SlideShare a Scribd company logo
FUTURE POLLING SYSTEM USING CLOUD COMPUTING IN SUPPORT WITH
SMART CLIENT TECHNOLOGY
N.Arvind and C.Soorya
Department of Computer Science and Engineering
Sri Sairam Engineering College,Chennai, Anna University
arvind01996@gmail.com, soorya099@gmail.com
Abstract- The cloud computing has become
more popular these days. Cloud computing
is a computing paradigm in which tasks are
assigned to a combination of connections ,
software and services that can be accessed
over internet. This paper proposes the
usage of cloud computing in E-polling. The
main aim of this project is to avoid fake
votes in polling by having a cloud database
about the voters. Iris recognition of
candidates is used for authentication. A
candidate can vote at any place irrespective
of his polling booth and can vote through
mobile phones and computer. The cloud
computing relies on the internet.when the
internet connection fails it does not work
with mobile phone / computer .we have
introduced the smart client technology to
overcome this difficulty in mobile phones
and computers.
Keywords - Cloud Computing, Smart
Client, E-polling, Biometrics.
1.INTRODUCTION
Polling is a choice that is made by counting
the number of people in favor of each
alternative. Current polling system is not so
secure. The main aim of our system is to
provide high security internet polling. Our
system is implemented using cloud computing
and biometrics. Cloud computing is a
paradigm in which virtualized resource are
provided as a service over the internet to the
cloud user. Users need not have knowledge of,
expertise in or over technologies
infrastructure in the “cloud” that supports
them. Biometric identification refers to
identifying an individual based on his/her
distinguishing physiological or behavioral
characteristics. Our system uses iris
recognition as distinguishable factor. Cloud
computing refers to the next evolution of the
Internet. Instead of buying software, installing
it on your computer, upgrading it periodically
and storing all your data on your hard drive,
with cloud computing you use software
applications online, as a service. All you need
is your computing device and an Internet
connection. The cloud computing thus can be
used in polling system
2.EXISTING SYSTEM
The security level in existing voting system
is not up to the mark. As we do not have any
back up, consider the case of EVM (Electronic
Voting Machine)data reliability is not assured.
EVM is based on microcontroller on which
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201615
the program and the memory can be protected
from external read, but that is very low level
security and chip centric. In case of chip
failure data loss occurs. In many voting
system the candidate are restricted to vote at
their respective places. Internet voting system
SERVE (Security Electronic Registration and
Voting Experiment) is found to be vulnerable
to denial of service attack and website
spooling .This can compromise the results.
Moreover there are a number of technical
issues, including authentication and validation
of the end-point, protecting the voting system
against the inevitable attempts by hostile
parties to disrupt the election, and ensuring
that the network is capable of handling traffic
storms if potentially millions of citizens cast
their E-ballots in a short period of time.
3.PROPOSED SYSTEM
Fig 1.cloud sturcture
In the proposed system the database
creation is done with the details of the
candidate along with iris recognition which
serve as the key for authentication (Biometric
Database).While casting vote the iris
recognition of candidate is being matched
with the existing database. If the match is
found candidate are allowed to caste their vote
,otherwise they are denied. This system
provides safe and secure polling. Cloud
provides a service for voting to all
authenticated user.
4.Biometric Authentication
Biometric data should be collected
from the voters as part of the election pre-
registration process. Database regarding the
candidates are managed with iris recognition
as primary key. While casting vote the iris
recognition of the candidate is matched with
the existing database if the match is found the
casted vote is considered otherwise discarded.
No candidate is recognized twice. In prior to
polling, biometric authentication can also be
used to check whether the candidate is eligible
for casting vote or not. Many notebook
computers include fingerprint readers. In the
near future, the mobile handset industry will
begin to embed some type of biometric
identification system into their devices.
Fig 3.Voting using cloud
5.CLOUD STORAGE
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201616
In the cloud computing technology we
can store the details of the people along with
their iris recognition . The database creation is
done with the details of the candidate along
with iris recognition which serve as the key
for authentication (Biometric Database).While
casting vote the iris recognition of candidate
