Tuesday, February 27, 2018

An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks


The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an early pollution detection algorithm able to spot the presence of an attack while fetching the data from cloud storage during the normal disk reading operations. 

Thus each fragment is check for malicious content and passed over to the server for processing. 

The alarm triggers a procedure that locates the polluting nodes in early stage of processing to avoid the intrusion. Also to detect the polluted content hashing methods are used. In this way, after network peers receive the transmitted data, hash value is calculated by hash functions and then the result is compared with the received hash value from the content distribution network (CDN) servers to determine whether the transmitted data is polluted or not. 

I proposed system to addresses in preserving user data confidentiality and integrity after outsourcing. For this concern, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy. 

By Vani. S | Priya Radhika Devi. T"An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10744.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10744/an-efficient-securing-code-based-cloud-storage-using-rc5-encryption-algorithm-against-pollution-attacks/vani-s

peer reviewed journals, manuscript submission, call for paper engineering

An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing


E- Healthcare system monitors the health condition and gives medical treatment through our web application. They collect the real time personal information (PHI) and patient's physical problem and transmitted it to the healthcare provider. To securely share the PHR information in cloud computing, a patient divides his PHR information M into two parts: personal information m1 that may contain the patient's name, social security number, telephone number, home address, etc. The medical record m2 which does not contain sensitive personal information, such as medical test results, treatment protocols, and operation notes. 


Then the patient adopts CP-ABE scheme to encrypt the information m1 and m2 by different access policies based on the actual need. Also we propose The Clinical Document Architecture (CDA). Our CDA document integration system integrates multiple CDA documents per patient into a single CDA document and physicians and patients can browse the clinical data in chronological order and historical wise. 

By Archana. P | Prasanna. S"An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10785.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10785/an-efficient-file-hierarchy-based-e-system-with-clinical-document-architecture-in-cloud-computing/archana-p

international peer reviewed journal, paper publication for engineering, conference issue publication

Practical data hiding technique in Covert timing channels


Out of order arrival of packets is an inevitable phenomenon on the Internet. Application performance can degrade to a great extent due to out-of-order arrival of packets Packet reordering is a common phenomenon on the Internet. Moreover, it is handled transparently from the user and application-level processes. In this paper, we propose a novel covert channel technique using the packet reordering phenomenon as a host for carrying secret communications. This makes it an attractive medium to exploit for sending hidden signals to receivers by dynamically manipulating packet order in a network flow. 


In our approach, specific permutations of successive packets are selected to enhance the reliability of the channel, while the frequency distribution of their usage is tuned to increase stealthiness by imitating real Internet traffic. It is very expensive for the adversary to discover the covert channel due to the tremendous overhead to buffer and sort the packets among huge amount of background traffic. A simple tool is implemented to demonstrate this new channel. 

We studied extensively the robustness and capabilities of our proposed channel using both simulation and experimentation over large varieties of traffic characteristics. The reliability and capacity of this technique have shown promising results. We also investigated a practical mechanism for distorting and potentially preventing similar novel channels. 

By M. Gokul Narayanan | PS. Lokesh | N. Kanimozhi"Practical data hiding technique in Covert timing channels"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10777.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10777/practical-data-hiding-technique-in-covert-timing-channels/m-gokul-narayanan

high impact factor, ugc approved journals for engineering, special issue publication

An Experimental Analysis of Turning Operation in SAE E52100 Alloy


Turning is a one type of machining process typically a non-rotary tool bit by moving linearly while the work piece rotates. It is used to create a cylindrical part by cutting unwanted materials. Today computer numerical control can be used, better known as CNC. Axles and shafts can be manufactured by turning process.by the different machining parameters such as feed, depth of cut and speed production rate and the quality of the product can also increase. 


Optical parameters play an important role in increase the productivity, reducing lead time with desired product quality at minimum cost. The experiments were conducted with Taguchi's L 9 mixed orthogonal array. EN 31 alloy steel can be machined by the Non-coated insert in computer numerical control lathe(CNC). By using the optical parameters individually for minimum surface roughness and maximum material removal rate(MRR) were found using taguchi analysis. 

