Tuesday 7 April 2020

IEEE 2023: ADVANCED JAVA WITH BLOCKCHAIN AND CLOUD COMPUTING


IEEE-2023A Proxy Re-Encryption Approach to Secure Data sharing in the Internet of Things based on Blockchain            
Abstract: Blockchain first emerged in 2008 because secretive transactions over the internet needed enormous trust between donor and NGO or organization to mediate. Now that digital currencies have been firmly established, charities have the opportunity to engage with a new set of donors. Looking across borders, fundraising platforms that accept donations are the easiest first place to look for charities to starting out. Using Blockchain technology we can track the donation funds contributed to the fundraiser cause and get reassured that the funds are reaching their required destination without any middle intervention and saving the donors from scams. The AI helps predict the cost estimation required for the total cause using datasets and approaching potential donors while maintaining data hygiene. AI is used to predict the requirement for approximate fund for any task to be accomplished..

Click for more details



IEEE-2023Sensing Image sharing with Storage optimization Techniques in Cloud

 Abstract:  Blockchain is a newly emerging technology for data sharing and application. It can exchange de-centralized information in distributed systems without mutual trust by means of data encryption, timestamp and distributed consensus, so as to improve the efficiency of data sharing and application. This technology can be fully utilized in the large data remote sensing image system, and the multi-system shared node storage system can be managed efficiently and uniformly, so as to improve the economic efficiency of the system. This system designs the shared architecture based on block chain technology, proposes key research technologies. The main objective of this system is to identify a duplicate image and minimizing the storage space in Block chain.





IEEE 2023: Fake Product Identification System Using Blockchain.    
Abstract: Fake product identification is a growing concern in today’s global market. The use of blockchain technology can help address this issue by providing a secure and transparent way to track the provenance of products. We propose a system for fake product identification using blockchain, which involves assigning a unique identifier to each product at the time of manufacture and storing its transaction history on the blockchain. By leveraging the decentralized nature of blockchain, this system ensures the authenticity and integrity of product information, making it virtually impossible to tamper with. We discuss the benefits and challenges of implementing such a system and highlights the potential impact it could have on consumer trust. Overall, we provide insights into the potential of blockchain technology to tackle the issue of fake products in a secure and efficient manner. Moreover, block chain-based solutions for fake product identification enable stakeholders to trace the source of counterfeit products. This enables them to take appropriate measures to prevent further counterfeiting and safeguard their brand reputation. In conclusion, blockchain-based solutions for fake product identification offer a secure and transparent way to combat counterfeiting and protect consumers from potentially harmful products. By creating an immutable record of a product’s blockchain technology can enable manufacturers, retailers, and consumers to verify the authenticity of products and prevent counterfeiting.

 IEEE-2023: An Efficient Cloud-Of-Cloud system For Storing and Sharing Big Data.  

 Abstract:  Visual We present CHARON, a cloud-backed storage system capable of storing and sharing big data in a reliable and efficient way using multiple cloud storage repositories to comply with the legal requirements of sensitive personal data.  Features: •It efficiently deals with large files over a set of geo-dispersed storage services.  •Efficient system which cut down network traffic cost.  •Map out a novel intermediate data participant schema.

The map reduce type simplifies the large scale data deal with product group even though many times effort have been made to maximize the execution of map reduce work.

A hash capacity made use of session middle of the topology among minimizes the task even so is note movement valued in network topology. At last board reproduced outcome that shows at the proposed algorithm can together minimize network cost.

.

Click for more details




IEEE 2020: ADVANCED CLOUD COMPUTING PROJECTS


IEEE 2020: Toward Practical Privacy-Preserving Frequent Item set Mining on Encrypted Cloud Data
Abstract: Frequent item set mining, which is the essential operation in association rule mining, is one of the most widely used data mining techniques on massive datasets nowadays. With the dramatic increase on the scale of datasets collected and stored with cloud services in recent years, it is promising to carry this computation-intensive mining process in the cloud. Amount of work also transferred the approximate mining computation into the exact computation, where such methods not only improve the accuracy also aim to enhance the efficiency. However, while mining data stored on public clouds, it inevitably introduces privacy concerns on sensitive datasets.
Click for more details


IEEE 2020: An Attribute-based Availability Model for Large Scale IaaS Clouds with CARMA
Abstract:  High availability is one of the core properties of Infrastructure as a Service (IaaS) and ensures that users have anytime access to on-demand cloud services. However, significant variations of workflow and the presence of super-tasks, mean that heterogeneous workload can severely impact the availability of IaaS clouds. Although previous work has investigated global queues, VM deployment, and failure of PMs, two aspects are yet to be fully explored: one is the impact of task size and the other is the differing features across PMs such as the variable execution rate and capacity. To address these challenges we propose an attribute-based availability model of large scale IaaS developed in the formal modeling language CARMA. The size of tasks in our model can be a fixed integer value or follow the normal, uniform or log-normal distribution.
Click for more details


IEEE-2019: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
Abstract: We present CHARON, a cloud-backed storage system capable of storing and sharing big data in a secure, reliable, and efficient way using multiple cloud providers and storage repositories to comply with the legal requirements of sensitive personal data. CHARON implements three distinguishing features: (1) it does not require trust on any single entity, (2) it does not require any client-managed server, and (3) it efficiently deals with large files over a set of geo-dispersed storage services. Besides that, we developed a novel Byzantine-resilient data-centric leasing protocol to avoid write-write conflicts between clients accessing shared repositories. We evaluate CHARON using micro and application-based benchmarks simulating representative workflows from bioinformatics, a prominent big data domain. The results show that our unique design is not only feasible but also presents an end-to-end performance of up to 2:5_ better than other cloud-backed solutions.


IEEE-2019:Crypt-DAC:Cryptographically Enforced Dynamic Access Control in the Cloud
Abstract: Enabling cryptographically enforced access controls for data hosted in untrusted cloud is attractive for many users and organizations. However, designing efficient cryptographically enforced dynamic access control system in the cloud is still challenging. In this paper, we propose Crypt-DAC, a system that provides practical cryptographic enforcement of dynamic access control. Crypt-DAC revokes access permissions by delegating the cloud to update encrypted data. In Crypt-DAC, a file is encrypted by a symmetric key list which records a file key and a sequence of revocation keys. In each revocation, a dedicated administrator uploads a new revocation key to the cloud and requests it to encrypt the file with a new layer of encryption and update the encrypted key list accordingly. Crypt-DAC proposes three key techniques to constrain the size of key list and encryption layers. As a result, Crypt-DAC enforces dynamic access control that provides efficiency, as it does not require expensive decryption/reencryption and uploading/re-uploading of large data at the administrator side, and security, as it immediately revokes access permissions. We use formalization framework and system implementation to demonstrate the security and efficiency of our construction.


IEEE 2018: Secure Attribute-Based Signature Scheme with Multiple Authorities for Blockchain in Electronic Health Records Systems
Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and restore management of their own medical data. The rapid development of blockchain technology promotes population healthcare, including medical records as well as patient-related data. This technology provides patients with comprehensive, immutable records, and access to EHRs free from service providers and treatment websites. In this paper, to guarantee the validity of EHRs encapsulated in blockchain, we present an attribute-based signature scheme with multiple authorities, in which a patient endorses a message according to the attribute while disclosing no information other than the evidence that he has attested to it. Furthermore, there are multiple authorities without a trusted single or central one to generate and distribute public/private keys of the patient, which avoids the escrow problem and conforms t the mode of distributed data storage in the blockchain. By sharing the secret pseudorandom function seeds among authorities, this protocol resists collusion attack out of N from N 􀀀1 corrupted authorities. Under the assumption of the computational bilinear Dif_e-Hellman, we also formally demonstrate that, in terms of the unforgeability and perfect privacy of the attribute-signer, this attribute-based signature scheme is secure in the random oracle model. The comparison shows the ef_ciency and properties between the proposed method and methods proposed in other studies.
Click for more details

EEE 2019: Intelligent Neonatal Monitoring System Based on Android Application using Multi Sensors



IEEE 2020: Lightweight and Privacy-Preserving ID-as-a-Service provisioning in Vehicular Cloud Computing
Abstract: Vehicular cloud computing (VCC) is composed of multiple distributed vehicular clouds (VCs), which are formed on-the-fly by dynamically integrating underutilized vehicular resources including computing power, storage, and so on. Existing proposals for identity-as-a-service (IDaaS) are not suitable for use in VCC due to limited computing resources and storage capacity of onboard vehicle devices. In this paper, we first propose an improved ciphertext-policy attribute-bas Utilizing the improved CP-ABE scheme and the permissioned blockchain technology, we propose a lightweight and privacy-preserving IDaaS architecture for VCC named IDaaSoVCC.ed encryption (CPABE) scheme.
Click for more details 


