A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM



Similar documents
A Novel Lightweight Algorithm for Secure Network Coding

Additional File 1 - A model-based circular binary segmentation algorithm for the analysis of array CGH data

Bending Stresses for Simple Shapes

Efficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction

(Semi)Parametric Models vs Nonparametric Models

A New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand

An Algorithm For Factoring Integers

AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE

Joint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments

Gravitation. Definition of Weight Revisited. Newton s Law of Universal Gravitation. Newton s Law of Universal Gravitation. Gravitational Field

Research on Cloud Computing Load Balancing Based on Virtual Machine Migration

Perturbation Theory and Celestial Mechanics

Orbit dynamics and kinematics with full quaternions

Prejudice and the Economics of Discrimination

Electric Potential. otherwise to move the object from initial point i to final point f

PCA vs. Varimax rotation

Keywords: Transportation network, Hazardous materials, Risk index, Routing, Network optimization.

What is Candidate Sampling

REAL TIME MONITORING OF DISTRIBUTION NETWORKS USING INTERNET BASED PMU. Akanksha Eknath Pachpinde

Converting knowledge Into Practice

TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS

An Alternative Way to Measure Private Equity Performance

A Mathematical Model for Selecting Third-Party Reverse Logistics Providers

How to create a default user profile in Windows 7

LINES ON BRIESKORN-PHAM SURFACES

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , info@teltonika.

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing

PREVENTIVE AND CORRECTIVE SECURITY MARKET MODEL

Over-encryption: Management of Access Control Evolution on Outsourced Data

Statistical modelling of gambling probabilities

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

IBM Research Smarter Transportation Analytics

SEVERAL trends are opening up the era of Cloud

Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption

IT09 - Identity Management Policy

econstor zbw

Statistical Discrimination or Prejudice? A Large Sample Field Experiment. Michael Ewens, Bryan Tomlin, and Liang Choon Wang.

I = Prt. = P(1+i) n. A = Pe rt

Mixed Task Scheduling and Resource Allocation Problems

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Charging the Internet Without Bandwidth Reservation: An Overview and Bibliography of Mathematical Approaches

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

On the Efficiency of Equilibria in Generalized Second Price Auctions

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Faithful Comptroller s Handbook

Strength Analysis and Optimization Design about the key parts of the Robot

How to recover your Exchange 2003/2007 mailboxes and s if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

A Coverage Gap Filling Algorithm in Hybrid Sensor Network

Simultaneous Detection and Estimation, False Alarm Prediction for a Continuous Family of Signals in Gaussian Noise

Finite Math Chapter 10: Study Guide and Solution to Problems

AN EQUILIBRIUM ANALYSIS OF THE INSURANCE MARKET WITH VERTICAL DIFFERENTIATION

SEVERAL trends are opening up the era of Cloud

Financial Mathemetics

A New Estimation Model for Small Organic Software Project

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION

An Efficient Group Key Agreement Protocol for Ad hoc Networks

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

Forecasting the Direction and Strength of Stock Market Movement

An Interest-Oriented Network Evolution Mechanism for Online Communities

The OC Curve of Attribute Acceptance Plans

Modeling and computing constrained

The transport performance evaluation system building of logistics enterprises

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Cloud Service Reliability: Modeling and Analysis

Ilona V. Tregub, ScD., Professor

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Discussion Papers. Thure Traber Claudia Kemfert

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

OPINION DYNAMICS AND BOUNDED CONFIDENCE MODELS, ANALYSIS, AND SIMULATION

FAIR VALUATION OF VARIOUS PARTICIPATION SCHEMES IN LIFE INSURANCE ABSTRACT

Tasmanian Greens MPs Reply to the Electricity Supply Industry Expert Panel: Powering Tasmania s Transition to a 100% Renewable Energy Future

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

A powerful tool designed to enhance innovation and business performance

GMA/FPA SmartBrief. ASTA SmartBrief. The premier source of daily news delivered to the desktops of travel agents and executives.

Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN. Colliers International Office Leasing Guide P. 1

Multiple-Period Attribution: Residuals and Compounding

DOCTORATE DEGREE PROGRAMS

Define What Type of Trader Are you?

Spirotechnics! September 7, Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

LIFETIME INCOME OPTIONS

883 Brochure A5 GENE ss vernis.indd 1-2

Voltage ( = Electric Potential )

Transcription:

A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM Pavalka Mudabona 1, Bhaluda Raveendanadh Sngh 2, Akuthota Mahesh 3 1 Pusung M.Tech (CSE), 2 Pncpal, 3 Assstant Pofesso(CSE), Vsvesvaaya College of Engneeng and Technology (VCET), M.P Patelguda, Ibahmpatnam (M), Ranga Reddy, (Inda) ABSTRACT Cloud computng s an ognal egsteng model that empowes helpful and on demand access to a common pool of confguable fgung assets. Evaluatng admnstatons ae pofoundly key to vefy that the nfomaton s accuately facltated n the cloud. In ths pape, we exploe the dynamc opponent assaults n thee evaluatng nstuments fo shaed nfomaton n the cloud, ncludng two chaacte potecton savng nspectng systems called Outa and Knox, and an appopated stockplng tustwothness nspectng system. We demonstate that these plans get to be shaky when dynamc foes ae ncluded n the dstbuted stoage. In patcula, a dynamc enemy can subjectvely modfy the cloud nfomaton wthout beng dstngushed by the evaluato n the confmaton stage. We lkewse popose an answe fo cue the shotcomng wthout elnqushng any attactve elements of these components. 1. INTRODUCTION Numeous pattens ae openng up the peod of cloud fgung, whch s an Intenet-based advancement and utlzaton of PC nnovaton. The ntense pocessos, togethe wth the Softwae as a Sevce fgung stuctual plannng, that ae tansmttng, nfomaton stockplng nto pools of fgung admnstaton on colossal scale. Movng nfomaton nto the cloud offes awesome pesuades to clents snce they don't have to stess ove the complextes of dect equpment and pogammng admnstaton. The ponee of dstbuted computng mechants, Amazon Smple Stoage Sevce (S3) and Amazon Elastc Cloud (EC2) ae both suely undestood samples. The expandng system tansfe speed and dependable yet adaptable system assocatons make t even concevable that clents can now subscbe supeb admnstatons fom nfomaton and pogammng that dwell exclusvely on emote nfomaton centes. Whle these web based onlne admnstatons do gve ggantc measue of stoage oom and adaptable egsteng assets, the movement to dstbuted stoage s wpng out oblgaton of neghbohood machnes fo nfomaton upkeep n the meantme. Fom one pespectve, n spte of the fact that the cloud foundatons ae a geat deal all the moe effectve and sold than ndvdualzed computng gadgets, cetan degee nteo and oute danges fo nfomaton upghtness happens. Case n pont, to buld the net evenue CSP may ease as often as possble got to nfomaton wthout beng dentfed n a oppotune desgn. Thus, CSP may even endeavo to stow away nfomaton msfotune occuences n ode to keep up notoety. In ths manne, albet outsoucng nfomaton nto the cloud s fnancally appealng fo the expense 19 P a g e

and many-sded qualty of long haul extensve scale stockplng of nfomaton tustwothness and accessblty may delay ts wde selecton by both undetakng and ndvdual cloud clents. Keepng n mnd the end goal to accomplsh the cetfcatons of cloud nfomaton espectablty and accessblty and authoze the natue of dstbuted stoage admnstaton, poductve outnes that empowe on-nteest nfomaton accuacy check fo sake of cloud clents need to outlne. The clent dd not have physcal owneshp of nfomaton n the cloud pecludes the dect adopton of conventonal cyptogaphc pmtves fo the eason fo nfomaton upghtness assuance. Hencefoth, the check of dstbuted stoage accuacy must be dected wthout unequvocal nfomaton of the ente nfomaton ecods. In the mean tme, dstbuted stoage s not only an outsde nfomaton dstbuton cente. The nfomaton put away need not be gotten to but athe lkewse be egulaly edesgned by the clents, ncludng some of the opeatons lke supplement, ease,upgade, affx Thus, t s addtonally basc to suppot the ncopoaton of ths element hghlght nto the dstbuted stoage accuacy declaaton, whch bngs a testng outlne fo the famewok. Last yet not the mnmum, the oganzaton of cloud egsteng s contolled by seve fams unnng n a synchonous, chpped n, and dssemnated way. Cloud stoage, a vtal admnstaton of dstbuted computng, pemts clents to move nfomaton fom the neghbohood stockplng famewoks to the cloud and appecate the on-nteest excellent cloud admnstatons. It offes extaodnay comfot to clents snce they ty not to need to thnk about the complextes of dect equpment and pogammng admnstatons. Futhemoe, wth dstbuted stoage, nfomaton shang s acknowledged pofcently among an expansve numbe of clents n a gatheng and t tuns nto a standad component n most dstbuted stoage offengs, ncludng Dop box and Google Docs. Although dstbuted stoage gves numeous engagng advantages to clents, t moeove pompts vaous secuty ssues towads the outsouced nfomaton. The nfomaton consume on the cloud s effectvely be debased, adjusted o eased because of equpment dsappontment o human slps, n ths manne, ensung the accuacy and espectablty of the nfomaton n the cloud s pofoundly key. To accomplsh ths objectve, two novel methodologes called povable nfomaton possesson (PDP) and vefcatons of etevablty (POR) was poposed. In 2007, Attendees et al. poposed, fo the fst ty-out, the dea of PDP to check the tustwothness of the nfomaton consume at un tusted seves, and exhbted an open evewng plan utlzng RSA-based homomophc dect authentcatos. They addtonally potayed a feely notceable plan, whch pemts any outsde to challenge the seve fo nfomaton owneshp. To boost dynamc nfomaton opeatons, Atenese et al. poposed a flexble PDP n lght of hash capacty and symmetc key encypton. Then agan, n ths plan, the quanttes of upgade and test ae estcted and need to be pefxed and squae nseton s not pemtted. In ths manne, Eway et al. ceated two element PDP conventons takng nto account hash tees. Juels et al. poposed a POR model to guaantee both nfomaton owneshp and etevablty. Shockngly, ths nstument avods effectve augmentaton fo upgadng nfomaton. Sachems and Wates potayed two answes fo guaanteeng the upghtness of emote nfomaton. The pncpal plan makes utlzaton of pseudoandom capactes and undepns pvate evaluatng, whle the second one pemts open nspectng and s n lght of BLS shot mak.in vew of the BLS shot mak, Wang et al. ntoduced nfomaton tustwothness checkng ways to deal wth accomplsh open audt ablty, capacty ghtness, secuty potectng, clump examnng, lghtweght, dynamc nfomaton backng and blunde aea and ecovey. Fom 20 P a g e

