AN EFFICIENT POINT TO POINT COMMUNICATION PROTOCOL FOR MOBILE CLOUD COMPUTING
|
|
- Walter Hart
- 8 years ago
- Views:
Transcription
1 AN EFFICIENT POINT TO POINT COMMUNICATION PROTOCOL FOR MOBILE CLOUD COMPUTING Lavanya P J 1, Suresh P 2 1 PG Student, Dept of CSE, Sri Venkateshwara College of Engineering, lavanyachetana@gmail.com 2 Assistant professor, Dept of CSE, Sri Venkateshwara College of Engineering, Suresh.rvce@gmail.com ABSTRACT Since mobile cloud computing is increasing, it became the paradigm in changing the infrastructure of traditional mobile computing. Now a day s smart phones rely on virtual clones in the cloud. These clones will increase the communication and computation capabilities of smart phones, these clones will make the limited batteries last longer. For this we have a new privacy risks, communicating users will distribute the personal information among several parties. So to overcome these risks, this paper implements an end to end anonymous communication protocol in the network between two users. This protocol will have the properties of social networks and adhoc wireless networks. We consider an adversary model where cloud user will observe the portion of the communication this will collides with others to uncover the identity of the communicating users. And we analyze the security of our protocol and anonymity preserved against the above adversaries. And we compare with the existing system i.e Tor (The second generation onion router).to assess the performance of our protocol tor is tested on relative clones and on real testbed of 36 smart phones and relative clones. Keywords: anonymity, mobile cloud computing, Smartphone clones etc 1. INTRODUCTION Advances in mobile technologies have turned our Smartphone s into small, powerful devices that use to play, check s, watch movies, songs, other than call and text wherev er and whenever we are. Current Smartphone s have built in 3G/WiFi and Bluetooth technologies, these technologies outperform like the desktop computers of ten years ago. Since we are increasing in spread of technologies and applications the current smart phones suffer from a major drawback i.e. battery limit. Since current batteries cannot cope up with increasing complexity of mobile applications, this becomes more and more energy hungry. To address the need of optimizing energy consumption[1],some of the solutions focus on offloading mobile computation to the software clones of the real devices is the cloud [2], [3], [4],[5],[6],[7],[8]. We have clone2clone, where clones are connected to each other clones in a peer to peer fashion in the cloud, which allows the computation and communication offloading. These scenarios involve many entities which include the clones, the devices, cloud provider, and the cellular network operator. The cellular network provider and the cloud provider will handle all the communication and monitor within the network. This can monitor who is communicating with whom, how often or how frequently they are communicating and what amount of data is being exchanged. If the clones collude the information can be easily inferred to the end to end communications, this will cause the privacy of all the users in the system. The mobile computing scenario is therefore in worse condition in the mobile privacy problem. So, for all these risks we focus on the privacy problem and we propose a communication protocol. Which allows the communicating users should anonymously communicate with each other by using clones as the intermediatory nodes in the cloud computing environment. Our solution has some major features of Tor and some features which are not available in Tor. Here tor is the second generation onion router. It firstly provides the resiliency against end to end attack. Resiliency is in the form of size and time correlations. Tor doesn t have goal but it is must and should in our solution.
