17 research outputs found

    Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor

    Get PDF
    Cloud computing is emerging as the next disruptive utility paradigm [1]. It provides extensive storage capabilities and an environment for application developers through virtual machines. It is also the home of software and databases that are accessible, on-demand. Cloud computing has drastically transformed the way organizations, and individual consumers access and interact with Information Technology. Despite significant advancements in this technology, concerns about security are holding back businesses from fully adopting this promising information technology trend. Third-party auditors (TPAs) are becoming more common in cloud computing implementations. Hence, involving auditors comes with its issues such as trust and processing overhead. To achieve productive auditing, we need to (1) accomplish efficient auditing without requesting the data location or introducing processing overhead to the cloud client; (2) avoid introducing new security vulnerabilities during the auditing process. There are various security models for safeguarding the CCs (Cloud Client) data in the cloud. The TPA systematically examines the evidence of compliance with established security criteria in the connection between the CC and the Cloud Service Provider (CSP). The CSP provides the clients with cloud storage, access to a database coupled with services. Many security models have been elaborated to make the TPA more reliable so that the clients can trust the third-party auditor with their data. Our study shows that involving a TPA might come with its shortcomings, such as trust concerns, extra overhead, security, and data manipulation breaches; as well as additional processing, which leads to the conclusion that a lightweight and secure protocol is paramount to the solution. As defined in [2] privacy-preserving is making sure that the three cloud stakeholders are not involved in any malicious activities coming from insiders at the CSP level, making sure to remediate to TPA vulnerabilities and that the CC is not deceitfully affecting other clients. In our survey phase, we have put into perspective the privacy-preserving solutions as they fit the lightweight requirements in terms of processing and communication costs, ending up by choosing the most prominent ones to compare with them our simulation results. In this dissertation, we introduce a novel method that can detect a dishonest TPA: The Light-weight Accountable Privacy-Preserving (LAPP) Protocol. The lightweight characteristic has been proven simulations as the minor impact of our protocol in terms of processing and communication costs. This protocol determines the malicious behavior of the TPA. To validate our proposed protocol’s effectiveness, we have conducted simulation experiments by using the GreenCloud simulator. Based on our simulation results, we confirm that our proposed model provides better outcomes as compared to the other known contending methods

    Robust Prediction for Intra and Inter Handoff (RPIIH) Process over CDMA2000

    Get PDF
    © ASEE 2014The overall performance of mobile nodes is mainly affected by the relatively considerable time spent in the handoff process. Most of the time spent is mainly consumed during the authentication process. This process could be even longer especially when the Access Points (AP’s) are busy, which results in delays and/or packets loss. Many handoff techniques have been proposed to shorten the time of authentication however todate, they have not been fully successful. This paper introduces a more robust technique for saving the time consumed during authentication. The adopted approach is suitable within the regions that use the intra-handoff technique as well as those applying the inter-handoff technique. To validate our model, we have used ns-2 based simulations and plotted the findings

    Security in Cloud Computing Based on Third Party Auditor: A Survey

    Get PDF
    This Paper surveys security in cloud computing based on Third Party Auditor (TPA) also known as Trusted Third Party (TTP). There are various security models for safeguarding the client’s data in cloud. TPA provides secure connections between the user and the cloud server. Cloud Service Provider (CSP) Provides the clients with cloud storage and service. TPA has access to the client’s cloud data and all the critical information. There are many security models for making the TPA more reliable so the clients can trust the third party for storing their data. In this paper, we survey mostly the types of security models based on Third Party Auditing in cloud. We also discuss how these security models enable the third parties to gain the clients trust. The classification has been based on the adopted security method as well as on the kind of threats they are addressing

