Secure Access Policy Generation For Complex Event Handling System

Size: px
Start display at page:

Download "Secure Access Policy Generation For Complex Event Handling System"

Transcription

1 Secure Access Policy Generation For Complex Event Handling System Sharad Handibag, Sandesh Ugale, Shafik Shaikh Savitribai Phule Pune University Pune Vidyarthi Griha s College of Engineering,Nashik of Computer Engineering Abstract Available Event Processing System has much more demerits to maintain privacy constraints regarding incoming event streams in complex subsequently occurring event operation.this will generate problem for developing large-scale distributed application e.g logistics chain, banking system where operators are work on various distributed domains or number of branches located at various geographical location. This paper presents secure and efficient approach for complex event management.each occurring event stream can be protected secure through access policy and enforced by obfuscation algorithm. it allows to ignore the access requirement and output sufficient obfuscation level holding event which is part of access policy.in this system each operator has predefined access permission and he also responsible for corresponding tasks.obfuscation algorithm acts as a majar role for incoming events that will decide either pass it on or ignore the event. Keywords: Access control; Event processing ; obfuscation threshold; Bayesian network;consolidation.,introduction Business processing requires early detection of inconsistencies or faults. e.g. in case of logistic processes all products while transporting are track until they reaches to the desired destination in case of any failures or any problem occur during transport they should be rerouted. Detection and taking various decision dynamically makes business Fig.1 Processing system)[13],[12] takes incoming event stream from sensors distributed over large geographical area. e.g. From product tracking devices. This system is most powerful replacement for conventional event processing system in which operators are centralized such approach have drawbacks like reducing the communication load due to centralization, which replaces this by distributing them[11],[10],[8],[9]. Today s collaborative nature of various networks which is result of today s economy which is internally collaborative in nature. So to handle events occurring in such environment networks are non-homogeneous in term of working abilities and technical details,various participants and those are distributed over multiple security domains[7],[6]. This hierarchy forces to maintain the security for overcoming the problem due to highly collaborative and interoperability. current centralized system is not capable to work on this type of complex system which lags in the way of controlling data access. E.g. An industry may restrict its subsets from having access to some sort of information. i.e. only authorized users. processing more complex event processing paradigm for continuing industrial application.for detecting runtime raising problem CEP(Complex Event 1524

2 Fig 2 Presenting work provide security,confidentiality by reducing drawbacks available in current event processing system and provide more flexible and user friendly environment[3],[4],[5].in CEP independency between events may loses control of operator over event data which will generate major problem of security.the illustrated below figure depicts the example of logistic process for transporting various products, tracking them until reaches to the destination and handling various processes and control floating through various domains like Manufacturer,shipping company, customer.process of transporting items is like : 1. Manufacturer wants to deliver an product to certain destination. 2. Shipping company determines the specific warehouses which are more closer and convenient to destination before transferring to end user. This logistic process handled by CEP in which different operators are hosted in their perspectives domains and exchange highly confidential information among them while exchanging events during communication.e.g. product destination regarding information sent to shipping company. In this case third party warehouse host does not have access to this information and does not conclude the desired destination.destination information is declared by manufacturer and only shipping company has access to this details. This work objectives are: 1. Accessing rights inheritance over chain of dependent operators 2. A scalable approach to calculate amount of obfuscation enforced by operators for exchanging information regarding various event stream. As result of this obfuscation threshold will be included to decide access policy the event processing system can ignore the access restriction.this will increase number of event that will react for event processing which will in turn increases utility of CEP. I. System Model We make hypothesis about correlative and collaborative networks where distributed operators are interconnected to handle complex system.in this distributed networks each individual machine deployed an operator which is completely responsible for event handling in CEP. We use mathematical modeling of CEP system by directed graph G=(Ω,S) which consists of operator w Ω and event stream (wi, wj) S (Ω Ω) has direction from w j wj. Where w i belongs to procedure set and w j to consumer of events.each event has various attributes.corelation function used for designing collaboration is f: I w O w where I w is indicates incoming events and O w indicate outgoing one.that means f w is responsible for selecting incoming event relate it with outgoing event.fig.2 depicts this overall process.this nothing but the operators graph according to our logistic process example. function f sc operates on incoming event which is produced by w m i.e. by manufacturing domain.f sc carries two event attributes I location of warehouse and ii estimate delivery day. 1525