2 2. RELATED WORK In wired and wireless systems anonymous is most important issue, so most of the applications are based on this issue. And they use the concept of mixing, where mixing is a method where messages are sent along a chain of proxy nodes there are also called mixes that accumulate and forward source encrypted messages in batches. In wired systems tor is most popularly deployed in mix network. Tor achieves mixing by layer encrypting a message at the source selected chain each hop at the source selected chain called tor nodes it will decrypt the message, to the destination selected by the client the tor i.e. the last node of the tor sends the unencrypted message. Our solution leverages for some communication steps one approach is similar to the tor network where in tor uses the mix zones and for some steps originator is unpredictable because of the hidden terminal property of the networks. In our solution we use the most popularity of social networks platform this will give raise to the cloud computing and the anonymity schemes which will rely on the friendship nodes among the users while communication. This will use same as in the tor network, by assuming the friend nodes trust each other which communicating and they are based on the social trust. To build a onion routing they rely in trust relationships in social network for this reason the early methods proposing the anonymous schema are mostly inspired by tor. The social cloud in the paper [20] have nodes that trust the relationships are bounded b y the social ties. Our solution also uses trust among the friend nodes for the anonymous communication. Recently in the paper[27] presents an anonymous communication protocol which is aimed for anony mity of (α,β)in mobile hybrid networks. This also involve the cellular network and Wi-Fi communication links. In the paper [4] we assume that each clone in the cloud is associated with the Smartphone, clones of friend users these are interconnected by peer to peer links between them. 3. PROPOSED MODELS 3.1 System Model Write our system includes four different parties I. The Smartphone will manage the clone of their Smartphones and carry mobile devices for communication. II. The cellular network operator This will manage the cellular infrastructure and allowing smartphone users to access its service. III. A set of proxies It acts as a mediator between the smartphone user and the cloud infrastructure. IV. The cloud provider This will manage the infrastructure of the cloud and their computing resource. D C d i c i s di s ci S R O Set of mobile devices Set of device clones i-th mobile device i-th clone Friend-set of d i (including d i itself) Friend-set of c i (including c i itself) Sender of a communication Receiver of a communication Cellular network operator
3 Cp pr Adv SK cloud provider Proxy Adversory attacking users anonymity Symmetric key (K p,k s ) A public/private key pair [m]k Message m encrypted with key K TABLE : Notation FIGURE 1 : System model The smartphone users will communicate with each other through both the cellular network which is the middle layer in the network and wide range of wifi adhoc communication links which is bottom layer in the figure D is denoted as set of mobile devices and C is denoted as set of clones. Each mobile device d i D associated with a software clone c i C in the cloud platform, for backup, offloading computations and communication purposes. O and cp denoted as cellular network operator and cloud provider respectively. This cellular network operator will receive all the cellular communication, and it acts as a gateway between mobile peers and the cloud infrastructure. And cloud provider will manage all the cloud communications. Our system architecture also includes set of n proxies pr 1,.,pr 2, which acts as a mediator between all communication channels the devices and the clones in cloud. The proxies will keeps track of cloneid and clone public IP address. Proxies by using the cellular and cloud identites, make our anonymous protocol successful. Proxies hav private and pubilc key (K p pri,k s pri) and this is used when the device is communicating with the users device and the clone. Each communication among devices is bidirectional as a exchange af a set of messages between the communicating sender and receiver. 3.2 Anonymity Model Here we extend the concept of k-anonymity, this aims to hide the sender and receiver of the communication among the α and β possible devices respectively.user of the communication can travel on ad hoc wireless, cellular,
4 or cloud network channels, and they are exposed to attacks in each of the communication.the adversaries in our model are honest but curious, they can neither tamper the messages nor read the encrypted messages. Such messages are grouped as follows, Mallicious devices: The mallicious devies are the adversories of adhoc networks which intensionally attack the anonymity of the communication. Cellular network operator: This will measure the position of the device by observing the cellular antena. Cloud provider: This will eaves drop incomming and outgoing traffic of every clone. Malicious clone: Malicious clones are the clones which are under the control of malicious devices which are intentionally attacked by the anonymity of the communication protocol. 