Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
There are several ways to transfer files from one computer system to another or from one user to another. But they are less secure. Secure File Transfer Protocol (SFTP) aimed at developing a secure file transfer system for fast and secure... more
There are several ways to transfer files from one computer system to another or from one user to another. But they are less secure. Secure File Transfer Protocol (SFTP) aimed at developing a secure file transfer system for fast and secure file transmission. This is a WinForms application in which, software on one system communicates with software on another remote system. It prevents passwords and other sensitive information from being transmitted in the clear over the network. Here the data as well the key used for the encryption will be encrypted by a software key. The 32-byte long private key is generated by SFTP, from the data and personal information of the user. It is again encrypted by using the static software key of SFTP and sent it along with the data. Software key and the sender's private key are hidden from the clients, so it provides more security to the data. This key is required to decrypt the data at the receiver. SFTP allows for the search of remote files and lock of files on a range of remote systems. Add-on directory listings and screen share are shown in an SFTP client. SFTP provides an interactive screen sharing between clients.
On-demand Cloud Computing (CC) offers users worldwide access to computing resources. It has two components; Sustainable IT is a complicated matter. The first and most complex issues are energy efficiency and the energy ratio of the IT... more
On-demand Cloud Computing (CC) offers users worldwide access to computing resources. It has two components; Sustainable IT is a complicated matter. The first and most complex issues are energy efficiency and the energy ratio of the IT environment. Secondly, there is the utilization of renewable. These two have to be dealt with. An application design plays a significant role in CC, while an efficient application structure may increase cloud data centres' energy efficiency and viability. However, cloud data centres consume a considerable amount of energy and leave a significant carbon footprint on an ecosystem. Data centres account for 1.98% of the global emission of CO2, just like aviation. Therefore, it is unavoidable for distributed cloud data centres to have energy and carbon-efficient technology. Cloud providers should also meet their required service quality while efficiently allocating computing resources to users. The main aim of this paper is to deal with the energy Copyright ⓒ 2020 SERSC 4145 problem and the carbon-efficient management of resources in geographically distributed cloud data centres. It emphasizes VM-positioning technology, examines the highest impact of energy and carbon cost parameters, migration from VM to renewable energy, and projections for optimal use from VMs.
'Big data' is a large measure of facts that can do something amazing. Big records in healthcare discuss the digital health records sets, which are so gigantic and complex that they are extraordinarily awkward to manipulate with the... more
'Big data' is a large measure of facts that can do something amazing. Big records in healthcare discuss the digital health records sets, which are so gigantic and complex that they are extraordinarily awkward to manipulate with the obsolete programming/equipment or even thru the traditional data management apparatuses and methods. In the healthcare business, exceptional hotspots for massive data include emergency health facility records, scientific information of patients, and aftereffects of scientific examinations, and gadgets that are a piece of IoT. That is the reason to supply appropriate options for improving open health, and healthcare suppliers are required to be equipped with becoming the foundation to produce and inspect astronomical data correctly. These facts should be of essential importance for finding out understandings that would be useful for enhancing consideration conveyance, reducing squanders, and in the implied time diminishing expenses. It can change the way healthcare suppliers utilize refined advances to accomplish information from their scientific records and different information distribution facilities and settle on knowledgeable choices.
Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate... more
Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing is a process of exchanging information from one station to other stations of the network. Routing protocols of mobile ad-hoc network tend to need different approaches from existing Internet protocols because of dynamic topology, mobile host, distributed environment, less bandwidth, less battery power. Ad Hoc routing protocols can be divided into two categories: Table-driven (proactive schemes) and on-demand routing (reactive scheme) based on when and how the routes are discovered. In Table-driven routing protocols each node maintains one or more tables containing routing information about nodes in the network whereas in on-demand routing the routes are created as and when required. Some of the Table ...
In our proposed model, the route selection is a function of following parameters: hop count, trust level of node and security level of application. In this paper, to focus on secure neighbor detection, trust factor evaluation, operational... more
In our proposed model, the route selection is a function of following parameters: hop count, trust level of node and security level of application. In this paper, to focus on secure neighbor detection, trust factor evaluation, operational mode, route discovery and route selection. The paper mainly address the security of geographic routing. The watchdog identifies misbehaving nodes, while the Pathselector avoids routing packets through these nodes. The watchdog, the pathselector is run by each server. In order to keep the source informed about the destination's mobility, the destination keeps sending the alert message to its previous hop telling that it has changed its position and any reference to it for data packet forwarding be informed to the VHR server.
In this March 2010 issue, we present selected publications from the active research area of core and applied computer science, networking, information retrieval, information systems, emerging communication technologies and information... more
In this March 2010 issue, we present selected publications from the active research area of core and applied computer science, networking, information retrieval, information systems, emerging communication technologies and
information security. The paper acceptance rate for this issue is 32%. The journal covers the state-of-art issues in the computer science and their applications in business, industry and other subjects. Printed copies of the journal are distributed to accredited universities and libraries. All the papers in IJCSIS are also available freely with online full-text content and permanent worldwide web link. The abstracts are indexed and available at major academic databases.

https://sites.google.com/site/ijcsis/Home
Research Interests: