Secure Transmission in Cooperative Relaying Networks With Multiple Antennas Abstract? The secrecy performance of dual-hop amplify-and-forward multi-antenna relaying systems over Rayleigh fading channels, considering the direct link between the source and the destination. In order to exploit the available direct link and the multiple antennas for secrecy improvement, different linear processing schemes at the relay…
R3E: Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud Abstract?Abstract By combining cloud computing and Peer-to-Peer computing, a P2P storage cloud can be formed to offer highly available storage services, lowering the economic cost by exploiting the storage space of participating users. However, since cloud severs and users are usually outside…
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks Abstract-Wireless network dynamically allocates channel resources to improve spectral efficiency and, to avoid collisions, has its users cooperate with each other using a medium access control (MAC) protocol. However, MAC assumes user compliance and can be detrimental when a user misbehaves. An attacker who compromised…
Securing Cloud Data under Key Exposure Abstract-Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker?s access to the ciphertext. This may be…
Securing Services in Networked Cloud Infrastructures Abstract?we propose techniques and architecture for securing services that are hosted in a multi-tenant networked cloud infrastructures. Our architecture is based on trusted virtual domains and takes into account both security policies of the tenant domains. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source…
Securing the Backpressure Algorithm for Wireless Networks Abstract-In the first place, the backpressure algorithm is known to provide throughput optimality in routing and scheduling decisions for multi-hop networks with dynamic traffic. The essential assumption in the backpressure algorithm is that all nodes are benign and obey the algorithm rules governing the information exchange and underlying…
Security Management System Abstract-In the first place, earlier days security guards used to store the data in the form of files, registers etc., which includes entirely manual operations. Due to this there were chances of misplacement or corruption of data and it is very hard to track thedata .Suppose crime or theft accrue means all…
Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution Abstract-In the first place, As both the scale of mobile networks and the population of mobile users keep increasing equally important, the applications of mobile social big data have emerged where mobile social users can use their mobile devices to exchange and share…
Security, Privacy, and Access Control in Information-Centric Networking: A Survey Abstract-Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet and mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents? origin. Content and client security, provenance, and identity privacy are…
SEDEX: Scalable Entity Preserving Data Exchange Abstract? Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. Generally, data exchange is performed using schema mapping, representing high level relations between source and target schemas. < final...
SEDEX: Scalable Entity Preserving Data Exchange Abstract? Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. Generally, data exchnge is performed using schema mapping, representing high level relations between source and target schemas. In this…
Self Security Through GPS Based Protection System Abstract? Self-security through GPS based protection system is a security application which is specially designed for mobile users especially for women. This application offers a helping hand with the help of GPS based location tracing. At the time of emergency there may not be any possibility to attempt…