4. OUR SOLUTION To achive (α,β)- anonymity is the main goal of our protocol in the communication involving sender s,receiver r,and clones. In our protocol s and r communicate as follows: Firstly, sender s sends message anonymously to its clone cs this is send through the multi hop wifi netwo rk which will forword the message to the physical proximity of the devices. Secondly, After reaching message to cs, the message anonymously forward to the clone cr of r. the clone ci is associated with the cs and clone cj is associated with the cr are in the same social network. Thirdly, after reaching cr, via proxy,the cellular operator, and the device in the proximity of r, the message is distributed to the mobile devices r. finally, the receiver r can reply to the sender s by reusing the same path or by building the new path. 4.1 Sender communication In sender communication the user s will check in the friendship database and it will select randomly one of the friend clone in the friendship database which has the social network of at least α members. Then, by using a probabilistic multi hop wifi, the sender s sends the message to the proxy pr. After that pr forwards the message to the ci. After reaching ci, this will delivers the message to α of its friends including cs, this is the only one to decrypt the message. 4.2 Clone communication All the α devices after receiving the message will reply after the timestamp T. for the sender clone cs,m will be the response and it will forward to the destination clone cr. responses of the clones are randomly generated which will be having variable lengths. 4.3 Receiver communication In receiver communication the push approach is used to deliver the payload m to receive r. similar to the last communication after a time stamp T the β clone is received a message from cj. responses to cj I is bundle of M 4.4 Response commnication The communication between the sender s and receiver r is bidirectional, we have two approaches are used, I) the protocol is repeated as one way communication switching s with r. II) the messages from r to s follows the same path as s to r. 5. SYSTEM ARCHITECTURE Our system implements devices, clones and proxy components in the cellular infrastructure, 5.1 Device In device component by using the android app we achieve the anonymity of our protocol bythrough wifi we connect the devices in the proximity range We should handle the device clone communication.
5 FIGURE 2 : Architecture of device 5.2 Clone The clone side implementation is done through the software clones of the real devices. In this we have neighbor notification server which handles the notification of the devices which are send by the associate devices for any changes. In our system peer to peer networking is used. FIGURE 3 : Architecture of Clone 5.3 Proxy This is implemented in java. And this will handle the communication between the devices and the clones in the cloud. This is consists of java threads, the mainpersistentconnection will have the record of new device entering into the system. Receiver task will receive the messages coming from the clones or devices. Packethandler will receives the message and access the destination. And this will decrypt the message using the private key of proxy. Sender task will handle the messages which are directed to the clone.
6 CONCLUSION FIGURE 4: Architecture of Proxy In our solution we have the anonymity, where the end to end communication is used in Smartphones and clone are created where the clones are the copies of real devices which will handle the part of the communication in the network by having the properties of social networks and adhoc wireless networks. Where the social networks are used for the friend clones in the friendship database. And adhoc networks are used to transfer the data. we have good communication computations and backup of the data and the communication is honest and curious, it will collide with each other to uncover the identity of the communication. Finally we calculate the performance by comparing our protocol by tor for mobile android devices on two real testbeds. REFERENCES [1] M. V. Barbera, S. Kosta, A. Mei, V. C. Perta, and J. Stefa, CDroid: Towards a Cloud-Integrated Mobile Operating System, in Proc. Of IEEE INFOCOM 13, [2] R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second Generation Onion Router, in Proc. of the 13th USENIX Security Symposium, [3] C. Ardagna, M. Conti, M. Leone, and J. Stefa, Preserving smartphone users anonymity in cloudy days, in Proc. of MobiPST 13, [4] P. Mittal, M. Wright, and N. Borisov, Pisces: Anonymous communication using social networks, in arxiv: , [5] S. Seys and B. Preneel, ARM: anonymous routing protocol for mobile ad hoc networks, Int. J. Wire. Mob. Comput., vol. 3, pp , [6] Y. Zhang, W. Liu, W. Lou, and Y. Fang, MASK: Anonymous ondemand routing in mo bile ad hoc networks, IEEE TWC, vol. 21, pp , [7] B. G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, Clonecloud: elastic execution between mobile device and cloud, in Proc. of EuroSys 11, [8] B. Levine, M. Reiter, C. Wang, and M. Wright, Timing attacks in lowlatency mix systems (extended abstract), in Proc. of FC 04, [9] N. Thiagarajan, G. Aggarwal, A. Nicoara, D. Boneh, and J. Singh, Who killed my battery?: analyzing mobile browser energy consumption, in Proc. of WWW 12, [10] S. Kosta, V. C. Perta, J. Stefa, P. Hui, and A. Mei, CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones, in Proc. of IEEE INFOCOM 13, [11] C. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, Privacy pres ervation over untrusted mobile networks, in Privacy in Location Based Applications: Research Issues and Emerging Trends, C. Bettini, S. Jajodia, P. Samarati, and S. Wang, Eds. Springer, 2009.