    Remote patient monitoring using safe and secure WBAN technology

    Get PDF
    In the recent years, we have witnessed a tremendous growth and development in the field of wireless communication technology and sensors. Resulting into opening new dimensions in various research fields. The integration of Nano scale devices with low power consumption circuits brought a new evolution in wireless networks. This blend of technologies led to the formation of a new field in WSN (Wireless Sensor Networks) known as WBAN (Wireless Body Area Network). WBAN is based on small sensors designed to operate and function mainly on the human body. As we are dealing with human lives, security and privacy are major concerns as patients’ data is at the stakes. Authentication is an important factor in securing information from unauthorized usage. Now-a-days a lot of research has been done in order to improve the overall authentication mechanisms in WBAN. In this poster, we are surveying the security challenges in WBAN with a focus on the authentication phase. A list of several methods along with their schemes has been studied and recapitulated. ECG is one the most popular schemes used in WBAN, benefiting from its uniqueness. However, it comes with challenges as creating an extract trait could get complicated. ECG could be aided by the help of combining fingerprint which will result in a non-destructive method of biometric authentication compared with single ECG trait

    Open-source Software: Adoption and Challenges

    Get PDF
    © ASEE 2015Adopting open-source software (OSS) can help reduce the cost of personal computers for individuals as well as the cost of information technology infrastructure for companies. Many studies corroborated the superiority of Linux (open-source operating system) when compared to Windows. Linux, or any other open-source software, offers robustness, flexibility on top of a homogeneous solution and a support from a huge community. The purpose of this paper is to study the adoption open source software, mainly Linux. The discussion will encompass the growth of the open source community, the horizons, and the obstacles. The study also aims to cover the feasibility of the adoption of the open-source software at a Research and Development environment, where reducing the cost of the information technology infrastructure opens doors for more scalability and increase in performance

    Light-weight Accountable Privacy Preserving (LAPP) Protocol Allowing to Audit the Third-Party Auditor in the Cloud Environment

    Get PDF
    Cloud computing is situating its position in the market as the next disruptive utility paradigm based on the pay as you use model. It is changing the way information technology (IT) operates from individuals and companies’ perspectives. Cloud computing comes with different offerings to accommodate diverse applications. Security concerns are what’s making many companies reluctant from fully embracing the cloud realm. To enhance trust and entice adoption between cloud clients (CC) and cloud service providers (CSP), cloud computing based on a third-party auditor (TPA) has been introduced. Hence introducing a solution with a TPA, comes with its toll in terms of trust and processing overhead. A light-weight security protocol to give the CC an extra control with tools to audit the TPA and the CSP is paramount to the solution. In this paper, we are introducing a novel protocol: Light-weight Accountable Privacy Preserving (LAPP) Protocol. Our proposed protocol is based on a novel mathematical model along with three algorithms. We have conducted simulation experiments to measure the impact of our method, compared to the most eminent privacy preserving methods, using the GreenCloud simulator. Our results showed superiority in performance for LAPP concerning time complexity, accuracy, and computation time on auditing

    Lightweight Accountable Privacy-Preserving Protocol Allowing the Cloud Client to Audit the Third-Party Auditor for Malicious Activities

    Get PDF
    Cloud computing is reserving its position in the market as the next disruptive utility paradigm. It is found on the pay-as-you-use model. Cloud computing is changing the way information technology (IT) operates for individuals as well as for companies. Cloud computing comes with different offerings to accommodate diverse applications. It comes with many successful adoption stories and a few unfortunate ones that are related to security breaches. Security concerns are what is making many companies reluctant to fully embrace the cloud realm. To enhance trust and entice adoption between cloud clients (CC) and cloud service providers (CSP), a new paradigm of depending on involving a third-party auditor (TPA) has been introduced. Hence, implementing a solution with a TPA comes with its toll in terms of trust and processing overhead. A lightweight security protocol to give the CC extra control with tools to audit the TPA and the CSP is paramount to the solution. In this paper, we are introducing a novel protocol: the lightweight accountable privacy-preserving (LAPP) protocol. Our proposed protocol is lightweight in terms of processing and communication costs. It is based on a newly introduced mathematical model along with two algorithms. We have conducted simulation experiments to measure the impact of our method. We have compared LAPP to the most eminent privacy-preserving methods in the cloud research field, using the open source cloud computing simulator GreenCloud. Our simulation results showed superiority in performance for LAPP in regard to time complexity, accuracy, and computation time on auditing. The aim of the time complexity and computation time on auditing simulations is to measure the lightweight aspect of our proposed protocol as well as to improve the quality of service.http://dx.doi.org/10.3390/app915303

