42 research outputs found

    A Survey Paper on Privacy Preserving and Content Protecting Location Based Queries Using Two Phase Protocol

    Get PDF
    Location Based Service LBS is the service accessed on mobiles or devices with GPS. In order to use these services there are certain issues to the data being shared and the information of the user who is using this service may be exposed publicly, even though the user doesnot want to share his information in public domain. A lot of research has been done over this, to protect the users data to be accessed by unauthorised users and those who are not the intended users of that information. We propose a solution to one of the location-based query problems. A user wants to query a database of location data, known as Points of Interest (POIs), and does not want to reveal his/her location to the server due to privacy concerns; And the owner of the location data, that is, the location server, does not want to simply distribute its data to all users

    Implementation of Decoy Deception based Detection System for Ransomware Attack

    Get PDF
    Ransomware poses a dangerous threat to  cybersecurity. Data as well as rights owned by the user are  adversely impacted. The situation has become considerably  more critical as a result of the emergence of new ransomware  varieties and Ransomware-as-a-Service. In this paper, we  presented a novel deception-based and behaviour-based  method for real-time ransomware detection. In order to avoid  any loss before ransomware is discovered, we build pretend  files and directories for nefarious behaviours. We conducted a  pilot study using Locky, and the results demonstrate the  effectiveness of our strategy with little system resource usage  and geographical cost.&nbsp

    Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality

    Get PDF
    The paper proposes a role-based secure data access control framework for cost-optimized cloud storage, addressing the challenge of maintaining data security, privacy, integrity, and availability at lower cost. The proposed framework incorporates a secure authenticity scheme to protect data during storage or transfer over the cloud. The framework leverages storage cost optimization by compressing high-resolution images and fragmenting them into multiple encrypted chunks using the owner's private key. The proposed approach offers two layers of security, ensuring that only authorized users can decrypt and reconstruct data into its original format. The implementation results depicts that the proposed scheme outperforms existing systems in various aspects, making it a reliable solution for cloud service providers to enhance data security while reducing storage costs

    Impact of an International Nosocomial Infection Control Consortium multidimensional approach on central line-associated bloodstream infection rates in adult intensive care units in eight cities in India

    Get PDF
    SummaryObjectiveTo evaluate the impact of the International Nosocomial Infection Control Consortium (INICC) multidimensional infection control approach on central line-associated bloodstream infection (CLABSI) rates in eight cities of India.MethodsThis was a prospective, before-and-after cohort study of 35650 patients hospitalized in 16 adult intensive care units of 11 hospitals. During the baseline period, outcome surveillance of CLABSI was performed, applying the definitions of the CDC/NHSN (US Centers for Disease Control and Prevention/National Healthcare Safety Network). During the intervention, the INICC approach was implemented, which included a bundle of interventions, education, outcome surveillance, process surveillance, feedback on CLABSI rates and consequences, and performance feedback. Random effects Poisson regression was used for clustering of CLABSI rates across time periods.ResultsDuring the baseline period, 9472 central line (CL)-days and 61 CLABSIs were recorded; during the intervention period, 80898 CL-days and 404 CLABSIs were recorded. The baseline rate was 6.4 CLABSIs per 1000 CL-days, which was reduced to 3.9 CLABSIs per 1000 CL-days in the second year and maintained for 36 months of follow-up, accounting for a 53% CLABSI rate reduction (incidence rate ratio 0.47, 95% confidence interval 0.31–0.70; p=0.0001).ConclusionsImplementing the six components of the INICC approach simultaneously was associated with a significant reduction in the CLABSI rate in India, which remained stable during 36 months of follow-up

    Azimuthal anisotropy of charged jet production in root s(NN)=2.76 TeV Pb-Pb collisions

    Get PDF
    We present measurements of the azimuthal dependence of charged jet production in central and semi-central root s(NN) = 2.76 TeV Pb-Pb collisions with respect to the second harmonic event plane, quantified as nu(ch)(2) (jet). Jet finding is performed employing the anti-k(T) algorithm with a resolution parameter R = 0.2 using charged tracks from the ALICE tracking system. The contribution of the azimuthal anisotropy of the underlying event is taken into account event-by-event. The remaining (statistical) region-to-region fluctuations are removed on an ensemble basis by unfolding the jet spectra for different event plane orientations independently. Significant non-zero nu(ch)(2) (jet) is observed in semi-central collisions (30-50% centrality) for 20 <p(T)(ch) (jet) <90 GeV/c. The azimuthal dependence of the charged jet production is similar to the dependence observed for jets comprising both charged and neutral fragments, and compatible with measurements of the nu(2) of single charged particles at high p(T). Good agreement between the data and predictions from JEWEL, an event generator simulating parton shower evolution in the presence of a dense QCD medium, is found in semi-central collisions. (C) 2015 CERN for the benefit of the ALICE Collaboration. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).Peer reviewe

    Pseudorapidity and transverse-momentum distributions of charged particles in proton-proton collisions at root s=13 TeV

    Get PDF
    The pseudorapidity (eta) and transverse-momentum (p(T)) distributions of charged particles produced in proton-proton collisions are measured at the centre-of-mass energy root s = 13 TeV. The pseudorapidity distribution in vertical bar eta vertical bar <1.8 is reported for inelastic events and for events with at least one charged particle in vertical bar eta vertical bar <1. The pseudorapidity density of charged particles produced in the pseudorapidity region vertical bar eta vertical bar <0.5 is 5.31 +/- 0.18 and 6.46 +/- 0.19 for the two event classes, respectively. The transverse-momentum distribution of charged particles is measured in the range 0.15 <p(T) <20 GeV/c and vertical bar eta vertical bar <0.8 for events with at least one charged particle in vertical bar eta vertical bar <1. The evolution of the transverse momentum spectra of charged particles is also investigated as a function of event multiplicity. The results are compared with calculations from PYTHIA and EPOS Monte Carlo generators. (C) 2015 CERN for the benefit of the ALICE Collaboration. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).Peer reviewe

    Centrality evolution of the charged-particle pseudorapidity density over a broad pseudorapidity range in Pb-Pb collisions at root s(NN)=2.76TeV

    Get PDF
    Peer reviewe
    corecore