Open Access   Article Go Back

Empirical Auditing for Computing in Preserving Manner

R.K. Prakash1 , B. Sivananthan2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-3 , Page no. 36-40, Mar-2014

Online published on Mar 30, 2014

Copyright © R.K. Prakash, B. Sivananthan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.K. Prakash, B. Sivananthan, “Empirical Auditing for Computing in Preserving Manner,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.36-40, 2014.

MLA Style Citation: R.K. Prakash, B. Sivananthan "Empirical Auditing for Computing in Preserving Manner." International Journal of Computer Sciences and Engineering 2.3 (2014): 36-40.

APA Style Citation: R.K. Prakash, B. Sivananthan, (2014). Empirical Auditing for Computing in Preserving Manner. International Journal of Computer Sciences and Engineering, 2(3), 36-40.

BibTex Style Citation:
@article{Prakash_2014,
author = {R.K. Prakash, B. Sivananthan},
title = {Empirical Auditing for Computing in Preserving Manner},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {36-40},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=64},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=64
TI - Empirical Auditing for Computing in Preserving Manner
T2 - International Journal of Computer Sciences and Engineering
AU - R.K. Prakash, B. Sivananthan
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 36-40
IS - 3
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3828 3628 downloads 3697 downloads
  
  
           

Abstract

Cloud server technology is widely used nowadays for huge and secure Data Storage. However a recent study in wireless devices noticed that usage of data traffic is immense in size. It is found that application does not follow the power distribution law with the observations made in popular Social networking & Map navigation applications. Most traffic is due to extraneous data like presence information from GPS, Availability at instantaneous rate will overload the traffic. The transmitted data will have replicate values and it is almost useless to transfer the data repeatedly. This paper proposes the Intellectual Dynamic Audit Service (IDAS) is a superset of Third Party Auditor (TPA), which will instantly help to reduce the notification of traffic data in the client device itself without disturbing the Quality of service (QOS). QOS level is well maintained by usage of Firewall Anomaly Management Environment (FAME) normally used in the verification of packets send from the application to server. Pre-audit for cloud storage is activated for traffic data reduction. Hence the originality of data to be transferred can be checked easily using snapshot created by IDAS.

Key-Words / Index Term

Cloud computing, distributed server, Data storage, presence services, cost effective, Mobile computing

References

[1]. Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage� IEEE Transactions on Computers, Vol. 62, No. 2, Page no (362- 375), February 2013.
[2]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, �Provable Data Possession at Untrusted Stores,� Proc. 14th ACM Conf. Computer and Comm. Security (CCS �07), Page no (598-609), November 2007.
[3]. Chi-Jen Wu, Jan-Ming Ho, and Ming-Syan Chen, "A Scalable Server Architecture for Mobile Presence Services in Social Network Applications" IEEE Transactions On Mobile Computing, Vol. 12, No. 2, Page No (386-398), Feb 2013.
[4]. M.A. Shah, R. Swaminathan, and M. Baker, �Privacy-Preserving Audit and Extraction of Digital Contents,� Cryptology ePrint Archive, Report No. HPL-2008/186, 2008.
[5]. C. Chi, R. Hao, D. Wang, and Z.-Z. Cao, �IMS Presence Server: Traffic Analysis and Performance Modeling,� Proc. IEEE International Conference on Network Protocols (ICNP), ISBN-1-4244-2507-5, 2008.
[6]. M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, �Auditing to Keep Online Storage Services Honest,� Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS �07), Page No (1-6), 2007.
[7]. Z. Xiao, L. Guo, and J. Tracey, �Understanding Instant Messaging Traffic Characteristics,� Proc. IEEE 27th International Conference on Distributed Computing Systems (ICDCS), ISBN-0-7695-2837-3, Page No (7-14) 2007.
[8]. Mobile device forensics, http://en.wikipedia.org/wiki/Mobile_device_forensics, 2013.
[9]. Social Networking, http://en.wikipedia.org/wiki/Social_networking, 2013.
[10]. Global Positioning System, http://en.wikipedia.org/wiki/Global_Positioning_System, 2013.
[11]. P. Bellavista, A. Corradi, and L. Foschini, �IMS-Based Presence Service with Enhanced Scalability and Guaranteed QoS for Interdomain Enterprise Mobility,� IEEE Wireless Comm., vol. 16,no. 3, Page No (16-23), June 2009.