PROJECT TITLE :

Secure Source Coding With Action-Dependent Side Information

ABSTRACT:

We tend to consider the problems of secure lossy source coding with side data in the presence of a passive eavesdropper who has access to the source description. The encoder needs to compress the supply sequence in order to satisfy a distortion criterion at the decoder, while revealing only limited knowledge regarding the supply to the eavesdropper. The facet info on the market to the encoder, the legitimate decoder, or the eavesdropper will be influenced by a price-constrained action sequence. 3 different settings are studied. In the first 2 settings, we are fascinated by understanding the influence of the action sequence on the speed-distortion-leakage tradeoff where the action is taken either by the decoder or by the encoder to influence aspect data at the decoder and eavesdropper. Next, we have a tendency to consider a setting where common action-dependent side data is available securely to both encoder and decoder, and therefore will be used for secret key generation. We have a tendency to characterize the optimal rate-distortion-value-leakage region or the corresponding inner bounds for a discrete memoryless source for above settings. The results are useful in characterizing elementary limits for instance in secure sensor NetWorking and future cyber physical systems.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry