School Of Engineering And Technology
Permanent URI for this communityhttps://kr.cup.edu.in/handle/32116/78
Browse
5 results
Search Results
Item Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing(IJCSIT, 2014) Goyal, Renuka| Sidhu, NavjotNow-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users with a number of services. Users store their data in the cloud without the burden of local data storage. As the user no longer have physical possession of data so the integrity and security of data become the major concern in the cloud computing. Data stored on the cloud server may be get corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The TPA checks the integrity of data on user demand and the released audit reports help the user to evaluate the risk of their services. TPA have an experience that user does not have and have capability to check integrity of data which is not easy for the user to check. This paper highlighted the basics of cloud computing, general model and different approaches used for TPA.Item To verify the data integrity and third party auditor at user side in cloud computing(Central University of Punjab, 2014) Goyal, Renuka; Sidhu, NavjootNow-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the Internet based computing which provides users with a number of services. One of the services provided by the cloud computing is data storage. Users store their data in the cloud without the burden of local data storage. But as every technology has some drawbacks, cloud computing also has some drawbacks. The main drawback of cloud computing is the security issues that are associated with it. The security issue with which this dissertation is dealing is the threat to data integrity. As the user no longer has physical possession of data so the integrity of data stored on cloud server become the major concern in the cloud computing. Data stored on the cloud server may be getting corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The Third Party Auditor checks the integrity of data on user demand and the released audit reports not only helps the user to evaluate the risk of their services but also helps the cloud service provider to improve their security mechanism. As a part of verification it is assumed that Third Party Auditor is reliable and independent which does not mean that there is no space for the Third Party Auditor to cheat. So there is need to check the integrity and Third Party Auditor at user side. This dissertation highlights the basics of cloud computing, general model and different approaches used for Third Party Auditor. The model to verify the data integrity and Third Party Auditor is implemented in this dissertation and the results found are good according to the user data.Item Effect of improved IEEE 802.11 DCF on the performance of manets(Central University of Punjab, 2014) Hans, Shifali; Sood, NehaWireless networks have become the most crucial aspect of the today's wireless communication and information exchange. The rapid advancements in the wireless networking technologies have drastically modified our communication and networking world and have led us to the new direction of 'Infrastructure-less networking i.e. Mobile ad hoc Networks'. Mobile ad hoc networks (MANETs) are the wireless infrastructure less networks that do not require any sort of central access point. Nodes in MANETs are connected by the wireless links and they are free to move arbitrarily in any direction. The attractive features of MANETs help to set up a network in emergency situations where the infrastructure is not available or not possible. Even though MANETs have emerged to be attractive, and they hold great promises for our future, but there are several challenges that need to be addressed. The wireless medium is the open shareable; so many-a-times nodes compete among themselves for the medium access, and the conflict arises. In order to resolve the medium contention among nodes there are medium access control techniques. IEEE 802.11 DCF is the de-facto medium access protocol. However there are some problems in IEEE 802.11 DCF which need to be attended for the better MANET performance. The objective of the dissertation work is to study the IEEE 802.11 DCF performance. The performance of 802.11 have been deduced and analysed by running a simulation in NS2 and then have been comparing to the performance of the modified IEEE 802.11 DCF with AODV and DSR routing protocol.Item Improved 2ACK scheme for reducing routing overhead in manet's(Central University of Punjab, 2014) Dhiman, Deepika; Sood,NehaAn autonomous collection of mobile nodes communicating with each other via wireless links either directly or indirectly or relying on other nodes forms the mobile adhoc network (MANET). The routing protocols in MANET are designed based on the assumption that all the participating nodes co-operate. Due to certain issues like open structure and limited energy supply, the nodes sometimes misbehave and act in a selfish manner. 2ACK scheme serves as an add-on technique on few routing protocols (e.g. DSR) to detect such misbehaviour and to mitigate their adverse effect. The major limitation of this 2ACK scheme is additional routing overhead due to authenticated 2ACK packets. Thus, this dissertation work focuses on reducing the routing overhead and end-to-end delay by modifying the authentication mechanism in existing 2ACK scheme. Analytical and simulation results have been presented for evaluating the performance of the work done.Item A review of De-facto MAC standard: IEEE 802.11 DCF(Institute of Electrical and Electronics Engineers Inc., 2014) Hans, S.; Nayyar, A.Advancement in the wireless networking technologies has drastically changed our world and has led us to new direction of 'Infrastructure-less networking- Mobile Adhoc Networks'. MANETs is a troupe of mobile nodes tied by wireless links in peer to peer fashion. Mobile nodes in MANETs often struggle for the wireless medium access. IEEE have defines certain rules for the medium access control (MAC). IEEE 802.11 DCF is a de-facto MAC standard. These rules have been laid down at MAC sub layer of link layer of TCP/IP reference model. One interesting research area in MANETs is MAC. This article provides a brief review of IEEE 802.11 DCF MAC standard. ? 2014 IEEE.