A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting

Size: px
Start display at page:

Download "A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting"

Transcription

1 A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting Asrani Nitin 1, Ashutosh Zajariya 2, Mangesh Sutar 3, Mukund Desai 4, K. D. Bamane 5 Division of Bachelor of Engineering in Information Technology, D. Y. Patil College of Engineering, Akurdi, Pune, Maharashtra, India Abstract India ranks third in population around worldwide. Thus to handle transportation for such a large population a good and a strong system is need. Indian railroad is the second largest transportation system around world. In the vicinity of 2.5 crores passenger on daily basis are served by Indian Railway. Therefore to handle such a huge crowd conveniently modern amelioration of technology has been selected exceptionally the reservation system to bring gratification, performance, capability and transparency. Gradually, it was observed that the outcome of such adoption has piggyback various confrontations such as new online Tatkal booking system policy i.e. only two tickets can be booked per IP address between 1 a.m. to 12 noon and polymorphous user IDs issue. Howbeit, various reformative measures have been taken on the above highlighted issues. Thus, this paper is attempt to provide a answer for above highlighted issues i.e. by using UID registration numbers for reducing multiple IDs along with run interference for increasing limit to the number of Tatkal (online) booking. The proposed model solves the problem up to an admissible level. Pseudonymous System enables the service providers such as the website administrator to identify the misbehaving users. Since both the abusive and non-abusive users remain anonymous to the service providers. Also this paper is an attempt for the solution of blacklisting the user through administrator side. Keywords Indian Railway, Indian Railway Reservation System, Unique Identification Number (Aadhar Card Number), Blacklist and system. I. INTRODUCTION Indian railway is the fourth largest railroad network after Russia. Approximately 2.5 crores of passengers [1] travel per day by train. According to the Railway Ministry of India per day 15 lakh tickets are being sold by 8838 passenger ticket counters and 3.74 lakh tickets trough IRCTC website, out of which 1.7 lakh Tatkal tickets are booked per day [1]. The main motto of the Tatkal e-ticket booking system is to coddle for urgency travelling needs. But the present system is afflicted with copious issues like unavailability of tickets in a very short period of time. In order to overcome these problems Railway Ministry Board has made some major changes. 74 After these changes by board still some issues are grind up to date. We are concentrating on such problems and suggesting solutions for the same. II. ABSTRUSE BETTERMENT IN ONLINE RAILWAY RESERVATION SYSTEM These changes were taken into consideration by the railway reservation board for booking of e-tatkal tickets from year 213 [3]: a. Tatkal ticket can be booked only before a day of journey. b. w online website of railway ticket booking of India i.e. IRCTC is maintaining high capacity of data server and also increased their internet speed bandwidth to 45 Mbps which was earlier 344 Mbps. c. Only one user against a verified unique ID can register through the reservation website. d. Only a single session per user ID check is permitted. e. Currently 2 tickets are booked in a single minute of time which could be increased up to 72 tickets as per the development and research made by board authority [4]Error! Reference source not found.. III. EXPLORATION AMBITION ISSUES As per the news released by the Railway Control Board the agents and many other people have created multiple user IDs for the online reservation website. Due to which the controlling authority of website have deactivated more than 7.5 lakh of IDs which were created by such individuals. The issues raised by the common man have indulged the authorities to take some strict actions in the current booking system. Railways have taken some of the actions like change of Tatkal booking time, restrictions on agents, deactivation of multiple user IDs and many more. But all this could not help in reduction of the availability of tickets mainly Tatkal tickets for the genuine user. According to railway reservation board the single IP address can book only two tickets and a single ticket can contain only 6 maximum numbers of people was taken into consideration for internet booking.

