Adaptive Hybrid Case-Based Neuro-Fuzzy Model for Intrusion Detection and Prevention for Smart Home Network
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.1-10, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.110
Abstract
The advent of Internet-of-Things (IoT) technology has ushered in a new era of unprecedented interconnectivity, by transforming our living space into a dynamic ecosystem. The challenging part of this is the security risk it poses on the network. Due to the vulnerabilities that are usually associated with smart devices, integrating them within the smart home ecosystem presents significant concern for the need of preserving data privacy, network traffic classification, and proper management of trusted devices. Various techniques have been employed in the development of Network Intrusion Detection System (NIDS) to safeguard the network against the evolving nature of attack deployed by cyber-criminals. This paper presents an Adaptive Hybrid Case-Based Neuro-Fuzzy System (HCBNFS) technique to the development of a robust and efficient Intrusion Detection and Prevention System (IDPS). The HCBNFS technique deploys the CBR as a detection engine to easily detect already known traffic patterns on the network, while the NFIS was deployed as a tuning factor to the reverse phase of the CBR to further investigate unknown traffic to the detection engines case-base. Five network packet features were selected as input variables to the proposed model. These features are the source IP, destination IP, source port, destination port, and network protocol. The model was trained using the CIC-IoT2022 dataset. For this study, the CIC-IoT2002 and a synthetic dataset were used for both testing and evaluating the performance of the system. The experimental results of the system using the CIC-IoT2022 dataset achieved 99% accuracy rate in intrusion detection, and recorded 99.5% for precision, recall, and F1-Score. The empirical evaluation of the proposed model validates its effectiveness and contributes towards the development of a more robust intrusion detection and prevention system. By enhancing data confidentiality, privacy, and security, the model represents a significant step forward in the safeguarding IoT-based smart home network against cyber-criminals.
Key-Words / Index Term
Internet-of-Things, Artificial Intelligence, Neuro-Fuzzy Inference System, Case-Based Reasoning, Smart Home, Machine Learning
References
[1] Ahanger, T. A., Tariq, U., Ibrahim, A., Ullah, I., & Bouteraa, Y. "IoT-Inspired Framework of Intruder Detection for Smart Home Security Systems". Electronics, Vol. 9, Issue.9, pp.1361, 2020.
[2] Alalade, E. D. "Intrusion detection system in smart home network using artificial immune system and extreme learning machine hybrid approach". IEEE, pp.1-2, 2020.
[3] Almseidin, M., Al-Sawwa, J., & Alkasassbeh, M. "Anomaly-based Intrusion Detection System using Fuzzy Logic". In the Proceedings of the 2021 International Conference on Information Technology (ICIT), pp.290-295, 2021.
[4] Alrayes, F. S., Alshuqayran, N., Nour, M. K., Al Duhayyim, M., Mohamed, A., Mohammed, A. A. A., . . . Yaseen, I. "Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment". CMC-COMPUTERS MATERIALS & CONTINUA, Vol.74, Issue.3, pp.6737-6753, 2023.
[5] Butt, N., Shahid, A., Qureshi, K. N., Haider, S., Ibrahim, A. O., Binzagr, F., & Arshad, N. (2022). "Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks". Mathematics, Vol.10, Issue.23, pp.4598, 2022.
[6] Farhin, F., Sultana, I., Islam, N., Kaiser, M. S., Rahman, M. S., & Mahmud, M. "Attack detection in internet of things using software defined network and fuzzy neural network". In the Proceedings of the 2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV), pp. 1-6, 2020.
[7] Imtiaz, S. I., Khan, L. A., Almadhor, A. S., Abbas, S., Alsubai, S., Gregus, M., & Jalil, Z. "Efficient Approach for Anomaly Detection in Internet of Things Traffic Using Deep Learning". Wireless Communications & Mobile Computing, pp.1-15, 2020.
[8] Johannesson, P., & Perjons, E. "An Introduction to Design Science" (2nd ed.). Springer: 978-3-030-7813, 2021.
[9] Kponyo, J. J., Agyemang, J. O., & Klogo, G. S. "Detecting End-Point (EP) Man-In-The-Middle (MITM) attack based on ARP analysis: a machine learning approach". International Journal of Communication Networks and Information Security, Vol.12, Issue.3, pp.384-388, 2020.
[10] Marimuthu, D., Rao, G. R. K., Mehbodniya, A., Mohanasundaram, D., Sundaram, C. K., Maria, A. B., & Mani, D. "Mathematically Modified Adaptive Neuro-Fuzzy Inference System for an Intelligent Cyber Security System". SN Computer Science, Vol.4, Issue.5, pp.453, 2023.
