http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'early identification'

Page  1 1

Updates found with 'early identification'

IEEE 2016 -2017 Embedded System Projects TitlesS.No Project Title Code1. Coexistence of ZigBee-Based WBAN and Wi-Fi for Health Telemonitoring Systems Wireless2. A Novel Wireless Multifunctional Electronic Current Transformer based on ZigBee-based Communication Wireless3. Configurable ZigBee-based control system for people with multiple disabilities in smart homes Wireless4. ZigBee network system for observing operating activities of work vehicles Wireless5. Interference-Mitigated ZigBee-Based Advanced Metering Infrastructure Wireless6. A Mobile ZigBee Module in a Traffic Control System ` Wireless7. Energy Efficient Outdoor Light Monitoring and Control Architecture Using Embedded System Wireless8. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Wireless9. Energy-Efficient Intelligent Street Lighting System Using Traffic-Adaptive Control Wireless10. Development of a distributed disaster data and human life sign probe system Wireless11. Design and implementation of a home automation system for smart grid applications Wireless12. Milk products monitoring system with arm processor for early detection of microbial activity ARM13. Micro grid demonstration gateway for players communication and load monitoring and management Wireless14. WiFACT -- Wireless Fingerprinting Automated Continuous Training Wireless15. Lightweight Mashup Middleware for Coal Mine Safety Monitoring and Control Automation Wireless16. A smart wearable system for sudden infant death syndrome monitoring General17. Exoskeleton robots for upper-limb rehabilitation Robotics18. Wearable Camera- and Accelerometer-Based Fall Detection on Portable Devices GSM & GPS19. Innovation in Underwater Robots: Biologically Inspired Swimming Snake Robots Robotics20. GPS based autonomous vehicle navigation and control system GSM & GPS21. Real-Time Driving Monitor System: Combined Cloud Database with GPS IoT22. AgriSys: A smart and ubiquitous controlled-environment agriculture system IoT23. Building Smart Cities Applications using IoT andCloud-based Architectures IoT24. An IoT-based system for collision detection on guardrails IoT25. A vision-based teleoperation method for a robotic arm with 4 degrees of freedom Robotics26. Gesture control of drone using a motion controller Robotics27. Development of the Mobile Robot with a Robot Arm Robotics28. Milk products monitoring system with arm processor for early detection of microbial activity ARM29. Controller Area Network Assisted Grid Synchronization of a Microgrid With Renewable Energy Sources and Storage Electrical30. A Real-Time Embedded System for Monitoring of Cargo Vehicles, Using Controller Area Network (CAN) CAN31. Wireless biosensing network for drivers' health monitoring Biomedical32. Android4Auto: A proposal for integration of Android in vehicle infotainment systems Android33. A pulse measurement and data management system based on Arduino platform and Android device Android34. Remote control and instrumentation of Android devices Android35. “AUTOBOOK” The Messaging Machines (Using GSM and Arduino) Arduino36. Tracking and Theft Prevention System for Two Wheeler Using GSM and GPS GSM & GPS37. Bank Locker Security System Using RFID and GSM Technology GSM38. Design of Entrapment Escalation using GSM for Elevators GSM39. Distribution Line Fault Detection & GSM Module Based Fault Signaling System Electrical40. GSM & PIR Based Advanced Antitheft Security System Security 41. LPG Gas Weight and Leakage Detection System Using GSM GSM42. Android Based Women Tracking System Using GPS and GSM GSM & GPS43. Trespass Prevention System Using IOT IoT44. Automatic Vehicle Accident Detection and Rescue System GSM & GPS45. Design and Implementation of Integrated Mobile Operated Remote Vehicle IoT46. A Wearable Device for Continuous Detection and Screening of Epilepsy during Daily Life IoT47. Review of Automatic Detection and control of Disease for Grape Field Gen48. Environmental Condition Monitoring System for the Industries Gen49. Security Management Access Control System Gen50. Design and Development of Embedded based System for Monitoring Industrial and Environmental Parameters for Analyzing the Health of Human beings Gen51. Visual Surveillance Using Absolute Difference Motion Detection System Raspberry pi52. Automatic Irrigation System Using Internet of Things IoT53. Design of Embedded Irrigation System by Using WSN Wireless54. Vehicle Accident Prevention Using Assistant Braking System Gen55. Smart Transport Database Management System Gen56. Accident Alert Using ZIGBEE and GPS Wireless57. Controlling the Home Appliances Remotely Through Web Application Using ZIGBEE Wireless58. An optimized solar traffic control and alert system using wireless sensor networks Wireless59. Biometric Recognition Technique for ATM System Security60. Light Weight Access Control System for Constrained IOT Devices IoT61. Design of Prototype Model for Home Automation Using Wireless Sensor Networks Wireless62. Automated Sensor Network For Monitoring and Detection of Impurity In Drinking Water System General63. Automated Smart Trolley with Smart Billing Using Arduino Gene64. Embedded Automatic Vehicle Control System Using Voice Recognition On ARM 7 Processor ARM65. Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor ARM66. Implementation of Embedded Web Server Using TCP/IP Protocol with Raspberry PI Raspberry PI67. Designing of Cleaning Robot Robot68. An Analysis of Network-Based Control System Using Controller Area Network (CAN) Protocol CAN69. Identify the Deterioration in Pipe by Using Wheel Operated Robot Robot70. RFID -G Based Navigation System For Visually Impaired To Work at Industry Gen71. New Generation ATM Terminal Services NFC72. A Wireless Sensor Interface for the Quantification of Tremor Using Off the Shelf Components Wireless73. Design and Implementation of Low-Cost SMS Based Monitoring System of Distribution Transformers GSM74. An Integrated Cloud-Based Smart Home Management System with Community Hierarchy Automation75. Home Outlet and LED Array Lamp Controlled by a Smartphone with a Hand Gesture Recognition Gesture76. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Bio-medical77. Smart Real-Time Healthcare Monitoring and Tracking System using GSM/GPS Technologies Bio-medical78. The Design of Building Fire Monitoring System Based on ZigBee-WiFi Networks Wireless
Send Enquiry
Read More
JAVA PROJECTS ABSTRACT 2016-2017 COST MINIMIZATION FOR RULE CACHING IN SOFTWARE DEFINED NETWORKING ABSTRACT: Software-defined networking (SDN) is an emerging network paradigm that simplifies network management by decoupling the control plane and data plane, such that switches become simple data forwarding devices and network management is controlled by logically centralized servers. In SDN-enabled networks, network flow is managed by a set of associated rules that are maintained by switches in their local Ternary Content Addressable Memories (TCAMs) which support high-speed parallel lookup on wildcard patterns. Since TCAM is an expensive hardware and extremely power-hungry, each switch has only limited TCAM space and it is inefficient andeven infeasible to maintain all rules at local switches. On the other hand, if we eliminate TCAM occupation by forwarding all packets to the centralized controller for processing, it results in a long delay and heavy processing burden on the controller. In this paper, we strive for the fine balance between rule caching and remote packet processing by formulating a minimum weighted flow provisioning (MWFP) problem with an objective of minimizing the total cost of TCAM occupation and remote packet processing. We propose an efficient offline algorithm if the network traffic is given, otherwise, we propose two online algorithms with guaranteed competitive ratios. Finally, we conduct extensive experiments by simulations using real network traffic traces. The simulation results demonstrate that our proposed algorithms can significantly reduce the total cost of remote controller processing and TCAM occupation, and the solutionsobtained are nearly optimal.Existing System: That switches usually set an expiration time for rules, which defines the maximum rule maintenance time when no packet of associated flow arrives. the first packet experiences the delay of remote processing at the controller, and the rest will be processed by local rules at switches. However, for burst transmission, the corresponding rules cached in switches will be removed between two batches of packets if their interval is greater than the rule expiration time. As a result, remote packet processing would be incurred by the first packet of each batch, leading to a long delay and high processing burden on the controller. A simple method to reduce the overhead of remote processing is to cache rules at switches within the lifetime of network flow, ignoring the rule expiration time. we conduct extensive simulations using real network traffic traces to evaluate the performance of our proposals. The simulation results demonstrate that our proposed algorithms can significantly reduce the total cost of remote controller processing and TCAM occupation, and the solutions obtained are nearly optimal.Disadvantage: In that case, rules can be cached in forwarding table as many as possible. This abstraction saves TCAMs space, but the packet processing speed in switch is a bottleneck. The endpoints rules are pre-computed and cached in authority switches. Once the first packet of a new microflow arrives the switch, the desired rules are reactively installed, from authority switches rather than the controller. In this way, the flow setup time can be significantly reduced.
Send Enquiry
Read More
IEEE 2016 - 2017 Matlab Image Processing TitlesS.No Project Titles 1. Data-driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain 2. Double-Tip Arte fact Removal from Atomic Force Microscopy Images 3. Quaternion Collaborative and Sparse Representation With Application to Color Face Recognition 4. Multi-Level Canonical Correlation Analysis for Standard-Dose PET Image Estimation 5. Weakly Supervised Fine-Grained Categorization with Part-Based Image Representation 6. Robust Visual Tracking via Convolutional Networks without Training 7. Context-based prediction filtering of impulse noise images 8. Predicting the Forest Fire Using Image Processing 9. A Review Paper on detection of Glaucoma using Retinal Fundus Images 10. Performance Analysis of Filters on Complex Images for Text Extraction through Binarization 11. Automated Malaria Detection from Blood Samples Using Image Processing 12. Learning Invariant Color Features for Person Re-Identification 13. A Diffusion and Clustering-based Approach for Finding Coherent Motions and Understanding Crowd Scenes 14. Automatic Design of Color Filter Arrays in The Frequency Domain 15. Learning Iteration-wise Generalized Shrinkage-Thresholding Operators for Blind Deconvolution 16. Image Segmentation Using Parametric Contours With Free Endpoints 17. CASAIR: Content and Shape-Aware Image Retargeting and Its Applications 18. Texture classification using Dense Micro-block Difference 19. Statistical performance analysis of a fast super-resolution technique using noisy translations 20. Trees Leaves Extraction In Natural Images Based On Image segmentation and generating Its plant details
Send Enquiry
Read More
IEEE 2016 -2017 BIG DATA ANDROID DOTNET JAVA TITLESBIG DATA1. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce.ss2. Self-Healing in Mobile Networks with Big Data.ANDROID1. An Exploration of Geographic Authentication Schemes.2. Intelligent Hands Free Speech based SMS System on Android.3. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.4. Privacy-Preserving Location Sharing Services for Social Networks.5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones.6. A Shoulder Surfing Resistant Graphical Authentication System.7. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies.8. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.9. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions..NET1. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing.2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing3. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing4. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal5. Cloud workflow scheduling with deadlines and time slot availability6. Dynamic and Public Auditing with Fair Arbitration for Cloud Data7. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems8. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates9. Identity-Based Encryption with Cloud Revocation Authority and Its Applications10. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud11. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection12. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud13. Providing User Security Guarantees in Public Infrastructure Clouds14. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys15. Reversible Data Hiding in Encrypted Images by Reversible Image Transformation16. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage17. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption18. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps19. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis20. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets DetectionJAVA1. A Locality Sensitive Low-Rank Model for Image Tag Completion2. A Shoulder Surfing Resistant Graphical Authentication System3. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments4. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search5. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage6. Mining User-Aware Rare Sequential Topic Patterns in Document Streams7. Mitigating Cross-Site Scripting Attacks with a Content Security Policy8. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases10. SecRBAC: Secure data in the Clouds11. Tag Based Image Search by Social Re-rankingCLOUD COMPUTING1. Cost Minimization for Rule Caching in Software Defined Networking.2. Performance Enhancement of High-Availability Seamless Redundancy (HSR) Networks Using OpenFlow.3. Data Plane and Control Architectures for 5G Transport Networks.4. HBD: Towards Efficient Reactive Rule Dispatching in Software-Defined Networks.5. SDN-based Application Framework for Wireless Sensor and Actor Networks.6. Geo-Social Distance-based Data Dissemination for Socially Aware Networking.7. An Open-Source Wireless Mesh Networking Module for Environmental Monitoring.8. Hybrid IP/SDN networking: open implementation and experiment management tools.9. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.10. Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System.NETWORK SECUIRTY1. Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing.DATA MINING1. Systematic Determination of Discrepancies Across Transient Stability Software Packages.2. Identification of Type 2 Diabetes Risk Factors Using Phenotypes Consisting of Anthropometry and Triglycerides based on Machine Learning.3. Teaching Network Security With IP Darkspace Data.4. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.5. Mining High Utility Patterns in One Phase without Generating Candidates.6. An Improved String-Searching Algorithm and Its Application in Component Security Testing.
Send Enquiry
Read More
ANDROID PROJECT ABSTRACT 2016-2017 SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMARTPHONES ABSTRACT:2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low Barrier to adoption – almost every camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2DBarcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual Nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the Fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC - a secure System for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based On geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen View angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in Barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing, Secure device pairing, and contactless payment. SBVLC is evaluated through extensive experiments on both Android and ios Smartphones.
Send Enquiry
Read More
CLOUD COMPUTING PROJECT ABSTRACT 2016-2017 COST MINIMIZATION FOR RULE CACHING IN SOFTWARE DEFINED NETWORKING ABSTRACT:Software-Defined Networking (SDN) is an emerging network paradigm that simplifies network management by decoupling the control plane and data plane, such that switches become simple data forwarding devices and network management is controlled by logically centralized servers. In SDN-enabled networks, network flow is managed by a set of associated rules that are maintained by switches in their local Ternary Content Addressable Memories (TCAMs) which support high-speed parallel lookup on wildcard patterns. Since TCAM is an expensive hardware and extremely power-hungry, each switch has only limited TCAM space and it is inefficient and even infeasible to maintain all rules at local switches. On the other hand, if we eliminate TCAM occupation by forwarding all packets to the centralized controller for processing, it results in a long delay and heavy processing burden on the controller. In this paper, we strive for the fine balance between rule caching and remote packet processing by formulating a minimum weighted flow provisioning (MWFP) problem with an objective of minimizing the total cost of TCAM occupation and remote packet processing. We propose an efficient offline algorithm if the network traffic is given, otherwise, we propose two online algorithms with guaranteed competitive ratios. Finally, we conduct extensive experiments by simulations using real network traffic traces. The simulation results demonstrate that our proposed algorithms can significantly reduce the total cost of remote controller processing and TCAM occupation, and the solutions obtained are nearly optimal.
Send Enquiry
Read More
JAVA/DOT NET PROJECTS ABSTRACT 2016-2017 ATTRIBUTE-BASED ACCESS CONTROL WITH CONSTANT SIZE CIPHER-TEXT IN CLOUD COMPUTING : ABSTRACT: With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data in an untrusted environment is an urgent issue that needs to be solved. Attribute-Based Encryption (ABE) is a promising scheme suitable for access control in cloud storage systems. This paper proposes a hierarchical attribute-based access control scheme with constant-size ciphertext. The scheme is efficient because the length of ciphertext and the number of bilinear pairing evaluations to a constant are fixed. Its computation cost in encryption and decryption algorithms is low. Moreover, the hierarchical authorization structure of our scheme reduces the burden and risk of a single authority scenario. We prove the scheme is of security under the decisional q-Bilinear Exponent assumption. In addition, we implement our scheme and analyse its performance. The analysis results show the proposed scheme is efficient, scalable, and fine-grained in dealing with access control for outsourced data in cloud computing. EXISTING SYSTEM: Though there exist ABE schemes with constant cipher text size and/or constant number of pairing operations in decryption, their access structures are restricted to AND gates or threshold gates which severely limit their practical applications. To overcome this problem, suggested outsourcing decryption in attribute-based encryption. Their verification model suffers from the attack as existed in security model . PROPOSED SYSTEM: A promising approach to address this issue is attribute-based encryption (ABE), first proposed by Sahib and Waters. ABE schemes can be divided into two categories: Cipher text-Policy ABE (CP-ABE) and Key-Policy ABE (KP-ABE), depending on the access policy is embedded into the cipher text or the user’s private key.Proposed a simple method to adapt their RCCA (repayable chosen-cipher text attack) systems to such a setting formalized a security model for capturing the modification in an outsourced ABE system and proposed a concrete construction with verifiable outsourced decryption. We provide formal proofs of the (selective) chosen-plaintext security and the verifiability in the standard model, which is a slight modification of the security model first proposed in for verifiable outsourced ABE. We present an instantiation of our generic construction based on the outsourced ABE system proposed in which is in turn based on Waters CP-ABE scheme. We begin by introducing some basic notations used in the instantiation. SYSTEM SPECIFICATION Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. Software Requirements: • Operating system : Windows 7 Ultimate. • Coding Language : ASP.Net with C# • Front-End : Visual Studio 2010 Professional. • Data Base : SQL Server 2008. CONCLUSION: Secure sharing of data plays an important role in cloud computing. Attribute-based access control can real size data confidentiality in the un trusted environment of server-end, fine-grained access control and large-scale dynamic authorization which are the difficult problems to solve the traditional access control. This paper proposes a structure of hierarchical attribute authority based on cloud computing which reduces the burden and disperses the risk of the single authority. The proposed scheme adopts CP-ABE with constant-size cipher text that solves the problem of the cipher text size depending linearly on the number of attributes. Our scheme can maintain the size of cipher text and the computation of encryption and decryption at a constant value. Therefore, the scheme can improve the efficiency of the system. We have performed some numerical simulation and the testing results are coincident with the theoretical analysis. In addition, we prove the scheme is of security under the Bilinear Exponent assumption. We also demonstrate an application model in a distributed cloud environment. This shows our scheme has good adaptability and scalability in cloud computing. In further research, we intend to focus on making the CP-ABE algorithm simpler and more efficient along with making it even more suitable for access control in a cloud environment.
Send Enquiry
Read More
JAVA /DOT NET PROJECTS ABSTRACT 2016-2017 IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS. ABSTRACT: Identity-based encryption (IBE) is a public key cryptosystem and eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several revocable IBE schemes have been proposed regarding this issue. Quite recently, by embedding an outsourcing computation technique into IBE, Li et al. proposed a revocable IBE scheme with a key-update cloud service provider (KU-CSP). However, their scheme has two shortcomings. One is that the computation and communication costs are higher than previous revocable IBE schemes. The other shortcoming is lack of scalability in the sense that the KU-CSP must keep a secret value for each user. In the article, we propose a new revocable IBE scheme with a cloud revocation authority (CRA) to solve the two shortcomings, namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. Finally, we extend the proposed revocable IBE scheme to present a CRA-aided authentication scheme with period-limited privileges for managing a large number of various cloud services.Existing System: Privacy is very important especially for users who are sensitive to information leakage. In our design of Friendbook, we also considered the privacy issue and the existing system can provide two levels of privacy protection. First, Friendbook protects users’ privacy at the data level. Instead of uploading raw data to the servers, Friendbook processes raw data and classifies them into activities in real-time. The recognized activities are labeled by integers. In this way, even if the documents containing the integers are compromised, they cannot tell the physical meaning of the documents. Second, Friendbook protects users’ privacy at the life pattern level. Instead of telling the similar life styles of users, Friendbook only shows the recommendation scores of the recommended friends with the users. With the recommendation score, it is almost impossible to infer the life styles of recommended friends..PROPOSED SYSTEM: With the metric in , our recommendation mechanism for finding the most appropriate friends to a query user is described as follows. For a query user i, the server calculates the recommendation scores for all the users in the system and sorts them in the descending order according to their recommendation scores. The top p users will be returned to the query user i. The parameter p is an integer and can be defined by the querying user. The complexity of our recommendation mechanism is O(n) since it checks all users in the system, where n is the overall number of users in the system. As the number of users increases the overhead of query and recommendation increases linearly. In reality, users may have totally different life styles and it is not necessary to calculate their recommendation scores at all. Therefore, in order to speed up the query and recommendation process, we adopt the reverse index table using pair in the database.shows the difference. Illustration of the reverse index table. reverse index table, before calculating recommendation score for each user, the server first picks up all the users having overlapping life styles with the query user and sets the similarities of rest users to the query user to 0. The server then checks all the users to calculate their recommendation scores. Although the complexity is still O(n), we can observe that the reverse index table reduces the computation overhead, the advantage of which is considerable when the system is in large-scale.SYSTEM SPECIFICATIONHardware Requirements:• System : Pentium IV 2.4 GHz.• Hard Disk : 40 GB.• Floppy Drive : 1.44 Mb.• Monitor : 14’ Colour Monitor.• Mouse : Optical Mouse.• Ram : 512 Mb.Software Requirements:• Operating system : Windows 7 Ultimate.• Coding Language : ASP.Net with C#• Front-End : Visual Studio 2012 Professional.• Data Base : SQL Server 2008.Conclusion: In this article, we proposed a new revocable IBE scheme with a cloud revocation authority (CRA), in which the revocation procedure is performed by the CRA to alleviate the load of the PKG. This outsourcing computation technique with other authorities has been employed in Li et al.’s revocable IBE scheme with KU-CSP. However, their scheme requires higher computational and communicational costs than previously proposed IBE schemes. For the time key update procedure, the KU-CSP in Li et al.’s scheme must keep a secret value for each user so that it is lack of scalability. In our revocable IBE scheme with CRA, the CRA holds only a master time key to perform the time key update procedures for all the users without affecting security. As compared with Li et al.’s scheme, the performances of computation and communication are significantly improved. By experimental results and performance analysis, our scheme is well suited for mobile devices. For security analysis, we have demonstrated that our scheme is semantically secure against adaptive-ID attacks under the decisional bilinear Diffie-Hellman assumption. Finally, based on the proposed revocable IBE scheme with CRA, we constructed a CRA aided authentication scheme with period-limited privileges for managing a large number of various cloud services.
Send Enquiry
Read More
Page 1 1