Wednesday, October 30, 2019

All Fungi Are Not the Same Essay Example | Topics and Well Written Essays - 500 words - 1

All Fungi Are Not the Same - Essay Example Basidiomycota phylum develops through sexual means. Basidiospores are formed on club-shaped structures known as basidia. A terminal hyphal cell produces spores called basidium. In this phylum, asexual reproduction occurs, but occasionally. Some of its typical examples include the mushrooms rusts and toadstools. The Zygomycota phylum develops by both sexual and asexual means. They have thallus, which is composed of hyphae, which elongates through the growth of a tip. Multinucleate hyphae do not have septa except for the reproductive structures. When hyphae fuse, this directly leads to the formation of a zygote. In the process of zygote formation, meiosis occurs shortly before it germinates. The typical examples of the phylum include the Rhizopus commonly referred to as the black bread mold. As Vandenkoornhuyse, et al. (2002) observes, generally, fungi are eukaryotic organisms that are neither plants nor animals. As heterotrophic organisms that are devoid of chlorophyll, they obtain their nutrients through absorption. Glycogen is the primary carbohydrate stored in fungi. Fungi excrete enzymes into their food source and live within an external digestion. Ascomycota live in specific locations often forming symbiotic relationships with plant roots, stems, leaves and algae to obtain nutrients. Basidiomycota are mutualistic symbionts and obtain nutrients from living hosts, roots, vascular plants and insects. They obtain sugars and nutrients produced through photosynthesis. Zygomycota makes use of light regulation for its development and growth. Light directs the growth of structures and activates the metabolic pathways. Zygomycetes grow in a wide range of environments and temperatures, with some growing in aerobic conditions. However, most are terrestrial meaning that they g row in liquid culture, at salty concentrations and high water activities to obtain nutrients. They can also be found in decaying animal and

Monday, October 28, 2019

Philosophy of life Essay Example for Free

Philosophy of life Essay ?I saw this quote in Mr. Laxman Gnawali’s laptop and I copied it right away, I don’t know but I liked that line very much. The quote was written on the wall of some park the place was really clean and that picture showed that it was really nice clean with lots of trees. After searching it in the internet I found it that it was the attribute to those who lost their lives in the war. We were talking about the teaching training session. We were told that we can achieve the next level in our career but we need to concentrate and do the session delivery seriously. There the quote was quite related because we had the freedom to be a teacher trainer but we have to be more responsible and develop certain habit, there with the freedom comes the responsibility. Looking at the history of freedom one can always see war as the synonyma for the freedom. The first thing that comes in our mind when we talk about freedom is war and quarrels. This phrase is mostly used by the people to show gratitude towards those who have lost their life in wars. There are so many articles and books written on them or about them. Shiv Khera have written a book â€Å"freedom is not Free† and there are mny other people who have talked about it and this is the phrase I think will be talked in coming future or as long as the existence of the human beings. Freedoms are rights of individuals, according to Webster its a state in which somebody is able to act and live as he or she chooses, without being subject to any, or to any undue, restraints and restrictions. As our country is democratic country and we proudly say that we are free, we have every freedom to do whatever we like to but in the beginning we fought for our freedom, can we still be fighting. In the beginning we fought for our freedom, with the birtishers, we fought with them not for the freedom but to keep our country free. We fought for the democracy from the Rana rulers and then we fought for the cruel royal rule and we achieve the freedom but the question remains that we have been fighting within ourselves. Now we have the ability to exercise free will and make choices independently of any external determining force, but are we truly free. I think we are still fighting within ourselves for the freedom we dream of. History has been our eyewitness that whenever we fought we fought to rule and not for the development or growth and we are still doing that. First we had MAHISHPAL than came GOPALA DYNESTYR and KIRAT after that many other than the most influential SHAH now we have politicians ruling still to rule not to develop. If I talk about the freedom realting with our history than it will never finish. Historians believe were not free, but on the other hand I just say we have our rights and restrains. Because completely unrestricted freedom of action would make peaceful human existence impossible, some restraints on freedom of action are necessary and inevitable. But, we do have to recognize that basic limitation, to make our life safe. We the people have to turn over some of our rights so that our country performs right and many say that the government is in our business but if they werent all chaos would occur. But, Freedom becomes a cost, a cost of just giving up some rights in return to be a great nation. But, some cost could become a concern. In the declaration of independence, Thomas Jefferson have clearly stated the difficulties and problems that America has to face on the process. The very recent and clear example abo;ut freedom is not free is our own country’s fight against the maost. We faced difficulties than one can imagine but ultimately we overcame with all the difficulties we faced. In the process of freedom government