IEEE 2020: Lightweight Sharable and Traceable Secure Mobile Health System
Abstract: Mobile health (mHealth) has emerged as a new patient centric model which allows real-time collection of patient data via wearable sensors, aggregation and encryption of these data at mobile devices, and then uploading the encrypted data to the cloud for storage and access by healthcare staff and researchers. However, efficient and scalable sharing of encrypted data has been a very challenging problem. In this paper, we propose a Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient’s mobile device to data users.

IEEE 2019: Intelligent Neonatal Monitoring System Based on Android Application using Multi Sensors 
Abstract: The purpose of the project is to develop an Intelligent Neonatal Monitoring System based on temperature and pulse rate data. In the Neonatal Intensive Care Unit (NICU), there are premature babies and other ill babies who need extra care from the doctors, nurses as well as medical supplies. Therefore, an intelligent neonatal monitoring system should be a good solution in order to help them to observe neonates frequently and consistently. This system transmits the vital signs of the neonate such as body temperature and pulse rate to the Internet of Things (IoT) called ThingSpeak. The body temperature and the pulse rate will be detected by LM35 temperature sensor and pulse sensor respectively. These information will be sent to the IoT via ESP8266 Wi-Fi Shield. IoT helps the doctors and nurses to be connected with the neonate’s vital signs and it is helpful in monitoring the neonates at anytime and anywhere through the internet. The percentage difference between LM35 temperature sensor and digital thermometer is less than 3% while the pulse rate can be varied according to the physical activity. This develops system will providing efficiency and reliability which will play a vital role for better care.
Click for more details

IEEE 2019: Secured Vehicle Toll Payment System Using NFC
Abstract: Nowadays, uses for NFC technology have been emerging day by day, the best application of NFC technology is in the contactless payment system. Similarly, due to various advantages of web application such as ease of maintenance and various user-friendly released version, the demand for new web applications supporting distinctive kinds of gadgets and intentions are persistently. Now different technologies such as Bluetooth, NFC, and BLE are being used for initiating the online payment. Considering the parameters such as cost, more reliability, and increased security, NFC technology is a best-fitted option for initiating the online vehicle toll payment system. Thus, the application of Cloud-based web application along with different IoT devices like Smartphone (having NFC feature) and NFC tag (ISO/IEC 14443) is explained in this paper. Paper the online vehicle toll payment system developed by using NFC technology is used for triggering the vehicle toll payment system supported by the web application.
Click for more details


IEEE 2018: MEDIBOX – IoT Enabled Patient Assisting Device
Abstract: The health and wellness sector is critical to human society and as such should be one of the first to receive the benefits of upcoming technologies like IoT. Some of the Internet of Medical Things (IoMT) are connected to IoT networks to monitor the day-to-day activities of the patients. Recently there has been attempts to design new medical devices which monitor the medications and help aged people for a better assisted living. In this paper, one such attempt is made to design a multipurpose portable intelligent device named MEDIBOX which helps the patients take their medications at the right time. This box is a proficient system which maintains the parameters like temperature and humidity in a controlled range recommended by the drug manufacturer and thus maintains the potency of the medicines even if the patient is travelling. Related to this, we have developed a Host Management System (HMS) which is capable of cloud-based installation and monitoring that stores and controls the MEDIBOX functionality for further analysis and future modification in design aspects.
Click for more details

IEEE-2019: Analysis of Women Safety in Indian Cities Using Machine Learning on Tweets



IEEE 2020: APPLICATION OF BLOCK CHAINING TECHNOLOGY IN FINANCE AND ACCOUNTING FIELD
Abstract: Block chaining technology is a distributed infrastructure and computing paradigm. The latest version is represented by the super account book. The latest version is block chain 3. From the perspective of large data, this paper systematically combs the essence and core technology of block chain technology, and expounds the application status of block chain technology in  accounting industry. This paper focuses on building an irreversible distributed financial system based on large data in the context of  large data in order to apply the scenario of "Block Chain Technology + Accounting Services" to the accounting industry, and prospects the application of Block Chain Storage  Technology and Intelligent Internet of Things technology based on large data, providing inspiration for  future research.