[11] Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. "Black Hole attack Detection using Fuzzy based Intrusion Detection Systems in MANET". Procedia Computer Science, Issue.151, pp.1176-1181, 2019.
[12] Rajput, P. K., & Sikka, G. Multi?agent Architecture "Approach for Self?healing Systems: Run?time Recovery with Case?based Reasoning". Concurrency and Computation: Practice and Experience, Vol.35, Issue.1, 2023.
[13] Raushan Kashypa."Smart Home Design Using IoT", International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.146-150, 2020.
[14] Richa, M., Sakshi, K., & Shubham, G. "Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function". International Research Journal of Engineering and Technology (IRJET), Vol.9, Issue.1, pp.932-944, 2022.
[15] Sajjad, D., Hassan, M., Priscilla, K. D., Zohourian, A., Kelvin, A. T., & Ali, G. A.. "CIC-IoT-Dataset2022 [Dataset]". Kaggle, 2022.
[16] Suhasini, V. and Avinash, Y. "Artificial Intelligence Powering Internet of Things", International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.449-456, 2019.
[17] Tariq, N., Asim, M., Khan, F. A., Baker, T., Khalid, U., & Derhab, A. "A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things". Sensors, Vol.21, Issue.1, pp.23, 2020.
Citation
Davies I.N., Taylor O.E., Anireh V.I.E., Bennett E.O., "Adaptive Hybrid Case-Based Neuro-Fuzzy Model for Intrusion Detection and Prevention for Smart Home Network," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.1-10, 2024.
AI-Driven Data Analytics Unveiling Sales Insights from Demographics and Beyond
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.11-18, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.1118
Abstract
Leveraging a synthesis of literature review and case studies, it illuminates how AI empowers organizations to discern intricate patterns and correlations within vast datasets. Through sophisticated algorithms and machine learning techniques, AI facilitates the nuanced understanding of the interplay between consumer demographics and purchasing behaviors, enabling targeted marketing strategies. Moreover, the study extends beyond demographics, encompassing psychographic, geographic, and behavioral factors through the amalgamation of diverse data sources. By employing predictive modeling, AI enables businesses to forecast market trends, optimize product positioning, and deliver personalized customer capabilities. Ethics around artificial intelligence-driven data analytics, incorporating consumer discretion and algorithmic fairness, are also addressed. Transparent methodologies and regulatory compliance are emphasized as crucial elements in fostering trust and mitigating risks. This paper explores the utilization of AI-driven data analytics in uncovering profound sales insights derived not only from demographics but also from diverse sources beyond traditional parameters. Machine learning deeper into consumer behavior patterns, market trends, and socio-economic indicators to gain a comprehensive understanding of their target audience. The paper discusses various methodologies employed in AI-driven data analytics, including predictive modeling, clustering techniques, and sentiment analysis, to extract valuable sales insights. Furthermore, it shows how crucial it is to incorporate data from various sources, including social media, geospatial information, and transactional records, to enrich the analytical process and enhance the accuracy of predictive models. Through real-world case studies and examples, this paper demonstrates how AI-driven data analytics can empower businesses to optimize their sales strategies, personalize marketing campaigns, and identify untapped market opportunities. By leveraging the capabilities of AI, organizations can move beyond traditional demographic segmentation and uncover nuanced insights that drive competitive advantage and foster sustainable growth.
Key-Words / Index Term
AI-driven data analytics, sales insights, demographics, machine learning, predictive modeling, consumer behavior, market trends, socio-economic indicators, personalized marketing
References
[1] Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information," Science, Vol.347, No.6221, pp.509-514, 2019.
[2] S. LaValle, E. Lesser, R. Shockley, M. S. Hopkins, and N. Kruschwitz, "Big Data, Analytics and the Path from Insights to Value," MIT Sloan Management Review, 52, 2, 2011.
[3] T. H. Davenport and R. Ronanki, "Artificial intelligence for the real world," Harvard Business Review, Vol.96, No.1, pp.108-116, 2018.
[4] L. A. Siiman, et al., "Opportunities and Challenges for AI-Assisted Qualitative Data Analysis: An Example from Collaborative Problem-Solving Discourse Data," in International Conference on Innovative Technologies and Learning, Cham: Springer Nature Switzerland, 2023.
[5] Z. Wang, A. Maalla and M. Liang, "Research on E-Commerce Personalized Recommendation System based on Big Data Technology," 2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), Chongqing, China, 2021, pp.909-913.
[6] A. K. Sharma, N. Goel, J. Rajput and M. Bilal, "An Intelligent Model For Predicting the Sales of a Product," 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, pp.341-345, 2020.
