10 research outputs found

    A Deadline Aware Real-time Routing Protocol for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSN) find application in real-time events reporting and data gathering. When the sensor detects an event it is reported to the base stations, which then takes appropriate action. The course of action should have finite and bound delays defining a hard real-time constraint for time critical applications. This work proposes a network layer based, deadline aware real time routing protocol, which assumes a collision free known delay MAC (Medium Access Control) layer. The protocol works in three phases-the initialization phase, path establishment phase and the bandwidth division phase. This protocol ensures bounded delay in transmission of sensed data to the sink. It establishes a single path from each sensor node to the sink and allocates bandwidth for that path thereby reducing the time required for the sensed data to reach the sink

    Data storage lock algorithm with cryptographic techniques

    Get PDF
    The cloud computing had its impact far and wide, and Enterprise solutions are getting migrated to different types of clouds. The services are delivered from the data centers which are located all over the world. As the data is roaming with less control in any data centers, data security issues in cloud are very challenging. Therefore we need multi-level authentication, data integrity, privacy and above all encryption to safeguard our data which is stored on to the cloud. The data and applications cannot be relocated to a virtual server without much degree of security concern as there can be much confidential data or mission-critical applications. In this paper, we propose Data Storage Lock Algorithm (DSLA) to store confidential data thereby provides secure data storage in cloud computing based on cryptographic standards

    Information Mobility and Business Transforms

    Get PDF
    The dynamic growth of Information Technology offers great opportunities for business enhancements. Information mobility is the latest trend in the IT domain which adds value to Enterprises and puts it in a transition. The transitions from a previous state to an improved one, always involve various risks too. It is essential to have a perfect strategic planning and a set of deployment schemes to bring success in this domain. This has to be realized practically within the time and within the budget. Information mobility is one of the key enabling technologies sweeping across the world offering multifaceted business promotion avenues. The mobility technology is expected to transform enterprise patterns and its operations through various modes of liberal coupling of users and a variety of business processes. The enterprise mobility needs to deal with terms like BYOD, CYOD, MDM, M-Security and M-Analytics to ensure a successful implementation leading to expected transformation. There are various direct advantages derivable from it, like real time enterprise data access, improved collaboration as well as employee and customer satisfaction. At the same time it poses several challenges and risks spread over security of implementations, data classification and user rights management. In this paper we discuss the features of Information Management and the challenges posed by them along with a possible risk profile associated with them

    An Enhanced Load Balancing Technique for Efficient Load Distribution in Cloud-Based IT Industries

    No full text
    corecore