Vtalk: Secure Deployment of VoIP over LAN’S
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Peer-to-peer VoIP (voice over IP) networks, exemplified by Skype, are becoming increasingly popular due to their significant cost advantage and richer call forwarding features than traditional public switched telephone networks. One of the most important features of a VoIP network is privacy (for VoIP clients). Unfortunately, most peer-to-peer VoIP networks neither provide personalization nor guarantee a quantifiable privacy level. In this paper, we propose novel flow analysis attacks that demonstrate the vulnerabilities of peer-to-peer VoIP networks to privacy attacks. We then address two important challenges in designing privacy-aware VoIP networks: Can we provide personalized privacy guarantees for VoIP clients that allow them to select privacy requirements on a per-call basis? How to design VoIP protocols to support customizable privacy guarantee? This paper proposes practical solutions to address these challenges using a quantifiable k-anonymity metric and a privacy-aware VoIP route setup and route maintenance protocols. We present detailed experimental evaluation that demonstrates the performance and scalability of our protocol, while meeting customizable privacy guarantees.
Authors and Affiliations
Ms. Sassirekha. S. M
"SL-SKE (Signature Less-Secret Key Encryption) For DataSharing in Clouds"
Abstract: Cloud cоmрutіոg іs tyріcаlly defіոed as а type of cоmрutіոg that relies оո shаrіոg cоmрutіոg resources. The Іոfrаstructure as а Service іո cloud offers the dаtа-ceոter servіces to stоre аոd mаոаge іոfоrmаtіоո,...
A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects
Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency ofoccurr...
Simulation of Route Optimization with load balancing Using AntNet System
This paper is based on analysis of the performance of load balancing and route optimization in computerized networks. The complete system model shows the scenario of Packet distribution between nodes, and if cong...
Energy Consumption of Intermediate node in AODV
Abstract: An A MANET(Mobile Ad-Hoc NETwork)is a network of wireless mobile nodes,without a centralizedcontrol.MANET can be characterized as unstructured Ad-Hoc,mobile nodes with limited resources includingenergy.AO...
Qualitative Study on the efficiency of Load balancing algorithmsin Cloud Environment
Abstract: Load balancing in cloud is different from the typical architecture of load balancing techniques. Thisopens up new opportunities and challenges. Resource management is the use of available processors in th...