Paper Type | :: | Research Paper |
Title | :: | Analytical Study on Load Balancing Techniques in the Environment of Cloud Computing |
Country | :: | India |
Authors | :: | Mr. Ashish Dilip Musale || Dr. P.G.Khot |
Page No. | :: | 01-05 |
Keyword :Min-Min, Max-Min, Response time, Load Balancing, Batch mode scheduling, Immediate mode scheduling, Makespan, Minimum completion time, Minimum executiontime
Paper Type | :: | Research Paper |
Title | :: | Enhanced Quality of Service Parameters Help to Improve Performance of Hybrid Cloud Architecture |
Country | :: | India |
Authors | :: | Mrs. Snehal A.Narale || Dr. P.K.Butey |
Page No. | :: | 06-11 |
Cloud computing is an emerging technology which has been used for business as well as for education purpose. Cloud computing technology has advantages like agility, flexibility, scalability and quality of service. Quality of service parameter plays an important role to improve the performance of the architecture. In cloud computing due to the increasing use of cloud services, the quality of service (QoS) of cloud computing has become an important and essential issue. To improve the performance of the architecture various parameters of quality like availability, response time, processing time and execution time would enhanced. The performance of hybrid cloud is better than public and private cloud because hybrid cloud always gives optimized results. In this research paper performance of the hybrid.........
Keywords: cloud computing, QoS, hybrid cloud architecture, Availability, Response time
Paper Type | :: | Research Paper |
Title | :: | Knowledge Management: Current Scenario in Context of IT Students |
Country | :: | India |
Authors | :: | Preeti .S. Agrawal |
Page No. | :: | 12-15 |
The purpose of this paper is to provide the information on impact of various technologies available based on the application of knowledge management on IT students to enhance their study and career. Educational organizations are the main element of society for the constant source of knowledge. The role of knowledge management (KM) in the educational institutions is critical and important. KM is the application of systematic thinking. KM in educational group can be separately recognized and studied at administrative, research, education (teaching and learning processes). Knowledge assets are very important to all students as they play a major role in their study time.
Keywords: knowledge management, IT.
[1]. Alavi, M., Leidner, D.E.: Review: knowledge management and knowledge management systems: conceptual foundations and
research issues. MIS Quarterly, 25, 1 (2001), 107-136.
[2]. Dennis, A.R., Vessey, I.: Three knowledge management strategies: knowledge hierarchies, knowledge markets and knowledge
communities. MIS Quarterly Executive, 4, 4, (2005).
[3]. Schultze, U., Leidner, D.E.: Studying knowledge management in information systems research: discourses and theoretical
assumptions. MIS Quarterly, 26, 3, (2002), 213-242.
[4]. Jennex, M.E., Olfman, L.: A knowledge management success model: an extension of DeLone and McLean's IS success model. In
Proceedings of Ninth Americas Conference on Information Systems, (August 2003).
[5]. Zerega, Blaise. Art of knowledge management. InfoWorld, July 27, 1998, Vol. 20, No. 30, p. 61.
Paper Type | :: | Research Paper |
Title | :: | Spatial Technology for POI Cognition and Image Localization |
Country | :: | India |
Authors | :: | Priti S. Netam || Jagdish Pimple |
Page No. | :: | 16-19 |
In this paper location based information generation and sharing is considered which becomes increasingly more popular due to the explosive growth of internet capable and location aware mobile devices. The system consist of data collector, data contributor, location based service provider by using google maps and system users.The data collector gathers all the information from data contributor while user fire query to perform spatial top-k query which ask for POI in certain region & finding the highest k rating for interested POI attribute. In practice, LBSPs are untrusted and may return fake query results for various bad motives eg. In favor of POIs willing to pay. Three novel schemes are used for user to detect fake query result and moving top-k query result as push to cultivate the helpful arrangement and utilization of the projected framework. The affectivity and productivity of schemes area unit analyzed and evaluated.
Keywords: Location based service provider (LBSP), Point-of-interest (POI), Data collector and contributor.
