multi-resolution pruning based co-location identification in spatial data

Shreya Satishkumar,

Published in International Journal of Advanced Research in Electronics, Communication & Instrumentation Engineering and Development

ISSN: 2347 -7210          Impact Factor:1.9         Volume:2         Issue:2         Year: 25 August,2014         Pages:29-45

International Journal of Advanced Research in Electronics, Communication & Instrumentation Engineering and Development

Abstract

Security is a key concern in a wide spread network. Preserving private information is to be given due importance by all communication devices and search engines, since there is a threat of unauthorized users accessing secure information by trapping the network devices. Existing wide spread network of computers, mobile and other electronic devices does not define proper protocols neither based on user’s location nor based on the end user’s requirements in connecting to the network. Our proposed solution provides the most better and promising solution for a good network of plug and play Networks along with high level of authentication and authorization solutions. The proposal uses Flexi-Negotiable Security solutions that takes into account the cost and crude for such implementations along with best interoperability among the connected devices. Set of authorization policies are generated by a network manager using XACML based on the based on the available resources and the number of connected devices thus proving a reliable and secure network of devices. In this project, we are trying to incorporate a control point which will take care of controlling the devices access points. Each individual user needs to get authentication and authorization to access the resources in the network. Control point will take care of validating the request by the users. Once the users holds the authentication/authorization to access the resource in the network. They are permitted or else, no option to access the resources and they will be restricted. The authentication will be verified by the control points through a secure SOAP based web services. Our proposed system involves the above said techniques and it’s associated with attribute based authentication. So that, higher designated people will be provided with more access options.

Kewords

Computer Aided Software Engineering (CASE) , Object Modeling Technique , Classes, and Responsibilities. Collaborators

Reference

[1] M. Jeronimo, J. Weast, UPnP Design by Example, Intel Press, Boston, 2003. [2] H. Park, “Interoperability model for devices over heterogeneous home networks”, IEEE Trans. Consumer Electronics, vol. 55, no. 3, pp. 1185 - 1191, Aug., 2009. [3] J. Weast, “Advanced Universal Plug and Play Technology Topics”, IEEE Education & Learning, Jul., 2009 [4] V. Lortz, M. Saaranen, “DeviceProtection Service: 1”, Standardized DCP (SDCP), Version 1.0. UPnP Forum Committee, February, 2011. [5] L. Kagal, T. Finin, and A. Joshi, “Trust-based security in pervasive computing environments”, Computer, vol. 34, pp. 154–157, Dec., 2001. [6] L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea, “Lessons learned from the deployment of a smartphone-based access-control system”, Proc. of the 3rd Symposium on Usable Privacy and Security, SOUPS ’07. New York, NY, USA: ACM, 2007, pp. 64–75. [7] J. Kim, Z. Kim, and K. Kim, “A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment”, Proc. of The 10th International Conference on Information Security and Cryptology, Berlin, Heidelberg: Springer- Verlag, 2007, pp. 37–48. 152 IEEE Transactions on Consumer Electronics, Vol. 59, No. 1, February 2013 [8] J. Yves Tigli, S. Lavirotte, G. Rey, V. Hourdin, and M. Riveill, “Context-aware authorization in highly dynamic environments”, IJCSI International Journal of Computer Science Issues, vol 4, no. 1, pp. 1694-0784, Nov., 2009. [9] M. L. Damiani and C. Silvestri, “Towards movement-aware access control”, Proc. of the ACM GIS International Workshop on Security and Privacy in GIS and LBS, New York, NY, USA: ACM, 2008, pp. 39–45. [10] H. Nakashima, H. Aghajan, and J. C. Augusto, Handbook of Ambient Intelligence and Smart Environments, 1st ed. Springer Publishing Company, Incorporated, 2009. [11] A. Klemets and B. Da Costa, Upnp Authentication and Authorization Patent, U.S. Patent 7 882 356, 2011. [12] J. Karl, Upnp CDS USER PROFILE, Rancho Santa Margarita, CA. U.S. Patent 8 185 949, 2012. [13] Zhu, X.; Shi, Y.-Y.; Kim, H.-G.; Eom, K.-W.; , "An integrated music recommendation system", IEEE Transaction on Consumer Electronics, vol.52, no.3, pp.917-925, August, 2006. [14] Bhaskar C,Rajapirian P,” Precision Aware Self-Quantizing Hardware Architecture for the Discrete Wavelet Transform.”,vol: 2-3 (Pages 98-104), ISR Journal, Available:http://isrjournals.org/archives_abstract.php?id=28&t_n=ijarcseit&d_id=66&dm [15]R.Jegadeesan ,Dr.N.Sankar Ram,M.Naveen Kumar,” Less Cost Any Routing With Energy Cost Optimization”,vol: 2-1 (Pages 85-90), ISR Journal, Available:http://isrjournals.org/archives_abstract.php?id=28&t_n=ijarcseit&d_id=66&dm