127 research outputs found

    A performance study of routing protocols for mobile grid environment

    Get PDF
    Integration of mobile wireless consumer devices into the Grid initially seems unlikely due to limitation such as CPU performance,small secondary storage, heightened battery consumption sensitivity and unreliable low-bandwidth communication. The current grid architecture and algorithm also do not take into account the mobile computing environment since mobile devices have not been seriously considered as valid computing resources or interfaces in grid communities. This paper presents the results of simulation done in identifying a suitable ad hoc routing protocol that can be used for the target grid application in mobile environment. The simulation comparing three ad hoc routing protocols named DSDV, DSR and AODV

    Agent-based pricing determination for cloud services in multi-tenant environment

    Get PDF
    Cloud computing acts as a resource sharing pool that provides services to multiple customers, which are called tenants through the Internet. One of the big challenges in cloud is providing a price for leasing the services while adapting with budget limit of the tenants. In order to meet the rapidly growing and dynamic demands of tenants, this paper proposes a pricing determination scheme for cloud services using mathematical analysis. It aims to balance satisfaction between tenants and service provider in terms of budget and profit. Specifically, our pricing determination procedure aggregated the budget constraint of tenants and service cost to calculate the potential price of service. Service level agreement (SLA) is handled by an agent for determining minimum and maximum prices that represent in a range. Hence, the service cost that charged by the provider is identified within the price range in order to meet tenants’ requests. The results from our simulation demonstrate that the proposed pricing determination scheme provides better tenant satisfaction while sustaining provider profitability

    Overview of cross site request forgery and client-side protection

    Get PDF
    As long as internet and web application are a part of our lives to let us to live as easy as we moved like: online market, online bank, online shop and many more, it take attention of malicious to take an advantage of our easy life. Lately there are many types of attacks on web application but so far mostly focused Cross Site Scripting and SQL injection attacks. However there is less attention to prevent Cross Site Request. Cross Site Request Forgery permits malicious to make a request on behalf of user without his/her knowledge. The attack used the authentication between the target website and user through the internet browser. In this paper we would present how Cross Site Request forgery attack works. In additional we present our approach to mitigate Cross Site Request forgery by PCSRF Framework (Prevent Cross Site Request forgery) on Firefox. We propose client side protection. We had experimental test of our framework functionality. From 134 numbers of attacks which contains Post, Get and other methods, we successfully managed to prevent over 79% of attack through three different test sections

    The idle resource items workload and implication on different weight balance rate in grid scheduling

    Get PDF
    This paper discusses the impact of background workload for idle re-source items of computing elements in grid computing. Most of the previous re-search did not consider this factor. A resource item may be processing local system operations when the grid perceives them to be idle, thus upsetting grid processing activities. The introduction of the resource items and background load factor in this study will reveal the true computing capability of computing elements. This background load factor, represented in the form of weightage on resource item, is tested to seek overall grid performance. By allocating the right balance of workload weightage of resource item in a computing element, a significant improvement in processing performance is achieved

    Dynamic load balancing policy with communication and computation elements in grid computing with multi-agent system integration

    Get PDF
    The policy in dynamic load balancing, classification and function are variety based on the focus study for each research. They are different but employing the same strategy to obtain the load balancing. The communication processes between policies are explored within the dynamic load balancing and decentralized approaches. At the same time the computation processes also take into consideration for further steps. Multi-agent system characteristics and capabilities are explored too. The unique capabilities offered by multi-agent systems can be integrated or combined with the structure of dynamic load balancing to produce a better strategy and better load balancing algorithm

    Revocable and non-invertible multibiometric template protection based on matrix transformation

    Get PDF
    Biometric authentication refers to the use of measurable characteristics (or features) of the human body to provide secure, reliable and convenient access to a computer system or physical environment. These features (physiological or behavioural) are unique to individual subjects because they are usually obtained directly from their owner's body. Multibiometric authentication systems use a combination of two or more biometric modalities to provide improved performance accuracy without offering adequate protection against security and privacy attacks. This paper proposes a multibiometric matrix transformation based technique, which protects users of multibiometric systems from security and privacy attacks. The results of security and privacy analyses show that the approach provides high-level template security and user privacy compared to previous one-way transformation techniques

    Workload utilization dissemination on grid resources for simulation environment

    Get PDF
    This paper discusses the workload utilization dissemination for grid computing. The CPU is a well-known resource item and it is an integral part in most literatures while other RI's may include memory, network and I/O overhead. The selection of resource variables and the number of RI's involved will result in different definitions of the workload. Various combination of computer RI's have been explored for studying the style of usage, techniques embedded and their capabilities. In contemplating the exploration, this study successfully describe the pattern of workload dissemination through the usage of the RI's and elicited the enhancement factors for systems performance. Among these factors are the manipulation of computer RI's, type of workload information with method of use, the workload dissemination direction along with implementation method and using certain algorithm to come out with new integrated scheduling with load balancing capability. A combination of these factors will help in developing an optimized scheduling or load balancing algorithm

    Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology

    Get PDF
    BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. Data can be leaked because of the weak authentication technique used to verify the user and the device. A secure authentication technique is what the organization needs that equip with high security features. Blockchain is the answer to this because blockchain used cryptographic technology that’s not easy for hacker to break. This research proposes a user trust model that includes multifactor authentication combining with public and private key generated by blockchain and an agentless device trust model that can scan for malware and detect the device location. In order to secure the record and sensitive data, the record keeping model is built using blockchain technology where every activity related to the record is recorded in the digital ledger. This ledger can be used as evidence collection for further investigation. It is hoped the proposed BYOD trust model solution can help organizations to minimize the number of cases in data leakage while allowing BYOD concept

    State of the Art in Biometric Key Binding and Key Generation Schemes

    Get PDF
    Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Biometric cryptosystems or template protection schemes are used to overcome the security and privacy challenges associated with the use of biometrics as a means of authentication. This paper presents a review of previous works in biometric key binding and key generation schemes. The review focuses on key binding techniques such as biometric encryption, fuzzy commitment scheme, fuzzy vault and shielding function. Two categories of key generation schemes considered are private template and quantization schemes. The paper also discusses the modes of operations, strengths and weaknesses of various kinds of key-based template protection schemes. The goal is to provide the reader with a clear understanding of the current and emerging trends in key-based biometric cryptosystems

    Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede... [et al.]

    Get PDF
    Biometrics provides a secure means of authentication because it is difficult to copy, forge, or steal biometric modalities. However, unprotected biometric data can be used to violate the security of the authentication system and the privacy of legitimate users. This paper proposes and implements a modified shielding function which provides multi-biometric authentication, template security and user privacy simultaneously. Experimental results based on face and iris datasets obtained from CASIA Near Infra-Red face database and CASIA Iris database version 2 respectively show that the approach has good recognition accuracy (false rejection rate of 0.65% and false acceptance rate of 0.035%). Security analysis shows that the method provides better security (key length of 120 bits) and user privacy compared to previous approaches based on the generic shielding function
    corecore