that pont fowad, a few othe evewng components, fo example, have been poposed fo secung the tustwothness of the outsouced nfomaton. The vast majoty of the cuent aangements just concentate on examnng the espectablty of the emote nfomaton. Be that as t may, secuty potectng s pofoundly key amd the nspectng pocess. Wang et al. poposed a potecton savng open examnng nstument, n whch the substance of clents' nfomaton s not unveled to the examne. As of late, Wang et al. watched that potectng chaacte secuty fom the evewe amd the examnng pocedue s lkewse fundamental snce the chaactes of clents may show that a specfc clent n the gatheng o an uncommon pece n the mutual nfomaton s a moe mpotant focus as othes. They lkewse poposed two chaacte potecton savng evewng components, called Outa and Knox, fo secue dstbuted stoage. In Outa, ng maks based homomophc authentcatos ae utlzed such that the nspecto can check the tustwothness of the shaed nfomaton fo a gatheng of clents wthout ecoveng the whole nfomaton, whle the pesonalty of the clent on evey pece on the common nfomaton s kept secet fom the evaluato. A downsde of Outa s that the extent of the maks and audtng vefcatons ae dectly expandng wth the quantty of the clents n a gatheng. In addton, when anothe clent s added to the gatheng, evey one of the maks has to be eceated. Knox utlzed gatheng mak based homomophc authentcatos to take cae of the ssue, futhemoe abbevated the extent of authentcatos also, the evewng evdences whle savng the popetes of chaacte potecton savng, open evaluatng and clump examnng. In ths pape, we etun to thee evaluatng nstuments fo secue dstbuted stoage, countng two pesonalty potecton safeguadng components and a conveyed capacty upghtness nspectng nstument. We demonstate that the popety of ghtness can't be accomplshed when dynamc enemes ae ncluded n these nspectng famewoks. All the moe patculaly, a dynamc enemy can self-assetvely alte the cloud nfomaton and poduce a legtmate nspectng eacton to pass the nspecto's confmaton. As a esult, the enemy can tck the nspecto to accept that the nfomaton n the cloud s vey much kept up whle actually the nfomaton has been defled. We addtonally popose an answe fo ntenton the shotcomng n these plans. II. SECURITY DISCUSSIONS ON A DISTRIBUTED STORAGE AUDITING MECHANISM Secuty dscussons on a dstbuted stoage mechansm evew the dstbuted stoage ntegty audtng mechansm n bef detals about ts secuty n the stuaton of actve opposton. Some notatons ae defned n below as follows. F: The nfomaton data fle to be stoed. Hee F can be dvded nto multple pats as a matx equal sze of m data vectos, each vecto consstng the blocks of l blocks. A: Reed Solomon codng pupose.the speadng matx s denoted by A. G: Encoded fle matx s denoted by G, whch contans a set of n=m+k vectos each nclude l blocks. f key (.): The pseudoandom functon (PRF), whch s epesent as f:{0,1}* key GF(2 p ). key (.): The Pseudoandom pemutaton (PRP) whch s defned by : {0,1} log 2(l) key {0,1} log 2(l) Anothe one s : ve : A veson numbe bound wth the ndex fo ndependent ecods blocks, whch ecod the tmes the block has been changed. 21 P a g e