Rakesh.V | Ramesh. P | Sundar. C | Rajamurthy. G"An Experimental Analysis of Turning Operation in SAE E52100 Alloy"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9631.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mineral-and-metallurgical-engineering/9631/an-experimental-analysis-of-turning-operation-in-sae-e52100-alloy/rakeshv

high impact factor, ugc approved journals for engineering, special issue publication

Effect of Confinement on Reinforce Concrete Short Rectangular Column


In this paper presents a comparative investigation based on various types of effective confining material, like (stapled stirrups, WWM, welded spot stirrups, ferrocement, FRP).The transverse reinforcement plays an important role in the ductility of the column. The preparedness for the formation of the plastic hinges in column, it requires confinement of concrete by transverse reinforcement. 


To study the effectiveness of the Confinement reinforcement, its quantity, working out the optimum combination of the confinement reinforcement and also the load carrying capacity of the rectangular column. The study of rectangular column is significant as it is used mostly in the practical building construction. This project is high lighting the study of 'œstudy the different types of effective confining material on RC rectangular column' by improving the confining quality. It also adds the different properties of reinforced concrete column. 

By Khatri A. P"Effect of Confinement on Reinforce Concrete Short Rectangular Column"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9649.pdf 

Direct URL: http://www.ijtsrd.com/engineering/civil-engineering/9649/effect-of-confinement-on-reinforce-concrete-short-rectangular-column/khatri-a-p

manuscript publication, submit paper online, indexed journal

Comparative Study of Hybrid Fiber Reinforced Concrete Deep Beam under Shear


As per the Indian standard a beam shall be considered as deep beam when the ratio of effective span to overall depth is less than 2 for simply supported & 2.5 for continuous beam. Deep beam transfer the load by shearing action rather than flexural action. Shear strength of concrete beam is not well defined as it is complex phenomenon. To improve shear strength & deformation of cement matrix mixed (Crimped steel - Polypropylene) fibers are used. 


By adding steel fiber it is observed that crack resistance and crack control is improved. Also polypropylene fiber is improving compressive strength, shear strength, resistance to aggressive agents, micro crack control. 

Therefore we use hybrid fibers (Crimped steel - Polypropylene) as reinforcement in concrete to improve homogeneous, isotropic characteristics, Tensile & shear response by arresting micro crack, crack penetration & propagation. The several recently published articles & technical papers dealing with implementation of hybrid fibers in concrete matrixes. 

by Mr. Shelke A. S | Ms. Kognole R. S"Comparative Study of Hybrid Fiber Reinforced Concrete Deep Beam under Shear"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9640.pdf  

Direct URL: http://www.ijtsrd.com/engineering/civil-engineering/9640/comparative-study-of-hybrid-fiber-reinforced-concrete-deep-beam-under-shear/mr-shelke-a-s

best journal, manuscript submission, call for paper engineering


Direct Tension Test on Expanded Metal Mesh and Welded Square Mesh for Ferrocement Composite


Ferrocement is a special type of mortar which is usually reinforced with steel wires which can perform very well as far as crack control, impact resistance and toughnes is concern. Ferrocement has very high tensile strength to weight ratio. This project presents an experimental study on Tensile strength of different wire meshes which normally used now a days. The main objective of these experimental tests is to study the effect of using different types as well as different number of wire meshes. Test result shows that elongation of Expanded wire mesh is quite high than Welded Square Mesh. 


By Pallavi Sameer Parande"Direct Tension Test on Expanded Metal Mesh and Welded Square Mesh for Ferrocement Composite"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9668.pdf 

Direct URL: http://www.ijtsrd.com/engineering/civil-engineering/9668/direct-tension-test-on-expanded-metal-mesh-and-welded-square-mesh-for-ferrocement-composite/pallavi-sameer-parande

research papers, paper publication for engineering, conference issue publication