Thursday 15 January 2015

EXPERT DISCOVERY AND INTERACTION IN MIXED SERVICE-ORIENTED SYSTEM



S.Devika 1,V.Geetha 2
1PG Student STET Women’s college, mannargudi.
2Professor of CS department, STET Women’s college, mannargudi.
                A Web service is a method of communication between two electronic devices over a network. It is a software function provided at a network address over the Web with the service always on as in the concept of utility computing. The W3C Web Services Architecture Working Group defined a Web Services Architecture, requiring a specific implementation of a "Web service". To support complex interaction scenarios, we introduce a mixed service-oriented system composed of both human-provided and Software-Based Services (SBSs) interacting to perform joint activities or to solve emerging problems. All the same competencies of people evolve over time, thereby requiring approaches for the automated management of actor skills, reputation, and trust. Identify the right actor in mixed service-oriented systems is challenging due to scale and temporary nature of collaborations. In this paper present addressing the need for flexible involvement of experts and knowledge workers in distributed collaborations. Disagree that the automated inference of trust between members is a key factor for successful collaborations. Rather than the following a security perspective on trust, focus on dynamic trust in collaborative network. Human-Provided Services Web is evolving rapidly by allowing people to publish information and services. At the heart of this trend, interactions become increasingly complex and dynamic spanning both humans and software services.From this contributions center around a context-sensitive trust-based algorithm called Expert HITS inspired by the concept of hubs and authorities in web-based environments
Share:

A STOCHASTIC MODEL TO IMPROVING PERFORMANCE AND QOS IN IAAS CLOUD SYSTEMS



S.Pavithra, K.Savima

1PG Student STET Women’s college, mannargudi.
2Professor of IT department, STET Women’s college, mannargudi.


Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to the federation with other clouds. Performance evaluation of Cloud Computing infrastructures is required to predict and quantify the cost-benefit of a strategy portfolio and the corresponding Quality of Service (QoS) experienced by users. Such analyses are not feasible by simulation or on-the-field experimentation, due to the great number of parameters that have to be investigated. In this paper, we present an analytical model, based on Stochastic Reward Nets (SRNs), that is both scalable to model systems composed of thousands of resources and flexible to represent different policies and cloud-specific strategies. Several performance metrics are defined and evaluated to analyze the behavior of a Cloud data center: utilization, availability, waiting time, and responsiveness. A resiliency analysis is also provided to take into account load bursts. Finally, a general approach is presented that, starting from the concept of system capacity, can help system managers to opportunely set the data center parameters under different working conditions. Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to the federation with other clouds. Performance evaluation of Cloud Computing infrastructures is required to predict and quantify the cost-benefit of a strategy portfolio and the corresponding Quality of Service (QoS) experienced by users. Analyses are not feasible by simulation or on-the-field experimentation, due to the great number of parameters that have to be investigated. An analytical model, based on Stochastic Reward Nets (SRNs), that is both scalable to model systems composed of thousands of resources and flexible to represent different policies and cloud-specific strategies. Several performance metrics are defined and evaluated to analyze the behavior of a Cloud data center: utilization, availability, waiting time, and responsiveness. A resiliency analysis is also provided to take into account load bursts.  A general approach is presented that, starting from the concept of system capacity to help system managers opportunely set the data center parameters under different working conditions.
Share:

EXPRESSIVE, EFFICIENT AND REVOCABLE DATA ACCESS SECURITY CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE



S.Monika, K.Savima
1PG Student STET Women’s college, mannargudi
2Professor of IT department, STET Women’s college, mannargudi

Privacy, trust and access control are some of the security concepts in the Cloud systems. Access control is of vital importance in a Cloud environment since it is concerned with allowing a user to access a number of Cloud resources. The data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. It is important to protect the data and privacy of users. Cipher text-Policy Attribute based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. It is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem.  Design an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there The Authority in CP-ABE scheme is responsible for attribute management and key are multiple authorities co-exist and each authority is able to issue attributes independently. The Authority in CP-ABE scheme is responsible for attribute management and key distribution. Propose a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques to design the data access control scheme. Attribute revocation method can efficiently achieve both forward security and backward security. The analysis and simulation results show that the proposed data access control scheme is secure in the random model and is more efficient.
Share:

SECURING SERVER BROKER LESS PUBLISH/SUBSCRIBE USING ID BASED ENCRYPTION




E.Deepika,V.Geetha

1PG Student STET Women’s college, mannargudi
2Professor of CS department, STET Women’s college, mannargudi


The publish/subscribe (pub/sub) communication paradigm has gained high popularity because of its inherent decoupling of publishers from subscribers inters of time, space, and synchronization. Publishers inject information into the pub/sub system, and subscribers specify the events of interest by means of subscriptions. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paper presents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. The authentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based cryptography mechanisms, to the needs of a publish/subscribe system. Furthermore, an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality. In addition to our previous work this paper contributes use of searchable encryption to enable efficient routing of encrypted events, multi credential routing a new event dissemination strategy to strengthen the weak subscription confidentiality, and  thorough analysis of different attacks on subscription confidentiality. The overall approach provides fine-grained key management and the cost for encryption, decryption, and routing is in the order of subscribed attributes. Moreover, the evaluations show that providing security is affordable throughput of the proposed cryptographic primitives, and  delays incurred during the construction of the publish/subscribe overlay and the event dissemination.
Share:

A STUDY ON RELIABLE SERVICE THAT ENABLING SECURING SERVICE ORIENTED MOBILE SOCIAL NETWORK



P.Abirami, R.BhuvanaPriya

1PG Student STET Women’s college, mannargudi
2Professor of CS department, STET Women’s college, mannargudi

A Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users’ reviews about its services without requiring any third trusted authority. The service reviews can then be made available to interested users in making wise service selection decisions. Identify three unique service review attacks, i.e., link ability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks.  The basic TSE (bTSE) enables users to distributed and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two typical Sybil attacks.In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Through security Analysis and numerical results, that the bTSE and the SrTSE effectively resist the Service review attacks and the SrTSE additionally detect the Sybil attacks in an efficient manner. Through performance evaluation, the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation
Share: