Professional Documents
Culture Documents
CLOUD COMPUTING
S.No
Code
Title
Abstract
PLCDCC01
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy.
PLCDCC02
In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling and index-hash table, supporting provable updates to outsourced data and timely anomaly detection
PLCDCC03
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
With the widespread adoption of cloud computing, the ability to record and account for the usage of cloud resources in a credible and verifiable way has become critical for cloud service providers and users alike. The success of such a billing system depends on several factors: the billing transactions must have integrity and nonrepudiation capabilities; the billing transactions must be nonobstructive and have a minimal computation cost; and the service level agreement (SLA) monitoring should be provided in a trusted manner. Existing billing systems are limited in terms of security capabilities or computational overhead.
PLCDCC04
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem
PLCDCC06
In this paper, we propose a service decision making system for inter domain service transfer to balance the computation loads among multiple cloud domains. Our system focuses on maximizing the rewards for both the cloud system and the users by minimizing the number of service rejections that degrade the user satisfaction level significantly. To this end, we formulate the service request decision making process as a semi-Markov decision process. The optimal service transfer decisions are obtained by jointly considering the system incomes and expenses. Extensive simulation results show that the proposed decision making system can significantly improve the system rewards and decrease service disruptions compared with the greedy approach.
PLCDCC07
In cloud computing, cloud providers can offer cloud consumers two provisioning plans for computing resources, namely reservation and on-demand plans. To address this problem, an optimal cloud resource provisioning (OCRP) algorithm is proposed by formulating a stochastic programming model. The OCRP algorithm can provision computing resources for being used in multiple provisioning stages as well as a long-term plan, e.g., four stages in a quarter plan and twelve stages in a yearly plan. The demand and price uncertainty is considered in OCRP. In this paper, different approaches to obtain the solution of the OCRP algorithm are considered including deterministic equivalent formulation, sample-average approximation, and Benders decomposition. Numerical studies are extensively performed in which the results clearly show that with the OCRP algorithm, cloud consumer can successfully minimize total cost of resource provisioning in cloud computing environments.
PLCDCC08
Cloud Computing poses new security and access control technique and (2) Multilinear map. In these schemes, challenges as the users outsource their sensitive data onto cloud storage. The outsourced data should be protected from unauthorized users access including the honest-but-curious cloud servers those hosts the data. In this paper, we propose two access control mechanisms based on (1)
PLCDCC09
Resource Provisioning with Budget Constraints for Adaptive Applications in Cloud Environments
The recent emergence of clouds is making the vision of utility computing realizable, i.e. computing resources and services can be delivered, utilized, and paid for as utilities such as water or electricity. This, however, creates new resource provisioning problems. Because of the pay-as-you-go model, resource provisioning should be performed in a way to keep resource costs to a minimum, while meeting an applications needs. In this work, we focus on the use of cloud resources for a class of adaptive applications, where there could be application specific flexibility in the computation that may be desired. Furthermore, there may be a fixed time-limit as well as a resource budget. Within these constraints, such adaptive applications need to maximize their Quality of Service (QoS), more precisely, the value of an application-specific benefit function,by dynamically changing adaptive parameters.
10
PLCDCC10
Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the users data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).
11
PLCDCC11
The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per- use service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customers outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customers point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensure data availability, can be achieved by dividing the users data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution
13
PLCDCC13
15
PLCDCC15
16
PLCDCC16
Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
17
PLCDCC17
When making reservations for Cloud services, consumers and providers need to establish service-level agreements through negotiation. Whereas it is essential for both a consumer and a provider to reach an agreement on the price of a service and when to use the service, to date, there is little or no negotiation support for both price and time-slot negotiations (PTNs) for Cloud service reservations. This paper presents a multi-issue negotiation mechanism to facilitate the following: 1) PTNs between Cloud agents and 2) trade-off between price and time-slot utilities. Unlike many existing negotiation mechanisms in which a negotiation agent can only make one proposal at a time, agents in this work are designed to concurrently make multiple proposals in a negotiation round that generate the same aggregated utility, differing only in terms of individual price and time-slot utilities.
19
PLCDCC19
20
PLCDCC20
22
PLCDCC22
The growing popularity of cloud computing draws attention to its security challenges, which are particularly exacerbated due to resource sharing.1 Cloud computings multitenancy and virtualization features pose unique security and access control challenges due to sharing of physical resources among potential untrusted tenants, resulting in an increased risk of side-channel attacks.2 Additionally, the interference of multitenancy computation can result in unauthorized information flow. Heterogeneity of services in cloud computing environments demands varying degrees of granularity in access control mechanisms. Therefore, an inadequate or unreliable authorization mechanism can significantly increase the risk of unauthorized use of cloud resources and services. In addition to preventing such attacks, a fine-grained authorization mechanism can assist in implementing standard security measures. Such access control challenges and the complexities associated with their management call for a sophisticated security architecture that not only adequately captures access management requirements but also ensures secure interoperation across multiple clouds. We present distributed access control architecture for multitenant and virtualized environments. The design of this architecture is based on the principles from security management and software engineering. From a security management perspective, the goal is to meet cloud users access control requirements. From a software engineering perspective, the goal is to generate detailed specifications of such requirements.
