IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL
|
|
|
- Jason Hardy
- 10 years ago
- Views:
Transcription
1 IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL Robert Benny.B 1, Saravanan.M.C 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Asstistant Professor, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. Abstract: A distributed transaction is usually accessing a database which is distributed (shared) to many computer systems. One of the benefits of distributed transactions used in an application is it update the data in distributed manner. Practically providing such applications with secured distributed environment is difficult due to the multiple failures. In the existing work, the Two-Phase Validation Commit protocol is used to provide a better transaction without any failure and thus also maintains the data integrity. However this protocol also lacks to prevent from the byzantine failure. In order to overcome this problem, in this work Improved Protocol is proposed which aims to provide the better secured transaction and also aims to achieve the data integrity. Thus the experimental results of our work prove that the proposed work provided better secured transaction than the existing approach. Keywords: distributed transaction, Two-Phase Commit Protocol, data Integrity, byzantine failure. I.INTRODUCTION The distributed database systems consist of data in a distributed manner over several locations and there may have duplicated data which leads to the more storage space necessity. Many replicated copies are presented all over the network. But at the same time, it should maintain the ACID properties (Bidyut Biman Sarkar and Nabendu Chaki, 2010) of distributed transaction which ensure the reliability of the transaction. Most importantly atomicity is the significant property in which the transaction aborts when any single operation fails otherwise it commits when all the operations are successful. The Transaction Processing Monitor (TPM) is a node in the network which acts an intermediate for distributed transactions. This TPM (Ghazi Alkhatib and Ronny S. Labban, 2014) provide the distributed commit service to all the distributed system in connection. Basically the distributed transaction may be interrupting when any failure occur. Either the client is not reachable or the server or the connection is not consistent. Traditionally, this commit service to all the distributed system is done using the two phase commit protocol to overcome such failures. This protocol works in manner containing a coordinator and numerous participants. The participant who wants to do some operation in the distributed environment requests the coordinator. In turn the coordinator accepts the request and sent commit request to the entire participants who are registered with it. Once all the participants respond positively to the coordinator, then the commit message will be send to the participant and the initiator will use the resources in the distributed environment. If the coordinator did not get any of the respond back or any negative respond, then the permission will not give to the initiated participants to use the distributed resource. The two phase protocol is efficient in preventing against the normal failure until the byzantine failure occurs. To overcome this failure and to maintain the data integrity in the 77
2 distributed resources, the proposed Improved Protocol is implemented in the distributed environment to provide secured data transaction and achieves the data integrity. II.RELATED WORK In (Marian K. Iskander, et al., 2014), proposed a Distributed transactional database frameworks conveyed over cloud servers, elements collaborate to structure evidences of approvals that are advocated by accumulations of affirmed accreditations. These evidences and qualifications may be assessed and gathered over expanded time periods under the danger of having the hidden approval approaches or the client accreditations being in conflicting states. It in this manner gets to be workable for approach based approval frameworks to settle on hazardous choices that may debilitate delicate assets. In this paper, we underline the problem of the issue. We then characterize the idea of trusted transactions when managing evidences of approval. The author (Giannotti F, et al., 2010) proposed Privacy; they say keep information about me from being available to others. This doesn't match the dictionary definition (Webster's), freedom from unauthorized intrusion. It is this intrusion, or use of personal data in a way that negatively impacts someone's life, that causes concern. As long as data is not misused, most people do not feel their privacy has been violated. The problem is that once information is released, it may be impossible to prevent misuse. Utilizing this distinction, it is clear that a data mining project won't enable the personal information misuse. The paper (Molloy I, et al., 2009) proposed Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Data mining and data warehousing go hand-in-hand: most tools operate by gathering all data into a central site, then running an algorithm against that data. However, privacy concerns can prevent building a centralized warehouse data may be distributed among several custodians, none of which are allowed to transfer their data to another site. Computing association rules within such a scenario. We can compute the global support and confidence of an association rule