2 This policy was failed for the corporation and organisations. A huge firm contain a large number of people, where a firm could not book tickets in emergency case. We are proposing our model based on two terminologies which are as follows: a. Aadhar Card Number for deduction of multiple user IDs b. Blacklisting of Misbehaving Users Using Pseudonymous System In reference to above two we would also like to decrease the ticket count to a single ticket for a single IP address instead of two tickets which is followed at present. IV. BASIC TERMINOLOGIES A. Aadhar Card Number Government of India has introduced a unique identification number which is known as Unique Identification Authority of India (UIDAI) [2] also known as Aadhar Number, which is a randomized twelve digit number generated for identification of individual. This number i.e. Aadhar Number is not generated on the basis of any caste, religion, sex or location. It is the proof of identity of an individual. Any individual of any caste, religion, or sex can enrol freely for this identification identity which says that an individual is respected citizen of India. Through this identification number an individual can access various facilities like banking, cell phone connections, gas connections, and various Government and n-governments Aided Services in India. B. Pseudonymous System Pseudonymous System is the system which provides an authenticated connection in more secured way. As we know that the reservation system of railway is governed by some service provider we can apply the PS terminology into that system. This is because the PS helps the service providers to detect the misbehaving of users easily. The PS is based on two of credible managers particularly Pseudonym Manager (PM) and the Blacklist Manager (BM). The website administrator here in our case the ticket booking authority or we can say the IRCTC, must register their server s static IP address with the PS to get an access over it. Most of internet users uses the onion routing (TOR) for hiding the identity. Hiding the identity here means the hiding of the IP address. Here both the source and destination IP address are been hidden (in TOR). Thus no one comes to know who is communicating with whom. Due to which the security of the public networks are in danger like Wikipedia and many government sites like Railway Reservation Websites. Due t TOR the genuine users also get affected. The main purpose of introducing the PS in Railway Reservation System Website is to Blacklist the User due to its unauthorized activities. Both the service provider as well as client must be registered with the PS to enjoy the facilities. Here the user activities are monitored by the PS, it conveys a message to the website administrator about the misuse of the website and administrator disconnects the user from a particular session. The criteria for the misbehaving are set by the administrator of website. If and only if these criteria are indulged to be incorrect or dissatisfied by the norms of administrator, blacklisting of the user is done. V. METHODOLOGY AND PROPOSED SYSTEM Initially our research explores the various drawbacks of existing system. For this purpose we have studied various systems which would help in development of the system that will overcome the underlying causes. For this purpose we also designed and took the public survey. We will be developing a system which would make a interface with PS. A. A Proposal Based on Unique Identification Number (Aadhar Number) As we know that the Railway Reservation Board of India is facing a problem in website maintenance of use of multiple user IDs by an individual client or user accessing the website. Any individual can create n number of the IDs with the help of a unique IDs which would be in control of that user. There is solution to this issue, that using UID number for registration to the IRCTC websites login ID. It should be a mandatory process for the existing user to avail the ongoing facilities. The registered UID number and its owner name will be verified through the database for Aadhar Number of Indian Government. Only two Tatkal tickets can be booked using single IP address between 1 a.m. to 12 noon which in proposed system we would like to decrease i.e. one ticket per IP address. B. Mechanism for Implementing Model To implement the proposed idea following mechanisms should be taken into consideration: (this mechanism is only for the Aadhar card registration or Aadhar Related Concept) 75