24
PLCDCC24
25
PLCDCC25
NoSQL Cloud data services provide scalability and high availability properties for web applications but at the same time they sacrice data consistency. However, many applications cannot a ord any data inconsistency. CloudTPS is a scalable transaction manager to allow cloud database services to execute the ACID transactions of web applications, even in the presence of server failures and network partitions. We implement this approach on top of the two main families of scalable data layers: Bigtable and SimpleDB. Performance evaluation on top of HBase (an open-source version of Bigtable) in our local cluster and Amazon SimpleDB in the Amazon cloud shows that our system scales linearly at least up to 40 nodes in our local cluster and 80 nodes in the Amazon cloud. Infrastructure as a Service (IaaS) cloud computing has revolutionized the way we think of acquiring resources by introducing a simple change: allowing users to lease computational
26
PLCDCC26
S.No
Code
Title
Abstract
PLCDDM01
Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain
Posting reviews online has become an increasingly popular way for people to express opinions and sentiments toward the products bought or services received. Analyzing the large volume of online reviews available would produce useful actionable knowledge that could be of economic values to vendors and other interested parties. In this paper, we conduct a case study in the movie domain, and tackle the problem of mining reviews for predicting product sales performance. Our analysis shows that both the sentiments expressed in the reviews and the quality of the reviews have a significant impact on the future sales performance of products in question. For the sentiment factor, we propose Sentiment PLSA (S-PLSA), in which a review is considered as a document generated by a number of hidden sentiment factors, in order to capture the complex nature of sentiments. We present Temporal Pattern Search (TPS), a novel algorithm for searching for temporal patterns of events in historical personal histories. The traditional method of searching for such patterns uses an automaton-based approach over a single array of events, sorted by time stamps. Instead, TPS operates on a set of arrays, where each array contains all events of the same type, sorted by
PLCDDM02
PLCDDM03
Several systems that rely on consistent data to offer high -quality services, such as digital libraries and e-commerce brokers, may be affected by the existence of duplicates, quasi replicas, or near duplicate entries in their repositories. Because of that, there have been significant investments from private and government organizations for developing methods for removing replicas from its data repositories. This is due to the fact that clean and replica free repositories not only allow the retrieval of higher quality information but also lead to more concise data and to potential savings in computational time and resources to process this data. In this paper, we propose a genetic programming approach to record deduplication that combines several different pieces of evidence extracted from the data content to find a deduplication function that is able to identify whether two entries in a repository are replicas or not. Extended Boolean retrieval (EBR) models were proposed nearly three decades ago, but have had little practical impact, despite their significant advantages compared to either ranked keyword or pure Boolean retrieval. In particular, EBR models produce meaningful rankings; their query model allows the representation of complex concepts in an and-or format; and they are scriptable, in that the score assigned to a document depends solely on the content of that document, unaffected by any collection statistics or other external factors. These characteristics make EBR models attractive in domains typified by medical and legal searching, where the emphasis is on iterative development of reproducible complex queries of dozens or even hundreds of terms. This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server for the most similar data objects to a query example. Outsourcing offers the data owner scalability and a low initial investment. The need for privacy may be due to the data being sensitive (e.g., in medicine), valuable (e.g., in astronomy), or otherwise confidential. Given this setting, the paper presents techniques that transform the data prior to supplying it to the service provider for similarity queries on the transformed data.
PLCDDM04
PLCDDM05
PLCDDM07
PLCDDM08
We address the problem of dynamic resource management for a large-scale cloud environment. Our contribution includes outlining distributed middleware architecture and presenting one of its key elements: a gossip protocol that (1) ensures fair Resource allocation among sites/applications, (2) dynamically adapts the allocation to load changes and (3) scales both in the number of physical machines and sites/applications. We formalize the resource allocation problem as that of dynamically maximizing the cloud utility under CPU and memory constraints. We first present a protocol that computes an optimal solution without considering memory constraints and prove correctness and convergence properties. Then, we extend that protocol to provide an efficient heuristic solution for the complete problem, which includes
10
PLCDDM10
11
PLCDDM11
13
PLCDDM13
15
PLCDDM15
17
PLCDDM17
18
PLCDDM18
20
PLCDDM20
21
PLCDDM21
23
PLCDDM23
24
PLCDDM24
26
PLCDDM26
28
PLCDDM28
29
PLCDDM29
30
PLCDDM30
31
PLCDDM31
32
PLCDDM32
Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme
34
PLCDDM34
35
PLCDDM35
S.No 1
Code PLCDMC01
Title Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks
Abstract This paper studies video multicasting in large-scale areas using wireless mesh networks. The focus is on the use of Internet access gateways that allow a choice of alternative routes to avoid potentially lengthy and low-capacity multihop wireless paths. A set of heuristic-based algorithms is described that together aim to maximize reliable network capacity: the two-tier integrated architecture algorithm, the weighted gateway uploading algorithm, the link-controlled routing tree algorithm, and the dynamic group management algorithm. These algorithms use different approaches to arrange nodes involved in video multicasting into a clustered and two-tier integrated architecture in which network protocols can make use of multiple gateways to improve system throughput. This paper presents positioning algorithms for cellular networkbased vehicle tracking in severe non-line-of-sight (NLOS) propagation scenarios. The aim of the algorithms is to enhance positional accuracy of network-based positioning systems when the GPS receiver does not perform well due to the complex propagation environment. A one-step position estimation method and another two-step method are proposed and developed. Constrained optimization is utilized to minimize the cost function which takes account of the NLOS error so that the NLOS effect is significantly reduced. Vehicle velocity and heading direction measurements are exploited in the algorithm development, which may be obtained using a speedometer and a heading sensor, respectively. The developed algorithms are practical so that they are suitable for implementation in practice for vehicle applications. It is observed through simulation that in severe NLOS propagation scenarios, the proposed positioning methods outperform the existing cellular network based positioning algorithms significantly. Further, when the distance measurement error is modelled as the sum of an exponential bias variable and a Gaussian noise variable, the exact expressions of the CRLB are derived to benchmark the performance of the positioning algorithms.
