Showing posts with label ieee projects 2014. Show all posts
Showing posts with label ieee projects 2014. Show all posts

Monday, 7 July 2014

Hybrid Attribute- And Re-Encryption-Based Key Management For Secure And Scalable Mobile Applications In Clouds



HYBRID ATTRIBUTE- AND RE-ENCRYPTION-BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS IN CLOUDS

TO VIEW OUTPUT CLICK HERE 


ABSTRACT:

Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest but curious. Additionally, cloud-based data are increasingly being accessed by resource-constrained mobile devices for which the processing and communication cost must be minimized. Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user. Furthermore, data re-encryption may be optionally performed by the cloud provider to reduce the expense of user revocation in a mobile user environment while preserving the privacy of user data stored in the cloud. The proposed protocol has been realized on commercially popular mobile and cloud platforms to demonstrate real-world benchmarks that show the efficacy of the scheme. A simulation calibrated with the benchmark results shows the scalability potential of the scheme in the context of a realistic workload in a mobile cloud computing system.

EXISTING SYSTEM:
Data outsourcing to a cloud is appropriate for any class of applications that requires data to be kept in storage and disseminated to many users. Clients that engage a cloud provider typically only pay for the amount of storage, related computation, and amount of network communication actually consumed; they do not incur the capital and maintenance costs of an in-house solution. In addition, the cloud provider offers the advantages of automatic backup and replication to ensure the safety, longevity, and high accessibility of the user data. A major concern that is typically not sufficiently addressed in practice, however, is that data, by default, are stored in the clear; it may be accessed and read by a cloud administrator without knowledge of the client. A cloud administrator may not be trusted despite the presence of contractual security obligations, if data security is not further enforced through technical means. An additional risk is that sensitive data carry the persistent risk of being intercepted by an unauthorized party despite safeguards promised by the provider. Therefore, it is useful to apply software techniques, such as encryption key management, to ensure that the confidentiality of cloud data is preserved at all times. It is especially crucial to safeguard sensitive user data such as e-mails, personal customer information, financial records, and medical records.


DISADVANTAGES OF EXISTING SYSTEM:
·       It is not secure.
·       There is no confidentiality.
·       It is especially crucial to safeguard sensitive user data.
PROBLEM STATEMENT:
A major concern that is typically not sufficiently addressed in practice, however, is that data, by default, are stored in the clear; it may be accessed and read by a cloud administrator without knowledge of the client.
SCOPE:
Important requirement is for data to be addressable with fine-grained access controls on the record-level or finer, to provide flexibility.

PROPOSED SYSTEM:
A protocol for outsourcing data storage to a cloud provider in secure fashion is provided. The provider is unable to read stored data; authorized users may do so based on qualification through possession of the right attributes without arbitration by the data owner. The protocol is designed to be efficient for resource-constrained mobile users by delegating computation and requests to a cloud provider or trusted authority, where appropriate, without compromising security. An improvement is made over a traditional attribute based encryption scheme, such that responsibility over key generation is divided between a mobile data owner and a trusted authority; the owner is relieved of the highest computational and messaging burdens. Additional security is provided through a group keying mechanism; the data owner controls access based on the distribution of an additional secret key, beyond possession of the required attributes. This additional security measure is an optional variant applicable to highly sensitive data subject to frequent access. Re-encryption, as a process of transforming the stored ciphertext, permits efficient revocation of users; it does not require removal of attributes and subsequent key regeneration, and may be administered by a trusted authority without involvement of the data owner.

ADVANTAGES OF PROPOSED SYSTEM:
·       It is more secure.
·       It reduces data traffic.
·       Cost efficient.

SYSTEM ARCHITECTURE:





SYSTEM CONFIGURATION:-

HARDWARE REQUIREMENTS:-

ü Processor                  -        Pentium –IV

ü Speed                        -        1.1 Ghz
ü RAM                         -        512 MB(min)
ü Hard Disk                 -        40 GB
ü Key Board                -        Standard Windows Keyboard
ü Mouse                       -        Two or Three Button Mouse
ü Monitor                     -        LCD/LED
SOFTWARE REQUIREMENTS:

         Operating system :         Windows XP
         Coding Language :         Java
         Data Base             :         MySQL
         Tool                     :         Net Beans IDE

REFERENCE:
Piotr K.Tysowski and M.Anwarul Hasan Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 2, JULY-DECEMBER 2013.

Tuesday, 1 July 2014

Faved! Biometrics: tell me which image you like and i’ll tell you who you are



FAVED! BIOMETRICS: TELL ME WHICH IMAGE YOU LIKE AND I’LL TELL YOU WHO YOU ARE

TO VIEW OUTPUT CLICK HERE!



ABSTRACT:

This paper builds upon the belief that every human being has a built-in image aesthetic evaluation system. This sort of personal aesthetics mostly follows certain aesthetic rules widely studied in image aesthetics (e.g., rules of thirds, colorfulness, etc.), though it likely contains some innate, unique preferences. This paper is a proof of concept of this intuition, presenting personal aesthetics as a novel behavioral biometrical trait. In our scenario, personal aesthetics activate when an individual is presented with a set of photos he may like or dislike. The goal is to distill and encode the uniqueness of his visual preferences into a compact template. To this aim, we extract a pool of low- and high-level state-of-the-art image features from a set of Flickr images preferred by a user, feeding them successively into a LASSO regressor. LASSO highlights the most discriminant cues for the individual, allowing authentication and recognition tasks. The results are surprising given only 1 image as test. We can match the user identity against a gallery of 200 individuals definitely much better than chance. Using 20 images (all preferred by a single user) as a biometrical trait, we reach an AUC of 96%, considering the cumulative matching characteristic curve. Extensive experiments also support the interpretability of our approach, effectively modeling what is the “what we like” that distinguishes us from others.

EXISTING SYSTEM:
Several biometrical traits have been designed, each analyzed from different perspectives like accuracy, efficiency, usability, acceptability, etc. From a very general point of view, they can be divided in two main classes:
physical/physiological biometrical traits
behavioral biometrical traits

Among the behavioral approaches, some – the so-called HCI-based behavioral biometrics -are based on the idea that every person has a unique way to interact with a personal computer: for example some methods successfully investigated the possibility of characterizing a person on the basis of keystrokes or mouse dynamics. In the same context, very recently some other approaches investigated the exploitation of Internet-based biometrical traits, like browsing histories or chatting. In this context, many CMA applications have been developed: from aesthetic photo ranking and preference aware view recommendation systems [29], to picture quality analysis.

DISADVANTAGES OF EXISTING SYSTEM:
·       It focuses only on the behavioral approaches does not consider the physiological approaches.
·       These technologies seem to forget the essential role that factors internal to the observer may have on preference.
·       It will not show the unique characteristics of the user against others.

PROPOSED SYSTEM:
This application makes a further step along this direction, and proposes a novel biometrical trait which exploits the “personal aesthetics” traits of people, i.e. those visual preferences that distinguish people from each other. Actually, it is known that people often get enjoyment from observing images and express preferences for some pictures over others. There is no scientifically comprehensive theory that explains what psychologically defines such preferences, even if some guidelines have been produced which suggest principles of general gratification– some of them have been modeled computationally in the field of Computational Media Aesthetics (CMA). For example, considering colors, a study reported in showed that human subjects prefer blue and dislike yellow, unveiling intriguing continuity between animal and human color aesthetics. Regarding shape, the most important principle discussed in the literature is that of the “Golden Ratio”: the idea is that a rectangle whose ratio between height and width is the same as the ratio of their sum to their maximum is more attractive than other rectangles. Recent studies limited the strength of this belief .

ADVANTAGES OF PROPOSED SYSTEM:
·       It focuses on both behavioral and physiological approaches.
·       Involving both verification and identification.
·       This will show that personal tastes act like a blueprint for a user, allowing to recognize him against others.
 

SYSTEM ARCHITECTURE:




 


SYSTEM CONFIGURATION:-

HARDWARE REQUIREMENTS:-


ü Processor                  -        Pentium –IV

ü Speed                        -        1.1 Ghz
ü RAM                         -        512 MB(min)
ü Hard Disk                 -        40 GB
ü Key Board                -        Standard Windows Keyboard
ü Mouse                       -        Two or Three Button Mouse
ü Monitor                     -        LCD/LED

SOFTWARE REQUIREMENTS:

         Operating system :         Android.
         Coding Language :         Android
         Data Base             :         SQLite
         Tool                     :         Eclipse

REFERENCE:
Pietro Lovato, Manuele Bicego, Cristina Segalin, Alessandro Perina, Nicu Sebe, Senior and Marco Cristani, Faved! Biometrics: Tell Me Which Image You Like and I’ll Tell You Who You Are” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 2014