S. K. Muthusundar
Sri Muthukumaran Institute of Technology

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Incursion Recognition Mechanism Based on Secure Network System A. Mohamed Divan Masood; S. K. Muthusundar
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp543-545

Abstract

Internet based computing dissimilar services such as server storage and applications are shared on the internet. This makes cloud computing one of the most promising and rapidly growing technologies. As it relies on sharing computer resources, it is prone to various security risks. Individual such security issue is Distributed Denial of Services attack on cloud. A DDos assault can begin from anyplace in the system and normally overpowers the casualty server by sending countless. This paper deals with the prevention of DDos attacks and how honey pot approach can be used in cloud computing to counter DDos attacks.
Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data A. Mohamed Divan Masood; S. K. Muthusundar
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp107-110

Abstract

The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems.
Load Balance: Energy Efficient Routing Protocol in Wireless Sensor Network A. Mohamed Divan Masood; S. K. Muthusundar
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp561-564

Abstract

Energy  consumption  is  one  of  the  major  issue  in Wireless Sensor Network  (WSN)  which reduces the lifetime of the network. In this developed work an  Cluster based Energy Efficient Routing Protocol (CBEERP) , which is  gathering the sensor hubs  in the system  into  clusters,  in this manner it productively decreased the flooding  traffic  during  discover the routing. The proposed CBEERP will balance the Energy in the Group by using some second order nodes. The reinforcement High effective hubs replace the cluster head after the cluster reaches to its threshold energy level. This CBEERP will help the effectiveness and lifetime of the system.