SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 2, Issue 8 (August 2013), PP.28-33
www.irjes.com 28 | Page
Privacy and Authentication of Grid through Cryptography and
Virtual Organization
Dr. S.P.Rasal
Mudhoji College Phaltan,Satara,Maharashtra, India
Abstract:- The data grid which is shared in different environment will not have the security challenges. The
important hidden data(Such as banking) will reduces the data security in the environments. Here the different
approaches that provide security as key sharing to prevent from unauthorized access of users. In this paper we
present how the privacy and authentication of the grid through cryptographic system as encryption of the data
and by the virtual organization it stores the data in form of fragments. The paper describes how the data can be
secured in various organizations.
Index Terms:- Grid, Virtual Organization (VO), Cryptography.
I. INTRODUCTION
The main purpose of this project is to protect data in Grid Service. Which are faced while performing
in data storage and we propose a cryptographic and fragmentation able to fulfill the storage security
requirements related with a generic Data Grid scenario.
The Data Grid is a specific type of distributed system, where shared resources (processor or storage)
are provided in a volunteer fashion by the participants. These environments potentially provide commodity
resources not only for CPU-intensive tasks, but also for applications that require significant amounts of memory,
disk space and network through put.
Data Grid depends on a set of widely distributed and un trusted storage nodes, therefore offering no
guarantees about neither availability nor protection to the stored data. These security challenges must be
carefully managed before fully deploying Data Grids in sensitive environments. We propose a cryptographic
protocol able to fulfill the storage security requirements related with a generic Desktop Data Grid scenario,
which were identified after applying an analysis framework extended from our previous research on the Data
Grid’s storage services.
One of the challenges for biomedical application is to provide efficient high-level interfaces, depending
on the applications that enable access to Grids for non experts, ensuring transparent access to medical resources
through services compatible with medical practice. As part of the interfaces, a flexible architecture for the
management of the privacy of data is needed, compatible with medical practice and with preexisting Grid
security systems are complex enough to be considered an obstacle in the successful Grid adoption.
The main objectives of the paper:
1) Cryptography method to prevent security of the data from unauthorized users.
2) To provide long term storage of the data which is in encrypted form.
3) Provides the access control mechanism for encryption of the data based on keys in VO.
4) It can be applicable to all the various environments.
II. EXISTING SYSTEM
One of the challenges for biomedical application is to provide efficient high-level interfaces, depending
on the applications that enable access to Grids for non experts, ensuring transparent access to medical resources
through services compatible with medical practice. As part of the interfaces, a flexible architecture for the
management of the privacy of data is needed, compatible with medical practice and with preexisting Grid
security systems are complex enough to be considered an obstacle in the successful Grid adoption. And also for
the various organizations like government organization data in the existing system was not secure and there
was no absolute protection guarantee for stored data.
III. PROPOSED SYSTEM
The main objective of this paper is to provide Grid middleware’s such as TRENCADIS, with efficient
and reliable privacy protection for sensitive data. This paper presents a model for long-term storage and
management of encrypted data in distributed environments. Furthermore, the paper outlines how this model is
implemented to preserve the privacy of patient information or any various secure information of different
Privacy and Authentication of Grid through Cryptography and Virtual Organization
www.irjes.com 29 | Page
organization in Grid-based collaborative computational infrastructures for biomedical applications. This paper
delineates a dependable security framework in overextended to various organizations. Throughout the assembly
of this framework, organizations will encounter different degrees of data integrity and confidentiality.
IV. VIRTUAL ORGANIZATION
A virtual organization (VO) [1] is formed from different real entities (e.g., medical centers, hospitals,
governmental centers ) , and probably also from different communities (e.g., physicians and researchers working
in specific projects). Access to data is normally organized around VO membership.
Figure 1: Generic virtual organisation end-user scenario actions.[2]
The developed use cases were abstracted into the generic virtual organization end user scenario
presented in Fig. 1. Starting from available technologies, industry practices and trends, the project aim was to
create knowledge, infrastructure and toolkits that allow a broad transition of the industry towards semantic,
model based and ontology committed collaboration based on the grid technology (rather than the web, which is
the infrastructure technology of the SWOP project [3]).
V. TYPICAL VO LIFE CYCLE PHASES
Virtual organization is fast becoming preferred organizational form for one-of settings to deliver one-
of product and typically goes through four distinct lifecycle phases.
Figure 2: Typical virtual organization lifecycle [4].
Identification/conception typically begins upon a unique client need for a product/service that a single
organization cannot deliver and serves as a business opportunity for a set of organizations which will combine
competencies to deliver the product and/or service [4] that the client needs.
Privacy and Authentication of Grid through Cryptography and Virtual Organization
www.irjes.com 30 | Page
Formation/configuration focuses on the establishment of the VO in terms of role definitions, definition of
information flow mechanisms, identification of information exchange formats, interoperability of inter-
organizational tools, shared resource and services definition and configuration, etc.
