International Transaction of Electrical and Computer Engineers System

ISSN (Print): 2373-1273

ISSN (Online): 2373-1281

Editor-in-Chief: Dr. Pushpendra Singh

Website: http://www.sciepub.com/journal/ITECES

   

Article

Cryptography during Data Sharing and Accessing Over Cloud

1M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India


International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 12-18
doi: 10.12691/iteces-3-1-2
Copyright © 2015 Science and Education Publishing

Cite this paper:
Shyam Nandan Kumar. Cryptography during Data Sharing and Accessing Over Cloud. International Transaction of Electrical and Computer Engineers System. 2015; 3(1):12-18. doi: 10.12691/iteces-3-1-2.

Correspondence to: Shyam  Nandan Kumar, M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India. Email: shyamnandan.mec@gmail.com

Abstract

Data sharing is an important functionality in cloud environment. With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. In this article, an efficient methodology is provided to securely, efficiently, and flexibly share data with others in cloud computing. In this technique, the secret key holder can release a constant-size aggregate key for flexible choices of cipher-text set in cloud storage, but the other encrypted files outside the set remain confidential. Secure cryptographic architecture and working methodology are proposed in this paper for optimal services over the cloud.

Keywords

References

[1]  L. Hardesty, “Secure computers aren’t so secure,” MIT press, 2009, http://www.physorg.com/news176107396.html.
 
[2]  D. X. Song, D. Wagner, A. Perrig. “Practical techniques for searches on encrypted data”. Proceedings of the IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
 
[3]  D. Boneh, G. D. Crescenzo, R. Ostrovsky, G. Persiano. “Public key encryption with keyword search”. Advances in Cryptology-EUROCRYPT'04, 2004, LNCS 3027, Springer, pp. 506-522.
 
[4]  V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06). ACM, 2006, pp. 89-98.
 
[5]  M. Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in ACM Conference on Computer and Communications Security, 2009, pp. 121-130.
 
Show More References
[6]  S. S. M. Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient Unidirectional Proxy Re-Encryption,” in Progress in Cryptology-AFRICACRYPT 2010, ser. LNCS, vol. 6055. Springer, 2010, pp. 316-332.
 
[7]  G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1-30, 2006.
 
[8]  Seung-Hyun Seo, Nabeel, M, Bertino, E. and Xiaoyu Ding, “An Efficient Certificateless Encryption for Secure Data Sharing in Public CloudsIEEE Transactions on Knowledge and Data Engineering, Volume: 26, Issue: 9, pp. 2107-2119, 05 August 2013
 
[9]  Ruhr (2011) “Cloud computing: Gaps in the cloud”. NewsRx Health Sci.
 
[10]  D. Boneh, C. Gentry, and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys,” in Proceedings of Advances in Cryptology-CRYPTO ’05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258-275.
 
Show Less References

Article

LTE-A Multi-hop Network with Zero Link Overflow Utilizing OTFWC Scheduling

1Faculty of Engineering, Department of Electronics and Communications, Mansoura University, Egypt


International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 19-29
doi: 10.12691/iteces-3-1-3
Copyright © 2015 Science and Education Publishing

Cite this paper:
Ehab H. Abdelhay, Fayez W. Zaki, Sherif S. Kishk, Hossam S. Moustafa. LTE-A Multi-hop Network with Zero Link Overflow Utilizing OTFWC Scheduling. International Transaction of Electrical and Computer Engineers System. 2015; 3(1):19-29. doi: 10.12691/iteces-3-1-3.

