http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
N. Ch. S. N. Iyengar,Gopinath Ganapathy 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7
Cloud computing is a technology which completely shifts the data to unaware Datacenter (DC) where the cloud service provider (CSP) is responsible for the subscribers’ data and its protection. Distributed Denial of Service (DDoS) is a kind of overload threat aims to subvert DC and their resources which leads to resource unavailable to legitimate requestors. In this paper we proposed an effective layered load balancing mechanism which scrutinizes the incoming requestors’ traffic at various layers and each layer outwits some kind of attack traffic. The early network traffic condition prediction paves the way to detect the threats earlier which in turn improves the availability. The significance of the proposed mechanism is detecting the higher rate of overload threats at earlier layers. Constant monitoring and stringent protocol setup for incoming traffic strengthens the proposed mechanism against several kinds of overload threats. Based on the traffic pattern of incoming requestors, the vulnerability is observed and outwitted at various layers. The simulation proved that the mechanism proposed is deployable at an attack-prone DC for resource protection, which would eventually benefit the DC economically as well.
N. Ch. S. N. Iyengar,Gopinath Ganapathy 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.9
Cloud computing is an advantageous technology, which allows any enterprises to shift their data towards Cloud Service Provider (CSP) end. This shift poses an essential necessity for data being available all the time with a considerable level of security. Availability is an important concern for any subscribers as their sensitive data are prone to attack threats. Resource and data availability are most important security measure. So, blocking the attack traffic towards Data Center (DC) improves availability, but passive outwitting leads to high false positive and negative rate. This affects the legitimate requestors being outwitted. So, the proposed chaotic theory based defense mechanism considers the stability state of traffic and detects the anomaly traffic condition. The anomaly traffic condition is just the passive way of diminishing the effect of overload, but classifying them appropriately and allowing the non-attack case of overload improves the availability and utilization and reduces the false case rates. Considering several cases of overload threats and allowing the legitimate overload case improves efficiency. The simulation results proved that the mechanism proposed is deployable at an attack-prone DC for resource protection, which would eventually benefit the DC economically as well.
Ubiquitous Cloud Based Bookcafé
Imran Ahmed,Satish Janghel,N. Ch. S. N. Iyengar 보안공학연구지원센터 2014 International Journal of Database Theory and Appli Vol.7 No.6
Cloud services provide platform for multiple users to remotely store , share and update data items. Mobile virtual environment and effective use of cloud computing made this great success. . This paper is an implemented real time web and mobile application named BookCafé using cloud database storage (common for both web and mobile) provided by Amazon web service. BookCafé is a storage where all the books will be stored with year wise and subject wise classification for student’s purpose. Update’s can be done at any time. They can have like laptops, smart phones, and tablet computer devices. Users of Online web application (non smart) access through user interface for signing, reading and uploading new books category wise. By uploading the android application on Google Play store, smart phone users can avail all the facilities on their handheld devices. The students either through mobile (android based) or through web, share and upload new books from anywhere in the campus by connecting to cloud.
Agent Based Performance Analysis of Strategic Algorithms in Prisoner’s Dilemma
Aastha Yadav,Chandini Bhambhani,Pronay Peddiraju,Ronnie D. Caytiles,N.Ch. S.N. Iyengar 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.2
To create a system that provides a comparison of multiple algorithms that may be tested in the Prisoner’s Dilemma decision problem using two subjects in a dual agent environment. As an addition to understanding the effects of various algorithms and logic that helps influence a single agent’s decision, our system aims at analysing the performance of the same algorithms in iterative and multi agent systems. The results are obtained by using concepts of Swarm Intelligence, Multiple Agent Systems and Super Agents within the testing system. The results of the research are to expose the advantages and disadvantages of each schema to help plan investments, predict outcomes and for real world application of the Prisoner’s Dilemma in fields of Environmental Sciences, Psychology, Economics and many more such fields.
Semantic Discovery of Cloud Service Catalog Published Over Resource Description Framework
Magesh Vasudevan,Haleema P. K.,N. Ch. S. N. Iyengar 보안공학연구지원센터 2014 International Journal of Grid and Distributed Comp Vol.7 No.6
Cloud computing is a model to provide pool of services on demand which is shared among the consumers and metered. Cloud deployment should support efficient mechanism to publish its services in a right method such that the end users identify them. Services has to be discovered according to user’s requirement dynamically. The proposed work discusses about introducing semantics in the cloud services description, such that it projects itself apart from other providers and capably handle the commercial demand for their services. The semantics are introduced at the service catalog level and the CSP publish their list of services in the form of RDF, whose semantics are defined in a provider specific ontology. The system was evaluated with keyword & frequency matching discovery and proved to be efficient with semantic discovery over RDF data.
PDConnect : Low Cost Wearable Device connecting Patient-Doctor via Cloud for Good Health
Akarsh Goyal,Ishan Khandelwal,Aditya Kumar Mathur,Ronnie D. Caytiles,N.Ch. S.N. Iyengar 보안공학연구지원센터 2016 International Journal of Smart Home Vol.10 No.9
Cost effective and time saving solutions are available for all of our health concerns due to the rapid growth of Technology. But the rural areas of many countries continue to suffer due to the lack of good health services with doctors. Our model focuses on connecting the rural villages to quality doctors via cloud computing and wearable technology. The system could help to monitor and manage good health with doctor’s interaction in emergence. It’s a wearable jacket where health measuring sensors will be embedded. It sends all the vital stats in real time to the cloud where the authorised doctors can access the information after user’s request. The records contain the patient’s medical history. It’s a user-friendly application holding the whole database of the patients securely in the cloud with real time updates. Patients can refer to the available Doctor anytime for treatments and diagnosis. The system alerts to the nearest doctor in risk case. This system if is put in use at the rural areas then there will be much benefit to the rural people in their health concerns. They can lead a healthier and more independent lifes.
Junath Naseer,N. Ch. S. N. Iyengar,Mogan Kumar P.C 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.10
Distributed Denial of Service (DDoS) poses the highest rate of vulnerability to cloud computing in terms of availability with ability to destruct the Data-Center (DC) resources. The fortunate part of the attackers is these kinds of attacks are easier to launch the obscure flood towards victim DC and the unfortunate part of detection mechanism is to uncover the attack events and to protect the victim. In order to adapt and automate the detection mechanism in large scale network, agent based detection helps in improving the efficiency of detection. An increase in the network scale will also require the increase in agents deployed in the network to detect the vulnerability DDoS attack threats. This agent based DDoS Mechanism not only protects against huge DDoS flood, but also distinguishes the traffic characteristics by continuous traffic probing to classify the flash crowd traffic event and DDoS attack threat. Jade tool is used to simulate the experiment for our proposed detection scheme.