2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018
There is need to convert paper books and documents into text. OCR is still imperfect as it occasi... more There is need to convert paper books and documents into text. OCR is still imperfect as it occasionally mis-recognizes letters and falsely identifies scanned text, leading to misspellings and linguistics errors in the OCR output text. A multilingual voice creation toolkit that supports the user in building voices for the Open source MARY TTS platform, for two state-of-the-art speech synthesis technologies: unit selection and HMM-based synthesis. For languages not yet supported by MARY TTS, the toolkit provides the necessary tools and generic reusable run-time system modules for adding support for a new language. Here, discussed the design and implementation of assistive platforms, and combine today's growing technology along with smart phone capabilities with the advantages offered by the high scalable and reactive cloud resources, making it a more economical and cost-effective way
Cloud computing allows consumers and businesses to use applications without installation and acce... more Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computers with internet access. Personal Health Record(PHR) is an emerging patient centric model of health information exchange, which is outsourced to be stored at a third party, such as cloud providers. Issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation have remained the most important challenges towards fine-grained, cryptographically enforced data access control. In the proposed work, a novel patient centric framework and a mechanism for data access control to PHRs stored in semi structured servers. A high degree of patient privacy is ensured by exploiting Homomorphic Encryption technique. It also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break glass access under emergency scenarios without revealing th...
A disgusting problem in public cloud is to securely share data based on fine grained access contr... more A disgusting problem in public cloud is to securely share data based on fine grained access control policies and unauthorized key management. Existing approaches to encrypt policies and data with different keys based on public key cryptosystem are Attribute Based Encryption and proxy re-encryption. The weakness behind approaches is: It cannot efficiently handle policy changes and also problem in user revocation and attribute identification. Even though it is so popular, when employed in cloud it generate high computational and storage cost. More importantly, image encryption is some out complex in case of public key cryptosystem. On the publication of sensitive dataset, it does not preserve privacy of an individual. A direct application of a symmetric key cryptosystem, where users are served based on the policies they satisfy and unique keys are generated by Data Owner (DO). Based on this idea, we formalize a new key management scheme, called Symmetric Chaos Based key Management (S...
International Journal of Engineering and Future Technology, 2016
Cloud Computing is a large scale distributed computing technology where resource are virtualized ... more Cloud Computing is a large scale distributed computing technology where resource are virtualized and provide service over the internet. One of the important functionality of the cloud is data sharing and shows how securely; efficiently and flexibly share data with others in the cloud storage. We describe a new public key cryptosystem that provide a constant size ciphertexts. The novelty is that all the keys in the ciphertext can aggregate into a single key, but the aggregate key encompassing the power of all the keys in the ciphertext and deliver authentication of the user. Encryption of the plaintext is performed by using a new encryption technique named as Onion Encryption. Aggregate keys are sent through a secure network, but the encrypted files outside set remains close. Data dynamics can be implemented to validate the user and the validated users can update, delete and modify the data stored in the cloud. It can be used to flexibly share data with others in the cloud storage.
Cloud computing is one of the fastest growing segments of IT industry since the users commitments... more Cloud computing is one of the fastest growing segments of IT industry since the users commitments for investment and costs are in relation to usage.The goal of cloud computing is to apply traditional supercomputing or high performance computing power, normally used by military and research facilities to perform tens of trillions of computations per second, in consumer oriented applications such as social networks, financial portfolios, to deliver personalized information, to provide data storage or to power large immersive computer games. Social networks in cloud are used to reflect real world relationships that allow users to share information and form connections between one another, essentially creating dynamic Virtual Organizations. It can be used to share/store data and information within a community ranging from low level computation or storage through high level mash-ups such as photo storage. Anonymous authentication is a technique enabling users to prove the privilege witho...
In Cloud environment, variety of resources can be accessed freely or by the pay-per-use schemes. ... more In Cloud environment, variety of resources can be accessed freely or by the pay-per-use schemes. In addition to this kind of resource sharing, it also provides different types of services and sharing schemes which are very effective in the cloud applications. One among them is the personal health record sharing. It is a patient centric framework which exchanges the health details of the patients to the required users in a secure and safe manner. Different encryption schemes are used to securely share the data but all suffers from certain security issues. Hence we propose a new technique called Secure Alternate viable technique which overcomes all the security issues in sharing the personal health data. Keywords—Key Generation Module (KGM), Transitional Encapsulation Module (TEM), Alternate Decryption Module (ADM), Additive Homomorphic Encryption (AHE)
Service oriented domain like cloud computing, composite service selection is hard to accomplish i... more Service oriented domain like cloud computing, composite service selection is hard to accomplish in an effective manner. The high scalability of distributed systems, and large transaction of data bases, it is a vital important to categorizes the efficient methods for distributed mining. Researcher on web has given a great attention to web usage mining which is an evolution of internet to evaluate user profiles and knowledge sharing of web content. This paper discloses the efficient relationship between the local and global transaction data items. It extracts valuable information from the large amount of data available in the user web sessions. To segment the data, the distance between the two user sessions is measured with the help of similarity distance measures. Aim of this paper is to introduce a technique called registry federation mechanism to meet the associated business requirements and it also describes a distributed algorithm for sequential mining within registry federation.
Cloud computing is widely getting acceptance due to its low cost and shared computing capabilitie... more Cloud computing is widely getting acceptance due to its low cost and shared computing capabilities. However trust, security and privacy are the major concerns in cloud environment. A systematic survey was done on various emerging access control mechanisms being employed in cloud environments. The existing access control mechanisms strive to achieve greater flexibility, scalability, dynamic support, security, and fine-grained access. Encryption based access control techniques able to achieve data security along with privacy protection. However they require additional key management infrastructure. Providing support to a continuously varying user dynamics and supporting a multi-user setting also getting importance. Protecting the data from cloud learning and forbidding the server accessing user access structure is effectively tackled at the cost of complexity and computational burden. Ensuring trust on the server side at the same time providing real user with required access are the m...
2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018
There is need to convert paper books and documents into text. OCR is still imperfect as it occasi... more There is need to convert paper books and documents into text. OCR is still imperfect as it occasionally mis-recognizes letters and falsely identifies scanned text, leading to misspellings and linguistics errors in the OCR output text. A multilingual voice creation toolkit that supports the user in building voices for the Open source MARY TTS platform, for two state-of-the-art speech synthesis technologies: unit selection and HMM-based synthesis. For languages not yet supported by MARY TTS, the toolkit provides the necessary tools and generic reusable run-time system modules for adding support for a new language. Here, discussed the design and implementation of assistive platforms, and combine today's growing technology along with smart phone capabilities with the advantages offered by the high scalable and reactive cloud resources, making it a more economical and cost-effective way
Cloud computing allows consumers and businesses to use applications without installation and acce... more Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computers with internet access. Personal Health Record(PHR) is an emerging patient centric model of health information exchange, which is outsourced to be stored at a third party, such as cloud providers. Issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation have remained the most important challenges towards fine-grained, cryptographically enforced data access control. In the proposed work, a novel patient centric framework and a mechanism for data access control to PHRs stored in semi structured servers. A high degree of patient privacy is ensured by exploiting Homomorphic Encryption technique. It also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break glass access under emergency scenarios without revealing th...
A disgusting problem in public cloud is to securely share data based on fine grained access contr... more A disgusting problem in public cloud is to securely share data based on fine grained access control policies and unauthorized key management. Existing approaches to encrypt policies and data with different keys based on public key cryptosystem are Attribute Based Encryption and proxy re-encryption. The weakness behind approaches is: It cannot efficiently handle policy changes and also problem in user revocation and attribute identification. Even though it is so popular, when employed in cloud it generate high computational and storage cost. More importantly, image encryption is some out complex in case of public key cryptosystem. On the publication of sensitive dataset, it does not preserve privacy of an individual. A direct application of a symmetric key cryptosystem, where users are served based on the policies they satisfy and unique keys are generated by Data Owner (DO). Based on this idea, we formalize a new key management scheme, called Symmetric Chaos Based key Management (S...
