In current environment there are various application where WSN is used. These area may be critical fields as well. Because WSN is very easy to set and very cost efficient network. Each node in the sensor network has specific number of nodes. Each node can transmit and receive the signal. Because each node has battery as energy source, so there is a high chances of energy depletion early. So various researches has been done in current time to have efficient protocols which can utilize energy is time efficient manner. This will protect the node from being dead and also enhance the life time of the node. Various cluster based protocols are there which can sib divide the network area into smaller parts and each part can have specific number of sensor nodes deployed randomly. Based on residual energy one node will be selected as cluster head. All sensor node will collect the data and sends that data to the cluster head. And then cluster head to the base station.
Abstract:Cloud computing is an internet based computing which enables sharing of services. Many users place their data in the cloud, so the misuse of data and safeguarding the Cloud Service Provider and Cloud User is a prime concern. This work studies the problem of ensuring Cloud Service Provider and Cloud User both do not take advantage of each other data storage in cloud computing environment. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that cloud users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public audit ability for cloud storage is of critical importance so that users can resort to a third party auditor to check the integrity of outsourced data and be worry-free. The new auditing scheme effectively does not bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden in terms of computational overhead to cloud user. This new scheme privacy-preserving public auditing process is implemented and performance of such audited with respect to its computation overhead and timing have being analyzed .
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.