13 research outputs found
Optimization of Cutting Conditions in End Milling Process with the Approach of Particle Swarm Optimization
Milling is one of the progressive enhancements of miniaturized technologies which has wide range of application in industries and other related areas. Milling like any metal cutting operation is used with an objective of optimizing surface roughness at micro level and economic performance at macro level. In addition to surface finish, modern manufacturers do not want any compromise on the achievement of high quality, dimensional accuracy, high production rate, minimum wear on the cutting tools, cost saving and increase of the performance of the product with minimum environmental hazards. In order to optimize the surface finish, the empirical relationships between input and output variables should be established in order to predict the output. Optimization of these predictive models helps us to select appropriate input variables for achieving the best output performance. In this paper, four input variables are selected and surface roughness is taken as output variable. Particle swarm optimization technique is used for finding the optimum set of values of input variables and the results are compared with those obtained by GA optimization in the literature
Data auditing and security in cloud computing: issues, challenges and future directions
Cloud computing is one of the significant development that utilizes progressive computational power and
upgrades data distribution and data storing facilities. With cloud information services, it is essential for
information to be saved in the cloud and also distributed across numerous customers. Cloud information
repository is involved with issues of information integrity, data security and information access by unapproved
users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is
effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art
techniques in data auditing and security are discussed. Challenging problems in information repository auditing
and security are presented. Finally, directions for future research in data auditing and security have been
discusse
MSSS: most significant single-keyword search over encrypted cloud data
Cloud Computing is a popular computing technique
via the Internet. The data owner outsources local data to the
public cloud server to reduce the cost of the data management.
Sensitive data has to be encrypted to ensure privacy before outsourcing. All traditional Searchable Symmetric Encryption (SSE)
schemes search only over encrypted data through keywords,hence
they do not provide effective data utilisation for large dataset
files in cloud. In this paper, we propose a Most Significant
Single-keyword Search (MSSS), that supports efficient search
using a Most Significant Digit (MSD) radix sort. MSD radix sort
is simple and faster in sorting array strings. A mathematical
model is developed to encrypt the indexed keywords for secure
search without the overhead of learning from the attacker/cloud
provider. The proposed scheme reduces the computation overhead. Through numerical analysis, it is shown that the MSSS
scheme can reduce the computation cost of data on owner side
to O(NT × 3). The time complexity of search time is reduced to
O(B) for bucket size B. The proposed scheme is highly secure
and efficient in comparison to the state of the art work
RSSMSO rapid similarity search on metric space object stored in cloud environment
This paper involves a cloud computing environment in which the dataowner outsource the similarity search service to a third party service provider. Privacy of the outsourced data is important because they may be confidential data. The data should be made available to the authorized client groups, but not to be revealed to the service provider in which the data is stored. Given this scenario, the paper presents a technique called RSSMSO which has build phase, query phase, data transformation and search phase. The build phase and the query phase are about uploading the data and querying the data respectively; the data transformation phase transforms the data before submitting it to the service provider for similarity queries on the transformed data; search phase involves searching similar object with respect to query object. The RSSMSO technique provides enhanced query accuracy with low communication
FRORSS: Fast result object retrieval using similarity search on cloud
This paper involves a cloud computing environment in which the data owner out sources the similarity search service to a third party service provider. The user provides an example query to the server to retrieve similar data. Privacy of the outsourced data is important because they may be sensitive, valuable or confidential data. The data should be made available to the authorized client/client groups, but not to be revealed to the service provider in which the data is stored. Given this scenario, the paper presents a technique called FRORSS which has build phase, data transformation and search phase. The build phase is about uploading the data; the data transformation phase transforms the data before submitting it to the service provider for similarity queries on the transformed data; search phase involves searching similar object with respect to query object. Experiments have been carried out on real data sets
SARRC: Secure Auditing and Re-signing of Revoked Customer Chunks by Cloud Using Regression Method
The demand of deploying information has enormously increased within the last decade. Numerous distributed computing service suppliers have emerged (for eg., Microsoft Azure, Dropbox) in order to satisfy the requirements for information repository and high performance computation. The customers using the cloud repository services can conveniently arrange as a cluster and distribute information among themselves. Information proprietor computes the signatures for every chunk and deploys in the distributed server in order to allow the public verifier to perform public integrity verification on the information stored on the cloud server. In Panda scheme [1], by using the proxy re-signatures, Cloud Service Provider (CSP) verifies and re-signs the revoked customer chunks in favor of the existing customers. The malicious CSP might use the Resign key deliberately to transform the signature of one customer to another
Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage
Database outsourcing is one of the important utilities in cloud computing in which the Information Proprietor (IP) transfers the database administration to the Cloud Service Provider (CSP) in order to minimize the administration cost and preservation expenses of the database. Inspite of its immense profit, it undergoes few security issues such as privacy of deployed database and provability of search results. In the recent past, few of the studies have been carried out on provability of search results of Outsourced Database (ODB) that affords correctness and completeness of search results. But in the existing schemes, since there is flow of data between the Information Proprietor and the clients frequently, huge communication cost prevails at the Information Proprietor side. To address this challenge, in this paper we propose Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage (EAODBT). The
SRCBT: Secure Regeneration of Corrupted Blocks by TPA in Cloud
To conserve the deployed information in cloud repository contrary to adulterations, including fault toleration to cloud repository together with information integrity verification and failure restoration becomes important. Belatedly, reconstructing codes acquire recognition because of their reduced reparation bandwidth while ensuring fault toleration. Prevailing distant auditing schemes for reconstructing-coded information authorizes an intermediary to reconstruct authenticators and information blocks on the suspended servers in the course of the reparation process. To address this issue, we propose Secure Regeneration of Corrupted Blocks by TPA in Cloud (SRCBT). We eliminate the semi-trusted proxy and allow the TPA to reconstruct authenticators and information chunks on the suspended servers in the course of the reparation process. Thus, our mechanism can totally relinquish information proprietors from online