3 II. Access control for CEP Access policy is process of inheriting access requirements by assigning them to event attributes thus access policy retains requirement as it is although any number of correlation steps are followed in operator attribute of occurring event as long as value of threshold of obfuscation is valid for particular event attribute that event are allowed otherwise ignored. A. Access policy Access rights are specified through access control of particular host for available set of event attribute access rights are provided by event procedure and many granted to operator based on event requirement these requirement may be a domain affiliation or a location a role.we will specify set of granted rights for access in AP for operator w as: AP w = {(att1, ar1),..., (attn, arn)}. Unspecified event attribute requirement can be accessed by any operator i.e. consumer of event in network. We assume event attributes are distinct due to they are produced at different operators. Val: ar=(p,op,val) where val may contain range of values and op may be ( =,<,>,<=,>=,є) in this paper for reason of simplicity attribute can be specified as: ar 1 =(domain є,{ domain A, domain B}). In our logistic process example manufacturer events attribute retains different attribute. Details about destinations accessible by customers where production place and pickup time is restricted to the shipping. AP manufacturer ={({(destination,(domain,,{shi ppingcomp,customer})),(pickuptime,(domai n,=,shippingcomp)),(productionplace, (domain,=,shippingcomp))} Enforcing and assuring access policy at particular producer consumer can access attributes iff it s properties are matches with access requirements predefined for that attributes B. Obfuscation of given event information Producers are allowed to specify the access requirement in sophisticated way as per the access policies, due to restrictive nature in the chain of operators operating all different level in inheritance can affect the reliability of CEP system : in correlation demand for access from different producers may increase in consolidation that s lead to deny access to numbers of consumer that are trying to get access to the events attributes of producer event streams.this will change the main objective of event processing system due to which even basic event has little influence on its outcome related complex event processing system. In case of our example of logistic process in it attributes place of production,pick time are utilized to confirm day of delivery of the ordered item. As consequence customer has no right to quote estimated day of delivery since the customer doesn t fulfill access requirement for production place and day of delivery.but still customer has quite interest in this information. We say the correlation process will obfuscate attributes values and attained level of threshold access requirement become invalid. Thus obfuscation measure decide event infer the original attribute value. Calculation of obfuscation is dependant on both attribute value as well as knowledge of event consumer this work.we will use obf( att old, att new, ω) refers retain level of obfuscation by att new for att old the knowledge available at consumer given by w Ω. Every operator assigned with access policy as well as obfuscation policy.threshold value for attribute produced by operator is given by obfuscation policy.during processing of event attribute with respect to each interested user obfuscation value is calculated.once the threshold value is reach for that particular users event attribute sent in place of that confusing requirement.obfuscation Policy(OP) for operator w as set of pairs : OP w = {(att 1, ot 1 ),..(att n, ot n )}. For example,op: OP manufacturer = {(destination, 0.9)}. Will allows shipping company to restrict access rights for designated destination in case of attribute day of delivery if obf(destination, day of delivery, ωc) 0.9. C. Security perspectives Let att old w att new denote that 1526