3 1) Reduction in Multiple IDs a. The user will sign up to the website and provide the details along with the UID Number which is mandatory. b. UID number will be registered only once and can t be used again for any new login ID request. c. After being successfully registered user can avail all facilities provided by the website. d. Existing user also need to update the UID for continuity of the facilities provided by the website. e. Else the existing user will not be able to login to the website. 2) Provision for Corporations and Organisations a. Each organization will have to register themselves to the websites with their public IP address. b. When the user will book a ticket he/she will check out the registration else register the organization and avail the facilities. C. A Proposal Based on Blacklisting of Users The PS designed by us will consist of the Pseudonym Manager (PM) and Blacklist Manager (BM). The BM contains a combination of associating tokens to establish the connection with the website. The BM knows only the pseudo random number (PRN) of a precise client who wants to access the facilities provide by the website. In our case the prevention of increasing the number of tickets for a single IP address is a threat for the concept of project and relevance research for the same. For which the PRN number plays an important role. Here the administrator can blacklist such precise user by obtaining the PRN number. Server then blacklists such user without the knowledge of the IP address of client and due to which the administrator can easily blacklist the user in accessing their website; this feature of blacklisting will help in making our research about the project that the system to build is more secure, efficient, and performance is high and also our system will possess a property of unauthorized authentication resistance. Here with the help of the PS our railway reservation system is more secure, performance of system is high and fast authentication is provided while booking of tickets. 1) Architecture of Interface The overall architecture of interface consists of four components namely server (Railway Reservation Board Server), client, and pseudonym manger and blacklist manager. 2) Steps of Blacklisting Mechanism Process at client s side: a. The user must connect to the Pseudonym Manager (PM) directly. b. If user is not registered with PM he/ she have to register, and acquire pseudonym. This is because of the knowledge of TOR is with the PM. c. Here the PM identifies the IP address of client and generates the PRN for the client. d. The user then connects to the blacklist manager (BM) through the TOR with the help of introduction of pseudonym and communicates with the server which provides the required service. Figure 1: Connection to Server te: Here BM doesn t know about the clients IP address but have an idea of the PRN of client s. Process at server s side: a. The website administrator has to register with the PS of the overall architecture of system. b. Service provider here can have an idea of pseudonym random number i.e. PRN of the client. c. When the user misbehaves with the website the server then complaints the BM and server gets information from the BM about the user. d. And with this the session is over link-ability between the user and server is broken. 76

4 b. What is the purpose of use of internet? Reasons Surfing Shopping SN Ticket Booking Figure 2: Blacklisting Process of User VI. PUBLIC SURVEY FOR RESEARCH Our main motto for the research application of project is to decrease the creation of multiple user IDs by the clients using the website for booking of the railway tickets; And also to spread awareness among the people about the UID (Aadhar Number). To analyse the issues we have taken a survey in various colleges and among various organisations. Here the result which came out from this survey was 167 out of 2. Means we asked various questions to approximately 2 people using the internet and website out of which 83.5% of people gave positive feedbacks. The answer for the various questions is represented graphically and you can get an idea from these graphically representation. a. Do you travel by train? 1 2 Figure 4: Survey Result of, purpose of use of internet c. Do you have an idea of Railway Reservation Website? 1 2 Figure 5: Survey Result of, idea of railway reservation website d. Have you faced problem while booking tickets (especially Tatkal Ticket)? 1 2 Figure 6: Survey Result of, are problem faced while booking Figure 3: Survey Result of, person travel by train 77

5 e. What are the problems faced while booking Tatkal Tickets? Server Down Session Expiry Service Unavailable Figure 7: Survey Result for, Various Problems Faced f. Do you think the number of Tatkal Tickets should be increased for institution and organisations? 1 2 Figure 8: Survey Result for, Increase in Number of Tickets g. What should be the Number of Tickets Booked per IP address? Six or More Five Four Three Two One Figure 9: Survey Results for, Number of Tickets h. Do you have idea of UID? 1 2 Figure 1: Survey for, UID ideas VII. CONCLUSION With the help of the PS and Railway Reservation System we have designed a great framework for ticket booking in both the sense i.e. while booking with reference to IP booking and with reference to the UID (Aadhar Number). The PS provides the blacklist of the clients IP addresses whereas UID helps to create a genuine login ID. Although the current system is capable of handling the ticket booking and we can also say it is very well planned. But this research for system will make reservation easier, comfortable and convenient. It will reduce the black ticketing and spread the awareness of UID (Aadhar Number) among the people. REFERENCES [1] Press Information Bureau Ministry of Indian Railways ( ) [2] =57&Itemid=15 [3] [4] [5] E-Booking Tatkal in India, by Pawan Kumar Maurya, Rewancharan Chourasiya and Anurika Vaish a Research Paper [6] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group Signature, Scheme, Proc. Ann. Int l Cryptology Conf. (CRYPTO), Springer,pp , 2. [7] G. Ateniese, D.X. Song, and G. Tsudik, Quasi-Efficient Revocation in Group Signatures, Proc. Conf. Finical Cryptography Springer, pp ,22 [8] D. Chaum and E. Van Heyst, Group Signatures, Proc.Int 1 Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT) pp ,

