2 research outputs found

    RFDA: Reliable framework for data administration based on split-merge policy

    Get PDF
    Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in collaborative sharing. The data sharing technique in the cloud is prone to many flaws and is easily attacked. The conventional cryptographic mechanism is not robust enough to provide a secure authentication. In this paper, we overcome this issue with our proposed Reliable Framework for Data Administration (RFDA) using split-merge policy, developed to enhance data security. The proposed RFDA performs splitting of data in a unique manner using 128 AES encryption key. Different slots of the encrypted key are placed in different places of rack servers of different cloud zones. The effectiveness and efficiency of the proposed system are analyzed using comparative analysis from which it is seen that the proposed system has outperformed the existing and conventional security standard

    Modeling malicious multi-attacker node collusion in MANETs via game theory

    No full text
    Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes effectively through various simulation techniques is considered to be the most challenging issue. Owing to the fact that malicious nodes do not employ any such approaches that are probable to be detected, they show confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network
    corecore