Secure User Data in Cloud Computing Using Encryption Algorithms
|
|
- Neil Brown
- 8 years ago
- Views:
Transcription
1 Scur Usr Data in Using Encrypt Algorithms Rachna Arora*, Anshu Parashar ** *(Rsarch Scholar, HCTM, Kaithal, Haryana) ** (Associat Profssor, HCTM, Kaithal, Haryana) ABSTRACT is transming inmat tchnology. As inmat and procsss ar migra to th cloud, it is transming not only whr compu is don, but also fundamntally, how it is don. As incrasingly mor corporat and acadmic worlds invst in this tchnology, it will also drastically chang IT profssals working nvironmnt. solvs many problms of convntal compu, including handling pak loads, installing softwar updats, and, using xcss compu cycls. Howvr, th nw tchnology has also cratd nw challngs such as data scurity, data ownrship and trans-cod data storag. In this papr w hav discussd about cloud compu scurity issus, mchanism, challngs that cloud srvic r fac during cloud nginring and prsntd th mtaphoric study of various scurity algorithms. Kywords - Algorithms:, Blowfish, DES, RSA,, Data Scurity I. INTRODUCTION is th ability to accss a pool of compu rsourcs ownd and maintaind by a third party via th Intrnt. It is not a nw tchnology but a way of dlivring compu rsourcs basd on long xis tchnologis such as srvr virtualizat. Th cloud is composd of hardwar, storag, ntworks, intrfacs, and srvics that th mans through which usrs can accss th infrastructurs, compu powr, applicats, and srvics on dmand which ar indpndnt of locats. compu usually involvs th transfr, storag, and procssing of inmat on th rs infrastructur, which is not includd in th customrs control policy. Th concpt is linkd closly with thos of Inmat as a Srvic (IaaS), Platm as a Srvic (PaaS), Softwar as a Srvic (SaaS) all of which mans a srvic orintd architctur [1]. Hr coms th first bnfit of th i.. it rducs th cost of hardwar that could hav bn usd at usr nd. As thr is no nd to stor data at usr s nd bcaus it is alrady at som othr locat. So instad of buying th whol infrastructur rquird to run th procsss and sav bulk of data which You ar just rn th assts according to your rquirmnts. Th similar ida is bhind all cloud ntworks [2]. It uss rmot srvics through a ntwork using various rsourcs. It is basically mant to giv maximum with th minimum rsourcs i.. th usr nd is having th minimum hardwar rquirmnt but is using th maximum capability of compu. This is possibl only through this tchnology which rquirs and utilizs its rsourcs in th bst way. Th advantag of cloud compu ovr tradital compu includ: agility, lowr ntry cost, dvic indpndncy, locat indpndncy, and scalability [1]. In ordr to solv th problm of data intgrity chcking, many schms ar proposd undr diffrnt systms and scurity modls [2], [3], [4], [5], [6]. In all ths works, grat fts ar mad to dsign soluts that mt various rquirmnts: high schm fficincy, statlss vrificat, unboundd us of quris and rtrivability of data, tc. Considring th rol of th vrifir in th modl all th schms prsntd b fall into two catgoris: privat auditability and public auditability. Although schms with privat auditability can achiv highr schm fficincy, public auditability allows anyon not just th clint (data ownr), to challng th cloud srvr corrctnss of data storag whil kping no privat inmat. II. SECURITY ISSUES AND CHALLENGES OF CLOUD COMPUTING Scurity is considrd as on of th most critical aspcts in vryday compu and it is not diffrnt cloud compu du to snsitivity and importanc of data stord on th cloud. infrastructur uss nw tchnologis and srvics, most of which havn t bn fully valuatd with rspct to th scurity. has svral major issus and concrns, such as data scurity, trust, xpctats, rgulats, and prmancs issus. On issu with cloud compu is that th managmnt of th data which might not b fully trustworthy; th risk of malicious insidrs in th cloud and th failur of cloud srvics hav rcivd a strong attnt by companis P a g
2 Whnvr w discussd about scurity of cloud compu, thr ar various scurity issus aris in path of cloud. Som of th scurity concrns and soluts of thm ar listd and dirctd blow: 2.1 SECURITY CONCERN 1 With th cloud physical scurity is lost bcaus of sharing compu rsourcs with othr companis. No knowldg or control of whr th rsourcs run. ENSUE: Scur Data Transfr 2.2 SECURITY CONCERN 2 Ensuring th intgrity of th data (transfr, storag, and rtrival) rally mans that it changs only in rspons to authorizd transacts. A common standard to nsur data intgrity dos not yt xists. ENSUE: Scur Softwar Intrfacs 2.3 SECURITY CONCERN 3 Customr may b abl to su cloud srvic rs if privacy rights ar violatd, and in any cas th cloud srvic rs may fac damag to thir rputat. Concrns aris whn it is not clar to individuals why thir prsonal inmat is rqustd or how it will b usd or passd on to othr partis. ENSUE: Data Sparat 2.4 SECURITY CONCERN 4 Who controls th / kys? Logically it should b th customr. ENSUE: Scur Stord Data 2.5 SECURITY CONCERN 5 In cas of Paymnt Card Industry Data Scurity Standard (PCI DSS) data logs must b to scurity mangrs and rgulators [6], [7], [8]. ENSUE: Usr Accss Control III. PROBLEM FORMULATION Thr ar various policis issus and thrats in cloud compu tchnology which includ privacy, sgrgat, storag, rliability, scurity, capacity and mor. But most important among ths to concrn is scurity and how srvic r assurs it to