6 [9] Paul F. Syverson, Stuart G. Stubblebine, and David M. Goldschlag. Unlinkable Serial Transaction. [1] Jason E. Holt and Kent E. Seamons. Nym: Practical Pseudonymity for Anonymous Networks. Technical Report 26-4, Brigham Young University, Internet Security Research Lab, Provo, Uthah, USA, June 26. [11] Jack: Scalable Accumulator-based Nymble System Zi Lin & Nicholos Hopper Computer Science and Engineering. 79

NYMBLE BLOCKING SYSTEM

NYMBLE BLOCKING SYSTEM NYMBLE BLOCKING SYSTEM Anand Joshi 1, Arshiya Shaikh 2, Aruna Kadam 3, Vasudha Sahu 4 Department of Computer Engineering, MAE Alandi (D), Pune anandjoshi89@gmail.com arshiya91shaikh@gmail.com kadam.aruna@gmail.com

More information

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

A QR Code Based Processing for Dynamic and Transparent Seat Allocation

A QR Code Based Processing for Dynamic and Transparent Seat Allocation International Journal of Scientific and Research Publications, Volume 3, Issue 10, October 2013 1 A QR Code Based Processing for Dynamic and Transparent Seat Allocation Mehul Yadav *, Sumedh Kurundkar

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

A Survey on Untransferable Anonymous Credentials

A Survey on Untransferable Anonymous Credentials A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches

More information

RULES AND REGULATIONS. Do s for the Service providers

RULES AND REGULATIONS. Do s for the Service providers 1 RULES AND REGULATIONS Mandates for Registration Do s for the Service providers Registration as an RSP (Retail Service Provider) in IRCTC is issued for booking of E- Tickets only (except RTSA agents,

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

Analysis of Secure Cloud Data Sharing Within a Group

Analysis of Secure Cloud Data Sharing Within a Group Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Insuring Security for Outsourced Data Stored in Cloud Environment

Insuring Security for Outsourced Data Stored in Cloud Environment Insuring Security for Outsourced Data Stored in Cloud Environment Durga Priya.G Department of Information Technology Sri Sairam Engineering College Chennai-45, India Soma Prathibha Department of Information

More information

How To Ensure Data Integrity In Clouds

How To Ensure Data Integrity In Clouds Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,

More information

Online Railway Reservation. Intel Easy Steps 1 2012 Intel Corporation All rights reserved.

Online Railway Reservation. Intel Easy Steps 1 2012 Intel Corporation All rights reserved. Online Railway Reservation Intel Easy Steps 1 2012 Intel Corporation Online Railway Reservation Introducing Online Railway Reservation System Technology has transformed many aspects of life in the 21st

More information

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of

More information

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of

More information

The Disadvantages of Free MIX Routes and How to Overcome Them

The Disadvantages of Free MIX Routes and How to Overcome Them The Disadvantages of Free MIX Routes and How to Overcome Them Oliver Berthold 1, Andreas Pfitzmann 1, and Ronny Standtke 2 1 Dresden University of Technology, Germany {ob2,pfitza}@inf.tu-dresden.de 2 Secunet,

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. Introduction. Since 2001 T-Systems made research on secure online voting systems

