kapil Raghuwanshi - Academia.edu (original) (raw)
Uploads
Papers by kapil Raghuwanshi
Communications in computer and information science, 2024
International journal of computer applications, Jan 16, 2015
"Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it do... more "Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it doesn"t need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and "wormhole attack" is also present in those attacks. It is the most powerful attack and very difficult to detect in "wormhole attack" two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of "wormhole attack" is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is much larger than the path including wormhole tunnel.
Cloud computing is an efficient data sharing technique where users can directly store and access ... more Cloud computing is an efficient data sharing technique where users can directly store and access information through internet. Hence the chances of unauthorized access and security of data is an important issue in cloud computing, hence various techniques are implemented for the security of cloud data. Encryption is a technique of providing a secure access of data over internet, but chances of attack is still possible. Hence an efficient technique is implemented using the concept of multi-keyword based data retrieval in cloud computing with encryption [1]. Although the technique is efficient in terms of communication overhead and security from various attacks but further enhancements can be done in the technique to make it for secure and easy, hence a new and efficient technique is implemented in cloud computing using attribute based encryption and verification, the proposed technique implemented provides security from various attacks and provide less storage and communication overhead.
Lecture notes in networks and systems, 2020
Cloud computing is one of the latest fields of Computer Science Engineering that deals with provi... more Cloud computing is one of the latest fields of Computer Science Engineering that deals with providing services to the users of the system/network as per their requirements and on pay-per-use basis. It provides a simple, flexible, heterogeneous, and architecture-neutral platform from where the user can access the desired services with ease. It can be considered as a modified form of distributed computing. The entire operation of cloud computing is based on Internet; hence, we can consider it as Internet-based computing. Security for cloud systems is an important factor that ensures trust between the cloud service provider and the users. As cloud provides a centralized repository where all services and resources reside, it is very important to ensure the authorized access to them. As cloud is based on Pay-per-Use model, it is necessary that the user should access only those services and resources for which they had subscribed. Any type of unauthorized access will lead to some type of loss. In this paper, a technique to ensure authorized access by users to cloud resources and services has been proposed, so as to overcome the above-stated issues.
Cloud computing is an efficient data sharing technique where users can directly store and access ... more Cloud computing is an efficient data sharing technique where users can directly store and access information through internet. Hence the chances of unauthorized access and security of data is an important issue in cloud computing, hence various techniques are implemented for the security of cloud data. Encryption is a technique of providing a secure access of data over internet, but chances of attack is still possible. Hence an efficient technique is implemented using the concept of multi-keyword based data retrieval in cloud computing with encryption (1). Although the technique is efficient in terms of communication overhead and security from various attacks but further enhancements can be done in the technique to make it for secure and easy, hence a new and efficient technique is implemented in cloud computing using attribute based encryption and verification, the proposed technique implemented provides security from various attacks and provide less storage and communication overh...
Social Networking and Computational Intelligence
Cloud computing is one of the latest fields of Computer Science Engineering that deals with provi... more Cloud computing is one of the latest fields of Computer Science Engineering that deals with providing services to the users of the system/network as per their requirements and on pay-per-use basis. It provides a simple, flexible, heterogeneous, and architecture-neutral platform from where the user can access the desired services with ease. It can be considered as a modified form of distributed computing. The entire operation of cloud computing is based on Internet; hence, we can consider it as Internet-based computing. Security for cloud systems is an important factor that ensures trust between the cloud service provider and the users. As cloud provides a centralized repository where all services and resources reside, it is very important to ensure the authorized access to them. As cloud is based on Pay-per-Use model, it is necessary that the user should access only those services and resources for which they had subscribed. Any type of unauthorized access will lead to some type of loss. In this paper, a technique to ensure authorized access by users to cloud resources and services has been proposed, so as to overcome the above-stated issues.
2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015
Cloud Computing is an important way of communicating and share data over Internet. Cloud Computin... more Cloud Computing is an important way of communicating and share data over Internet. Cloud Computing enables transmission of data over Internet and resource utilization at data centers. But during data sharing and resource utilization security plays a vital role since the chances of attacks increases. The data to be stored at data centers needs to be retrieved without any data loss and attack. Hence a multi key based data retrieved with encryption is proposed previously but the techniques require more computational time and hence increase the overall cost. Here in this paper a new and efficient is implemented which uses the concept of Cipher text policy attribute based encryption using elliptic curve based key generation. The implementation is based on the concept of generating a new attribute for each and every data to be send and encrypt the data using the generated attribute and forms a tupple and stored at the storage site. The receiver then authenticates himself and enters the attribute and hence decrypts the data. The proposed methodology implemented here provides efficient retrieval of data over cloud as well as reduces computational time and cost.
International Journal of Computer Applications, Jan 16, 2015
"Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it do... more "Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it doesn"t need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and "wormhole attack" is also present in those attacks. It is the most powerful attack and very difficult to detect in "wormhole attack" two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of "wormhole attack" is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is much larger than the path including wormhole tunnel.