AB) C knowing only the local supports of AB and ABC, and the size of each database. According to (Qiu K, et al., 2008) proposed frequently prohibited by legal obligations or commercial concerns. Such restrictions usually do not apply to cumulative statistics of the data. Thus, the data owners usually do not object to having a trusted third party (such as a federal agency) collect and publish these cumulative statistics, provided that they cannot be manipulated to obtain information about a specific record or a specific data source. Trusted third parties are, however, difficult to find, and the procedure involved is necessarily complicated and inefficient. This scenario is most evident in the health maintenance business. In (Wong W.K, et al., 2007) proposed Progress in scanner tag engineering has made it workable for retail associations to gather and store monstrous measures of offers information, alluded to as the wicker container information. A record in such information normally comprises of the transaction date and the things purchased in the transaction. Effective associations view such databases as essential bits of the promoting foundation. They are occupied with establishing data driven showcasing procedures, oversaw by database innovation, which empower advertisers to create and actualize altered advertising projects and methods. The Apriori and Aprioritid calculations we propose vary on a very basic level from the AIS and SETM calculations as far as which competitor thing sets are included a pass and in the way that those hopefuls are created. 78
3 The paper (Gilburd B, et al., 2005) the problem of outsourcing data mining tasks to a third party service provider has been studied in a number of recent papers. While outsourcing data mining has the potential of reducing the computation and software cost for the data owners, it is important that private information about the data is not disclosed to the service providers. The raw data and the mining results can both contain business intelligence of the organization and private information about customers of the organization and require protection from the service provider. Unfortunately, the current understanding of the potential privacy threats to outsourcing data mining and the needed privacy protection are still quite primitive. In (Kantarcioglu M and Clifton C, 2004) proposed the knowledge models produced through data mining techniques are only as good as the accuracy of their input data. One source of data inaccuracy is when users deliberately provide wrong information. This is especially common with regard to customers who are asked to provide personal information on Web forms to e-commerce service providers. The compulsion for doing so may be the (perhaps well-founded) worry that the requested information may be misused by the service provider to harass the customer. III.PROPOSED SYSTEM The byzantine fault tolerance (Aldelir Fernando Luiz, et al., 2011) is the ability of the distributed system to overcome the byzantine faults. This is possible by duplicate (replica) the database and monitoring whether the same information is updataed in all the replicated databases. This is possible uisng the two phase commit protocol and latter the problems from 2PC is resolved by the Protocol in the existing system. But still the Byzantine faulty replicas become a major issue in the Byzantine Fault Tolerance Two Phase Commit Protocol. Hence to overcome this issue, the Improved Byzantine Fault Tolerance Two Phase Commit Protocol is implemented in the distributed environment to provide secured data transaction and achieves the data integrity. Fig 1 Architecture to Remove Byzantine Faulty Replicas Before the application starts, the coordinator is elected which is responsible for the updating information in the distributed database. Then all the participants in the distributed environment registered with the coordinator for the future communication. The architecture of the proposed Improved Byzantine Fault Tolerance Two Phase Commit Protocol for the distributed environment is shown in the figure.1. A.First Phase Initially the elected coordinator sends Begin_Commit request message to all the participants registered with it in the distributed environment and enters into the wait stage; remain idle for some time till all the participants respond to that request. The participants receive the request message and check their status. If the participants are 79
4 accessing any database in the distributed environment, then they will send the Vote_Abort (abort message) to the coordinator. If the participant is idle, then it will respond with the Vote_Commit (commit message) in return and enters into the ready state. Once the coordinator receives the commit message from all the participants, it proceeds with the second phase. IV.RESULT ANALYSIS The result analysis of the proposed Byzantine Fault Tolerance Two Phase Commit Protocol is compared with the existing Two Phase Commit Protocol in terms of cost and time. B.Second Phase When the coordinator did not receive the commit message from a single participant, it will send the Global_Abort message to all other participants and the participants come out of the ready state. But once the coordinator receives the commit message from all the participants, it sends the Decide_to_Commit message to its Byzantine backup site. It means that the coordinator request the Byzantine backup site to record the operations in the distributed