More information

3 Easy Steps to Get Started

3 Easy Steps to Get Started Quick Start Guide Contents 1. What is icafe Manager?... 4 1.1. Server... 4 1.2. Client Terminal... 4 2. Downloading, Registering & Activating Cafe Code... 5 2.1. Downloading icafe Manager:... 5 2.2. Registering

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication

More information

An Anonymous and Secure Continuous Double Auction Scheme

An Anonymous and Secure Continuous Double Auction Scheme An Anonymous and Secure Continuous Double Auction Scheme Jarrod Trevathan School of Mathematical and Physical Sciences James Cook University Email: jarrod.trevathan@jcu.edu.au Hossien Ghodosi School of

More information

Object oriented model for Bank Account Number Portability

Object oriented model for Bank Account Number Portability Object oriented model for Bank Account Number Portability Dr. Sonali Agarwal Assistant Professor, Indian Institute of Information Technology, Allahabad, India. sonali@iiita.ac.in Ankur Agarwal Banking

More information

A secure email login system using virtual password

A secure email login system using virtual password A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {bhavintanti@gmail.com} 2 SVNIT, Surat,Gujarat,India 2 {doshinikki2004@gmail.com}

More information

Privacy in e-ticketing & e-identity

Privacy in e-ticketing & e-identity Privacy in e-ticketing & e-identity Attribute-proving for Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Institute for Computing and Information Sciences Digital Security 17th May 2011 Pim Vullers Collis

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Dynamic Resource Allocation and Data Security for Cloud

Dynamic Resource Allocation and Data Security for Cloud Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Annasaheb Dange College of Engg. & Technology, Ashta, Maharashtra, India. Amol B. Rajmane Ashokrao Mane Group of Institutions,

More information

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD Ch. Kousalya Devi 1, B Dada Khalande 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana Bharathi

More information

Swabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra

Swabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra Swabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra Hello. I am Devdatta Rokade. I am from Bank of Maharashtra. I am here today to discuss with you all about ICT based

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

SECURED DATA STORAGE IN CLOUD

SECURED DATA STORAGE IN CLOUD International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Opaak: Using Mobile Phones to Limit Anonymous Identities Online

Opaak: Using Mobile Phones to Limit Anonymous Identities Online Opaak: Using Mobile Phones to Limit Anonymous Identities Online Gabriel Maganis, Elaine Shi, Hao Chen, Dawn Song University of California, Davis University of California, Berkeley ABSTRACT Trust and anonymity

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Utility Storage r Many different target audiences r Business r Content distribution r Off-site backup r Archival r Consumer r Content

More information

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath

More information

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1 Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 2

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

A Privacy-Preserving Ticketing System

A Privacy-Preserving Ticketing System A Privacy-Preserving Ticketing System Kristof Verslype 1, Bart De Decker 1, Vincent Naessens 2, Girma Nigusse 1, Jorn Lapon 2 and Pieter Verhaeghe 1 1 Katholieke Universiteit Leuven, Department of Computer

More information

User Guide First Flight Tours & Travels A Division of First Flight Couriers Ltd USER GUIDE FOR INDIAN RAILWAY E-TICKET BOOKING & CANCELLATION

User Guide First Flight Tours & Travels A Division of First Flight Couriers Ltd USER GUIDE FOR INDIAN RAILWAY E-TICKET BOOKING & CANCELLATION USER GUIDE FOR INDIAN RAILWAY E-TICKET BOOKING & CANCELLATION 1 A GUIDE for e-ticket BOOKING Registered with First Flight Tours & Travels as Authorised E-Ticket Franchisee. Download Class 3 Digital Certificate

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

List of Promising Concepts EA6: BIG DATA

List of Promising Concepts EA6: BIG DATA List of Promising Concepts EA6: BIG DATA Project acronym Project title Project number 611961 Starting date 01/10/2013 Duration in months 24 Call identifier FP7-ICT-2013-10 CAPITAL security research Agenda

More information

A Taxonomy of Single Sign-On Systems

A Taxonomy of Single Sign-On Systems A Taxonomy of Single Sign-On Systems Andreas Pashalidis and Chris J. Mitchell Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {A.Pashalidis, C.Mitchell}@rhul.ac.uk http://www.isg.rhul.ac.uk

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015 SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,

More information

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.

