Computer Science And Technology - Research Publications
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82
Browse
2 results
Search Results
Item Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing(IJCSIT, 2014) Goyal, Renuka| Sidhu, NavjotNow-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users with a number of services. Users store their data in the cloud without the burden of local data storage. As the user no longer have physical possession of data so the integrity and security of data become the major concern in the cloud computing. Data stored on the cloud server may be get corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The TPA checks the integrity of data on user demand and the released audit reports help the user to evaluate the risk of their services. TPA have an experience that user does not have and have capability to check integrity of data which is not easy for the user to check. This paper highlighted the basics of cloud computing, general model and different approaches used for TPA.Item A review of De-facto MAC standard: IEEE 802.11 DCF(Institute of Electrical and Electronics Engineers Inc., 2014) Hans, S.; Nayyar, A.Advancement in the wireless networking technologies has drastically changed our world and has led us to new direction of 'Infrastructure-less networking- Mobile Adhoc Networks'. MANETs is a troupe of mobile nodes tied by wireless links in peer to peer fashion. Mobile nodes in MANETs often struggle for the wireless medium access. IEEE have defines certain rules for the medium access control (MAC). IEEE 802.11 DCF is a de-facto MAC standard. These rules have been laid down at MAC sub layer of link layer of TCP/IP reference model. One interesting research area in MANETs is MAC. This article provides a brief review of IEEE 802.11 DCF MAC standard. ? 2014 IEEE.