s ve j : The seed fo PRF, whch based on the fle name s block ndex j s seve poston j as well as the choce block veson ve. Analyss of the scheme: The man method s composed based on followng thee algothms Fle Dstbuton pepaaton: Let F=(F 1, F 2, F 3, F 4, F 5 F 6, F 7, F m, ) and F =(f 1, f 2, f 3, f 4, f l, ) T, ( 1,2 m). T epesents each F s epesented as a column vecto and epesented by l s denoted data sze of vcto I block, the nfomaton spead matx A, deved fom an m (m+k) vandemonde matx : I q= k pp q.β j Whee β j (j 1,2,3. n) ae the dffeent elements andomly selected fom GF(2 w ) Afte a sequence of elementay ow tansfomatons, the pefeed matx A can be wtten By multplyng F by A, the use can gan encoded fle G=F.A =(G (1), G (2), G (3), G (4), G (5). G (m ), G (m +1),. G (n) ) =(F 1, F 2, F 3, F 4,. F m, G (m +1),. G (n) ) Whee G j (j =(g ) (j 1, g ) (j 2, g ) (j 3 g ) l ) T (j 1,2,3, n). III. TOKEN PRE COMPUTATIONS Fo example use wants to challenge the t seve tmes, fst pevously he wll calculate vefcatons tokens of t fo each token G (j ) (j 1,2,3 n) usng PRF f key (.), a PRP key (.), a challenge of matx s k cal and pemutaton of maste page s K PRP. Fo equest seve j, the clent ceate th token as follow the below steps Geneate a andom value α of GF(2 p () ) by α =fk cal () and pemutaton key s k pp based on K PRP 22 P a g e

Calculate the set of values andomly chosen ndcate {I q 1,2,3. l 1 q } whee I q = () Kpp (q). Fnd the token as v (j ) = q q=1 α *G (j ) [I q ], whee G (j ) (j [I q ]=g ) Iq. IV. CORRECTNESS VERIFICATION The challenge fnd of I th esponse checkng ove the seve act as follows The use evals the α as well as the () I th pemutaton s k pp to each seve The seve stong vecto s G (j) () (j 1,2,3, n) geneate those ows ndcated by ndex k pp combnaton R (j ) = q q=1 α *G (j ) (j [ () Kpp (q)] afte send back R ) =(j 1,2,3, n). nto lne Afte ecevng R (j ) fom all the seve, the use takes away blnd values n R (j ) (j m +1,2,3, n) by R (j ) R (j ) - q=1 f k j (SI q,j ). α q whee I q = Kpp q. The use checks whethe the eceved value secet matx(r (1) (m,.. R ) (m ).P=(R +1), R (n) ) If the above statement challaged passed, else t dsplays among those specfed ows, fle exsts fo fle block coupton. Same as the analyss method of Outa and knox an actve advesay A can be tempoaly change the data block values wthout need of the actual block values, but at the same tme fool the clent use feels the data well adjusted and mantaned by the cloud seve. The bef detals ae shown below as follows. A selected an l n matx Y whose contanng elements ae y () p GF(2 p ),(1 q l,1 j n). A modfes the data block s (G j [ kpp q ]) to (G j [ kpp q ]) + y q fo 1 q. In fnd out audt segment, the use and the seve use executes the pogam tuly the use eveals the α as well () as the I th pemutaton key k pp back to the use, whee to each seve afte seve fnd the esponse R (j ) (j 1,2,3, n). and send t R j = q=1 q *(G j [ kpp (q)]+y q ) = q=1 q *(G j [ kpp q ]) + ( q q=1 *y q ) =R (j ) + ( q q=1 *y q ) A Coss the esponse R j fom the cloud seve to the audto, and modfes R j to R j = R j q=1 ( q *y q ) and fowads R (j ) to the use It s anythng but dffcult to watch that the confmaton wll be effectve. Luckly, vefcaton s assumed n [15]. The pont-to-pont coespondence channels between evey cloud seve and the clent s thought to be confmed and dependable. We contend that ths s vey fundamental. Somethng else, the system mght be fal aganst a dynamc assault as potayed pevously. Amd the executon as a geneal ule, the seve can utlze a potected advanced mak to accomplsh the objectve, as poposed n the past segment. 23 P a g e