maintain. Gnrally cloud compu has svral customrs such as ordinary usrs, acadmia and ntrpriss who hav diffrnt motivats to mov to cloud. If cloud clints ar acadmia, scurity ffct on prmanc of compu and thm cloud rs hav to find a way to combin scurity and prmanc. For ntrpriss most important problm is also scurity but with diffrnt vis. So, w mainly concntrat on USER_CLOUD scurity of cloud compu using algorithm using particular proposd plan. IV. PROPOSED WORK PLAN W hav proposd diffrnt scurity algorithms to liminat th concrns rgarding data loss, sgrgat and privacy whil accssing wb applicat on cloud. Algorithms lik: RSA, DES,, Blowfish hav bn usd and comparativ study among thm hav also bn prsntd to nsur th scurity of data on cloud. DES,, Blowfish ar symmtric ky algorithms, in which a singl ky is usd / of mssags whras DES (Data Encrypt Standard) was dvlopd in arly 1970s by IBM. Blowfish was dsignd by Bruc Schnir in 1993, xprssly us in prmanc constraind nvironmnts such as mbddd systm. (Advancd Encrypt Standard) was dsignd by NIST in RSA is a public ky algorithm invntd by Rivst, Shamir and Adlman in 1978 and also calld as Asymmtric ky algorithm, th algorithm that uss diffrnt kys and purposs. Th ky sizs of all th algorithms ar diffrnt from ach othr. Th ky lngth of DES algorithm is 56. Th ky siz of algorithm is 128, 192, 256. Th ky siz of Blowfish algorithm is Th ky siz of RSA algorithm is Using Nt bans IDE 7.3, and Java Run Tim Environmnt, w hav implmntd our ida in th m of and algorithms which hav discussd abov and also w hav mad comparison btwn thm on th basis of thir charactristics. V. SECURITY ALGORITHM USED IN CLOUD COMPUTING 5.1 RSA ALGORITHM Th most common Public Ky algorithm is RSA, namd its invntors Rivst, Shamir, and Adlman (RSA). RSA is basically an asymmtric / algorithm. It is asymmtric in th sns, that hr public ky distributd to all through which on can th mssag and privat ky which is usd is kpt scrt and is not shard to vryon. How RSA is going to work in cloud nvironmnt is xplaind as: RSA algorithm is usd to nsur th scurity of data in cloud compu. In RSA algorithm w hav d our data to scurity. Th purpos of scuring data is that only concrnd and authorizd usrs can accss it. Aftr data is stord in th cloud. So that whn it is rquird thn a rqust can b placd to cloud r. r authnticats th usr and dlivrs th data to usr. As RSA is a Block Ciphr in which vry mssag is mappd to an intgr. In th proposd cloud nvironmnt, Public known to all, whras Privat Ky known only to usr who originally owns th data. Thus 1923 P a g
3 is don by th cloud srvic r and is don by th cloud usr or consumr. Onc th data is d with th Public ky, it will b d using th corrsponding Privat Ky only. 5.2 ALGORITHM Advancd Encrypt Standard (), also known as Rijindal is usd scuring inmat. is a symmtric block ciphr that has bn analyzd xtnsivly and is usd widly now-a-days. How works in cloud nvironmnt?, symmtric ky algorithm is usd with ky lngth of 128- this purpos. As is usd widly now-a-days scurity of cloud. Implmntat proposal stats that First, Usr dcids to us cloud srvics and will migrat his data on cloud. Thn Usr submits his srvics rquirmnts with Srvic Providr (CSP) and chooss bst spcifid srvics offrd by r. Whn migrat of data to th chosn CSP happns and in futur whnvr an applicat uploads any data on cloud, th data will first d using algorithm and thn snt to r. Onc d, data is uploadd on th cloud, any rqust to rad th data will occur aftr it is d on th usrs nd and thn plain txt data can b rad by usr. Th plain txt data is nvr writtn anywhr on cloud. This includs all typs of data. This solut is transparnt to th applicat and can b intgratd quickly and asily without any changs to applicat. Th nvr stord nxt to th d data, sinc it may compromis th ky also. To stor th kys, a physical ky managmnt srvr can b installd in th usr s prmiss. This protcts data and kys and guarants that thy rmain undr usr s control and will nvr b xposd in storag or in transit. has rplacd th DES as approvd standard a wid rang of applicats. 5.3 DES ALGORITHM Th Data Encrypt Standard (DES) is a block ciphr. It s data in blocks of siz 64 ach. That is 64 of plain txt gos as input to DES, which producs 64 of ciphr txt. Th sam algorithm and ky ar usd and, with minor diffrncs. Th ky lngth of this algorithm is 56 ; howvr a 64 actually input. DES is thr a symmtric ky algorithm. 5.4 BLOWFISH ALGORITHM Blowfish is a symmtric ky cryptographic algorithm. Blowfish s 64 bit blocks with a variabl lngth ky of According to Schnir, Blowfish was dsignd with th followings objctivs in mind: a) Fast- Blowfish rat on 32-bit microprocssors is 26 clock cycls pr byt. b) Compact- Blowfish can xcut in lss 5 kb mmory. c) Simpl-Blowfish uss only primitiv oprat -s, such as addit, XOR and tabl look up, making its dsign and implmntat simpl. d) Scur- Blowfish has a variabl ky lngth up to maximum of 448-bit long, making it scur and flxibl. Blowfish suits applicats whr th ky rmains constant a long tim (.g. Communicats link ), but not whr th ky changs frquntly (.g. Packt Switching). 5.5 IMPLEMENTATION AND RESULTS Implmntat of algorithms has bn don using NtBans IDE with Java. Coding s usd algorithms hav shown blow: Coding 1 usd making data scur Coding 2 usd making data scur 5.6 RESULTS CHARACTERISTICS AND COMPARISON OF ALGORITHMS TABLE 1 Charact RSA BLOW DES ristics Platm Ky Siz 128,19 2, FISH Ky Usd Sam Public Sam For 1924 P a g
