We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Secure Multipath Data Routing using Cloud Platform

Published on May 2012 by K. Radhika
National Conference on Advances in Computer Science and Applications (NCACSA 2012)
Foundation of Computer Science USA
NCACSA - Number 5
May 2012
Authors: K. Radhika
b97d3c1c-a2c2-4539-9a28-c1c833e55fe8

K. Radhika . Secure Multipath Data Routing using Cloud Platform. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 5 (May 2012), 9-12.

@article{
author = { K. Radhika },
title = { Secure Multipath Data Routing using Cloud Platform },
journal = { National Conference on Advances in Computer Science and Applications (NCACSA 2012) },
issue_date = { May 2012 },
volume = { NCACSA },
number = { 5 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/ncacsa/number5/6506-1031/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%A K. Radhika
%T Secure Multipath Data Routing using Cloud Platform
%J National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%@ 0975-8887
%V NCACSA
%N 5
%P 9-12
%D 2012
%I International Journal of Computer Applications
Abstract

The concept behind secure data collection using randomized dispersive routes used for preventing compromised node and denial of service attacks. These two attacks are familiar for generating black holes during passive interception and information block delivery. A randomized path delivery for secure and reliable data collection in wireless sensor networks was designed to generate highly randomized dispersive routes at low energy cost and by reducing the unnecessary retransmissions and improve energy efficiency. Besides randomness, the generated routes are evolved using two propagation techniques NRRP & DRP so as to achieve energy consumption under given security constraints without generating extra copies of secret shares. In this paper, we propose to implement cloud platform, a third party onsite (TPO) and a third party field (TPF). Afore said proposal shall increase the agility of the concept and shall eliminate the drawbacks of existing concept.

References
  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks," IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
  2. Cong Wang,Qian Wang,Kui Ren,Wenjing Lou (2010),"Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing".
  3. A. L. Ferrara, M. Greeny, S. Hohenberger, M. Pedersen (2009), "Practical short signature batch verification", in Proceedings of CT-RSA, volume 5473 of LNCS. Springer-Verlag, pp. 309–324.
  4. H. Shacham, B. Waters (Dec 2008), "Compact proofs of retrievability", in Proc. of Asiacrypt 2008, vol. 5350, pp. 90–107
  5. M. A. Shah, R. Swaminathan, M. Baker (2008), "Privacy preserving audit and extraction of digital contents",Cryptology ePrint Archive.
  6. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou (2009), "Enabling public verifiability and data dynamics for storage security in cloud computing", in Proc. of ESORICS'09, Saint Malo.
  7. Wang, K. Ren, W. Lou (2010), "Achieving secure, scalable, and fine-grained access control in cloud computing", in Proc. of IEEE INFOCOM'10, San Diego, CA, USA.
  8. C. L. Barrett, S. J. Eidenbenz, L. Kroc, M. Marathe, and J. P. Smith, "Parametric Probabilistic Sensor Network Routing," Proc. ACM Int'l Conf. Wireless Sensor Networks and Applications (WSNA), pp. 122-131, 2003.
  9. M. Burmester and T. V. Le, "Secure Multipath Communication in Mobile Ad Hoc Networks," Proc. Int'l Conf. formation Technology: Coding and Computing, pp. 405-409, 2004.
  10. W. Lou and Y. Kwon, "H-Spread: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks," IEEE Trans. Vehicular Technology, vol. 55, no. 4, pp. 1320- 1330, July 2006.
  11. W. Lou, W. Liu, and Y. Fang, "Spread: Enhancing Data Confidentiality in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, vol. 4, pp. 2404-2413, Mar. 2004.
  12. R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, "SecMR—a Secure Multipath Routing Protocol for Ad Hoc Networks," Ad Hoc Networks, vol. 5, no. 1, pp. 87-99, Jan. 2007.
  13. B. Vaidya, J. Y. Pyun, J. A. Park, and S. J. Han, "Secure Multipath Routing Scheme for Mobil e Ad Hoc Network," Proc. IEEE Int'l Symp. Dependable, Autonomic and Secure Computing, pp. 163-171, 2007.
  14. A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep, 2009.
  15. Cong Wang,Qian Wang,Kui Ren,Wenjing Lou (2009),"Ensuring Data Storage Security in Cloud Computing".
Index Terms

Computer Science
Information Sciences

Keywords

Tpo Tpf Propagation Schemes Multipath Routes