myacademicproject logo

Java

  • myacademicproject categorys

    Two-Factor Data Security Protection Mechanism for Cloud Storage System

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate).

    Know More
  • myacademicproject categorys

    A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Nowadays, more and more people are motivated to outsource their local data to public cloud servers for great convenience and reduced costs in data management. But in consideration of privacy issues, sensitive data should be encrypted before outsourcing, which obsoletes traditional data utilization like keyword-based document retrieval.

    Know More
  • myacademicproject categorys

    CloudArmor Supporting Reputation-Based Trust Management for Cloud Services

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Trust management is one of the most challenging issues for the adoption and growth of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues such as privacy, security, and availability. Preserving consumers’ privacy is not an easy task due to the sensitive information involved in the interactions between consumers and the trust management service.

    Know More
  • myacademicproject categorys

    DARE A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 13 Months ago

    Data reduction has become increasingly important in storage systems due to the explosive growth of digital data in the world that has ushered in the big data era. One of the main challenges facing large-scale data reduction is how to maximally detect and eliminate redundancy at very low overheads.

    Know More
  • myacademicproject categorys

    Stable A Stable Approach for Routing Queries in Unstructured P2P Networks

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Finding a document or resource in an unstructured peer-to-peer network can be an exceedingly difficult problem. In this paper we propose a query routing approach that accounts for arbitrary overlay topologies, nodes with heterogeneous processing capacity, e.g., reflecting their degree of altruism and heterogeneous class-based likelihoods of query resolution at nodes which may reflect query loads and the manner in which files/resources are distributed across the network

    Know More
  • myacademicproject categorys

    Active Trust Secure and Trustable Routing in Wireless Sensor Networks

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously

    Know More
  • myacademicproject categorys

    Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    In recent years, as wireless sensor networks (WSNs) are widely diffused, multiple overlapping WSNs constructed on the same area become more common. In such a situation, their lifetime is expected to be extended by cooperative packet forwarding.

    Know More
  • myacademicproject categorys

    On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    The MapReduce programming model simplifies large-scale data processing on commodity cluster by exploiting parallel map tasks and reduce tasks. Although many efforts have been made to improve the performance of MapReduce jobs, they ignore the network traffic generated in the shuffle phase, which plays a critical role in performance enhancement.

    Know More
  • myacademicproject categorys

    Operational-Log Analysis for Big Data Systems

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Big data systems (BDSs) are complex, consisting of multiple interacting hardware and software components, such as distributed computing nodes, databases, and middleware. Any of these components can fail. Finding the failures root causes is extremely laborious

    Know More
  • myacademicproject categorys

    A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity it is difficult to process using on-hand database management tools or traditional data processing applications. Cloud computing provides a promising platform to support the addressing of this challenge as it provides a flexible stack of massive computing, storage, and software services in a scalable manner at low cost. Some techniques have been developed in recent years for processing sensor data on cloud, such as sensor-cloud. However, these techniques do not provide efficient support on fast detection and locating of errors in big sensor data sets. For fast data error detection in big sensor data sets, in this paper, we develop a novel data error detection approach which exploits the full computation potential of cloud platform and the network feature of WSN. Firstly, a set of sensor data error types are classified and defined. Based on that cl

    Know More
  • myacademicproject categorys

    Structured Learning from Heterogeneous Behavior for Social Identity Linkage

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    We study the problem of large-scale social identity linkage across different social media platforms, which is of critical importance to business intelligence by gaining from social data a deeper understanding and more accurate profiling of users. This paper proposes HYDRA, a solution framework which consists of three key steps: (I) modeling heterogeneous behavior by long-term behavior distribution analysis.

    Know More
  • myacademicproject categorys

    A Hybrid Cloud Approach for Secure Authorized Deduplication

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth.

    Know More
  • myacademicproject categorys

    Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 13 Months ago

    Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a

    Know More
  • myacademicproject categorys

    BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Nowadays, cloud-based storage services are rapidly growing and becoming an emerging trend in data storage field. There are many problems when designing an efficient storage engine for cloud-based systems with some requirements such as big-file processing, lightweight meta-data, low latency, parallel I/O, deduplication, distributed, high scalability.

    Know More
  • myacademicproject categorys

    PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Distributed m-healthcare cloud computing system significantly facilitates efficient patient treatment for medical consultation by sharing personal health information among healthcare providers. However, it brings about the challenge of keeping both the data confidentiality and patients’ identity privacy simultaneously.

    Know More
  • myacademicproject categorys

    Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner.

    Know More
  • myacademicproject categorys

    Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    We propose a new decentralized access control scheme for secure data storage in clouds, that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the ser without knowing the user’s identity before storing data.

    Know More
  • myacademicproject categorys

    PACK Prediction-Based Cloud Bandwidth and Cost Reduction System

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage

    Know More
  • myacademicproject categorys

    Best Keyword Cover Search

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    It is common that the objects in a spatial database (e.g., restaurants/hotels) are associated with keyword(s) to indicate their businesses/services/features. An interesting problem known as Closest Keywords search is to query objects, called keyword cover, which together cover a set of query keywords and have the minimum inter-objects distance.

    Know More
  • myacademicproject categorys

    Progressive Duplicate Detection

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Duplicate detection is the process of identifying multiple representations of same real world entities. Today, duplicate detection methods need to process ever larger datasets in ever shorter time: maintaining the quality of a dataset becomes increasingly difficult.

    Know More