In this paper we propose a novel approach, namely Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Our proposed CIA framework provides end-to-end accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines […]
D-AdaptOR : Distributed Adaptive Opportunistic Routing
In this paper propose a distributed adaptive opportunistic routing algorithm (d-AdaptOR) that minimizes the expected average per-packet cost for routing a packet from a source node to a destination. This is achieved by both sufficiently exploring the network using data packets and exploiting the best routing opportunities. This reinforcement learning framework allows for a low-complexity, […]
Secure Cloud Storage System with Secure Data Forwarding
In this paper, we address the problem of forwarding data to another user by storage servers directly under the command of the data owner. We consider the system model that consists of distributed storage servers and key servers. We propose a new threshold proxy re-encryption scheme and integrate it with a secure decentralized code to […]
Detecting and Tracking Vehicle in Aerial Surveillance
In this paper we present automatic vehicle detection and tracking system for aerial surveillance. In the existing frameworks they apply either region based or sliding window based of vehicle detection in aerial surveillance. These method have highly depends on the color segmentation, a lot of miss detections on rotated vehicles and high computational complexity. So […]
Source and Sink Location Hiding for Privacy Preservation
While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. […]
Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
A distributed adaptive opportunistic routing scheme for multihop wireless ad hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect to an expected average per-packet reward […]
Router Support for Fine-Grained Latency Measurements
An increasing number of datacenter network applications, including automated trading and high-performance computing, have stringent end-to-end latency requirements where even microsecond variations may be intolerable. The resulting fine-grained measurement demands cannot be met effectively by existing technologies, such as SNMP, NetFlow, or active probing. We propose instrumenting routers with a hash-based primitive that we call […]
Enhanced data security model for cloud computing
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well […]