has to include all the armies of moist as well. There comes the pay for freedom. We had to go through traumas which many of the nation have been through but that trauma was from our own people to their own family. India, the biggest country with large population, which is emerging ijn every field in this modern time, have faced problems. They were colonized by British people and treated in the most cruel behave that one could ever treat to another human being in their own country but they fought for their freedom and have lost so many lives but at last they are free. The payment that they paid for the freedom are the lives, the great politicians and enthusiastic youths, there county were divided into parts and there is still fight among those country. Though they got the freedom they are still paying for it, that is why freedom is not free. America the land of opportunity, was not free and with the help of many freedom fighters they declare the independence. Instead of freedom they call it independent, as everyone knows in America most of the people are from different countries, the native people, the red Indians have actually lost their identity in order to be independent or free. the country have faced so many difficulties and still facing but it is the free country everyone says and believed that but they have the most criminal records and most frustration within their country. The fragmented society, self-centered individual, loss of culture and focus point of terrorism are the payment USA is paying with. Every country have their own struggle and history of freedom and the kinds pf payment they are paying as the freedom is not free. All the great people in this world has paid one or the other way for the freedom they fought for. Countries have faced the war and loss of the youngsters but the individual who are the great influential for that event lost their family ,loved once, and their own life as well. Hitler’s life story also suggest that freedom is not free.he hated zuse and to free himself from them he committed the crime which no human can forget and he is the most cruel person in this world. He could not face the failure and to make himself free from the thought of failure he continued doing the things which kept him free from that thought and the payment for the freedom of his thought is being cruel and called murderer and be alone in all his life. However his murder is still have no actual evidence but he was killed because he was becoming cruel and threat for many people so in the quest of freedom to free the abuse and feeling of failure he paid it with his life. Mahatma Gandhi, India call him their BAPU, was hated by his son because he had no time to spend with the family as he was in great mission to free his country from the Birtish. He freed his fellow country but the payment was his own children, he was killed by the very young person as people saw that his generosity is causing the country into many countries. He was free from all the material things and loved by all the people but to gain this freedom to loved by everyone with his life. The four martyrs, who was killed by rana rulers for their freedom speech also shows that whatever our country have got is not free. in whatever way we are enjoying or complaining about is actually the payment that those martyrs paid. They were from well known and educated family but in the quest to free the country from the ranas they paid their life and we got freedom. Being anyone as human is not free from all the responsibilities and rules that we need to follow. As a baby you are free to cry over anything but the payment is most of the time people don’t understand what your problem is. As a student you are allowed to make noise or make wrong choice but the payment is later on you have to fail in your exam and in your life. As a social worker you have the freedom to help others and take their pain as your own and the payment you have to pay is your time, for you and for your family, as an engineer, your freedom is to use any model but the payment is you have to be responsible for the lives of the people who will stay there, as writer you are free to write anything but the payment is no one will write about you, as the teacher you have the freedom to conduct your classroom as you wanted but the payment is you have to be the model all the time, you cannot make any mistake if you do you have to deal with all the consequences that might occur or the payment is your time and effort. When you see some advertisement on television about the free scheme, we always need to buy something with it because nothing is free, not even the water, the air. Freedom is actually the metaphor for all the responsibilities that comes with freedom. When one becomes the minister or join the politics, like in our country everyone blames them to be the negative one, you are free to be the politician but the payment is you won’t be trusted. When I first started to teach I don’t have any freedom to chose what I do in the classroom, so I was just following whatever the teacher told me to do and there no one expected anything from me so I was free from the responsibility and the payment I was paying is getting the low pay. As I developed the teaching learning skill and given the full responsibility of the class, I had the freedom to do any kind of things in the classroom and make it my own and include everything I have learnt but the payment is time and the continuous work load and no self time. Likewise with the PGDE course we had the freedom to garnish ourselves and the payment is all the criteria that was set for us to be what we were trained to be. FREEDOM IS NOT FREE, even the quote is controversial because when freedom is not free than why would one use these words and if it is used why it is mostly related with the people who have done so much for the betterment of the human being?

