Manuscripts

Recent Papers

Research Paper

FastMonitor: Enhancing Data Access Control with Zero-Trust Architecture

As organizations grapple with the escalation of data breaches and sophisticated cyber threats, ensuring robust and adaptive data access control has become a top priority. Traditional perimeter-centric security frameworks, once the backbone of enterprise protections, have increasingly shown limitations against evolving adversarial tactics. In response, Zero-Trust Architecture (ZTA) has emerged as a dynamic paradigm, rejecting implicit trust and demanding continuous verification of every access request. This article introduces FastMonitor, a data-access control solution designed to operationalize ZTA principles to their full potential. Introduced in June 2022, FastMonitor rigorously authenticates and authorizes each data access request, consolidating granular policies, comprehensive audit trails, and real-time monitoring into a single coherent system. By bridging theoretical concepts of ZTA with practical enforcement mechanisms, FastMonitor significantly mitigates unauthorized access, supports compliance with stringent regulatory frameworks, and strengthens organizational resilience. This study elucidates the architectural design of FastMonitor, demonstrates its capacity to enhance security in sectors as diverse as healthcare and automotive, and examines its role in fostering greater national cybersecurity readiness.

Published by: Frank Mensah

Author: Frank Mensah

Paper ID: V10I6-1453

Paper Status: published

Published: December 21, 2024

Full Details
Review Paper

Zero Trust Architecture: A Comprehensive Review of Principles, Implementation Strategies, and Future Directions in Enterprise Cybersecurity

In an era characterized by digital transformation and increasingly sophisticated cyber threats, traditional perimeter-based security models have become inadequate for safeguarding modern enterprise IT infrastructures. Zero Trust Architecture (ZTA) emerges as a pivotal paradigm shift, fundamentally redefining organizational cybersecurity by eliminating implicit trust and enforcing continuous verification of every access request. This review paper provides an in-depth examination of ZTA, tracing its evolution from foundational principles articulated by Forrester Research and the National Institute of Standards and Technology (NIST) to its contemporary extensions addressing the complexities of diverse and decentralized digital environments. Key components of ZTA, including context-aware and continuous authentication, device authentication, and robust encryption mechanisms, are meticulously analyzed to elucidate their roles in enhancing security posture. The paper also explores the logical architecture of ZTA, highlighting the interplay between Policy Engine, Policy Administrator, and Policy Enforcement Points, which collectively enforce stringent access controls and monitor ongoing activities. Despite its advantages, the implementation of ZTA presents significant challenges, such as integration with legacy systems, operational overhead, and vulnerabilities related to policy decision processes and insider threats. Best practices for successful ZTA adoption are discussed, emphasizing comprehensive asset inventory, strong identity and access management, micro-segmentation, continuous monitoring, and phased implementation approaches. Furthermore, the review identifies emerging trends and future directions, including the integration of ZTA with 5G networks, Internet of Things (IoT), edge computing, artificial intelligence, machine learning, post-quantum cryptography, and blockchain technology. By synthesizing insights from recent studies and industry frameworks, this paper aims to provide a holistic understanding of Zero Trust Architecture, offering valuable guidance for organizations seeking to enhance their cybersecurity resilience in an ever-evolving digital landscape.

Published by: Frank Mensah

Author: Frank Mensah

Paper ID: V10I6-1452

Paper Status: published

Published: December 21, 2024

Full Details
Research Paper

Web Application for Paying Guest Accommodation System using Laravel Framework

The online paying guest system allows users to access a variety of lodging options near their work or desired location. In today’s digital age, web applications for rental purposes are including room accommodations, paying guest services, food services, and other daily needs are scattered across various platforms with separate modules. These modules can be complex and disjointed, making the process time-consuming and cumbersome. To address these issues, a unified solution is needed where users can manage and modify their rental accommodations efficiently using the Laravel tool for system design management. Overall, these advancements in web applications have greatly simplified the process of finding accommodations and accessing various rental services, Indeed, the convenience and flexibility offered by these online platforms have revolutionized the way people search for accommodations

Published by: Dr.K.Manikandan, Mrs.P.Caroline Priyanka Evelyne

Author: Dr.K.Manikandan

Paper ID: V10I6-1435

Paper Status: published

Published: December 18, 2024

Full Details
Research Paper

An Outlook on Polynomials

This study explores the complexity and relevance of teaching polynomials in mathematics education. By conducting a literature review and a small informal survey among students across various grades, the research examines their experiences and challenges in understanding polynomials. The findings highlight that many students perceive polynomials as one of the more difficult topics in mathematics. Furthermore, the practical applications of polynomials appear to be limited to specialized fields such as engineering, raising questions about their broader utility for most students. The study concludes that while polynomials have specific applications, their complexity may outweigh their benefits for general use in mathematics education, suggesting a need to reevaluate their emphasis in the curriculum.

Published by: Aatish Deepak Daryanani

Author: Aatish Deepak Daryanani

Paper ID: V10I6-1439

Paper Status: published

Published: December 18, 2024

Full Details
Research Paper

Metaverse: The Future of Recruitment and Talent Engagement

The Metaverse represents a groundbreaking frontier in recruitment, offering virtual environments that transcend geographical boundaries and reimagine the hiring process. This paper delves into the utilization of the Metaverse in recruitment, highlighting its transformative potential, key functionalities, and measurable impacts. By leveraging real-world data, we explore how organizations are capitalizing on this immersive technology to attract top talent, streamline operations, and enhance candidate experiences.

Published by: Aakash V

Author: Aakash V

Paper ID: V10I6-1427

Paper Status: published

Published: December 16, 2024

Full Details
Research Paper

Smart Shield: An IoT-Based Fall Detection, GPS Tracking, and Health Monitoring System Using ESP8266

The proposed Smart Belt is a wearable device designed to enhance personal safety and health monitoring through advanced technologies. It incorporates a fall detection system powered by the MPU6050 sensor and a custom-built dataset generated from real-life fall and non-fall scenarios. This dataset trains a machine-learning model whose weights and biases are deployed on an ESP8266 microcontroller. The belt detects falls accurately and mitigates false alarms by allowing users to cancel alerts within 20 seconds via an emergency button. In the event of a confirmed fall, the device triggers SMS alerts containing real-time GPS coordinates, ensuring continuous location tracking. A geofencing feature enhances safety by notifying caretakers if the wearer moves beyond predefined boundaries. Additionally, the belt features an MAX sensor and OLED display for health monitoring, providing real-time SpO2 and heart rate (bpm) readings when a finger is placed on the sensor. The Smart Belt is equipped with a user-friendly emergency button that sends immediate alerts in critical situations, offering additional layers of safety. Its robust design includes a rechargeable lithium battery with USB Type-C charging support, ensuring prolonged usability. This innovative solution combines safety, health monitoring, and connectivity in a compact and efficient system, making it a reliable companion for individuals needing constant monitoring and assistance. With its multifunctionality and focus on user safety, the Smart Belt is a significant step toward enhancing wearable technology for personal health and security.

Published by: Ashish Mahendranath Pathak, Vinayak Iragonda Patil, Vaishali Patil, Vaishnavi Pujari

Author: Ashish Mahendranath Pathak

Paper ID: V10I6-1412

Paper Status: published

Published: December 13, 2024

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X