SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1427
MULTI-SERVER AUTHENTICATION KEY EXCHANGE APPROACH IN
BIGDATA ENVIRONMENT
Miss. Kiran More1, Prof. Jyoti Raghatwan2
1Kiran More, PG Student. Dept. of Computer Engg. RMD Sinhgad school of Engineering Warje, Pune
2Prof. Jyoti Raghatwan, Dept. of Computer Engg. RMD Sinhgad school of Engineering Warje, Pune
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The key establishment difficulty is the maximum
central issue and we learn the trouble of key organization for
secure many to many communications for past several years.
The trouble is stimulated by the broadcast of huge level
detached file organizations behind similar admission to
various storage space tactics. Our chore focal ideas on the
current Internet commonplace for such folder systems that is
Parallel Network Folder System [pNFS], which generates
employment of Kerberos to establish up similar session keys
flanked by customers and storing strategy. Our evaluation of
the available Kerberos bottommostprocedurevalidatesthatit
has a numeral of borders: (a) a metadata attendant make
imaginable key trade over sandwiched amongst the clients
and the packing devices has important workload that put a
ceiling on the scalability of the procedure; (b) the procedure
does not make available frontward confidentiality; (c) the
metadata waitron harvests herself all the gathering keys that
are cast-off flanked by the clients andpackingdevices, andthis
inherently shows the approach to key escrow. Inthisstructure,
we advocate an assortment of authentic key trade over
measures that are planned to tackle the above problems. We
determine that our events are competent of plunging up to
coarsely 54 presents of the assignment of the metadata server
and concurrently at the bottommost of onward privacy and
escrow freeness. All this need only a minute share of superior
than before scheming in the gases at the client.
Key Words: Parallel sessions, authenticated key
exchange, network file systems, forward secrecy, key
escrow.
1. INTRODUCTION
In similar file organizations, the file numbers are dispersed
across multiple storing devices or nodes toallowconcurrent
access by multiple tasks of a parallel application. That is
classically used in huge scale cluster figuring that attentions
on high act and reliable get to large datasets. That
sophisticated I/O bandwidth is accomplished through
coexisting fetching numbers to multiple stowing devices
indoors large subtracting clusters, despite the fact data loss
is thriving through data imitating using defect forbearing
striping procedures.
Few examples of high performance similar file
organizations that are in the production use are the IBM
Over-all Equivalent Files System. Whichareusuallyrequired
for advanced scientific or data exhaustive applications such
as digital animation studios, computational fluid dynamics,
and semiconductor manufacturing.
In these milieus, hundreds or thousands of file
structure clients bit data and engender very much high
summative I/O load on the file coordination supporting
petabytes or terabytes scale storage capacities. Liberated of
the enlargement of the knot and high-performance
computing, the arrival of clouds and the MapReduce
program writing model has resulted in file system such as
the Hadoop Distributed File System (HDFS).
In this exertion, we examine the issue of the secure
many to many communications in the large-scale systemfile
organizations which support parallel fetch to multiple
storing devices. That we considering the announcement
model anywhere there are a large number of the clients
editing many remote and circulated storage diplomacies in
parallel.
Particularly, we attempt to attention on how to
conversation the key supplies and creation of the equivalent
secure sittings between clients and storagecampaignsinthe
parallel Grid File System (pNFS), the up-to-date Internet
ethics in efficient and scalable manner. The advance ofpNFS
is driven by Sun, UMich/CITI, IBM, and EMC. Sothatitshares
many similar countryside and is sociable with many existing
commercial network file schemes. Our main goal in this
exertion is to design well-organized and secure genuine key
exchange protocols that meet specific needs of pNFS.
Particularly, we effort to meet the subsequent desirable
belongings, which have not.
More specifically, pNFS comprises a collection of
three protocols: (i) the pNFS protocol that transfers file
metadata, also known as a layout, among the metadata
server and a client node; (ii) the storage access protocol
which specifies how the client accesses data from the
associated storage devices according to the corresponding
metadata; and (iii) the control protocol which synchronizes
the state among the metadataserverandthestoragedevices.
In this paper, we have proposed Multi-Server
Authentication Key Exchange. Section 2 of this paper deals
with Literature Survey and Section 3 presents Proposed
System. Section 4 concludes this paper.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1428
2. LITERATURE SURVEY
System [1] Tele care Medical Information Systems (TMIS)
give a viable approach to increase the medicinal procedure
between specialists, attendants and patients. By pleasing to
the eye, the security and fortification of TMIS, it is essential
while testing to boost the TMIS so that an easygoing and a
high-quality can perform corresponding substantiation and
session key foundation utilizing a 3-party restorative server
while the safe information of the patient can be guaranteed.
In proposed framework, an unknown three-party
clandestine word legalized key trade (3PAKE) pact for TMIS
is utilized. The pact depends on the expert elliptic bend
cryptosystem. For security, weapplythepicalculationbased
proper authorization instrument ProVerif to validate that
our 3PAKE contract for TMIS can give secrecy to patient and
specialist and additionally accomplishes synchronized
verification and session key security. The benefitofplanned
plan is security and effectiveness that can be used as a part
of TMIS. For this J-PAKE based conventions are utilized. The
impediment of proposed plan is of it reduced session keys.
In [2] Michel Abdalla, David Pointcheval., “Simple
Password Based Encrypted Key Exchange Protocols”
Password-based encrypted key exchange are protocols that
are future to give combine of clients imparting over a
questionable station with a safe assembly key aside when
the anonymous key or secret keysharedamongsttwoclients
is pinched from a little arrangement of keys. In proposed
plot, two straightforward open sesame grounded fixed key
trade conventions in assessment of that of Bellovin and
Merritt. While one settlement is more reasonable to
situations in which the secret key is shared over numerous
servers, alternate gives healthier security. Both pacts are as
effective, if poorer, as any of the recent twisted key trade
conventions in the writing, but then they just require a
solitary arbitrary prophet occurrence. The confirmation of
safekeeping for both settlements is in the irregular prophet
show and in opinion of hardness of the computational Diffe-
Hellman issue. Nonetheless,a portionofthe methodsthatwe
utilize are very not the same as the typical ones and make
utilization of new variations of the Diffe-Hellman issue,
which are of autonomous intrigue.Weadditionallygivesolid
relations between the new variationsandthestandardDiffe-
Hellman issue. Preferred standpoint of this plan it is
conceivable to discover a few kinds of key. In these
dissimilar types of protocols are used like SIGMA, IKE etc.
A. Sai Kumar and P. Subhadra., “UserAuthentication
to Provide Security against Online Guessing Attacks”,
Passwords are unique of the most common causesofsystem
crashes [3], since the low entropy of passwords makes
frameworks helpless against savage compel speculating
assaults. Because of innovation passwords can be hacked
effectively. Mechanized Turing Tests retain on life a
successful, easy to-send way to deal with distinguish
robotized malignant login endeavors with sensible cost of
bother to clients. Henceforth in this proposed conspire the
deficiency of existing and proposed login conventions
intended to address large scale online word reference
assaults e.g. from a botnet of an enormous number of hubs.
In this plan proposed a straightforward plan that reinforces
watchword based confirmation conventions and averts
online word reference assaults and many-to-many attacks
common to 3-pass SPAKA protocols.
Anupam Datta, Ante Derek, John C. Mitchell, and
Bogdan Warinschi “Key Exchange Protocols: Security
Definition, Proof Method and Applications”, System [4]
proposed conspire Uses compositional technique for
demonstrating cryptographically stable security properties
of key trade conventions, in bright of a distinctive rationale
that is deciphered over routine keeps running of a
convention against a probabilisticpolynomial timeassailant.
Since thinking around an unbounded number of keeps
running of a convention includesenlistmentlikecontentions
about properties safeguarded by every run, we detail of a
secure key trade that, dissimilar to customary key in
recognize capacity, is shut under general piece with steps
that utilization the key. We exhibition formal authorization
rules in assessment of this enjoyment based complaint, and
prove that the verification morals are wide-ranging over a
computational semantics.
R.S. RamPriya, M.A. Maffina., “A Secured and
Authenticated Message Passing Interface for Distributed
Clusters”, In [5] a public network, at the point when various
bunches associated with each other is lengthened turns into
a likely danger to security applications running on the
groups. To address this issue, a Letter Passing Interface
(MPI) is produced to savesanctuarybenefitsinanunsecured
system. The proposed work concentratesonMPIasopposed
to different contracts in sunlit of the fact that MPI is a
standout amongst the most famous correspondence
conventions on appropriated groups. Here AES design is
operated for encryption/decoding and introduction
polynomial designisconsumedforkeyadministrationwhich
is then coordinated into Message Transient Interface
Trimmer rendition 2 (MPICH2) with typical MPI interface
that come to be to be ES-MPICH2. This ESMPICH2 is added
MPI that gives refuge and confirmation to conveyed groups
which is bound together into cryptographic and
mathematical idea. The real longing of ES-MPICH2isbackup
a huge collection of cunning and correspondencestages.The
proposed agenda depends on both cryptographic and
mathematical awareness which prompts to brimming with
blunder free memo passing border with improved security.
FengHao1andPeterRyan2., “J-PAKE:Authenticated
Key Exchange without PKI”, in [6] password Authenticated
Key Argument (PAKE) is unique of the essential subjects in
cryptography. It intends to address a pragmatic security
issue: how to size up secure correspondence between two
gatherings exclusively in sunny of a common secret word
without requiring a Public Key Infrastructure (PKI). After
over 10 years of broad research in this field, there havebeen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1429
a few PAKE conventions accessible. The EKE and SPEKE
plans are maybe the twomostoutstandingillustrations.Both
systems are however protected. In this rag, we audit these
methods in detail and outline different hypothetical and
functional shortcomings. Also, we exhibit added PAKE
prearrangement called J-PAKE. Our procedure is to bank on
upon firm primitives, for case, the Zero-Knowledge Proof
(ZKP). As such, the superior part of the past arrangements
has withdrawn from exploiting ZKP for the apprehension on
proficiency. We display in what manner to successfully
coordinate the ZKP into the pact outline and in the interim,
accomplish great productivity. Our convention has
practically identical computational productivity to the EKE
and SPEKE plans with clear advantages on security.
BrunoBlanchet., “AutomaticallyVerifiedMechanical
Resistant of One-Encryption Key Exchange”, System [7]
present an automated verification of the secret key based
convention One-Encryption Key Exchange (OEKE) utilizing
the computationally-solid convention prover CryptoVerif.
OEKE is a non-insignificant convention, and accordingly
motorizing its verification gives extra certainty that it is
right. This contextual investigation was additionally a
chance to actualize a few vital expansions of CryptoVerif,
valuable for demonstratingnumerousdifferentconventions.
We have without a doubt stretched out CryptoVerif to
bolster the computational Diffie Hellman presumption. We
have likewise included supportforevidencesthatdependon
Shoup’s lemma and extra amusement changes. Specifically,
it is presently believable to entrench case refinements
physically and to consolidation cases that no longer should
be recognized. In the long run, a few upgrades have been
involved the calculation of the prospect limits for attacks,
giving better cuts. Specifically, we augment over the typical
calculation of chanceswhen Shoup’slemma isutilized,which
permits us to increase the bound given in a past manual
evidence of OEKE, and to authenticate that the enemy can
test at most one secret word for each session of the
convention. In this tabloid, we introduce these
augmentations, with their application to the mark of OEKE.
All means of the verification, both programmed and
physically guided, are checked by CryptoVerif.
Feng Hao and PeterRyan.,“PasswordAuthenticated
Key Exchange by Juggling”, System [8] password-
Authenticated Key Exchange (PAKE) contemplates how to
physique up secure correspondence between two remote
gatherings exclusively in light of their mutual watchword,
without requiring a Public Key Infrastructure (PKI).
Regardless of broad research in the previous decade, this
issue stays unsolved. Patent has been one of the chief brakes
in sending PAKE arrangements practically speaking.
Furthermore, notwithstanding for the licensed plans like
EKE and SPEKE, their security is just heuristic; scientists
have reported some unpretentious yet stressing security
issues. In this rag, we put forward to handle this issue
utilizing an approach not quite the same as every past
arrangement. Our convention, Password Authenticated Key
Exchange by Juggling (JPAKE), accomplishes common
validation in two stages: initial, two gatherings send
transient open keys to each other; second, theyscramblethe
mutual secret key by juggling people in general keys
obviously. The principal utilizationofsucha jugglingmethod
was create in tackling the Dining Cryptographers issue in
2006. Here, we apply it to tackle the PAKE issue, and prove
that the convention is zero-learning as it uncovers nothing
aside from one-piece data: whether the providedpasswords
at two sides are the same. With clear points of interest in
security, our plan has equivalent proficiency to the EKE and
SPEKE protocols.
3. PROPOSED SYSTEM
3.1 Problem statement
To design and implement minimum multiple server file
distribution system where we store encrypted data on
different servers & the data will be equated & decrypted for
authentic user only using MapReduce technique.
3.2 System Architecture
In the proposed work to design and implement a system
which can provide parallel processing with key
authentication protocol in network file system in Hadoop
environment. The system provides Elgamal encryption
algorithm for provide the security to distributed data
servers. System also prevent SQL injection as well as data
collusion attack from external requests. System can
automatically manage the load balancing into different data
nodes.
Fig 1: Proposed System Architecture
System implementation protocol
pNFS-AKE-I: Our first protocol can be regarded as a
modified version of Kerberos which allows the client to
generate its own session keys.
pNFS-AKE-II: For address key escrow while achieving
forward secrecy concurrently. We incorporate a Diffie-
Hellman key agreement technique into Kerberos-like pNFS-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1430
AKE-I. Mainly, the client C and the storage device Si both
chooses a secret value and pre-computes a Diffie-Hellman
key component and session key is then generated from both
the Diffie-Hellman components.
pNFS-AKE-III: Our third protocol aims to achieve full
forward secrecy, which is, exposure of a long-term key
affects only a current session key, but not all the other past
session keys.
3.3 Algorithms
1. Diffie-Hellman Key Exchange Protocol
Diffie–Hellman creates a shared secret which can be used
for secret communicationswhileexchangingdata ona public
network. To implement Diffie-Hellman, the two end users
Alice and Bob, while communicating through a channel they
equally agree on two positive whole numbers q and g, such
as q is a prime number and g is a generator of q. The
generator g is a number that, when raised to positive whole-
number powers less than q, not ever produces the same
result for any two such whole numbers. The value of q may
be large but the value of g is typically small.
Once Alice and Bob have agreed on q and g in private, they
choose random positive whole-number m and n, Next, Alice
and Bob compute public keys A and B based on their
personal keys according to the formulas
1) A =gm mod q
2) B = gn mod q
The two users can share their public keys A and B over a
communications medium assumed to be insecure, such
as the Internet or a corporate wide area network (WAN).
From these public keys, a number x can be generated by
either user based on their own personal keys.
Alice computes K1 using the formula,
3) K1 = (B)m mod q
Bob computes K2 using the formula,
4) K2 = (A) n mod q
Obviously K1=K2, So this will be shared secret key among
Alice and Bob.
2. Elgamal Encryption scheme
Key Generation phase
Input: Plain text as text data d.
Output: a,b,p,g all are private keys
Step 1: Initialize the random message from user as d. (it
should be any kind of text data).
Step 2: initialize a,b,p,g for private key purpose.
Step 3: generate P as randomly base on bit length of d. so,
Ans[] =GetRandomP(d.getbyte).bitlength base on probable
prime no.
Step 4: p= Ans[0]
g = Ans[1]
Step 5: Generate a using P
a=RandomA(p)
its calculate like p.bitLength()-1,Random.