database. The Byzantine backup site send the Recorded_Commit message to the coordinator saying that it is ready for recording. Fig2 Time Taken for Entire Transaction The time taken to implement and perform the entire transaction is depicted in the figure.2. The diagram shows that the proposed protocol proceeds with the minimum time to complete the transaction than the existing protocol. C. Third Phase If the coordinator did not receive any commit message for recording, then the coordinator send global abort message to all the participants. When the coordinator receives the commit message for recording from the Byzantine backup site, it sends the global commit message to all the participants. Finally the process of transaction in the distributed environment starts. The proposed system has attain the advantage to eliminate the byzantine fault tolerance by integrating the Byzantine backup site with the coordinator which is not present in the existing Protocol for distributed databases. Fig 3 Cost comparison The cost for implementing and processing the entire transaction by both the existing and proposed system is depicted in the figure.3. The figure shows that the proposed system consumes minimum cost than the existing system for implementing and processing the entire transaction using the proposed protocol in the distributed environment. 80
5 V.CONCLUSION The proposed Improved Byzantine Fault Tolerance Two Phase Commit Protocol is used to provide a better transaction without any failure and thus also maintains the data integrity. The proposed system eliminate the Byzantine Agreement which in turn it uses the Byzantine Backup site which control the transaction in the distributed environment, maintain the database with consistency and provide the secured distributed transaction with data integrity. Finally the performance of the proposed system is evaluated by comparing it with the existing system. The result shows that the proposed system provides the distributed transaction in a secure manner with consistent data integrity. REFERENCE [1] Bidyut Biman Sarkar and Nabendu Chaki, Transaction Management for Distributed Database using Petri Nets, International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), Volume 2, pp , ISSN: , [2] Ronny S. Labban and Ghazi Alkhatib, Transaction Management in Distributed Database Systems: the Case of Oracle s Two- Phase Commit, Journal of Information Systems Education, Volume 13, Issue Number 2, [5] Li T, Molloy I and Li N, On the (in)security and (im)practicality of outsourcing precise association rule mining, in the proceeding of IEEE Int. Conf. Data Mining, pp , Dec [6] Qiu K, Li Y, and Wu X, Protecting business intelligence and customer privacy while outsourcing data mining tasks, Knowledge Inform. Syst., Volume 17, Issue Number 1, pp , [7] Wong W.K, Cheung D W, Hung E, Kao B, and Mamoulis N, Security in outsourcing of association rule mining, in Proc. Int. Conf. Very Large Data Bases, pp , [8] Wolff R and Gilburd B,Schuster A, K- TTP: A new privacy model for large scale distributed environments, in Proc. Int. Conf. Very Large Data Bases, pp , [9] Kantarcioglu M and Clifton C, Privacypreserving distributed mining of association rules on horizontally partitioned data, IEEE Trans. Knowledge Data Eng., Volume 16, Issue Number 9, pp , Sep [10] Aldelir Fernando Luiz, Lau Cheuk Lung and Miguel Correia, Byzantine Fault-Tolerant Transaction Processing for Replicated Databases, 10th IEEE International Symposium on Network Computing and Applications (NCA), IEEE, page no , [3] Marian K. Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions, IEEE Transactions on Parallel and Distributed Systems, Volume 25, Issue Number 2, February [4] Giannotti F, Lakshmanan L V, Monreale A, Pedreschi D, and Wang H, Privacy preserving data mining from outsourced databases, in Proc. SPCC2010 Conjunction with CPDP, pp ,
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining
Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Ms. Deokate Pallavi B., Prof. M.M. Waghmare 2 Student of ME (Information Technology), DGOFFE, University of Pune, Pune
Multi-table Association Rules Hiding
Multi-table Association Rules Hiding Shyue-Liang Wang 1 and Tzung-Pei Hong 2 1 Department of Information Management 2 Department of Computer Science and Information Engineering National University of Kaohsiung
A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases
A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
Data Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Distributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm
Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,
Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012
Integrity Verification of Cloud-hosted Data Analytics Computations (Position paper) Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA 9/4/ 1 Data-Analytics-as-a- Service (DAaS) Outsource:
Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud
Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud P.Gayathri Atchuta*1, L.Prasanna Kumar*2, Amarendra Kothalanka*3 M.Tech Student*1, Associate Professor*2,
Enhancement of Security in Distributed Data Mining
Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 [email protected],
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Processing of Hadoop using Highly Available NameNode
Processing of Hadoop using Highly Available NameNode 1 Akash Deshpande, 2 Shrikant Badwaik, 3 Sailee Nalawade, 4 Anjali Bote, 5 Prof. S. P. Kosbatwar Department of computer Engineering Smt. Kashibai Navale
