M. Vanitha

Learn More
We propose a Third party auditor(TPA) between data owner and cloud service provider(CSP) which reduce the burden of data owner to audit the data in the cloud and it also make the data owner free from worrying about the data lose in cloud storage. To highlight the security purpose we introduce an novel highly decentralized information accountability(More)
Controller Area Network (CAN) is a network protocol that allows multiple processors in a system to communicate efficiently with each other. Microprocessors became small enough and powerful enough to start appearing everywhere, not just inside personal computers. A CAN system sends messages using a serial bus network, with the individual nodes (processors)(More)
  • M Vanitha, Ar Sivakumaran, L Priyadharshini
  • 2015
Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud storage. Proof of Ownership (POW) improves storage efficiency by securely removing unnecessarily duplicated data on the storage server. The cloud storage service(More)
— The process of converting an acoustic waveform into the text resembling the information, conveyed by the speaker is termed as speech recognition. Nowadays, normally Hidden Markov Model (HMM) based speech recognizer with Mel Frequency Cepstral Coefficient (MFCC) feature extraction is used. The proposed speech feature vector is generated by projecting an(More)
Cognitive Radio (CR) is an emerging technology to solve the spectrum underutilization problems by opens the licensed spectrum bands for opportunistic usage and initiates spectrum trading to improve the spectrum utilization. The path selection problem in multihop cognitive radio networks (CRNs) are investigated below constraints on flow routing, link(More)
Wireless communication networks are in huge need and demand due to various features of internet and its availability and easy accessibility all over the world. Therefore, advanced security techniques and mechanism are required for private business application and for effective and secured data transfer from one network to other. Many common standards such(More)