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,
More informationDetecting Denial of Service Attacks in Tor
Detecting Denial of Service Attacks in Tor Norman Danner, Danny Krizanc, and Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Abstract. Tor is
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationDELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationSharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
More informationPRIVACY IN VOIP NETWORKS
PRIVACY IN VOIP NETWORKS Anirban Maitra, Arun Kumar, Akshay Kumar Department of Electronics and Communication Engineering, Maharashi Dayanand University, Rohtak Abstract- Peer-to-peer VoIP (voice over
More informationTor Anonymity Network & Traffic Analysis. Presented by Peter Likarish
Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson
More informationA Privacy Preserving of Composite Private/Public Key in Cloud Servers
A Privacy Preserving of Composite Private/Public Key in Cloud Servers O Sri Nagesh PhD Scholar, Department of CSE, Lingaya s University, Faridabad ABSTRACT Security is a term used to provide secrecy of
More informationClone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud
CloneClone (CC): Peer-to-Peer Networking of Smartphones on the Cloud Sokol Kosta, Vasile Claudiu Perta, Julinda Stefa, Pan Hui, and Alessandro Mei Sapienza Univ, Rome, Italy, HKUST, Hong Kong and Deutsche
More informationThe dangers of composing anonymous channels
The dangers of composing anonymous channels George Danezis 1 and Emilia Käsper 2 1 Microsoft Research 2 Google gdane@microsoft.com, ekasper@google.com Abstract. We present traffic analyses of two anonymous
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationA Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
More informationEFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com
More informationSpecial Properties of Ad-hoc Wireless Network and Security Models
Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of
More informationSecure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing
Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com
More informationData management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
More informationDesign Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini Center for Information Security School of Information
More informationPrivacy Preservation over Untrusted Mobile Networks
Privacy Preservation over Untrusted Mobile Networks C.A. Ardagna 1 S. Jajodia 2 P. Samarati 1 A. Stavrou 2 1 Dipartimento di Tecnologie dell Informazione Università degli Studi di Milano Via Bramante,
More informationMobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
More informationExamining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationMobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013
Mobile Cloud Computing: Survey & Discussion Jianting Yue Sep 27, 2013 1 Outline Lead-in Definition Main Functions Architecture Computation Offloading: an example Challenges Potential Ideas Summary 2 3
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More information"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
More informationCLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION
CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.
More informationEfficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
More informationThe Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
More informationDistributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
More informationAn Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
More informationCryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
More informationPrivacy Preserving Public Auditing for Data in Cloud Storage
Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of
More informationCooperative Caching Framework for Mobile Cloud Computing
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 8 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationAuthenticated Anonymous Secure Routing Using Trust Model Technique
Authenticated Anonymous Secure Routing Using Trust Model Technique Aswathi Rajan, Kiran Krishnan PG Scholar, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala Assistant Professor,
More informationClonecloud: Elastic execution between mobile device and cloud [1]
Clonecloud: Elastic execution between mobile device and cloud [1] ACM, Intel, Berkeley, Princeton 2011 Cloud Systems Utility Computing Resources As A Service Distributed Internet VPN Reliable and Secure
More informationPrivacy & Security of Mobile Cloud Computing (MCC)
Privacy & Security of Mobile Cloud Computing (MCC) Manmohan Chaturvedi Principal Advisor Research & Technology Development Beyond Evolution Tech Solutions Pvt. Ltd. MOBILE COMPUTING CHALLENGES Mobile devices
More informationUnit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
More informationBusiness Intelligence meets Big Data: An Overview on Security and Privacy
Business Intelligence meets Big Data: An Overview on Security and Privacy Claudio A. Ardagna and Ernesto Damiani Università degli Studi di Milano, 26013 Crema, Italy {firstname.lastname}@unimi.it Abstract.