Communications in computer and information science, 2024
International journal of computer applications, Jan 16, 2015
"Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it do... more "Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it doesn"t need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and "wormhole attack" is also present in those attacks. It is the most powerful attack and very difficult to detect in "wormhole attack" two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of "wormhole attack" is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is much larger than the path including wormhole tunnel.
Cloud computing is an efficient data sharing technique where users can directly store and access ... more Cloud computing is an efficient data sharing technique where users can directly store and access information through internet. Hence the chances of unauthorized access and security of data is an important issue in cloud computing, hence various techniques are implemented for the security of cloud data. Encryption is a technique of providing a secure access of data over internet, but chances of attack is still possible. Hence an efficient technique is implemented using the concept of multi-keyword based data retrieval in cloud computing with encryption [1]. Although the technique is efficient in terms of communication overhead and security from various attacks but further enhancements can be done in the technique to make it for secure and easy, hence a new and efficient technique is implemented in cloud computing using attribute based encryption and verification, the proposed technique implemented provides security from various attacks and provide less storage and communication overhead.
Lecture notes in networks and systems, 2020
Cloud computing is one of the latest fields of Computer Science Engineering that deals with provi... more Cloud computing is one of the latest fields of Computer Science Engineering that deals with providing services to the users of the system/network as per their requirements and on pay-per-use basis. It provides a simple, flexible, heterogeneous, and architecture-neutral platform from where the user can access the desired services with ease. It can be considered as a modified form of distributed computing. The entire operation of cloud computing is based on Internet; hence, we can consider it as Internet-based computing. Security for cloud systems is an important factor that ensures trust between the cloud service provider and the users. As cloud provides a centralized repository where all services and resources reside, it is very important to ensure the authorized access to them. As cloud is based on Pay-per-Use model, it is necessary that the user should access only those services and resources for which they had subscribed. Any type of unauthorized access will lead to some type of loss. In this paper, a technique to ensure authorized access by users to cloud resources and services has been proposed, so as to overcome the above-stated issues.
Cloud computing is an efficient data sharing technique where users can directly store and access ... more Cloud computing is an efficient data sharing technique where users can directly store and access information through internet. Hence the chances of unauthorized access and security of data is an important issue in cloud computing, hence various techniques are implemented for the security of cloud data. Encryption is a technique of providing a secure access of data over internet, but chances of attack is still possible. Hence an efficient technique is implemented using the concept of multi-keyword based data retrieval in cloud computing with encryption (1). Although the technique is efficient in terms of communication overhead and security from various attacks but further enhancements can be done in the technique to make it for secure and easy, hence a new and efficient technique is implemented in cloud computing using attribute based encryption and verification, the proposed technique implemented provides security from various attacks and provide less storage and communication overh...
Social Networking and Computational Intelligence
Cloud computing is one of the latest fields of Computer Science Engineering that deals with provi... more Cloud computing is one of the latest fields of Computer Science Engineering that deals with providing services to the users of the system/network as per their requirements and on pay-per-use basis. It provides a simple, flexible, heterogeneous, and architecture-neutral platform from where the user can access the desired services with ease. It can be considered as a modified form of distributed computing. The entire operation of cloud computing is based on Internet; hence, we can consider it as Internet-based computing. Security for cloud systems is an important factor that ensures trust between the cloud service provider and the users. As cloud provides a centralized repository where all services and resources reside, it is very important to ensure the authorized access to them. As cloud is based on Pay-per-Use model, it is necessary that the user should access only those services and resources for which they had subscribed. Any type of unauthorized access will lead to some type of loss. In this paper, a technique to ensure authorized access by users to cloud resources and services has been proposed, so as to overcome the above-stated issues.
2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015
Cloud Computing is an important way of communicating and share data over Internet. Cloud Computin... more Cloud Computing is an important way of communicating and share data over Internet. Cloud Computing enables transmission of data over Internet and resource utilization at data centers. But during data sharing and resource utilization security plays a vital role since the chances of attacks increases. The data to be stored at data centers needs to be retrieved without any data loss and attack. Hence a multi key based data retrieved with encryption is proposed previously but the techniques require more computational time and hence increase the overall cost. Here in this paper a new and efficient is implemented which uses the concept of Cipher text policy attribute based encryption using elliptic curve based key generation. The implementation is based on the concept of generating a new attribute for each and every data to be send and encrypt the data using the generated attribute and forms a tupple and stored at the storage site. The receiver then authenticates himself and enters the attribute and hence decrypts the data. The proposed methodology implemented here provides efficient retrieval of data over cloud as well as reduces computational time and cost.
International Journal of Computer Applications, Jan 16, 2015
"Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it do... more "Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it doesn"t need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and "wormhole attack" is also present in those attacks. It is the most powerful attack and very difficult to detect in "wormhole attack" two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of "wormhole attack" is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is much larger than the path including wormhole tunnel.