Monday, January 27, 2020

Secure Data Retrieval Based on Hybrid Encryption

Secure Data Retrieval Based on Hybrid Encryption SECURE DATA RETRIEVAL BASED ON HYBRID ENCRYPTION FOR DISRUPTION-TOLERANT NETWORK Kollipara Durgesh, Dr.P. Sriramya I. ABSTRACT Military network is one of the most important network in any country but this network mostly suffers from intermittent network connectivity because of the hostile region and the battlefield. To solve the network problem faced by the military network we use Disruption-tolerant network (DTN) technologies which is widely becoming the successful solution. This technology allows the people to communicate with each other to access the confidential data even in the worst network by storing the data in the storage node. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Two types of encryption are used for the security. The two algorithms are Advanced Encryption Standard (AES) and Java Simplified Encryption (Jasypt). These two algorithms are combined to provide the secure data which is even more difficult to decrypt the confidential data by unauthorized people. In this paper, we propose a secur e data retrieval scheme by generating a new secret key each time when the user sends a secure data to the destination, this proposed method enhances the security of the confidential data. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant network. Keywords: Disruption-tolerant network (DTN), Advanced Encryption Standard (AES), Java Simplified Encryption (Jasypt), secure data retrieval II. INTRODUCTION In most of the military network it is very difficult for the soldiers and majors to communicate with each other because of the  difficult network environment and even if there is no proper to end-to-end connection between the sender and the receiver. Disruption-tolerant network (DTN) are widely used in the networks were there is no proper end-to-end connection between the sender and the receiver. In this paper we choose DTN to communicate between the soldiers and the others. Initially, if the end-to-end connection is missing between the source and destination pair the data from the source node has to wait until the network is recovered in the intermediate node which can be easily hacked by the third party user hence to solve this critical problem we use storage node which is introduced in the Disruption-tolerant network where in only the authorized users can access the respective data. Most military data are said to very confidential and hence we use confidential access control methods that are cryptographically enforced. Here we provide different access services for different users that is the admin decides in who access the data based on the respective designation of the users. The registration of the user is completed only if the admin accepts and verifies the users’ account to be valid but if the user is not authorized he will not be allowed to access the data in spite of the registration. For example if the â€Å"user 1† sends a data to the â€Å"user 2† the data will be encrypted by combining two algorithms such as AES and Jasypt and the resulted data will be encrypted and stored in the storage node where even if there is no end-to-end connection between the source and the destination pair the data will be secured in the storage which can be accessed by the respective authorized person. 111. ALGORITHM A. Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) algorithm is used in this paper to provide secure data retrieval scheme. AES algorithm is chosen to be used in this paper because it is said to be more secured which supports most of the secure retrieval scheme. This algorithm is considered to be more secured because it is more widely used by the U.S. government to protect classified information and is implemented in hardware and software throughout the world to encrypt secure and confidential data. AES comprises three block ciphers, AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128  bits  using cryptographic keys of 128-, 192- and 256-bits, respectively. (Rijndael was designed to handle additional block sizes and key lengths, but the functionality was not adopted in AES.) Symmetric or secret-key ciphers use the same key for encrypting and decrypting, so both the sender and the receiver must know and use the same  secret key. All key lengths are deemed sufficient to protect classified information up to the Secret level with Top Secret information requiring either 192- or 256-bit key lengths. There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys a round consists of several processing steps that include substitution, transposition and mixing of the input  plain text  and transform it into the final output of  cipher text. Various researchers have published attacks against reduced-round versions of the Advanced Encryption Standard, and a research paper published in 2011 demonstrated that using a technique called a biclique attack could recover AES keys faster than a brute-force attack by a factor of between three and five, depending on the cipher version. Even this attack, though, does not threaten the practical use of AES due to its high computational complexity. In this paper AES is used along with the DTN technologies because of the many security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure. For example, if a user joins or leaves an attribute group, the associated attribute key should be changed and redistributed to all the other members in the group. B. Java Simplified Encryption (Jasypt) The other algorithm used in this paper is Java Simplified Encryption (Jasypt), it is chosen for the hybrid encryption for a full secured mode to provide secure data retrieval of