for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
International Journal of Research in Computer and Communication Technology  
   [4 followers]  Follow    
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Secured Architecture To Access Cloud Based Applications (Or) Serevices

    • Authors: Ch V.V Ganeswara Rao, Chokkapu Narayanarao
      Abstract: Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such as streaming video, fast enough for your web viewing audience. But sometimes user determine the selection cloud services may have loss of confidentiality and data emission this paper aims to provide maximal safeness and confidentiality to the data placed on the cloud by using two way validation process and Tresorit-The ultimate way to stay safe in the cloud with the use of factors to the internet browsers. The main advantage of this application is to provide maximum security and maintenance free service. The uniqueness of this process is to keep the data on different clouds which produces a thereat free application to end user.
      PubDate: 2015-01-20
      Issue No: Vol. 3 (2015)
       
  • Implementation of Slicing Technique for Privacy Preserving Data Publishing

    • Authors: Konda Tadisetti, P. Madhuri, J.Bheemeswara Shastri
      Abstract: Today, most of the organizations are effectively gathering and storing information in extensive databases. A large number of them have perceived the potential estimation of this information as a data hotspot for settling on business choices. Protection saving information distributed (PPDP) gives systems and devices to distributed helpful data while safeguarding information security. In this paper, a short yet precise audit of a few Anonymization strategies, for example, speculation and Bucketization, have been intended for security saving micro information distributed. Late work has demonstrated that speculation loses impressive measure of data, particularly for high-dimensional information. Then again, Bucketization does not avoid participation exposure. Though cutting jelly preferred information utility over speculation furthermore anticipates enrollment revelation. This paper concentrates on compelling strategy that can be utilized for giving better information utility and can deal with high dimensional information.
      PubDate: 2015-01-07
      Issue No: Vol. 3 (2015)
       
  • Implementation of a Personalized Mobile Query Search Engine

    • Authors: Jaipal Bandi, G.Ravi Kumar, J.Bheemeswara Shastri
      Abstract: PMSE, Personalized Mobile Search Engine has been proposed to show any client craved result or re-ranking result as per the client given question (UGQ) which incorporates content and the area of the client. It meets expectations effectively with the assistance of metaphysics based, multi client profile. Client inclination are confined focused around the navigate information, ARM (Association guideline mining) and Joachims proposed procedures, for example, spying system and novel voting strategy. Inquiry handling is an alternate critical angle which is been directed by substance metaphysics operators and area cosmology specialists, question wrote (geo or non-geo) and users‟ area (utilizing GPS) individually. Re-positioned rundown is arranged in the wake of breaking down the differences significance entropies. Like the web seeks execution, improved PMSE additionally has mollifying client's desire. EPMSE is a customer server model. Customer catches the user’s question, conveyes the needs of the server and presentations the re-positioned result. Server performs the hunt activity and readies the fancied yield. EPMSE does Meta seek on motors, for example, Google, Yahoo.
      PubDate: 2015-01-07
      Issue No: Vol. 3 (2015)
       
  • A Reliable implementation of Security-Enabled Architecture with area
           optimized symmetric Cryptography

    • Authors: M.Suresh Kumar, G.S.S. Prasad
      Abstract: My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which provokes high security. The transferred information was stored securely in the memory unit. By implementing this design, the results can be accomplished that the optimized area is required to integrate the chip with the gate count of 22618, here shown that gate elements are reduced up to 53.98% in comparison with earlier methods and also providing the similar security as well as reduced power consumption of 43.907mw.
      PubDate: 2014-12-28
      Issue No: Vol. 3 (2014)
       
  • Pseudo Random NumbernGeratone Using Reseeding Module

    • Authors: Adabala Ashok, Adabala Jaya Vani
      Abstract: In cryptographyencoding, is the process of encrypting messages or knowledge in a way such that hackers cannot read it. In an encoding scheme the message or knowledge is encodedby using an encryption method, which turns into an unreadable cipher text. This is done usually with the help of an encrypted key. Any antagonist which can see the cipher text should know nothing about the primary communication. To decryptthe cipher textwith the help of an algorithm that actually needs,an undisclosed decoding key. An encoding algorithm actually uses a key generating algorithm to unsystematically generate keys. Pseudo Random Number Generator (PRNG) is an algorithm used for generating a series of numbers. Because of speed in number generation pseudo random numbers are very crucial. The outflow output series of RM-PRNG is used for key to the encoding and decoding modules. In this we used the encryption and decryption mechanismsdue to lack of data privacy now a days. Sowe used encryption and decryption of codes. Here a single key is generated which cannot be identified by the encrypter or decrypter. This generated key for encoding decoding for communication of messages safely.
      PubDate: 2014-12-28
      Issue No: Vol. 3 (2014)
       
  • An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User
           Participation

    • Authors: Nanduri Vigna Valli Sita Mahalakshmi, ArunaRekha Gollapalli
      Abstract: The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and soon all our gadgets e.g., even our clothes or cars will implant a massive amount of sensors GPS, digital imagers, accelerometers, etc. As a result data unruffled by sensor-equipped devices becomes of intense interest to other users and applications. This concept is called participatory sensing (PS) sometimes also referred to as opportunistic or urban sensing. It mingles the ubiquity of personal devices with sensing capabilities typical of WSNs. As the number of mobile phone subscriptions exceeds 5 billion PS becomes a cutting-edge and helpful distributed computing as well as business model. We squabble that PS considerably expands the capabilities of WSN applications. PS is an rising paradigm that focuses on the faultless collection of information from a large number of connected always on always carried devices such as mobile phones.
      PubDate: 2014-12-27
      Issue No: Vol. 3 (2014)
       
  • To Demonstrate Best Cooperative Caching For Provisioning Cost Reduction In
           Networks

    • Authors: V. Neeharika, Y. Swathi
      Abstract: Social Wireless Networks (SWNETs) can be produced using ad hoc wireless associations amid the devices. Electronic object caching in such SWNETs are shown to be competent to dwindle the content provisioning cost which depends profoundly on the service and pricing dependences amongst various stakeholders including content providers (CP), network service providers and End Consumers (EC). The paper puts up logical and reproduction models for analyzing the proposed caching approaches in the occurrence of selfish users that moves away from network-wide cost-optimal policies. With the continuation of such SWNETs a stand-in approach to content access by a device would be to original search the local SWNET for the demanded content before downloading it from the CP’s server. The expected content provisioning cost of such an approach can be significantly inferior since the download cost to the CSP would be equivocated when the content is initiated surrounded by the confined SWNET.
      PubDate: 2014-12-27
      Issue No: Vol. 3 (2014)
       
  • An Automatic Personalized Monitoring Service To Provide Security And
           Privacy Using Cam

    • Authors: G.Narasimha Murthy, G.Suryakala Eswari
      Abstract: Physiological data could then be sent to a central server which could then run a range of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could present a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud. In a remote mHealth monitoring system a client could arrange portable sensors in wireless body sensor networks to collect various physiological data such as blood pressure (BP), breathing rate (BR), Electrocardiogram (ECG/EKG), peripheral oxygen saturation (SpO2) and blood glucose.
      PubDate: 2014-12-27
      Issue No: Vol. 3 (2014)
       
  • Effective Utilization of ERDI Algorithm Based on Software Prototyping

    • Authors: G. Guru Kesava Dasu, P. Bala Krishna Prasad
      Abstract: Rapid prototyping is a broad field encompassing many domains and varied approaches. This article presents our experiences using user-centered rapid prototyping approaches for developing display-based ubiquitous systems, to be deployed over the longer term, in ‘real world’ situations. In contrast to the usual use of rapid prototyping to produce a single ‘proof of concept’ demonstrator to investigate technical feasibility, we have found that without investigation of real use, technical feasibility can be meaningless. So, to overcome this problem we have introduced ERDI algorithm as it will investigate the technical feasibility so that it would be helpful for the future researches to select the particular type of prototype techniques for future projects.
      PubDate: 2014-12-27
      Issue No: Vol. 3 (2014)
       
  • Security Measures To Prevent Vampire Attacks To Protect Routing
           Infrastructure

    • Authors: G.Harsha Vardhan, Ch.Udaya Bhaskar
      Abstract: A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although using different packet headers. We calculate the potency of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the relation of network-wide power operation with malicious nodes present to energy procedure with only honest nodes when the number and size of packets sent remains stable. Safety from Vampire attacks involves that this ratio is 1. Energy use by malicious nodes is not considered since they can forever unilaterally drain their own batteries. However believe the procedure of routing a packet in any multihop network. A cause creates and transmits it to the next hop toward the destination which transmits it further until the destination is reached consuming resources not only at the source node but also at each node the message moves through. If we consider the growing energy of an entire network amplification attacks are forever probable given that an opponent can compose and send messages which are practiced by each node along the message path.
      PubDate: 2014-12-27
      Issue No: Vol. 3 (2014)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014