Saturday, October 26, 2019

Free Essays - Alienation in Landscape for a Good Woman :: Landscape for a Good Woman Essays

Alienation in Landscape for a Good Woman In her introduction to Landscape for a Good Woman, Carolyn Steedman claims that "this is a drama of class" (22); she blames her mother's working-class background -- where "fierce resentment against the unfairness of things, was carried through seventy years and three generations ... [and] dissolved into the figure of [her] mother" (30) -- for her own joyless childhood. The shocking portrait of Steedman's mother, who tells her children repeatedly both in her actions and words how unwanted they are, redefines the culturally normative nurturing role of motherhood. While Steedman's passionate argument -- that her mother's history of material inequality was responsible for the creation of this monster-martyr-mother -- must not be discounted, it is incomplete. Her claim is convincing; however, her mother's poor decisions were also contributory causes. For example, Edna selected a married man who already had a daughter as the prince who would fulfill her desires for property, material goods and status which seems risky at best. However, her desperate, failed attempt to become his wife through motherhood after ten years of cohabitation is striking for both its evident lack of foresight and blindness to reality. It is difficult to imagine that her fantasy whereby life would somehow improve from this decision ever had the chance to be anything but a recipe for failure, especially since she pinned her hopes on this ploy not once,but twice. Perhaps Steedman wishes to imply that her mother's working-class status is responsible for her poor decision making skills. She certainly wants to convince us that her mother's desire for things is not trivial; and she blames her "mother's sense of unfairness, her belief that she had been refused entry to her rightful place in the world" (112), on her working-class status. While this is certainly a key factor in the disturbing tale, it is not the only factor; therefore, the story is more than a drama of class, for this complex portrait of Steedman's mother is that of a vain, mean-spirited, bitter woman whose priorities were in disorder. The fact that Steedman's mother's working-class relatives did not visit this "illegitimate" family indicates that her lack of a marriage certificate was unacceptable within her own class as well.

Thursday, October 24, 2019

Applications of Biometrics in Cloud Security

CHAPTER ONE 1. 1 INTRODUCTION The success of modern day technologies highly depends on its effectiveness of the world’s norms, its ease of use by end users and most importantly its degree of information security and control. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure ‘in the cloud’ that supports them [15, 16].Authentication, thus, becomes pretty important for cloud security. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. The term comes from the Greek words bios (life) and metrikos (measure). To make a personal recognition, biometrics relies on who you are or what you do—as opposed to what you know. OBJECTIVES 1 To know and understand the meaning of biometric, its uses, the characteristics and also its advantages and challenges. To know and understand the full meaning of cloud computing its type and its service providers 3 To explain the about cloud security and its shortfalls 4 To know how biometric technology can be applied to enhance security in cloud computing CHAPTER TWO 2. 0 BIOMETRICS The word â€Å"biometrics† comes from the Greek language and is derived from the words bio (life) and metric (to measure). Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits.Computer science, biometrics to be specific, is used as a form of identification [1]. Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic [2]. Biometrics offers new perspectives in high-security applications while supporting natural, user-friendly and fast authentication. Biometric technology uses these characteristics to identify individuals automatica lly1. Ideally the characteristic should be universally present, unique to the individual, stable over time and easily measurable [5]. 2. Biometric systems A biometric system provides an automated method of recognizing an individual based on the individual's biometric. A biometric is a measurement of a biological characteristic such as fingerprint, iris pattern, retina image, face or hand geometry; or a behavioural characteristic such as voice, gait or signature. Behavioural biometrics are related to the behaviour of a Person, including but not limited to: typing rhythm, gait, and voice. Some researchers have coined the term behaviourmetrics to describe the behaviour class of biometrics [1].A biometric system is essentially a pattern-recognition system that recognizes a person based on a feature vector derived from a specific physiological or behavioural characteristic that the person possesses [3]. Biometric systems can be used in two different modes. Identity verification occurs wh en the user claims to be already enrolled in the system (presents an ID card or login name); in this case the biometric data obtained from the user is compared to the user’s data already stored in the database Identification (also called search) occurs when the identity of the user is a priori unknown.In this case the user’s biometric data is matched against all the records in the database as the user can be anywhere in the database or he/she actually does not have to be there at all [4]. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. 2. 