LiveZilla Live Chat Software
Warning STRICT ERROR REPORTING IS ON
Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment

Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment

Starting at: Rs.4,500.00

4500 reward points

Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment

 Digital certificates and signatures provide protection in legally binding situations. Even though the digital certificates are used in banking and other legal binding process, they have got their own drawbacks which could be financial or technical. Financial being subscription for the service and technical being creation of platform that could accept all digital certificates and human errors. If the CA is subverted, then the security of the entire system is lost; resulting in a security breach of the entities that trust the compromised CA. Maintenance of CA in two or more levels requires more cost and time for authentication. Moreover CA is a third party, so most of the business organizations, corporate, colleges and governments that use applications expect more security but doesn’t like to depend on a third party. This paper proposes a new concept called Supervisory Host (SH) which is a static node that takes care of certificate generation and distribution. The advantages of Supervisory Host are simple registration process, reduced level of key exchange process and improved authentication process between two parties. SH is maintained independently for any particular application, the trust level is high and authentication process can be improved with the help of ECDSA (Elliptic Curve Cryptography Digital Signature Algorithm) algorithm. Existing projects use RSA (RivestShamir-Adelman) algorithm for encrypting the message which has a key Size of 1024 bits, but in ECDSA the key size is 168 bits which is far less when compare to RSA algorithm. The main advantages of ECDSA are greater security for a given key size, effective and compact implementation for cryptographic operations requiring smaller chips, which results in less heat generation and less power consumption, suitable for machines having low bandwidth, low computing power, less memory and easy hardware implementations. So the combination of SH and ECDSA algorithm helps to improve the trust level in organizations.


 


ClickMyProject Specifications
 
 
Including Packages
 
Specialization
 
  * Supporting Softwares   * 24/7 Support
  * Complete Source Code   * Ticketing System
  * Complete Documentation   * Voice Conference
  * Complete Presentation Slides   * Video On Demand *
  * Flow Diagram   * Remote Connectivity *
  * Database File   * Code Customization **
  * Screenshots   * Document Customization **
  * Execution Procedure   * Live Chat Support
  * Readme File   * Toll Free Support *
  * Addons    
  * Video Tutorials    
       
 

*- PremiumSupport Service (Based on Service Hours) ** - Premium Development Service (Based on Requirements)


Add to Cart:

  • Model: PROJ5882
  • 999 Units in Stock
  • Manufactured by: ClickMyProjects

Please Choose:

Downloadable







This product was added to our catalog on Monday 03 October, 2016.

  0