Step 6: Calculate b= calculateb(g, a, p);
so, b= g.modPow(a, p);
Step 7: Key generation done
Encryption
Input : Text data d,p,b,g
Output cipher as C1,and C2.
initialize BigInteger [] rtn = {null,null};
message=d.getbytes();
[] result= ElGamal.encrypt(message, p, b, g);
[] rtn = {null,null};
k = ElGamal.getRandomk(p);
C1 = g.modPow(k, p);
C2 = m.multiply(b.modPow(k, p)).mod(p);
Decryption
Input : input c1 and c2 as cipher a and p as private keys
Output: Plain text d.
Step 1: m = C2.multiply (C1.modPow (a.negate(), p)).mod
(p);
Step 2: return m.
3.4 Mathematical Module
S1 and s2 get random number r; Calc Prime p;
G=0: p-1
a=S1 get secret number b=S2 get secrete number
Calc = G(ap)
Calc1 = G(bp)
S1 sends calc to s2.
S2 sends calc1 to s1.
S1 = K1 = calc1(ap)
S2 = K2 = calc(bp)
If (k1==k2):true::false
Elgamal Encryption
(p; b; g)
(a)==privatekey
[c1; c2] = enc(data; p; b; g);
Plain = dec(c1; c2; a; p);
4. RESULTS AND DISCUSSION
For the system performance evaluation, calculate the
matrices for accuracy. The system is implemented onjava 3-
tier MVC architecture framework with INTEL 3.0 GHz i5
processor and 8 GB RAM with Hadoop 2.5 in open source
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1431
environment. Chart - 1. Shows data encryption as well as
decryption performance which works to show that the data
it will encrypt in how much time inseconds.Supposethereis
a 100kb data is encrypted in 62 sec so the result will display
automatically in that time of encryption data from the users.
Chart -1: Server Round Performance
After the complete implementation of system
evaluate with different experiments. For the second
experiment system focus on time complexity of
cryptography algorithm. The systemtakesusedifferenttime
for data encryption as well as data decryption purpose. The
below Chart - 2 shows the encryption and decryption time
complexity.
Chart -2: Data encryption and decryption performance
with each data node
4. CONCLUSIONS
We proposed three real key exchange protocols for
equivalent network file system (pNFS). Our etiquettes offer
the rewards over the prevailing Kerberos-based pNFS
protocol. First, the metadata server implementing our rules
has much lower workload than that of the Kerberos-based
approach. Second, two our etiquettes provide frontward
secrecy: one is somewhat forward secure (withreverence to
the many sessions within a time period), whereas the other
is fully forward safe as houses (with reverence to a session).
Third, we have designed a protocol which not only provides
forward secrecy, but is also escrow-free.
5. FUTURE WORK
The suggested work carries on the line of enquiry on the
two-server standard in, extend the model by imposing
diverse levels of expectation upon the two servers, and
adopt a very different method at the technical level in the
procedure design. As a result, we suggest a practical two-
server PIN authentication and key argument system that is
sheltered against disconnected dictionary doses by servers
when they are controlled by adversaries. The future scheme
is a PIN-only arrangement in the logic that it requires no
civic key cryptosystem and, no PKI. For the system future
enhancement, we can focus on dynamic slot configuration
approach using MapReduce framework for similar network
file system.
ACKNOWLEDGEMENT
It is my privilege to acknowledge with deep sense of
gratitude to my guide Prof. Jyoti Raghatwan for her kind
cooperation, valuable suggestions and capableguidanceand
timely help given to me in completion of my paper. I express
my gratitude to Prof. Vina M. Lomte, Head of Department,
RMDSSOE (Computer Dept.) for her constant
encouragement, suggestions, help and cooperation.
REFERENCES
[1] Hoon Wei Lim and Guomin Yang., "Authenticated Key
Exchange Protocols for Parallel Network File
Systems",IEEE Trans. On Parallel And Distributed
Systems, Vol. 27, No. 1, January 2016, pp.1045-9219.
[2] Qi Xie1, Bin Hu1, Na Dong1, Duncan S. Wong2 .,
"Anonymous Three-Party Password-AuthenticatedKey
Exchange Scheme for Telecare Medical Information
Systems", in june 2014.
[3] Fabrice Benhamouda and David Pointcheval,"Verifier-
Based Password-Authenticated Key Exchange: New
Models and Constructions", in October 2014.
[4] *A. Sai Kumar and **P. Subhadra., "User Authentication
to Provide Security against Online Guessing Attacks",
Feb 2013.
[5] Anupam Datta1, Ante Derek1, John C. Mitchell1, and
Bogdan Warinschi2., "Key Exchange Protocols: Security
Definition, Proof Method and Applications", in 2013.
[6] R.S.RamPriya, M.A.Maffina., "A Secured and
Authenticated MessagePassingInterfaceforDistributed
Clusters", IEEE ,2015.
[7] Feng Hao1 and Peter Ryan2., "J-PAKE: Authenticated
Key Exchange Without PKI", in 2010.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1432
[8] Bruno Blanchet., "Automatically Verified Mechanized
Proof of One-Encryption Key Exchange", in 2012.
[9] Feng Hao and Peter Ryan.,"PasswordAuthenticatedKey
Exchange by Juggling", Springer, pp. 159-171,2011.
[10] Dr. Durgesh Kumar, Neha Koria, Nikhil Kapoor, Ravish
Bahety, "A Secure Multi-Party Computation Protocol for
Malicious Computation Prevention for Preserving
Privacy During Data Mining", International Journal of
Computer Science and Information Security,Vol. 3.,
2009.
[11] G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
"Improved proxy re-encryption schemes with
applications to secure distributed storage," in
Proceedings of the Network and Distributed System
Security Symposium, 2012.
BIOGRAPHIES
Miss. Kiran B More BE (Computer)
Completed, ME Second year
Student of R.M. Dhariwal Sinhgad
School of Engineering, Pune.

Contenu connexe

Tendances

Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
 
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...IJECEIAES
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computingijsptm
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 

Tendances (20)

Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
C017421624
C017421624C017421624
C017421624
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 

Similaire à Multi-Server Key Exchange Approach for Big Data

IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databasesijircee
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 

Similaire à Multi-Server Key Exchange Approach for Big Data (20)

IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Dernier (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Multi-Server Key Exchange Approach for Big Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1427 MULTI-SERVER AUTHENTICATION KEY EXCHANGE APPROACH IN BIGDATA ENVIRONMENT Miss. Kiran More1, Prof. Jyoti Raghatwan2 1Kiran More, PG Student. Dept. of Computer Engg. RMD Sinhgad school of Engineering Warje, Pune 2Prof. Jyoti Raghatwan, Dept. of Computer Engg. RMD Sinhgad school of Engineering Warje, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The key establishment difficulty is the maximum central issue and we learn the trouble of key organization for secure many to many communications for past several years. The trouble is stimulated by the broadcast of huge level detached file organizations behind similar admission to various storage space tactics. Our chore focal ideas on the current Internet commonplace for such folder systems that is Parallel Network Folder System [pNFS], which generates employment of Kerberos to establish up similar session keys flanked by customers and storing strategy. Our evaluation of the available Kerberos bottommostprocedurevalidatesthatit has a numeral of borders: (a) a metadata attendant make imaginable key trade over sandwiched amongst the clients and the packing devices has important workload that put a ceiling on the scalability of the procedure; (b) the procedure does not make available frontward confidentiality; (c) the metadata waitron harvests herself all the gathering keys that are cast-off flanked by the clients andpackingdevices, andthis inherently shows the approach to key escrow. Inthisstructure, we advocate an assortment of authentic key trade over measures that are planned to tackle the above problems. We determine that our events are competent of plunging up to coarsely 54 presents of the assignment of the metadata server and concurrently at the bottommost of onward privacy and escrow freeness. All this need only a minute share of superior than before scheming in the gases at the client. Key Words: Parallel sessions, authenticated key exchange, network file systems, forward secrecy, key escrow. 1. INTRODUCTION In similar file organizations, the file numbers are dispersed across multiple storing devices or nodes toallowconcurrent access by multiple tasks of a parallel application. That is classically used in huge scale cluster figuring that attentions on high act and reliable get to large datasets. That sophisticated I/O bandwidth is accomplished through coexisting fetching numbers to multiple stowing devices indoors large subtracting clusters, despite the fact data loss is thriving through data imitating using defect forbearing striping procedures. Few examples of high performance similar file organizations that are in the production use are the IBM Over-all Equivalent Files System. Whichareusuallyrequired for advanced scientific or data exhaustive applications such as digital animation studios, computational fluid dynamics, and semiconductor manufacturing. In these milieus, hundreds or thousands of file structure clients bit data and engender very much high summative I/O load on the file coordination supporting petabytes or terabytes scale storage capacities. Liberated of the enlargement of the knot and high-performance computing, the arrival of clouds and the MapReduce program writing model has resulted in file system such as the Hadoop Distributed File System (HDFS). In this exertion, we examine the issue of the secure many to many communications in the large-scale systemfile organizations which support parallel fetch to multiple storing devices. That we considering the announcement model anywhere there are a large number of the clients editing many remote and circulated storage diplomacies in parallel. Particularly, we attempt to attention on how to conversation the key supplies and creation of the equivalent secure sittings between clients and storagecampaignsinthe parallel Grid File System (pNFS), the up-to-date Internet ethics in efficient and scalable manner. The advance ofpNFS is driven by Sun, UMich/CITI, IBM, and EMC. Sothatitshares many similar countryside and is sociable with many existing commercial network file schemes. Our main goal in this exertion is to design well-organized and secure genuine key exchange protocols that meet specific needs of pNFS. Particularly, we effort to meet the subsequent desirable belongings, which have not. More specifically, pNFS comprises a collection of three protocols: (i) the pNFS protocol that transfers file metadata, also known as a layout, among the metadata server and a client node; (ii) the storage access protocol which specifies how the client accesses data from the associated storage devices according to the corresponding metadata; and (iii) the control protocol which synchronizes the state among the metadataserverandthestoragedevices. In this paper, we have proposed Multi-Server Authentication Key Exchange. Section 2 of this paper deals with Literature Survey and Section 3 presents Proposed System. Section 4 concludes this paper.