For guidance on citations see FAQs.
The features and functionality of the different mobile devices has made them attractive targets for malicious applications. There are different types of risks are present in recent apps. Android's permission system is intended to inform users about the risks in installing apps. Whenever a user installs an application, he or she has the chance to review the application's permission requests and cancel the installation if the permissions are imprudent or unacceptable. Basically previous research focus on reliance on users is not so effective, as most of the users don't understand the permission information. Actually in this work focused on the permission of the particular application. In this work here proposed a system to provide summary risk communication to user in friendly manner which is easy to understand. Finally in this work introduced how to relate risk permissions and risk rating with the risk analysis by using risk score and risk value.
In recent years, Infrastructure-as-a-Service (IaaS) clouds have become increasingly popular as a flexible and inexpensive platform for ad-hoc parallel data processing. Major players in cloud computing have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their programs. However, currently used processing frameworks have been designed for static, homogeneous cluster systems and do not support the new features which distinguish the cloud platform. In this paper discussion is being done on the research project Nephele. Nephele is the first data processing framework to explicitly exploit the dynamic resource allocation offered by today"s IaaS clouds for both, task scheduling and execution. First performance results of Nephele are presented and its efficiency is compared with one of the well-known software, MapReduce. MapReduce is chosen for comparison since it is open source software and currently enjoys high popularity in the data processing community.
Deduplication is also called single instance technique, deduplication remove redundant data and stores original copy of data so it will saves the storage space to protect sensitive data. The data security and access to particular data is very much important in current days hence the features in deduplication have been widely used in cloud storage system. There was drawback in previous work where differential privileges of users are set permanently so any client can access any files which are not authorized to specific user. To overcome the drawback of the previous work, we are concentrated on client privileges which will grant or revoke the file access permissions to specific client. With deduplication technique, the client data is secured with advanced encryption algorithm rather than conventional encryption algorithm in hybrid cloud. In previous work convergent encryption technique was used with deduplication which does not provide the security to data. To better enhancement of the security of data, client has given specific permission to access the data, which is more enhanced security system for data security .Our simulation results shows that increase in security of data.
Fast development in low end devices permits so many extra aspects including huge storage capacity, sharing of data, formation of network, etc. User can use these aspects very efficiently. When data size is limited searching a particular file can done easily but difficulty comes when data size increases and it involves large collection of mobile nodes. In that case arrangement of data i.e. data organization and management become irritating work. However file system of devices itself provides a way to store similar files separately; still it becomes irritating when number of files increases. Even poor UI (User Interface) increases more difficulty in case of file retrieval. This paper presents model that allows user to annotate files and to search a file of interest on mobile devices. File is annotated using their spatial, common and temporal circumstance which are extracted from underlining operating system and used as a metadata which is used for searching a file of interest. The file search can be achieved on mobile itself or on other mobile also those are connected in Personal Area Network (PAN) using Bluetooth. The proposed model allows file annotation,
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.