4 Scalabilit y Initial Vctor Siz Scurity Data Encrypti on Capacity Authnti cat Typ Mmory Usag Excutio n Tim usd to and th blocks. 128 Scur r and usr. Usd of larg amount of data Bst authnt icity r Low RAM ndd Fastr othrs usd and privat ky, Not 1024 Scur usr only Usd of small data Robust authnt ic impl mntat Highst mmor y usag algorith m Rquir s maxim um tim usd and of data. and sam usd Scur rs and usr/cli nt sid Lss Compa rabl to Can xcut in lss 5 kb Lssr tim to xcut Scurit y applid to rs and usr Lss Lss authnt ic. Mor Equals to VI. CONCLUSION AND FUTURE PROSPECTS In this papr algorithms hav bn proposd to mak cloud data scur, vulnrabl and gav concrn to scurity issus, challngs and also comparisons hav bn mad btwn, DES, Blowfish and RSA algorithms to find th bst on scurity algorithm, which has to b usd in cloud compu making cloud data scur and not to b hackd by attackrs. Encrypt algorithms play an important rol in data scurity on cloud and by comparison of diffrnt paramtrs usd in algorithms, it has bn found that algorithm uss last tim to xcut cloud data. Blowfish algorithm has last mmory rquirmnt. DES algorithm consums last tim. RSA consums longst mmory siz and tim. By doing implmntat all algorithms in IDE tool and JDK 1.7, th dsird output th data on cloud compu has bn achivd. In today s ra dmand of cloud is incrasing so th scurity of th cloud and usr is on top concrn. Hnc, proposd algorithms ar hlpful today s rquirmnt. In futur svral comparisons with diffrnt approachs and rsults to show ffctivnss of proposd framwork can b d. ACKNOWLEDGEMENT Our Thanks to HCTM, Kaithal dvlopmnt of this papr. REFERENCES Journal Paprs: [1] Zhidong Shn, Li Li, Fi Yan, Xiaoping Wu, Systm Basd on Trustd Platm, Intrnatal Confrnc on Intllignt tat Tchnology and Automat, Volum 1, May 2010, On pag(s): [2] Parson, S., Bnamur, A., Privacy, Scurity and Trust Issus Ariss from, Tchnology and Scinc (Com), IEEE Scond Intrnatal Confrnc 2010, On pag(s): [3] Rohit Bhadauria and Sugata Sanyal, A Survy on Scurity Issus in and Associatd Mitigat Tchniqus. Intrnatal Journal of tr Applicats, Volum 47- Numbr 18, Jun 2012, On pag(s): [4] Mohammd, E.M, Amblkadar, H.S, Enhancd Data Scurity Modl on, 8 th Intrnatal Confrnc on IEEE publicat 2012, On pag(s): cc-12- cc-17 [5] Sang Ho. Na, Jun-Young Park, Eui- Nam Huh, Prsonal Scurity Framwork, Srvic Confrnc (APSSC), Dc 2010 IEEE, On pag(s): [6] Wang, J.K.; Xinpi Jia, Data Scurity and Authnticat in hybrid cloud compu modl, Global High Tch Congrss on Elctronics (GHTCE), 2012 IEEE, On pag(s): [7] Ptr Mll, Timothy Granc, Th NIST Dfinit of, January t-sp _cloud-dfinit.pdf P a g
5 [8] Iankoulova, I.; Danya, M., compu scurity rquirmnts: A systmatic rviw, Rsarch Challngs in Inmat Scinc (RCIS), Sixth Intrnatal Confrnc on, 2012, On pag(s): 1-7. [9] Scurity Allianc, Top Thrats to V1.0, ianc.org/topthrats. [10] Lizh Wang, Grgor von Laszwski, Marcl Kunz, Ji Tao, Chng Fu, Xi H, Andrw Young, : A Prspctiv Study, Nw Gnrat - Advancs of Distributd Inmat Procssing, Volum 28, Issu 2, April 2010, On pag(s): [11] Punt Jai Kaur, Sakshi Kaushal, Scurity Concrns in, Communicat in tr and Inmat Scinc Volum 169 in 2011, On pag(s): [12] Shui Zhang, Shufn Zhang, Xubin Chn, Xiuzhn Huo, Rsarch and Dvlopmnt Trnd, Scond Intrnatal Confrnc on Futur Ntworks (ICFN), IEEE Publicats, January 2010, On pag(s): [13] Parson, S., Bnamur, A., Privacy, Scurity and Trust Issus Ariss from, Tchnology and Scinc (Com), IEEE Scond Intrnatal Confrnc,2010, On pag(s): Books: [14] McGraw Hill,, A Practical Approach, By Toby Vlt, Anthony Vlt, Robrt Elsnptr. [15] Furht,B., and Escalant,A. (2010). Handbook of. Nw York: Springr. Chaptrs in Books: [16] Toby Vlt, Anthony Vlt, and Robrt Elsnptr,, A Practical Approach, Chaptr 8, Storag, in 2012, On pag(s): [17] Vams Krishna Yarlagadda and Sriram Ramanujam, Data Scurity in, Volum 2 (1) in 2011, On pag(s): Procding Paprs: [18] W.J. Book, Europan Ntwork and Inmat Scurity Agncy (ENISA), 29 th IEEE Confrnc on Bnfits, Risks and Rcommndats P a g
SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA
Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE) Publishd by Intrnational Organization of IOTPE ISSN 077-358 IJTPE Journal www.iotp.com ijtp@iotp.com Sptmbr 015 Issu 4 Volum 7
More informationKey Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg
Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly
More informationAdverse Selection and Moral Hazard in a Model With 2 States of the World
Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,
More informationEFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS
25 Vol. 3 () January-March, pp.37-5/tripathi EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS *Shilpa Tripathi Dpartmnt of Chmical Enginring, Indor Institut
More informationRural and Remote Broadband Access: Issues and Solutions in Australia
Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity
More informationCARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises
CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY Outcom 10 Rgulation 11 Safty and Suitability of Prmiss CQC Rf 10A 10A(1) Lad Dirctor / Lad Officr Rspons Impact Liklihood Lvl of Concrn
More informationKeywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.
