14 research outputs found

    An Empirical Study on Peer-to-Peer Sharing of Resources in Mobile Cloud Environment

    Get PDF
    The increase usage of mobile users with internet and interoperability among the cloud services intensifies the role of distributed environemtnt in today’s real world application. Modern technologies are important for building rich, scalable and interoperable applications. To meet the requirements of client,the cloud service provider should offer adequate infrastructure especially under heavy multi-client load.To provide solution for large scale requirements and to statisfy the mobile client from the critical situation like lacking with bandwidth,connectivity issues,service completion ratio, we present adhoc virtual cloud model  for different scenarios that include single and multiple client configurations with various file sizes of various file formats for retrieving files in the mobile cloud environement.We evaluate the strategies with the socket and RMI implemented using java and identify the best model for real world applications. Performance evaluation is done with the results obtained and recommends that when sockets and RMI can be appropriately used in peer-to-peer environment when the mobile user cannot connect directly to the cloud services

    Secure server-server communication for dual stage biometrics – based password authentication scheme

    No full text
    The distributed environment insists the protection of servers, while information sharing is achieved. The conventional biometrics-based password authentication mechanisms use single server, which can be compromised easily. The dual stage authentication mechanism has been already proved for its security over the single stage authentication mechanism in our previous work. In this paper, the protocol is improved to establish communication between the authentication server and the master server through a secure link. Since the hashed messages are prone to collision attacks, the proposed scheme uses elliptic curve cryptography-based ciphers for establishing connection at the initial stage. The security analysis of the proposed authentication scheme with secure server – server communication link reveals the robustness and the security features, which are offered over our previous as well as the conventional authentication mechanisms. Keywords: Authentication, Security, Server, Biometric, Protoco

    An Approach for Ontology Integration for Personalization with the Support of XML

    No full text
    Abstract — Ontological way of knowledge representation is very much useful to the semantic web. In the modernized computer era, there is a need of a special technique for personalization. XML plays an important role in information retrieval systems and XML being a common format for information interpretation, it will be easy to understand as well as easy to construct. In this paper, a framework has been proposed for personalizing the web using XML based ontologies. This framework needs integration between global ontology and locally generated ontology based on user profiles. The relevant concepts between both the ontologies are identified, grouped together and ranked. Finally, the generated ontologies are evaluated using standard datasets, based on their semantic structures. The clustered concepts and query pairs are being analyzed with varying threshold limits. In addition, the performance metrics show that the ontology based techniques show a good precision, recall values for the user given data, when compared to text-based approaches

    Smart Emergency Rescue System Based on Biometric Authentication

    No full text
    corecore