Monday, March 22, 2021

project2021

 

project2021

Submit the following details in the comment column

1.Register Number

2. Name of the student  
3. Class 

13 comments:

  1. 1.Register number: B8S18113
    2.Name :M.Balamurugan
    3.class :Bca final year(F.N)


    Project title: PROVIDING END TO END SECURE COMMUNICATION IN WIRELESS SENSOR NETWORK


    Abstract:In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack.

    ReplyDelete
    Replies
    1. What are the optimum protocol parameters

      Delete
    2. The optimal testing protocol would obtain a valid RIT result within a clinically viable timeframe, while maintaining sensitivity to disease progression.

      Delete
  2. Reg no : B8S18138
    Name : vetrivel v
    Class : BCA 3RD YEAR

    Abstract:Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. The earliest IFC models targeted security in a centralised environment, but decentralised forms of IFC have been designed and implemented, often within academic research projects. As a result, there is potential for decentralised IFC to achieve better cloud security than is available today. In this paper we describe the properties of cloud computing-Platform-as-a-Service clouds in particular-and review a range of IFC models and implementations to identify opportunities for using IFC within a cloud computing context. Since IFC security is linked to the data that it protects, both tenants and providers of cloud services can agree on security policy, in a manner that does not require them to understand and rely on the particulars of the cloud software stack in order to effect enforcement.

    ReplyDelete
  3. Reg no:B8S18217
    Name: P. Hariprasath
    Class: BSC Computer Science 3rd year

    Abstract:"Spy mail communication in It industry"is the process of following path and function performed by receiver on the received mail.it basically allows the sender to be aware of where, when and how this mail reaches the client and what the receiver does with this mail. many Existing mail clients provide very fundamental features such as Reading . forwading,moving,deleting,etc. But most of them do not provide a proof for having read the mail,security features such as block forwarding, retracting; block printing and saving etc. The aforementioned issues are resolved by this multi-functional email tracking system.
    The development of this system serves the secured way of mailing. The tracking and notification feature is aimed at providing a proof of reading mail which hardley any mail services provides. The notification messages can be sent to either sender's mail Id or if given to the sender's mobile phone. The retractable mails are aimed at providing a means by which sender can delete a particular mail even after sending it. This is used when a person sends a mail to wrong mail id . The block backup feature provides a means of preventing printing, saving and copying the mail contents. This can be used for secured mail that are not intended for manipulation . Then self destructible mail is also a similar security add-on, but in a different context. this feature aims at preventing achieving of the mails in the receivers mailbox folders. Finally the block forwarding feature is a worthy alternative for mail encryption. Encryption is mainly done to prevent acess form undesired users. In the same way this feature prevents unintended users from viewing the mail. The working style of the whole system is abstract to the end user and provides a feature rich secured way of mailing

    ReplyDelete
  4. 1.RegNo:B8S18556
    2.Name:B.Aakash
    3.Class:B.Sc(IT)3rd Year
    Project Title:Geographical Dispersion Healthcare Maintainece
    Front End:Asp. Net
    Back End:MySql
    Abstract:contemporary trends in health care services provision tend towards increased use of community based healthcare centres. This study on the concept of healthcare provision hypothesizes that in the future the main source of healthcare services will be a network of community based clinics which will be responsible for the majority of primary and ambulatory care.this concept implies that a network of community clinics equpited with state of that telemedicine will be established with a wide geographical dispersion.The Implications for healthcare facilities in terms of the resources and performance of the built environment are investigated by reference to the israeli healthcare system.this paper reflects the results of research on healthcare facility management over the past 10 years.comparision of the performance and maintenance of hospital facility and community clinics reveals that the maintenance and performance of clinics facilities have the potential to combine improved healthcare facility services with cost-effective facility management and maintenance.

    ReplyDelete
  5. Reg.No b8s19016
    Name k.muthukumar (After noon)
    Class bsc computer science 3 rd year

    ReplyDelete
  6. Reg.No: B8S19033
    Name: R.prince
    Class: B.Sc Computer science 3 year

    ReplyDelete
  7. Reg.no:B8S18576
    NAME:R.RAHUL
    CLASS:B.SC INFORMATION TECHNOLOGY 3RD YEAR

    E-VOTING THROUGH BIOMETRICS

    ReplyDelete
  8. Register number:B8S18918
    Name:P.Kiran
    Class:BCA 3 YEAR(Afternoon)
    Title: Towards secure and dependable storage services in cloud computing
    Abstract:Cloud storage enables users to remotely store their data and enjoy the on-
    demand high quality cloud applications without the burden of local hardware and
    software management. Though the benefits are clear, such a service is also
    relinquishing users' physical possession of their outsourced data, which inevitably poses
    new security risks toward the correctness of the data in cloud. In order to address this
    new problem and further achieve a secure and dependable cloud storage service, we
    propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing
    the homomorphic token and distributed erasure-coded data. The proposed design
    allows users to audit the cloud storage with very lightweight communication and
    computation cost. The auditing result not only ensures strong cloud storage correctness
    guarantee, but also simultaneously achieves fast data error localization, i.e., the
    identification of misbehaving server. Considering the cloud data are dynamic in nature,
    the proposed design further supports secure and efficient dynamic operations on
    outsourced data, including block modification, deletion, and append. Analysis shows the
    proposed scheme is highly efficient and resilient against Byzantine failure, malicious
    data modification attack, and even server colluding attacks.

    ReplyDelete
  9. This comment has been removed by the author.

    ReplyDelete
  10. This comment has been removed by the author.

    ReplyDelete
  11. Reg no:B8E10010
    Name :C.Praveenkumar
    Class :MCA final year

    Project Title:Decentralized Access control with Anonymous Authentication of data stored in clouds.


    Front end:C#.NET
    Back end :MS SQL

    ReplyDelete