Volum 3, Issu 6, Jun 2013 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: wwwijarcsscom Dynamic Ranking and Slction of Cloud
More informationITIL & Service Predictability/Modeling. 2006 Plexent
ITIL & Srvic Prdictability/Modling 1 2 Plxnt Th Company 2001 Foundd Plxnt basd on an Expandd ITIL Architctur, CMMI, ISO, and BS15000 - itdna 2003 Launchd itdna Srvic Offring 2003 John Groom, past Dirctor
More informationAn Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore
Intrnational Journal of mrging Tchnology and dvancd nginring Wbsit: www.ijta.com (ISSN 2250-2459, Volum 2, Issu 4, pril 2012) n road outlin of Rdundant rray of Inxpnsiv isks Shaifali Shrivastava 1 partmnt
More informationEcon 371: Answer Key for Problem Set 1 (Chapter 12-13)
con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc
More informationContents. Presentation contents: Basic EDI dataflow in Russia. eaccounting for HR and Payroll. eaccounting in a Cloud
Accounting Contnts Prsntation contnts: Basic EDI dataflow in Russia Accounting for HR and Payroll Accounting in a Cloud Basic EDI Procss Flow Typs of documnts for EDI Lgally rquird documnts: Act of accptanc
More informationContinuity Cloud Virtual Firewall Guide
Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY
More informationThe example is taken from Sect. 1.2 of Vol. 1 of the CPN book.
Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl
More informationREPORT' Meeting Date: April 19,201 2 Audit Committee
REPORT' Mting Dat: April 19,201 2 Audit Committ For Information DATE: March 21,2012 REPORT TITLE: FROM: Paul Wallis, CMA, CIA, CISA, Dirctor, Intrnal Audit OBJECTIVE To inform Audit Committ of th rsults
More informationA Secure Web Services for Location Based Services in Wireless Networks*
A Scur Wb Srvics for Location Basd Srvics in Wirlss Ntworks* Minsoo L 1, Jintak Kim 1, Shyun Park 1, Jail L 2 and Sokla L 21 1 School of Elctrical and Elctronics Enginring, Chung-Ang Univrsity, 221, HukSuk-Dong,
More informationSci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131
Sci.Int.(Lahor),26(1),131-138,214 ISSN 113-5316; CODEN: SINTE 8 131 REQUIREMENT CHANGE MANAGEMENT IN AGILE OFFSHORE DEVELOPMENT (RCMAOD) 1 Suhail Kazi, 2 Muhammad Salman Bashir, 3 Muhammad Munwar Iqbal,
More informationArchitecture of the proposed standard
Architctur of th proposd standard Introduction Th goal of th nw standardisation projct is th dvlopmnt of a standard dscribing building srvics (.g.hvac) product catalogus basd on th xprincs mad with th
More informationPersonal Identity Verification (PIV) Enablement Solutions
Prsonal Idntity Vrification (PIV) Enablmnt Solutions pivclass Govrnmnt Solutions Affordabl Prsonal Idntity Vrification (PIV) Enablmnt Solutions from a Singl, Trustd Supplir Complt Solution for PIV Enablmnt
More informationMoving Securely Around Space: The Case of ESA
Moving Scurly Around Spac: Th Cas of ESA Prpard By: Andra Baldi, Jos Frnandz Balsiro, Marco Incollingo Tommaso Parrinllo, Cristiano Silvagni, Stfano Zatti Europan Spac Agncy Andra.Baldi@sa.int ESA Scnario
More informationIBM Healthcare Home Care Monitoring
IBM Halthcar Hom Car Monitoring Sptmbr 30th, 2015 by Sal P. Causi, P. Eng. IBM Halthcar Businss Dvlopmnt Excutiv scausi@ca.ibm.com IBM Canada Cloud Computing Tigr Tam Homcar by dfinition 1. With a gnsis
More informationParallel and Distributed Programming. Performance Metrics
Paralll and Distributd Programming Prformanc! wo main goals to b achivd with th dsign of aralll alications ar:! Prformanc: th caacity to rduc th tim to solv th roblm whn th comuting rsourcs incras;! Scalability:
More informationCisco Data Virtualization
Cisco Data Virtualization Big Data Eco-systm Discussion with Bloor Group Bob Ev, David Bsmr July 2014 Cisco Data Virtualization Backgroundr Cisco Data Virtualization is agil data intgration softwar that
More informationMaintain Your F5 Solution with Fast, Reliable Support
F5 SERVICES TECHNICAL SUPPORT SERVICES DATASHEET Maintain Your F5 Solution with Fast, Rliabl Support In a world whr chang is th only constant, you rly on your F5 tchnology to dlivr no mattr what turns
More informationDeveloping Economies and Cloud Security: A Study of Africa Mathias Mujinga School of Computing, University of South Africa mujinm@unisa.ac.
