Search or add a thesis

Advanced Search (Beta)
Home > Secure Provenance for Distributed Environment

Secure Provenance for Distributed Environment

Thesis Info

Access Option

External Link

Author

Idrees Ahmed

Program

PhD

Institute

COMSATS University Islamabad

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10649/1/Idrees%20Ahmed%20CIIT.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727830431

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

بعد از خدا بزرگ توئی قصہ مختصر

’’بعد از خدا بزرگ توئی قصہ مختصر ‘‘
آج سے چودہ سو سال پہلے کائنات گھٹا ٹوپ تاریکیوں میں مستورتھی۔ ہر طرف جبر و تشدد کی ژالہ باریاں مصروفِ تباہی تھیں۔ درندگی و بہیمیت کی سموم فضاء میں حق پرستی اور پرہیز گاری ناپید ہو چکی تھی۔ صنف ِنازک کی عصمت کا کوئی محافظ نہ تھا۔ ہر طرف آلام و مصائب کے بگولے محورقص تھے۔ صبح و شام غرباء فقراء کے سروں پرظلم و تعدّی کی تلوارلٹکتی رہتی تھی۔ جہاں تک نظر پڑتی کشت و خون ، درندگی و حیوانیت اور خوف و ہراس کا دور دورہ تھا۔ انسانی عقائد ضعف و اضمحلال کا شکار ہو چکے تھے۔ گویا کفروضلالت کا ٹھاٹھیں مارتا ہوا طوفان تھا جس کے تند و تیز تھپیڑوں میں انسانیت کی شکستہ نائو ہچکولے کھارہی تھی۔ بلائے عظیم میں گرفتہ کسی نجات دہندہ کے منتظر تھے۔
بالآخر خالق کائنات کوسسکتی ہوئی انسانیت پر رحم آیا۔ رَبِّ کعبہ نے رشد و ہدایت کے اس آفتاب کوافقِ فاران پر طلوع کیا۔ وہ آفتاب ِصداقت جوختم المرسلین ہے جو رحمتہ العالمین ہے، شافع المذنبین ہے، اسلام جس کا دین ہے۔
نگاہِ عشق و مستی میں وہی اوّل وہی آخر
وہی قرآں، وہی فرقاں، وہی یٰسیں، وہی طہٰ
رسولِ عربیصلی اللہ علیہ و آلہٖ وسلم کیا آئے ، کائنات میں انقلاب آ گیا۔یاس وقنوطیت سے پژمردہ چہروں پر اُمید کی بہار آ گئی۔ قتل و غارت اور خوف و ہراس کی آندھیاں تھم گئیں۔ صنم خانے تراشیدہ ریزہ ریزہ ہو گئے۔
عرب وعجم کے ایوان ہائے عیش وطرب منہدم ہونے لگے۔ وادی خزاں میں گل ہائے رنگا رنگ کے لیے صدق و صفا اور عدل وانصاف نے جنم لیا۔ بندہ و صاحب ومحتاج وغنی کا امتیاز مِٹ گیا دانائے رسالت کی ضیاد پاشیوں سے گمراہی و ضلالت کی سیاہی دُھل گئی۔ رسولِ ہاشمیصلی اللہ علیہ و...

حياة نسيم حجازي ومكانته العلمية والأدبية في الأدب الأردي

Abstract: The article deals with the life and contribution ofNaseem Hijazi towards reconstruction ofIslamic thought through his historical novels in New Muslim generation. As a novel writer < Naseem Hijazi is regarded as one of thefinest writers of Urdu language especially in the later 20th century. Among his popular contemporaries were Ibn-e-Safh Saadat Hasan Manto< and Shqfiq-ur-Rehman< all having their particular line ofliterature. Naseem Hijazi is knownfor his potent and romantic description of history. There are only two writers prior to Hijazi who wrote history novels in Urdu: Abdul Haleem Sharar and Sadiq sardhunwi < but Hijazi’s writing is most credible in terms of historical description and accuracy. He exercised extra care to back his study of history by through research and to cite his sources whenever possible. Hijazi creates his powerful expression by blending this study of history with fairytale romanticism. The story usually revolves around characters who were related to< and shown present at the actual historical event that wishes tofocus on. Naseem Hijazi bases most ofhis work in Islamic history. In dealing with this history' he shows both the rise and fall of the Islamic Empire. This writer seems to have been inspired a lot by Allama Muhammad Iqbal's poetry. He tries, not very unlike Iqbal, to remind his readers of the lost glory of the Muslims and in a way inspire them to work with commitment to achieve lost glory in all walks of life. Naseem Hijazi has immensely influenced his readers both in and out of Pakistan. He has been one of the key sources of Islamist ideologies in Pakistan and worked as a key ideology and valour builder during the Soviet-Afghan War. Many Pakistani educated Youngsters throughout 1950s till today are believed to have been emotionally and ideologically inspired by his writings. He enjoys a very large reader base even after his death.

Engineering of Microbial Fungal Glucoamylases by Chemical Modification Techniques for Industrial Application

Glucoamylase (exo-1,4-α-D-glucan glucanohydrolase: EC 3.2.1.3) yields ß-D- glucose from the non-reducing chain ends of a wide range of polysaccharide substrates and play a tremendous role in the improvement of starch based food products. Non-traditional use of glucoamylases in detergent industry has a great scope of expansion the world over in the coming days. Industrial employment of glucoamylase demands its hardiness to harsh operational environment. Thermo-stable enzymes can withstand extreme environmental conditions and can resist against detergents, organic solvents, temperature & pH. The operational stability of enzymes is of paramount importance for any bioprocess, which can be improved through various protein engineering techniques. With the development of novel procedures that exploit selective and efficient protein chemistry, chemical modification, either alone or combination with other mutagenesis techniques, could make a significant contribution to the development of enzymes that cope with the industrial demands. Various fungal strains (A. niger, A. oryzae, A. tamarii, A. fumigatus, A. flavus and Humicola sp) were grown in submerged cultivation at different temperatures, pH and substrate concentrations in order to optimize GA production. A. niger and Humicola sp were selected for their higher GA production ability as compared to other fungi. The apparent molecular mass of Humicola sp and A. niger GAs determined through SDS-PAGE were 72.8 and 93 kDa. A. niger GA was proved to be much better as compared to Humicola sp GA on the basis of, wider pH range, higher optimum temperature, more turn over (kcat) and higher specificity constant. It also showed 10 fold higher resistance against thermal unfolding and an activation trend against α- chymotrypsin A. niger was decided to be improved through γ-rays treatment with the main objective to enhance the production, stability and function of the enzyme. The 1 kGy γ-rays exposed mutant (M-7) of A. niger was selected on the basis of deoxy-D- glucose resistance. The mutant M-7 was about two fold efficient for extracellular GA production in submerged cultivation on Vogel’s medium containing 4% (w/v) wheat bran, pH 5.0 at 30 oC. The mutant GA had same molecular mass on SDS-PAGE, however on MALDI-TOF a difference of about 814 Da was observed. The mutant GA proved to