Correspondence to: Ehab  H. Abdelhay, Faculty of Engineering, Department of Electronics and Communications, Mansoura University, Egypt. Email: ehababdelhay@mans.edu.eg

Abstract

Multi-hop Relay networks are proposed to fulfill the demanding coverage and capacity requirements for current applications in a cost efficient way. It can be used in IMT-Advanced technologies such as 3GPP LTE-Advanced. In this paper, Resource Blocks (RBs) proposed scheduling scheme is considered for zero multi-hop links overflow in Uplink LTE-Advanced. Then based on this scheduling scheme and other network assumptions the best Relay Station (RS) placement in the cell was estimated in order to improve LTE-A Uplink performance. The total LTE-A uplink Throughput, average throughput per user, and Mean File Transfer Time (MFTT) in the LTE-A network are considered as performance measures. This is done and measured as a function of different arrival rates of UEs assigned from random positions in the cell. Adaptive Modulation, and Coding (AMC) scheme with high order 2x4MIMO is used to maximize network throughput with low bit error rate (BER). Simulation results show effective improvement in uplink network performance using the proposed scheduling scheme and 2x4MIMO-AMC with RS at 50% of cell radius towards cell edge.

Keywords

References

[1]  A. Ghosh, R. Ratasuk, B. Mondal, and T. Thomas, “LTE-A: next-generation wireless broadband technology”, IEEE Wireless Communications, vol. 17, no. 3, 2010, pp. 10-22.
 
[2]  E.H. Abdelhay, F.W. Zaki, S.S. Kishk, H.S. Mostfa, “ Performance of Multihop LTE-A using AMC”, 32nd National Radio science Conference (NRSC), C1C2, pp. 104-114, 2015.
 
[3]  B. Lin, P.-H. Ho, L.-L. Xie, and J. Tapolcai, “Optimal RS Placement in Broadband Wireless Access Networks”, IEEE Transactions on Mobile Computing, vol. 9, no. 2, 2010, pp. 259-269.
 
[4]  G. Joshi, A. Karandikar, “Optimal relay placement for cellular coverage extension”, NCC, 2012.
 
[5]  X. Wu, L. Sun, M. Luo, “A Sphere Detection Based Adaptive MIMO Detection Algorithm for LTE-A”, scrip Communications and Network journal, Vol. 5, pp: 25-29, 2013.
 
Show More References
[6]  M.U. Sheikh, R. Jagusz, J. Lempiäinen, “Performance Evaluation of Adaptive MIMO Switching in Long Term Evolution”, 7th International Wireless Communications and Mobile Computing Conference (IWCMC), 2011.
 
[7]  D.H. Hennepe, G. Karagiannis, “Impact of Relay Station Positioning on LTE Uplink Performance at Flow Level”, Global Communications Conference, IEEE, 2012, pp.1586-1592.
 
[8]  E.H.Abdelhay, F.W.Zaki, S.S.Kishk, H.S.Mostfa, “Performance Evaluation of Adaptive MIMO-MC Switching in Uplink Multi-hop LTE-Advanced”, Mediterranean Journal of Electronics and Communications (MEDJEC), Vol.11, No.1, 2015, pp:347-357.
 
[9]  M.A. Gadam, L. Maijama, “A Review of Resourse Allocation Techniques for Throughput Maximization in Downlink LTE”, Journal of Theoretical and Applied Information Technology, Vol. 58, No.2, pp. 413-420, 2013.
 
[10]  D. Dimitrova, J. Berg, G. Heijenk, R. Litjens ,”LTE uplink scheduling Low level analysis”, Master thesis, 1 University of Twente, Netherlands, 2 TNO ICT, Delft, The Netherlands, 2012.
 
[11]  K. Loa, C. Wu, S. Sheu, Y. Yuan, M. Chion, D. Huo, L.Xu, “IMT-Advanced Relay Standards”, IEEE Communications Magazine, Vol. 48, No. 8, pp. 40-48, 2010.
 
[12]  P. Vieira, P. Queluz, A. Rodrigues, “LTE Spectral Efficiency using Spatial Multiplexing MIMO for Macro-cells” , 2nd International Conference on Signal Processing and Communication Systems (ICSPCS) , 2008, pp1-6.
 
[13]  M.U. Sheikh, R. Jagusz, J. Lempiäinen, ”Performance Evaluation of Adaptive MIMO Switching in Long Term Evolution”, 7th International Wireless Communications and Mobile Computing Conference (IWCMC), 2011.
 