PLCDMC02
Geometry and Motion-Based Positioning Algorithms for Mobile Tracking in NLOS Environments
PLCDMC04
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
PLCDMC05
Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks
PLCDMC07
PLCDMC08
A Robust Distributive Approach to Adaptive Power and Adaptive Rate Link Scheduling in Wireless Mesh Networks
10
PLCDMC10
An Efficient Multi-Carrier Position-Based Packet Forwarding Protocol for Wireless Sensor Networks
11
PLCDMC11
12
PLCDMC12
13
PLCDMC13
14
PLCDMC14
Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams
16
PLCDMC16
PLCDIP02
PLCDIP04
PLCDIP05
NETWORKING S.No 1 Code PLCDNW01 Title Packet-Hiding Methods for Preventing Selective Jamming Attacks
Technology: Dotnet / Java Abstract The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multihop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. Extensive analysis and simulations have been conducted to verify the effectiveness and efficiency of the scheme. Emerging applications of wireless sensor networks (WSNs) require real-time quality-of-service (QoS) guarantees to be provided by the network. Due to the nondeterministic impacts of the wireless channel and queuing mechanisms, probabilistic analysis of QoS is essential. One important metric of QoS in WSNs is the probability distribution of the end-to-end delay. Compared to other widely used delay performance metrics such as the mean delay, delay variance, and worst-case delay, the delay distribution can be used to obtain the probability to meet a specific deadline for QoS-based communication in WSNs. To investigate the end-to-end delay distribution, in this paper, a comprehensive cross-layer analysis framework, which employs a stochastic queueing model in realistic channel environments, is developed. This framework is generic and can be parameterized for a wide variety of MAC protocols and routing protocols. Case studies with the CSMA/CAMAC protocol and an anycast protocol are conducted to illustrate how the developed framework can analytically predict the distribution of the end-to-end delay. Extensive test-bed experiments and simulations are performed to validate the accuracy of the framework for both deterministic and random deployments. Moreover, the effects of various network parameters on the
PLCDNW02
PLCDNW03
PLCDNW05
Applications of wide-area network slicing for improving cloud platform access by OpenTag
PLCDNW06
PLCDNW08
PLCDNW09
11
PLCDNW11
12
PLCDNW12
13
PLCDNW13
15
17
PLCDNW17
19
PLCDNW19
20
PLCDNW20
22
PLCDNW22
23
PLCDNW23
25
PLCDNW25
27
PLCDNW27
28
PLCDNW28
Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
NETWORK SECURITY
S.No 1
Code PLCDNS01
Abstract Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusions response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or natve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and natve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our riskaware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (HASBE) by extending ciphertext-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE. In addition, HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. We formally prove the security of HASBE based on security of the ciphertextpolicy attribute-based encryption (CP-ABE) scheme by Bethencourt et al. and analyze its performance and computational complexity. Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost of inconvenience to users. In this paper, we discuss the inadequacy of existing and proposed login protocols designed to address largescale online dictionary attacks (e.g., from a botnet of hundreds of thousands of nodes). We propose a new Password Guessing Resistant Protocol (PGRP), derived upon revisiting prior proposals designed to restrict such attacks. While PGRP limits the total number of login attempts from unknown remote hosts to as low as a single attempt per
PLCDNS02
HASBE: A Hierarchical AttributeBased Solution for Flexible and Scalable Access Control in Cloud Computing
PLCDNS03
PLCDNS05
PLCDNS06
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems
PLCDNS07
Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies have mainly focused on single-virus spreading dynamics. In this paper, we study multivirus spreading dynamics, where multiple viruses attempt to infect computers while possibly combating against each other because, for example, they are controlled by multiple botmasters. Specifically, we propose and analyze a general model (and its two special cases) of multivirus spreading dynamics in arbitrary networks (i.e., we do not make any restriction on network topologies), where the viruses may or may not coreside on computers. Our model offers analytical results for addressing questions such as: What are the sufficient conditions (also known as epidemic thresholds) under which the multiple viruses will die out? What if some viruses can rob others? What characteristics do the multivirus epidemic dynamics exhibit when the viruses are (approximately) equally powerful? The analytical results make a fundamental connection between two types of factors: defense capability and network connectivity. This allows us to draw various insights that can be used to guide security defence. Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. In this paper, we present pCloud, a distributed system that constitutes the first attempt toward practical cPIR. Our approach assumes a disk-based architecture that retrieves one page with a single query. Using a striping technique, we distribute the database to a number of cooperative peers, and leverage their computational resources to process cPIR queries in parallel. We implemented pCloud on the PlanetLab network, and experimented extensively with several system parameters. Our results indicate that pCloud reduces considerably the query response time compared to the traditional client/server model, and has a very low communication overhead.
