Encrypted data management with deduplication in cloud computing
Cloud computing plays an important role in supporting data storage, processing, and management in the Internet of Things (IoT). To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. However, duplicated data that are encrypted under different encryption schemes could be stored in the cloud, which greatly decreases the utilization rate of storage resources, especially for big data. Several data deduplication schemes have recently been proposed. However, most of them suffer from security weakness and lack of flexibility to support secure data access control. Therefore, few can be deployed in practice. This article proposes a scheme based on attribute-based encryption (ABE) to deduplicate encrypted data stored in the cloud while also supporting secure data access control. The authors evaluate the scheme's performance based on analysis and implementation. Results show the efficiency, effectiveness, and scalability of the scheme for potential practical deployment. To ensure data privacy, existing research proposes to outsource only encrypted data to CSPs. However, the same or different users could save duplicated data under different encryption schemes at the cloud. Existing solutions for deduplication are vulnerable to brute-force attacks2 and can’t flexibly support data access control and revocation (see the “Related Work in Data Deduplication” sidebar for a discussion of some other work in this area). Existing industrial solutions fail in encrypted data deduplication. A scheme based on attribute-based encryption (ABE) is proposed to deduplicate encrypted data stored in the cloud while at the same time supporting secure data access control. proposes to outsource only encrypted data to CSPs. However, the same or different users could save duplicated data under different encryption schemes at the cloud. Although cloud storage space is huge, this kind of duplication wastes networking resources, consumes excess power, and complicates data management. intra-user deduplication and interdeduplication.6 In their scheme, the ciphertext C of convergent encryption is further encrypted with a user key and transferred to the servers. However, it doesn’t deal with data sharing after deduplication among different users. Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. In this project the following modules are used: i) Cloud Computing ii) Inter And Intra User iii) Deduplication. Various cloud service providers (CSPs) offer huge volumes of storage to maintain and manage IoT data, which can include videos, photos, and personal health records. These CSPs provide desirable service properties, such as scalability, elasticity, fault tolerance, and pay per use. Thus, cloud computing has become a promising service paradigm to support IoT applications and IoT system deployment. Thus, saving storage is becoming a crucial task for CSPs. Deduplication can achieve high space and cost savings, reducing up to 90 to 95 percent of storage needs for backup applications and up to 68 percent in standard file systems. Inter And Intra User:- At the same time, data owners want CSPs to protect their personal data from unauthorized access. CSPs should, therefore, perform access control based on the data owner’s expectations. In addition, data owners want to control not only data access but also its storage and usage. a data owner that stores its data at the CSP (we assume there’s only one data owner for one data M); and • data holders (ui, i = 1, . . . , n) that are eligible data users and could save the same data as the data owner at the CSP. That is, the same data, although in an encrypted form, is only saved once at the cloud but can be accessed by different users based on the data owners’ policies. Data-Deduplication:- Data deduplication should cooperate with data access control mechanisms. That is, the same data, although in an encrypted form, is only saved once at the cloud but can be accessed by different users based on the data owners’ policies. current industrial deduplication solutions can’t handle encrypted data. Existing solutions for deduplication are vulnerable to brute-force attacks and can’t flexibly support data access control and revocation (see the “Related Work in Data Deduplication” sidebar for a discussion of some other work in this area). Few existing schemes for cloud data access control support data deduplication simultaneously, and few can ensure flexibility and security with a sound performance for cloud data deduplication that data owners control directly. Algorithms:- Cyphertext Policy ABE (CP-ABE) or Key Policy ABE (KP-ABE):- Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country in which he lives, or the kind of subscription he has). In such a system, the decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext. A crucial security aspect of Attribute-Based Encryption is collusion-resistance: An adversary that holds multiple keys should only be able to access data if at least one individual key grants access. Encryption Algorithm:- In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm Decryption. There are many modern key-based cryptographic techniques. These are divided into two classes: symmetric and asymmetric (also called public/private) key cryptography. In symmetric key cryptography, the same key is used for both encryption and decryption. H/W System Configuration: System : Pentium –IV 2.4 GHz RAM : 256MB(min) Hard Disk : 40 GB Key Board : Standard Windows Keyboard S/W System Configuration: Operating System : Windows/XP/7 Application Server : Tomcat5.0/6.X Front End : HTML, Java, JSP Scripts : JavaScript Server-side Script : Java Server Pages Database : Mysql 5.0 Database Connectivity : JDBC.
Published by: Pokala Phanitej, Y. Suresh
Author: Pokala Phanitej
Paper ID: V4I6-1297
Paper Status: published
Published: November 30, 2018
Effect of partial replacement of sand by glass powder and steel powder over the properties of M-30 concrete
In the present research, a series of experiments had been performed to compare the use of glass powder and steel powder as partial replacement of sand in different proportions. Concrete mixes are modified by 10%, 15% and 20% and 25% of glass powder and steel powder in replacement. The inclusion of glass powder increases the compressive strength up-to certain proportions. It has also been noted that with the increase in the content of glass powder decreases the slump value or workability. It has also been noted that with the increase in the content of supplementary materials decreases the slump value or workability. Comparatively higher early strength gain (7-days) is obtained with steel powder concrete.
