Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Rizwana Shaikh

    ― Cloud computing data security and privacy is always the area of concern for the cloud users and providers. The user identity, credentials and data privacy etc., are some of the issues for which user needs to assure about proper control... more
    ― Cloud computing data security and privacy is always the area of concern for the cloud users and providers. The user identity, credentials and data privacy etc., are some of the issues for which user needs to assure about proper control by the provider. A tool to assess and select the cloud security based on the user demands is need in a cloud environment. Here a data security measurement tool is proposed that will be used to measure the cloud computing data security. Parameters for measuring the data security are identified and various cloud services are analyzed to measure the security against these parameters. Cloud Security Alliance report is also used to check the adequacy and accuracy of the cloud data security measure.
    The widespread popularity of digital crypt-currencies has led the foundation of Blockchain, which is fundamentally a public digital ledger to share information in a trustworthy and secure way. The concept and applications of Blockchain... more
    The widespread popularity of digital crypt-currencies has led the foundation of Blockchain, which is fundamentally a public digital ledger to share information in a trustworthy and secure way. The concept and applications of Blockchain have now spread from crypto-currencies to various other domains, including business process management, smart contracts, IoT and so on. Cloud Computing Services are growing every year and also used by various applications. Cloud service usage and monitoring is done by the cloud service provider. Based on the service level agreement, the cloud service is used and accessed by cloud user. This pay per use service model has led the foundation of various business in the technological eco system. The Security issues in cloud are also known and received substantial stability in the cloud computing services. The invention of blockchain for providing security and transparency, increases the trust between the service providers and consumers. The applications of...
    In the traditional Land Registration system practiced in India, there exists a middle man (broker) who establishes a contact between the buyer and seller, for instance if an individual wants to buy or sell a property, the broker will... more
    In the traditional Land Registration system practiced in India, there exists a middle man (broker) who establishes a contact between the buyer and seller, for instance if an individual wants to buy or sell a property, the broker will create and assemble all the obligatory physical documents with regards to an agreement as a proof of property. Brokers will ensure that the land/property would be registered by an authorised government office where all the attributes are noted down in a ledger and thereafter the whole transaction and purchasement between the two parties takes place. In this scenario, there are chances of losing or tampering of the documents as anyone with certain powers can access or alter the papers easily which in turn threatens this concrete proof of land. Thus, this type of system as compared to our proposed system in which we make use of a smart contract to deal with the assets and transactions among the participants, is relatively time consuming, less secure and unsynchronized where activities including corruption and fraudulence might be associated during the execution of the required process. With an amalgam of inspection and analysis regarding the old accustomed way and considering that Block-chain has an increased transparency and integrity maintenance along with the portability factor, we put forward a blockchain based land registration system which provides a transparent, secured and decentralised method for execution of transactions between the participants by employing the concept of hyper ledger.
    This paper proposes a method to develop a complete speech compression system using Devanagari script. This involves developing a phonetic recognizer which segments the words into a set of phoneme units (diphones and consonant clusters)... more
    This paper proposes a method to develop a complete speech compression system using Devanagari script. This involves developing a phonetic recognizer which segments the words into a set of phoneme units (diphones and consonant clusters) available in Devnagari Script. This is done using Hidden Markov Models (Baum-Welch and Viterbi methods). These recognized units are mapped onto a labeled phonetic database consisting of 850 phoneme units. The uttered speech can, thereby, be expressed using only the pointers to these entries. This results in speech compression. Weights are then assigned to each phoneme, which specify the pitch, the amount of stress laid while pronouncing it and the speed with which a person utters it. The speech is then reconstructed by applying concatenation synthesis for smoothing at segment boundaries. The use of Devanagari, here, has a distinct advantage over other languages since it is phonetic in nature.
    Cloud computing offers a rich set of services by pay per use basis. The features and technology offered by various providers created a great competitive market for the business. The various security issues are attracting attention, one of... more
    Cloud computing offers a rich set of services by pay per use basis. The features and technology offered by various providers created a great competitive market for the business. The various security issues are attracting attention, one of which is identity and privacy of the cloud user. Users are varied about the privacy of information which they have given to the provider at the time of registration. We present an analysis of various identity management systems and proposing a simple trust based scheme for a cloud computing application and service.