confidential data. This algorithm is combined with the AES algorithm to provide hybrid encryption. The final challenge in this paper is to provide a new secret key each time a user sends a secret data to the receiver. The secret key generated is unique and it generates a new key each time, which is even more secured for the secure data retrieval. The admin plays a vital role here to manage the overall source and destination pair but the admin is not authorized to access the information because the secret key is generated automatically which is sent to the receiver’s personal account which is not managed by the admin. Fig 1. Architecture of secure data retrieval in Disruption Tolerant Network (DTN) IV. EXISTING SYSTEM The existing system comprises a concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. ABE features a mechanism that enables an access control over encrypted data using access policies and ascribed attributes among private keys and ciphertexts. Especially, ciphertext-policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy. The problem of applying the ABE to DTNs introduces several security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure. However, this issue is even more difficult, especially in ABE systems, since each attribute is conceivably shared by multiple users (henceforth, we refer to such a collection of users as an attribute group). V. PROPOSED SYSTEM In the proposed system we use hybrid encryption by combining two algorithms and hence we enhance the security of confidential data. Here the admin keeps in track of all the users account hence even if the attribute of the particular user is changed, the admin makes the notification of the changes. Thus, the disadvantages of the existing system is solved. Unauthorized users who do not have enough credentials satisfying the access policy should be deterred from accessing the plain data in the storage node. In addition, unauthorized access from the storage node or key authorities should be also prevented. If multiple users collude, they may be able to decrypt a ciphertext by combining their attributes even if each of the users cannot decrypt the ciphertext alone. VI. MODULES Key Authorities module The key generation module generates secret key where the hybrid encryption occurs using AES and Jasypt algorithm. This key generation is very efficient because it combines the two encryption and produces the secret code. In this paper to increase the security of the military network, the secret key generated by the hybrid encryption is sent to the users personal email id, so that even the admin who manages the entire network will not be able to access the confidential data. Storage node module In the storage node module, the data from the sender is stored even when there is no stable network between the sender and the receiver since, we use Disruption Tolerant Network (DTN). The storage node consists of the encrypted data where only the corresponding receiver can access the respective data. To access the data from the storage node the receiver has to specify the secret code which is generated by the hybrid encryption and is secretly mailed to the receiver. Sender module The sender module is the one who holds the confidential data and wishes to store them into the external data storage node for ease of sharing or for reliable delivery to users in the extreme networking environments. A sender is responsible for defining (attribute based) access policy and enforcing it on its own data by encrypting the data under the policy before storing it to the storage node. Fig 2. Hybrid Encryption of secret message User Module This the last module which tends to access the confidential data from the sender which is stored in the storage node. The receiver has to provide the correct secret key which will be sent to his corresponding mail id. If a user possesses a set of attributes satisfying the access policy of the encrypted data defined by the sender, and is not revoked in any of the attributes, then he will be able to decrypt the cipher text and obtain the data. VII. CONCLUSION DTN technologies are becoming successful which allows for the communication between devices which do not have stable network and hence this can be more efficiently used in the military network. AES and Jasypt are scalable cryptographic solution to the access control and secure data retrieval. In this paper we proposed efficient data retrieval method using hybrid encryption by combining two algorithms. The encrypted data is then stored in the storage node which can be accessed only by the corresponding user by providing the respective secret key. In addition admin monitors all the attributes of the users which allows fine-grained key revocation for each attribute group. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network. VIII. REFERENCES [1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, â€Å"Maxprop: Routing for vehicle-based disruption tolerant networks,† in Proc. IEEE INFOCOM, 2006, pp. 1–11. [2] M. Chuah andP.Yang,â€Å"Nodedensity-basedadaptiveroutingscheme for disruption tolerant networks,† in Proc. IEEE MILCOM, 2006, pp. 1–6. [3] M. M. B. Tariq, M. Ammar, and E. Zequra, â€Å"Mesage ferry route design for sparse ad hoc networks with mobile nodes,† in Proc. ACM MobiHoc, 2006, pp. 37–48. [4] S.Roy and M.Chuah,â€Å"Secure data retrieval based on cipher text policy attribute-based encryption (CP-ABE) system for the DTNs,† Lehigh CSE Tech. Rep., 2009. [5] M. Chuah and P. Yang, â€Å"Performance evaluation of content-based information retrieval schemes for DTNs,† in Proc. IEEE MILCOM, 2007, pp. 1–7. [6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, â€Å"Plutus: Scalable secure file sharing