technology-Part 802.15.4- 2003.
[3] Wireless Medium AccessControl (MAC)and Physical Layer (PHY) Specifications for Low–Rate Wireless Personal Area Net2
works (LRWPANs), IEEE Standards 802.15.4TM-2003.
[4] Wireless Medium Access Control (MAC) and Physical Layer( PHY) specifications for low———Rate Wireless Personal Area
Networks (LR - WPANs), IEEE 802. 15. 4. W. LI, et al, Introductory and actual combat of Zigbee wireless networks, Beijing
University of Aeronautics And Astronautics Press, April 2007. [6] Zigbee Specification, Zigbee Alliance, June, 2005.
[5] J. Shen and L. Hao, Zigbee MCU Principal and Application based on STM32W Radio Frequency, Beijing University of
Aeronautics And Astronautics Press, September 2010