PLCDNS08
10
PLCDNS10
11
PLCDNS11
14
PLCDNS14
15
PLCDNS15
Fast and Cost-Effective Online Load Balancing in Distributed Range- Queriable Systems
17
PLCDNS17
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
18
PLCDNS18
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks
20
PLCDNS20
S.No 1
Code PLCDPD01
Title EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks
Abstract Energy is an extremely critical resource for battery-powered wireless sensor networks (WSN), thus making energy-efficient protocol design a key challenging problem. Most of the existing energy-efficient routing protocols always forward packets along the minimum energy path to the sink to merely minimize energy consumption, which causes an unbalanced distribution of residual energy among sensor nodes, and eventually results in a network partition. In this paper, with the help of the concept of potential in physics, we design an Energy-Balanced Routing Protocol (EBRP) by constructing a mixed virtual potential field in terms of depth, energy density, and residual energy. The goal of this basic approach is to force packets to move toward the sink through the dense energy area so as to protect the nodes with relatively low residual energy. To address the routing loop problem emerging in this basic algorithm, enhanced mechanisms are proposed to detect and eliminate loops. The basic algorithm and loop elimination mechanism are first validated through
PLCDPD03
An Online Data Access Prediction and Optimization Approach for Distributed Systems
PLCDPD05
PLCDPD06
PLCDPD08
10
PLCDPD10
11
PLCDPD11
13
PLCDPD13
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
14
PLCDPD14
15
PLCDPD15
Trust plays an important role in software systems, especially component-based systems in which components or their environments vary. This paper introduces an autonomic trust management solution for a component-based software system. We propose an adaptive trust control model to specify, evaluate, establish, and ensure the trust relationships among system entities. This model concerns the quality attributes of the entity and a number of trust control modes supported by the system. In particular, its parameters can be adaptively adjusted based on runtime trust assessment in order to reflect real system context and situation. Based on this model, we further develop a number of algorithms that can be adopted by a trust management framework for autonomic management of trust during component execution. We verify the algorithms feasibility through simulations and demonstrate the effectiveness and benefits of our solution. We also discuss the issues for successful deployment of our solution in a component software platform.
16
PLCDPD16
AbstractEmerging applications in Multihop Wireless Networks (MHWNs) require considerable processing power which often may be beyond the capability of individual nodes. Parallel processing provides a promising solution, which partitions a program into multiple small tasks and executes each task concurrently on independent nodes. However, multihop wireless communication is inevitable in such networks and it could have an adverse effect on distributed processing. In this paper, an adaptive intelligent task mapping together with a scheduling scheme based on a genetic algorithm is proposed to provide realtime guarantees. This solution enables efficient parallel processing in a way that only possible node collaborations with cost-effective communications are considered. Furthermore, in order to alleviate the power scarcity of MHWN, a hybrid fitness function is derived and embedded in the algorithm to extend the overall network lifetime via workload balancing among the collaborative nodes, while still ensuring the arbitrary application deadlines. Simulation results show significant performance improvement in various testing environments over existing mechanisms.
17
PLCDPD17
18
PLCDPD18
GRID COMPUTING
S.No 1
Code PLCDGC01
Title Online System for Grid Resource Monitoring and Machine Learning-Based Prediction
Abstract Resource allocation and job scheduling are the core functions of grid computing. These functions are based on adequate information of available resources. Timely acquiring resource status information is of great importance in ensuring overall performance of grid computing. This work aims at building a distributed system for grid resource monitoring and prediction. In this paper, we present the design and evaluation of system architecture for grid resource monitoring and prediction. We discuss the key issues for system implementation, including machine learning-based methodologies for modelling and optimization of resource prediction models. Evaluations are performed on a prototype system. Our experimental results indicate that the efficiency and accuracy of our system meet the demand of online system for grid resource monitoring and prediction.