4 i. At some of the operator ω Ω, att old taken as input to the correlation function f w ii. f w generate att new corresponding to att old. After that att old att new is transitive closure of dependency relation mainly we want to preserve privacy of event attributes after number of correlation steps considering relationship among attributes for any policy consolidation we must have to consider following conditions: Condition 1. For all attributes att O w produced at w AR init (att) AP w. (1) Condition 2. For all dependent attribute pairs This proposed system attaches pair of operators in G through secure event stream.for generating secure stream we rely on publish or subscribe system in addition with this work.e.g. [4],[3],[5],[2],[1].in this work only important thing is that each consumer w c needs to request required attributes. a) Inheritance in access policy Two basic conceptual steps in policy inheritance are: 1.for each operator domain experts must identify dependency between incoming and outgoing events 2.An operator must have to map access requirement related to incoming events for outputting outgoing events in case of our example operator w sc determine Fig 3.Bayesian Network (att old, att new ) with 1) w i has generated att old with access requirement AR(att old ) and obfuscation threshold (att old, x) OP wi, 2) att new is generated by w j 3) att new is get by w k the access requirement in AP wj yield AR(att old ) AP wj if obf(att old, att new, w k ) < x. (2) Consolidation algo must acquired condition 1 as well as condition 2 to provide access rights according to access policy. The main objective of this is not to allow sensitive information access by unauthorized users. III. Access policy consolidation and event obfuscation value of warehouse attribute.mapping given by : (domain,, {shippingcompany, customer}) b) Obfuscation semantics. While dealing with obfuscation our objective is not to change the way in which participant uses CEP. Some major assumptions regarding to obfuscation are : we assume consumer of event has knowledge about an att 1.semantic of correlation function that is responsible for generating att. 2.possible value of attribute att depends on. c) Discussed characteristics up to this point leads us to formalize inference of attribute in form of probability value. This inference probability know as Bayesian Network. which gives solution to the question 1527

5 IV. Given a certain output attribute, and a certain set of input attributes the consumer knows, how likely is a specific value for the incoming attribute we need to secure? the conditional probability distribution for att old : ip(att old, att new, w c ) =P(att old knownw c (I (att new )\I (att old )),att new )) (3) inference probability is set of values over inferred event attribute att old.ip is dependant on knowledge of consumer as well as operator function we Can calculate entropy of the inference probability of distribution: obf(att old, att new, w c ) = H(ip(att old, att new, w c )) (4) entropy value gives desired association measure. If incoming and outgoing event attribute are equal then entropy=1 Scalability of access policy consolidation In spite of global value calculation of Bayesian Network,we use knowledge of each local host.which allows reduced extra relation of outgoing incoming attributes which in turns reduces very large overhead of processing. According to algorithm handling of each occurring events based on locally generating obfuscation. V. CONCLUSION This work present the CEP mechanism based on inheritance and consolidation of access policy in heterogeneous networks. We identifying drawbacks of currently available event processing system and create solution from overcoming this drawbacks. Specifically we set an approach allowing inheritance of access requirement.local obfuscation calculation algorithm includes information obfuscation raised during correlation process and make use of obfuscation value for decision making.we presented implementation of our approach referring to Bayesian Network calculations of inference probability.this will shows our approach is intensive to calculation. Future work will forces on enhance method of obfuscation calculation and methods regarding size of Bayesian Network to calculate obfuscation value over more than one correlation network. ALGORITHM : LOCAL OBFUSCATION CALCULATIOIN procedure INITIALIZE(w) for all operator w do D w FINDMULTIPATHOPERATORS(w) for all w D w do relatts FINDRELATEDATTRIBUTES for all (att new, att old ) relatts do TRANSMIT P(att new att old ) TO w end procedure procedure UPONRECEIVEEVENT(e) for all att e do if multpathdependency(att) then CALCULATEWORSTCASEOBFUSCATION(ATT) else CALCULATELOCALOBFUSCATION(ATT) end if end procedure VI ACKNOWLEGEMENT This work is supported by contract research Access Policy consolidation For Event Processing System of the Boris Koldehofe.The authors would like to thanks Umakishore Ramchandran.Bjorn Schilling and the reviewer s for their helpful comments. REFERENCES [1] S. Rizou, F. D urr, and K. Rothermel, Providing qos guarantees in large-scale operator networks, in High Performance Computing and Communications (HPCC), th IEEE International Conference on, 2010, pp [2] M. A. Tariq, B. Koldehofe, G. G. Koch, I. Khan, And K. Rothermel, Meeting subscriber-defined QoS constraints in publish/subscribe systems, Concurrency and Computation: Practice and Experience, vol. 23, no. 17, pp ,2011 [3] J. Bacon, D. M. Eyers, J. Singh, and P. R. Pietzuch, Access control in publish/subscribe 1528