    Mumbai which is home to 20.41 million people and contributing roughly up-to 6.18% of India’s economy is the seventh most populated city in the world. Mumbai is surrounded by a long continuous coastline of 167Km. It gets an excess of... more
    Mumbai which is home to 20.41 million people and contributing roughly up-to 6.18% of India’s economy is the seventh most populated city in the world. Mumbai is surrounded by a long continuous coastline of 167Km. It gets an excess of 1,800mm rainfall during the monsoon months of June to September. But even after having abundant rainfall during the months of June to September, Mumbai faces acute water shortages in the remaining months due to the ever-increasing demand and improper management of water sources. In order to avoid such problems, we need to predict the water demand that will be required in the coming years so that we will get an ample amount of time to prepare for it and chalk up a plan for efficient water usage. Here we are proposing water prediction and requirements forecasting to enable the actual requirements and storage accordingly. The proper planning thereafter for the water can be done and shortage problems can be eliminated or removed to the maximum extent.
    Cloud computing is a way of delivering computing power and other resources on pay-per-use basis. Cloud can be of type public or private depending on the type of network is used for delivering the services. A cloud service comes under... more
    Cloud computing is a way of delivering computing power and other resources on pay-per-use basis. Cloud can be of type public or private depending on the type of network is used for delivering the services. A cloud service comes under various categories depending on the level of resource that is Infrastructure, platform or service. Many cloud computing services are available today to fulfill the user needs and demands. Cloud computing has also attracted many researchers for experimentation for new or existing services. Before deployment of actual cloud experimentation can be done with respect to available tools to perform testing and setting up the benchmarks. An analysis by considering various parameters of such tools is presented to provide guidelines about their working with cloud.
    This paper proposes a method to develop a complete speech compression system using Devanagari script. Any speech can be considered as a concatenation of basic sounds, called 'phonemes'. Most of this basic set is the same for all... more
    This paper proposes a method to develop a complete speech compression system using Devanagari script. Any speech can be considered as a concatenation of basic sounds, called 'phonemes'. Most of this basic set is the same for all languages, with a few language-specific additions. If this set can be identified, then we can use these phonemes as the fundamental building block for all speech. Words in any language can then be represented using a Devanagari Transform, which expresses them as a combination of Devanagari phonemes. This lends the process its language-independence. This approach involves developing a phonetic recognizer which segments the words into a set of phoneme units, using Hidden Markov Models. These recognized units are mapped onto a labeled phonetic database containing about 4000 phoneme units. The uttered speech can then be expressed using only the pointers to these entries. This results in compression by a factor of up to 1000. The speech is reconstructed b...
    Cloud computing is attracting great attention nowadays. The elastic nature of cloud makes it suitable for almost any type of organization. The major challenge faced by cloud users and providers are security concerns towards cloud... more
    Cloud computing is attracting great attention nowadays. The elastic nature of cloud makes it suitable for almost any type of organization. The major challenge faced by cloud users and providers are security concerns towards cloud services. These security issues acts as a barrier in the growth of cloud computing. The trust between provider and users is the most important factor to be considered for a cloud service and application. The notion of trust among the various cloud users is also essential to promote the reputation of various cloud providers and their offered services. Here we present an analysis of security issues in a cloud environment. Solution exists to a certain extent for various issues. There are trust based solutions available to provide security in various collaborative environments. Analysis of these solutions can be used to think about a trust based solution in a cloud computing environment.
    ABSTRACT Cloud Computing is a style of computing over the internet. It has a significant potential impact on every aspect of IT. The elastic nature of cloud makes it suitable for many types of organization. There are lots of benefits in... more
    ABSTRACT Cloud Computing is a style of computing over the internet. It has a significant potential impact on every aspect of IT. The elastic nature of cloud makes it suitable for many types of organization. There are lots of benefits in moving towards the cloud. Along with the benefits, it also suffers from various obstacles that act as a barrier in its growth. Various obstacles are identified one of which is security of data and applications. Security concerns in cloud computing is an active area of research and experimentation. Many security solutions are identified and many are evolving. Trust is also identified as one of the solutions for providing security and selecting a particular service. Various trust solution are existing for many collaborative environments. We are focusing on trust based solution for achieving security in cloud computing. A trust framework is proposed that calculates the trust value. A trust value acts as a means for selecting any cloud service, providing a security strength evaluator for service provider and users in a cloud computing environment.