on untrusted storage,† in Proc. Conf. File Storage Technol., 2003, pp. 29–42. [7] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, â€Å"Mediated ciphertext-policy attribute-based encryption and its application,† in Proc.WISA, 2009, LNCS 5932, pp. 309–323. [8] N. Chen, M. Gerla, D. Huang, and X. Hong, â€Å"Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,† in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8. [9] D. Huang and M. Verma, â€Å"ASPE: Attribute-based secure policy enforcement  in vehicular adho cnetworks,† AdHocNetw.,vol.7,no.8, pp. 1526–1535, 2009. [10]A.LewkoandB.Waters,â€Å"Decentralizing attribute-based encryption,† Cryptology ePrint Archive: Rep. 2010/351, 2010. [11] A. Sahai and B. Waters, â€Å"Fuzzy identity-based encryption,† in Proc. Eurocrypt, 2005, pp. 457–473. [12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, â€Å"Attribute-based encryption for fine-grained access control of encrypted data,† in Proc.ACMConf.Comput.Commun.Security,2006,pp.89–98. [13] J. Bethencourt, A. Sahai, and B. Waters, â€Å"Ciphertext-policy attributebased encryption,† in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334. [14] R. Ostrovsky, A. Sahai, and B. Waters, â€Å"Attribute-based encryption with non-monotonic access structures,† in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195–203. [15] S. Yu, C. Wang, K. Ren, and W. Lou, â€Å"Attribute based data sharing with attribute revocation,†in Proc.ASIACCS,2010,pp.261–270. [16] A. Boldyreva, V. Goyal, and V. Kumar, â€Å"Identity-based encryption with efficient revocation,†inProc.ACMConf.Comput.Commun.Security, 2008, pp. 417–426. [17]M.Pirretti,P.Traynor,P.McDaniel,andB.Waters,â€Å"Secure attribute based systems,†inProc.ACMConf.Comput.Commun.Security,2006, pp. 99–112. [18]S.RafaeliandD.Hutchison,â€Å"A survey of key management for secure group communication,† Comput. Surv., vol. 35, no. 3, pp. 309–329, 2003. [19] S. Mittra, â€Å"Iolus: A framework for scalable secure multicasting,† in Proc. ACM SIGCOMM, 1997, pp. 277–288. [20] P.Golle, J.Staddon, M. Gagne,and P. Rasmussen,â€Å"A content-driven access control system,† in Proc. Symp. Identity Trust Internet, 2008, pp. 26–35. [21] L.Cheungand C.Newport,â€Å"Provably secure cipher text policy ABE,† inProc.ACMConf.Comput.Commun.Security,2007,pp.456–465. [22] V.Goyal, A.Jain,O.Pandey, and A.Sahai,â€Å"Bounded cipher text policy attribute-based encryption,†inProc.ICALP,2008,pp.579–591.

Saturday, January 18, 2020

How Does Medieval Literature Exhibit the Roles of Men and Women Essay

How Does Medieval Literature Exhibit the Roles of Men and Women Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The medieval literature is full of stories of the perilous adventures and the valorous heroes. Many sections of the medieval literature are ironic and usually comprise a message. The characters in the medieval literature are frequently kings, knight, or Queens, such as in the Chaucer’s, Sir Gawain, the Canterbury tales, and the Greek knight. Majority of the supporting characters in these tales are in one-dimensional and defined by their roles and tasks in the society. However, the main characters in the medieval literature exhibit the sign of independence and are not exclusively defined by the society’s expectations.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the Knight, the medieval realms never appeared to be surprise whether women are nobles or peasants, they were not only confined to household duties such as cooking, sewing, spinning and weaving but also hunted food and fought in battles. In the wife bath’s tale, a knight the major character raped a woman .From this it shows that the women rights were not valued and any one in top authority could violate these rights without any of the consequences for Knight violated the right willingly (Chaucer, 119).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In addition, the women were not valued much to men; there was no equality of women to women. This is well illustrated when the immortal Knight, must do everything he can to find out what women want in their lives, orders from the queen. When he meet old woman after he had travelled almost everywhere, the woman responds to the question that all they want is to be equal to men. In another incident is evident that women are not esteemed or rather not much repudiated .Another Knight often insults the woman who agreed to marry. He calls her ugly and evil, he berates her in every imaginable way. He does not appreciate her stature appreciate her stature and blemish the reputation of all women (Chaucer, 136).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sir Garran exhibits the position men should hold on the society, According to him, men should be there to respond to the challenges facing the women. He faces critics from other Knights when he says that each should be unique in the way that they respond to the challenges and in the way, they perceive their roles in the society .In addition, he says that they must preserve their integrity and reputation. When one of Knight insults the woman married, Sir Garwan responds that should not happen to knights (Bennett, 121).