6 systems, in Proc. of the 2 nd ACM International Conference on Distributed Event-Based Systems (DEBS), 2008, pp [4] L. I. W. Pesonen, D. M. Eyers, and J. Bacon, Encryption-enforced access control in dynamic Multidomain publish/subscribe networks, in Proc. of the 2007 ACM International Conference on Distributed Event-Based Systems (DEBS), 2007, pp [5] M. A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel, Providing basic security mechanisms in broker-less publish/ subscribe systems, in Proceedings of the 4th ACM Int. Conf. on Distributed Event-Based Systems (DEBS), 2010, pp [12] A. Hinze, K. Sachs, and A. Buchmann, Event- Based applications and enabling technologies, in Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, ser. DEBS 09. New York, NY, USA: ACM, 2009, pp. 1:1 1:15. [13] A. Buchmann and B. Koldehofe, Complex event processing, it - Information Technology, vol. 51:5, pp , [6] B. Schilling, B. Koldehofe, and K. Rothermel, Efficient and distributed rule placement in heavy constraint-driven event systems, in Proc. of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC), 2011, pp [7] B. Schilling, B. Koldehofe, U. Pletat, and K. Rothermel, Distributed heterogeneous event processing: Enhancing scalability and interoperability of CEP in an industrial context, in Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS), 2010, pp [8] B. Koldehofe, B. Ottenw alder, K. Rothermel, and U. Ramachandran, Moving range queries in distributed complex event processing, in Proc. of the 6th ACM International Conference on Distributed Event-Based Systems (DEBS), 2012, pp [9] G. G. Koch, B. Koldehofe, and K. Rothermel, Cordies: expressive event correlation in distributed systems, in Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS), 2010, pp [10] G. Li and H.-A. Jacobsen, Composite s subscriptions in content-based publish/subscribe systems, in Proc of the 6t Int. Middleware Conf., 2005, pp [11] P. Pietzuch, Hermes: A scalable event-based middleware, Ph.D. dissertation, University of Cambridge,

Event-based data dissemination control in healthcare

Event-based data dissemination control in healthcare Event-based data dissemination control in healthcare Jatinder Singh and Jean Bacon Computing Laboratory University of Cambridge firstname.lastname@cl.cam.ac.uk Abstract. There is a movement in healthcare

More information

Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering.

Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering. Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering. Jyoti More. ME student, Dept of Computer Engg G.H.Raisoni College of Engineering, Savitribai Phule

More information

An Architecture for Interaction Event Processing in Tabletop Systems

An Architecture for Interaction Event Processing in Tabletop Systems Sensyble Workshop 2010 manuscript No. (will be inserted by the editor) An Architecture for Interaction Event Processing in Tabletop Systems Simon Lehmann 1, Ralf Dörner 1, Ulrich Schwanecke 2, Johannes

More information

Dynamic Load Balancing for Cluster-based Publish/Subscribe System

Dynamic Load Balancing for Cluster-based Publish/Subscribe System Dynamic Load Balancing for Cluster-based Publish/Subscribe System Hojjat Jafarpour, Sharad Mehrotra and Nalini Venkatasubramanian Department of Computer Science University of California, Irvine {hjafarpo,

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

APIL 2007 - A Guide to Multiple Domain Publishing and Subscribe Systems

APIL 2007 - A Guide to Multiple Domain Publishing and Subscribe Systems JOURNAL OF NETWORKS, VOL. 2, NO. 2, APRIL 2007 57 Access Control in Decentralised Publish/Subscribe Systems Lauri I.W. Pesonen, David M. Eyers, and Jean Bacon University of Cambridge, Computer Laboratory

More information

Trust Based Infererence Violation Detection Scheme Using Acut Model

Trust Based Infererence Violation Detection Scheme Using Acut Model www.ijcsi.org 668 Trust Based Infererence Violation Detection Scheme Using Acut Model Mr. K. Karthikeyan 1, Dr. T. Ravichandran 2 1 Research Scholar, Department of Computer Science, Karpagam University,

More information

A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems

A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems Lauri I.W. Pesonen, David M. Eyers, and Jean Bacon University of Cambridge, Computer Laboratory JJ Thomson Avenue,

More information

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,

More information

Personalization of Web Search With Protected Privacy

Personalization of Web Search With Protected Privacy Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Internet has revolutionized the world. There seems to be no limit to the imagination of how computers can be used to help mankind. Enterprises are typically comprised of hundreds

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Middleware support for the Internet of Things

Middleware support for the Internet of Things Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Preventing Denial-of-request Inference Attacks in Location-sharing Services

Preventing Denial-of-request Inference Attacks in Location-sharing Services Preventing Denial-of-request Inference Attacks in Location-sharing Services Kazuhiro Minami Institute of Statistical Mathematics, Tokyo, Japan Email: kminami@ism.ac.jp Abstract Location-sharing services

More information

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization KanwalpreetKaur #, Satwinder Singh * #Research Scholar, Dept of Computer Science and

More information

Supporting Mobility In Publish-Subscribe Networks

Supporting Mobility In Publish-Subscribe Networks A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks Vasilios A. Siris, Xenofon Vasilakos, and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

IoT is a King, Big data is a Queen and Cloud is a Palace

IoT is a King, Big data is a Queen and Cloud is a Palace IoT is a King, Big data is a Queen and Cloud is a Palace Abdur Rahim Innotec21 GmbH, Germany Create-Net, Italy Acknowledgements- ikaas Partners (KDDI and other partnes) Intelligent Knowledge-as-a-Service

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Bala Kumari P 1, Bercelin Rose Mary W 2 and Devi Mareeswari M 3 1, 2, 3 M.TECH / IT, Dr.Sivanthi Aditanar College

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

Computing Range Queries on Obfuscated Data

Computing Range Queries on Obfuscated Data Computing Range Queries on Obfuscated Data E. Damiani 1 S. De Capitani di Vimercati 1 S. Paraboschi 2 P. Samarati 1 (1) Dip. di Tecnologie dell Infomazione (2) Dip. di Ing. Gestionale e dell Informazione

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

International Journal of Innovative Research in Computer and Communication Engineering. (An ISO 3297: 2007 Certified Organization)

International Journal of Innovative Research in Computer and Communication Engineering. (An ISO 3297: 2007 Certified Organization) Improved Performance of Web Based Database Management for Telemedicine by Using Three Fold Approach of Data Fragmentation,Websites Data Clustering and Data Allocation Sneha Katale 1, Sonali Hotkar 2, Abhijeet

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142

More information

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College

More information

Activity Mining for Discovering Software Process Models

Activity Mining for Discovering Software Process Models Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de

More information

Firewall Policy Anomalies- Detection and Resolution

Firewall Policy Anomalies- Detection and Resolution Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

Cloud Computing and Software Agents: Towards Cloud Intelligent Services

Cloud Computing and Software Agents: Towards Cloud Intelligent Services Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy talia@deis.unical.it Abstract Cloud computing systems provide large-scale

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Information Services for Smart Grids

Information Services for Smart Grids Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Sean Thorpe 1, Indrajit Ray 2, and Tyrone Grandison 3 1 Faculty of Engineering and Computing,

More information

5-Layered Architecture of Cloud Database Management System

5-Layered Architecture of Cloud Database Management System Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

A Model For Revelation Of Data Leakage In Data Distribution

A Model For Revelation Of Data Leakage In Data Distribution A Model For Revelation Of Data Leakage In Data Distribution Saranya.R Assistant Professor, Department Of Computer Science and Engineering Lord Jegannath college of Engineering and Technology Nagercoil,

More information

Profile Based Personalized Web Search and Download Blocker

Profile Based Personalized Web Search and Download Blocker Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,

More information

Towards P2P-based Computer Network Management *

Towards P2P-based Computer Network Management * Towards P2P-based Computer Network Management * Hui Xu, and Debao Xiao Department of Computer Science, Huazhong Normal University Wuhan, P.R. China, 430079 xuhui_1004@hotmail.com Abstract Nowadays, the

More information

Privacy Preserving Distributed Cloud Storage

Privacy Preserving Distributed Cloud Storage Privacy Preserving Distributed Cloud Storage Praveenkumar Khethavath 1 *, Doyel Pal 2 1 Department of Mathematics, Engineering and Computer Science, LaGuardia Community College, Long Island City, NY 11101.

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

QoS Monitoring in a Cloud Services Environment: the SRT-15 Approach

QoS Monitoring in a Cloud Services Environment: the SRT-15 Approach QoS Monitoring in a Cloud Services Environment: the SRT-15 Approach Giuseppe Cicotti, Luigi Coppolino, Rosario Cristaldi, Salvatore D Antonio, and Luigi Romano Epsilon srl, Naples - Italy Abstract. The

More information

Knowledge-based Expressive Technologies within Cloud Computing Environments

Knowledge-based Expressive Technologies within Cloud Computing Environments Knowledge-based Expressive Technologies within Cloud Computing Environments Sergey V. Kovalchuk, Pavel A. Smirnov, Konstantin V. Knyazkov, Alexander S. Zagarskikh, Alexander V. Boukhanovsky 1 Abstract.

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

Tensor Factorization for Multi-Relational Learning

Tensor Factorization for Multi-Relational Learning Tensor Factorization for Multi-Relational Learning Maximilian Nickel 1 and Volker Tresp 2 1 Ludwig Maximilian University, Oettingenstr. 67, Munich, Germany nickel@dbs.ifi.lmu.de 2 Siemens AG, Corporate

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

A Secure Model for Medical Data Sharing

A Secure Model for Medical Data Sharing International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 ushaduraisamy@yahoo.co.in 2 anishgracias@gmail.com Abstract A vast amount of assorted

More information

A Contribution to Expert Decision-based Virtual Product Development

A Contribution to Expert Decision-based Virtual Product Development A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,

More information

A Framework of Personalized Intelligent Document and Information Management System

A Framework of Personalized Intelligent Document and Information Management System A Framework of Personalized Intelligent and Information Management System Xien Fan Department of Computer Science, College of Staten Island, City University of New York, Staten Island, NY 10314, USA Fang

More information

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University

More information

Specific Usage of Visual Data Analysis Techniques

Specific Usage of Visual Data Analysis Techniques Specific Usage of Visual Data Analysis Techniques Snezana Savoska 1 and Suzana Loskovska 2 1 Faculty of Administration and Management of Information systems, Partizanska bb, 7000, Bitola, Republic of Macedonia

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

Extending AOP Principles for the Description of Network Security Patterns

Extending AOP Principles for the Description of Network Security Patterns Extending AOP Principles for the Description of Network Security Patterns David Llewellyn-Jones, Qi Shi, Madjid Merabti School of Computing and Mathematical Sciences Liverpool John Moores University Liverpool,

More information

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.

More information

Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects

Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects Giovanni Meroni 1 Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria

More information

Toward a Smart Platform for Data Stream Processing in Smart Cities: Distributed Qos-aware Scheduling in Storm

Toward a Smart Platform for Data Stream Processing in Smart Cities: Distributed Qos-aware Scheduling in Storm Toward a Smart Platform for Data Stream Processing in Smart Cities: Distributed Qos-aware Scheduling in Storm Valeria Cardellini, Vincenzo Grassi, Francesco Lo Presti, Matteo Nardelli Smart City and Data

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

FPGA area allocation for parallel C applications

FPGA area allocation for parallel C applications 1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University

More information

Big Data with Rough Set Using Map- Reduce

Big Data with Rough Set Using Map- Reduce Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,

More information

A Model for Component Based E-governance Software Systems

A Model for Component Based E-governance Software Systems A Model for Component Based E-governance Software Systems A.SHRABAN KUMAR 1, G.JAYARAO 2,B.SHANKAR NAYAK 3, KBKS. DURGA 4 A.ESWARA RAO 5 1,2,3,4 Associate Professor CSE, St.MARTIN S ENGINEERING COLLEGE,

More information

A Novel Approach to QoS Monitoring in the Cloud

A Novel Approach to QoS Monitoring in the Cloud A Novel Approach to QoS Monitoring in the Cloud 2nd Training on Software Services- Cloud computing - November 11-14 Luigi Sgaglione EPSILON srl luigi.sgaglione@epsilonline.com RoadMap Rationale and Approach