Operation/collaboration is the main stage of a typical VO where different VO tasks are carried out in parallel
and/or in series based on task needs.
Termination/reconfiguration. When a[4] VO consortium completes the delivery of the required
product/service, it is terminated or reconfigured to form another VO (e.g. from a VO that develops a product to
a VO that provides maintenance or service for that product).
VI. TRENCADIS ARCHITECTURE
Towards a Grid Environment for Processing and Sharing TRENCADIS is a Service Oriented
Architecture (SOA) based in Grid Technologies, concretely in Open Grid Software Architecture [5] (OGSA).
This architecture defines five layers, from the lowest to the highest abstraction levels from the point of view of
the user. The components form the lowest layers (Infrastructure Layer), provide the functionalities (mainly share
and process) through Grid Services. The components located in the upper layers (Application Layer) provide
interfaces to the users through applications, which are developed on top of middleware components from the
middleware Components Layer. All components communicate using the protocols provided by the
Communication layer.
InTRENCADIS, the Key Sharing Service keeps the decryption key and provides to the authorized clients the
data needed to decrypt objects in a secure way; and the EOUID Generator Service produces valid EOUID for
new encrypted
Figure 3: General view of TRENCADIS Architecture.
The security features of the system is followed[6]:
1) Authentication and Service Access.
2) Management of VOs. Grid users are organized into VO groups.
3) Data privacy may be preserved even when data are stored on a remote location
VII. ENCRYPTION AND DECRYPTION OF DATA
The model requires a public key cryptographic algorithm to encrypt and decrypt the information object,
and 64-bit keys Data Encryption Standard (DES) [7] are used. Submitters of new/updated datasets utilize
separate keys for each object. Encryption and decryption operations took place on the client, preventing the
Privacy and Authentication of Grid through Cryptography and Virtual Organization
www.irjes.com 31 | Page
overload of application servers running the IOS. Given that the risk of attacks is higher in servers that share
multiple services (including public ones), and the impact could be higher since servers keep far more data than
clients, keeping unencrypted information out of the IOS not only improves performance, but also helps to
protect the information from unauthorized access from the Users.
Encrypted Object Unique Identifier (EOUID) that uniquely identifies the object in the Grid.
VIII. OPEN GRID SERVICES ARCHITECTURE
The Open Grid Services Architecture (OGSA) [8]describes an architecture for a service-oriented grid
computing environment for business and scientific use, developed within the Global Grid Forum (GGF). OGSA
is based on several other Web service technologies, notably WSDL and SOAP, [9]but it aims to be largely
agnostic in relation to the transport-level handling of data.
Briefly, OGSA is a distributed interaction and computing architecture based around services, assuring
interoperability on heterogeneous systems so that different types of resources can communicate and share
information. OGSA has been described as a refinement of the emerging Web Services architecture, specifically
designed to support Grid requirements. OGSA has been adopted as a grid architecture by a number of grid
projects including the Globus Alliance. Conceptually, OGSA was first suggested in a seminal paper by Ian
Foster called "The Physiology of the Grid", and later developed by GGF working groups which resulted in a
GGF information document, entitled The Open Grid Services Architecture, Version 1.5. The Global Grid Forum
continues to track Tier 1 use case scenarios used in the definition of the OGSA core services.
IX. FEATURES OF OGSA:
An architectural process in which the GGF's OGSA Working Group collects requirements and
maintains a set of informational documents that describe the architecture.
A set of normative specifications and profiles that document the precise requirements for a conforming
hardware or software component.
The OGSA Architecture [10]document describes an OGSA grid in terms of the following capabilities:
1) Infrastructure services.
2) Execution Management services.
3) Data services.
Fig 4: PROPESED SYSTEM ARCHITECTURE
Privacy and Authentication of Grid through Cryptography and Virtual Organization
www.irjes.com 32 | Page
VIRTUALORGANIZATION ARCHITECTURE:
Fig 5: Vo Architecture
FLOW DESIGN:
Fig 6: Flow Design
RESULTS:
Privacy and Authentication of Grid through Cryptography and Virtual Organization
www.irjes.com 33 | Page
USER LOGIN & AUTHENTICATION PROCESS
ONTOLOGY / GRID SERVER
VO GROUPS
X. CONCLUSION
This paper provides an approach of securing the data with protecting and controlling. The access to
the decryption keys. It restricts the unauthorized users to access the data in a EOUID server. In addition this
paper contributes to increasing the clarity of responsibilities and also to the creation of encryption and key
management policies and practices.
REFERENCES
[1] L. Skitał, R. Słota, D. Nikolow, and J. Kitowski, “Methodology for virtual organisation design and
management,” presented at the EGEEUser Forum,CERN, Geneva, Switzerland, Mar. 1–3, 2006.
[2] Semantic Grid Platform in Support of Engineering Virtual Organisations. Matevž Dolenc, Robert Klinc
and Žiga Turk.University of Ljubljana, Faculty of Civil and Geodetic Engineering,Jamova 2, SI-1000
Ljubljana, Slovenia Jan 2008
[3] Semantic Web-based Open engineering Platform (SWOP), http://www.swop-project.eu
[4] M. Hannus, “Guidelines for Virtual Organisations”, VOSTER Project Consortium,
http://cic.vtt.fi/projects/voster
[5] Open Grid Services Architecture (OGSA),http://www.globus.org/ogsa
[6] I. Blanquer, V. Hernández, D. Segrelles, E. Torres.Long-term storage and management of encrypted
biomedical data for real users in real organizations.
[7] William Stallings Cryptography and network security Third Edition.
[8] Towards Open Grid services Architecture. (2008). [Online]. Available:http:// www.globus.org/ogsa.
[9] The Web Services Resource Framework. (2008). [Online]. Available:http://www. globus.org/wsrf.
[10] Grid Security Infrastructure. (2008). [Online]. Available: http://www.globus.
org/security/overview.html.