is being matched with the existing database. If
the match is found candidate are allowed to
caste their vote ,otherwise they are denied.
This system provides safe and secure polling.
Cloud provides a service for voting to all
authenticated user. The cloud computing
mainly works based only on the internet
facility. All your data is stored online, so you
don't have to worry about the capacity.
5.1Problem with cloud computing
The main problem with the cloud
computing is it requires an internet
connection. If the candidate want to vote at the
time where the internet connection is not
available it is impossible. So we have
introduced a smart client technology to
overcome this problem.
6. SMART CLIENT APPROACH
The term Smart Client was coined to highlight
the differences between the typical "Rich
Client" applications of yesteryear and the next
generation of client applications. To
understand these differences, and to
understand how they are likely to change the
face of client-side computing .The smart client
technology provides the following advantages:
6.1Utilizes Local Resources:
A smart client application always has the
ability on the client that enable local resources
to be utilized. What do we mean by local
resources? We mean everything from
hardware to software resources. A smart client
may take advantage of the local CPU, local
memory or disk, or any local devices
connected to the client.Thus it makes use of
the local resource.
6.2 Offline Capable:
Fig 4.Smart Client technology
Because they are running on the local
machine, one of the key benefits that smart
client applications offer is that they can be
made to work even when the user is not
connected. For applications running in
occasional or intermittent connectivity
situations, such as those used by traveling
workers or even those running on laptops,
tablets, PDA's, and so on, where connectivity
cannot be guaranteed at all times, being able
to work while disconnected is essential. Even
when the client is connected, the smart client
application can improve performance and
usability by caching data and managing the
connection in an intelligent way.
6.3Intelligent Install and Update:
smart client applications manage their
deployment and update in a much more
intelligent way than traditional rich client
applications. There are many frame work that
provides the smart client technology. It
enables application artifacts to be deployed
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201617
using a variety of techniques, including simple
file copy or download over HTTP.
Applications can be updated while running
and can be deployed on demand by clicking
on a URL.
6.4Client Device Flexibility
This technology provides a common platform
upon which smart client applications can be
built. Often, there will be multiple versions of
the smart client application, each targeting a
specific device type and taking advantage of
the devices unique features and providing
functionality appropriate to its usage.
6.5Storing Candidate Biometric
information
We are storing the biometric information of
the candidate in the local database. The
biometric information which we have used is
the iris recognition . The main purpose of
using the local database in the server is to
store the data of the candidate and update
them in the cloud instantly with the main
server. There are many local servers available
across various polling booth .All of them have
been combined to form the cloud structure so
that they can share the resources. The storage
in the cloud has the several features to be
discussed. The main advantage of using the
cloud computing storage is listed below
6.6Simple Scalability:
In addition to bringing processing to the data,
the next-generation cloud storage scales
simply. Cloud storage requires a high degree
of automation with self-management, self-
configuration and self-healing, all orchestrated
through high-level policies specified by the
storage administrator. Next generation storage
provides administrators flexibility and control.
As the cloud grows, additional nodes are able
to service the data requests in parallel. If
administrators require more performance, they
can add a processing node. If they need more
capacity, they can add disks. Each can be
added independently or scaled simultaneously.
The another advantage of using cloud is you
have to pay for what you are using.
7.ENSURING DATA STORAGE IN
CLOUD COMPUTING
Cloud computing security sometimes
referred to simply as "cloud security" is an
evolving sub-domain of computer security,
network security, and, more broadly,
information security. It refers to a broad set of
policies, technologies, and controls deployed
to protect data, applications, and the
associated infrastructure of cloud
computing.There are a number of security
issues associated with cloud computing but
these issues fall into two broad categories:
Security issues for the polling system and
security of the candidate biometric
authentication.
7.1Data Protection:
To be considered protected, data from
