http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Ubiquitous Cloud Based Bookcafé
Imran Ahmed,Satish Janghel,N. Ch. S. N. Iyengar 보안공학연구지원센터 2014 International Journal of Database Theory and Appli Vol.7 No.6
Cloud services provide platform for multiple users to remotely store , share and update data items. Mobile virtual environment and effective use of cloud computing made this great success. . This paper is an implemented real time web and mobile application named BookCafé using cloud database storage (common for both web and mobile) provided by Amazon web service. BookCafé is a storage where all the books will be stored with year wise and subject wise classification for student’s purpose. Update’s can be done at any time. They can have like laptops, smart phones, and tablet computer devices. Users of Online web application (non smart) access through user interface for signing, reading and uploading new books category wise. By uploading the android application on Google Play store, smart phone users can avail all the facilities on their handheld devices. The students either through mobile (android based) or through web, share and upload new books from anywhere in the campus by connecting to cloud.
N. Ch. S. N. Iyengar,Gopinath Ganapathy 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.9
Cloud computing is an advantageous technology, which allows any enterprises to shift their data towards Cloud Service Provider (CSP) end. This shift poses an essential necessity for data being available all the time with a considerable level of security. Availability is an important concern for any subscribers as their sensitive data are prone to attack threats. Resource and data availability are most important security measure. So, blocking the attack traffic towards Data Center (DC) improves availability, but passive outwitting leads to high false positive and negative rate. This affects the legitimate requestors being outwitted. So, the proposed chaotic theory based defense mechanism considers the stability state of traffic and detects the anomaly traffic condition. The anomaly traffic condition is just the passive way of diminishing the effect of overload, but classifying them appropriately and allowing the non-attack case of overload improves the availability and utilization and reduces the false case rates. Considering several cases of overload threats and allowing the legitimate overload case improves efficiency. The simulation results proved that the mechanism proposed is deployable at an attack-prone DC for resource protection, which would eventually benefit the DC economically as well.
N. Ch. S. N. Iyengar,Gopinath Ganapathy 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7
Cloud computing is a technology which completely shifts the data to unaware Datacenter (DC) where the cloud service provider (CSP) is responsible for the subscribers’ data and its protection. Distributed Denial of Service (DDoS) is a kind of overload threat aims to subvert DC and their resources which leads to resource unavailable to legitimate requestors. In this paper we proposed an effective layered load balancing mechanism which scrutinizes the incoming requestors’ traffic at various layers and each layer outwits some kind of attack traffic. The early network traffic condition prediction paves the way to detect the threats earlier which in turn improves the availability. The significance of the proposed mechanism is detecting the higher rate of overload threats at earlier layers. Constant monitoring and stringent protocol setup for incoming traffic strengthens the proposed mechanism against several kinds of overload threats. Based on the traffic pattern of incoming requestors, the vulnerability is observed and outwitted at various layers. The simulation proved that the mechanism proposed is deployable at an attack-prone DC for resource protection, which would eventually benefit the DC economically as well.
Junath Naseer,N. Ch. S. N. Iyengar,Mogan Kumar P.C 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.10
Distributed Denial of Service (DDoS) poses the highest rate of vulnerability to cloud computing in terms of availability with ability to destruct the Data-Center (DC) resources. The fortunate part of the attackers is these kinds of attacks are easier to launch the obscure flood towards victim DC and the unfortunate part of detection mechanism is to uncover the attack events and to protect the victim. In order to adapt and automate the detection mechanism in large scale network, agent based detection helps in improving the efficiency of detection. An increase in the network scale will also require the increase in agents deployed in the network to detect the vulnerability DDoS attack threats. This agent based DDoS Mechanism not only protects against huge DDoS flood, but also distinguishes the traffic characteristics by continuous traffic probing to classify the flash crowd traffic event and DDoS attack threat. Jade tool is used to simulate the experiment for our proposed detection scheme.
Effort of Load Balancer to Achieve Green Cloud Computing : A Review
G.Siva Shanmugam,N.Ch.S. N. Iyengar 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.3
In a distributed system, from the starting days onwards distribution of load among servers becomes a serious problem in the commercial Internet. The problem in this scenario is? The entire single application oriented server has to engage the entire amount of traffic and if they went down, all commercial activities come down offline result out of business. Running individually the application server couldn’t support start-up budgets. The folks involved in the Web Commercial plan to solve this problem by distributing the load evenly to all the servers running on the web host owned by different agents or organizations; thus new scenario was born named as Load Balancing. In this treatise, we investigate several shapes attenuated by load Balancer and reviewed the algorithms proposed on load balancing. Here we took both static as well as dynamic based algorithms and their performances are formulated by comparison with all other existing scheme. This paper also brings connectivity on green computing with cloud load balancers. By cloud computing we can attain multi tenancy and dynamic resource handling which automatically reduces co2 emission from servers. Without the facility of sharing single resources among thousands of peoples, green computing is not possible. So the nature of cloud load balancer and green computing was illustrated here.
Promethean Fuzzy Model to Predict Diabetic Foot Ulcer
J.Jayashree,Nikhil Chaudhari,N.Ch.S.N. Iyengar 보안공학연구지원센터 2016 International Journal of Hybrid Information Techno Vol.9 No.11
One of the most serious complications of diabetes is Diabetic foot. The incidence of diabetic foot increases equally on a rise of diabetic's increases and it is often ignored by people leading to a rise in major amputations. Diabetic foot disease diagnosis is done by using fuzzy logic and beneficial as it incorporates the knowledge and experience of physician into fuzzy sets and rules. In this paper, we propose a fuzzy expert system framework for diabetic foot which constructs large scale knowledge based diabetic foot system. The knowledge is constructed by using the fuzzification. Fuzzy verdict mechanism uses triangular membership function with mamdanis inference. Defuzzification method is adopted to convert the fuzzy values into crisp values.
Junath Naseer Ahamed,N. Ch. S. N. Iyengar 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.8
Distributed Denial of Service (DDoS) attack becomes a serious hazard for cloud computing environments as they target the victim and completely suppress the Datacenter to serve for its legitimate clients.This work focus on analyzing the several works and suggesting the better approach to suit cloud environment to detect and to maintain better detection accuracy. Also we have made historical comparison of research works of DDoS mitigation schemes with respect to cloud computing environment. The comparison is also made on five existing research works and provided a summary of them which evaluates the detection accuracy of each work.
Shubham Kumar,Shivank Sharma,N. Ch. S. N. Iyengar 보안공학연구지원센터 2015 International Journal of Database Theory and Appli Vol.8 No.6
Six Degrees of Separation is a theory that has recently been popularized due to the emergence of various social networking platforms. This theory states that any two random people in the world can be associated with each other with no more than six intermediate links. Though this theory has not been verified yet it has a great potential for practical implementation. In this paper we use this theory to create an application which is going to help the user in finding other individuals who share some common links and can be of benefit to the user. This is achieved through maintaining a central database which contains the details of all the users using our application. A user can search for other people on our database based on certain parameters which would then display the resultant links between the user and the selected target. This establishing of links is achieved using two dimensional bi-direction search algorithm.