2 Biometric Authentication Authentication on the other hand, is a process where a known person's live biometric is compared to a stored template of that person.For example, an individual’s identity is revealed to the biometric system upon entering a PIN (Personal Identification Number). To authenticate that this is the person associated wi th this PIN, a live biometric is presented by the individual and compared to the template and a match is determined. This is known as a ‘one to one’ search. It is more accurate than the ‘one to many’ application and is the predominant biometric process in place today and the more privacy friendly of the two systems.This answers the question – Are you who you say you are? Two general uses of biometrics are identification and verification which both require the existence of reference data that the person’s measured traits will be compared with reference templates or raw data. During these processes, a biometric data sample is compared against the respective biometric data of every person enrolled in the database or against a single reference template of a particular enrolled individual in order to confirm the identity of that person respectively.When a biometric system correctly identifies a person, then the result of the identification process is a true positive, whereas if the system correctly rejects a person as not matching the respective enrolled template, the result is a true negative. Similarly, when the system incorrectly identifies or rejects a person then we speak about a false positive or a false negative. Fig 2. 1 Components of a Biometric Authentication System[31] 2. 3 BIOMETRIC SECURITY SYSTEM The biometric security system is a lock and capture mechanism to control access to specific data.In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometric s is the key to open that lock [11]. 2. 4 CRITERIA FOR BIOMETRIC SYSTEM[12]There are seven basic criteria for biometric security system: [12] * Uniqueness: uniqueness is considered as the priority one requirement for biometric data. It will indicate how differently and uniquely the biometric system will be able to recognize each user among groups of users . For instance, the DNA of each person is unique and it is impossible to replicate. * Universality: Universality is a criterion for the biometric security that indicates requirements for unique characteristics of each person in the world, which cannot be replicated. For example, retinal and iris are characteristics will satisfy this requirement. Permanence: permanence parameter is required for every single characteristic or trait which is recorded in the database of the system and needs to be constant for a certain period of time period. This parameter will mostly be affected by the age of the user * Collectability: The collectabil ity parameter requires the collection of each characteristic and trait by the system in order to verify their identification * Performance: performance outlines how well the security system works. The accuracy and robustness are main factors for the biometric security system.These factors will decide the performance of the biometric security system * Acceptability: The acceptability parameter will choose fields in which biometric technologies are acceptable. * Circumvention: circumvention will decide how easily each characteristic and trait provided by the user can lead to failure during the verification process. DNA is believed to be the most difficult characteristic leading to the failure of the verification process [13]. Figure 2. 2 Basic Criteria for Biometrics Security System [26] 2. 5 TYPES OF BIOMETRIC systems Two classes of biometric methods are: 1) Physical Biometrics:Physiological biometrics is based on measurements and data derived from direct measurement of a part of the human body. * Fingerprint: Fingerprint recognition is one of the best known and most widely used Biometric technologies. Fingerprint recognition technology extracts features from impressions made by the distinct ridges on the fingertips. * Iris-scan: Iris recognition technology is based on the distinctly coloured ring surrounding the pupil of the eye. Iris recognition systems use a small, high-quality camera to capture a black and white, high-resolution image of the iris. Retina-scan: Retina recognition technology captures and analyses the patterns of blood vessels on the thin nerve on the back of the eyeball that processes light entering through the pupil. * Hand geometry: Hand geometry technology takes 96 measurements of the hand, including the width, height, and length of the fingers; distances between joints; and shape of the knuckles. * Facial recognition : Facial recognition technology identifies people by analysing features of the face not easily altered—the upper out lines of the eye sockets, the areas around the cheekbones, and the sides of the mouth..Facial recognition can be used in both verification and identification systems. 2) Behavioural characteristics are based on an action taken by a person. Behavioural biometrics, in turn, are based on measurements and data derived from an action, and indirectly measure characteristics of the human body * Voice recognition: Voice authentication is unique and non-intrusive method and also the hardware requirements required for this type of authentication are cheap and are available readily. Microphones can be used for this purpose.However the back ground noise must be controlled, high storage is required for this kind of authentication. This type of authentication can also be extraneously influenced by once sore throat and cold. [7] * Keystroke-scan: Keystroke dynamics is a biometric based on the assumption that different people type in uniquely characteristic manners. Observation of telegraph operato rs in the 19th century revealed personally distinctive patterns when keying messages over telegraph lines, and telegraph operators could recognize each other based on only their keying dynamics [22].Keystroke dynamics is known with a few different names: keyboard dynamics, keystroke analysis, typing biometrics and typing rhythms [22]. Currently users begin information to computer systems via physical keyboards or keyboards on touch screens. The main advantage of using keystroke dynamics is that it can be used without any additional hardware. Thus it is inexpensive. The user acceptance of a keystroke dynamics biometric system is very high, since it is not intrusive and users do not necessarily even notice that such a system is used [22, 27]. Signature Recognition: Signature recognition authenticates identity by measuring handwritten signatures. The signature is treated as a series of movements that contain unique biometric data, such as personal rhythm, acceleration, and pressure flo w. In a signature recognition system, a person signs his or her name on a digitized graphics tablet or personal digital assistant. The technology can also track each person’s natural signature fluctuations over time. The signature dynamics information is encrypted and compressed into a template.One of the defining characteristics of a behavioural biometric is the incorporation of time as a metric – the measured behaviour has a beginning, middle and end [6]. A number of biometric methods have been introduced over the years, but few have gained wide acceptance. 