    Page 1. Verification of Security properties of Payment Protocol Using AVISPA Rizwana Shaikh AR, Satish Devane Ramrao Adik Institute of Technology SIES Graduate School of Technology, India hellorizwana@gmail.com, srdevane@yahoo.com... more
    Page 1. Verification of Security properties of Payment Protocol Using AVISPA Rizwana Shaikh AR, Satish Devane Ramrao Adik Institute of Technology SIES Graduate School of Technology, India hellorizwana@gmail.com, srdevane@yahoo.com Abstract ...
    This paper proposes a method to develop a complete speech compression system using Devanagari script. Any speech can be considered as a concatenation of basic sounds, called 'phonemes'. Most of this basic set is the same for all... more
    This paper proposes a method to develop a complete speech compression system using Devanagari script. Any speech can be considered as a concatenation of basic sounds, called 'phonemes'. Most of this basic set is the same for all languages, with a few language-specific additions. If this set can be identified, then we can use these phonemes as the fundamental building block for all speech. Words in any language can then be represented using a Devanagari Transform, which expresses them as a combination of Devanagari phonemes. This lends the process its language-independence. This approach involves developing a phonetic recognizer which segments the words into a set of phoneme units, using Hidden Markov Models. These recognized units are mapped onto a labeled phonetic database containing about 4000 phoneme units. The uttered speech can then be expressed using only the pointers to these entries. This results in compression by a factor of up to 1000. The speech is reconstructed b...
    Over the past few years, researchers have been striving for a Utility Computing Model. Cloud computing allows delivering information technology on demand. Cloud Computing service providers provides resources by means of virtualization.... more
    Over the past few years, researchers have been striving for a Utility Computing Model. Cloud computing allows delivering information technology on demand. Cloud Computing service providers provides resources by means of virtualization. Applying these techniques however goes along with handling over ultimate control of data to a third party. This paper discusses several issues in virtualization security, summery of various
    ABSTRACT Cloud computing has attracted great attention due its various features. There are various rising concerns in its growth, one of which is security. Trust between provider and a user is the most important factor to be considered... more
    ABSTRACT Cloud computing has attracted great attention due its various features. There are various rising concerns in its growth, one of which is security. Trust between provider and a user is the most important factor to be considered for achieving security, which is also essential to promote the reputation of various cloud providers and their offered services. Here we present a trust based solution in terms of a trust model that can be used to calculate the security strength of a particular cloud service. The trust value acts as a means for selecting any cloud service.
    ABSTRACT Cloud Computing is a style of computing over the internet. It has a significant potential impact on every aspect of IT. The elastic nature of cloud makes it suitable for many types of organization. There are lots of benefits in... more
    ABSTRACT Cloud Computing is a style of computing over the internet. It has a significant potential impact on every aspect of IT. The elastic nature of cloud makes it suitable for many types of organization. There are lots of benefits in moving towards the cloud. Along with the benefits, it also suffers from various obstacles that act as a barrier in its growth. Various obstacles are identified one of which is security of data and applications. Security concerns in cloud computing is an active area of research and experimentation. Many security solutions are identified and many are evolving. Trust is also identified as one of the solutions for providing security and selecting a particular service. Various trust solution are existing for many collaborative environments. We are focusing on trust based solution for achieving security in cloud computing. A trust framework is proposed that calculates the trust value. A trust value acts as a means for selecting any cloud service, providing a security strength evaluator for service provider and users in a cloud computing environment.
    ... [14] Naima Iltaf, Mahmud U, Kamran F “Security &Trust Enforcement in Pervasive Computing Environment”, HONET 2006, pages 1-5, NUST Pakistan. ... [30] M Younas Javeed, Sidra Nawaz, Distributed Trust Based Access... more
    ... [14] Naima Iltaf, Mahmud U, Kamran F “Security &Trust Enforcement in Pervasive Computing Environment”, HONET 2006, pages 1-5, NUST Pakistan. ... [30] M Younas Javeed, Sidra Nawaz, Distributed Trust Based Access Control Architecture for Pervasive Computing”, The 4th ...
    Emerging e-commerce activity is giving scope for the design of many new protocols, and to gain confidence, these protocol need to be verified for its designed properties. Specifically protocol used in e-commerce transactions needs to be... more
    Emerging e-commerce activity is giving scope for the design of many new protocols, and to gain confidence, these protocol need to be verified for its designed properties. Specifically protocol used in e-commerce transactions needs to be verified for their security properties. ...