[7] V. Geetha, M. C. Manikandan, R. Rejith, R. S. Rishi, and K. Umapathy, "A Survey on E-Commerce Recommendation Systems Using Artificial Intelligence and Current Trends for Personalization to Improve Customer Experience," International Journal of Engineering Research & Technology (IJERT), March, Vol.13, No.3, 2024.
[8] D. Marupaka and S. Rangineni, "Machine Learning-Driven Predictive Data Quality Assessment in ETL Frameworks," International Journal of Computer Trends and Technology, Vol.72, No.3, pp.53-60, 2024.
[9] S. Rangineni and A. K. Bhardwaj, “Analysis Of DevOps Infrastructure Methodology and Functionality of Build Pipelines”, EAI Endorsed Scal Inf Syst, Jan., Vol.11, No.4, 2024.
[10] N. S. A. Polireddi, M. Suryadevara, S. Venkata, S. Rangineni, S. K. R. Koduru and S. Agal, "A Novel Study on Data Science for Data Security and Data Integrity with Enhanced Heuristic Scheduling in Cloud," 2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India, pp.1862-1868, 2023.
[11] T. Esther, A. Akinsola, T. Ahmed, E. Makinde, K. Akinwande, and M. Mayowa, "A Review of the Ethics of Artificial Intelligence and Its Applications in the United States," International Journal on Cybernetics & Informatics (IJCI), Vol.12, No.6, 2023.
[12] Y. Qin and H. Li, "Sales forecast based on BP neural network," 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi`an, China, pp.186-189, 2011.
[13] B. ?ater and J. Serafimova, "The Influence of Socio-Demographic Characteristics on Environmental Concern and Ecologically Conscious Consumer Behaviour among Macedonian Consumers," Economic and Business Review, Vol.21, No.2, 2019.
[14] N. A. Kumar, "Impact and Role of Artificial Intelligence in Sales and Marketing," i-manager`s Journal on Management, Vol.15, No.1, pp.1-6, 2020.
[15] V. Antonio, "How AI is changing sales,"Harvard Business Review, Vol.30, 2018.
[16] W. M. Lim, S. Kumar, N. Pandey, D. Verma, and D. Kumar, "Evolution and trends in consumer behavior: Insights from Journal of Consumer Behavior," Journal of Consumer Behavior, Vol.22, No.1, pp.217-232, 2023.
[17] Y. Gao and H. Liu, "Artificial intelligence-enabled personalization in interactive marketing: a customer journey perspective," Journal of Research in Interactive Marketing, Vol.17, No.5, pp.663-680, 2023.
[18] G. S. Gautham and S. Rao, "The Impact of Artificial Intelligence on Personalized Marketing," International Journal for Research in Applied Science & Engineering Technology (IJRASET), Vol.12, No.4, 2024.
[19] A. R. Gonçalves, D. C. Pinto, P. Rita, and T. Pires, "Artificial Intelligence and Its Ethical Implications for Marketing," Emerging Science Journal, Vol.7, No.2, 2023.
[20] P. Sinha, A. Shastri, and S. Lorimer, "How generative AI will change sales,"Harvard Business Review, 2023.
[21] C. Homburg, M. Droll, and D. Totzek, "Customer Prioritization: Does it Pay off, and How Should it be Implemented?" Journal of Marketing, Vol.72, No.5, pp.110-130, 2008.
Citation
Krishnamurty Raju Mudunuru, Rajesh Remala, Sevinthi Kali Sankar Nagarajan, "AI-Driven Data Analytics Unveiling Sales Insights from Demographics and Beyond," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.11-18, 2024.
Improving Security and Data Protection of Serverless Computing in the Cloud Environment
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.19-27, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.1927
Abstract
Offering scalability and cost-effectiveness, serverless computing has become a promising paradigm for managing and deploying applications in the cloud. But as serverless architectures become more widely used, security and data protection issues have taken center stage. This study investigates techniques and approaches to improve serverless computing`s security and data protection in cloud environments. It looks at a number of serverless architecture-specific security issues, including function-level vulnerabilities, the shared responsibility paradigm, and the possibility of data disclosure. The study also looks into best practices and current security techniques, such as access control, encryption, monitoring, and compliance procedures, to help address these issues. This presentation offers an overview of the current security situation in serverless computing through an extensive examination of the literature and case studies.Organizations can take use of serverless computing`s advantages while maintaining the privacy, availability, and integrity of their data and apps by resolving these problems.
Key-Words / Index Term
cloud computing, serverless computing, cyber- security, application security and privacy
References
[1]Marin, Eduard, Diego Perino, and Roberto Di Pietro. "Serverless computing: a security perspective." Journal of Cloud Computing 11, No.1, 2022.