Published by: Achal Jain, Nitin Thakur
Author: Achal Jain
Paper ID: V4I6-1295
Paper Status: published
Published: November 30, 2018
A study on strengthening of soil using stabilized flyash
In the present study, I tried to prove soil stabilization using stabilized flyash. for the stabilization of flyash, we need to improve the flash properties by adding some admixtures. in the present study, we are using lime and sodium silicate as additives to improve the soil properties. Individual geotechnical parameters like grain size distribution, liquid limit, OMC, MDD, Specific gravity and angle of internal friction of Fly ash were determined and then Fly ash was mixed with different proportions of lime (2-15%) and sodium silicate (1-4%). These mixes were tested to obtain the optimum percentage of lime and sodium silicate. The variation in shear parameters like cohesion and angle of shearing resistance was studied by conducting a direct shear test. All the tests were performed after a time period of 3hours starting from the completion of preparation of the sample. Each test was performed for the normal stresses of 0.5kg/cm2, 1kg/cm2, 1.5kg/cm2, 2kg/cm2 and 2.5 kg/cm2. The results are compiled in a graphical form to observe the trends for shear parameters. The results show remarkable improvement in strength characteristics for higher percentages of lime and sodium silicate. The Major challenge on behalf of engineers especially civil engineers is the disposal of industrial waste products and their storage. Nowadays most of the industries reusing the wastes in different areas like civil constructions, treatment of materials and others. This reuse of wastes is essential to overcome the hazardous effects of wastes on the environment. Fly Ash is one of the industrial wastes produced every year throughout the country. Fly ash is a fine powder obtained from burning of coal during the production of electricity. Disposal of Fly ash is a big problem, to minimize the disposal of Fly ash into large land, it was used as a construction material in civil engineering works like building materials embankments, and bricks making etc.
Published by: Sakshi Singh Rana, Chappa Damodar Naidu
Author: Sakshi Singh Rana
Paper ID: V4I6-1310
Paper Status: published
Published: November 29, 2018
Study on effective utilization of waste materials in the construction of pavements
Research into new and innovative uses of waste material is continually advancing. Many highway agencies, a private organization, and individuals are in the process of a wide variety of studies and research projects concerning the feasibility, environmental suitability, and performance of using recycled products in highway construction. The amount of wastes has increased year by year and the disposal becomes a serious problem. Particularly, the recycling ratio of the plastic wastes in life and industry is very low and many of them have been reclaimed for the reason of unsuitable ones for incineration. It is necessary to utilize the wastes effectively with technical development in each field. Expansive soils are so widely spread that it becomes impossible to avoid them for highway construction to keep the network structure for mobility and accessibility. However, the roads constructed on expansive soils suffer extensive damage and distress resulting in large economic losses running to billions of dollars. As thermal power plants are spatially distributed all over the country, utilization of flyash from these plants for the road construction, not only helps to consume bulk quantities of fly ash solving its disposal problem to a certain extent but also to satisfy the construction requirements. Reinforcement of soils with synthetic fibers is potentially an effective Technique for increasing soil strength. In recent years, this technique has been suggested for a variety of geotechnical applications ranging from retaining structure and earth embankments to subgrade stabilization beneath footings and pavements. Research on a different type of reinforcement and materials has been conducted by several investigators. However, the amount of information available on randomly oriented fiber reinforcement is still limited. Here an attempt is made to the suitability of different types of waste plastics strips and waste tire rubber chips reinforcing with gravel and flash in flexible pavement system on expansive soil subgrade.
Published by: Kola Chandra Mouli, Chappa Damodar Naidu
Author: Kola Chandra Mouli
Paper ID: V4I6-1303
Paper Status: published
Published: November 29, 2018
Effect of progressive muscular relaxation technique and autogenic relaxation technique on pre competitive state anxiety and self-confidence in athletes
Pre-test and Post-test control group design. Participants: 45 subjects were selected on the basis of their CSAI-2R score, they were randomly allocated to one of the three groups. Group 1 (progressive muscular relaxation) group 2 (autogenic relaxation) group 3 (control). Intervention: Progressive muscular relaxation technique and Autogenic relaxation technique for 15-20 minutes. Main outcome measures include somatic anxiety, cognitive anxiety, self-confidence. There was a significant reduction in somatic anxiety & cognitive anxiety and improved self-confidence found in both groups 1& 2 than group 3 (p < 0.05) whereas no significant difference observed in group 1 and group 2. From the result of the study it was concluded that relaxation technique is an effective intervention for reducing pre competitive state anxiety and improving self-confidence in athletes. As both progressive muscular relaxation & autogenic relaxation technique were significantly effective in reducing competitive state anxiety and improving self-confidence than the control group.
Published by: Dr. Nitin Sakhare, Kalpana Sharma, Anjali Syal
Author: Dr. Nitin Sakhare
Paper ID: V4I6-1292
Paper Status: published
Published: November 29, 2018
Detecting distributed DOS attacks using Multivariate Correlation Analysis
This paper focuses on identification of DDoS using MCA technique. The intention of this paper is to identify DDoS attack. For that MCA technique use. MCA technique is useful for identification of DDoS attack. MCA is for accurate network of packet traffic. MCA technique uses the anomaly detection approach and triangle area base approach. Anomaly based approach is for finding known and unknown type of attack. Triangle area base approach is for improving the speed of MCA process. In this to test real world data for false positive rate.
Published by: Shital P. Jade
Author: Shital P. Jade
Paper ID: V4I6-1155
Paper Status: published
Published: November 29, 2018
