International Conference on Advances & Challenges in Interdisciplinary Engineering and Management
84
International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM 2017]
ISBN Website Received Article ID
978-81-933235-1-9 icaciem.org 10 – January – 2017 ICACIEM167
VOL eMail Accepted eAID
01 icaciem@asdf.res.in 28 - January – 2017 ICACIEM.2017.167
Asynchronous Power Management Using Grid Deployment Method for Wireless Sensor Networks in Critical Situation Dheepika Rajamanickam1, S Pavithra2, K Rajalakshmi3, N Udhaya4, P J Shriidhar5 1,2,3,4,5 Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India Abstract: A correct node operation and power administration are significant issues in the wireless sensor network system. Ultrasonic, dead reckoning, and radio frequency information is obtained by using localization mechanism and worked through a specific filter algorithm. In this paper, a wellorganized grid deployment method is applied to split the nodes into multiple individual grids. The tiny grids are used for improved resolution and bigger grids are used to decrease the complexity of processing. The efficiency of each grid is obtained by environmental factors such as redeployed nodes, boundaries, and obstacles. To decrease the power usage, asynchronous power management method is designed. In network communication, power management method is applied by using an asynchronous awakening scheme and n-duplicate coverage algorithm is engineered for the coverage of nodes.
ISBN Website Received Article ID
978-81-933235-1-9 icaciem.org 10 – January – 2017 ICACIEM168
VOL eMail Accepted eAID
01 icaciem@asdf.res.in 28 - January – 2017 ICACIEM.2017.168
Denial to “Analysis on Control Cloud Data Entrance Freedom and Ambiguity with Entirely Anonymous Attribute-Based Encryption” P Praveen Kumar1, T Tamilselvan2, V Prabhakaran3, K Meiyalakan4 Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India
1,2,3,4
Abstract: Cloud computing is a revolutionary computing pattern, which enables flexible, on-demand, and low-cost usage of computing possessions, but the data is outsourced to some cloud servers, and various privacy concerns appear from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the entrance organize, while less attention is paid to the privilege control and the identity privacy. In our proposed we offer complete user security and data security. Encryption /Decryption algorithms are used for data security, for user the password is automatically generated by the system. If the user wants to upload the data the authority will send a 16 bit private key to the data owner. After putting this key data owner can upload his documents to the cloud, drop box is a public cloud here we are used. This paper is prepared exclusively for International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM 2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr K Samidurai and Editors Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution.
2017 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]
`