Towards Secure And Dependable Storage Services In Cloud Computing

Towards Secure And Dependable Storage Services In Cloud Computing Technology Used – Java/J2EE 2011 Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we…

Read More

Steganalysis of JPEG steganography with complementary embedding strategy

Steganalysis of JPEG steganography with complementary embedding strategy Technology Used – Dot Net 2011 Recently, a new high-performance JPEG steganography with a complementary embedding strategy (JPEG-CES) was presented. It can disable many specific steganalysers such as the Chi-square family and S family detectors, which have been used to attack J-Steg, JPHide, F5 and OutGuess successfully. In this work, a study on the security performance of JPEG-CES is reported. Our theoretical analysis demonstrates that in this algorithm, the number of the different quantised discrete cosine transform (qDCT) coefficients and the symmetry…

Read More

Valuable Detours: Least-Cost Anypath Routing

Technology Used: Dot Net 2011 In many networks, it is less costly to transmit a packet to any node in a set of neighbors than to one specific neighbor. This observation was previously exploited by opportunistic routing protocols by using single-path routing metrics to assign to each node a group of candidate relays for a particular destination. This paper addresses the least-cost anypath routing (LCAR) problem: how to assign a set of candidate relays at each node for a given destination such that the expected cost of forwarding a packet…

Read More

SRLG Failure Localization in Optical Networks

SRLG Failure Localization in Optical Networks Technology Used: Dot Net 2011 We introduce the concepts of monitoring paths (MPs) and monitoring cycles (MCs) for unique localization of shared risk linked group (SRLG) failures in all-optical networks. An SRLG failure causes multiple links to break simultaneously due to the failure of a common resource. MCs (MPs) start and end at the same (distinct) monitoring location(s). They are constructed such that any SRLG failure results in the failure of a unique combination of paths and cycles. We derive necessary and sufficient conditions…

Read More

Traceback of DDoS Attacks Using Entropy Variations

Technology Used: Java 2011 Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far. In this paper, we propose a novel traceback method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic, which is fundamentally different from commonly used packet marking techniques. In comparison…

Read More

Generalized Probabilistic Flooding In Unstructured Peer-To-Peer Networks

Generalized Probabilistic Flooding In Unstructured Peer-To-Peer Networks Technology Used: Java 2011 Generalization of the basic flooding search strategy for decentralized unstructured peer-to-peer (P2P) networks is done. A peer forwards a query to one of its neighbors using a probability that is a function of the number of connections in the overlay network of both. Moreover, this probability may also depend on the distance from the query originator. To analyze the performance of the proposed search strategy in heterogeneous decentralized unstructured P2P networks we develop a generalized random graph (GRG) based…

Read More

Enabling Public Auditability And Data Dynamics For Storage Security In Cloud Computing

Enabling Public Auditability And Data Dynamics For Storage Security In Cloud Computing Technology Used: Java/ J2EE 2011 Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether…

Read More

On Efficient And Scalable Support Of Continuous Queries In Mobile Peer-To-Peer Environments

On Efficient And Scalable Support Of Continuous Queries In Mobile Peer-To-Peer Environments Technology Used: Java 2011 An efficient and scalable query processing framework for continuous spatial queries in mobile peer-to-peer (P2P) environment is proposed. Due to the limitations in mobile P2P environments, for example, user mobility, limited battery power, limited communication range, and scarce communication bandwidth, it is costly to maintain the exact answer of continuous spatial queries. This work enables user to find an approximate answer with quality guarantees. Two key features to adapt continuous spatial query processing to…

Read More

Ranking Spatial Data by Quality Preferences

Ranking Spatial Data by Quality Preferences Technology Used: Java/ J2EE Knowledge and Data Engineering 2011   A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood. For example, using a real estate agency database of flats for lease, a customer may want to rank the flats with respect to the appropriateness of their location, defined after aggregating the qualities of other features (e.g., restaurants, cafes, hospital, market, etc.) within their spatial neighborhood. Such a neighborhood concept can be specified by the user via different…

Read More

A Personalized Ontology Model for Web Information Gathering

A Personalized Ontology Model for Web Information Gathering Technology Used: Java/ J2EE Knowledge and Data Engineering, 2011 As a model for knowledge description and formalization, ontologies are widely used to represent user profiles in personalized web information gathering. However, when representing user profiles, many models have utilized only knowledge from either a global knowledge base or a user local information. In this paper, a personalized ontology model is proposed for knowledge representation and reasoning over user profiles. This model learns ontological user profiles from both a world knowledge base and…

Read More