378 research outputs found

    Mobile Data Gathering Techniques in WSN: A Review

    Get PDF
    Wireless sensor networks have received increasing attention in the recent few years. In many military and civil applications of sensor networks, sensors are constrained in onboard energy supply and are left unattended. Energy, size and cost constraints of such sensors limit their communication range.In this paper, we examine the proposed loadbalancing algorithms for wireless sensor network.It is used to extend the lifetime of a wireless sensor network which is the main issue in WSN by reducing energy consumption.It can also increase network scalability. In this paper, we implemented proposed method on Load Balancing algorithm for wireless sensor networks which can achieve both energy balancing and energy efficiency for all sensor nodes

    Designing Security Model for Un-Reliable Cloud IAAS Storage

    Get PDF
    With the internet getting so popular data sharing and security of personal data has gain much more importance than before. Cloud provides and efficient way to outsource the data either online or offline but data security becomes one of the major issues in unreliable cloud environment. The proposed system addresses the security issues in cloud environment and also provides a way to provide better security and load balancing in cloud environment. The proposed system uses cryptographic symmetric algorithm AES with key size of 256 for data encryption and Ultra Zip compression which provides a compression ratio up to 50% depending on the file type. After encryption and compression the data is splitted into multiple parts and each part is stored in separate data server. The proposed work can be used in many different application like social networking sites and file hosting websites

    Implementing RAAC Model for Cloud Storage

    Get PDF
    Data access control is a challenging issue in public cloud storage systems. Cipher text-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud storage system. Users may be stuck in the waiting queue for a long period to obtain their secret keys, thereby resulting in low-efficiency of the system. Although multi authority access control schemes have been proposed, these schemes still cannot overcome the drawbacks of single-point bottleneck and low efficiency, due to the fact that each of the authorities still independently manages a disjoint attribute set. In this paper we propose a system that improves the approach of CP-ABE from text based asymmetric to Image based symmetric approach for faster encryption as well as access to data. We also propose a multiple access policy generation for single user where we will be able to implement one to many and many to many methodology
    corecore