IEEE PROJECTS
ANDROID
ANDROID IEEE
JAVA
S.No 1
Code PLCJAA01
Abstract With the explosive growth of web videos on the Internet, it becomes challenging to efficiently browse hundreds or even thousands of videos. When searching an event query, users are often bewildered by the vast quantity of web videos returned by search engines. Exploring such results will be time consuming and it will also degrade user experience. In this paper, we present an approach for event driven web video summarization by tag localization and key-shot mining. We first localize the tags that are associated with each video into its shots. Then, we estimate the relevance of the shots with respect to the event query by matching the shot-level tags with the query. After that, we identify a set of key-shots from the shots that have high relevance scores by exploring the repeated occurrence characteristic of key sub-events. We provide two types of summaries, i.e., threaded video skimming and visual-textual storyboard. Experiments are conducted on a corpus that contains 60 queries and more than 10,000 web videos. The evaluation demonstrates the effectiveness of the proposed approach. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patients PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
PLCJAA02
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
PLCJAA04
PLCJAA06
APPLICATION PROJECTS
DOTNET
S.No 1
Title
Abstract Target groups of customer of the Electronic Service System for Post Office are predominantly little and middle-class business (SMEs). The customers can have The Electronic Service System for Post Office is the shopping portal of the world-renowned postal service on the Internet and an additional distribution channel. It sells Stamps, Postcards, Packets, Cartons and has services like courier, registering for electricity vendors, selling mobile cards, etc. Under this website many products and services can be ordered, that are also available in a "normal" branch. The product prices are identical with the prices of their normal branches. As by making to a web-based process the firm will be getting the complete record from the bank and also the criteria for getting the help from the bank. The back order process for the requirements also will be handled by the banking sector and the information will be providing to the client. The default mailing procedure will be followed in which the mail will be applied within the intranet of the webapplication. The application also maintains the client details of the company and also the banking sector details up to date. The on-line processing of ordering the resource requirements to the bank and the file transfer within the web server will be followed based on the authentication provided to the user.
PLCDA02
I factor
The project deals with the I-Factor followed for an IT firm and also with the profit and process management followed for a firm. The Software companies will be in need of the hardware resources from the different client and the problem faced by the company is they will be unable to get the complete requirements of the hardware as due to finance to solve this, the company focus on the banking sector. The company directly will be having the direct investment on the banking sector and with the help of bank the company will be getting the hardware resources from the client. As by making to a web-based process the firm will be getting the complete record from the bank and also the criteria for getting the help from the bank. The back order process for the requirements also will be handled by the banking sector and the information will be providing to the client. The default mailing procedure will be followed in which the mail will be applied within the intranet of the web application. The application also maintains the client details of the company and also the banking sector details up to date.
PLCDA06
File sharing softwares are emerging abundantly nowadays. This has made file sharing one of the top uses of any network. But the current software provides a poor security feature. This Project describes about the design, development and evaluation of a file sharing system that proposes a novel solution to the shared file security problem. The system will allow users to share files in a secure manner and comprises of client and server applications The client allows users to connect to a server and share their files amongst all other system users. The client also gives users the ability to search for files shared by the other system users, and when a file is found it could be transferred from the other user securely, as the file would be encrypted. The server allows valid users to connect, records their shared file list and enables connected users to search this list. The server authenticates connected users by performing a test that only a valid user can respond to in the correct manner The system to be developed uses certain techniques to implement a framework in which to model system security, including authentication of system users and the files that they share. A major objective of the system is to provide a model that can easily scaled with a number of clients. The tests performed show that the response time of the system remains fairly linear to the number of concurrent clients.
PLCDA07
This project provides Bug Tracking, Help Desk Ticketing, issue raising, search facility, help information, and issue resolution. Issues related to software projects can be raised, tracked and resolved by Employees of different departments. Resolved issues can be allowed to access from Knowledge Base as Knowledge elements. The different groups and representatives can interact each other through emails. The issue tracking system does all the jobs that are done in conventional system but, here, everything is done in more formal and efficient manner. All the users of organization can interact with each other through the Issue Tracking System. This system acts as an interface between the employees thereby enabling them to forward their issues to the centralized Issue tracking system. Hence, making the work easy for both the issue raiser and the resolver. It totally avoids the involvement of middlemen in getting resolution for a particular issue.
PLCDA08
The project has named online income tax management system for income tax is a tax paid to the central government on personal income. Income tax is a tax levied on the income of individuals or business (corporations or other legal entities). Various income tax systems exist, with varying degrees of tax incidence. Income taxation can be progressive, proportional, or regressive. Individual income taxes often tax the total income
10
PLCDA10
11
PLCDA11
16
PLCDA16
Intranet Chatting
17
PLCDA17
Today Computers are used in reporting to make the computation easier, faster, and reliable accurate, moreover they are not being utilized for providing integrated information would surely help in accurate reporting of the demand data and maintenance. A smooth flow of information is a basic necessity for better Administration. 18 PLCDA18 Digital watermarking for tamper proofing and authentication in images In this application, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specically address the problem of fragile digital watermarking for the tamper proong of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefcients. Tamper detection is possible in localized spatial and frequency regions. Unlike previously proposed techniques, this novel approach provides information on specic frequencies of the image that have been modied. This allows the user to make applicationdependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility. Analysis is provided to evaluate the performance of the technique to varying system parameters. In addition, we compare the performance of the proposed method to existing fragile watermarking techniques to demonstrate the success and potential of the method for practical multimedia tamper proong and authentication.
