-
Preserving privacy for secure and outsourcing for Linear Programming in cloud computing
Authors:
G. Vidhisha,
C. Surekha,
S. Sanjeeva Rayudu,
U. Seshadri
Abstract:
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. we utilize the public key based homomorphism authen…
▽ More
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. we utilize the public key based homomorphism authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while kee** all above requirements in mind. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously along with investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.
△ Less
Submitted 7 November, 2012;
originally announced November 2012.
-
Modelling Dead Rocking In Online Multiplayer Games
Authors:
MD Sirajul Huque,
C Surekha,
A Kishore Kumar,
Sri Latha
Abstract:
This is the web based application, here we analysis the network traffic which occurs when the player plays an online game. Here we are going to trace the current position of the player to rectify the traffic while playing the game. There are different types of measures for different applications, those can be normalized and compared with one another but my application can resolve the inconsistency…
▽ More
This is the web based application, here we analysis the network traffic which occurs when the player plays an online game. Here we are going to trace the current position of the player to rectify the traffic while playing the game. There are different types of measures for different applications, those can be normalized and compared with one another but my application can resolve the inconsistency by knowing the positions quickly and focus on quality of network (QON) which affects a player to leave the game in middle because of poor quality of service (QOS). The existing model leads to leave the game because of network loss from both sides. The proposed model can resolve this problem by applying the replacement of TCP along with the dejitter buffer (DB) it can reduce the network loss and by applying the DEAD RECKONING (DR) vector we can recover the network access because it can view the current position of the player through this we can rectify why the player leaving the game and checks the network conditions and try to reactive the game by using mobile devices automatically or else they receive the message according to the network conditions.
△ Less
Submitted 19 August, 2012;
originally announced August 2012.
-
The Common Difference Between MIMO With Other Antennas
Authors:
M. D. Sirajul Huque,
C. Surekha,
S. Pavan Kumar Reddy,
Vidhisha Yadav
Abstract:
In past 802.11 systems there is a single Radio Frequency (RF) chain on the Wi-Fi device. Multiple antennas use the same hardware to process the radio signal. So only one antenna can transmit or receive at a time as all radio signals need to go through the single RF chain. In MIMO there can be a separate RF chain for each antenna allowing multiple RF chains to coexist. MIMO technology has attracted…
▽ More
In past 802.11 systems there is a single Radio Frequency (RF) chain on the Wi-Fi device. Multiple antennas use the same hardware to process the radio signal. So only one antenna can transmit or receive at a time as all radio signals need to go through the single RF chain. In MIMO there can be a separate RF chain for each antenna allowing multiple RF chains to coexist. MIMO technology has attracted attention in wireless communications, because it offers significant increases in data throughput and link range without additional bandwidth or increased transmit power. It achieves this goal by spreading the same total transmit power over the antennas to achieve an array gain that improves the spectral efficiency (more bits per second per hertz of bandwidth) or to achieve a diversity gain that improves the link reliability. Multiple Input/Multiple Output (MIMO) is an area of intense development in the wireless industry because it delivers profound gains in range, throughput and reliability. As a result, manufacturers of wireless local area network (WLAN), wireless metropolitan area network (WMAN), and mobile phone equipment are embracing MIMO technology. In this paper we are interested to compare the MIMO Antenna functions with traditional Antenna functions. And we take an example of IRT for illustration.
△ Less
Submitted 19 August, 2012; v1 submitted 3 July, 2012;
originally announced July 2012.