Paper Type :: Research Paper
Title :: Numerical Analysis for Rate of Heat Transfer and Optimal Dimensions of a Circular Fin with Hyperbolic Profiles
Country :: India
Authors :: S.Ravi Kumar
Page No. :: 01-08
:: XXXX
:: XXXX
:: XXXX

The present article deals a solution to the problem of circular fin with hyperbolic profile numerically using a C programme. A fin with this type of geometry resembles the optimal circular fin of convex parabolic profile, which delivers the maximum heat transfer for a given volume of material. The circular fin of hyperbolic profile is governed by a two-term differential equation of second order with one variable coefficient which, via a transformation can be converted into a Bessel equation. Unlike adopting the conventional Bessel's functions, the present paper discusses an easy alternative to solve the problem by using finite difference techniques for a preliminary solution which is further refined using numerical programming in C. In this method as the interval size is decreased, the solution to the problem approaches............

[1]. Abdul Aziz, Optimum dimensions of extended surfaces operating in a convective environment, Appl. Mech. Rev. Vol 45 (5), pp155–173, 1992.
[2]. W.H. Carrier, S.W. Anderson, The resistances to heat flow through finned tubing, Heat Piping Air Cond.Vol 10 pp304–320, 1944.
[3]. A.Guvenc, H.Yuncu, An experimental investigations on performance of fins in a vertical base in free convection heat transfer, Heat and mass transfer, pp409-416,2001,
[4]. M.K.Jain and S.K Iyengar, A text book on Numerical methods for scientific and engineering computations, New age international publishers, 2003.
[5]. A.D. Kraus J.R. Welty, Extended surface heat transfer, Wiley, New York, 2000.


Paper Type :: Research Paper
Title :: Stakeholder Perception Of Limitations Of Environmental Conditions In The Project In Bromo Tengger Semeru National Park (Tnbts)
Country :: Indonesia
Authors :: Wahyudi || Agus Suharyanto || Eva Arifi
Page No. :: 09-13
:: XXXX
:: XXXX
:: XXXX

The area of BromoTenggerSemeru National Park (TNBTS) is one of the natural resource conservation areas located in East Java. Natural conditions in the TNBTS area are different from others, because the area is a plateau consisting of the Tengger mountain complex in the north and the Jambangan Mountain complex in the south. The access that must be passed to reach the area is very difficult due to the steep road and very far from the city center. These problems become obstacles for stakeholders when implementing development in the TNBTS area. Limited environmental conditions in the TNBTS area will affect the availability of project resources. The method used in solving the problem is the Importance Performance Analysis (IPA).Based on the results of the calculation of the IPA method there are 25 items in quadrant I, in Quadrant II there are 14 items that must be maintained, quadrant III is as many as 3 items, quadrant IV consists of 4 items.

Keywords: Project Performance, IPA, TNBTS, Natural Conditions.

[1]. Irianie. Analisis Pengaruh Ketersediaan Sumber DayaTerhadap Kinerja Kontraktor DalamPelaksanaan Proyek Konstruksi (Studi Kasus Proyek Di Kabupaten Kapuas). Universitas Lambung Mangkurat. 2009: 1(1).
[2]. Khasani. Evaluasi Kepuasan Pelanggan Terhadap KinerjaManajemen Proyek Kontraktor Besar Bangunan Gedung.Pascasarjana Universitas Diponegoro. Semarang. 2013.
[3]. Mangare. Kajian Proporsional Model Sumber Daya Pada Proyek Konstruksi Gedung . Junal Ilmiah Media Engineering. 2012: 2 (3).
[4]. Priana., Carlo., Yulius. Analisis Faktor-Faktor Yang Mempengaruhi Kinerja Mutu Pada Proyek Konstruksi Gedung Di Kota Padang Panjang. Pascasarjanah Universitas Bung Hatta. 2012.
[5]. Sobirin. Kinerja Proyek Konstruksi Bangunan Gedung Di Pengaruhi Oleh Beberapa Faktor Seperti Sumber Daya Manusia , Sumber Daya Alat Dan Sumber Daya Material.Teknik Utama. 2016:11 (2).