[1]. R. Zhang, Y. Zhang, and C. Zhang, "Secure Top-k Query Processing via Untrusted Location-Based Service Providers," Proc. IEEE
INFOCOM '12, Mar. 2012.
[2]. H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "SybilGuard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 576-589, June 2008.
[3]. H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Networking, vol.18, no. 3, pp. 885-898, June 2010.
[4]. H. Hacig€um€us, S. Mehrotra, and B.
[5]. Iyer, "Providing Database as a Service," Proc. IEEE 18th Int'l Conf. Data Eng. (ICDE), Feb. 2002.
Paper Type | :: | Research Paper |
Title | :: | Positive and Negative Impact Social Networking Sites on the Adolescents |
Country | :: | India |
Authors | :: | Sandip.S.Gudelliwar || Dr. S. B. Kishor || Dr.S.K.Yadav |
Page No. | :: | 20-22 |
The study of this research to create awareness among the Adolescents for social networking sites but the statistics all tell the same story: Social media are gaining in popularity every day in the adolescent. Increase in spending time on social network it gives the positive and negative impact of social networking on Adolescents one study show that average spending time of Adolescents on social network..........
Keywords: Social networking, Facebook, Twitter, Internet. Adolescent
[1]. Kuppuswamy S, Narayan PB (2011) The impact of social networking websites on theeducation of youth
[2]. Jain MR, Anand N, Gupta P (2012) Impact of social networking sites in the changingmindset of youth on social issues- A study of
Delhi-NCR youth. Journal of Arts, Science & Commerce 3: 36-43.
[3]. Khan S (2011) Impact of social networking websites on students.Abasyn Journal of Social Sciences 5: 56-77.
[4]. Ahn J (2011)The effect of social networking sites on adolescents' social and academicdevelopment: Current theories and
controversies. Journal of the American Society for Information Science and Technology 62: 1435-1445.
[5]. Camilia ON, Ibrahim SD, Dalhatu BL (2013) The effects of social networking sites usageon the studies of Nigerian students. The
International Journal of Engineering and Science 2: 39-46.
[6]. Beres, D. (n.d.): 5 Weird Negative Effects of Social Media on Your Brain. Reader's Digest.
[7]. California Adolescent Health Collaborative. (2011, 8). Impact of Social Media on Adolescent Behavioral Health in
California phi.org.
Paper Type | :: | Research Paper |
Title | :: | Smart Restaurant Automation System |
Country | :: | India |
Authors | :: | Sandhya N. Dhage || Maheetkumar Palliwar || Shailvi Meshram |
Page No. | :: | 23-28 |
In the last years, the restaurant industry has lived through many changes. Anyway, an area was not improved since several decades. The main aim of the project is to provide automation in the restaurant by using QR Technology and Internet of Things to replace the traditional restaurant system in which there exist various people for doing different works. "Smart Restaurant Automation System" will accomplish the goal that only the administrator will be able to control the whole restaurant environment. The restaurant ordering system will be replaced with Wi-Fi Connectivity, QR Technology and Internet Portal by which the customer will not have to wait for the waiter to take orders. The restaurant will be equipped with LED Board at the administrator side which helps taking the order and providing with precise bill. The restaurant will also be equipped with Gas sensor for leakage detection, Voltage sensor to monitor daily voltage ratings and fluctuations and humidity sensor, which will help maintaining the room temperature accordingly.
Keywords- Restaurant automation, QR Code, Light Emitting Diode (LED), Wi-Fi connectivity.
[1]. Khairunnisa K., "The Application of Wireless Food Ordering System", MASAUM Journal of Computing, Volume 1 Issue 2,
September 2009.
[2]. N. M. Z. Hashim, "Smart Ordering System via Bluetooth", International Journal of Computer Trends and Technology (IJCTT),
Volume 4 Issue 7, 2013.
[3]. S. R. Patil, "e-converse An affordable touch screen solution to intrigue Dining experience", International Journal of Computer& Communication Technology ISSN (PRINT): 0975 -7449, Volume-6, Issue-2, 2017.