[2] M. Wu, Z. Mi and Y. Xia, "A Survey on Serverless Computing and Its Implications for JointCloud Computing," 2020 IEEE International Conference on Joint Cloud Computing, Oxford, UK, pp.94-101, 2020. doi:10.1109/JCC49151.2020.00023.
[3] W. O`Meara and R. G. Lennon, “Serverless Computing Security Protecting Application Logic”, 2020 31st Irish Signals and Systems Conference (ISSC), Letterkenny, Ireland, pp.1-5, 2020. doi 10.1109ISSC49989.2020.9180214.
[4] Sankaran, A., Datta, P. and Bates, A., 2020, December. “Workflow integration alleviates identity and access management in serverless computing”. In Annual Computer Security Applications Conference pp.496-509, 2020. https://doi.org/10.1145/3427228.3427665
[5] Polinsky, I., Datta, P., Bates, A. and Enck, W., 2021, June. SCIFFS: “Enabling secure third-party security analytics using serverless computing”. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies pp.175-186, 2021. https://doi.org/10.1145/3450569.3463567
[6] Alpernas, K., Flanagan, C., Fouladi, S., Ryzhyk, L., Sagiv, M., Schmitz, T. and Winstein, K., 2018. “Secure serverless computing using dynamic information flow control. Proceedings of the ACM on Programming Languages”, 2 (OOPSLA), pp.1-26, 2018. https://doi.org/10.1145/3276488
[7] Ahmadi, S., 2024. “Challenges and Solutions in Network Security for Serverless Computing” No.11747, 2024. EasyChair.DOI: 10.47191/ijcsrr/V7-i1-23, Impact Factor: 6.789
[8] Gadepalli, P.K., Peach, G., Cherkasova, L., Aitken, R. and Parmer, G., 2019, October. “Challenges and opportunities for efficient serverless computing” at the edge. In 2019 38th Symposium on Reliable Distributed Systems (SRDS), pp.261-2615, 2019. IEEE.DOI 10.1109/SRDS47363.2019.00036
[9] Ihtesham, M., Tahir, S., Tahir, H., Hasan, A., Sultan, A., Saeed, S. and Rana, O., 2023.” Privacy preserving and serverless homomorphic-based searchable encryption as a service (SEaaS)”, 2023. IEEE Access. Digital Object Identifier 10.1109/ACCESS.2023.3324817
[10] Chowdhury, N.A., “Evaluating the Security Implications of Serverless Computing Environments: A Focus on Vulnerabilities and Countermeasures”. DOI: 10.5281/zenodo.10488030
[11]Cinar, B., “The Rise of Serverless Architectures: Security Challenges and Best Practices. Asian Journal of Research in Computer Science”, Vol.16, Issue.4, pp.194-210, 2023. DOI: 10.9734/AJRCOS/2023/v16i4382
[12]Qiang, W., Dong, Z. and Jin, H., 2018. Se-lambda: “Securing privacy-sensitive serverless applications using sgx enclave. In Security and Privacy in Communication Networks”: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I, pp.451-470, 2018. Springer International Publishing.https://doi.org/10.1007/978-3-030-01701-9_25
[13] Stigler, M. and Stigler, M., 2018.” Understanding serverless computing”. Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud, pp.1-https://doi.org/10.1007/978-1-4842-3084-8_1
[14]Sewak, M. and Singh, S., April. “Winning in the era of serverless computing and function as a service”. In 2018 3rd International Conference for Convergence in Technology (I2CT), pp.1-5, 2018. IEEE. 978-1-5386-4273-3/18/$31.00 ©2018 IEEE
[15]Rashid, A. and Chaturvedi, A. “Cloud computing characteristics and services: a brief review”. International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.421-426, 2019.
[16] Suryateja, P.S., 2018.” Threats and vulnerabilities of cloud computing: a review”. International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.297-302, 2018.
Citation
Sahibdeep Singh, Gurjit Singh Bhathal, "Improving Security and Data Protection of Serverless Computing in the Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.19-27, 2024.
Secured Framework for Electronic Medical Record Protection and Exchange Using Blockchain Technology
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.28-34, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.2834
Abstract
The adoption of blockchains to effectively manage medical services is fast becoming popular for professional use and in patient-centered applications. Electronic medical records are highly sensitive with user-privacy data online with clinical services that relate to patients’ diagnosis and treatments. The features of these medical records necessitate their availability, accessibility, agility, confidentiality and security. These have been demystified with the birth of the blockchain technology that seeks to proffer platforms and application services devoted to dependability and reliability amongst other features. