326 research outputs found

    A Novel Approach for Securing Cloud Data Using Cryptographic Approach

    Get PDF
    — Nowadays, many businesses are making use cloud computing facility either directly (e.g. Google or Amazon) or indirectly (e.g. Twitter) instead of traditional on-site alternatives. Costs reduction, universal access, availability of number of applications and flexibility is a number of reasons for popularity of cloud computing. As the cloud service providers cannot be trusted one, enough security is an important aspect to consider so that user can store sensitive information securely. The concept of Multi Clouds is introduces as cloud computing assures user to provide the data, the cloud computing environment failure may result in loss or unavailability of data. Multi clouds guarantee to provide service at any cost if there is any failure at any cloud due to any reason. The use of multi clouds as it can tackle the security and mainly availability issues much effectively than single cloud that affects cloud computing user. This paper presents survey of recent research related to single and multi cloud security and addresses possible solutions. This aims to promote the use of multi clouds to solve problem of data availability due to failure in individual cloud. To provide data confidentiality, data integrity as well as authenticity, security mechanisms such as data encryption, visual secret sharing scheme (VSS)and digital signature are used

    Security Enhancement on Cloud to multi Cloud using Audio Cryptography

    Get PDF
    Nowadays, cloud computing is most popular and modern technology of storing the large amount of information on the internet and accessing it from anywhere. Costs reduction, universal access, availability of number of applications and flexibility is a number of reasons for popularity of cloud computing. Users store sensitive information on cloud, providing security becomes important aspect as these cloud service providers cannot be trusted one. As the cloud computing assures user to provide the data, the cloud computing environment failure may result in loss or unavailability of data so the concept of Multi-Clouds is introduces. Dealing with single cloud” service providers are anticipated to become infamous with customers due to scare of service availability failure and the possibility of malicious intruders in the individual cloud. Multi-clouds guarantee to provide service at any cost if there is any failure at any cloud due to any reason. The use of multi-clouds as it can tackle the security and mainly availability issues much effectively than single cloud that affects cloud computing user. The proposed work surveys recent research related to single and multi cloud security and addresses possible solutions. This work aims to promote the use of multi clouds to solve problem of data availability due to failure in individual cloud. To provide data confidentiality as well as data integrity, security mechanism which uses an image audio secret sharing scheme(ASS) cryptography instead of visual secret sharing scheme(VSS)

    Cryptographic Approach Using Audio for Data Security

    Get PDF
    Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multiple parts, giving each participant its own unique part. To reconstruct secret some or all parts of secret are needed. In order to reconstruct secret, if condition is that all participant is mandatory it becomes impractical due to any reason. Therefore threshold based scheme is used where any k of the participant is sufficient to reconstruct the original secret. The proposed secret sharing scheme use audio data to create shares of secret data. As audio data is large in size, to provide protection using encryption technique it becomes time consuming. So this audio data is used as cover data and divided into shares then shares are distributed among different participants. This is based on audio shares in which audio file is used cover data. If an eavesdropper gets one share and trying to play individual share in a media player, he or she will only hear as original sound like cover sound. But when k shares out of n shares are mixed together the original secret is reconstructed. DOI: 10.17762/ijritcc2321-8169.15028

    А.И. ГЕРЦЕН – ПЕРВЫЙ ИСТОРИК РУССКОГО КОНСЕРВАТИЗМА (СТРАНИЦАМИ КНИГИ «О РАЗВИТИИ РЕВОЛЮЦИОННЫХ ИДЕЙ В РОССИИ» И АРХЕОГРАФИЧЕСКИХ ИЗДАНИЙ ВОЛЬНОЙ РУССКОЙ ТИПОГРАФИИ)

    Get PDF
    На матеріалі науково-публіцистичних праць О.І. Герцена розглядається його діяльність як першого історика російської суспільно-політичної думки та її консервативного напрямку зокрема.The article describes the Herzen’s activity as the first historian of the Russian conservatism and the Russifn social thought as the whole on the materials of his treatise “About the development of the revolutionary ideas in Russia” and the smaller historical publicistic works

    Crude Oil Cost Forecasting using Variants of Recurrent Neural Network

    Get PDF
    Crude oil cost plays very important role in the country’s economic growth. It is  having close impact on economical stability of nation. Because of these reasons it is very important to have accurate oil forecasting system. Due to impact of different factors oil cost data is highly nonlinear and in fluctuated manner. Performing prediction on those data using data driven approaches is very complex task which require lots of preprocessing of data. Working on such a non-stationary data is very difficult. This research proposes recurrent neural network (RNN) based approaches such as simple RNN, deep RNN and RNN with LSTM. To compare performance of RNN variants this research has also implemented Naive forecast and Sequential ANN methods. Performance of all these models are evaluated based on root mean square error(RMSE), mean absolute error(MAE) and mean absolute percentage error(MAPE). The experimental result shows that RNN with LSTM is more accurate compare to all other models. Accuracy of LSTM is more than 96% for the dataset of U.S. Energy Information administration from March 1983 to June 2022. On the basis of experimental result, we come to the conclusion that RNN with LSTM is best suitable for time series data which is highly nonlinear

    Smoke Composition to Disseminate Capsaicinoids in Atmosphere as Sensory Irritant

    Get PDF
    Dissemination of sensory irritants in the atmosphere with the help of an evaporating mixtureis adopted. Experiments were carried out to find an alternative sensory irritant which is moreirritating and less toxic than the existing sensory irritating agents and originating from a naturalsource. Extract of red pepper, the oleoresin, is less toxic than the existing sensory irritants andis analysed for its constituents. Thermal studies of capsaicin and the composition indicate thatthe composition ignites at 190 °C whereas capsaicinoids boil at 214 °C. Lactose-KClO3 reactionwas found to release sufficient thermal energy to evaporate capsaicinoids into the atmospherewithout degeneration. The compositions are both friction and impact insensitive. Thedissemination of capsaicinoids into the atmosphere was confirmed using HPLC technique

    Antioxidant Potential of the Extracts, Fractions and Oils Derived from Oilseeds

    Get PDF
    The polyphenolic extracts and oils were obtained from ajwain, mustard, fenugreek and poppy seeds. The extracts were partitioned into acidic and neutral polyphenolic fractions and following estimation of total phenolics in the crude extract, acidic and neutral fractions and oil, all were analyzed for their DPPH (2,2-diphenyl-1-picrylhydrazyl) scavenging potential, ferric reducing ability and chelating power. The highest amount of polyphenols was found in ajwain (8330 ± 107), then in mustard seeds (2844 ± 56.00) and in fenugreek (1130 ± 29.00), and least in poppy seeds (937 ± 18.52). The higher amounts of polyphenols were estimated in neutral fraction compared to acidic (p < 0.05). % Inhibition of DPPH by the crude extract and fractions of all oilseeds was quite significant, being higher for acidic than neutral. The highest % DPPH inhibition was shown by ajwain extract than mustard > fenugreek and least by poppy seed extracts (p < 0.05). The reducing power and the chelating effect of the oilseeds followed the same order as DPPH, but higher % chelation was shown by neutral than acidic fraction (p < 0.05). Though low in polyphenols, the oil fractions were as strong antioxidants as the acidic one. Though oilseeds are used in very small quantity in food, they are potential sources of natural antioxidants and may replace synthetic ones

    Effect of α and β Phase Volume Fraction on Machining Characteristics of Titanium Alloy Ti6Al4V

    Get PDF
    AbstractMicrostructure of titanium alloys has great influence on the manufacturing processes. In the current investigation the effect of change in volume fraction of alpha and transformed beta phase in the bimodal titanium alloy Ti6Al4V was discussed in relation with the mechanical and machining performance. The quenching process in STA (solution treatment and annealing) heat treatment was delayed by 30, 50 and 70 sec to get different microstructural morphology in each heat treated specimen. Face turning experiments with dry and high pressure coolant environment were performed on the solution treated samples. A detailed chip mechanism and microstructural analysis was performed to investigate the role of quench delay and subsequent change in phase volume fraction on thermal softening and frictional phenomenon in machining. The specimen treated with quench delay of 50 sec exhibited poor machinability because of thermal and frictional shock generated at the cutting zone
    corecore