Computer Science And Technology - Master Dissertation
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/80
Browse
3 results
Search Results
Item To verify the data integrity and third party auditor at user side in cloud computing(Central University of Punjab, 2014) Goyal, Renuka; Sidhu, NavjootNow-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the Internet based computing which provides users with a number of services. One of the services provided by the cloud computing is data storage. Users store their data in the cloud without the burden of local data storage. But as every technology has some drawbacks, cloud computing also has some drawbacks. The main drawback of cloud computing is the security issues that are associated with it. The security issue with which this dissertation is dealing is the threat to data integrity. As the user no longer has physical possession of data so the integrity of data stored on cloud server become the major concern in the cloud computing. Data stored on the cloud server may be getting corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The Third Party Auditor checks the integrity of data on user demand and the released audit reports not only helps the user to evaluate the risk of their services but also helps the cloud service provider to improve their security mechanism. As a part of verification it is assumed that Third Party Auditor is reliable and independent which does not mean that there is no space for the Third Party Auditor to cheat. So there is need to check the integrity and Third Party Auditor at user side. This dissertation highlights the basics of cloud computing, general model and different approaches used for Third Party Auditor. The model to verify the data integrity and Third Party Auditor is implemented in this dissertation and the results found are good according to the user data.Item Effect of improved IEEE 802.11 DCF on the performance of manets(Central University of Punjab, 2014) Hans, Shifali; Sood, NehaWireless networks have become the most crucial aspect of the today's wireless communication and information exchange. The rapid advancements in the wireless networking technologies have drastically modified our communication and networking world and have led us to the new direction of 'Infrastructure-less networking i.e. Mobile ad hoc Networks'. Mobile ad hoc networks (MANETs) are the wireless infrastructure less networks that do not require any sort of central access point. Nodes in MANETs are connected by the wireless links and they are free to move arbitrarily in any direction. The attractive features of MANETs help to set up a network in emergency situations where the infrastructure is not available or not possible. Even though MANETs have emerged to be attractive, and they hold great promises for our future, but there are several challenges that need to be addressed. The wireless medium is the open shareable; so many-a-times nodes compete among themselves for the medium access, and the conflict arises. In order to resolve the medium contention among nodes there are medium access control techniques. IEEE 802.11 DCF is the de-facto medium access protocol. However there are some problems in IEEE 802.11 DCF which need to be attended for the better MANET performance. The objective of the dissertation work is to study the IEEE 802.11 DCF performance. The performance of 802.11 have been deduced and analysed by running a simulation in NS2 and then have been comparing to the performance of the modified IEEE 802.11 DCF with AODV and DSR routing protocol.Item Improved 2ACK scheme for reducing routing overhead in manet's(Central University of Punjab, 2014) Dhiman, Deepika; Sood,NehaAn autonomous collection of mobile nodes communicating with each other via wireless links either directly or indirectly or relying on other nodes forms the mobile adhoc network (MANET). The routing protocols in MANET are designed based on the assumption that all the participating nodes co-operate. Due to certain issues like open structure and limited energy supply, the nodes sometimes misbehave and act in a selfish manner. 2ACK scheme serves as an add-on technique on few routing protocols (e.g. DSR) to detect such misbehaviour and to mitigate their adverse effect. The major limitation of this 2ACK scheme is additional routing overhead due to authenticated 2ACK packets. Thus, this dissertation work focuses on reducing the routing overhead and end-to-end delay by modifying the authentication mechanism in existing 2ACK scheme. Analytical and simulation results have been presented for evaluating the performance of the work done.