one candidate must be properly protected, it
must be stored securely when “at rest” and it
must be able to move securely from one
location to
Fig 5.Security Aspect in cloud
another. Cloud providers have systems in
place to prevent data leaks or access by third
parties. Proper separation of duties should
ensure that auditing and/or monitoring cannot
be defeated, even by privileged users at the
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201618
cloud provider. Providers ensure that physical
machines are adequately secure and that
access to these machines as well as all
relevant customer data is not only restricted
but that access is documented. All the attacks
has to be prevented in the cloud computing.
Finally, providers ensure that all critical data
(iris recognition ) are masked digital
identities and credentials must be protected as
should any data that the provider collects or
produces about customer activity in the cloud.
8.VOTING THROUGH MOBILE
PHONES
Since we are using the cloud
computing technology,many devives can be
grouped in the cloud including PC, Mac or
smartphone.here we use the local database to
store the information of the thumb impression
when the internet connection is failed.when
the internet connection is available,it can send
the data to the main server.if the internet
connection is available directly it can send the
candidate information directly to the
server.thus in our system we vote at the
polling booth at any place and also through
other devices.
8.1Cloud-Computing to Address Voting
Storms
There is the question of how to build E-
voting systems that could sustain “voting
storms" of millions of connections. Cloud
computing technology could be used to handle
this issue. Instead of building a dedicated data
center to process these one-time transactions,
the infrastructure should be built through the
cloud-computing model to allow for real-time
on-demand availability of the necessary
additional resources through the cloud.
Election authorities in one state might use the
secure computing facilities in another to
handle the bursts of traffic they experience at
a particular hour of the day. The ability of
global application delivery through the cloud
would be critical to ensure efficiency and
performance in the event of “voting storms”
on the network.
Advantages of Proposed System Over
Existing one
As Authentication is based on
Biometrics, our system is fake proof. In the
existing system, candidates are restricted to
vote in their residential area whereas in our
approach candidate are free to caste their vote
at all places irrespective of their residence.
Data backup is present unlike the EVM, where
if one device fails all data will be lost.
Because the software is online, you don't need
as powerful a computer to run the
application.There's no need to buy and update
software. Use the application you need. All
your data is stored online, so you don't have to
worry about the capacity of your hard
drive.You can access the applications and
your files from anywhere.so you can vote any
place where you are staying at that particular
time. Cloud computing has everything online
fosters collaboration. Whether you use a PC,
Mac or smartphone, applications will run and
you can open and share files.these are some of
the advantages over the existing technology.
9.CONCLUSION
Some countries and states will probably
move ahead with this voting systems
quickly.The advancement of biometric
databases, point-to-point security for both the
end-user and the network, and on-demand
application delivery solutions via the cloud
and regulatory controls would play a pivotal
role in this next-generation technology
definitely. Thus we have implemented the
cloud computing technology for the purpose
of voting .By implementing this the candidate
can vote at any polling booth irrespective of
his booth, Since all the polling booth are
combined to form the cloud structure and also
he can also vote through his mobile phone
with the support of smart client technology.
10.REFERENCES
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201619
[1]. Anil K. Jain, “An Identity-Authentication
System Using Fingerprints”, Proceedings of
the IEEE, Vol. 85, No. 9, pp 1365 – 1387,
September 1997.
[2]. Michael Miller, “Cloud Computing- A
Web Based Applications That Change the
Way You Work and Collaborate Online”,
ISBN-13: 978-0-7897-3803-5, ISBN-100-
7897-3803-1,
August 2008.
[3].Mr. Aviv, "All IP- national carrier network
based on wireless access technologies”,
Converge , November 04, 2008.
[4].B. Miller, “Everything you need to know
about automated Biometric identification”
Security Technol. Design, Apr.1997.
[5]Wenmoth, D. (2008) Education in the age
of cloud computing.
Advanced Networks, Virtualisation, cloud
computing, emergingtechnologies, networks
and learning.
[6]. M. Bacca, K. Rabuzin: “Biometrics in
Network Security”, The Proceedings of the
XXVIII International Convention MIPRO
2005, Rijeka, Croatia.
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201620
Ad