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1428 2. LITERATURE SURVEY System [1] Tele care Medical Information Systems (TMIS) give a viable approach to increase the medicinal procedure between specialists, attendants and patients. By pleasing to the eye, the security and fortification of TMIS, it is essential while testing to boost the TMIS so that an easygoing and a high-quality can perform corresponding substantiation and session key foundation utilizing a 3-party restorative server while the safe information of the patient can be guaranteed. In proposed framework, an unknown three-party clandestine word legalized key trade (3PAKE) pact for TMIS is utilized. The pact depends on the expert elliptic bend cryptosystem. For security, weapplythepicalculationbased proper authorization instrument ProVerif to validate that our 3PAKE contract for TMIS can give secrecy to patient and specialist and additionally accomplishes synchronized verification and session key security. The benefitofplanned plan is security and effectiveness that can be used as a part of TMIS. For this J-PAKE based conventions are utilized. The impediment of proposed plan is of it reduced session keys. In [2] Michel Abdalla, David Pointcheval., “Simple Password Based Encrypted Key Exchange Protocols” Password-based encrypted key exchange are protocols that are future to give combine of clients imparting over a questionable station with a safe assembly key aside when the anonymous key or secret keysharedamongsttwoclients is pinched from a little arrangement of keys. In proposed plot, two straightforward open sesame grounded fixed key trade conventions in assessment of that of Bellovin and Merritt. While one settlement is more reasonable to situations in which the secret key is shared over numerous servers, alternate gives healthier security. Both pacts are as effective, if poorer, as any of the recent twisted key trade conventions in the writing, but then they just require a solitary arbitrary prophet occurrence. The confirmation of safekeeping for both settlements is in the irregular prophet show and in opinion of hardness of the computational Diffe- Hellman issue. Nonetheless,a portionofthe methodsthatwe utilize are very not the same as the typical ones and make utilization of new variations of the Diffe-Hellman issue, which are of autonomous intrigue.Weadditionallygivesolid relations between the new variationsandthestandardDiffe- Hellman issue. Preferred standpoint of this plan it is conceivable to discover a few kinds of key. In these dissimilar types of protocols are used like SIGMA, IKE etc. A. Sai Kumar and P. Subhadra., “UserAuthentication to Provide Security against Online Guessing Attacks”, Passwords are unique of the most common causesofsystem crashes [3], since the low entropy of passwords makes frameworks helpless against savage compel speculating assaults. Because of innovation passwords can be hacked effectively. Mechanized Turing Tests retain on life a successful, easy to-send way to deal with distinguish robotized malignant login endeavors with sensible cost of bother to clients. Henceforth in this proposed conspire the deficiency of existing and proposed login conventions intended to address large scale online word reference assaults e.g. from a botnet of an enormous number of hubs. In this plan proposed a straightforward plan that reinforces watchword based confirmation conventions and averts online word reference assaults and many-to-many attacks common to 3-pass SPAKA protocols. Anupam Datta, Ante Derek, John C. Mitchell, and Bogdan Warinschi “Key Exchange Protocols: Security Definition, Proof Method and Applications”, System [4] proposed conspire Uses compositional technique for demonstrating cryptographically stable security properties of key trade conventions, in bright of a distinctive rationale that is deciphered over routine keeps running of a convention against a probabilisticpolynomial timeassailant. Since thinking around an unbounded number of keeps running of a convention includesenlistmentlikecontentions about properties safeguarded by every run, we detail of a secure key trade that, dissimilar to customary key in recognize capacity, is shut under general piece with steps that utilization the key. We exhibition formal authorization rules in assessment of this enjoyment based complaint, and prove that the verification morals are wide-ranging over a computational semantics. R.S. RamPriya, M.A. Maffina., “A Secured and Authenticated Message Passing Interface for Distributed Clusters”, In [5] a public network, at the point when various bunches associated with each other is lengthened turns into a likely danger to security applications running on the groups. To address this issue, a Letter Passing Interface (MPI) is produced to savesanctuarybenefitsinanunsecured system. The proposed work concentratesonMPIasopposed to different contracts in sunlit of the fact that MPI is a standout amongst the most famous correspondence conventions on appropriated groups. Here AES design is operated for encryption/decoding and introduction polynomial designisconsumedforkeyadministrationwhich is then coordinated into Message Transient Interface Trimmer rendition 2 (MPICH2) with typical MPI interface that come to be to be ES-MPICH2. This ESMPICH2 is added MPI that gives refuge and confirmation to conveyed groups which is bound together into cryptographic and mathematical idea. The real longing of ES-MPICH2isbackup a huge collection of cunning and correspondencestages.The proposed agenda depends on both cryptographic and mathematical awareness which prompts to brimming with blunder free memo passing border with improved security. FengHao1andPeterRyan2., “J-PAKE:Authenticated Key Exchange without PKI”, in [6] password Authenticated Key Argument (PAKE) is unique of the essential subjects in cryptography. It intends to address a pragmatic security issue: how to size up secure correspondence between two gatherings exclusively in sunny of a common secret word without requiring a Public Key Infrastructure (PKI). After over 10 years of broad research in this field, there havebeen