Más contenido relacionado

La actualidad más candente

Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...hemanthbbc
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
Shared aythority ppt design [autosaved]
Shared  aythority  ppt design [autosaved]Shared  aythority  ppt design [autosaved]
Shared aythority ppt design [autosaved]Raj Kumar
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET Journal
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...I3E Technologies
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challengesijsptm
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 

La actualidad más candente (18)

Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Shared aythority ppt design [autosaved]
Shared  aythority  ppt design [autosaved]Shared  aythority  ppt design [autosaved]
Shared aythority ppt design [autosaved]
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 

Destacado

A220113
A220113A220113
A220113irjes
 
G224549
G224549G224549
G224549irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
G234353
G234353G234353
G234353irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 

Destacado (9)

A220113
A220113A220113
A220113
 
G224549
G224549G224549
G224549
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
G234353
G234353G234353
G234353
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 

Similar a International Refereed Journal of Engineering and Science (IRJES)

Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...ijtsrd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...IRJET Journal
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti
 

Similar a International Refereed Journal of Engineering and Science (IRJES) (20)

Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Design of access control framework for big data as a service platform
Design of access control framework for big data as a service platformDesign of access control framework for big data as a service platform
Design of access control framework for big data as a service platform
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
 

Más de irjes

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Carirjes
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimizationirjes
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughnessirjes
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsirjes
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model irjes
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Citiesirjes
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...irjes
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...irjes
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...irjes
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intentirjes
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...irjes
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Ageirjes
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armorirjes
 

Más de irjes (20)

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

International Refereed Journal of Engineering and Science (IRJES)

