Showing posts with label IEEE BULK PROJECTS. Show all posts
Showing posts with label IEEE BULK PROJECTS. Show all posts

Sunday, 13 July 2014

BULK IEEE PROJECTS 2014 - 2015

Dear Client,
 Greetings from LansA Informatics Pvt Ltd! We would like to let you know we have launched a training division exclusively for CSE & IT Department students. In the mean time we have also launched a separate IEEE / NON-IEEE Project development division only for CSE & IT Students. Our moto is to provide the quality of education which would lead the upcoming generation more strong in the technology. 

HIGHLIGHTS:

      1. We are happy to let you know that we offer only projects related to CSE / IT.
      2. Projects developed by Experts with rich experience in technology
      3. We have been recognized by leading news papers such as "INDIAN EXPRESS",     
          "DINAKARAN", and “DHINAMALAR".
      4. Organized various workshops and conferences in leading colleges like
          COIMBATORE INSTITUTE OF TECHNOLOGY
          ARJUN COLLEGE OF TECHNOLOGY
      5. we trained 5000+ students so far.

PROJECTS WILL BE PROVIDED ON VARIOUS DOMAINS:
  • Cloud computing
  • Networking
  • Wireless Communications
  • Mobile Computing
  • Network Security
  • Secure & Dependable Computing
  • Data Mining / Knowledge and Data Engineering
  • Image processing
  • Parallel & Distributed Systems
  • Information Security      
TECHNOLOGIES WE USED TO DEVELOP PROJECTS:
  • Dotnet
  • Java/J2EE/J2ME
  • Android
  • Matlab
PROJECT DELIVERABLE / SUPPORTS FOR CLIENTS:

  • Project IEEE Base paper
  • Project reference paper
  • Project abstract
  • Project complete documentation
  • Project presentation in PPT (4 reviews)
  • project source code
  • project demo video / how to run help file
  • Software packages
  • Team viewer support to execute the projects.

FOR MORE DETAILS CONTACT US:

Papitha Velumani, 
Managing Director,
LansA Informatics Pvt Ltd
No 165, 5th Street,
Crosscut road, Gandhipuram,
Coimbatore - 641 012

Landline: 0422 - 4204373
Mobile: +91 90 953 953 33

Tuesday, 8 July 2014

Decentralized Access Control With Anonymous Authentication Of Data Stored In Clouds




DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
ABSTRACT:

We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.

EXISTING SYSTEM:
Much of the data stored in clouds is highly sensitive, for example, medical records and social networks. Security and privacy are, thus, very important issues in cloud computing. In one hand, the user should authenticate itself before initiating any transaction, and on the other hand, it must be ensured that the cloud does not tamper with the data that is outsourced. User privacy is also required so that the cloud or other users do not know the identity of the user. The cloud can hold the user accountable for the data it outsources, and likewise, the cloud is itself accountable for the services it provides. The validity of the user who stores the data is also verified. Apart from the technical solutions to ensure security and privacy, there is also a need for law enforcement. Efficient search on encrypted data is also an important concern in clouds. The clouds should not know the query but should be able to return the records that satisfy the query.

DISADVANTAGES OF EXISTING SYSTEM:
·       It is unsecure.
·       No privacy.
·       Anyone can able to access and modify the data.
·       Problem here is that the data records should have keywords associated with them to enable the search.

PROPOSED SYSTEM:
Although we proposed a decentralized approach, their technique does not authenticate users, who want to remain anonymous while accessing the cloud. In an earlier work, proposed a distributed access control mechanism in clouds. However, the scheme did not provide user authentication. The other drawback was that a user can create and store a file and other users can only read the file. Write access was not permitted to users other than the creator. In the preliminary version of this paper, we extend our previous work with added features that enables to authenticate the validity of the message without revealing the identity of the user who has stored information in the cloud. In this version we also address user revocation, that was not addressed. We use ABS scheme to achieve authenticity and privacy. Unlike our scheme is resistant to replay attacks, in which a user can replace fresh data with stale data from a previous write, even if it no longer has valid claim policy. This is an important property because a user, revoked of its attributes, might no longer be able to write to the cloud. We, therefore, add this extra feature in our scheme and modify appropriately. Our scheme also allows writing multiple times which was not permitted in our earlier work.

ADVANTAGES OF PROPOSED SYSTEM:
·       It provides authentication of users who store and modify their data on the cloud.
·       It revoked users cannot access data after they have been revoked.
·       Costs are comparable to the existing centralized approaches.


SYSTEM ARCHITECTURE:

SYSTEM CONFIGURATION:-

HARDWARE REQUIREMENTS:-


ü Processor                  -        Pentium –IV

ü Speed                        -        1.1 Ghz
ü RAM                         -        512 MB(min)
ü Hard Disk                 -        40 GB
ü Key Board                -        Standard Windows Keyboard
ü Mouse                       -        Two or Three Button Mouse
ü Monitor                     -        LCD/LED

SOFTWARE REQUIREMENTS:


Operating system      :         Windows XP.
Coding Language      :         .Net
Data Base                 :         SQL Server 2005
Tool                          :         VISUAL STUDIO 2008.

REFERENCE:
Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud



Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

CLICK HERE TO VIEW THE OUTPUT



ABSTRACT:

With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation.
EXISTING SYSTEM:
To protect the integrity of data in the cloud, a number of mechanisms have been proposed. In these mechanisms, a signature is attached to each block in data, and the integrity of data relies on the correctness of all the signatures. One of the most significant and common features of these mechanisms is to allow a public verifier to efficiently check data integrity in the cloud without downloading the entire data, referred to as public auditing (or denoted as Provable Data Possession ).This public verifier could be a client who would like to utilize cloud data for particular purposes (e.g., search, computation, data mining, etc.) or a third party auditor (TPA) who is able to provide verification services on data integrity to users. Most of the previous works  focus on auditing the integrity of personal data.
DISADVANTAGES OF EXISTING SYSTEM:
v Especially when the number of re-signed blocks is quite large.
v Existing users may access their data sharing services provided by the cloud with resource limited devices, such as mobile phones.
v Frequent Security Issues.

PROPOSED SYSTEM:
We propose Panda, a novel public auditing mechanism for the integrity of shared data with efficient user revocation in the cloud. In our mechanism, by utilizing the idea of proxy re-signatures, once a user in the group is revoked, the cloud is able to resign the blocks, which were signed by the revoked user, with a re-signing key. As a result, the efficiency of user revocation can be significantly improved, and computation and communication resources of existing users can be easily saved. Meanwhile, the cloud, which is not in the same trusted domain with each user, is only able to convert a signature of the revoked user into a signature of an existing user on the same block, but it cannot sign arbitrary blocks on behalf of either the revoked user or an existing user. By designing a new proxy re-signature scheme with nice properties, which traditional proxy re signatures do no have, our mechanism is always able to check the integrity of shared data without retrieving the entire data from the cloud.

ADVANTAGES OF PROPOSED SYSTEM:
v Easily Revocable of signatures for the existing users.
v The public verifier can audit the integrity of shared data without retrieving the entire data from the cloud.
SYSTEM ARCHITECTURE








SYSTEM CONFIGURATION:-

HARDWARE REQUIREMENTS:-

Processor                  -        Pentium –IV

Speed                        -        1.1 Ghz
RAM                         -        512 MB(min)
Hard Disk                 -        40 GB
Key Board                -        Standard Windows Keyboard
Mouse                       -        Two or Three Button Mouse
Monitor                     -        LCD/LED
SOFTWARE REQUIREMENTS:
Operating system      :         Windows XP.
Coding Language      :         .Net
Data Base                 :         SQL Server 2005
Tool                          :         VISUAL STUDIO 2008.

REFERENCE:
Boyang Wang, Baochun Li, and Hui Li, “Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud” IEEE TRANSACTIONS ON SERVICE COMPUTING VOL. PP, NO. 99, December 2013