1.Register number: B8S18113 2.Name :M.Balamurugan 3.class :Bca final year(F.N)
Project title: PROVIDING END TO END SECURE COMMUNICATION IN WIRELESS SENSOR NETWORK
Abstract:In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack.
The optimal testing protocol would obtain a valid RIT result within a clinically viable timeframe, while maintaining sensitivity to disease progression.
Reg no : B8S18138 Name : vetrivel v Class : BCA 3RD YEAR
Abstract:Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. The earliest IFC models targeted security in a centralised environment, but decentralised forms of IFC have been designed and implemented, often within academic research projects. As a result, there is potential for decentralised IFC to achieve better cloud security than is available today. In this paper we describe the properties of cloud computing-Platform-as-a-Service clouds in particular-and review a range of IFC models and implementations to identify opportunities for using IFC within a cloud computing context. Since IFC security is linked to the data that it protects, both tenants and providers of cloud services can agree on security policy, in a manner that does not require them to understand and rely on the particulars of the cloud software stack in order to effect enforcement.
Reg no:B8S18217 Name: P. Hariprasath Class: BSC Computer Science 3rd year
Abstract:"Spy mail communication in It industry"is the process of following path and function performed by receiver on the received mail.it basically allows the sender to be aware of where, when and how this mail reaches the client and what the receiver does with this mail. many Existing mail clients provide very fundamental features such as Reading . forwading,moving,deleting,etc. But most of them do not provide a proof for having read the mail,security features such as block forwarding, retracting; block printing and saving etc. The aforementioned issues are resolved by this multi-functional email tracking system. The development of this system serves the secured way of mailing. The tracking and notification feature is aimed at providing a proof of reading mail which hardley any mail services provides. The notification messages can be sent to either sender's mail Id or if given to the sender's mobile phone. The retractable mails are aimed at providing a means by which sender can delete a particular mail even after sending it. This is used when a person sends a mail to wrong mail id . The block backup feature provides a means of preventing printing, saving and copying the mail contents. This can be used for secured mail that are not intended for manipulation . Then self destructible mail is also a similar security add-on, but in a different context. this feature aims at preventing achieving of the mails in the receivers mailbox folders. Finally the block forwarding feature is a worthy alternative for mail encryption. Encryption is mainly done to prevent acess form undesired users. In the same way this feature prevents unintended users from viewing the mail. The working style of the whole system is abstract to the end user and provides a feature rich secured way of mailing
1.RegNo:B8S18556 2.Name:B.Aakash 3.Class:B.Sc(IT)3rd Year Project Title:Geographical Dispersion Healthcare Maintainece Front End:Asp. Net Back End:MySql Abstract:contemporary trends in health care services provision tend towards increased use of community based healthcare centres. This study on the concept of healthcare provision hypothesizes that in the future the main source of healthcare services will be a network of community based clinics which will be responsible for the majority of primary and ambulatory care.this concept implies that a network of community clinics equpited with state of that telemedicine will be established with a wide geographical dispersion.The Implications for healthcare facilities in terms of the resources and performance of the built environment are investigated by reference to the israeli healthcare system.this paper reflects the results of research on healthcare facility management over the past 10 years.comparision of the performance and maintenance of hospital facility and community clinics reveals that the maintenance and performance of clinics facilities have the potential to combine improved healthcare facility services with cost-effective facility management and maintenance.
Register number:B8S18918 Name:P.Kiran Class:BCA 3 YEAR(Afternoon) Title: Towards secure and dependable storage services in cloud computing Abstract:Cloud storage enables users to remotely store their data and enjoy the on- demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
1.Register number: B8S18113
ReplyDelete2.Name :M.Balamurugan
3.class :Bca final year(F.N)
Project title: PROVIDING END TO END SECURE COMMUNICATION IN WIRELESS SENSOR NETWORK
Abstract:In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack.
What are the optimum protocol parameters
DeleteThe optimal testing protocol would obtain a valid RIT result within a clinically viable timeframe, while maintaining sensitivity to disease progression.
DeleteReg no : B8S18138
ReplyDeleteName : vetrivel v
Class : BCA 3RD YEAR
Abstract:Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. The earliest IFC models targeted security in a centralised environment, but decentralised forms of IFC have been designed and implemented, often within academic research projects. As a result, there is potential for decentralised IFC to achieve better cloud security than is available today. In this paper we describe the properties of cloud computing-Platform-as-a-Service clouds in particular-and review a range of IFC models and implementations to identify opportunities for using IFC within a cloud computing context. Since IFC security is linked to the data that it protects, both tenants and providers of cloud services can agree on security policy, in a manner that does not require them to understand and rely on the particulars of the cloud software stack in order to effect enforcement.