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As the role of women is portrayed in the tale, the vulnerable and Assertion of the wife of Bath community was very different in Chaucer’s time; the women were suppressed and the men dominated the society. The destructive and manipulative nature of the women was much emphasized by men. Just like eve in the bible, the women were blamed for the failure/downfall of a man. Through the Bath of wife, Chaucer tries to investigate the hardship of the self-realization in a woman in the restricted environment. Alison, the wife of bath, symbolizes antifeminism searches and stereotypes for peace and happiness in a patriarchal community. Unluckily, Alison is never in harmony with who she actually is as woman (Chaucer, 105). Chaucer’s uses a series of satires to ultimately illustrates that under her apparently certain appearance; there conceal the soul of a defenseless, lost woman. In Green Knight and Sir Gawain, Sir Gawain is as well a kni ght. He is from King Arthur’s Knights of Round Table, a very important at that time. The Knights were anticipated to be brave, honest, and chivalrous. After the Green Knight proposes and enters his dispute, Sir Gawain is courageous enough, as the knight could be, to intensify to the challenge.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As we see from these tales, men are portrayed to be courageous, honest, and hardworking. The men in the society dominate the women. These show the lowed position of women in the society. They are discriminated, and viewed to have negative effect in the society. The man decides the roles of their women and has power of them.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The control and dominance in the wife of Chaucer is the Wife Bath story. Alison, the main character recognizes dominance of his husband as the major purpose of her story and life. Alison is a headstrong and controlling woman. She desires to dominate her husband. She trusts that, in order to be her companion, a man needs to be submissive and that she remains the head of the household. Although she has been married for several times, she has never accepted to be dominated by a man. She says out of her five marriages, two were bad husbands and three were good husband. The wife of the Bath is aggressive to get what she wants and nothing can stop her because she lives for dominance.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In conclusion, characters in the medieval literature are different and unique in their behavior; however, each character plays a role to exhibit the role of men and women in the society. According to Albert in his book Medieval Sexuality, a girl says â€Å"I can’t mind if am beaten by man but a woman†¦Ã¢â‚¬  (52).This shows that characters in the book do not exhibit understanding of their rights and roles as men and women they should hold in the society. In medieval literature it is evident that women had hard times while men lived harsh lives, perhaps all in effort to perform their roles. References Chaucer. â€Å"Conversion and Convergence: The Role and Function of Women in Post-Medieval Icelandic Folktales.†Scandinavian Studies  2 (2012): 165. Blumenfeld-Kosinski, Renate. â€Å"Medieval Life Cycles: Continuity And Change.†Ã‚  Medieval Review  (2014): Source document

Friday, January 10, 2020

Foreign Bodies

When All is Lost, Faith Remains Many people find themselves in a constant struggle of faith. These individuals are often questioning if there is a God, and if there is how does one know. In Hwee Hwee Tan’s novel, Foreign Bodies, there is a struggle of faith in each of the four main characters. Mei and Andy are two of these characters that are able to come to faith in the Christian God after life altering experiences. These experiences have caused each of them to analyze and attack life in different ways.Each of these individuals have been able to overcome a treacherous past, and find faith, hope, desire and justice in their futures through Tan’s novel. Mei’s religious views are consistent throughout the novel, Foreign Bodies. Though she was born into a Confucianism based family, Mei chose at a young age to throw her traditional Singaporean beliefs to the side, and walk in the light of God, with her Uncle Cheong’s guidance, through faith in Christianity. It was a brutal shock to Mei’s grandfather when he finds out she no longer believes in her family’s faith.This conversation arises as Mei’s grandfather is telling her how to reduce her time in hell. â€Å"After I die, you going to feed me or not? † Gong Gong is shocked when Mei replies that she will be unable to. He immediately responds by asking who is responsible for the change in Mei’s beliefs. He is not surprised when she responds with Uncle Cheong. As a child everyone has a hero they look up to. Uncle Cheong is Mei’s hero. â€Å"In my eyes Uncle Cheong could do no wrong. Even his farts smelled like Aramis No. 7.With the heart of Mother Teresa and the body of Tom Cruise, Uncle Cheong was my hero†¦Ã¢â‚¬  Mei’s adoration allowed herself to be susceptible to Uncle Chong’s stories and views of God. She loved when he would tell her stories about her newfound savior. A key role in the strengthening of Mei’s faith in G od was due to the incident at Red Hill. Mei has oppressed this tragedy in her memory for many years, and only a few people are aware that it took place. As a four year old, Mei’s father took her to Red Hill to run and play with her lantern. It was the time of year when Mid-autumn was celebrated.At Red Hill, Mei’s father raped her. While this was occurring Mei sent multiple prayers up to her God. â€Å"I used all the prayers I knew, all the prayers Uncle Cheong had taught me. † Mei’s connection with God helped her get through her father raping her. She no longer felt the pain after she started to seek God’s help through prayer. Without the help of God, Mei may not have been able to become the person she is today. It is a miracle that Mei was able to recover physically, emotionally, and most important spiritually from this tragedy.One might have suspected that she would have lost all faith in God, for letting her father hurt her the way he did. This incident proves how strong Mei has faith in God. She has accepted that he will always be there for her, to watch and protect over her, even though it may not be immediately. Mei’s ultimate view of evil is seen through her view of evil being extremely prevalent throughout society. She believes that when someone close to her commits an act of wrong, it is her responsibility as a good Christian to fix their mistakes.This was seen in multiple events throughout the novel. Mei, with the push of her father’s will, believed that her mother is not able to take care of her own finances. Mei took on the burden of regulating her mother’s money, and frequently became frustrated and irritated with the way her mother wants to spend her mother. â€Å"My mother was a sucker for sales. She would go for anything which said ‘Offer ends today. ’ She was the type who would mass-buy toothpicks. † This quote displays the burdens Mei takes on with caring for her moth er.Mei is constantly trying to fix her mother’s life and teach her values that Mei finds important. Mei’s views on evil and religion are very different from Andy’s views of God. At the beginning of the novel Andy’s view of evil directly stems from his belief in the absence of God. Andy wishes to find some sort of proof that there is a God and goodness in the world, and he wants to be able to feel and understand God by himself. He denies the presence of this goodness and God in the beginning of Foreign Bodies by placing his desires into football teams. Too mediocre to ever achieve anything great in life by my own merits, I latched my personal identity onto something which could achieve greatness for me: a football club. † When Andy establishes his stance on religion at this point of the novel he is stating that he wants something great, but he is lost as to what this greatness is. Many individuals would seek a religion to fulfill these desires, but A ndy is content with placing his dreams on a football team. Though Andy in the beginning of the novel considers himself a â€Å"lapsed atheist†, he develops and changes throughout to become the person he eventually intended to be.Andy’s conversion to faith in God was originally not self-motivated. Andy seemed to have an eye for Mei, and Mei did not want a relationship with an individual that had spiritual beliefs different from hers, let alone none at all. After they start dating and Andy enters trail Mei accuses him of having no spiritual beliefs at all. â€Å"You faked it all, pretending to have seen Jesus, giving up gambling. You only said that to trick me into going out with you. † Andy gives no response as Mei’s statement is partially true, but Andy always did have hope that there was something more out there.Andy continuously hinted to the reader that he wanted something more to believe in. He may not have had the same extent of belief in God that Me i does, but she had no right to call him out as a complete non-believer. Though Mei’s push for Andy to find a spiritual safe haven was unsuccessful, the trail that Andy was put on gave him the final push to help him find God. Andy had been put on trial in Singapore for gambling on football games. This action had been legal in England where Andy had lived before his move to Singapore.Even though he was innocent of the charges against him, another individual who had hopes of framing a different man set him up. Once the trail began, and all of his friends had left him to face the charges alone, Andy had no other option, but to turn to God. He was an innocent man that stood no chance of winning his court case. Andy knew that he would be spending the next three years in jail, and he needed something to help pull him through when everyone else abandoned him. This abandonment caused Andy to put his trust and faith into he newfound God. â€Å"He slay me, yet I will trust him. This s tatement made by Andy in a letter to Mei proves that he came to God on his own free will without the help of anyone else. The absence of God that Andy once felt in his life has been removed due to his newfound faith. â€Å"I love God not for what He gives, but for who He is. I love him because He is God. I don’t care how much He hurts me, I will still love him, because no matter what I do to Him, He will still adore me. † The words could never be confessed from a straight atheist. Andy has always had hope and desire that there was some form of good out there for him, it just took longer than expected to find it.Though Mei and Andy are both believers in the Christian God, the experiences and challenges they both overcame to come to faith are extremely different, but still have similarities. Both of these individuals are able to forgive. Forgiveness in the Christian church is a huge belief, as God has forgiven each of us as individuals. Without this learned tool of forgi veness Mei would never have been able to forgive her father, and Andy would not have been able to forgive Mei for abandoning him in his time of urgent need.Mei and Andy’s views in God help define who they were as people, and who they aspire to be. God is ever present in both of their lives, giving them hope to take on the challenges that are waiting to cross their paths in the future. ——————————————– [ 1 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 20. [ 2 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 21. [ 3 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 248. 4 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 149. [ 5 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 124. [ 6 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 222. [ 7 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 45. [ 8 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 277. [ 9 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 278.