    Energy Efficient Clustering for Heterogeneous Wireless Sensor Networks - A Survey

    Get PDF
    Ongoing advancements in electro-mechanical, power electronics and wireless communications have made possible the use of wireless sensor networks in remote applications such as environmental conditions, forest fire protection and target monitoring in military applications. These unattended applications require a huge number of sensor nodes working efficiently together for a common goal. Since sensor nodes have limited energy resources, it is of vital importance to use them in an efficient manner to improve a network’s lifetime. One of the most important methods to achieve this is by making clusters. Nodes may not have the same energy, which makes it even more important for these clusters to work efficiently together in order to save power. Wireless sensor networks are of homogeneous and heterogeneous type. This paper presents a survey on energy efficient clustering mechanisms in heterogeneous wireless sensor networks. Nodes in homogeneous wireless sensor networks have similar resources, however heterogeneous networks have nodes with different energy levels that can be used effectively to enhance a network’s lifetime

    Zone Routing Protocol (ZRP) - A Novel Routing Protocol for Vehicular Ad-hoc Networks

    Get PDF
    © ASEE 2016This Paper discusses the capability of the current routing protocols for Mobile ad hoc networks for Vehicular ad hoc networks. VANET is derived from MANET and it is a network consisting of vehicles which can communicate wirelessly. In high traffic conditions the message should be delivered correctly between the vehicles and the communication using Road Side Units. VANETs are characterized by a dynamic topology with patterned mobility consisting on mobile nodes with sufficient resources and varied time channel behavior. The network traffic requirements differ for VANET. There are many routing protocols for mobile ad hoc networks which can be used for vehicular ad hoc networks. In this paper, we are introducing Zone Routing Protocol which can improve the parameters of VANET i.e. less communication delay and delivering the messages on time compared to AODV and DSR protocols while the vehicles are moving at high speeds. We have used a simulation to demonstrate those improvements

    Lightweight Accountable Privacy-Preserving Protocol Allowing the Cloud Client to Audit the Third-Party Auditor for Malicious Activities

    No full text
    Cloud computing is reserving its position in the market as the next disruptive utility paradigm. It is found on the pay-as-you-use model. Cloud computing is changing the way information technology (IT) operates for individuals as well as for companies. Cloud computing comes with different offerings to accommodate diverse applications. It comes with many successful adoption stories and a few unfortunate ones that are related to security breaches. Security concerns are what is making many companies reluctant to fully embrace the cloud realm. To enhance trust and entice adoption between cloud clients (CC) and cloud service providers (CSP), a new paradigm of depending on involving a third-party auditor (TPA) has been introduced. Hence, implementing a solution with a TPA comes with its toll in terms of trust and processing overhead. A lightweight security protocol to give the CC extra control with tools to audit the TPA and the CSP is paramount to the solution. In this paper, we are introducing a novel protocol: the lightweight accountable privacy-preserving (LAPP) protocol. Our proposed protocol is lightweight in terms of processing and communication costs. It is based on a newly introduced mathematical model along with two algorithms. We have conducted simulation experiments to measure the impact of our method. We have compared LAPP to the most eminent privacy-preserving methods in the cloud research field, using the open source cloud computing simulator GreenCloud. Our simulation results showed superiority in performance for LAPP in regard to time complexity, accuracy, and computation time on auditing. The aim of the time complexity and computation time on auditing simulations is to measure the lightweight aspect of our proposed protocol as well as to improve the quality of service
    corecore