Archive of

Advanced Engineering Science

Latest Journals

Volume 53, Issue 4 October-Dedember 2021


Gongcheng Kexue Yu Jishu/Advanced Engineering Science

Page No : 1-5
Author(s) : G BALA RENUKA, C SOUNDARYA, K BALAJI SUNIL CHANDRA

DOI : https://doi.org/10.5281/zenodo.12726563
Abstract :

An encrypted control system that use fog computing and is implemented in a real-world industrial context is the subject of this letter. The system that was created uses multiplicative homomorphic encryption to hide controller gains and signals via communication lines, protecting them from eavesdropping assaults. The designed system is confirmed to be feasible for position servo control of the motor-driven stage by experimental validation, which examined processing time, parameter variation, and performance deterioration. Whether or not the plant parameters change, the created system retains its stability even after encrypting the controller gains and signals. Increasing the length of an encryption key really improves control performance, even if it increases processing time.


Full article
Gongcheng Kexue Yu Jishu/Advanced Engineering Science

Page No : 6-16
Author(s) : C SOUNDARYA, D SNEHA, JANGILI RAVI KISHORE

DOI : https://doi.org/10.5281/zenodo.12726595
Abstract :

The research network has lately seen a surge in interest in distributed computing due to its many advantages; nevertheless, this trend has also brought up concerns about privacy and security. The availability and storage space for sensitive information has been a major issue for the zone. In particular, several researchers combed through encrypted files kept on remote servers in the cloud for answers. There have been a number of approaches to conjunctive catch-all searches, but less research into targeted system searches. With storage and communication costs that are either equal to or better than prior arrangements, we demonstrate a Bloom-based expression search procedure in this study that is much quicker. Using a succession of n-gram channels, our strategy enhances the utility. The approach is flexible enough to withstand consideration connection assaults, and it shows a trade-off between capacity and false positive rate. Also shown is a structural approach that take


Full article
Gongcheng Kexue Yu Jishu/Advanced Engineering Science

Page No : 17-23
Author(s) : D SNEHA, D SANKAR, VIJAYA BHASKAR MADGULA

DOI : https://doi.org/10.5281/zenodo.12726574
Abstract :

Through the use of the internet and a network of remote servers, organisations may now buy, rent, sell, or distribute software and other digital resources on demand. This model is known as cloud computing. Despite the many advantages of the new cloud computing paradigm, concerns about privacy and security for web-based cloud services persist. A system for controlling access to web-based cloud computing services that uses several factors of authentication is currently in development. The suggested authenticated access control system uses an attribute-based technique for controlling access; this mechanism necessitates the usage of a user secret key in addition to a trusted security key response. The login process is safeguarded by a system that requires a one-time password (OTP), and session keys are used to restrict the length of time a user may work. Since a user can't access the system without the OTP, secret key, and secret key response, the procedure enhances the sys


Full article

Journal Visit

Top Visit

Medium Visit

Less Visit

Not Visit