206 research outputs found

    A Survey on Automatically Mining Facets for Web Queries

    Get PDF
    In this paper, a detailed survey on different facet mining techniques, their advantages and disadvantages is carried out. Facets are any word or phrase which summarize an important aspect about the web query. Researchers proposed different efficient techniques which improves the user’s web query search experiences magnificently. Users are happy when they find the relevant information to their query in the top results. The objectives of their research are: (1) To present automated solution to derive the query facets by analyzing the text query; (2) To create taxonomy of query refinement strategies for efficient results; and (3) To personalize search according to user interest

    Survey on Various Trust Management Issues in Cloud Environments

    Get PDF
    Over the past few years, trust management has been one of the hot topics especially in the area of cloud computing. Well-known benefits resulting from cloud computing adoption, several issues have emerged during its evolution: most of them relate to security, privacy and trust management. In particular, its proliferation has placed even more attention to trust management, representing one of the key challenges in the adoption of cloud computing technologies. This paper proposes a survey of existing trust management models addressing collaboration agreements in cloud computing scenarios. Main limitations of current approaches are outlined and possible improvements are traced, as well as a future research path

    Secure Data Storage on Cloud through Networking

    Get PDF
    Security, privacy issue and data protection is always one of the major issue which reduces the growth and make slow the speed of rising new technologies in the field of cloud computing. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. Here to avoid risk and threaten are reduced in the new model the features are improved. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system

    Survey on EAACK - A Secure Intrusion-Detection System for MANETs

    Get PDF
    The past few decade migration to wireless network from wired network has been a global trend. Wireless network made it possible in many applications to have mobility and scalability. Among all the modern wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET is more popular now days. On the conflicting to traditional network architecture, MANET not has a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes within same communication range are communicated directly with each other. Otherwise, they depend on their neighbors to relay messages. Because of the self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. Now days, security has become a very important service in Mobile Adhoc Network. As Compared with other networks, MANETs are more vulnerable to various types of attacks. This paper presents an overview of Secure Intrusion-Detection Systems for discovering malicious nodes and attacks on MANETs. Because of some special characteristics of MANETs, prevention mechanisms alone are not satisfied to manage the secure networks. In this, detection should be focused as another part before an attacker can damage the structure of the system. This paper gives an overall overview of IDS architecture for improving the security level of MANETs. For enhancing the security based on security attributes and then various algorithms like RSA and DSA

    Privacy preserving outsourcing algorithm for two-point linear boundary value problems

    Get PDF
    One of a powerful application in the age of cloud computing is the outsourcing of scientific computations to cloud computing which makes cloud computing a very powerful computing paradigm, where the customers with limited computing resource and storage devices can outsource the sophisticated computation workloads into powerful service providers. One of scientific computations problem is Two-Point Boundary Value Problems(BVP) is a basic engineering and scientific problem, which has application in various domains. In this paper, we propose a privacy-preserving, verifiable and efficient algorithm for Two-Point Boundary Value Problems in outsourcing paradigm. We implement the proposed schema on the customer side laptop and using AWS compute domain elastic compute cloud (EC2) for the cloud side

    TAMC: Traffic Analysis Measurement and Classification Using Hadoop MapReduce

    Get PDF
    Due to growth in Internet users and bandwidth-hungry applications; the amount of Internet traffic data generated is so huge. It requires scalable tools to analyze, measure, and classify this traffic data. Traditional tools fail to do this task due to their limited computational capacity and storage capacity. Hadoop is a distributed framework which performs this task in very efficient manner. Hadoop mainly runs on commodity hardware with distributed storage and process this huge amount of traffic data with a Map-Reduce programming model. We have implemented Hadoop-based TAMC tool which perform Traffic Analysis, Measurement, and Classification with respect to various parameters at packet and flow level. The results can be used by Network Administrator and ISP’s for various usages. DOI: 10.17762/ijritcc2321-8169.15013

    Verifiable secure computation of linear fractional programming using certificate validation

    Get PDF
    Outsourcing of scientic computations is attracting increasing attention since it enables the customers with limited computing resource and storage devices to outsource the sophisticated computation workloads into powerful service providers. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the customers, and cheating behaviors of the cloud. Motivated by these issues, this paper focused on privacy-preserving Linear Fractional Programming (LFP) as a typical and practically relevant case for veriable secure multiparty computation. We will investigate the secure and veriable schema with correctness guarantees, by using normal multiparty techniques to compute the result of a computation and then using veriable techniques only to verify that this result was correct

    SaMD Synergy: Bridging Innovation and Regulation in the AI Healthcare Era

    Get PDF
    The emergence of Software as Medical Devices (SaMD) in modern healthcare signifies a paradigm shift, integrating software applications and algorithms into critical medical processes. SaMD, ranging from diagnostic tools to telemedicine platforms, enhances healthcare accessibility and efficiency, shaping personalized medicine and improving patient outcomes. This abstract delves into the regulatory landscape, emphasizing the complexities of SaMD compliance with stringent medical device regulations. The paper underscores the pivotal role of SaMD in reshaping healthcare, While SaMD streamlines healthcare processes and fosters collaboration, the paper highlights the pressing need for regulatory frameworks to navigate this transformative landscape. IMDRF in year 2013 formed the software as medical device working group to develop guidance for SaMD. Software as a medical device working group was chaired by FDA. After 2013 the guidelines for SaMD have evolved considering risk categorization, quality management system and clinical evaluation. The challenges faced by regulators in ensuring the safety and efficacy of AI-driven SaMD underline the critical importance of addressing these complexities for the future of medical practice and patient experiences. The IEC 62304 is the standard for the risk management specially for the medical devices with reference to ISO 14971 for Quality Management System. The various application of SaMD is in Mobile ECG Apps, MRI, Computer Aided Detection, Mammography Image Analysis Software etc. Future application of AI based SaMD is going to become an integral part of healthcare system
    corecore