[14]  H. Taoka, s. Nagata, K. Takeda, Y. Kakishima, X. She, and K. Kusame, '' MIMO and COMP in LTE-Advanced, '' NTT DOCOMO Technical Journal, Vol.12, No.2, pp: 20-28, 2013.
 
[15]  S. Kale, A.N. Jadhav,”An Empirically Based Path Loss Models for LTE-A and Modeling for 4G Wireless Systems at 2.4 GHz, 2.6 GHz and 3.5 GHz,” IJAIEM, Volume 2, Issue 9, pp.252-257, Sept, 2013.
 
[16]  E. H. Abdelhay, F. W. Zaki, S. S. Kishk, H. S. Moustafa, “Uplink Performance of Multihop LTE-A Based on Different Propagation Models”, Mediterranean Journal of Electronics and Communications (MEDJEC), Vol.10, No.4, 2014, pp: 746-757.
 
[17]  E. H. Abdelhay, F. W. Zaki, S. S. Kishk, H. S. Moustafa, “Spatial Diversity and Multiplexing Effects on Uplink Multi-hop LTE-Advanced”, Mansoura Engineering Journal (MEJ), 2015, Vol.40, No.2.
 
Show Less References

Article

Analysis of the Operation of the Systems with Distributed Parameters with the Adjusting System Objects

1Department Computer Systems and Networks, Azerbaijan Technical University, Baku, Azerbaijan

2Department Applied Informatics, Azerbaijan Technical University, Baku, Azerbaijan


International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 30-33
doi: 10.12691/iteces-3-1-4
Copyright © 2015 Science and Education Publishing

Cite this paper:
Musayev Vidadi Hasan, Huseynov Natig Etibar. Analysis of the Operation of the Systems with Distributed Parameters with the Adjusting System Objects. International Transaction of Electrical and Computer Engineers System. 2015; 3(1):30-33. doi: 10.12691/iteces-3-1-4.

Correspondence to: Musayev  Vidadi Hasan, Department Computer Systems and Networks, Azerbaijan Technical University, Baku, Azerbaijan. Email: musayev_vidadi@mail.ru

Abstract

An analysis of the trunk oil pipeline mode with multiple adjustable intermediate pumping stations is conducted on the example of the trunk oil pipeline basing on the developed computational models of transient processes in the systems with distributed parameters with the adjusting system objects.

Keywords

References

[1]  Zaitsev L.A. Regulation of operation modes of trunk pipelines. M .: Nedra, 1982, 136 pp.
 
[2]  Musayev V.H. Dynamic processes in complex systems with distributed parameters. LAP LAMBERT Academic Publishing. 2014, 127 pp.
 
[3]  Musayev V.H. Development of computational models of transient processes in the systems with distributed parameters with the adjusting system objects. Міжнародний науково-технічний журнал “Інформаційні технології та комп’ютерна інженерія” (International scientific-technical journal “Information Technology and computer engineering”), 2013, No 2, 46-63 pp.
 
[4]  Musaev V.H. Discrete method and system-structural analysis for dynamic problem solutions in the trunk pipeline systems // Machine building news M.: 2007, No10, 29-33pp.
 
[5]  Akhmadullin K.R. Methods of calculation and regulation of pumping stations of trunk pipelines // Oil industry, 2005, No 3,100-103 pp.
 
Show More References
[6]  Lisafin V.P. Study of the efficiency of stepwise control modes of OPS / Problems of the West Siberian fuel and energetic complex. Theses of the First Union Scientific-technical conference. Ufa: 1982, 103-104 pp.
 
[7]  Kadymov Y.B. Transient processes in the systems with distributed parameters. M .: Nauka, 1968, 192 pp.
 
[8]  Zhidkova M.A. Pipeline transportation of gas. Kiev, Naukova Dumka, 1973, 142 pp.
 
[9]  Charny I.A. Unsteady flow of real fluid in pipes. Moscow: Nedra, 1975, 296 pp.
 
[10]  Ditkin V.A., Prudnikov A.P. Handbook of operational calculations. M .: Higher School, 1965, 465 pp.
 
Show Less References