More informationCS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
More informationAn Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
More informationSECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH
SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH Suhas Desai Aujas Information Risk Services Session ID: MBS-T02 Session Classification: Intermediate Agenda Trends in Mobile Technology
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationKeywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
More information(Un)Suitability of Anonymous Communication Systems to WSN
R. Rios, and J. Lopez, (Un)Suitability of Anonymous Communication Systems to WSN, IEEE Systems Journal, vol. 7, pp. 298-310, 2013. http://doi.org/10.1109/jsyst.2012.2221956 NICS Lab. Publications: https://www.nics.uma.es/publications
More informationPlaying Server Hide and Seek. lasse.overlier@ffi.no http://www.syverson.org
Playing Server Hide and Seek Lasse Øverlier Norwegian Defence Research Establishment Paul Syverson Naval Research Laboratory lasse.overlier@ffi.no http://www.syverson.org Location Hidden Servers Alice
More informationLecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT
Lecture 7: Privacy and Security in Mobile Computing Cristian Borcea Department of Computer Science NJIT Location Privacy Location Authentication Trusted Ad Hoc Networks 2 Privacy Violated Request: Retrieve
More informationProviding Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
More informationDETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES
IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationDETECTING MALICIOUS PACKET DROPPING AND SECURE TRACE OUT IN WIRELESS AD-HOC NETWORK
DETECTING MALICIOUS PACKET DROPPING AND SECURE TRACE OUT IN WIRELESS AD-HOC NETWORK Karthick P N 1, Mrs. R.Bamalakshmi 2 1 PG Scholar, 2 Assistant Professor/M.E Department of ECE, GRT Institute of Engineering
More informationCovert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationA Case Study on Measuring Statistical Data in the Tor Anonymity Network
A Case Study on Measuring Statistical Data in the Tor Anonymity Network Karsten Loesing 1,StevenJ.Murdoch 1,2, and Roger Dingledine 1 1 The Tor Project 2 Computer Laboratory, University of Cambridge, UK
More informationInteractive Voice Response System by Using Asterisk
Interactive Voice Response System by Using Asterisk Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel Student, Dept. of C.S.E., SRMCEW, RTM University, Nagpur, India. Professor, Dept.
More informationISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationA Guide to Mobile Security For Citizen Journalists
A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationA B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
More informationDoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
More informationList of Promising Concepts EA6: BIG DATA
List of Promising Concepts EA6: BIG DATA Project acronym Project title Project number 611961 Starting date 01/10/2013 Duration in months 24 Call identifier FP7-ICT-2013-10 CAPITAL security research Agenda
More informationSecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
More informationTraffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis
Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis
More informationInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment Durga Priya.G Department of Information Technology Sri Sairam Engineering College Chennai-45, India Soma Prathibha Department of Information
More informationSecure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
More informationSingle Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
More informationINTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS
INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS P.Shanthi Bala Lecturer, Department of Computer Science, Pondicherry University, Puducherry. Abstract Cloud computing
More informationSecure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
More informationSecure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Ambarish.A 1, Gowthamani.R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore 1,
More informationEfficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
More informationEfficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationElectronic Network - Advantages and Disadvantages
Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism Shobhana S PG Scholar, Dept of CSE, Apollo Priyadarshanam Institute of Technology, Chennai Abstract Wireless
More informationSecure Anonymous Routing in Clustered Multihop Wireless Ad Hoc Networks
Secure Anonymous Routing in Clustered Multihop Wireless Ad Hoc Networks Lijun Qian and Ning Song Department of Electrical Engineering Prairie View A&M University Prairie View, Texas 77446 Email: LiQian,
More information3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
More informationFlexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com
More informationSheltered Multi-Owner Data distribution For vibrant Groups in the Cloud
Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of
More informationN TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationDual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationBabel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang
More informationSecure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More information