Manuscripts

Recent Papers

Research Paper

Secured Data Access in Cloud Computing

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. This paper proposed some services for data security and access control when users outsource sensitive data for sharing on cloud servers. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to untrusted cloud servers without disclosing the underlying data contents. Our proposed scheme enables the data owner to delegate tasks of data file re-encryption and user secret key update to cloud servers without disclosing data contents or user access privilege information. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability and achieves fine - grainedness, scalability and data confidentiality for data access control in cloud computing. Extensive analysis shows that our proposed scheme is highly efficient and provably secures under existing security models.

Published by: Mayank Milind Murdio, Shrirang Rajiv Paretkar, Saurabh Sanjay Vaidya, Rushikesh Gajanan Duve

Author: Mayank Milind Murdio

Paper ID: V4I2-1200

Paper Status: published

Published: March 14, 2018

Full Details
Research Paper

Estimation of Land Surface Temperature using LANDSAT 8 Data

Land surface temperature (LST) is an important factor in many areas like climate change, urban land use/land cover, heat balance studies and also a key input for climate models. LANDSAT Data has given a lot of possibilities to study the land processes using remote sensing. This study has been made to estimate LST using Arc GIS over Hosur, Krishnagiri district, Tamil Nadu, India, using LANDSAT 8 satellite data. The LST has been estimated with respect to Normalized Difference Vegetation Index (NDVI) values determined from the Red and Near Infrared bands. The Land Surface Emissivity (LSE) is retrieved directly from the Thermal Infrared bands. The present study focuses on ArcGIS Raster functions and Raster calculation using the LANDSAT 8 April and November, thermal Bands (10 & 11). The results are feasible to Calculate NDVI, LSE and LST with appropriate accuracy.

Published by: Anandababu D, Purushothaman B M, Dr. S. Suresh Babu

Author: Anandababu D

Paper ID: V4I2-1195

Paper Status: published

Published: March 14, 2018

Full Details
Research Paper

Detection of Fake Indian Currency

Fake currency detection is a serious issue worldwide, affecting the economy of almost every country including India. The use of counterfeit currency is one of the major issues faced throughout the world now-a-days. The counterfeiters are becoming harder to track down because of their use of highly advanced technology. One of the most effective methods to stop counterfeiting can be the use of counterfeit detection software that is easily available and is efficient. Our project will recognize Indian currency notes using a real time image obtained from a webcam. The background of our topic is image processing technology and applying it for the purpose of verifying valid currency notes. The software will detects fake currency by extracting features of notes. The success rate of this software can be measured in terms of accuracy and speed. So our aim is to work on those parameters which will be impossible to implement on counterfeit notes so we started working on minutiae parameters which will be enough to differentiate between fake and original notes.

Published by: Gouri Sanjay Tele, Akshay Prakash Kathalkar, Sneha Mahakalkar, Bharat Sahoo, Vaishnavi Dhamane

Author: Gouri Sanjay Tele

Paper ID: V4I2-1173

Paper Status: published

Published: March 14, 2018

Full Details
Research Paper

A Study of Cost of Capital of ITC Limited

ITC was the first company in India to voluntarily seek a corporate governance rating. ITC's production facilities and hotels have won numerous national and international awards for quality, productivity, safety and environment management systems. This Study is based on the secondary data extracted from the annual reports of the company. The financial statements of ITC have been collected over a period of 5 years from 2013 to 2017. Companies strive to attain optimal financing mix based on the cost of capital for various funding sources. Every company has to chart out its plan for financing the business at an early stage. The cost of capital becomes a critical factor in deciding which financing track to follow – debt, equity or a combination of the two. The breakeven point is the sales volume at which a business earns exactly no money. The company calculate break-even point to determine the amount of remaining capacity after the breakeven point is reached, which tells the maximum amount of profit that can be generated.

Published by: B. Navaneetha, D. Nikhilaa, Mrudula. V. Raj

Author: B. Navaneetha

Paper ID: V4I2-1184

Paper Status: published

Published: March 14, 2018

Full Details
Research Paper

Gridlock Surveillance and Efficient Reconciliation

Now-a-days road congestion is a major problem due to increasing number of vehicles especially in cities.At present, video monitoring and surveillance systems have been widely used in traffic management.This project is designed in order to achieve effective traffic management. Here we use camera which is placed on the traffic pole that capture the image regularly in the traffic junction and calculates the vehicle density (approximately) in lanes using digital image processing technique. After calculating the density of vehicles, the high density lane is detected. According to that, the signal timing is allotted by using raspberry pi. This also provides facility to handle emergency vehicles automatically and efficiently by using IoT.

Published by: C. H. Jeevitha, S. Jeevitha, S. Jenifer, B. Mahalakshmi, S. V. Sathyah, S. Jeya Anusuya

Author: C. H. Jeevitha

Paper ID: V4I2-1209

Paper Status: published

Published: March 14, 2018

Full Details
Case Study

Integrated Collective Node Behavior Analysis with Onion Protocol for Best & Secured Data Transmission

Now-a-days communication from one place to another and transfer of data over the network has become an important part of our day to day life. Hence in order to make safe and secured data transmission in this communication process and to provide security to the data sent ‘Onion Protocol’ is used. Over here integrated collective node behavior analysis is done with Onion Protocol for best and secured data transmission. In Onion routing technique the sender and receiver remain anonymous. The sender remains unknown and anonymous because each intermediate node or onion router knows only the address or location of its preceding and following nodes.

Published by: V. Ohm Sri Eswar, Albert, Ankayarkanni B, B Vinil

Author: V. Ohm Sri Eswar

Paper ID: V4I2-1206

Paper Status: published

Published: March 14, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X