Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Students are required to select a topic from the topic list provided at the end of this Assignment and write a report on the chosen topic. 1. Report should include the following (40 marks) Select a...

1 answer below »

Students are required to select a topic from the topic list provided at the end of this Assignment and write a report on the chosen topic.

1. Report should include the following (40 marks)

Select a topic from the following list (see at the end of this assignment) and prepare a report with following sections.

  • ï‚· Title

  • ï‚· Description / introduction (of the topic)

  • ï‚· Background (include summary of all papers)
    ï‚· References(Selectwiderangeofsourcesandreferenceaccurately-followIEEEreferencestyle)

(4 marks) Refer to this document https://support.office.com/en-us/article/Add-a-citation-and-create-a-

(In MS Word –Select ReferencesStyle bibliography XXXXXXXXXX9c69-342c289fa2a5?ui=en-US&rs=en-US&ad=US )

 Appendix - Include literature review of each paper. Format of the Report –

Well-constructed, clear and logically arranged paragraphs

Submission guidelines:

1. Your report should include the following:

(6 marks)

(2 marks) (8 marks) (20 marks)

  • ï‚· The cover page must identify student (name and number), teaching staff, and assignment.

  • ï‚· The assignment must use 12 points font size minimum and at least single line spacing with

    appropriate section headings.

  • ï‚· Reference sources must be cited in the text of the report, and listed appropriately at the end in

    a reference list. List of bibliography/references used must follow IEEE style.

2. The assignment must be submitted on Moodle.

Marking criteria:

You will be assessed on the extent to which you have achieved in following aspects:

Description

Marks

Select a topic from the following list (see at the end of this assignment) and prepare a report with following sections.

  • - Title - Include professional cover page

  • - Description / introduction (of the topic)

  • - Background - Include brief summary of all research papers/documents

  • - Appendix - Include literature review of each paper.

2

8
20 (details are in marking rubric)

- IEEE referencing
References - Select wide range of sources and reference accurately-follow IEEE reference style

4

Format of the Report –

Well-constructed, clear and logically arranged paragraphs

6

Total

40

Prepared by: ABM Russel Moderated By: A/Prof Savitri Bevinakoppa July, 2018

BN201 Professional Issues in IT Page | 3 Marking Rubric for Assignment 1: Total Marks 40

Criteria

Excellent

Good

Satisfactory

Unsatisfactory

Description / introduction

Total marks: 8

Writing is clear, concise, and well organized with excellent writing Skills.

The introduction is engaging, states the main topic and

Previews the report structure. 8 marks

Writing is mostly clear, concise, and well organized with good writing

Skills.

Thoughts are expressed in a coherent and logical manner.

6 marks

Writing is unclear and/or disorganized.

The introduction states the main topic but does not adequately preview the structure of report

4 marks

Writing is unclear and disorganized.

There are numerous spelling, grammar, or syntax errors throughout the response.

2 marks

Background Total marks: 20

Author's writing demonstrates good understanding of the relationship among material obtained from all sources. (5 marks)

Viewpoints and interpretations are insightful and well supported. Clear, detailed examples are provided, as applicable. (5 marks)

Cited all data obtained from other sources. (5 marks)

All cited works, both text and visual, are done in the correct format with no errors (5 marks)

20 marks

Author's writing demonstrates some understanding of the relationship among material obtained from all sources. (4 marks)

Viewpoints and interpretations are supported. Appropriate examples are provided, as applicable. (4 marks)

Cited some data obtained from other sources. (4 marks)

All cited works, both text and visual, are done in the correct format with no errors. (4 marks)

16 marks

Author's writing demonstrates some understanding of the relationship among material obtained from all sources. (2.5 marks)

Viewpoints and interpretations are unsupported or supported with flawed arguments. (2.5 marks)

Cited very few data obtained from other sources. (2.5 marks)

All cited works, both text and visual, are done in the correct format with few errors. (2.5 marks)

10 marks

Writing does not demonstrate understanding any relationships among material obtained from all sources. (1.5 mark)

Viewpoints and interpretations are missing, inappropriate, and/or unsupported. (1.5 mark)

All cited works, both text and visual, are wrong. (1 mark)

4 marks

Prepared by: ABM Russel Moderated By: A/Prof Savitri Bevinakoppa July, 2018

BN201 Professional Issues in IT Page | 4

References Total marks: 4

Wide range of sources accurately Referenced

4 marks

Good range of sources with minor referencing errors

2 marks

Reasonable range of sources with some referencing errors.