Reg no:B8S18217
ReplyDeleteName: P. Hariprasath
Class: BSC Computer Science 3rd year
Abstract:"Spy mail communication in It industry"is the process of following path and function performed by receiver on the received mail.it basically allows the sender to be aware of where, when and how this mail reaches the client and what the receiver does with this mail. many Existing mail clients provide very fundamental features such as Reading . forwading,moving,deleting,etc. But most of them do not provide a proof for having read the mail,security features such as block forwarding, retracting; block printing and saving etc. The aforementioned issues are resolved by this multi-functional email tracking system.
The development of this system serves the secured way of mailing. The tracking and notification feature is aimed at providing a proof of reading mail which hardley any mail services provides. The notification messages can be sent to either sender's mail Id or if given to the sender's mobile phone. The retractable mails are aimed at providing a means by which sender can delete a particular mail even after sending it. This is used when a person sends a mail to wrong mail id . The block backup feature provides a means of preventing printing, saving and copying the mail contents. This can be used for secured mail that are not intended for manipulation . Then self destructible mail is also a similar security add-on, but in a different context. this feature aims at preventing achieving of the mails in the receivers mailbox folders. Finally the block forwarding feature is a worthy alternative for mail encryption. Encryption is mainly done to prevent acess form undesired users. In the same way this feature prevents unintended users from viewing the mail. The working style of the whole system is abstract to the end user and provides a feature rich secured way of mailing
1.RegNo:B8S18556
ReplyDelete2.Name:B.Aakash
3.Class:B.Sc(IT)3rd Year
Project Title:Geographical Dispersion Healthcare Maintainece
Front End:Asp. Net
Back End:MySql
Abstract:contemporary trends in health care services provision tend towards increased use of community based healthcare centres. This study on the concept of healthcare provision hypothesizes that in the future the main source of healthcare services will be a network of community based clinics which will be responsible for the majority of primary and ambulatory care.this concept implies that a network of community clinics equpited with state of that telemedicine will be established with a wide geographical dispersion.The Implications for healthcare facilities in terms of the resources and performance of the built environment are investigated by reference to the israeli healthcare system.this paper reflects the results of research on healthcare facility management over the past 10 years.comparision of the performance and maintenance of hospital facility and community clinics reveals that the maintenance and performance of clinics facilities have the potential to combine improved healthcare facility services with cost-effective facility management and maintenance.
Reg.No b8s19016
ReplyDeleteName k.muthukumar (After noon)
Class bsc computer science 3 rd year
Reg.No: B8S19033
ReplyDeleteName: R.prince
Class: B.Sc Computer science 3 year
Reg.no:B8S18576
ReplyDeleteNAME:R.RAHUL
CLASS:B.SC INFORMATION TECHNOLOGY 3RD YEAR
E-VOTING THROUGH BIOMETRICS
Register number:B8S18918
ReplyDeleteName:P.Kiran
Class:BCA 3 YEAR(Afternoon)
Title: Towards secure and dependable storage services in cloud computing
Abstract:Cloud storage enables users to remotely store their data and enjoy the on-
demand high quality cloud applications without the burden of local hardware and
software management. Though the benefits are clear, such a service is also
relinquishing users' physical possession of their outsourced data, which inevitably poses
new security risks toward the correctness of the data in cloud. In order to address this
new problem and further achieve a secure and dependable cloud storage service, we
propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing
the homomorphic token and distributed erasure-coded data. The proposed design
allows users to audit the cloud storage with very lightweight communication and
computation cost. The auditing result not only ensures strong cloud storage correctness
guarantee, but also simultaneously achieves fast data error localization, i.e., the
identification of misbehaving server. Considering the cloud data are dynamic in nature,
the proposed design further supports secure and efficient dynamic operations on
outsourced data, including block modification, deletion, and append. Analysis shows the
proposed scheme is highly efficient and resilient against Byzantine failure, malicious
data modification attack, and even server colluding attacks.
This comment has been removed by the author.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteReg no:B8E10010
ReplyDeleteName :C.Praveenkumar
Class :MCA final year
Project Title:Decentralized Access control with Anonymous Authentication of data stored in clouds.
Front end:C#.NET
Back end :MS SQL