2. 6 PERFORMANCE OF BIOMETRICS SYSTEMS The following are used as performance metrics for biometric systems [8]. * False Accept Rate FAR and False Reject Rate FRR: The FAR gives a measure of the probability that an individual will be ‘falsely accepted’ by the system (i. . that the system accepts someone who is not enrolled on the system, or makes an incorrect identification). The FRR indicates how like ly it is that a legitimate user will be rejected. The balance between the FAR and the FRR greatly influences both the security and usability of the system. The False Rejection Rate (FRR) is usually caused by lighting, climate conditions, low quality equipment or inexperience. The False Acceptance Rate (FAR) is caused by the security standard being too low [9]. False Match Rate FMR and False NonMatch Rate FNMR: A false match occurs when a system incorrectly matches an identity, In verification and positive identification systems, unauthorized people can be granted access to facilities or resources as the result of incorrect matches. That occurs when a subsequent reading does not properly match the enrolled biometric relating to that individual, something that results in Denial of Access to services. * The Crossover Error Rate (CER): The Crossover Error Rate (CER) is defined as the error rate of the system when the FAR and FRR are equal.Usually expressed as a percentage, the CER can b e used to compare the performance of different biometric systems. * False enrol rate: This occurs when a person’s biometric is either unrecognizable, or when it is not of a sufficiently high standard for the machine to make a judgment, something that does not allow the user to enrol in the system in the first place. The fingerprints of people who work extensively at manual labour are often too worn to be captured. A high percentage of people are unable to enrol in retina recognition systems because of the precision such systems require.People who are mute cannot use voice systems, and people lacking fingers or hands from congenital disease, surgery, or injury cannot use fingerprint or hand geometry systems [10]. Applications of biometrics 2. 7ADVANTAGES OF BIOMETRIC SECURITY [14] 1. The first advantage of using this new technology is the uniqueness and it is also the main characteristic which allows biometrics technology to become more and more important in our lives. With un iqueness of biometrics technology, each individual's identification will be single most effective identification for that user.A chance of two users having the same identification in the biometrics security technology system is nearly zero. 2. Secondly, the highly secure way of identifying users makes this technology less prone for users to share access to highly sensitive data. For example, users can share their fingerprints, iris and so forth allowing other users access to secure information. Each trait used during identification is a single property of that user. In other words, it is extremely hard or impossible to make duplicate or share biometrics accessing data with other users.This makes it ever more secure allowing user information and data to be kept highly secure from unauthorized users. 3. This identification of users though biometrics cannot be lost, stolen or forgotten. This aspect of biometrics technology allows it to become more popular in its use. This method of ide ntifying and giving access to user makes user identification a lot easier. Finally, most biometrics security systems are easy to install and it requires small amount of funding for equipment (except modern biometrics technology such as: DNA/retinal/iris recognition). . 8 CHALLENGES AND ISSUES Nothing is 100% secure, not even biometrics. Nevertheless, biometrics does provide the means to present security credentials that are unique. Unlike other systems that may rely on passwords or tokens that can be vulnerable to loss or exploitation, no one is going enter your live biometric as a means of impersonation Just as a firewall does not constitute a network security solution but rather a component of a defensive strategy, biometrics could be viewed in the same manner.It is not enough to assume absolute verification with biometrics alone but rather as part of a well designed security implementation that considers strong two factor authentication. The second major threat is concerned with modification of the components of the authentication system. The capture device could be modified to output a different image to the one captured. Alternatively, it could be modified to create a denial-of-service (DoS) that will prevent legitimate users accessing the system (by smashing a camera, for example). The processes of emplate generation or template matching could be subverted to produce erroneous results; for example, a piece of malicious code could interfere with the template generation software to produce the attacker’s template rather than that of the legitimate user, or the matching process could be modified to produce an artificially high or low matching score. CHAPTER THREE 3. 