Journal of Emrging Trnds in Computing and Information Scincs 2009-2012 CIS Journal. All rights rsrvd. Dvloping Economis and Cloud Scurity: A Study of Africa Mathias Mujinga School of Computing, Univrsity
More informationHardware Modules of the RSA Algorithm
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 11, No. 1, Fbruary 2014, 121-131 UDC: 004.3`142:621.394.14 DOI: 10.2298/SJEE140114011S Hardwar Moduls of th RSA Algorithm Vlibor Škobić 1, Branko Dokić 1,
More informationA Project Management framework for Software Implementation Planning and Management
PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis Kith.Lancastr@LancastrStratgis.com Th goal of introducing nw tchnologis into your company
More informationPlanning and Managing Copper Cable Maintenance through Cost- Benefit Modeling
Planning and Managing Coppr Cabl Maintnanc through Cost- Bnfit Modling Jason W. Rup U S WEST Advancd Tchnologis Bouldr Ky Words: Maintnanc, Managmnt Stratgy, Rhabilitation, Cost-bnfit Analysis, Rliability
More informationLecture 3: Diffusion: Fick s first law
Lctur 3: Diffusion: Fick s first law Today s topics What is diffusion? What drivs diffusion to occur? Undrstand why diffusion can surprisingly occur against th concntration gradint? Larn how to dduc th
More informationDesigning a Secure DNS Architecture
WHITE PAPER Dsigning a Scur DNS Architctur In today s ntworking landscap, it is no longr adquat to hav a DNS infrastructur that simply rsponds to quris. What is ndd is an intgratd scur DNS architctur that
More informationProduct Overview. Version 1-12/14
Product Ovrviw Vrsion 1-12/14 W ar Grosvnor Tchnology Accss Control Solutions W dvlop, manufactur and provid accss control and workforc managmnt solutions th world ovr. Our product offring ompasss hardwar,
More informationData Encryption and Decryption Using RSA Algorithm in a Network Environment
IJCSNS Intrnational Journal of Computr Scinc and Ntwork Scurity, VOL.13 No.7, July 2013 9 Data Encryption and Dcryption Using RSA Algorithm in a Ntwork Environmnt Nntaw Y. Goshw. Dpartmnt of Elctrical/Elctronics
More informationunion scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME!
union scholars YOU CAN CHANGE THE WORLD... program AND EARN MONEY FOR COLLEGE AT THE SAME TIME! AFSCME Unitd Ngro Collg Fund Harvard Univrsity Labor and Worklif Program APPLICATION DEADLINE: FEBRUARY 28
More informationImportant Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2
Installation and Opration Intrnt Tlphony Adaptr Aurswald Box Indx C I R 884264 03 02/05 Call Duration, maximum...10 Call Through...7 Call Transportation...7 Calls Call Through...7 Intrnt Tlphony...3 two
More informationEnforcing Fine-grained Authorization Policies for Java Mobile Agents
Enforcing Fin-graind Authorization Policis for Java Mobil Agnts Giovanni Russllo Changyu Dong Narankr Dulay Dpartmnt of Computing Imprial Collg London South Knsington London, SW7 2AZ, UK {g.russllo, changyu.dong,
More informationAsset set Liability Management for
KSD -larning and rfrnc products for th global financ profssional Highlights Library of 29 Courss Availabl Products Upcoming Products Rply Form Asst st Liability Managmnt for Insuranc Companis A comprhnsiv
More informationGlobal Sourcing: lessons from lean companies to improve supply chain performances
3 rd Intrnational Confrnc on Industrial Enginring and Industrial Managmnt XIII Congrso d Ingniría d Organización Barclona-Trrassa, Sptmbr 2nd-4th 2009 Global Sourcing: lssons from lan companis to improv
More informationReview and Analysis of Cloud Computing Quality of Experience
Rviw and Analysis of Cloud Computing Quality of Exprinc Fash Safdari and Victor Chang School of Computing, Crativ Tchnologis and Enginring, Lds Mtropolitan Univrsity, Hadinly, Lds LS6 3QR, U.K. {F.Safdari,
More information5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power
Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim
More informationForeign Exchange Markets and Exchange Rates
Microconomics Topic 1: Explain why xchang rats indicat th pric of intrnational currncis and how xchang rats ar dtrmind by supply and dmand for currncis in intrnational markts. Rfrnc: Grgory Mankiw s Principls
More informationWORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769
08-16-85 WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769 Summary of Dutis : Dtrmins City accptanc of workrs' compnsation cass for injurd mploys; authorizs appropriat tratmnt
More informationAnalyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop
Intrnational Journal of Computr Scinc and Enginring Opn Accss Rsarch Papr Volum-2, Issu-1 E-ISSN: 2347-2693 Analyzing Failurs of a Smi-Structurd Suprcomputr Log Fil Efficintly by Using PIG on Hadoop Madhuri
More informationGold versus stock investment: An econometric analysis
Intrnational Journal of Dvlopmnt and Sustainability Onlin ISSN: 268-8662 www.isdsnt.com/ijds Volum Numbr, Jun 202, Pag -7 ISDS Articl ID: IJDS20300 Gold vrsus stock invstmnt: An conomtric analysis Martin
More informationSCHOOLS' PPP : PROJECT MANAGEMENT
Rport Schools' PPP Sub Committ 22 April 2004 2 SCHOOLS' PPP : PROJECT MANAGEMENT 1 Rason for Rport To provid Mmbrs with information on th structur of th Schools' PPP Projct Tam 2 Background 21 Dumfris
More informationScalable Transactions for Web Applications in the Cloud using Customized CloudTPS
Shashikant Mahadu Bankar/ (IJCSIT) Intrnational Journal of Computr Scinc and Information Tchnologis, Vol. (3), 2015, 218-2191 Scalabl Transactions for Wb Applications in th Cloud using Customizd CloudTPS
More informationLecture 20: Emitter Follower and Differential Amplifiers
Whits, EE 3 Lctur 0 Pag of 8 Lctur 0: Emittr Followr and Diffrntial Amplifirs Th nxt two amplifir circuits w will discuss ar ry important to lctrical nginring in gnral, and to th NorCal 40A spcifically.
More informationUser-Perceived Quality of Service in Hybrid Broadcast and Telecommunication Networks
Usr-Prcivd Quality of Srvic in Hybrid Broadcast and Tlcommunication Ntworks Michal Galtzka Fraunhofr Institut for Intgratd Circuits Branch Lab Dsign Automation, Drsdn, Grmany Michal.Galtzka@as.iis.fhg.d
More informationRemember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D
24+ Advancd Larning Loan Application form Rmmbr you can apply onlin. It s quick and asy. Go to www.gov.uk/advancdlarningloans About this form Complt this form if: you r studying an ligibl cours at an approvd
More informationCategory 7: Employee Commuting
7 Catgory 7: Employ Commuting Catgory dscription This catgory includs missions from th transportation of mploys 4 btwn thir homs and thir worksits. Emissions from mploy commuting may aris from: Automobil
More informationQUANTITATIVE METHODS CLASSES WEEK SEVEN
QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.
More informationCombinatorial Analysis of Network Security
Combinatorial Analysis of Ntwork Scurity Stvn Nol a, Brian O Brry a, Charls Hutchinson a, Sushil Jajodia a, Lynn Kuthan b, and Andy Nguyn b a Gorg Mason Univrsity Cntr for Scur Information Systms b Dfns
More informationData warehouse on Manpower Employment for Decision Support System
Data warhous on Manpowr Employmnt for Dcision Support Systm Amro F. ALASTA, and Muftah A. Enaba Abstract Sinc th us of computrs in businss world, data collction has bcom on of th most important issus du
More informationTraffic Flow Analysis (2)
Traffic Flow Analysis () Statistical Proprtis. Flow rat distributions. Hadway distributions. Spd distributions by Dr. Gang-Ln Chang, Profssor Dirctor of Traffic safty and Oprations Lab. Univrsity of Maryland,
More informationC H A P T E R 1 Writing Reports with SAS
C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd
More informationThe Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization
3 Procdings IEEE INFOCOM Th Constraind Ski-Rntal Problm and its Application to Onlin Cloud Cost Optimization Ali Khanafr, Murali Kodialam, and Krishna P. N. Puttaswam Coordinatd Scinc Laborator, Univrsit
More informationDefining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind
Dfining Rtirmnt Succss for Dfind Contribution Plan Sponsors: Bgin with th End in Mind David Blanchtt, CFA, CFP, AIFA Had of Rtirmnt Rsarch Morningstar Invstmnt Managmnt david.blanchtt@morningstar.com Nathan
More informationA Note on Approximating. the Normal Distribution Function
Applid Mathmatical Scincs, Vol, 00, no 9, 45-49 A Not on Approimating th Normal Distribution Function K M Aludaat and M T Alodat Dpartmnt of Statistics Yarmouk Univrsity, Jordan Aludaatkm@hotmailcom and
More informationLG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W
Cllo Tchnology LG has introducd th NON 2, with nwly dvlopd Cllo Tchnology which improvs prformanc and rliability. Up to 320W 300W Cllo Tchnology Cll Connction Elctrically Low Loss Low Strss Optical Absorption
More informationSwisscom Cloud Strategy & Services
Swisscom Stratgy & Srvics Swisscom our 360 On for Entrpris Workloads and Wb Srvics Dynamic Computing Srvics Our intgratd approach is uniqu B2C B2B Ntwork, infrastructur and IT from a singl sourc All Industris
More informationCookie Policy- May 5, 2014
Cooki Policy- May 5, 2014 Us of Cookis on Sizmk Wbsits This Cooki Disclosur applis only to us of cookis on corporat wbsits (www.sizmk.com and rlatd rgional wbsits) publishd by Sizmk Inc. and its affiliats
More informationWho uses our services? We have a growing customer base. with institutions all around the globe.