Paper Type :: Research Paper
Title :: Emotion Extraction Using Ensemble Classification Model In Data Mining
Country :: India
Authors :: Gaurav Bhagat || Prince Verma Sir
Page No. :: 14-22
:: XXXX
:: XXXX
:: XXXX

In past few years, a major growth has been seen in platforms of social media. People disseminate opinions, information, behavior, and announcements via social media. They share lot regarding them and their experiences. They frequently share regarding their feelings. This provides information wealth in real-time, regarding emotional state of communities or individuals. There is explosion of interaction on social media. People use Twitter to exchange experience, opinions, and feelings. This huge amount of data can provide important information for mental health research. In this paper, extraction of emotions from the text posted on social media using data mining techniques.

Keywords: Emotion mining, social media, data mining, tweets, ensemble learning.

[1]. Mitra, Sushmita, Sankar K. Pal, and PabitraMitra. 2002. Data mining in soft computing framework: a survey. IEEE transactions on neural networks. 13(1): 3-14.
[2]. Mohamed Yassine and Hazem Hajj. 2010. A Framework for Emotion Mining from Text in Online Social Networks. IEEE International Conference on Data Mining Workshops.
[3]. Jiang, Dandan. 2017. Sentiment Computing for the News Event Based on the Social Media Big Data. IEEE Access 5: 2373-2382.


Paper Type :: Research Paper
Title :: Analysis Of Present Commercial Packages Applied On Fresh Vegetables
Country :: China
Authors :: Yanjie Li || Yutaka Ishikawa || Kitazawa Hiroaki || Xiangyou Wang || Shudong Ding
Page No. :: 23-26
:: XXXX
:: XXXX
:: XXXX

Modified atmosphere packaging (MAP) which modifies the O2 and CO2 concentrations in the packages could prolong the shelf life of fresh produce [1]. Desired MAP is achieved through the interaction between two processes: the respiration of produce and the transfer of gases through the packaging material [2,3,4]. The suitable in-package atmosphere could prolong the shelf life of the fresh product. In present market, the plastic films are common used to package the fresh product. But whether they are suitable to the product or whether the atmospheres inside the packages could be modified by the interaction of gas permeability of the film and respiration rate of product is still unknown.

[1]. McLaughlin, C. P. & D. O'Beirne (1999) Respiration Rate of a Dry Coleslaw Mix Affected by Storage Temperature and Respiratory Gas Concentrations. Journal of Food Science, 64, 116-119.
[2]. Mahajan, P. V., F. A. R. Oliveira, J. C. Montanez & J. Frias (2007) Development of user-friendly software for design of modified atmosphere packaging for fresh and fresh-cut produce, Innovative Food Science& Emerging Technologies, 8, 84-92.
[3]. Caleb, O. J., P. V. Mahajan, U. L. Opara & C. R. Witthuhn (2012) Modelling the respiration rates of pomegranate fruit and arils, Postharvest Biology and Technology, 64, 49-54.
[4]. Fonseca, S. C., F. A. R. Oliveira & J. K. Brecht (2002a) Modelling respiration rate of fresh fruits and vegetables for modified atmosphere packages: a review, Journal of Food Engineering, 52, 99-119.
[5]. Bower, J. H., J. J. Jobling, B. D. Patterson & D. J. Ryan (1998) A method for measuring the respiration rate and respiratory quotient of detached plant tissues, Postharvest Biology and Technology, 13, 263-270.


Paper Type :: Research Paper
Title :: Segmentation Of The Coronary Artery Region In The Cardiac Mri Images Using Fuzzy C-Means Model
Country :: India
Authors :: Dadala Mahanthi Vigna Priya || Lavanya Itta
Page No. :: 27-32
:: XXXX
:: XXXX
:: XXXX

Image segmentation plays an important role in computer vision and image analysis. The segmentation results can be used to identify regions of interest and objects in the scene. That too, in the field of medical imagery, cardiac is the most complex organ in the human body and is susceptible to various
pathologies. Cardiac magnetic resonance (CMR) is a widely accepted imaging modality for detecting a disease of cardiac structures images which is prone to noise, varying anatomical structures, on-homogeneity, volumetric data and sometimes deviation. So, the accurate segmentation of cardiac structures and substructures is a very tedious task. The fuzzy c-means (FCM) algorithm is one of the most used techniques for image segmentation.............

Keywords :Clustering Image Segmentation Technique, Medical Image Segmentation, Fuzzy C means algorithm, Marker based Segmentation Technique.