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Secure Cloud Transactions by Performance, Accuracy, and Precision
Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
PRIVACY PRESERVING ASSOCIATION RULE MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,
Indian Journal of Science The International Journal for Science ISSN 2319 7730 EISSN 2319 7749 2016 Discovery Publication. All Rights Reserved
Indian Journal of Science The International Journal for Science ISSN 2319 7730 EISSN 2319 7749 2016 Discovery Publication. All Rights Reserved Perspective Big Data Framework for Healthcare using Hadoop
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics
577 Hitachi Review Vol. 63 (2014),. 9 Featured Articles Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics Ken Naganuma Masayuki Yoshino, Ph.D. Hisayoshi Sato, Ph.D. Yoshinori
Survey on Comparative Analysis of Database Replication Techniques
72 Survey on Comparative Analysis of Database Replication Techniques Suchit Sapate, Student, Computer Science and Engineering, St. Vincent Pallotti College, Nagpur, India Minakshi Ramteke, Student, Computer
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Report Data Management in the Cloud: Limitations and Opportunities
Report Data Management in the Cloud: Limitations and Opportunities Article by Daniel J. Abadi [1] Report by Lukas Probst January 4, 2013 In this report I want to summarize Daniel J. Abadi's article [1]
USING REPLICATED DATA TO REDUCE BACKUP COST IN DISTRIBUTED DATABASES
USING REPLICATED DATA TO REDUCE BACKUP COST IN DISTRIBUTED DATABASES 1 ALIREZA POORDAVOODI, 2 MOHAMMADREZA KHAYYAMBASHI, 3 JAFAR HAMIN 1, 3 M.Sc. Student, Computer Department, University of Sheikhbahaee,
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Highly Available Hadoop Name Node Architecture-Using Replicas of Name Node with Time Synchronization among Replicas
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. II (May-Jun. 2014), PP 58-62 Highly Available Hadoop Name Node Architecture-Using Replicas
International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: [email protected]
Efficient DNS based Load Balancing for Bursty Web Application Traffic
ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
Dr Markus Hagenbuchner [email protected] CSCI319. Distributed Systems
Dr Markus Hagenbuchner [email protected] CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
Big Data Storage Architecture Design in Cloud Computing
Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)
JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: [email protected]
Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors
Journal of omputational Information Systems 7:2 (2011) 623-630 Available at http://www.jofcis.com Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors Wenhong WEI 1,, Yong LI 2 1 School
Data Consistency on Private Cloud Storage System
Volume, Issue, May-June 202 ISS 2278-6856 Data Consistency on Private Cloud Storage System Yin yein Aye University of Computer Studies,Yangon [email protected] Abstract: Cloud computing paradigm
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks
Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks Gopu.Obaiah*1, S.Suresh Babu*2, S.Gopikrishna*3 1*M.Tech Scholar, Dept of CSE, SRI Mittapalli College of Engg, Tummalapalem,
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
Database Replication Techniques: a Three Parameter Classification
Database Replication Techniques: a Three Parameter Classification Matthias Wiesmann Fernando Pedone André Schiper Bettina Kemme Gustavo Alonso Département de Systèmes de Communication Swiss Federal Institute
Autonomic Data Replication in Cloud Environment
International Journal of Electronics and Computer Science Engineering 38 Available Online at www.ijecse.org ISSN- 2277-1956 Autonomic Data Replication in Cloud Environment Dhananjaya Gupt, Mrs.Anju Bala
Security Saving Open Examining for Secure Cloud storage
ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP 131-136 Security Saving Open Examining for Secure
Cloud Based Distributed Databases: The Future Ahead
Cloud Based Distributed Databases: The Future Ahead Arpita Mathur Mridul Mathur Pallavi Upadhyay Abstract Fault tolerant systems are necessary to be there for distributed databases for data centers or
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
A Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Fault Tolerance Techniques in Big Data Tools: A Survey
on 21 st & 22 nd April 2014, Organized by Fault Tolerance Techniques in Big Data Tools: A Survey Manjula Dyavanur 1, Kavita Kori 2 Asst. Professor, Dept. of CSE, SKSVMACET, Laxmeshwar-582116, India 1,2
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
Transaction Management in Distributed Database Systems: the Case of Oracle s Two-Phase Commit
Transaction Management in Distributed Database Systems: the Case of Oracle s Two-Phase Commit Ghazi Alkhatib Senior Lecturer of MIS Qatar College of Technology Doha, Qatar [email protected] and Ronny
Efficient Data Replication Scheme based on Hadoop Distributed File System
, pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,
Study of Logistics Warehouse Management System Based on RFID
Advanced Materials Research Vol. 748 (2013) pp 1281-1284 Online available since 2013/Aug/30 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.748.1281
An Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