More Related Content

What's hot (17)

IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
ijsptm
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET Journal
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET Journal
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
eSAT Journals
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
eSAT Publishing House
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management System
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
IJECEIAES
 
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture InnovationsFujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
Kevin Neal
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
Jason Murray
 
Java project titles
Java project titlesJava project titles
Java project titles
Ashly Liza
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
ijsptm
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET Journal
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET Journal
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
eSAT Journals
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
eSAT Publishing House
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management System
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
IJECEIAES
 
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture InnovationsFujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
Kevin Neal
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
Jason Murray
 
Java project titles
Java project titlesJava project titles
Java project titles
Ashly Liza
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
 

Similar to Iaetsd future polling system using cloud computing in support with smart client technology (20)

Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
LeMeniz Infotech
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
Journal For Research
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
SKS
 
5-Unit (CAB).pdf
5-Unit (CAB).pdf5-Unit (CAB).pdf
5-Unit (CAB).pdf
Chandrapriya Rediex
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
susanschei
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
Topic 7
Topic 7Topic 7
Topic 7
MLG College of Learning, Inc
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
koushikichakraborty3
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
Mayank Vijh
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET Journal
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization System
ijceronline
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
LeMeniz Infotech
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
Journal For Research
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
SKS
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
susanschei
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
koushikichakraborty3
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
Mayank Vijh
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET Journal
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization System
ijceronline
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Ad

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
Iaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
Iaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 
Ad

Recently uploaded (20)

Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 

Iaetsd future polling system using cloud computing in support with smart client technology

