Manuscripts

Recent Papers

Research Paper

Machine Learning Based Network Intrusion Detection For Cyber Security

Machine Learning-based systems act on flow features derived through exporting flow procedures. The notable emergence of Machine Learning and Deep Learning (DL) based reports presuppose that the flow of information, such as the average packet capacity, is gleaned from every packet. On common devices, However, when packet sampling is unavoidable, flow exporters are frequently used in practice. Since the flow of information is derived from a sampled group of the packets rather than the entire traffic stream, the usefulness of Machine Learning-based results with the use and existence of such samplings is still up for debate. In this study, we are going to investigate in what ways the effectiveness and performance of these ML-based are affected by packet sampling. Our suggested evaluation method is resistant to various flow export stage settings, in contrast to earlier studies. Hence, it can provide a robust evaluation even in the presence of sampling.

Published by: Mounika Maity, B. Pramod, N. Masthan Valli, Y. Pranathi, M. Mallikarjuna, V. Sathyendra Kumar

Author: Mounika Maity

Paper ID: V9I2-1172

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Remote data integrity checking with a designated verifier while preserving identity-based privacy

The authenticity of outsourced data may be effectively checked using the remote data possession checking method, which can be classified into both private and public verification. Public verification can be verified by any cloud user, however, private verification can only be verified by the data owner. However, In the majority of real-world scenarios, the data owner anticipates that just a specific verifier will be able to carry out integrity-checking duties and that the verifier won't be able to learn anything about the data. Yan et al. suggest a remote data possession verification scheme with a designated validator to make sure that only the designated verifier can guarantee the data's integrity and that others cannot. However, this strategy makes use of public-key technology and disregards privacy-related concerns. To overcome these shortcomings, we propose an identity-based remote data possession checking method that fulfills the data owner's demand to select a unique verifier. This method also employs a Merkle hash tree for dynamic data updating and a randomized integer for blind data integrity verification that protects user privacy. Our method can be used to get around the public key infrastructure's burdensome certificate administration. We showed that our system is secure using the computing Diffie-Hellman assumptions and the discrete optimization assumption. Our plan is practical and effective in practical contexts, as shown by conceptual analysis and experimental results.

Published by: Kethireddy Anusha, Hasthavaram Sai Leela, Koona Naga Navya Sree, Mohammed Arshad Shaik, Sanjapuri Naga Arudra Kumar, Mukka Pramukha

Author: Kethireddy Anusha

Paper ID: V9I2-1168

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Soft computing technique for the blockchain-enabled secure healthcare system

A recent study demonstrates that by combining AI and Blockchain technologies, we can close several loopholes in the healthcare industry. AI systems perform better when given substantial data input that may be used to infer conclusions and make decisions. When data is acquired from a reliable, trustworthy, safe, and tenable data vault, machine learning algorithms perform better.

Published by: P. Nagendra, S. Sameera, M. Nithesh, Y. Rajasekhar Reddy, G. Nikhitha, C. Nandini

Author: P. Nagendra

Paper ID: V9I2-1167

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

A comparative overview of Ayurveda and Unani with special reference to efficiency and limitation

This research article provides a comparative overview of Ayurveda and Unani, two traditional systems of medicine that have been practiced in India and the Middle East for centuries. The efficiency and limitations of both systems are discussed with reference to their historical development, theoretical frameworks, diagnostic and treatment methods, and current practices. The methodology involved a literature review of scholarly articles, books, and online resources that discuss Ayurveda and Unani. The results and discussion section highlight the similarities and differences between the two systems, and their strengths and weaknesses. The article concludes that both Ayurveda and Unani have their own unique contributions to make to the field of traditional medicine and that a better understanding of their theoretical frameworks and clinical practices can enhance the efficacy of their treatment modalities.

Published by: Dr. Ragini Bhardwaj, Prakash Mehta

Author: Dr. Ragini Bhardwaj

Paper ID: V9I2-1169

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Ensuring the security of logistics information and data querying using searchable encryption algorithms and Blockchain

A searchable and encrypted logistics information blockchain data query method is presented to protect the security of logistics information and to query information quickly and efficiently utilizing searchable encryption algorithms paired with the properties of the blockchain. The logistics data is split up into many data files, encrypted with an asymmetric technique, and then kept on a cloud server. Each data file is given a keyword index value, which is then uploaded to the blockchain. Data updates and queries can be performed at any time with this solution. The project's plan is finally completed with accuracy, completeness, and safety. It offers scheme viability.

Published by: T. Sree Lakshmi, B. Naganandini, B. Manjuula, S. Manjunath, G. Rupa, B. Narendra

Author: T. Sree Lakshmi

Paper ID: V9I2-1163

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Forward secure public key Encryption with keyword search for outsourced cloud storage

Cloud computing is a self-driven word that offers information outsourcing services without contention, alleviating customers of the pressures of nearby storage problems. Many industries, such as the military, hospitals, businesses, colleges, and so on, already employ cloud computing to store enormous volumes of data or information. The client may seek permission to view the files or information from the cloud. Generally speaking, there are three types of information: confidential, public, and personal. The infrastructure that stores all of the data on the cloud belongs to someone else. It is never simple to trust outside cloud service suppliers with critical data. Even the largest cloud market players assert that security is a shared responsibility between the customer and the business. The customer should consider how critical it is for the encryption to be robust in order to restrict people from reading data saved in the cloud. One of the many issues that arise from cloud data storage is information security. To solve these problems, numerous algorithms were created. Unfortunately, securing a sizable chunk of the cloud with a single computation or technique is ineffective. By utilising cryptographic techniques, security problems are reduced in this study effort. In addition, networking, server, and storage are all merged so at infrastructure level in cloud computing. This research project suggests employing cryptographic techniques to store data safely in the cloud.

Published by: B. Venkatesu Goud, C. Ramadevi, C. Naga Jyothi, B. Lavanya, D. Narasimha, L. Narashimha Reddy

Author: B. Venkatesu Goud

Paper ID: V9I2-1166

Paper Status: published

Published: April 3, 2023

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X