21
PLCDA21
23
PLCDA23
25
PLCDA25
28
PLCDA28
29
PLCDA29
31
PLCDA31
The website offers the information to the tourists regarding specific Country or city. The system provides information regarding about hotels, apartments and restaurants that for rental purpose. By this system the visitor or tourist can make a request to system on his wishing one. And the system also provides that how much charge for the serviced apartments or Hotels that may be as per day charges or Monthly charges The tourist can know the information regarding any serviced cottages or apartments through physically likes through brokers or any agency centers. The existing system only displays the information. To make any request to the system that is not possible in the existing system. Here The User went to some new places. He dont have an idea about the tourisms. At that time first we have to registered in the Registration. The Tourism Guide he Saw The All those tourism list details. In that admin we store the all those details of the tourist information. The tourism guide show the different environments places to tourists. In this application project, Online gas system services the user an book gas through online. The main purpose of this application is to reduce the time consuming and they can buy the product and pay the payment through credit and also can make liquid cash payment. The main details of the project are
32
PLCDA32
34
PLCDA34
35
PLCDA35
Intranet Chatting
The project Intranet Chatting is designed using Microsoft Visual Studio.Net 2005 as front end which works in .Net framework version 2.0. The coding language used is C# .Net .Private network used within the company. An intranet serves the internal needs of the business entity. Intranet users are able to access the Internet, but firewalls keep outsiders from accessing confidential data. It makes use of the infrastructure and standards of the Internet and the Web. Intranets use lowcost Internet tools, are easy to install, and offer flexibility. If the intranet has access to the Internet, chat can be accessed through the Internet connection. If the intranet is running
37
PLCDA37
PLCDA38 38
Tender System
40
PLCDA40
41
PLCDA41
43
PLCDA43
44
PLCDA44
Call center management is an increasingly important skill as the use of call centers becomes a popular method of centralizing information services, streamlining order taking and providing valuable customer support. The skills required to successfully set-up and manage a call center encompass everything from staff recruitment and personnel management, to technical understanding of the options available, and the all -important customer relationship management. From small customer service departments to large call centers, the importance of developing successful call center management is vital for building a valued relationship with customers to support longterm business growth.This system (Call Center Management) is useful to the organization, it maintains the information about the employees and it also contains the necessary information of the customer and their phone Numbers, their services also. It also
46
PLCDA46
e-banking
49
PLCDA49
50
PLCDA50
sophisticated sheltered
This project is mainly developed for the Account Division of a Banking sector to provide better interface of the entire banking transactions. This system is aimed to give a better out look to the user interfaces and to implement all the banking transactions like: 1. 2. 3. 4. 5. 6. 7. 8. Supply of Account Information New Account Creations Deposits Withdraws Check book issues Stop payments Transfer of accounts Report Generations.
This service is open only to savings bank customers and not for current account holders. The customer is privileged to use most of the system only as a viewing phase, the only online transactions the customer can do are Check book requisition and fund transfer among his personal accounts. The project has been planned to be having the view of distributed architecture, with centralized storage of the database.
54
PLCDA54
Mingle Box
Keeping track of the customer Bill generation and printing. Creating backup of the data Keeping track of the new items and managing fluctuating markets. Utilities
56 PLCDA56 Beneficiary System
Back Up Database Change Password Employee Details Customer Details Supplier Details Jewellery Type The EMI Distribution Software is used to calculate the annual and monthly payment of employees. For these calculations the following are the Mandatory fields. 1. Date of birth 2. Account Balance 3. Interest Rate. In the Date of Birth field the participant age should be in the range of 35-59 Years old and the Interest Rate should be a reasonable rate. This software also produces reports for: 1.Distribution Information, 2.Projected values 3.Beneficiary Information
57
PLCDA57
In this paper, we consider users have similar interests if the intersection of their recent request sets is larger than some predefined threshold. The size of the intersection defines the edge weight. In this context, two users are linked in the interest-sharing graph if they display similar tagging activity over time. Web caches, content distribution networks, peer-topeer file-sharing networks, distributed file systems, and data
59
PLCDA59
Estate
System has powerful logical access management in place, each user must be identified by login id and strict password policy is applied to secure the system Generate property thumbnail and details in html file to send client via email. Knowledge Management (KM) refers to a range of practices used by organizations to identify, create, represent, and distribute knowledge for reuse, awareness and learning across the organization. Knowledge Management programs are typically tied to organizational objectives and are intended to lead to the achievement of specific outcomes such as shared intelligence, improved performance, competitive advantage, or higher levels of innovation. Here we are looking at developing an online intranet knowledge management system that is of importance to either an organization or an educational institute. The system (KMS) is an Intranet based application that can be accessed throughout the institute or a specified group or department. This system can be used as a knowledge/information management system for the institute. Students/Staff logging in should be able to upload any kind of educational information. Students/staff logging in may also access/search any information put up by others. KMS should facilitate knowledge sharing from the grass root level like project teams to departments to the entire college. User Features
60
PLCDA60
Knowledge System
Management
A user should be able to register giving basic information. Login to the system and change the password (if required) after logging in. Post documents/information and edit/delete his contributions. Access/ Search documents/information posted by others (only read access). Rate the content posted by others. Search information by different parameters rating/key words/relevance/category Internetworking is the livewire of todays world, it has ushered in a whole new era of evolution, that has brought about a sea of change to this New World. With the advent of new concepts and technologies, the whole world has been linked into one single cobweb of information. Key to this evolution is the developments of Networking and Information Sharing. This is a project of ACTIVITY MANAGEMENT SYSTEM for a PRUDENTIAL bank. The client is the person who comes for the sake of getting premium from the agent of a prudential bank. (Here agent is the one who gets the premium from the client. The duty of the agent is not only to get the premium from the client but agent sees how the client can be convinced to pay the premium.) The system is to automate agents reports. This can be used for maintaining and evaluation of sales activities. It allows the life
61
PLCDA61
ActivityManagement system
63
PLCDA63
66
PLCDA66
eFund Management
67
PLCDA67
68
PLCDA68
70
PLCDA70
75
PLCDA75
APPLICATION PROJECTS
JAVA
S.No 1
Code PLCJA01
Abstract A visual cryptography scheme (VCS) is a kind of secret sharing scheme allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS). In this paper, we propose a construction of EVCS which is realized by embedding random shares into meaningful covering shares, and we call it the embedded EVCS. Experimental results compare some of the well-known EVCSs proposed in recent years systematically, and show that the proposed embedded EVCS has competitive visual quality compared with many of the well-known EVCSs in the literature. In addition, it has many specific advantages against these well-known EVCSs, respectively. In order to manage and thereby reduce your telecommunication expenditures, you need to establish a system for accountability. Accountability means that the users of service, departments and individual users are held accountable for the use of telecommunications is by using a cost allocation model. In this model individual departments must pay for their budget. Managers must also be given information that lets them make decisions on how these dollars being used. Call accounting reports can provide this information. Significant cost savings can be found by simply sending each departmental manager a copy of their call accounting reports on a monthly basis. Once managers see what they are spending, they can reduce these expenditures. Studies have shown that installing a call accounting system can yield a ten to thirty percent reduction in telecommunication costs. This small reduction can pay for a accounting in a relatively short period of time. AS THE SCALE of a decentralized distributed system increases, the presence of malicious behaviour (e.g., Byzantine failures) becomes the norm rather than the exception. Most designs against such malicious behaviour rely on the assumption that a certain fraction of the nodes in the system are honest. For example, virtually all protocols for tolerating Byzantine failures assume that at least 2/3 of the nodes are honest. This makes these protocols vulnerable to sybil attacks [1], in which a malicious user takes on multiple identities and pretends to be multiple, distinct nodes (called sybil nodes or sybil identities) in the system. With sybil nodes comprising a large fraction (e.g., more than 1/3) of the nodes in the system, the malicious user is able to out vote the honest users, effectively breaking previous defences against malicious behaviours. Thus, an
PLCJA02
PLCJA03
PLCJA05
PLCJA06
PLCJA08
PLCJA09
10
PLCJA10
11
PLCJA11
Gateway community
12
PLCJA12
This application VISUAL JAVA EDITOR is developed using JAVA. It is basically an editor with some additional options. This editor is designed in such a way to fulfil the complete needs of the java Integrated Development Environment or java development using SUN JDK under windows98 and above, Compilation and execution can be done in command prompt only. This application helps to do compilation and execution in editor itself. So that user can identify the warning(s) and error(s) in the editor itself. This editor reduces the users time. It is easy to compile and run the programs. This editor is more flexible and user friendly. This application is developed in java language using the following concepts AWT, FRAME, SWING, and IO & NETWORKING. This is a project of ACTIVITY MANAGEMENT SYSTEM for a PRUDENTIAL bank. The client is the person who comes for the sake of getting premium from the agent of a prudential bank. (Here agent is the one who gets the premium from the client. The duty of the agent is not only to get the premium from the client but agent sees how the client can be convinced to pay the premium.) The system is to automate agents reports. This can be used for maintaining and evaluation of sales activities. It allows the life advisor to set goals and accomplish them. It is very useful to motivate the advisor to do better, with reference of his previous progress.