  • 1. FUTURE POLLING SYSTEM USING CLOUD COMPUTING IN SUPPORT WITH SMART CLIENT TECHNOLOGY N.Arvind and C.Soorya Department of Computer Science and Engineering Sri Sairam Engineering College,Chennai, Anna University [email protected], [email protected] Abstract- The cloud computing has become more popular these days. Cloud computing is a computing paradigm in which tasks are assigned to a combination of connections , software and services that can be accessed over internet. This paper proposes the usage of cloud computing in E-polling. The main aim of this project is to avoid fake votes in polling by having a cloud database about the voters. Iris recognition of candidates is used for authentication. A candidate can vote at any place irrespective of his polling booth and can vote through mobile phones and computer. The cloud computing relies on the internet.when the internet connection fails it does not work with mobile phone / computer .we have introduced the smart client technology to overcome this difficulty in mobile phones and computers. Keywords - Cloud Computing, Smart Client, E-polling, Biometrics. 1.INTRODUCTION Polling is a choice that is made by counting the number of people in favor of each alternative. Current polling system is not so secure. The main aim of our system is to provide high security internet polling. Our system is implemented using cloud computing and biometrics. Cloud computing is a paradigm in which virtualized resource are provided as a service over the internet to the cloud user. Users need not have knowledge of, expertise in or over technologies infrastructure in the “cloud” that supports them. Biometric identification refers to identifying an individual based on his/her distinguishing physiological or behavioral characteristics. Our system uses iris recognition as distinguishable factor. Cloud computing refers to the next evolution of the Internet. Instead of buying software, installing it on your computer, upgrading it periodically and storing all your data on your hard drive, with cloud computing you use software applications online, as a service. All you need is your computing device and an Internet connection. The cloud computing thus can be used in polling system 2.EXISTING SYSTEM The security level in existing voting system is not up to the mark. As we do not have any back up, consider the case of EVM (Electronic Voting Machine)data reliability is not assured. EVM is based on microcontroller on which ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201615
  • 2. the program and the memory can be protected from external read, but that is very low level security and chip centric. In case of chip failure data loss occurs. In many voting system the candidate are restricted to vote at their respective places. Internet voting system SERVE (Security Electronic Registration and Voting Experiment) is found to be vulnerable to denial of service attack and website spooling .This can compromise the results. Moreover there are a number of technical issues, including authentication and validation of the end-point, protecting the voting system against the inevitable attempts by hostile parties to disrupt the election, and ensuring that the network is capable of handling traffic storms if potentially millions of citizens cast their E-ballots in a short period of time. 3.PROPOSED SYSTEM Fig 1.cloud sturcture In the proposed system the database creation is done with the details of the candidate along with iris recognition which serve as the key for authentication (Biometric Database).While casting vote the iris recognition of candidate is being matched with the existing database. If the match is found candidate are allowed to caste their vote ,otherwise they are denied. This system provides safe and secure polling. Cloud provides a service for voting to all authenticated user. 4.Biometric Authentication Biometric data should be collected from the voters as part of the election pre- registration process. Database regarding the candidates are managed with iris recognition as primary key. While casting vote the iris recognition of the candidate is matched with the existing database if the match is found the casted vote is considered otherwise discarded. No candidate is recognized twice. In prior to polling, biometric authentication can also be used to check whether the candidate is eligible for casting vote or not. Many notebook computers include fingerprint readers. In the near future, the mobile handset industry will begin to embed some type of biometric identification system into their devices. Fig 3.Voting using cloud 5.CLOUD STORAGE ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201616
  • 3. In the cloud computing technology we can store the details of the people along with their iris recognition . The database creation is done with the details of the candidate along with iris recognition which serve as the key for authentication (Biometric Database).While casting vote the iris recognition of candidate is being matched with the existing database. If the match is found candidate are allowed to caste their vote ,otherwise they are denied. This system provides safe and secure polling. Cloud provides a service for voting to all authenticated user. The cloud computing mainly works based only on the internet facility. All your data is stored online, so you don't have to worry about the capacity. 5.1Problem with cloud computing The main problem with the cloud computing is it requires an internet connection. If the candidate want to vote at the time where the internet connection is not available it is impossible. So we have introduced a smart client technology to overcome this problem. 6. SMART CLIENT APPROACH The term Smart Client was coined to highlight the differences between the typical "Rich Client" applications of yesteryear and the next generation of client applications. To understand these differences, and to understand how they are likely to change the face of client-side computing .The smart client technology provides the following advantages: 6.1Utilizes Local Resources: A smart client application always has the ability on the client that enable local resources to be utilized. What do we mean by local resources? We mean everything from hardware to software resources. A smart client may take advantage of the local CPU, local memory or disk, or any local devices connected to the client.Thus it makes use of the local resource. 6.2 Offline Capable: Fig 4.Smart Client technology Because they are running on the local machine, one of the key benefits that smart client applications offer is that they can be made to work even when the user is not connected. For applications running in occasional or intermittent connectivity situations, such as those used by traveling workers or even those running on laptops, tablets, PDA's, and so on, where connectivity cannot be guaranteed at all times, being able to work while disconnected is essential. Even when the client is connected, the smart client application can improve performance and usability by caching data and managing the connection in an intelligent way. 6.3Intelligent Install and Update: smart client applications manage their deployment and update in a much more intelligent way than traditional rich client applications. There are many frame work that provides the smart client technology. It enables application artifacts to be deployed ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201617