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1429 a few PAKE conventions accessible. The EKE and SPEKE plans are maybe the twomostoutstandingillustrations.Both systems are however protected. In this rag, we audit these methods in detail and outline different hypothetical and functional shortcomings. Also, we exhibit added PAKE prearrangement called J-PAKE. Our procedure is to bank on upon firm primitives, for case, the Zero-Knowledge Proof (ZKP). As such, the superior part of the past arrangements has withdrawn from exploiting ZKP for the apprehension on proficiency. We display in what manner to successfully coordinate the ZKP into the pact outline and in the interim, accomplish great productivity. Our convention has practically identical computational productivity to the EKE and SPEKE plans with clear advantages on security. BrunoBlanchet., “AutomaticallyVerifiedMechanical Resistant of One-Encryption Key Exchange”, System [7] present an automated verification of the secret key based convention One-Encryption Key Exchange (OEKE) utilizing the computationally-solid convention prover CryptoVerif. OEKE is a non-insignificant convention, and accordingly motorizing its verification gives extra certainty that it is right. This contextual investigation was additionally a chance to actualize a few vital expansions of CryptoVerif, valuable for demonstratingnumerousdifferentconventions. We have without a doubt stretched out CryptoVerif to bolster the computational Diffie Hellman presumption. We have likewise included supportforevidencesthatdependon Shoup’s lemma and extra amusement changes. Specifically, it is presently believable to entrench case refinements physically and to consolidation cases that no longer should be recognized. In the long run, a few upgrades have been involved the calculation of the prospect limits for attacks, giving better cuts. Specifically, we augment over the typical calculation of chanceswhen Shoup’slemma isutilized,which permits us to increase the bound given in a past manual evidence of OEKE, and to authenticate that the enemy can test at most one secret word for each session of the convention. In this tabloid, we introduce these augmentations, with their application to the mark of OEKE. All means of the verification, both programmed and physically guided, are checked by CryptoVerif. Feng Hao and PeterRyan.,“PasswordAuthenticated Key Exchange by Juggling”, System [8] password- Authenticated Key Exchange (PAKE) contemplates how to physique up secure correspondence between two remote gatherings exclusively in light of their mutual watchword, without requiring a Public Key Infrastructure (PKI). Regardless of broad research in the previous decade, this issue stays unsolved. Patent has been one of the chief brakes in sending PAKE arrangements practically speaking. Furthermore, notwithstanding for the licensed plans like EKE and SPEKE, their security is just heuristic; scientists have reported some unpretentious yet stressing security issues. In this rag, we put forward to handle this issue utilizing an approach not quite the same as every past arrangement. Our convention, Password Authenticated Key Exchange by Juggling (JPAKE), accomplishes common validation in two stages: initial, two gatherings send transient open keys to each other; second, theyscramblethe mutual secret key by juggling people in general keys obviously. The principal utilizationofsucha jugglingmethod was create in tackling the Dining Cryptographers issue in 2006. Here, we apply it to tackle the PAKE issue, and prove that the convention is zero-learning as it uncovers nothing aside from one-piece data: whether the providedpasswords at two sides are the same. With clear points of interest in security, our plan has equivalent proficiency to the EKE and SPEKE protocols. 3. PROPOSED SYSTEM 3.1 Problem statement To design and implement minimum multiple server file distribution system where we store encrypted data on different servers & the data will be equated & decrypted for authentic user only using MapReduce technique. 3.2 System Architecture In the proposed work to design and implement a system which can provide parallel processing with key authentication protocol in network file system in Hadoop environment. The system provides Elgamal encryption algorithm for provide the security to distributed data servers. System also prevent SQL injection as well as data collusion attack from external requests. System can automatically manage the load balancing into different data nodes. Fig 1: Proposed System Architecture System implementation protocol pNFS-AKE-I: Our first protocol can be regarded as a modified version of Kerberos which allows the client to generate its own session keys. pNFS-AKE-II: For address key escrow while achieving forward secrecy concurrently. We incorporate a Diffie- Hellman key agreement technique into Kerberos-like pNFS-
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1430 AKE-I. Mainly, the client C and the storage device Si both chooses a secret value and pre-computes a Diffie-Hellman key component and session key is then generated from both the Diffie-Hellman components. pNFS-AKE-III: Our third protocol aims to achieve full forward secrecy, which is, exposure of a long-term key affects only a current session key, but not all the other past session keys. 3.3 Algorithms 1. Diffie-Hellman Key Exchange Protocol Diffie–Hellman creates a shared secret which can be used for secret communicationswhileexchangingdata ona public network. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating through a channel they equally agree on two positive whole numbers q and g, such as q is a prime number and g is a generator of q. The generator g is a number that, when raised to positive whole- number powers less than q, not ever produces the same result for any two such whole numbers. The value of q may be large but the value of g is typically small. Once Alice and Bob have agreed on q and g in private, they choose random positive whole-number m and n, Next, Alice and Bob compute public keys A and B based on their personal keys according to the formulas 1) A =gm mod q 2) B = gn mod q The two users can share their public keys A and B over a communications medium assumed to be insecure, such as the Internet or a corporate wide area network (WAN). From these public keys, a number x can be generated by either user based on their own personal keys. Alice computes K1 using the formula, 3) K1 = (B)m mod q Bob computes K2 using the formula, 4) K2 = (A) n mod q Obviously K1=K2, So this will be shared secret key among Alice and Bob. 2. Elgamal Encryption scheme Key Generation phase Input: Plain text as text data d. Output: a,b,p,g all are private keys Step 1: Initialize the random message from user as d. (it should be any kind of text data). Step 2: initialize a,b,p,g for private key purpose. Step 3: generate P as randomly base on bit length of d. so, Ans[] =GetRandomP(d.getbyte).bitlength base on probable prime no. Step 4: p= Ans[0] g = Ans[1] Step 5: Generate a using P a=RandomA(p) its calculate like p.bitLength()-1,Random. Step 6: Calculate b= calculateb(g, a, p); so, b= g.modPow(a, p); Step 7: Key generation done Encryption Input : Text data d,p,b,g Output cipher as C1,and C2. initialize BigInteger [] rtn = {null,null}; message=d.getbytes(); [] result= ElGamal.encrypt(message, p, b, g); [] rtn = {null,null}; k = ElGamal.getRandomk(p); C1 = g.modPow(k, p); C2 = m.multiply(b.modPow(k, p)).mod(p); Decryption Input : input c1 and c2 as cipher a and p as private keys Output: Plain text d. Step 1: m = C2.multiply (C1.modPow (a.negate(), p)).mod (p); Step 2: return m. 3.4 Mathematical Module S1 and s2 get random number r; Calc Prime p; G=0: p-1 a=S1 get secret number b=S2 get secrete number Calc = G(ap) Calc1 = G(bp) S1 sends calc to s2. S2 sends calc1 to s1. S1 = K1 = calc1(ap) S2 = K2 = calc(bp) If (k1==k2):true::false Elgamal Encryption (p; b; g) (a)==privatekey [c1; c2] = enc(data; p; b; g); Plain = dec(c1; c2; a; p); 4. RESULTS AND DISCUSSION For the system performance evaluation, calculate the matrices for accuracy. The system is implemented onjava 3- tier MVC architecture framework with INTEL 3.0 GHz i5 processor and 8 GB RAM with Hadoop 2.5 in open source
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1431 environment. Chart - 1. Shows data encryption as well as decryption performance which works to show that the data it will encrypt in how much time inseconds.Supposethereis a 100kb data is encrypted in 62 sec so the result will display automatically in that time of encryption data from the users. Chart -1: Server Round Performance After the complete implementation of system evaluate with different experiments. For the second experiment system focus on time complexity of cryptography algorithm. The systemtakesusedifferenttime for data encryption as well as data decryption purpose. The below Chart - 2 shows the encryption and decryption time complexity. Chart -2: Data encryption and decryption performance with each data node 4. CONCLUSIONS We proposed three real key exchange protocols for equivalent network file system (pNFS). Our etiquettes offer the rewards over the prevailing Kerberos-based pNFS protocol. First, the metadata server implementing our rules has much lower workload than that of the Kerberos-based approach. Second, two our etiquettes provide frontward secrecy: one is somewhat forward secure (withreverence to the many sessions within a time period), whereas the other is fully forward safe as houses (with reverence to a session). Third, we have designed a protocol which not only provides forward secrecy, but is also escrow-free. 5. FUTURE WORK The suggested work carries on the line of enquiry on the two-server standard in, extend the model by imposing diverse levels of expectation upon the two servers, and adopt a very different method at the technical level in the procedure design. As a result, we suggest a practical two- server PIN authentication and key argument system that is sheltered against disconnected dictionary doses by servers when they are controlled by adversaries. The future scheme is a PIN-only arrangement in the logic that it requires no civic key cryptosystem and, no PKI. For the system future enhancement, we can focus on dynamic slot configuration approach using MapReduce framework for similar network file system. ACKNOWLEDGEMENT It is my privilege to acknowledge with deep sense of gratitude to my guide Prof. Jyoti Raghatwan for her kind cooperation, valuable suggestions and capableguidanceand timely help given to me in completion of my paper. I express my gratitude to Prof. Vina M. Lomte, Head of Department, RMDSSOE (Computer Dept.) for her constant encouragement, suggestions, help and cooperation. REFERENCES [1] Hoon Wei Lim and Guomin Yang., "Authenticated Key Exchange Protocols for Parallel Network File Systems",IEEE Trans. On Parallel And Distributed Systems, Vol. 27, No. 1, January 2016, pp.1045-9219. [2] Qi Xie1, Bin Hu1, Na Dong1, Duncan S. Wong2 ., "Anonymous Three-Party Password-AuthenticatedKey Exchange Scheme for Telecare Medical Information Systems", in june 2014. [3] Fabrice Benhamouda and David Pointcheval,"Verifier- Based Password-Authenticated Key Exchange: New Models and Constructions", in October 2014. [4] *A. Sai Kumar and **P. Subhadra., "User Authentication to Provide Security against Online Guessing Attacks", Feb 2013. [5] Anupam Datta1, Ante Derek1, John C. Mitchell1, and Bogdan Warinschi2., "Key Exchange Protocols: Security Definition, Proof Method and Applications", in 2013. [6] R.S.RamPriya, M.A.Maffina., "A Secured and Authenticated MessagePassingInterfaceforDistributed Clusters", IEEE ,2015. [7] Feng Hao1 and Peter Ryan2., "J-PAKE: Authenticated Key Exchange Without PKI", in 2010.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1432 [8] Bruno Blanchet., "Automatically Verified Mechanized Proof of One-Encryption Key Exchange", in 2012. [9] Feng Hao and Peter Ryan.,"PasswordAuthenticatedKey Exchange by Juggling", Springer, pp. 159-171,2011. [10] Dr. Durgesh Kumar, Neha Koria, Nikhil Kapoor, Ravish Bahety, "A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for Preserving Privacy During Data Mining", International Journal of Computer Science and Information Security,Vol. 3., 2009. [11] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," in Proceedings of the Network and Distributed System Security Symposium, 2012. BIOGRAPHIES Miss. Kiran B More BE (Computer) Completed, ME Second year Student of R.M. Dhariwal Sinhgad School of Engineering, Pune.