More information

Privacy-preserving Digital Identity Management for Cloud Computing

Privacy-preserving Digital Identity Management for Cloud Computing Privacy-preserving Digital Identity Management for Cloud Computing Elisa Bertino bertino@cs.purdue.edu Federica Paci paci@cs.purdue.edu Ning Shang nshang@cs.purdue.edu Rodolfo Ferrini rferrini@purdue.edu

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Respected Sir, Subject: Reg. e-bharat: Integrated e-payment and e-governance system.

Respected Sir, Subject: Reg. e-bharat: Integrated e-payment and e-governance system. From Santhosh Hebbar, Date: 24-04-2015 Kumbar Jaddi, Hitlalli, Yellapur, Uttar Kannada, Karnataka-581347 To THE PRIME MINISTER, Prime Minister's Office, South Block, Raisina Hill, New Delhi-110011 Respected

More information

An Implementation of Secure Online Voting System

An Implementation of Secure Online Voting System An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com

More information

Data Leakage Detection in Cloud Computing using Identity Services

Data Leakage Detection in Cloud Computing using Identity Services International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-04 E-ISSN: 2347-2693 Data Leakage Detection in Cloud Computing using Identity Services K. Mythili 1*,

More information

Privacy, Anonymity and Pseudonymity in Business Transactions over the Internet. Contents

Privacy, Anonymity and Pseudonymity in Business Transactions over the Internet. Contents Internet Economics Seminar Privacy, Anonymity and Pseudonymity in Business Transactions over the Internet Daniel Bruggesser Jarkko Laine Contents Introduction (definitions, history) State of the privacy

More information

Providing Data Protection as a Service in Cloud Computing

Providing Data Protection as a Service in Cloud Computing International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Authentication Scenarios India. Ramachandran

Authentication Scenarios India. Ramachandran Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Keywords: anonymous authentication, backward unlinkability, revocation auditability, Nymble, Dynamism, Sybil attacks.

Keywords: anonymous authentication, backward unlinkability, revocation auditability, Nymble, Dynamism, Sybil attacks. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Anonymous Authentication

More information

User Manual - CFR Online Ticket. User Manual CFR Online Ticket

User Manual - CFR Online Ticket. User Manual CFR Online Ticket User Manual CFR Online Ticket 1 Contents: A. Methodology for a registered user Registration B. Sale application of CFR online tickets Connecting I forgot my password Routes Train Information Traffic restrictions

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

a. StarToken controls the loss due to you losing your Internet banking username and password.

a. StarToken controls the loss due to you losing your Internet banking username and password. 1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Ranked Search over Encrypted Cloud Data using Multiple Keywords

Ranked Search over Encrypted Cloud Data using Multiple Keywords Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology

More information

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, snw.sit@sinhgad.edu Gitanjali Dabhade Monika Ghodake Gayatri

More information

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS

More information

Technical Guideline TR-03107-1 Electronic Identities and Trust Services in E-Government

Technical Guideline TR-03107-1 Electronic Identities and Trust Services in E-Government Technical Guideline TR-03107-1 Electronic Identities and Trust Services in E-Government Part 1: Assurance levels and mechanisms Version 1.0 This translation is informative only. The normative version is

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Awareness of ORS (Online Reservation System) in MSRTC (Maharashtra State Road Transport Corporation)

Awareness of ORS (Online Reservation System) in MSRTC (Maharashtra State Road Transport Corporation) Awareness of ORS (Online Reservation System) in MSRTC (Maharashtra State Road Transport Corporation) Mrs. A. S. Gaikwad Faculty Member Bharati Vidyapeeth Deemed University, Pune IMRDA, Sangli Dr. B.S.

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information