More information

Thesis work and research project

Thesis work and research project Thesis work and research project Hélia Pouyllau, INRIA of Rennes, Campus Beaulieu 35042 Rennes, helia.pouyllau@irisa.fr July 16, 2007 1 Thesis work on Distributed algorithms for endto-end QoS contract

More information

Resource Selection in Collaborative Cloud Computing Based on User Preference

Resource Selection in Collaborative Cloud Computing Based on User Preference Resource Selection in Collaborative Cloud Computing Based on User Preference W.Renuka Devi 1, K.Sudhakar 2 P.G Student. Department of Computer Engineering, GPREC Engineering College, Kurnool, Andhra Pradesh,

More information

How To Balance A Single Failure With A Single Power Of Two (Sus)

How To Balance A Single Failure With A Single Power Of Two (Sus) Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing A. Kanso, F. Khendek, A. Hamou-Lhadj Electrical and Computer Engineering Department Concordia University

More information

American Journal of Engineering Research (AJER) 2013 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-2, Issue-4, pp-39-43 www.ajer.us Research Paper Open Access

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under

More information

Mobile Fog: A Programming Model for Large Scale Applications on the Internet of Things

Mobile Fog: A Programming Model for Large Scale Applications on the Internet of Things Mobile Fog: A Programming Model for Large Scale Applications on the Internet of Things Kirak Hong, David Lillethun, Umakishore Ramachandran College of Computing Georgia Institute of Technology Atlanta,

More information

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3

More information

Secure Cloud Storage using Multi Attribute Authority with Multi Central Authority

Secure Cloud Storage using Multi Attribute Authority with Multi Central Authority Secure Cloud Storage using Multi Attribute Authority with Multi Central Authority Minakshi V.Shinde Computer Science & Engineering JSCOE,Hadapsar Pune, India Chavanminakshi14@gmail.com Prof.H.A.Hingoliwala.

More information

Automated Validation & Verification of Software Paper Presentation

Automated Validation & Verification of Software Paper Presentation Regression Test Selection for Java Software Salvador Valencia Rodríguez Automated Validation & Verification of Software Paper Presentation Paper authors Mary Jean Harrold James A. Jones Tongyu Li Donglin

More information

A Secure Mediator for Integrating Multiple Level Access Control Policies

A Secure Mediator for Integrating Multiple Level Access Control Policies A Secure Mediator for Integrating Multiple Level Access Control Policies Isabel F. Cruz Rigel Gjomemo Mirko Orsini ADVIS Lab Department of Computer Science University of Illinois at Chicago {ifc rgjomemo

More information

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2 Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,

More information

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers 1 Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of

More information

Achieving Semantic Interoperability By UsingComplex Event Processing Technology

Achieving Semantic Interoperability By UsingComplex Event Processing Technology Achieving Semantic Interoperability By UsingComplex Event Processing Technology Margarete Donovang-Kuhlisch Geschäftsbereich Verteidigung IBMDeutschlandGmbH Gorch-Fock-Str. 4 D-53229Bonn mdk@de.ibm.com

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,

More information

ANALYSIS OF SECURITY ISSUES IN PUBLISH/SUBSCRIBER SYSTEMS

ANALYSIS OF SECURITY ISSUES IN PUBLISH/SUBSCRIBER SYSTEMS ANALYSIS OF SECURITY ISSUES IN PUBLISH/SUBSCRIBER SYSTEMS Velivemula Nasaramma 1, J A Paulson 2 1 M.Tech (CSE), 2 Professor (CSE), Nalanda Institute Of Engineering& Technology (NIET), Kantepudi( V),Sattenpalli

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Self-Compressive Approach for Distributed System Monitoring

Self-Compressive Approach for Distributed System Monitoring Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer

More information

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Distribution transparency. Degree of transparency. Openness of distributed systems

Distribution transparency. Degree of transparency. Openness of distributed systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed

More information

Logical Data Models for Cloud Computing Architectures

Logical Data Models for Cloud Computing Architectures Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information