  • 4. using a variety of techniques, including simple file copy or download over HTTP. Applications can be updated while running and can be deployed on demand by clicking on a URL. 6.4Client Device Flexibility This technology provides a common platform upon which smart client applications can be built. Often, there will be multiple versions of the smart client application, each targeting a specific device type and taking advantage of the devices unique features and providing functionality appropriate to its usage. 6.5Storing Candidate Biometric information We are storing the biometric information of the candidate in the local database. The biometric information which we have used is the iris recognition . The main purpose of using the local database in the server is to store the data of the candidate and update them in the cloud instantly with the main server. There are many local servers available across various polling booth .All of them have been combined to form the cloud structure so that they can share the resources. The storage in the cloud has the several features to be discussed. The main advantage of using the cloud computing storage is listed below 6.6Simple Scalability: In addition to bringing processing to the data, the next-generation cloud storage scales simply. Cloud storage requires a high degree of automation with self-management, self- configuration and self-healing, all orchestrated through high-level policies specified by the storage administrator. Next generation storage provides administrators flexibility and control. As the cloud grows, additional nodes are able to service the data requests in parallel. If administrators require more performance, they can add a processing node. If they need more capacity, they can add disks. Each can be added independently or scaled simultaneously. The another advantage of using cloud is you have to pay for what you are using. 7.ENSURING DATA STORAGE IN CLOUD COMPUTING Cloud computing security sometimes referred to simply as "cloud security" is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.There are a number of security issues associated with cloud computing but these issues fall into two broad categories: Security issues for the polling system and security of the candidate biometric authentication. 7.1Data Protection: To be considered protected, data from one candidate must be properly protected, it must be stored securely when “at rest” and it must be able to move securely from one location to Fig 5.Security Aspect in cloud another. Cloud providers have systems in place to prevent data leaks or access by third parties. Proper separation of duties should ensure that auditing and/or monitoring cannot be defeated, even by privileged users at the ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201618
  • 5. cloud provider. Providers ensure that physical machines are adequately secure and that access to these machines as well as all relevant customer data is not only restricted but that access is documented. All the attacks has to be prevented in the cloud computing. Finally, providers ensure that all critical data (iris recognition ) are masked digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud. 8.VOTING THROUGH MOBILE PHONES Since we are using the cloud computing technology,many devives can be grouped in the cloud including PC, Mac or smartphone.here we use the local database to store the information of the thumb impression when the internet connection is failed.when the internet connection is available,it can send the data to the main server.if the internet connection is available directly it can send the candidate information directly to the server.thus in our system we vote at the polling booth at any place and also through other devices. 8.1Cloud-Computing to Address Voting Storms There is the question of how to build E- voting systems that could sustain “voting storms" of millions of connections. Cloud computing technology could be used to handle this issue. Instead of building a dedicated data center to process these one-time transactions, the infrastructure should be built through the cloud-computing model to allow for real-time on-demand availability of the necessary additional resources through the cloud. Election authorities in one state might use the secure computing facilities in another to handle the bursts of traffic they experience at a particular hour of the day. The ability of global application delivery through the cloud would be critical to ensure efficiency and performance in the event of “voting storms” on the network. Advantages of Proposed System Over Existing one As Authentication is based on Biometrics, our system is fake proof. In the existing system, candidates are restricted to vote in their residential area whereas in our approach candidate are free to caste their vote at all places irrespective of their residence. Data backup is present unlike the EVM, where if one device fails all data will be lost. Because the software is online, you don't need as powerful a computer to run the application.There's no need to buy and update software. Use the application you need. All your data is stored online, so you don't have to worry about the capacity of your hard drive.You can access the applications and your files from anywhere.so you can vote any place where you are staying at that particular time. Cloud computing has everything online fosters collaboration. Whether you use a PC, Mac or smartphone, applications will run and you can open and share files.these are some of the advantages over the existing technology. 9.CONCLUSION Some countries and states will probably move ahead with this voting systems quickly.The advancement of biometric databases, point-to-point security for both the end-user and the network, and on-demand application delivery solutions via the cloud and regulatory controls would play a pivotal role in this next-generation technology definitely. Thus we have implemented the cloud computing technology for the purpose of voting .By implementing this the candidate can vote at any polling booth irrespective of his booth, Since all the polling booth are combined to form the cloud structure and also he can also vote through his mobile phone with the support of smart client technology. 10.REFERENCES ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201619
  • 6. [1]. Anil K. Jain, “An Identity-Authentication System Using Fingerprints”, Proceedings of the IEEE, Vol. 85, No. 9, pp 1365 – 1387, September 1997. [2]. Michael Miller, “Cloud Computing- A Web Based Applications That Change the Way You Work and Collaborate Online”, ISBN-13: 978-0-7897-3803-5, ISBN-100- 7897-3803-1, August 2008. [3].Mr. Aviv, "All IP- national carrier network based on wireless access technologies”, Converge , November 04, 2008. [4].B. Miller, “Everything you need to know about automated Biometric identification” Security Technol. Design, Apr.1997. [5]Wenmoth, D. (2008) Education in the age of cloud computing. Advanced Networks, Virtualisation, cloud computing, emergingtechnologies, networks and learning. [6]. M. Bacca, K. Rabuzin: “Biometrics in Network Security”, The Proceedings of the XXVIII International Convention MIPRO 2005, Rijeka, Croatia. ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201620