Thursday, January 2, 2020

Essay on The Khmer Rouge Era and the Power - 624 Words

At least every Asian country with a Buddhist community has experience some sort of civil war, foreign invasion, or systematic poverty and tyranny. During the Khmer Rouge era, Buddhism was nearly destroyed. Monks were tortured, killed and forced into lay life. Buddhist temples were destroyed and used as a prison area. After the defeat of the Khmer Rouge, Buddhism remained repressed within Cambodia. Some Buddhist monks or leaders responded with forms of social engagement. That being said, Maha Ghosananda is one the monks who played a key role in rebuilding Buddhism in Cambodia after the fall of the Khmer Rouge. His work, Dhammayietras was the first program to set up for peace and non-violence in Cambodia. The Dhammayietras consisted of peace†¦show more content†¦A great example is the ordination of the tree ceremony where robes are placed around the trees and then the trees become sacred. If any individual attempts to cut down a tree this would bring religious shortcomings for that him or her. Moreover, â€Å"tree ordinations, in short, are a form of upaya (Pali), or expedient means, used to wake people up, not to spiritual realization but to the cause of immediate suffering and ways of relieving it.† To live a long life without suffering an individual must refrain greed, hatred and ignorance. Environmental Monks saw deforestation as forms greed and wealth. When trees are cut down this disrupt the environment and the villagers are unable to farm for the land is infertile. That is why Phrakhru urges people to value the forest holistically. Case in point, â€Å"he considered treating nature in a similar fashion as humans a matter of skillful means.† In short, environmental monks are trying to repress the grief of humankind. Buddhist monks are taking the necessary actions to ease the sufferings of all people in society. Buddhism in a way encourages economic growth. This helps to raise the standard of living of the people. When people are doing good things for others and being happy that they are prospering this called development aspect of Buddhism. In a sense, Buddhism encourages honesty and respects the responsibility of one’s action. Buddhism supports people to appreciate each other and to love all. Engaged Buddhism is all aboutShow MoreRelated Nazis and Khmer Rouge1008 Words   |  4 Pages The 20th Century was an era marked by growing turmoil in the world stage. As countries fought for hegemony, it was often groups of people who were most affected by the political turbulence of the times. Throughout this era, many of these oppressive states existed, yet none quite like Nazi Germany and Khmer Rouge Cambodia. Told by the young voices of Elie Wiesel in Night and Chanthity Him in When Broken Glass Floats, each author tells their story of what it meant to grow up as a victim of theseRead Mo reCommunist Rouge : The Khmer Rouge1539 Words   |  7 PagesNoah Lossing Mr. Frecklton   Western civilization   March 31 2015 Rough Draft Khmer Rouge The Khmer Rouge was the name given to the people of the Communist Party of Kampuchea, in Cambodia. It was formed in 1968 and was also known as the Vietnam People s Army. It was the ruling party of Cambodia from 1975 to 1979, It was lead by a ruler named pol pot who was ruthless and did not care what the people said. Some of Pol pots comrade s icluded, Nuon Chea, Ieng Sary, Son Sen, and Khieu, These men workedRead MorePol Pot1688 Words   |  7 PagesEvaluate the impact of the Khmer Rouge on Cambodian society from 1975-1979 Cambodia became one huge labor camp under the Khmer Rouge. After deposing Lon Nol on 1975, the Khmer Rouge, led by Pol Pot began one of the most brutal regimes in human history. This not only changed the Cambodian society but also ultimately destroyed it. This was due to the extreme vision of communism, which Pol Pot wanted to implement for a perfect and a peaceful society. Prince Norodom Sihanouk always tried to maintainRead MoreEssay about The Holocaust and the Cambodian Genocide 1201 Words   |  5 PagesHitler and the Nazis were in charge of the Holocaust. The Cambodian Genocide took place in Cambodia. Cambodia is in Southeast Asia (â€Å"Cambodian†). Pol Pot was the leader of Khmer Rouge and the group was in charge of the Cambodian Genocide (â€Å"Cambodian†). The Cambodian Genocide started in 1975 and ended in 1978 because Khmer Rouge was ended by Vietnam (â€Å"Cambodian†). The Holocaust and the Cambodian Genocide are similar in the administrations’ treatment of their victims and in the fact that their victimsRead MoreCambodia Rocks : The Struggle For Musical Experimentation1680 Words   |  7 PagesCambodia Rocks: The Struggle for Musical Experimentation Introduction In 1996, the New York City label Parallel World released a CD that introduced most Western listeners to a new world of music: Cambodia Rocks. This mixtape of songs performed by Khmer musicians and recorded in the 1960s and early 1970s fuses early garage and psychedelic rock from the West and traditional vocal techniques and lyrics from Cambodia. The musicians on the tracklist for this album, however, were initially anonymous, andRead MoreThe Khmer Rouge During The 20th Century1823 Words   |  8 Pageshas been significantly affected by the ongoing communism and the rule of the Khmer Rouge during the 20th century. Referred to as The Khmer Rouge regime, Cambodian genocide, Year Zero and the Cambodian Holocaust, the rule of the Communist Party of Kampuchea from 1975-1979 has had a devastating impact on Cambodia and the country’s condition in the 21st century. Led by Pol Pot, the beliefs and objectives of the Khmer Rouge has resulted in Cambodia’s loss of culture and iden tity, the deaths of approximatelyRead MoreThe World That Are Worse Than War2227 Words   |  9 Pagesviolence, but they also have the power to stop and prevent the crimes against humanity in our history and in our future as well. In Cambodia, the Khmer Rouge assimilated into the minds of a people torn apart by war in their region and torn apart internally through civil war. Out of this schism the Khmer Rouge, a communist movement with an overwhelming member population, took swift action to begin the process of eliminating those who did not fit the expectations of the Khmer Rouge’s ideal society. To furtherRead More Cambodia - The Rise of the Khmer Rouge and the Genocide (1976-1978)2419 Words   |  10 PagesDuring the Khmer Rouge regime, Cambodia was turned into a giant labor camp creating a system of terror, genocide, and attempted cultural annihilation-a series of drastic events that the country is still recovering from. The years contained within this regime were devasta ting for the nation of Cambodia, with the establishment of the Khmer Rouge, a left-wing Communist political party whose actions have had an overwhelmingly detrimental effect on the political, economic and social structure of Cambodia-ruiningRead MoreHow were Pol Pot and the Khmer Rouge able to maintain power in Cambodia between 1975 and 1979?2236 Words   |  9 PagesSection A: Aim of Investigation After they seized power in Cambodia in April 1975, Saloth Pol Pot Sar and the Khmer Rouge were responsible for the death of 1.5-3 million Cambodians and were perhaps one of the most ruthless regimes of the 20th century. The aim of this investigation is to evaluate Pol Pots means of maintaining power from 1975 to 1979. An account of Pol Pot and the Khmer Rouges drastic internal reforms including the slaughter of millions, economic reorganization, political restructuringRead MoreCambodia: A Place of Countless Struggles1545 Words   |  6 Pagesfilled with so many struggles, one must examine the countries’ past catastrophes. What first triggered all the poverty and crime was the Cambodian genocide under Pol Pot. This period of genocide spanned from 1975-1979, and it is estimated that the Khmer Rouge killed 1.7 million people. They specifically targeted Buddhists, ethnic groups and those who were educated in society (Chigas and Mosyakov). The genocide was short lived but it had l ong-lasting effects, leaving Cambodia in a frenzy of poverty and