[4]. K. A. Wadile, "E- restaurant management system using robot", International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 6, February 2015 18th Edition, Page No: 1840-1847.
[5]. Ashwini Bankar, "Review paper on - Design of Intelligent Restaurant with a Touch Screen Based Menu", IOSR Journal of
Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 3 Ver. I (May –
Jun. 2015).
Paper Type | :: | Research Paper |
Title | :: | Computational Model for Document Classification Based on New Fuzzy Soft Distance |
Country | :: | India |
Authors | :: | Dr. Neeraj Sahu |
Page No. | :: | 29-34 |
In this paper, we introduced new fuzzy soft distance based document classification. The Fuzzy Soft Distance (FSD) is a powerful classification for Document classification. The different distance are based on Hamming distance, normalized Hamming distance, Euclidean distance, normalized Euclidean distance, Hausdorff metric, normalized hausdorff distance, generalized Hamming distance, generalized Euclidean distance and generalized hausdorff distance. An application of Fuzzy Soft distance is illustrated for the document classification. We use here MATLAB 7.14 software tools for calculating result analysis of efficiency and accuracy of document classification.
Keywords- Fuzzy sets, Soft sets, Fuzzy Soft sets, Document Classification, Fuzzy Soft Distance
[1]. L.A. Zadeh, ―Fuzzy Sets,‖ Inform. Control, vol. 8, pp.338–353, 1965.
[2]. D. Molodtsov, ―Soft set theory—first results,‖ Comput. Math. Appl, vol.37, pp. 19–31, 1999.
[3]. P.K. Maji, R. Biswas and A.R. Roy, ―Fuzzy soft sets,‖ J. Fuzzy Math. vol. 9, pp. 589–602, 2001.
[4]. P.K. Maji, R. Bismas and A.R. Roy, ―Soft set theory,‖ Comput. Math.Appl. vol.45. pp. 555–562, 2003.
[5]. D. Molodtsov, ―The Theory of Soft Sets,‖ URSS Publishers, Moscow, 2004.
Paper Type | :: | Research Paper |
Title | :: | Community Detection and Behaviour Study for Social Computing Using New Media Technology |
Country | :: | India |
Authors | :: | SharadSahu || Swatantra Kumar Sahu || Dr.Neeraj Sahu |
Page No. | :: | 35-41 |
This paper presents a computational model for community detection and behavior study for social computing with new media technology. The proposed numerical results analysis of social computing is based on computational model how make efficient and accurate use of new media technologies. In this paper, we have used accuracy calculations of new media technologies for social computing results. The experimental results are evaluated using the numerical computing MATLAB 7.14. The Experimental results show the proposed approach optimistic solution for business growth of media.
Keywords- Social Media, Data Mining, Community Detection, Behavior Prediction, New Media Technology
[1]. Andrus, D. Calvin (2005). "The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community." Studies in Intelligence,
49 (3, September).
[2]. Dearstyne, Bruce W (2007). "Blogs, Mashups, & Wikis: Oh, My!" Information Management Journal, 41 (4, Jul/Aug), 25-31.
[3]. Drury, Sarah. The History of New Media, 2003. Retrieved March 12, 2008 from http:// isc.temple.edu/ sdrury/survey2006/
timeline.html.
[4]. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. NYU Press, 2006.
[5]. Langfitt, Frank (2006, November 22). "Social Networking Technology Boosts Job Recruiting." NPR, Retrieved March 16, 2008
from http://www.npr.org/templates/story/story.php?storyId=6522523
Paper Type | :: | Research Paper |
Title | :: | Literature Review on Detection of Breast Cancer by Mammogram Interpretation Using CAD System |
Country | :: | India |
Authors | :: | Grace John M || Amresh Kumar |
Page No. | :: | 42-47 |
Breast cancer is one of the major causes of non-accidental death in women. Early diagnosis of the disease allows physician to administer suitable treatment, and can improve the patient's survival rate. Traditional diagnosis involves trained physicians to visually examine the medical images of breast for any signs of tumor development in the region. However due to the large scale of the medical image data, this manual diagnosis is often laborious and can be highly subjective due to inter-observer variability. Inspired by the advanced computing technology which is capable of performing complex image processing and machine learning, researches had been carried out in the past few decades to develop computer aided diagnosis (CAD) systems to assist clinicians detecting breast cancer.............
Keywords: CAD (Computer Aided Diagnosis) system, Classification, Feature extraction & selection, Mammogram, Preprocessing, Segmentation.
[1]. Chun-Chu Jen and Shyr-Shen Yu, ‚Automatic detection of abnormal mammogramsinmammographicimages‛,
ExpertSystemswithApplications,vol.42,pp.3048–3055,2015.
[2]. J.Dheeba, N.Albert Singh and S.Tamil Selvi, ‚Computer-aided detection of breast cancer on mammograms: A swarm
intelligence optimized wavelet neural network approach‛, Journal of Biomedical Informatics,
http://dx.doi.org/10.1016/j.jbi.2014.01.010 ,2014.
[3]. S.D. Tzikopoulos, M.E. Mavroforakis, H.V. Georgiou, N.Dimitropoulos and S.Theodoridis, ‚A fully automated scheme for
mammographic segmentation and classification based on breast density and asymmetry‛, computer methods and programs in
biomedicine , Elsevier,vol. 102 ,pp. 47–63,2010.
[4]. R. Llobeta, M.Pollánb, J. Antóna , .J. M Garcíad , M.Casalsd, I. Martínezd , F.R Peralesd , B.P Gómeza , D.S Trejod and
J.CCortés,
[5]. ‚Semi-automated and fully automated mammographic density measurement and breast cancer risk prediction‛,
Computer methods and programs in biomedicine, vol. 116,pp. 105–115, 2014.
Paper Type | :: | Research Paper |
Title | :: | Business Intelligence: Concepts, Components, Techniques and Benefits |
Country | :: | India |
Authors | :: | Prof. SudhirJuare |
Page No. | :: | 48-53 |
Business intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and analyzing business data, such as sales revenue by products and/or departments, or by associated costs and incomes. For companies maintaining direct contact with large numbers of customers, however, a growing number channel-oriented application (e.g. e-commerce support, call center support) create a new data management challenge: that is effective way of integrating enterprise applications in real time. To learn from the past and forecast the future, many companies are adopting Business Intelligence (BI) tools and systems. Companies have understood the importance of enforcing achievements of the goals defined by their business strategies through business intelligence concepts................
Keywords: business intelligence, data, support system.
[1]. Adelman Sid , Moss Larissa and Barbusinski Les. (2002) "I found several definitions of BI‟, DM Review. Retrieved 17 August
2002 from http://www.dmreview.com /article_sub.cfm?articleId=5700
[2]. Berson Alex, Smith Stephen and Thearling Kurt. (2002) "Building Data Mining Applications for CRM‟, Tata McGraw Hill
[3]. Cui, Z., Damiani, E. and Leida, M. (2007) "Benefits of Ontologies in Real Time Data Access‟, Digital Ecosystems and
Technologies Conference, DEST '07.pp. 392-397.
[4]. Curt Hall. (1999) "Data Warehousing for Business Intelligence‟.Retrieved 20 March 1999, from http:// www.cutter.com/
itreports/RP68E .pdf.
Paper Type | :: | Research Paper |
Title | :: | The Severe Effect of IoT Characteristics on Security and Privacy: Threats, Existing Solutions, and Challenges |
Country | :: | India |
Authors | :: | Prof. Manisha G. Gedam || Mr. Waibhav K. Deogade |
Page No. | :: | 54-62 |
IoT applications have been widely used in many fields of social production and social living such as healthcare, energy and industrial automation. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. Internet of Things (IoT) envisions everything in the physical world will be connected seamlessly and integrated securely through Internet infrastructure. When things react to environment or stimuli, data will be captured and transformed into valuable insights, which can be utilised in various application domains, ranging from automated home appliances, smart grids and high-resolution assets, to product management. Then, the security and privacy effects of IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.
Keywords: Internet-of-Things (IoT), IoT Characteristics, privacy, security, survey.
[1]. The Statistics Portal. (2017). Internet of Things (IoT) connected devices installed base worldwidefrom 2015 to 2025 (in billions).
[Online]. Available:https://www.statista.com/statistics/471264/iot-number-of-connected-dev ices-worldwide/
[2]. IDC. (2016). Internetof Things Market Statistics. [Online]. Available:
http://www.ironpaper.com/webintel/articles/internet-of-things-market-st atistics/
[3]. Bigthink Edge. (2016). Hacking the Human Heart [Online]. Available: http://bigthink.com/future-crimes/hacking-the-human-heart
[4]. Envista Forensics. (2015). The Most Hackable Cars on the Road. [Online].
Available: http://www.envistaforensics.com/news/the-most-hackable-cars-on-the-ro ad-1
[5]. Wikipedia. 2016 Dyn cyberattack. [Online].
Available: https://en.wikipedia.org/w/index.php?title=2016_Dyn_cyberattack&oldi d=763071700
Paper Type | :: | Research Paper |
Title | :: | Importance of Usefulness, Usability And Integrity Model for Cost–Benefit Analysis |
Country | :: | India |
Authors | :: | Dr. Kishor M. Dhole || Dr. Vinay Chavan || Dr.Parag R. Kaveri |
Page No. | :: | 63-66 |
This paper covers the Usefulness, Usability and Integrity (UUI) factor for information system. Which calculates Information Integrity (I*I) value in the context of Cost Benefit analysis for achieving high integrity of information in information system environment. This paper suggests reducing the high integrity risk value by calculating I*I index value. This paper imposes the usefulness, usability and integrity factor for competitive advantages in control environments. Its determinants are Accuracy, Correctness and Reliability of information improved the decision situation in Information System(IS).
Keywords: Usefulness, Usability and Integrity (UUI), Information Integrity ( I*I)
[1]. Dhole K.M., Chavan Vinay, "Crime proofing techniques in ICT and I*I attributes" IJARCCE, 2013,volume 2,index 3(22),
(print):2319-5940.
[2]. Dhole K.M.,Chavan Vinay, "Review of Information Integrity Problem" NCRAECS14,Shri. Shivaji Science College, National
Conference,Nagpur, 2014, 978-81-906457-5-1 .
[3]. Anders Tallberg, "An Economic Framework for Information Integrity", Library, Swedish School of Economics and Business
Administration, P.O. Box 479, 00101, Helsinki, Finland,2002.
[4]. Delone W.H., and McLean E.R., "Information Systems Success: The Quest for the Dependent Variable", Information Systems
Research3 (1), 2007.
[5]. Mandke V. V. and Nayar M.K., "Information Integrity Imperative for Competitive Advantage in Business Environment
characterized by Uncertainty", in InformationTechnology for Business Management, World Computer Congress, Beijing, China
2008, pp. 115-125.
Paper Type | :: | Research Paper |
Title | :: | An Overview of Energy-Efficient Cloud Data Centres |
Country | :: | India |
Authors | :: | Prof. Anupam Chaube |
Page No. | :: | 67-70 |
The designers of computing systems have interested on the improvements of computing performance that are driven by the demand of consumer, business, and scientific applications. However, further growth of computing performance has started to be limited due to the increasing energy consumption of cloud data centres as a result of carbon dioxide footprints and overwhelming electricity bills. Therefore, the designers of computing systems have started to improve the energy efficiency. In this study, we present an overview of energy efficient design of cloud virtualized data centres to guide future.
Keywords: cloud computing; energy consumption; data centre; virtualization
[1]. L. Barroso, "The Price of Performance, ACM Press, " Queue, vol. 3, no. 7, pp. 53, 2005.
[2]. W.D. Weber, X. Fan, L.A. Barroso, "Powering the data center," U.S. Patent No. 8,595,515. Washington, DC: U.S. Patent and
Trademark Office, 2013.
[3]. A. Beloglazov, R. Buyya, Y.C. Lee, A. Zomaya, "A taxonomy and survey of energy-efficient data centers and cloud computing
systems, " Advances in computers, vol. 82, no. 2, pp. 47-111, 2011.
[4]. R. Nathuji and K. Schwan, "VirtualPower: Coordinated power management in virtualized enterprise systems," ACM SIGOPS
Operating Systems Review, vol. 41(6), pp. 265–278, 2007.
[5]. R. Raghavendra, P. Ranganathan, V. Talwar, Z. Wang, and X. Zhu, "No "power" struggles: Coordinated multi-level power
management for the data center," SIGARCH Computer Architecture News, vol. 36, no. 1, pp. 48–59, 2008.
[6]. A. Verma, P. Ahuja, and A. Neogi, "pMapper: power and migration cost aware application placement in virtualized systems," in
Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware, pp. 243–264, 2008.
Paper Type | :: | Research Paper |
Title | :: | Artificial Intelligence System |
Country | :: | India |
Authors | :: | DevarshiAnantvijayPatrikar |
Page No. | :: | 71-73 |
The intelligence shown by artificial objects like machines/computer systems used in industries to make the work smartly is called Artificial Intelligence. The overall system is used to reduce manual efforts and get the things with accuracy and error free.While exploiting the power of the computer systems, the curiosity of human, lead him to wonder, "Can a machine think and behave like humans do?"Thus, the development of AI started with the intention of creating similar intelligence in machines that we find and regard high in humans.The terminology "Artificial Intelligence" was given by a Professor John McCarthy in 1956. However now-a-days, this is one of the major technology used in the industries.................
Keywords: Artificial Intelligence (AI).
[1]. Websites related to AI education and tutorials.
Paper Type | :: | Research Paper |
Title | :: | A Review of Multimodal Biometric Technology based on Fusion of Iris and Fingerprint Traitsfor Identification of Person |
Country | :: | India |
Authors | :: | A. A. Halder || Dr. S. R. Pande |
Page No. | :: | 74-77 |
Biometric features are widely used for unique identification of any person. Iris is considered as the most reliable feature for identification of an individual with greatest accuracy because iris is the most discriminatory of facial biometrics. It is also found that biometrics is combined with cryptography for security to the greater extent. For greater precision of security many researchers are mixing other biometrics and hence multimodal biometric system has come into existence. In multimodal biometrics one or more features are combined together and using feature extraction technique features are extracted and fused together thereafter these fused feature set is matched using various matching algorithm with the feature of the person who will be identified. This paper presents an insight on issues with the biometrics which may help the researchers and other organizations working on biometrics.
Keywords: Biometrics, Fusion, trait, gait, Multimodal, HDC, FRR
[1]. Gaurav Bhatnagar, Jonathan Wua, BalasubramanianRamanb (2012). Fractional dual tree complex wavelet transform and its
application to biometric security during communication and transmission. Future generation computer systems, 28,1,2012, p254-
267
[2]. R. ÁlvarezMariño, F. Hernández Álvarez, L. Hernández Encinas.(2012). A crypto-biometric scheme based on iris-templates with
fuzzyextractorse. Information Sciences, 195, p91-102.
[3]. Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, Javier Ortega-Garcia. (2013). Iris image reconstruction from
binary templates: An efficient probabilistic approach based on genetic algorithms. Computer Vision and Image Understanding, 117
(1), p1512-1525.
[4]. Farmanullah Jan, Imran Usman, Shahrukh Agha. (2012). Iris localization in frontal eye images for less constrained iris recognition
systems. Digital Signal Processing, 22 (1), p971-986.
[5]. Simona Crihalmeanu and Arun Ross. (2012). Multispectral sclera patterns for ocular biometric recognition. Pattern Recognition
Letters, 33(1), p1860-1869.
Paper Type | :: | Research Paper |
Title | :: | Exploring Integrity Management and Verification Techniques for Cloud Data Storage |
Country | :: | India |
Authors | :: | Ms. I. U. Wankhede || Dr. S. S. Sherekar || Dr. V. M. Thakare |
Page No. | :: | 78-82 |
Cloud Computing has emerged as a boosting technology for industries and communities all over the world. It has opened new vistas for researchers, developers, engineers and even common man. However, there are many issues which are yet to be addressed, most important of all, integrity and security management for cloud data storage. The Cloud Service Provider must perform a transparent role while keeping the user's data. It must provide some guarantee that the outsourced user data remains tamper proof. Various methods like Data Encryption, Auditing and Access control mechanisms have been proposed to maintain and check data integrity in cloud environment. Recently, Cloud Forensics has also gained importance as an integrity verification technique. The paper reviews few prominent data integrity management and verification techniques for cloud data storage. It explores the availability of integrity frameworks, protocols and tools applicable to the Cloud environment.
Keywords: Data Integrity, Cloud Data Storage, Auditing, Integrity Management
[1]. M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell and E. Dubois, "Security transparency: the next frontier for security research in the
cloud", Journal of Cloud Computing: Advances, Systems and Applications, Springer, June 2015
[2]. B. Wang, B. Li and H. Li, "Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud", IEEE Transactions on Cloud
Computing, Vol. 2, No. 1, pp. 43-56, 2014.
[3]. Y. Zhang, C. Xu, X. Liang, H. Li, Y. Mu and X. Zhang, "Efficient Public Verification of Data Integrity for Cloud Storage Systems
from Indistinguishability Obfuscation", IEEE Transactions on Information Forensics and Security, Vol. 12, No. 3, pp. 676-688,
March 2017
[4]. T. Jiang, X. Chen, and J. Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation", IEEE
Transactions on Computers, Vol. 65, No. 8, pp. 2363 – 2373, August 2015
[5]. P. Wen Chi and C. Lei, "Audit-Free Cloud Storage via Deniable Attribute based encryption", IEEE Transactions on Cloud
Computing, Vol. 6 , No. 2 , pp. 414 – 427, April 2015
Paper Type | :: | Research Paper |
Title | :: | A Study of Patient Monitoring System in Hospitals through RFID |
Country | :: | India |
Authors | :: | Saurabh Dadaji Gabhane || Ms. Bhagyashree Ambulkar |
Page No. | :: | 83-86 |
Radio Frequency Identification (RFID) has become popular from army to industry. RFID tags have been implanting into many various products, especially in organization part. A tag stores individual information of its fix object and an RFID reader reports with the tag in radio frequencies to determine the object. This object to be monitored may also be a human. In our use, RFID technology is applied in health care systems. The system carries wireless mobile communication between the reader and RFID tags. Each patient available in the system is wears a bracelet and built-in mobile united with a unique tag, and the readers are mobile PDA devices each including a wireless RFID reader card. The proposed system can be used to identify and monitor the patients.
Keywords:Security, Smart Monitoring, Smart Reader.
[1]. S.–W. Wang, W.–H. Chen, C.–S. Ong, L. Liu and Y.–W. Chuang, RFID Application in Hospitals: A Case Study on a
Demonstration RFID Project in a Taiwan Hospital, 39th Annual Hawaii International Conference on System Sciences 8, 2006.
[2]. http://en.wikipedia.org/wiki/Biometric passport, accessed on May, 2010.
[3]. S.–E. Sarma, S.–A. Weis and D.–W. Engels, RFID Systems and Security and Privacy Implications, LNCS 2523, 2002, pp. 454–
469.
[4]. C.–J. Li, L. Liu, S.–Z. Chen, C.–C. Wu, C.– H. Huang and X.–M. Chen, Mobile Healthcare Service System Using RFID,IEEE
International Conference on Networking, Sensing and Control 2, 2004, pp. 1014–1019.
[5]. http://www.rfidinhealthcare.org, accessed on May, 2010.
© 2019 All Rights Reserved | Design by iosrjen