1 marks

Major errors in referencing.

0 marks

Title
Total marks: 2

Professional cover page included

2 marks

A cover page included but not members details

1 marks

No cover page included but members details exist

0.5 marks

No title page included

0 marks

Format
Total marks: 6

Well constructed, clear and logically arranged paragraph.

6 marks

Clear but not logically arranged paragraph with some minor errors.

4 marks

Multiple paragraphs have several minor errors.

2 marks

Poorly written paragraphs with multiple errors.

0 marks

Assignment 1 Topics

  1. Survey on various secure and efficient search techniques in Cloud Computing

  2. Blockchain Technology: An application Blockchain Technology such as Bitcoin to be investigated.

  3. An IOT application: An IOT application can be created using Texas Instrument ZigBee Toolkit with

    CC2530 radio standard.

  4. Wireless Street Lighting Control and Monitoring System: Modern world is moving towards

    implementing traditional systems in Eco-friendly ways. Investigate on a system that can control and monitor the status of highway street lights within the given area and deliver the information to the user efficiently and effectively.

  5. Wi-Fi Smart Robot: Robotics is one of the most trending topics at present which involves latest technologies. Ever since the invention of the robot there have been many introductions which has led to improvement of robotics. Video is used to operate the robot and it can be operated using a PC as well as the live video feedback can be viewed through a smart phone. Robot can reach unreachable places for humans. Please research on remote control of robots.

  6. BYO topics are subject to approval by lecturer.

Answered Same Day Aug 24, 2020 BN 201

Solution

Vignesh answered on Aug 28 2020
147 Votes
SURVEY ON VARIOUS SECURE AND EFFICIENT SEARCH TECHNIQUES IN CLOUD COMPUTING
SURVEY ON VARIOUS SECURE AND EFFICIENT SEARCH TECHNIQUES IN CLOUD COMPUTING
INTRODUCTION
We are using the cloud technology in day-to-day life because of the reach ability of the cloud service to the customer and no need of any particular technology that need to be supported to run the cloud service, that's why people are using cloud service. Now the customer can customize the service for example, if the customer wants storage he can go for only cloud storage or if the customer wants to do computer task he or she can go for ec2 service. AWS (Amazon Web Service) is one of the best cloud service providers in the planet. Power of any cloud service provider is available at a click of the button in the AWS console. There is various cloud service that is available in the AWS service and the capacity of these computing and storage power is unlimited [1] and [10].
DIFFERENT SEARCH TECHNIQUES
The following search techniques are used in cloud computing
Authorized Private keyword Search (APKS)
This technique is used to provide the privacy, authorization, revocation, multi-dimensional keyword search, scalability and efficiency. Two methods are proposed namely APKS and APK+. APKS is used for enhancing the search mechanism using hierarchy method and APKS+ is used for enhancing the query privacy using a proxy server in order to overcome the dictionary attack [3].
Secure and Efficient Ranked Keyword Search
This method is used for providing the privacy for keyword, data and computation overhead. The data owner creates the index with the keyword frequency based relevance scores for files. With the scores along with the encrypted file is sent based on the ranking method [6].
Secured fuzzy keyword Search
In this method, for keyword w, the fuzzy keyword is created with distance ‘d’. Suppose when the user searches for CS, this method searches for Tw and returns a matching encrypted file. An efficient fuzzy keyword is set using wild card and fuzzy searchable index by Multiway Tree method [2].
Attribute-based Keyword Search
In this method, a conjunctive keyword search techniques are provided. The data owner creates an index for all keyword searches and access list using the attributes that specify users search list authorization for searching. After creating the keywords, a document is encrypted using the Cipher-Text policy attribute-based encryption [4] and [8].
Secure Channel Free (SCF-PEKS ) PublicKey Encryption...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here