92 research outputs found

    Data Stream Mining: A Review on Windowing Approach

    Get PDF
    In the data stream model the data arrive at high speed so that the algorithms used for mining the data streams must process them in very strict constraints of space and time. This raises new issues that need to be considered when developing association rule mining algorithms for data streams. So it is important to study the existing stream mining algorithms to open up the challenges and the research scope for the new researchers. In this paper we are discussing different type windowing techniques and the important algorithms available in this mining process

    Fast Nearest Neighbor Search with Keywords Using IR2-Tree

    Get PDF
    Conventional abstraction queries, like vary search and nearest neighbor retrieval, involve alone conditions on objects geometric properties. Today, many trendy applications concern novel varieties of queries that aim to go looking out objects satisfying every a abstraction predicate, and a predicate on their associated texts. As associate example, instead of considering all the restaurants, a nearest neighbor question would instead provoke the eating place that is the nearest among those whose menus contain asteak, ˆ spaghetti, brandyaˆ all at identical time. Currently, the best answer to such queries depends on the IR2-tree, which, as shown throughout this paper, contains many deficiencies that seriously impact its efficiency. motivated by this, It tend to develop a latest access methodology called the abstraction inverted index that extends the traditional inverted index to subsume f-dimensional info, and comes with algorithms that will answer nearest neighbor queries with keywords in real time. As verified by experiments, the projected techniques trounce the IR2-tree in question latent amount considerably, generally by a part of orders of magnitude

    A Cryptographic Solution to the Predefind Bound of Ciphertext Classes in KAC

    Get PDF
    In Cloud Computingsecure data sharing is an important functionality. Cloud computing is the storing of data online which is accessible from multiple and connected resources. It is the fastest growing field in computer world which serves various services to users. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services. This paper attempts to show how data is shared among cloud users securely, efficiently, and flexibly. On cloud anyone can share data as much they want to i.e. only selected content can be shared. With cryptography users can share the data to others in safe way. So that user encrypts data and upload it on cloud server. The proposed algorithm uses a new cryptosystem that is called as Key Aggregate Cryptosystem (KAC)[1] which generates a single key for multiple files. In particular, it uses a public key encryption which releases aggregate key for set of secret keys. With this aggregate key others can decrypt ciphertext set and remaining encrypted files outside the set are remains confidential

    Portable TPM based user Attestation Architecture for Cloud Environments

    Get PDF
    Cloud computing is causing a major shift in the IT industry. Research indicates that the cloud computing industry segment is substantial and growing enormously. New technologies have been developed, and now there are various ways to virtualize IT systems and to access the needed applications on the Internet, through web based applications. Users, now can access their data any time and at any place with the service provided by the cloud storage. With all these benefits, security is always a concern. Even though the cloud provides accessing the data stored in cloud storage in a flexible and scalable manner, the main challenge it faces is with the security issues. Thus user may think it2019;s not secure since the encryption keys are managed by the software, therefore there is no attestation on the client software integrity. The cloud user who has to deploy in the reliable and secure environment should be confirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by the mischievous acts. Thus, the user identification which consists user ID and password can also be easily compromised. Apart from the traditional network security solutions, trusted computing technology is combined into more and more aspects of cloud computing environment to guarantee the integrity of platform and provide attestation mechanism for trustworthy services. Thus, enhancing the confidence of the IaaS provider. A cryptographic protocol adopted by the Trusted Computing Group enables the remote authentication which preserves the privacy of the user based on the trusted platform. Thus we propose a framework which defines Trusted Platform Module (TPM), a trusted computing group which proves the secure data access control in the cloud storage by providing additional security. In this paper, we define the TPMbased key management, remote client attestation and a secure key share protocol across multiple users. Then we consider some of the challenges with the current TPM based att

    Survey on: Software Puzzle for Offsetting DoS Attack

    Get PDF
    A Denial of Service (DoS) attack is a malevolent attempt to make a server or a network resource inaccessible to users, usually by temporarily breaking or suspending the services of a host connected to the Internet. DoS attacks and Distributed DoS (DDoS) attacks attempt to deplete an online service's resource such as network bandwidth, memory and computational power by overwhelming the service with bogus requests. Thus, DoS and DDoS attacks have become a major problem for users of computer systems connected to the Internet. Many state-art of the techniques used for defending the internet from these attacks have been discussed in this paper. After conducting an exhaustive survey on these techniques it has been found that the proposed software puzzle scheme that randomly generates only after a client request is received at the server side gives better performance as compared with previous techniques

    Quorum Sensing Regulation of the Two hcp Alleles in Vibrio cholerae O1 Strains

    Get PDF
    BACKGROUND: The type VI secretion system (T6SS) has emerged as a protein secretion system important to several gram-negative bacterial species. One of the common components of the system is Hcp, initially described as a hemolysin co-regulated protein in a serotype O17 strain of Vibrio cholerae. Homologs to V. cholerae hcp genes have been found in all characterized type VI secretion systems and they are present also in the serotype O1 strains of V. cholerae that are the cause of cholera diseases but seemed to have non-functional T6SS. METHODOLOGY/PRINCIPAL FINDINGS: The serotype O1 V. cholerae strain A1552 was shown to express detectable levels of Hcp as determined by immunoblot analyses using polyclonal anti-Hcp antiserum. We found that the expression of Hcp was growth phase dependent. The levels of Hcp in quorum sensing deficient mutants of V. cholerae were compared with the levels in wild type V. cholerae O1 strain A1552. The expression of Hcp was positively and negatively regulated by the quorum sensing regulators HapR and LuxO, respectively. In addition, we observed that expression of Hcp was dependent on the cAMP-CRP global transcriptional regulatory complex and required the RpoN sigma factor. CONCLUSION/SIGNIFICANCE: Our results show that serotype O1 strains of V. cholerae do express Hcp which is regarded as one of the important T6SS components and is one of the secreted substrates in non-O1 non-O139 V. cholerae isolates. We found that expression of Hcp was strictly regulated by the quorum sensing system in the V. cholerae O1 strain. In addition, the expression of Hcp required the alternative sigma factor RpoN and the cAMP-CRP global regulatory complex. Interestingly, the environmental isolates of V. cholerae O1 strains that showed higher levels of the HapR quorum sensing regulator in comparison with our laboratory standard serotype O1 strain A1552 where also expressing higher levels of Hcp
    • …
    corecore