V. CONCLUSION In ths pape, we etuned to thee nspectng systems fo shaed nfomaton n the cloud, ncludng two pesonalty secuty safeguadng evaluatng nstuments and a dspesed capacty tustwothness evaluatng nstument. We exhbt that f the cloud seve does not valdate ts eacton, a dynamc foe can dspatch an assault to damage the capacty accuacy. In patcula, the enemy can self-assetvely adjust the cloud nfomaton wthout beng dentfed by the evewe n the check stage. It appeas that ths sot of assault was not consdeed n the past poposton, and luckly, the ceatos of specfed that dependable channels between cloud seve and clents ae oblged howeve wth no sold sendng. We poposed utlzng a safe computezed mak plan to settle the ssue wthout gvng up any attactve component of the fst systems. REFERENCES [1]. M. T. Khoshed, A. B. M. Al, S. A. Wasm, A suvey on gaps, theat emedaton challenges and some thoughts fo poactve attack detecton n cloud computng, Futue Geneaton Compute Systems, 28(6)(2012) 833 851. [2]. Ku Ren, Cong Wang, Qan Wang: Secuty Challenges fo the Publc Cloud. IEEE Intenet Computng 16(1)(2012) 69 73. [3]. G. Atenese, R. C. Buns, R. Cutmola, J. Heng, L. Kssne, Z. N. J. Peteson, D. X. Song, Povable data possesson at untusted stoes, n: ACM Confeence on Compute and Communcatons Secuty 2007, pp. 598 609. [4]. G. Atenese, R. D. Peto, L. V. Mancn, G. Tsudk. Scalable and effcent povable data possesson, n: Poc. of SecueComm 2008, pp. 1 10. [5]. C. C. Eway, A. Kupcu, C. Papamanthou, R. Tamassa, Dynamc povable data possesson, Poc. of CCS 2009, pp. 213 222. [6]. A. Juels, J. Buton S. Kalsk, PORs: Poofs of etevablty fo lage fles, n: Poc. of CCS 07, pp. 584-597. [7]. H. Shacham, B. Wates, Compact poofs of etevablty, n: Poc. of Asacypt 2008, pp. 90-107. [8]. D. Boneh, B. Lynn, H. Shacham, Shot sgnatues fom the Wel pang, J. Cyptology, 17(4)(2004) 297 319. [9]. C. Wang, Q. Wang, K. Ren, W. Lou, Pvacy-pesevng publc audtng fo data stoage secuty n cloud computng, n: Poc. of INFOCOM 2010, pp. 525 533. [10]. Q. Wang, C. Wang, K. Ren, W. Lou, J. L, Enablng publc audtablty and data dynamcs fo stoage secuty n cloud computng, IEEE Tans. Paallel Dstb. Syst. 22(5) (2011) 847 859. [11]. C. Wang, K. Ren, W. Lou, J. L, Towad publcly audtable secue cloud data stoage sevces, IEEE Netwok, 24(4) (2010) 19 24. [12]. Y. Zhu, H. Hu, G. Ahn, M. Yu, Coopeatve povable data possesson fo ntegty vefcaton n multcloud stoage, IEEE Tans. Paallel Dstb. Syst. [13]. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, Dynamc audt sevces fo ntegty vefcaton of outsouced stoages n clouds, n: SAC 2011 pp. 1550 1557. 24 P a g e

[14]. C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, Towad secue and dependable stoage sevces n cloud computng, IEEE Tans. on Sevces Computng [15]. B. Wang, B. L, H. L, Outa:Pvacy-pesevng publc audtng fo shaed data n the cloud, n: IEEE Intenatonal Confeence on Cloud Computng, 2012, pp.293-302. [16]. B. Wang, B. L, H. L, Knox: Pvacy-pesevng audtng fo shaed data wth lage goups n the cloud, n: Poc. of ACNS 2012, pp. 507 525. AUTHOR DETAILS Pavalka Mudabona Pusung M-Tech n Vsvesvaaya College of Engneeng and Technology, M.P Patelguda, Ibahmpatnam (M), Ranga Reddy(D), Inda. S D. Bhaluda Raveendanadh Sngh wokng as Assocate Pofesso & Pncpal n Vsvesvaaya College of Engneeng and Technology obtaned M.Tech, Ph.D(CSE)., s a young, decent, dynamc Renowned Educatonst and Emnent Academcan, has oveall 20 yeas of teachng expeence n dffeent capactes. He s a lfe membe of CSI, ISTE and also a membe of IEEE (USA) M. Mahesh Akuthota wokng as Asst. Pofesso (CSE) n Vsvesvaaya College of Engneeng and Technology, M.P Patelguda, Ibahmpatnam (M), Ranga Reddy(D), Inda. 25 P a g e