IEEE 2020: A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds
Abstract: With the rapid development of cloud computing services, more and more individuals and enterprises prefer to outsource their data or computing to clouds. In order to preserve data privacy, the data should be encrypted before outsourcing and it is a challenge to perform searches over encrypted data. In this paper, we propose a privacy-preserving multi-keyword ranked search scheme over encrypted data in hybrid clouds, which is denoted as MRSE-HC. The keyword dictionary of documents is clustered into balanced partitions by a bisecting k-means clustering based keyword partition algorithm. According to the partitions, the keyword partition based bit vectors are adopted for documents and queries which are utilized as the index of searches. The private cloud filters out the candidate documents by the keyword partition based bit vectors, and then the public cloud uses the trapdoor to determine the result in the candidates.


IEEE-2019: Analysis of Women Safety in Indian Cities Using Machine Learning on Tweets
Abstract: Women and girls have been experiencing a lot of violence and harassment in public places in various cities starting from stalking and leading to sexual harassment or sexual assault. This research paper basically focuses on the role of social media in promoting the safety of women in Indian cities with special reference to the role of social media websites and applications including Twitter platform Facebook and Instagram. This paper also focuses on how a sense of responsibility on part of Indian society can be developed the common Indian people so that we should focus on the safety of women surrounding them. Tweets on Twitter which usually contains images and text and also written messages and quotes which focus on the safety of women in Indian cities can be used to read a message amongst the Indian Youth Culture and educate people to take strict action and punish those who harass the women. Twitter and other Twitter handles which include hash tag messages that are widely spread across the whole globe sir as a platform for women to express their views about how they feel while we go out for work or travel in a public transport and what is the state of their mind when they are surrounded by unknown men and whether these women feel safe or not?
Click for more details

IEEE-2019: Sentiment Analysis of Comment Texts Based on BiLSTM
With the rapid development of Internet technology and social networks, a large number of comment texts are generated on the Web. In the era of big data, mining the emotional tendency of comments through artificial intelligence technology is helpful for the timely understanding of network public opinion. The technology of sentiment analysis is a part of artificial intelligence, and its research is very meaningful for obtaining the sentiment trend of the comments. The essence of sentiment analysis is the text classification task, and different words have different contributions to classification. In the current sentiment analysis studies, distributed word representation is mostly used. However, distributed word representation only considers the semantic information of word, but ignore the sentiment information of the word. In this paper, an improved word representation method is proposed, which integrates the contribution of sentiment information into the traditional TF-IDF algorithm and generates weighted word vectors. The weighted word vectors are input into bidirectional long short term memory (BiLSTM) to capture the context information effectively, and the comment vectors are better represented. The sentiment tendency of the comment is obtained by feed forward neural network classifier. Under the same conditions, the proposed sentiment analysis method is compared with the sentiment analysis methods of RNN, CNN, LSTM, and NB. The experimental results show that the proposed sentiment analysis method has higher precision, recall, and F1 score. The method is proved to be effective with high accuracy on comments

IEEE 2018: A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption
Abstract: Fraudulent behavior in drinking water consumption is a significant problem facing water supplying companies and agencies. This behavior results in a massive loss of income and forms the highest percentage of non-technical loss. Finding efficient measurements for detecting fraudulent activities has been an active research area in recent years. Intelligent data mining techniques can help water supplying companies to detect these fraudulent activities to reduce such losses. This research explores the use of two classification techniques (SVM and KNN) to detect suspicious fraud water customers. The main motivation of this research is to assist Yarmouk Water Company (YWC) in Irbid city of Jordan to overcome its profit loss. The SVM based approach uses customer load profile attributes to expose abnormal behavior that is known to be correlated with non-technical loss activities. The data has been collected from the historical data of the company billing system. The accuracy of the generated model hit a rate of over 74% which is better than the current manual prediction procedures taken by the YWC. To deploy the model, a decision tool has been built using the generated model. The system will help the company to predict suspicious water customers to be inspected on site.

IEEE 2023: WEB SECURITY OR CYBER CRIME

  IEEE 2023:   Machine Learning and Software-Defined Networking to Detect DDoS Attacks in IOT Networks Abstract:   In an era marked by the r...