not taking xpr Srvic Guid 2013 / 2014 NTE i an affordabl option for audio to txt convrion. Our rvic includ not or dirct trancription rvic from prviouly rcordd audio fil. Our rvic appal pcially to tudnt
More informationCost Benefit Analysis of the etir system Summary, limitations and recommendations
UNITED NATIONS Cost Bnfit Analysis of th TIR systm Summary, limitations and rcommndations Agnda itm 5 André Scia Informal Ad hoc Exprt Group on Concptual and Tchnical Aspcts of Computrization of th TIR
More informationFACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data
FACULTY SALARIES FALL 2004 NKU CUPA Data Compard To Publishd National Data May 2005 Fall 2004 NKU Faculty Salaris Compard To Fall 2004 Publishd CUPA Data In th fall 2004 Northrn Kntucky Univrsity was among
More informationDevelopment of Financial Management Reporting in MPLS
1 Dvlopmnt of Financial Managmnt Rporting in MPLS 1. Aim Our currnt financial rports ar structurd to dlivr an ovrall financial pictur of th dpartmnt in it s ntirty, and thr is no attmpt to provid ithr
More informationIntermediate Macroeconomic Theory / Macroeconomic Analysis (ECON 3560/5040) Final Exam (Answers)
Intrmdiat Macroconomic Thory / Macroconomic Analysis (ECON 3560/5040) Final Exam (Answrs) Part A (5 points) Stat whthr you think ach of th following qustions is tru (T), fals (F), or uncrtain (U) and brifly
More informationI. INTRODUCTION. Figure 1, The Input Display II. DESIGN PROCEDURE
Ballast Dsign Softwar Ptr Grn, Snior ighting Systms Enginr, Intrnational Rctifir, ighting Group, 101S Spulvda Boulvard, El Sgundo, CA, 9045-438 as prsntd at PCIM Europ 0 Abstract: W hav dvlopd a Windows
More informationSTATEMENT OF INSOLVENCY PRACTICE 3.2
STATEMENT OF INSOLVENCY PRACTICE 3.2 COMPANY VOLUNTARY ARRANGEMENTS INTRODUCTION 1 A Company Voluntary Arrangmnt (CVA) is a statutory contract twn a company and its crditors undr which an insolvncy practitionr
More informationDehumidifiers: A Major Consumer of Residential Electricity
Dhumidifirs: A Major Consumr of Rsidntial Elctricity Laurn Mattison and Dav Korn, Th Cadmus Group, Inc. ABSTRACT An stimatd 19% of U.S. homs hav dhumidifirs, and thy can account for a substantial portion
More informationAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Dtcting Profil Cloning in Onlin Social Ntworks MortzaYousfi Kharaji 1 and FatmhSalhi Rizi 2 1 Dptartmnt of Computr and Information Tchnology Enginring,Mazandaran of Scinc and Tchnology,Babol,
More informationONLINE CONSUMER BEHAVIOR: AN EXPLORATORY STUDY
G.J. C.M.P., Vol. 2(4):98-17 July-August, 213 ISSN: 2319 7285 ONLINE CONSUMER BEHAVIOR: AN EXPLORATORY STUDY Namita Bhandari* & Prti Kaushal** *Panjab Univrsity, Chandigarh, India **Chitkara Univrsity,
More informationSharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means
Qian t al. Journal of Inqualitis and Applications (015) 015:1 DOI 10.1186/s1660-015-0741-1 R E S E A R C H Opn Accss Sharp bounds for Sándor man in trms of arithmtic, gomtric and harmonic mans Wi-Mao Qian
More informationFEDERICA. Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures. Mauro Campanella GARR
W W W.FP7-F ED ER IC A.EU FEDERICA Fdratd E-infrastructur Ddicatd to Europan Rsarchrs Innovating in Computing ntwork Architcturs Mauro Campanlla GARR Mauro.campanlla@garr.it CPqD Workshop on Nw Architctur
More informationEVALUATING EFFICIENCY OF SERVICE SUPPLY CHAIN USING DEA (CASE STUDY: AIR AGENCY)
Indian Journal Fundamntal and Applid Lif Scincs ISSN: 22 64 (Onlin) An Opn Accss, Onlin Intrnational Journal Availabl at www.cibtch.org/sp.d/jls/20/0/jls.htm 20 Vol. (S), pp. 466-47/Shams and Ghafouripour
More informationNimble Storage Exchange 2010 40,000-Mailbox Resiliency Storage Solution
Nimbl Storag Exchang 2010 40,0-Mailbox Rsilincy Storag Solution Tstd with: ESRP Storag Vrsion 3.0 Tst dat: July 10, 2012 Ovrviw This documnt provids information on Nimbl Storag's storag solution for Microsoft
More informationFleet vehicles opportunities for carbon management
Flt vhicls opportunitis for carbon managmnt Authors: Kith Robrtson 1 Dr. Kristian Stl 2 Dr. Christoph Hamlmann 3 Alksandra Krukar 4 Tdla Mzmir 5 1 Snior Sustainability Consultant & Lad Analyst, Arup 2
More informationUpper Bounding the Price of Anarchy in Atomic Splittable Selfish Routing
Uppr Bounding th Pric of Anarchy in Atomic Splittabl Slfish Routing Kamyar Khodamoradi 1, Mhrdad Mahdavi, and Mohammad Ghodsi 3 1 Sharif Univrsity of Tchnology, Thran, Iran, khodamoradi@c.sharif.du Sharif
More informationPresentation on Short-Term Certificates to the CAPSEE Conference. September 18, 2014
Prsntation on Short-Trm Crtificats to th CAPSEE Confrnc Sptmbr 18, 2014 Th first goal of City Collgs Rinvntion is focusd on nsuring studnts arn crdntials of conomic valu Rinvntion Goals Incras numbr of
More informationBasis risk. When speaking about forward or futures contracts, basis risk is the market
Basis risk Whn spaking about forward or futurs contracts, basis risk is th markt risk mismatch btwn a position in th spot asst and th corrsponding futurs contract. Mor broadly spaking, basis risk (also
More informationFraud, Investments and Liability Regimes in Payment. Platforms
Fraud, Invstmnts and Liability Rgims in Paymnt Platforms Anna Crti and Mariann Vrdir y ptmbr 25, 2011 Abstract In this papr, w discuss how fraud liability rgims impact th pric structur that is chosn by
More informationUNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS:
UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS: CASE OF NAIROBI CITY WATER AND SEWERAGE COMPANY By TABITHA MBETE NGEI P58/63441/2011
More informationSiemens IT Solutions and Services Pvt. Ltd.