13
PLCJA13
16
PLCJA16
17
PLCJA17
Finding Shortest Path in Network Using bandwidth routing protocol for quality-of-service (QoS)
19
PLCJA19
20
PLCJA20
21
PLCJA21
Fault-tolerant Mobile Agent based Monitoring Mechanism for Highly Dynamic Distributed Networks
23
PLCJA23
27
PLCJA27
28
PLCJA28
30
PLCJA30
Record
33
PLCJA33
Port Scanner
The term "port scanning" refers to the technique or attempt to identify open ports and available services on a network host. It can be used by security professionals to audit network computers for likely vulnerabilities. It can also be used by attackers to check victim hosts for possible exploits. The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. We propose the notion of database response policies to support our intrusion response system tailored for a DBMS. Our interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues that we address in context of such response policies are that of policy matching, and policy administration. For the policy matching problem, we propose two algorithms that efficiently search the policy database for policies that match an anomalous request. We also extend the PostgreSQL DBMS with our policy matching mechanism, and report experimental results. The experimental evaluation shows that our techniques are very efficient. The other issue that we address is that of administration of response policies to prevent malicious modifications to policy objects from legitimate users. We propose a novel Joint Threshold Administration Model (JTAM) that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs. We present design details of JTAM which is based on a cryptographic threshold signature scheme, and show how JTAM prevents malicious modifications to policy objects from authorized users. We also implement JTAM in the PostgreSQL DBMS, and report experimental results on the efficiency of our techniques.
34
PLCJA34
APPLICATION PROJECTS
PHP
S.No 1
Code PLCPA01
Abstract The Corporate Strategies and Information Management System are developed for automating the complete operations of M/S SRM Systems and Software Private Limited. The Project is composed of Four Major Modules namely Training Management, Marketing Management, Administration and Financial Management. The Training Management module deals with Maintaining information about students, faculties, Batches, Courses, Training aids, Infrastructure, Computers, Peripherals, Student & Faculties Skill Sets, Course Materials, Breaks, Transfers and Dropouts. The Training Management Module is also responsible for maintaining information about Staffs like Personnel Management, Skill Sets, Timings, Weekly Shift Schedules, Salary Details, Incentives & Allowances, Appraisals, Leave and Transfers. The System also contains a Library Management Module, which consists of maintaining Library books, which are broadly, classified into two categories namely Reference and Loan able books. Students and Staff members can borrow books from the Library and Keep it for 3 days. Every fourth day they should renew the book failing which a fine amount is calculated and levied. Students and Staff members can also reserve books, extend their reservations and cancel their reservations. The Administration Module deals with Maintenance of Faculty Load Charts, Student Attendance, Weekly Shift Schedule for Staffs, Course Allocations, Classroom Allocations, Login Id creation for students, Issuing ID Cards for the students, Maintaining reservations & Cancellations for the Night Lab, etc. Various Reports viz. Weekly Marketing Report, Weekly Financial Report, Daily Financial Report, Inventory Movement Report, Peripherals Utilization Report, Enquiries by Area Report, Faculty Load Chart, Faculties Performance Report, Student Performance Report, Monthly Attendance Report, Lab Machine Allocation Report and Defaulters Report are generated. The Financial Management deals with maintaining data about collection, billing, miscellaneous expenses, conveyance, invoices, Cash/Cheque transactions, Fine Amount Collection and Internal Rate of Return.
PLCPA03
APPLICATION PROJECTS
ANDROID
S.No 1
Code PLCJAAA01
Abstract This Android application allows user to keep track of current balance in different bank accounts held by the user and the transactions of those accounts The following are the major operations in this application. List of bank accounts Adding new bank account Updating an existing bank account Deleting a bank account List of transactions related to a bank accounts List of recent 10 transactions from all accounts Search Transactions by date and amount Showing all details of a single transaction Deleting a transaction Given a data point set D, a query point set Q, and an integer k, the Group Nearest Group (GNG) query finds a subset w(|w|<=k) of points from D such that the total distance from all points in Q to the nearest point in w is not greater than any other subset w' w(|w|<=k) of points in D. GNG query is a partition-based clustering problem which can be found in many real applications and is Nphard. In this paper, Exhaustive Hierarchical Combination (EHC) algorithm and Subset Hierarchial Refinement (SHR) algorithm are developed for GNG query processing. While EHC is capable to provide the optimal solution for k = 2, SHR is an efficient approximate approach that combines database techniques with local search heuristic. The processing focus of our approaches is on minimizing the access and evaluation of subsets of cardinality k in D since the number of such subsets is exponentially greater than |D|. To do that, the hierarchical blocks of data points at high level are used to find an intermediate solution and then refined by following the guided search direction at low level so as to prune irrelevant subsets. The comprehensive experiments on both real and synthetic data sets demonstrate the superiority of SHR in terms of efficiency and quality. This thesis will discuss the development of an Android Sudoku application, for use on Smartphones or Tablet Computers. The application was designed for an average user who wishes to play games. The thesis will describe the basics of the Sudoku game and its history. It will go on to describe technologies, development tools and basics of the Android operating system. The development of the application began with the creation of an appropriate graphical user interface using mostly XML and some Java. The game's logic is implemented in Java programming language. It was important to ensure that the Sudoku application would be superior to others available on the market. Therefore, it was developed to include accessories to help users solve the puzzle. To achieve this, the game includes a column, row and mini-grid elimination algorithm.
PLCJAAA02
PLCJAAA03
PLCJAAA05
PLCJAAA06
PLCJAAA07
Employee Directory