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 8 (August 2013), PP.28-33 www.irjes.com 28 | Page Privacy and Authentication of Grid through Cryptography and Virtual Organization Dr. S.P.Rasal Mudhoji College Phaltan,Satara,Maharashtra, India Abstract:- The data grid which is shared in different environment will not have the security challenges. The important hidden data(Such as banking) will reduces the data security in the environments. Here the different approaches that provide security as key sharing to prevent from unauthorized access of users. In this paper we present how the privacy and authentication of the grid through cryptographic system as encryption of the data and by the virtual organization it stores the data in form of fragments. The paper describes how the data can be secured in various organizations. Index Terms:- Grid, Virtual Organization (VO), Cryptography. I. INTRODUCTION The main purpose of this project is to protect data in Grid Service. Which are faced while performing in data storage and we propose a cryptographic and fragmentation able to fulfill the storage security requirements related with a generic Data Grid scenario. The Data Grid is a specific type of distributed system, where shared resources (processor or storage) are provided in a volunteer fashion by the participants. These environments potentially provide commodity resources not only for CPU-intensive tasks, but also for applications that require significant amounts of memory, disk space and network through put. Data Grid depends on a set of widely distributed and un trusted storage nodes, therefore offering no guarantees about neither availability nor protection to the stored data. These security challenges must be carefully managed before fully deploying Data Grids in sensitive environments. We propose a cryptographic protocol able to fulfill the storage security requirements related with a generic Desktop Data Grid scenario, which were identified after applying an analysis framework extended from our previous research on the Data Grid’s storage services. One of the challenges for biomedical application is to provide efficient high-level interfaces, depending on the applications that enable access to Grids for non experts, ensuring transparent access to medical resources through services compatible with medical practice. As part of the interfaces, a flexible architecture for the management of the privacy of data is needed, compatible with medical practice and with preexisting Grid security systems are complex enough to be considered an obstacle in the successful Grid adoption. The main objectives of the paper: 1) Cryptography method to prevent security of the data from unauthorized users. 2) To provide long term storage of the data which is in encrypted form. 3) Provides the access control mechanism for encryption of the data based on keys in VO. 4) It can be applicable to all the various environments. II. EXISTING SYSTEM One of the challenges for biomedical application is to provide efficient high-level interfaces, depending on the applications that enable access to Grids for non experts, ensuring transparent access to medical resources through services compatible with medical practice. As part of the interfaces, a flexible architecture for the management of the privacy of data is needed, compatible with medical practice and with preexisting Grid security systems are complex enough to be considered an obstacle in the successful Grid adoption. And also for the various organizations like government organization data in the existing system was not secure and there was no absolute protection guarantee for stored data. III. PROPOSED SYSTEM The main objective of this paper is to provide Grid middleware’s such as TRENCADIS, with efficient and reliable privacy protection for sensitive data. This paper presents a model for long-term storage and management of encrypted data in distributed environments. Furthermore, the paper outlines how this model is implemented to preserve the privacy of patient information or any various secure information of different
  • 2. Privacy and Authentication of Grid through Cryptography and Virtual Organization www.irjes.com 29 | Page organization in Grid-based collaborative computational infrastructures for biomedical applications. This paper delineates a dependable security framework in overextended to various organizations. Throughout the assembly of this framework, organizations will encounter different degrees of data integrity and confidentiality. IV. VIRTUAL ORGANIZATION A virtual organization (VO) [1] is formed from different real entities (e.g., medical centers, hospitals, governmental centers ) , and probably also from different communities (e.g., physicians and researchers working in specific projects). Access to data is normally organized around VO membership. Figure 1: Generic virtual organisation end-user scenario actions.[2] The developed use cases were abstracted into the generic virtual organization end user scenario presented in Fig. 1. Starting from available technologies, industry practices and trends, the project aim was to create knowledge, infrastructure and toolkits that allow a broad transition of the industry towards semantic, model based and ontology committed collaboration based on the grid technology (rather than the web, which is the infrastructure technology of the SWOP project [3]). V. TYPICAL VO LIFE CYCLE PHASES Virtual organization is fast becoming preferred organizational form for one-of settings to deliver one- of product and typically goes through four distinct lifecycle phases. Figure 2: Typical virtual organization lifecycle [4]. Identification/conception typically begins upon a unique client need for a product/service that a single organization cannot deliver and serves as a business opportunity for a set of organizations which will combine competencies to deliver the product and/or service [4] that the client needs.