[1]. Krinidis, S. and Chatzis, V. (2010). A robust fuzzy local information c-means clustering algorithm. Image Processing, IEEE Transactions on, 19(5), 1328-1337.
[2]. Yang, F. and T. Jiang (2003). Pixon-based image segmentation with Markov random fields. Image Processing, IEEE Transactions on 12(12), 1552-1559.
[3]. M. S. I. A. H. and Balafar, M. O. L. O. D. (2008). New multi-scale medical image segmentation based on fuzzy c-mean (FCM). In Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA. IEEE Conference, 66-70. Banik, S., Rangayyan, R. M. and Boag, G. S. (2009). Landmarking and segmentation of 3D CT images. Synthesis lectures on biomedical engineering, 4 (1), 1-170.
[4]. Beevi, S. Z., Sathik, M. M. and Senthamaraikannan, K. (2010). A robust fuzzy clustering technique with spatial neighborhood information for effective medical image segmentation. arXiv preprint arXiv:1004.1679.


Paper Type :: Research Paper
Title :: Practical Implementation Of UPQC Under Non-Linear Loading Condition
Country :: India
Authors :: Ragini Singh Thakur || Amrita Kranti Mishra
Page No. :: 33-41
:: XXXX
:: XXXX
:: XXXX

Non-linear load adversely affect the voltage stability of the distribution system. If not checked at time the generated harmonics may propagate further and can severely damage the supply system. Non-linearity of load generates harmonics which if not filtered out may damage the connected equipments. In this paper dual compensation based unified power quality conditioner has been proposed to rule out the harmonics of the system. The controller is designed using sinusoidal current as well as voltage source converter which take care of both voltage as well as current control. The steady state error is removed using PI controller.

[1]. Vinod Khadkikar, Member, IEEE, and Ambrish Chandra "UPQC-S: A Novel Concept of Simultaneous Voltage Sag/Swell and Load Reactive Power Compensations Utilizing Series Inverter of UPQC". IEEE Transactions On Power Electronics, Vol. 26, NO. 9, SEPTEMBER 2011.
[2]. Vinod Khadkikar "Enhancing Electric Power Quality Using UPQC: A Comprehensive Overview". IEEE Transactions On Power Electronics, VOL. 27, NO. 5, MAY 2012.
[3]. D. C. Bhonsle, R. B. Kelkar, "Design and Simulation of Single Phase Shunt Active Power Filter", 2011 International Conference on Recent Advancements in Electrical, Electronics and Control Engineering.
[4]. Mahesh Singh and Vaibhav Tiwari, "Modeling analysis and solution of Power Quality Problems", http://eeeic.org/proc/papers/50.pdf.
[5]. R.N.Bhargavi, "Power Quality Improvement Using Interline Unified Power Quality Conditioner", 10th International Conference on Environment and Electrical Engineering (EEEIC), Page(s): 1 - 5, 2011.


Paper Type :: Research Paper
Title :: A Effective Disease Prediction Model Using Enhanced Principle Component Analysis And Mdrp Algorithm
Country :: India
Authors :: Deepthi krishnan. K || Senthil Kumar. B
Page No. :: 42-49
:: XXXX
:: XXXX
:: XXXX

The rapid growth of data in biomedical and healthcare community's data analysis plays an important role. In recent scenario, health issues are huge, due to this nature predicting and classifying into different conditions are very tedious. The field of data mining has involved in those domains to predict and to classify the abnormality along with its risk level. The previous studies have used several features to Disease Prediction, which has been collected from patients. By applying different data mining algorithms, the patient data can be used for Disease Prediction.............

Keywords - Big data analytics, Machine Learning, Healthcare, Disease Detection, Medical Data Analytics.

[1]. Ayon Dey, Jyoti Singh, Neeta Singh. ―Analysis Of Supervised Machine Learning Algorithms For Heart Disease Prediction With The Reduced Number Of Attributes Using Principal Component Analysis‖. International Journal Of Computer Applications (0975 – 8887) Volume 140 – No.2, April 2016.
[2]. Nagamani T, Gokul Rajhen V, Deventheran B. ―A Survey Lying On Disease Prediction From Healthcare Communities Over Big Data‖. Ciit International Journal Data Mining And Knowledge Engineering, 2018.
[3]. Shakuntala Jatav And Vivek Sharma. ―An Algorithm For Predictive Data Mining Approach In The Medical Diagnosis‖. International Journal Of Computer Science & Information Technology (Ijcsit) Vol 10, No 1, February 2018.
[4]. Suresh P And 2m Ananda Raj D. ―Study Of Prediction And Analysis Of Prediction Model For Heart Disease: An Optimization Approach Using The Effective Genetic Algorithm‖. International Journal Of Pure And Applied Mathematics Volume 119 No. 16, 5323-5336, 2018.


Paper Type :: Research Paper
Title :: Attribute–Based Multiple User Authentication And Anonymous Data Sharing Scheme Revisited In Cloud Computing
Country :: India
Authors :: D. Shilpa || Dr. Rajendra Kumar Ganiya
Page No. :: 50-56
:: XXXX
:: XXXX
:: XXXX

Data sharing has never been simpler with the advances of cloud computing, and a precise investigation on the mutual data gives a variety of advantages to both the general public and people. Data sharing with countless must consider a few issues, including productivity, data respectability and security of data proprietor. Ring mark is a promising possibility to build a mysterious and bona fide data sharing framework. It enables a data proprietor to namelessly validate his data which can be put into the cloud for storage or investigation reason. However the exorbitant declaration confirmation in the conventional open key base setting turns into a bottleneck for this answer for be adaptable.............

Keywords- Access control, Key dissemination, Cloud computing, aggregate sharing, privacy preservation, shared authority, AES Algorithm.

[1]. J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang. A secure cloud computing based framework for big data information management of smart grid. IEEE Transactions on Cloud Computing, 3(2):233– 244,2015.
[2]. K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, Y. Yu, and A. Yang. A secure and expressive ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generation Computer Systems, 52(C):95–108, 2015.
[3]. K. Liang, L. Fang, D. S. Wong, and W. Susilo. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience, 27(8):2004–2027, 2015.
[4]. K. Liang, J. K. Liu, R. Lu, and D. S. Wong. Privacy concerns for photo sharing in online social networks. IEEE Internet Computing, 19(2):58– 63, 2015


Paper Type :: Research Paper
Title :: A Survey on Performance Improvement of Cluster-Based Routing Protocol in Vanet
Country :: India
Authors :: Jisha. K
Page No. :: 57-63
:: XXXX
:: XXXX
:: XXXX

VANET is one of the networks most used for a vehicle. wVANET means Vehicular Ad-hoc Networks. It has received the considerable attention in recent years, a reason to its characteristics, which are different from MANET (Mobile Ad-hoc Networks) such as (i) rapid topology change, (ii) frequent link failure, (iii) high vehicle mobility. The VANETs network considers one drawback is network instability, it reduces the network efficiency. So the concept has overcome the drawback by using three algorithms namely, (a) Cluster-Based Life-Time Routing (CBLTR) protocol, (b) Intersection Dynamic VANET Routing (IDVR) protocol, (c) Control Overhead Reduction Algorithm (CORA). The first algorithm CBLTR protocols main goal is to increase the route stability and increase average throughput in a bidirectional segment scenario.............

Keywords- VANET, MANET, ICH, CH, IDVR, grid topology, AODV, lifetime, CBLTR, CBR, SCSR, CORA, CMHELLO message, CHADS message, control overhead, CM, SDN.

[1]. M. Hari Prasad, P. Kowsalya. "Performance Enhancement of VANETs Using Cluster-Based Routing". Vol. 3, Issue 5, May 2014.
[2]. Seyed Kazem Jahanbakhsh, Marzieh Hajhosseini. "Improving Performance of Cluster-Based Routing Protocol using Cross-Layer Design".
[3]. Mazen Alowish, Yasuhiro Takano, Yoshiaki Shiraishi, Masakatu Morii. "Performance Evaluation of a Cluster-Based Routing Protocol for VANETs". Vol.12, No. 2, February 2017.
[4]. P F Zhao, K Liu, Y Zhang, T Zhang, F Liu. "A Clustering-Based Fast and Stable Routing Protocol for Vehicular Ad Hoc Networks". [2018]
[5]. Xiang Ji, Huiqun Yu, Guisheng Fan, Huaiying Sun, Liqiong Chen. "Efficient and Reliable Cluster-Based Data Transmission for Vehicular Ad Hoc Networks". July, 2018.


Paper Type :: Research Paper
Title :: Development of a New Model for Oil and Gas Production Prediction
Country :: Nigeria
Authors :: E. Stewart || E. O. Ehirim
Page No. :: 64-70
:: XXXX
:: XXXX
:: XXXX

A mathematical model (ANIWART_EHIRIMMODEL) based on Production Index has been developed for the prediction of oil and gas production in a single well and total reservoir.This equation can be used by Petroleum Engineers to estimate initial hydrocarbon in place, hydrocarbon reserves at some abandonment conditions, forecasting future production rate and prediction of reservoir performance. The accuracy of such prediction however, depends on the originality and quality of data and procedure used for analysis. Arps equation,which still remains the most widely used method of analysis, observed exponential, harmonic and hyperbolic forms of decline. In real analysis, the exponential decline is used and its results are extrapolated to hyperbolic decline.............

Keywords- Hydrocarbon reservoir, production prediction, and model.

[1]. Dake, L.P., The practice of reservoir engineering( Elsevier Amsterdam 2001).
[2]. Tarek, A., Reservoir Engineering handbook, Gulf professional publishing, 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK, ISBN 13:978-0-7506-7972-5, Third Edition, 2006. Page 1235-1262
[3]. Obah, B., Aniefiok, L., and Ezugwu, C.: Simplified Models for forecasting oil production: Niger Delta Oil Rim reservoir case, Published in: Petroleum Technology Development Journal (ISSN 1595-9104) An international journal. July 2012-Vol 2-No 2
[4]. Khaled, A. F.:Predicting Production Performance Using a Simplified Model, Production Technology-World Oil, April, 2006
[5]. Arps, J.J., Analysis of decline curves, Trans AIME., 1945 Volume 160, page 228-231.


Paper Type :: Research Paper
Title :: A Secure Outsourced Encryption Based Access Control Model for Cloud Based Services
Country :: India
Authors :: Karem Swathi || M Chandrasekhar varma
Page No. :: 71-76
:: XXXX
:: XXXX
:: XXXX

With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection (PS-ACS). In the PS-ACS scheme, we divide users into private domain (PRD) and public domain (PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption (KAE) and the Improved Attribute-based Signature (IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute- based encryption (CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.

Keywords- Privacy control Access, Cloud Computing, Security framework.

[1]. S. Yu, C. Wang, K. Ren, "Achieving secure, scalable, and fine-grained data access control in cloud computing," Proc. IEEE INFOCOM, pp. 1-9, 2010.
[2]. J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-policy attribute-based encryption," Proc. Security and Privacy, pp. 321-334, 2007.
[3]. J. Hur, D.K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions.
[4]. A. Lewko, B. Waters, "Decentralizing attribute-Based encryption," Proc. Advances in Cryptology-EUROCRYPT, pp. 568-588, 2011.
[5]. M. Li, S. Yu, Y. Zheng, "Scalable and secure sharing of personal health records in cloud computing using attribute-Based Encryption," IEEE Transactions on Parallel and Distributed System, vol. 24, no. 1, pp. 131- 143, 2013.


Paper Type :: Research Paper
Title :: Design and Implementation of 2.5D Shooting Game using Unity
Country :: South korea
Authors :: Chunghyun Lee || Hyunsun Kim || Jaemin Jeong || Gangwuk Lee || Eunju Park || Hankyu Lim
Page No. :: 77-83
:: XXXX
:: XXXX
:: XXXX

People enjoy game as one of their leisure activities these days. Currently, a number of commercialized game engines are being developed and used. Among them, the Unity that uses C#, which creates no cost of use and has easy accessibility, is receiving a lot of attention and admiration from developers thanks to its advantage of low entry barrier, compared to the Unreal. The number of games that use the Unity is increasing. This paper designed and created a shooting game that many people can easily enjoy playing for stress relief using the Unity that has many advantages.

Keywords- Web Contents, Unity, Shooting Game, HCI, UI Design.

[1]. Heonsik Joo, A Study on RPG Game Background Contents Producing Process, Journal of Korean Society for Computer Game, 27(1), 2014, 111-118.
[2]. Jinwoo Oh, 3D Game Graphic Design -Study the future of gaming technology through the development process of the graphic-, Graduate School of Paichai University,Daejeon, Korea, 2012.
[3]. Chihyung Lee and Seongwon Park, Qualitative Research on Continuous Usage Intention of Mobile Social Network Game, Journal of Korean Society for Computer Game, 26(4), 2013, 105-110.
[4]. Y.S. Kang, Y.S. Ho, 3D Image Capturing and 3D Content Generation for Realistic Broadcasting, Smart Media Journal, 1(1), 2012, 10-16.
[5]. Sungsu Kim, User-Interface Development Research using Unity 3D in Practice, Graduate School of Paichai University, Daejeon, Korea, 2014.


Paper Type :: Research Paper
Title :: Enabling Clinical Health Information Exchange in Cloud Storage using CDA
Country :: India
Authors :: T Jaya Sridevi || G E Sastry || M Shyam Kumar
Page No. :: 84-88
:: XXXX
:: XXXX
:: XXXX

These days modern Health Information Exchange (HIE) should be homogeneous for interoperable health information exchange between clinics. In this paper, to guarantee interoperability, CDA (Clinical Document Architecture) report age and incorporation benefit has been given. Interoperability between doctor's facilities not just aides in enhancing tolerant wellbeing and nature of consideration yet additionally consolidate time and assets spent on information design transformation. The methodology to be conveyed for guaranteeing interoperability has empowered to create CDA documents in open API benefit that depends on distributed computing so that the healing centers can helpfully produce CDA documents. After CDA archive age, with individual to CDA record incorporation system coordinates various CDA documents and make them to peruse in sequential request. With the presence of this administration, it ends up pointless for healing facilities to prepare their work force to create, incorporate, and see standard-consistent CDA documents.

Keywords- Clinical Document Architecture (CDA), Electronic Health Record (EHR). CDA, cloud computing.

[1]. CDA Generation and Integration for Health Information Exchange Based on CloudComputing SystemSung-Hyun Lee, Joon Hyun Song, and Il Kon KimIEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 9, NO. 2, MARCH/APRIL 2016.
[2]. Mr. AmitavMahapatra, Mr. Manoranjan Dash, ―Design and Implementation of a Cloud based TeleDermatology System‖ International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 2, February- 2013
[3]. J. D. D'Amore, D. F. Sittig, A. Wright, M. S. Iyengar, and R. B. Ness, ―The promise of the CCD: Challenges and opportunity for quality improvement and population health,‖ in Proc. AMIA Annu. Symp.Proc., pp. 285–294, 2011.
[4]. Sung-KyunLee,Joon Hyun Song,and I1 Kon Kim,‖ CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System‖
[5]. R. H. Dolin, L. Alschuler, C. Beebe, P. V. Biron, S. L. Boyer,D. Essin, E. Kimbers, T. Lincoln, and J. E. Mattison, ―The HL7 Clinical Document Architecture,‖ J. Am. Med. Inform. Assoc., vol. 8, pp. 552– 569, 2001.


Paper Type :: Research Paper
Title :: Secure Authenticated Storage Outsourcing Scheme with Secure Accessibility in Cloud Computing
Country :: India
Authors :: Bhasuru Kishore Kumar || Dr.B.Giridhar || R.V.L.S.N.Sastry
Page No. :: 89-94
:: XXXX
:: XXXX
:: XXXX

Cloud has been around for two decades and it comprises of the huge measure of data from everywhere throughout the world. A large percentage of the general population at an individual dimension and association level have moved their data to the cloud and offer data over all around the globe. The fundamental test looked by everybody is to share the data everywhere throughout the world or at authoritative dimension safely without giving endlessly the imperative data to any exploiters. To beat the test to share the data safely over the cloud, a productive data encryption calculation for scrambling data before sending it to the cloud. In this proposed we are utilizing a mix of Attribute-Based Encryption and Byte Rotation Encryption Algorithm for scrambling the data previously sending it to the cloud. This will push the client to safely store and offer the data in encoded frame.

Keywords- Cloud computing, Mobile Cloud Computing, Privacy, Security, issues in Mobile Cloud Computing.

[1]. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Ruixuan Li, Member, IEEE, Chenglin Shen, Heng He, Zhiyong Xu, and Cheng-Zhong Xu, Member, IEEE.
[2]. A. Agarwal, S. Siddharth, and P. Bansal. "Evolution of cloud computing and related security concerns," Symposium on Colossal Data Analysis and Networking, pp. 1-9, IEEE, 2016.
[3]. Y. Ren, J. Xu1, J. Wang, and J.U Kim, "Designated-Verifier Provable Data Possession in Public Cloud Storage," International Journal of Security and Its Applications , Vol. 7, No. 6 , pp.11-20, 2013.
[4]. J. Wei, W. Liu, X. Hu, " Secure data sharing in cloud computing using revocable-storage identitybased encryption," IEEE Transactions on Cloud Computing, 2016, Mar 23.
[5]. J. Hong , K, Xue, Y, Xue, W, Chen, DS, Wei , N, Yu, P, Hong, "TAFC: Time and attribute factors combined access control for time-sensitive data in public cloud," IEEE Transactions on Services Computing, 2017 Mar 14.