International Journal of Engineering and Future Technology, 2016
Cloud Computing is a large scale distributed computing technology where resource are virtualized ... more Cloud Computing is a large scale distributed computing technology where resource are virtualized and provide service over the internet. One of the important functionality of the cloud is data sharing and shows how securely; efficiently and flexibly share data with others in the cloud storage. We describe a new public key cryptosystem that provide a constant size ciphertexts. The novelty is that all the keys in the ciphertext can aggregate into a single key, but the aggregate key encompassing the power of all the keys in the ciphertext and deliver authentication of the user. Encryption of the plaintext is performed by using a new encryption technique named as Onion Encryption. Aggregate keys are sent through a secure network, but the encrypted files outside set remains close. Data dynamics can be implemented to validate the user and the validated users can update, delete and modify the data stored in the cloud. It can be used to flexibly share data with others in the cloud storage.
Cloud computing is one of the fastest growing segments of IT industry since the users commitments... more Cloud computing is one of the fastest growing segments of IT industry since the users commitments for investment and costs are in relation to usage.The goal of cloud computing is to apply traditional supercomputing or high performance computing power, normally used by military and research facilities to perform tens of trillions of computations per second, in consumer oriented applications such as social networks, financial portfolios, to deliver personalized information, to provide data storage or to power large immersive computer games. Social networks in cloud are used to reflect real world relationships that allow users to share information and form connections between one another, essentially creating dynamic Virtual Organizations. It can be used to share/store data and information within a community ranging from low level computation or storage through high level mash-ups such as photo storage. Anonymous authentication is a technique enabling users to prove the privilege witho...
In Cloud environment, variety of resources can be accessed freely or by the pay-per-use schemes. ... more In Cloud environment, variety of resources can be accessed freely or by the pay-per-use schemes. In addition to this kind of resource sharing, it also provides different types of services and sharing schemes which are very effective in the cloud applications. One among them is the personal health record sharing. It is a patient centric framework which exchanges the health details of the patients to the required users in a secure and safe manner. Different encryption schemes are used to securely share the data but all suffers from certain security issues. Hence we propose a new technique called Secure Alternate viable technique which overcomes all the security issues in sharing the personal health data. Keywords—Key Generation Module (KGM), Transitional Encapsulation Module (TEM), Alternate Decryption Module (ADM), Additive Homomorphic Encryption (AHE)
Service oriented domain like cloud computing, composite service selection is hard to accomplish i... more Service oriented domain like cloud computing, composite service selection is hard to accomplish in an effective manner. The high scalability of distributed systems, and large transaction of data bases, it is a vital important to categorizes the efficient methods for distributed mining. Researcher on web has given a great attention to web usage mining which is an evolution of internet to evaluate user profiles and knowledge sharing of web content. This paper discloses the efficient relationship between the local and global transaction data items. It extracts valuable information from the large amount of data available in the user web sessions. To segment the data, the distance between the two user sessions is measured with the help of similarity distance measures. Aim of this paper is to introduce a technique called registry federation mechanism to meet the associated business requirements and it also describes a distributed algorithm for sequential mining within registry federation.
Cloud computing is widely getting acceptance due to its low cost and shared computing capabilitie... more Cloud computing is widely getting acceptance due to its low cost and shared computing capabilities. However trust, security and privacy are the major concerns in cloud environment. A systematic survey was done on various emerging access control mechanisms being employed in cloud environments. The existing access control mechanisms strive to achieve greater flexibility, scalability, dynamic support, security, and fine-grained access. Encryption based access control techniques able to achieve data security along with privacy protection. However they require additional key management infrastructure. Providing support to a continuously varying user dynamics and supporting a multi-user setting also getting importance. Protecting the data from cloud learning and forbidding the server accessing user access structure is effectively tackled at the cost of complexity and computational burden. Ensuring trust on the server side at the same time providing real user with required access are the m...
Uploads
Papers by venifa mini