  • 3. Privacy and Authentication of Grid through Cryptography and Virtual Organization www.irjes.com 30 | Page Formation/configuration focuses on the establishment of the VO in terms of role definitions, definition of information flow mechanisms, identification of information exchange formats, interoperability of inter- organizational tools, shared resource and services definition and configuration, etc. Operation/collaboration is the main stage of a typical VO where different VO tasks are carried out in parallel and/or in series based on task needs. Termination/reconfiguration. When a[4] VO consortium completes the delivery of the required product/service, it is terminated or reconfigured to form another VO (e.g. from a VO that develops a product to a VO that provides maintenance or service for that product). VI. TRENCADIS ARCHITECTURE Towards a Grid Environment for Processing and Sharing TRENCADIS is a Service Oriented Architecture (SOA) based in Grid Technologies, concretely in Open Grid Software Architecture [5] (OGSA). This architecture defines five layers, from the lowest to the highest abstraction levels from the point of view of the user. The components form the lowest layers (Infrastructure Layer), provide the functionalities (mainly share and process) through Grid Services. The components located in the upper layers (Application Layer) provide interfaces to the users through applications, which are developed on top of middleware components from the middleware Components Layer. All components communicate using the protocols provided by the Communication layer. InTRENCADIS, the Key Sharing Service keeps the decryption key and provides to the authorized clients the data needed to decrypt objects in a secure way; and the EOUID Generator Service produces valid EOUID for new encrypted Figure 3: General view of TRENCADIS Architecture. The security features of the system is followed[6]: 1) Authentication and Service Access. 2) Management of VOs. Grid users are organized into VO groups. 3) Data privacy may be preserved even when data are stored on a remote location VII. ENCRYPTION AND DECRYPTION OF DATA The model requires a public key cryptographic algorithm to encrypt and decrypt the information object, and 64-bit keys Data Encryption Standard (DES) [7] are used. Submitters of new/updated datasets utilize separate keys for each object. Encryption and decryption operations took place on the client, preventing the
  • 4. Privacy and Authentication of Grid through Cryptography and Virtual Organization www.irjes.com 31 | Page overload of application servers running the IOS. Given that the risk of attacks is higher in servers that share multiple services (including public ones), and the impact could be higher since servers keep far more data than clients, keeping unencrypted information out of the IOS not only improves performance, but also helps to protect the information from unauthorized access from the Users. Encrypted Object Unique Identifier (EOUID) that uniquely identifies the object in the Grid. VIII. OPEN GRID SERVICES ARCHITECTURE The Open Grid Services Architecture (OGSA) [8]describes an architecture for a service-oriented grid computing environment for business and scientific use, developed within the Global Grid Forum (GGF). OGSA is based on several other Web service technologies, notably WSDL and SOAP, [9]but it aims to be largely agnostic in relation to the transport-level handling of data. Briefly, OGSA is a distributed interaction and computing architecture based around services, assuring interoperability on heterogeneous systems so that different types of resources can communicate and share information. OGSA has been described as a refinement of the emerging Web Services architecture, specifically designed to support Grid requirements. OGSA has been adopted as a grid architecture by a number of grid projects including the Globus Alliance. Conceptually, OGSA was first suggested in a seminal paper by Ian Foster called "The Physiology of the Grid", and later developed by GGF working groups which resulted in a GGF information document, entitled The Open Grid Services Architecture, Version 1.5. The Global Grid Forum continues to track Tier 1 use case scenarios used in the definition of the OGSA core services. IX. FEATURES OF OGSA: An architectural process in which the GGF's OGSA Working Group collects requirements and maintains a set of informational documents that describe the architecture. A set of normative specifications and profiles that document the precise requirements for a conforming hardware or software component. The OGSA Architecture [10]document describes an OGSA grid in terms of the following capabilities: 1) Infrastructure services. 2) Execution Management services. 3) Data services. Fig 4: PROPESED SYSTEM ARCHITECTURE
  • 5. Privacy and Authentication of Grid through Cryptography and Virtual Organization www.irjes.com 32 | Page VIRTUALORGANIZATION ARCHITECTURE: Fig 5: Vo Architecture FLOW DESIGN: Fig 6: Flow Design RESULTS:
  • 6. Privacy and Authentication of Grid through Cryptography and Virtual Organization www.irjes.com 33 | Page USER LOGIN & AUTHENTICATION PROCESS ONTOLOGY / GRID SERVER VO GROUPS X. CONCLUSION This paper provides an approach of securing the data with protecting and controlling. The access to the decryption keys. It restricts the unauthorized users to access the data in a EOUID server. In addition this paper contributes to increasing the clarity of responsibilities and also to the creation of encryption and key management policies and practices. REFERENCES [1] L. Skitał, R. Słota, D. Nikolow, and J. Kitowski, “Methodology for virtual organisation design and management,” presented at the EGEEUser Forum,CERN, Geneva, Switzerland, Mar. 1–3, 2006. [2] Semantic Grid Platform in Support of Engineering Virtual Organisations. Matevž Dolenc, Robert Klinc and Žiga Turk.University of Ljubljana, Faculty of Civil and Geodetic Engineering,Jamova 2, SI-1000 Ljubljana, Slovenia Jan 2008 [3] Semantic Web-based Open engineering Platform (SWOP), http://www.swop-project.eu [4] M. Hannus, “Guidelines for Virtual Organisations”, VOSTER Project Consortium, http://cic.vtt.fi/projects/voster [5] Open Grid Services Architecture (OGSA),http://www.globus.org/ogsa [6] I. Blanquer, V. Hernández, D. Segrelles, E. Torres.Long-term storage and management of encrypted biomedical data for real users in real organizations. [7] William Stallings Cryptography and network security Third Edition. [8] Towards Open Grid services Architecture. (2008). [Online]. Available:http:// www.globus.org/ogsa. [9] The Web Services Resource Framework. (2008). [Online]. Available:http://www. globus.org/wsrf. [10] Grid Security Infrastructure. (2008). [Online]. Available: http://www.globus. org/security/overview.html.