[vc_row][vc_column][vc_column_text]

Main Reference PaperAccess Control for Cloud Computing Through Secure OTP Logging as Services, International Journal of Computer Applications, May 2016.[Java/Cloudsim].

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1456723760841{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #eeeeee !important;border-left-color: #467db1 !important;border-left-style: solid !important;border-right-color: #467db1 !important;border-right-style: solid !important;border-top-color: #467db1 !important;border-top-style: solid !important;border-bottom-color: #467db1 !important;border-bottom-style: solid !important;}” el_class=”project_short_document_div”][vc_empty_space height=”0px”][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Research Area of the Project” tab_id=”1456231495772-0-1f030-5b4d”][vc_column_text]

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Description” tab_id=”c2f36d6a-352e-6f030-5b4d”][vc_column_text]
  • Access control model is proposed that works on the basis of OTP for logging service. AES algorithm and interpolation derivatives are used for the OTP generation to utilize minimum key generation time.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Aim & Objectives” tab_id=”1456230849764-0-4f030-5b4d”][vc_column_text]
  • To reduce the security risk over cloud services.

  • To validate proposed algorithm.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Contribution” tab_id=”1456230822819-0-7f030-5b4d”][vc_column_text]
  • A technique is contribute that provides more reliable password verification system.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Software Tools & Technologies” tab_id=”1456231644788-0-6f030-5b4d”][vc_column_text]
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Project Recommended For” tab_id=”1456231810927-0-6f030-5b4d”][vc_column_text]
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Order To Delivery ” tab_id=”1456477045723-0-9f030-5b4d”][vc_column_text]
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

[/vc_column_text][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Previous Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563772935049{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fcypherdb-a-novel-architecture-for-outsourcing-secure-database-processing|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Network Security Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563773035935{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fproject-titles-in-network-security-and-cryptography|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Next Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563773021248{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Ftowards-building-forensics-enabled-cloud-through-secure-logging-as-a-service|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][/vc_row_inner][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Go To” tab_id=”1469878537167-0-2″][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”WSN Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563432400530{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wireless-sensor-networks|title:WSN%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”MANET Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563525661549{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-mobile-ad-hoc-networks|title:MANET%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Wired Network Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563360785730{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wired-networks|title:Wired%20Network%20Project%20List|”][/vc_column_inner][/vc_row_inner][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Project Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fproject-enquiry|title:Project%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#eeeeee” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1460363650504{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-enquiry|title:PhD%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1456728243100{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Guidance” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-guidance|title:Ph.D%20Guidance|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1563275074524{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][/vc_row_inner][vc_empty_space height=”20px”][vc_column_text]

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

[/vc_column_text][/vc_column][/vc_row]