2 research outputs found
RFDA: Reliable framework for data administration based on split-merge policy
Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in collaborative sharing. The data sharing technique in the cloud is prone to many flaws and is easily attacked. The conventional cryptographic mechanism is not robust enough to provide a secure authentication. In this paper, we overcome this issue with our proposed Reliable Framework for Data Administration (RFDA) using split-merge policy, developed to enhance data security. The proposed RFDA performs splitting of data in a unique manner using 128 AES encryption key. Different slots of the encrypted key are placed in different places of rack servers of different cloud zones. The effectiveness and efficiency of the proposed system are analyzed using comparative analysis from which it is seen that the proposed system has outperformed the existing and conventional security standard
Modeling malicious multi-attacker node collusion in MANETs via game theory
Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious
nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in
addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes
effectively through various simulation techniques is considered to be the most challenging issue. Owing to the
fact that malicious nodes do not employ any such approaches that are probable to be detected, they show
confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The
proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to
represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network