1 CLOUD COMPUTING Cloud computing is a means of accessing computer facilities via the Internet, where the adjective â€Å"cloud† reflects the diagrammatic use of a cloud as a metaphor for the Internet.Most of us have been using cloud-computing facilities in one form or another for years through ordinary email and the World Wide Web. Recently, the term has come to reflect the use of software and the running of computer applications via the Internet where the computer infrastructure and software are not â€Å"on premises. † Cloud computing, as a form of service provisioning, has given rise to several related concepts, such as mesh computing, cloud platforms, and software plus service. Cloud Computing is a new computing model that distributes the computing missions on a resource pool that includes a large amount of computing resources.In a survey undertaken by the International Data Corporation (IDC) group between 2008 and 2009, the majority of results point to employing Cloud computing as a low-cost viable option to users [17] developers or research projects and even e-commerce entrepreneurs. Using Cloud computing can help in keeping one’s IT budget to a bare minimum. It is also ideally suited for development and testing scenarios. It is the easie st solution to test potential proof of concepts without investing too much capital.Using cloud computing service, users can store their critical data in servers and can access their data anywhere they can with the Internet and do not need to worry about system breakdown or disk faults, etc. Also, different users in one system can share their information and work, as well as play games together. Many important companies such as Amazon, Google, IBM, Microsoft, and Yahoo are the forerunners that provide cloud computing services. Recently more and more companies such as SalesForce, Facebook, YouTube, MySpace etc. also begin to provide all kinds of cloud computing services for Internet users . 2 TYPES OF CLOUDS [18] In providing a secure Cloud computing solution, a major decision is to decide on the type of cloud to be implemented. Currently there are three types of cloud deployment models offered, namely, a public, private and hybrid cloud. A. Public Cloud A public cloud is a model whic h allows users’ access to the cloud via interfaces using mainstream web browsers. It’s typically based on a pay-per-use model, similar to a prepaid electricity metering system which is flexible enough to cater for spikes in demand for cloud optimisation.This helps cloud clients to better match their IT expenditure at an operational level by decreasing its capital expenditure on IT infrastructure [19]. Public clouds are less secure than the other cloud models because it places an additional burden of ensuring all applications and data accessed on the public cloud are not subjected to malicious attacks. Therefore trust and privacy concerns are rife when dealing with Public clouds with the Cloud SLA at its core. B. Private Cloud A private cloud is set up within an organisation’s internal enterprise datacenter.It is easier to align with security, compliance, and regulatory requirements, and provides more enterprise control over deployment and use. In the private clo ud, scalable resources and virtual applications provided by the cloud vendor are pooled together and available for cloud users to share and use. It differs from the public cloud in that all the cloud resources and applications are managed by the organisation itself, similar to Intranet functionality. Utilisation on the private cloud can be much more secure than that of the public cloud because of its specified internal exposure.Only the organisation and designated stakeholders may have access to operate on a specific Private cloud [20]. C. Hybrid Cloud A hybrid cloud is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit, and circumscribed by a secure network [20]. It provides virtual IT solutions through a mix of both public and private clouds. Hybrid Clouds provide more secure control of the data and applications and allows various parties to access information over the Internet. It also has an open architecture that allow s interfaces with other management systems. . 3 CLOUD COMPUTING DELIVERY MODELS [18] The architecture of Cloud computing can be categorised according to the three types of delivery models, namely Infrastructure as a service (IaaS), Software as a service (SaaS) and Platform as a service (PaaS). A. Infrastructure as a Service (IaaS) Infrastructure as a Service is a single tenant cloud layer where the Cloud computing vendor’s dedicated resources are only shared with contracted clients at a pay-per-use fee. This greatly minimizes the need for huge initial investment in computing hardware such as servers, networking devices and processing power.They also allow varying degrees of financial and functional flexibility not found in internal data centers or with co-location services, because computing resources can be added or released much more quickly and cost-effectively than in an internal data center or with a colocation service [21]. B. Software as a Service (SaaS) Software as a Service also operates on the virtualised and pay-per-use costing model whereby software applications are leased out to contracted organisations by specialised SaaS vendors. This is traditionally accessed remotely using a web browser via the Internet.Software as a service applications are accessed using web browsers over the Internet therefore web browser security is vitally important. Information security officers will need to consider various methods of securing SaaS applications. Web Services (WS) security, Extendable Markup Language (XML) encryption, Secure Socket Layer (SSL) and available options which are used in enforcing data protection transmitted over the Internet. C. Platform as a Service (PaaS) Platform as a service cloud layer works like IaaS but it provides an additional level of â€Å"rented† functionality.Clients using PaaS services transfer even more costs from capital investment to operational expenses but must acknowledge the additional constraints and possi bly some degree of lock-in posed by the additional functionality layers [20] . The use of virtual machines act as a catalyst in the PaaS layer in Cloud computing. Virtual machines must be protected against malicious attacks such as cloud malware. Therefore maintaining the integrity of applications and well enforcing accurate authentication checks during the transfer of data across the entire networking channels is fundamental.Figure 3. 1 CLOUD COMPUTING MAP [18] 3. 4 CLOUD SECURITY Cloud computing have many advantages in cost reduction, resource sharing and time saving for new service deployment. While in a cloud computing system, most data and software that users use reside on the Internet, which bring some new challenges for the system, especially security and privacy. Since each application may use resource from multiple servers. The servers are potentially based at multiple locations and the services provided by the cloud may use different infrastructures across organizations.Al l these characteristics of cloud computing make it complicated to provide security in cloud computing. To ensure adequate security in cloud computing, various security issues, such as authentication, data confidentiality and integrity, and non-repudiation, all need to be taken into account. The biggest challenge in implementing successful Cloud computing technologies is managing the security. As with any new technology enhancements, criticisms are driven by fear of unknown variables and changes to current control procedures. How can cloud stakeholders ensure and promote the security of Cloud computing?In the Cloud Computing Services Survey conducted during August 08/09 by IDC IT group [17], users were asked to rate their issues and challenges experienced with Cloud computing. The results illustrate that security is the biggest concern. Security is the main issue users are concerned with when considering Cloud computing solutions. CHAPTER FOUR 4. 1 APPLICATION OF BIOMETRICS IN CLOUD SECURITY One of the Security risks in cloud computing according to Garfunkel [23] is hacked passwords or data intrusion. If someone hacks a password they get control over the resources.They can manipulate the information or disable the services. Furthermore, there is a possibility for the user’s email (Amazon user name) to be hacked (see [24] for a discussion of the potential risks of email), and since Amazon allows a lost password to be reset by email, the hacker may still be able to log in to the account after receiving the new reset password [25]. As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant , want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_c hecker A Hybrid biometric method can be developed by fusing finger prints and voice biometric methods. The fused value can be used as signal sign on for multiple resources provided by cloud. This encrypted data is used for authentication 4. 2BIOMETRIC AUTHENTICATION SYSTEM AS A CLOUD SERVICE:The authentication service provider maintains the biometric data base . The data has to be stored in encrypted format using cryptography on biometric for the security reasons 4. 2. 1ARCHITECTURE BIOMETRICS AUTHENTICATION SYSTEM A secure data access scheme based on identity-based Encryption and biometric authentication for cloud communication Cloud Services1 CS1 Cloud Services1 CS3 Cloud Services1 CS2 Biometric Authentication Service Org1 User1 User2 †¦ Org2 User1 User2 Fig4. 1: Biometric Authenticating System in cloud [30].The user initially enrols with the biometric system which is provided by a cloud, once the identity is registered his/her biometric authentication details are stored in c loud service provider database. The authorization details are also entered at the registration time which is also encrypted. Whenever the user wants to use any cloud service user first uses the biometric authentication service rather than a traditional password mechanism. Once authenticated, the user is redirected to the actual cloud service for which he is authorized to use. 4. 3 A PROPOSED METHOD [29] Step1: Setup cloud side parameters . Initialization On the cloud service side, given a security parameter 2. Key generation When tenants are registered in cloud computing providers, each tenant will obtain a unique identity to identify him or her. The phase generates private key corresponding to given registered ID of every tenant in cloud computing. Step2: Generate tenant’s biometric template Cloud computing is a pervasive service environment for tenants, different tenants have different security requirement. To these tenants who have special security concern on data can gene rate their biometric template and be stored in cloud database.Biometric authentication must be needed when someone wants to access the data. Step3: Encrypt cloud data Input: cloud data (which is created by cloud tenants and stored in the database of cloud platform), a private key (the cloud service providers), and an ID (the cloud tenant who want to access the data); output: encrypted cloud data. Step4: Biometric authentication As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. Step4: Biometric authentication As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes. Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant say, p, want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_checker.Then, cloud tenants use registered identity ID to create their biometric template and all of the created templates are stored in cloud_sys_database. In cloud data access, cloud tenant p must pass the biometric authentication performed by biometric matcher in cloud computing. Step5: Decrypt cloud data Input: encrypted cloud data ciphertext (which is generated in Step3), an ID (the cloud service provider’s), a private key (the cloud tenant who want to access the data), and output: the corresponding plaintext i. e. cloud data. CHAPTER FIVE 5. 1 SUMMARYIn summary, as Biometrics allow for increased security, convenience we can say that fused biometric authentication system will be novel solution for authenticating users on cloud computing ,which can be provided as service on cloud . By following guiding principles discussed in this paper, a great deal of insecurities may be easily expelled, saving business owners’ valuable time and investment. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution. Future work and progress lies in standardising Cloud computing security protocols 5. CONCLUSION . Authentication is necessary in Cloud Computing. In order to seek a secure data access method for cloud tenants, a proposed method presented a secure data access mechanism based on identity-based encryption and biometric authentication in this paper, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by root administrator in cloud service. The security of data is maintained even though the same application is shared by mu ltitenant.To ensure the correctness of users’ data in cloud data storage, an effective and flexible biometric is proposed. i believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. This proposed method can be implemented with more security by using strong biometric m easures like eye. REFERENCES [1] http://en. wikipedia. org/wiki/Biometrics [2] J. L. Wayman, â€Å"Fundamentals of Biometric Authentication Xhtp:/ww. engr. sisu. edu/biometrics/nbtcw. p 4] http://www. fi. muni. cz/reports/files/older/FIMU-RS-2000-08. pdf [6] http://www. indexbiometrics. com/physiological_or_behavioral. htm [7] http://ntrg. cs. tcd. ie [8] Cernet. â€Å"CHARACTERISTICS OF BIOMETRIC SYSTEMS†. [online] available: http://www. ccert. edu. cn/education/cissp/hism/039-041. html. February 2013 [9] V. Vijaya Kumari and N. Suriyanarayanan. â€Å"Performance Measu re of Local Operators in Fingerprint Detection. † Academic Open Internet Journal, vol. 23, pp. 1-7, (2008). [10] www. gao. gov/cgi-bin/getrpt? GAO-03-1137T. February 2013 [11] Jain, A. K. ; Ross, A. Pankanti, S. , â€Å"Biometrics: a tool for information security† Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 – 143 [12] Michael E. Schuckers, â€Å"Some Statistical Aspects of Biometric Identification Device Performance†, 2001 [13] Sandra Maestre, Sean Nichols â€Å"DNA Biometrics†, 2009 [14] Massimo Tistarelli and Marks Nixon, â€Å"Advances In Biometrics†, Springer-Verlag Berlin Heidelberg 2009, ISBN 03029743 [15]Erdogmus, H. : Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE Software 26(2), 4–6 (2009) [16] Leavitt, N. : Is Cloud Computing Really Ready for Prime Time?Computer 42(1), 15–20(2009) [17] Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’,IDC eXchange, viewe d 18 February 2010, Accessed online @ . February 2013 [18]Ramgovind S, Eloff MM, Smith E,† The Management of Security in Cloud Computing† [Online] Available: http://uir. unisa. ac. za/bitstream/handle/10500/3883/ramgovind. pdf;jsessionid=75882F66B5AF28B3D640A3C5F9CFD837? sequence=1 February 2013 [19] A Platform Computing Whitepaper, ‘Enterprise Cloud Computing: Transforming IT’, Platform Computing, pp6, viewed 13March 2010. 20]Global Netoptex Incorporated, 2009, â€Å"Demystifying the cloud. Important opportunities, crucial choices† , [online] pp 4-14 Available: http://www. gni. com, February 2013 [21] Brodkin J, 2008, ‘Gartner: Seven cloud-computing security risks’, Infoworld, Accessed [email  protected] http://www. infoworld. com/d/security-central/gartner-seven-cloudcomputing-Security-risks-853? page=0,1 February 2013 [22] J. Ilonen, Keystroke dynamics, Lappeenranta University of Technology, Finland, http://www. it. lut . fi/kurssit/ 03-04/010970000/seminars/Ilonen. pdf (2003) [23] S. L.Garfinkel, â€Å"An evaluation of amazon’s grid computing services: EC2, S3, and SQS†, Technical Report TR-08-07, Computer ScienceGroup, Harvard University, Citeseer, 2007 [24] S. L. Garfinkel, â€Å"Email-based identification and authentication: An alternative to PKI? â€Å", IEEE Security and Privacy, 1(6), 2003 [25] Cloud Computing Security: From Single to Multi-Clouds [Online] Available: http://ieeexplore. ieee. org/stamp/stamp. jsp? tp=&arnumber=614956 February 2013 [26] Rahultech â€Å"IT trends-latest/recent trends in information technology† 2010[online] available:

Wednesday, October 23, 2019

Filipino Basketball Player Essay

Allan Caidic Alan Vito Flores Caidic (born June 15, 1963, Pasig City, Philippines) is a retired professional basketball player from the Philippines and is currently an assistant coach of the Barangay Ginebra Kings in the PBA. He is considered by many to be the greatest shooter the country has ever produced, thus, earning the moniker the â€Å"Triggerman† . He played college hoops at the University before joining the Philippine Basketball Association in 1987, where he broke several Philippine and PBA all-time records—including the most points scored in a single game (79 points), the most three-point field goals made in a single game (17 triples; breaking his previous record of 15 triples), the most three-point field goals in a career (1,242 triples) and the most consecutive free throws in a row (76). He has played with several PBA teams and won numerous championships. He played for the team including the 1998 Philippine Centennial Team. While in the league, he was considered one of the best three-point shooters in Asia. The vaunted Chinese national basketball team recognized his ability by always reminding their players to be on the lookout for â€Å"Philippine No. 8†, referring to Caidic’s regular jersey number while playing for the National Team. Renz Patrick T. Narag Grade V- ST Joseph James Yap, Sr. James Carlos Agravante Yap, Sr. (born February 15, 1982 in Escalante City, Negros Occidental) is a Filipino professional basketball player for the San Mig Coffee Mixers in the Philippine Basketball Association. Yap enjoyed a successful high school basketball career at Bacolod Tay Tung High School and then at Iloilo Central Commercial High School, where he sparked his team to three consecutive Iloilo PRISAA titles. He then went on to play at the collegiate level for the UE Red Warriors and helped the team to the Final Four in 2002 after years of absence. However, the Red Warriors lost to the Blue Eagles, the eventual champions. In the following season of UAAP, Yap led the Red Warriors to the Final Four for the second straight time. Eventually in the semifinals series, the Warriors lost to the Far Eastern  UniversityTamaraws. Nevertheless, Yap was named as the Most Valuable Player in 2003. Yap also played for the Philippine Basketball League from 2001 to 2004. He decided to declare his eligibility for the PBA Draft, and was selected with the 2nd overall pick in the 2004 PBA Draft by the Purefoods Tender Juicy Giants. One of the focal points of the Purefoods offense, he is the 2005–2006 and 2009–2010 season’s Most Valuable Player and he is also 2009–2010 Philippine Cup Conference MVP. Yap is also a nine-time PBA South All-Star team starter through 2004 to 2012 and a many-time member of theRP Basketball Team.