2014 Sixth International Conference on Advanced Computing (ICoAC)最新文献

筛选
英文 中文
Intelligent temporal role based access control for data storage in cloud database 基于智能时态角色的云数据库数据存储访问控制
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229706
S. Muthurajkumar, M. Vijayalakshmi, A. Kannan
{"title":"Intelligent temporal role based access control for data storage in cloud database","authors":"S. Muthurajkumar, M. Vijayalakshmi, A. Kannan","doi":"10.1109/ICOAC.2014.7229706","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229706","url":null,"abstract":"Recently cloud computing has become a fast growing area and helps to store very huge volume of data. In such a scenario, the computing resources including processor and memory are offered flexibly to the users as services on the internet. The users can get access to any of the resources available on the cloud based on their demand and they have to make payments for such services. In order to provide these features, access control techniques are essential since they satisfy the security requirements for handling the required payments effectively. In this paper, a new security mechanism for cloud computing with a focus on access control is proposed. In the past, different access control techniques including the traditional role-based access control (RBAC) model were used to implement the security features in databases. In this work, the traditional RBAC is modified to suit the security cloud requirements of databases by providing temporal extensions and intelligent agents. From the experiments carried out in this work, it has been observed that the proposed Intelligent Temporal RBAC is well suited to secure the cloud databases effectively. In this model, users or applications are clearly separated according to their job functions for database access with respect to the variation in time and situation.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131396920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
XML document retrieval by developing an effective indexing technique 通过开发有效的索引技术实现XML文档检索
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229758
A. Posonia, V. Jyothi
{"title":"XML document retrieval by developing an effective indexing technique","authors":"A. Posonia, V. Jyothi","doi":"10.1109/ICOAC.2014.7229758","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229758","url":null,"abstract":"A Semistructured data can be represented in a tree structure which is an efficient tool for describing different kinds of data. This paper furnishes the method of full text data searches that can be integrated with XML database and the performance can be improved by implementing structured and text index based technique. The searching keyword of structure index should be a node identifier whereas the searching keyword of text index should be a content fragment of an XML document. The experimental results exhibit the improved performance of document retrieval.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Time domain analysis of servo and regulatory responses of various controllers 各种控制器的伺服和调节响应的时域分析
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229760
V. Hari, P. Lakshmi, R. Kalaivani
{"title":"Time domain analysis of servo and regulatory responses of various controllers","authors":"V. Hari, P. Lakshmi, R. Kalaivani","doi":"10.1109/ICOAC.2014.7229760","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229760","url":null,"abstract":"This paper analyses the performance of various conventional controllers for servo and regulatory performance of a Higher Order (HO) as well as a First Order Plus Dead Time (FOPDT) system. The designed simple Smith Predictor (SP) works good for servo performance of the system with delay by preventing the overshoot in the unit step response. The PID tuned with oscillation curve method ensures better regulatory performance than the auto tuned PID using closed loop method and the Internal Model Control (IMC). The Simulations have been carried out by MATLAB simulation software.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116854502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing NameNode fault tolerance in Hadoop over cloud environment 增强Hadoop over cloud环境下NameNode的容错能力
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229751
Lino Abraham Varghese, V. Sreejith, S. Bose
{"title":"Enhancing NameNode fault tolerance in Hadoop over cloud environment","authors":"Lino Abraham Varghese, V. Sreejith, S. Bose","doi":"10.1109/ICOAC.2014.7229751","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229751","url":null,"abstract":"Risks on user applications has significantly changed in the cloud computing infrastructure because of the failures such as server overload, network congestion, hardware faults, etc. Hadoop uses a single metadata server namely NameNode (NN) which keeps the whole file system metadata in primary memory. In Hadoop, the I/O operations associated with those credential metadata makes NameNode a Single Point of Failure. The system achieves fault tolerance by using an Observer Tool, which will continuously monitor the NN. It proactively calculates chances of any crash and in such a case system will run using the secondary NN.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"12 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Establishing a secure routing in MANET using a hybrid intrusion detection system 利用混合入侵检测系统在MANET中建立安全路由
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229722
N. Indira
{"title":"Establishing a secure routing in MANET using a hybrid intrusion detection system","authors":"N. Indira","doi":"10.1109/ICOAC.2014.7229722","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229722","url":null,"abstract":"MANET has lead to the emergence of on the fly networking among the communicating nodes. However, they are vulnerable to a variety of attacks, especially in the routing layer because of their open environment and the communication happens based on the mutual trust among the nodes. An appropriate intrusion detection system is an inevitable requirement. Using anomaly based intrusion detection system results in the false positive identification of the intrusion. Computing trust value for each node in the network leads to higher computational complexity. Combining trust value along with intrusion detection system can reduce the pitfalls of both methods. A comparative study of using only anomaly based intrusion detection system and combination of trust value along with an anomaly based intrusion detection system is performed. The proposed anomaly detection system uses artificial neural networks and Dempster-Shafer theory to confirm the attack occurrence in the network.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123388639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure XML labeling for efficient XML content dissemination 安全的XML标记,以实现有效的XML内容分发
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229764
S. Sankari, S. Bose
{"title":"Secure XML labeling for efficient XML content dissemination","authors":"S. Sankari, S. Bose","doi":"10.1109/ICOAC.2014.7229764","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229764","url":null,"abstract":"XML is the commonly utilized content specification format for data interchange over the Internet. In Publish/Subscribe model, producer is the source for an XML document and disseminates the XML content to the consumer using a mediator called publisher. Producer labels the XML document and defines access control policies for the consumers. Securely labeled XML document are encrypted and sent to the publisher with consumers access details. Encryption is used to provide confidentiality and integrity for XML content dissemination. Consumer queries the publisher for their accessible content. Here, XML label plays a vital role which locates the XML content uniquely. The objective is to design a secure label that has to identify each XML tag uniquely, should not reveal any additional information about the source XML document. Also, XML label size should be optimal with less label generation time. We proposed a secure and efficient XML labeling scheme called Secure Dewey Coding (SDC) that prevents information leak and assures minimal memory space and time. The implementation results of the proposed XML labeling scheme showed that the XML label size has been reduced to a maximum and an average of 68% and 59% respectively and the generation time also decreased significantly.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123831319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed and independent access to quantum encrypted cloud database 分布式独立访问量子加密云数据库
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229746
K. Vidya, D. Devika
{"title":"Distributed and independent access to quantum encrypted cloud database","authors":"K. Vidya, D. Devika","doi":"10.1109/ICOAC.2014.7229746","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229746","url":null,"abstract":"The cloud database as a service helps in several internet based applications, but it faces several confidentiality problems. Hence to improve data confidentiality in terms of scalability and availability, a new model namely Security as a Service (SECaaS) model is being introduced that uses quantum encryption scheme. Quantum cryptography is rapidly developing these days due to its high secrecy power in terms of key generation and key distribution. Hence this quantum encryption scheme is used in layered concept that helps to improve data confidentiality and secrecy.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent trends and challenges in real time face recognition system in video 视频实时人脸识别系统的发展趋势与挑战
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229766
V. Vijayakumar
{"title":"Recent trends and challenges in real time face recognition system in video","authors":"V. Vijayakumar","doi":"10.1109/ICOAC.2014.7229766","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229766","url":null,"abstract":"Summary form only given. Video surveillance systems are used to monitor the activities in the surveillance area. The existing video surveillance systems are reactive where the analysis is done after the occurrence of an event. Thus, there is a need for a proactive solution in real time to avoid the damage caused due to the occurrence of abnormal events. Face detection and recognition in online video streams plays a challenging role in surveillance system due to variation in illumination, pose and occlusion. This keynote address presents the methodologies for efficient face recognition invariant to Pose, Illumination and Occlusion. Video based face recognition system improves decision making in identifying the unauthorised person by considering continuous frames and temporal information. The video based face detection and recognition involves four modules such as face detection, pose estimation, feature extraction and face recognition. The modules are proved to be efficient in terms of accuracy and detection time.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133077143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured cloud storage for strategic applications - A case study 战略应用的安全云存储——一个案例研究
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229728
T. Aravindh, S. Chander, R. Rukmani, G. Kalaichelvi
{"title":"Secured cloud storage for strategic applications - A case study","authors":"T. Aravindh, S. Chander, R. Rukmani, G. Kalaichelvi","doi":"10.1109/ICOAC.2014.7229728","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229728","url":null,"abstract":"Using the cloud to store data relevant to strategic applications is restricted due to the presence of several security threats. The embedded system used to drive the strategic application has some hardware limitations, confining the necessary computation required to secure the data to be stored in the cloud. So a methodology known as S-CEM proposed in this paper is implemented which not only secures the data to be stored in the cloud, but also reduces the overall computation required by encrypting critical data and leaving out non-critical data which is less significant. The S-CEM technique suggested for an embedded system in this paper ensures the confidentiality of data and preserves the privacy of the user through a unique management of data hosted in the cloud using partitioning and cryptography. This method also ensures the data security on the fly through the application of combining, scrambling technique along with encrypting using Data Encryption Standard (DES). This method is analyzed for its efficiency of time and the volume of data storage.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128834344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Navigation aid for people (joggers and runners) in the unfamiliar urban environment using inertial navigation 导航辅助,为人们(慢跑者和跑步者)在不熟悉的城市环境中使用惯性导航
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229713
Sudheer Kumar Nagothu, G. Anitha, Sudhakar Annapantula
{"title":"Navigation aid for people (joggers and runners) in the unfamiliar urban environment using inertial navigation","authors":"Sudheer Kumar Nagothu, G. Anitha, Sudhakar Annapantula","doi":"10.1109/ICOAC.2014.7229713","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229713","url":null,"abstract":"Joggers and runners who have moved to the new urban environment have a fear of getting lost on the path. An aid is needed to move from one place to another. Normally people carry a GPS device which gives the map of the city, by refereeing to that they will continue their travel. For the joggers and runners the traditional way may not be convenient, for each time they have to take out the device wait for the map to load and then decide where to go. The normal GPS accuracy is 2025 meters in urban canyon, multi-path and fading errors of GPS in urban environment result in inaccurate positioning, because of which there is a high probability of losing the path. To overcome this inertial navigation system (INS) is used which is independent of external signals. They can plan their short travel in their homes using google map through the waypoints. Waypoints (WP) have specific latitude, longitude and altitude, which will assist to plan the path. When they deviate from the intended path the vibration motors which are attached to the shoulders of the human will give signals to make them to follow the intended path.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信