2 research outputs found

    Real Time Big Data Analytics Dependence on Network Monitoring Solutions using Tensor Networks and its Decomposition

    Get PDF
    Organizations dealing with huge volumes of data must have a big data infrastructure in place that can accommodate the load of storing, analysing and transporting the data. Suboptimal network performance represents a potential point of failure. Therefore, it is essential to implement redundancy and/or a fail over strategy in order to minimize downtime. With network monitoring, we come to know the status of everything on the network without having to watch it personally and be able to take the timely action to correct problems. But to the extent that companies increase their reliance on real-time streams of marketing and performance big data, the network will become a central part of big data application performance. This is why incorporating network monitoring should be on the company's big data road map if we anticipate using live streaming and analytics of big data in business applications. Keywords: Big Data analytics, suboptimal network performance, network monitoring, live streaming, WAN Management, Network Application Performance Management, Tensor Network

    Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    Get PDF
    In these days there are plenty of signature schemes such as the threshold proxy signature scheme (Kumar and Verma 2010). The network is a shared medium so that the weakness security attacks such as eavesdropping, replay attack, and modification attack. Thus, we have to establish a common key for encrypting/decrypting our communications over an insecure network. In this scheme, a threshold proxy signature scheme based on RSA, any or more proxy signers can cooperatively generate a proxy signature while or fewer of them cannot do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers (Rivest et al., 1978). Comparison is done on the basis of time complexity, space complexity, and communication overhead. We compare the performance of four schemes (Hwang et al. (2003), Kuo and Chen (2005), Yong-Jun et al. (2007), and Li et al. (2007), with the performance of a scheme that has been proposed earlier by the authors of this paper. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks
    corecore