Simns IT Solutions and Srvics Pvt. Ltd. Transforming IT into Businss Valu In 10 yars tim our plant will b populatd by 8 billion popl. Th challngs ahad supply of ncssary goods and srvics, clan nrgy, smart
More informationAbstract. Introduction. Statistical Approach for Analyzing Cell Phone Handoff Behavior. Volume 3, Issue 1, 2009
Volum 3, Issu 1, 29 Statistical Approach for Analyzing Cll Phon Handoff Bhavior Shalini Saxna, Florida Atlantic Univrsity, Boca Raton, FL, shalinisaxna1@gmail.com Sad A. Rajput, Farquhar Collg of Arts
More informationEntity-Relationship Model
Entity-Rlationship Modl Kuang-hua Chn Dpartmnt of Library and Information Scinc National Taiwan Univrsity A Company Databas Kps track of a company s mploys, dpartmnts and projcts Aftr th rquirmnts collction
More informationA Loadable Task Execution Recorder for Hierarchical Scheduling in Linux
A Loadabl Task Excution Rcordr for Hirarchical Schduling in Linux Mikal Åsbrg and Thomas Nolt MRTC/Mälardaln Univrsity PO Box 883, SE-721 23, Västrås, Swdn {mikalasbrg,thomasnolt@mdhs Shinpi Kato Carngi
More informationIntelliBPM. The next generation Business Performance Management Tool. Executive Summary: Market Demand: Problem:
IntlliBPM Th nxt gnratin Businss Prfrmanc Managmnt Tl IntlliBPM is a ttal Businss Prfrmanc Managmnt (BPM) and gnratin platfrm dsignd t assist businsss gnrat a flxibl and dynamic BPM slutin. It is rspnsiv
More informationJob Description. Programme Leader & Subject Matter Expert
Job titl: Programm Ladr & Subjct Mattr xprt Arbitration Pathways, ducation and Training Dpartmnt Salary band: 47,500 to 56,500 (dpndnt upon xprinc) Hours: 35 hours a wk Trm: Full Tim, Prmannt Accountabl
More informationEvaluation of Cloud-Based Mobile Apps Testing
Evaluation of Cloud-Basd Mobil Apps Tsting Prof. Manjula R., rmanjula@vit.ac.in Adithya Vadlamani, adithya.vadlamani2013@vit.ac.in A.M. Sai Prasad, amsaiprasads@gmail.com Prm Sai K., prmsaikanigalpula@gmail.com
More informationFree ACA SOLUTION (IRS 1094&1095 Reporting)
Fr ACA SOLUTION (IRS 1094&1095 Rporting) Th Insuranc Exchang (301) 279-1062 ACA Srvics Transmit IRS Form 1094 -C for mployrs Print & mail IRS Form 1095-C to mploys HR Assist 360 will gnrat th 1095 s for
More informationCloud and Big Data Summer School, Stockholm, Aug., 2015 Jeffrey D. Ullman
Cloud and Big Data Summr Scool, Stockolm, Aug., 2015 Jffry D. Ullman Givn a st of points, wit a notion of distanc btwn points, group t points into som numbr of clustrs, so tat mmbrs of a clustr ar clos
More informationEconomic Insecurity, Individual Behavior and Social Policy
Economic Inscurity, Individual Bhavior and Social Policy By Indrmit S. Gill igill@worldbank.org and Nadm Ilahi nilahi@worldbank.org Th World Bank Washington, DC 20433 First Draft: March 27, 2000 Papr writtn
More informationTIME MANAGEMENT. 1 The Process for Effective Time Management 2 Barriers to Time Management 3 SMART Goals 4 The POWER Model e. Section 1.
Prsonal Dvlopmnt Track Sction 1 TIME MANAGEMENT Ky Points 1 Th Procss for Effctiv Tim Managmnt 2 Barrirs to Tim Managmnt 3 SMART Goals 4 Th POWER Modl In th Army, w spak of rsourcs in trms of th thr M
More informationInformation Management Strategy: Exploiting Big data and Advanced Analytics
Information Managmnt Stratgy: Exploiting Big data and Advancd Analytics William Duply Stratgist HP Cloud Hwltt-Packard Canada Big : What w ar building: Actionabl intllignc Businss valu Traditional BI/MIS/CRM/
More informationKeynote Speech Collaborative Web Services and Peer-to-Peer Grids
Kynot Spch Collaborativ s and Pr-to-Pr Grids Goffry ox 1,2,4, Hasan Bulut 2, Kangsok Kim 2, Sung-Hoon Ko 1, Sangmi L 5, Sangyoon h 2, Shridp Pallickara 1, Xiaohong Qiu 1,3, Ahmt yar 1,3, Minjun Wang 1,3,
More informationWhole Systems Approach to CO 2 Capture, Transport and Storage
Whol Systms Approach to CO 2 Captur, Transport and Storag N. Mac Dowll, A. Alhajaj, N. Elahi, Y. Zhao, N. Samsatli and N. Shah UKCCS Mting, July 14th 2011, Nottingham, UK Ovrviw 1 Introduction 2 3 4 Powr
More informationNatural Gas & Electricity Prices
Click to dit Mastr titl styl Click to dit Mastr txt styls Scond lvl Third lvl Natural Gas & Elctricity Prics Fourth lvl» Fifth lvl Glnn S. Pool Manufacturing Support Mgr. Enrgy April 4, 2013 Click Vrso
More informationCPU. Rasterization. Per Vertex Operations & Primitive Assembly. Polynomial Evaluator. Frame Buffer. Per Fragment. Display List.
Elmntary Rndring Elmntary rastr algorithms for fast rndring Gomtric Primitivs Lin procssing Polygon procssing Managing OpnGL Stat OpnGL uffrs OpnGL Gomtric Primitivs ll gomtric primitivs ar spcifid by
More informationIncomplete 2-Port Vector Network Analyzer Calibration Methods
Incomplt -Port Vctor Ntwork nalyzr Calibration Mthods. Hnz, N. Tmpon, G. Monastrios, H. ilva 4 RF Mtrology Laboratory Instituto Nacional d Tcnología Industrial (INTI) Bunos irs, rgntina ahnz@inti.gov.ar
More information