13 research outputs found

    Optimization of Cutting Conditions in End Milling Process with the Approach of Particle Swarm Optimization

    Get PDF
    Milling is one of the progressive enhancements of miniaturized technologies which has wide range of application in industries and other related areas. Milling like any metal cutting operation is used with an objective of optimizing surface roughness at micro level and economic performance at macro level. In addition to surface finish, modern manufacturers do not want any compromise on the achievement of high quality, dimensional accuracy, high production rate, minimum wear on the cutting tools, cost saving and increase of the performance of the product with minimum environmental hazards. In order to optimize the surface finish, the empirical relationships between input and output variables should be established in order to predict the output. Optimization of these predictive models helps us to select appropriate input variables for achieving the best output performance. In this paper, four input variables are selected and surface roughness is taken as output variable. Particle swarm optimization technique is used for finding the optimum set of values of input variables and the results are compared with those obtained by GA optimization in the literature

    Data auditing and security in cloud computing: issues, challenges and future directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discusse

    MSSS: most significant single-keyword search over encrypted cloud data

    Get PDF
    Cloud Computing is a popular computing technique via the Internet. The data owner outsources local data to the public cloud server to reduce the cost of the data management. Sensitive data has to be encrypted to ensure privacy before outsourcing. All traditional Searchable Symmetric Encryption (SSE) schemes search only over encrypted data through keywords,hence they do not provide effective data utilisation for large dataset files in cloud. In this paper, we propose a Most Significant Single-keyword Search (MSSS), that supports efficient search using a Most Significant Digit (MSD) radix sort. MSD radix sort is simple and faster in sorting array strings. A mathematical model is developed to encrypt the indexed keywords for secure search without the overhead of learning from the attacker/cloud provider. The proposed scheme reduces the computation overhead. Through numerical analysis, it is shown that the MSSS scheme can reduce the computation cost of data on owner side to O(NT × 3). The time complexity of search time is reduced to O(B) for bucket size B. The proposed scheme is highly secure and efficient in comparison to the state of the art work

    RSSMSO rapid similarity search on metric space object stored in cloud environment

    No full text
    This paper involves a cloud computing environment in which the dataowner outsource the similarity search service to a third party service provider. Privacy of the outsourced data is important because they may be confidential data. The data should be made available to the authorized client groups, but not to be revealed to the service provider in which the data is stored. Given this scenario, the paper presents a technique called RSSMSO which has build phase, query phase, data transformation and search phase. The build phase and the query phase are about uploading the data and querying the data respectively; the data transformation phase transforms the data before submitting it to the service provider for similarity queries on the transformed data; search phase involves searching similar object with respect to query object. The RSSMSO technique provides enhanced query accuracy with low communication

    FRORSS: Fast result object retrieval using similarity search on cloud

    No full text
    This paper involves a cloud computing environment in which the data owner out sources the similarity search service to a third party service provider. The user provides an example query to the server to retrieve similar data. Privacy of the outsourced data is important because they may be sensitive, valuable or confidential data. The data should be made available to the authorized client/client groups, but not to be revealed to the service provider in which the data is stored. Given this scenario, the paper presents a technique called FRORSS which has build phase, data transformation and search phase. The build phase is about uploading the data; the data transformation phase transforms the data before submitting it to the service provider for similarity queries on the transformed data; search phase involves searching similar object with respect to query object. Experiments have been carried out on real data sets

    SARRC: Secure Auditing and Re-signing of Revoked Customer Chunks by Cloud Using Regression Method

    No full text
    The demand of deploying information has enormously increased within the last decade. Numerous distributed computing service suppliers have emerged (for eg., Microsoft Azure, Dropbox) in order to satisfy the requirements for information repository and high performance computation. The customers using the cloud repository services can conveniently arrange as a cluster and distribute information among themselves. Information proprietor computes the signatures for every chunk and deploys in the distributed server in order to allow the public verifier to perform public integrity verification on the information stored on the cloud server. In Panda scheme [1], by using the proxy re-signatures, Cloud Service Provider (CSP) verifies and re-signs the revoked customer chunks in favor of the existing customers. The malicious CSP might use the Resign key deliberately to transform the signature of one customer to another

    Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage

    No full text
    Database outsourcing is one of the important utilities in cloud computing in which the Information Proprietor (IP) transfers the database administration to the Cloud Service Provider (CSP) in order to minimize the administration cost and preservation expenses of the database. Inspite of its immense profit, it undergoes few security issues such as privacy of deployed database and provability of search results. In the recent past, few of the studies have been carried out on provability of search results of Outsourced Database (ODB) that affords correctness and completeness of search results. But in the existing schemes, since there is flow of data between the Information Proprietor and the clients frequently, huge communication cost prevails at the Information Proprietor side. To address this challenge, in this paper we propose Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage (EAODBT). The

    SRCBT: Secure Regeneration of Corrupted Blocks by TPA in Cloud

    No full text
    To conserve the deployed information in cloud repository contrary to adulterations, including fault toleration to cloud repository together with information integrity verification and failure restoration becomes important. Belatedly, reconstructing codes acquire recognition because of their reduced reparation bandwidth while ensuring fault toleration. Prevailing distant auditing schemes for reconstructing-coded information authorizes an intermediary to reconstruct authenticators and information blocks on the suspended servers in the course of the reparation process. To address this issue, we propose Secure Regeneration of Corrupted Blocks by TPA in Cloud (SRCBT). We eliminate the semi-trusted proxy and allow the TPA to reconstruct authenticators and information chunks on the suspended servers in the course of the reparation process. Thus, our mechanism can totally relinquish information proprietors from online
    corecore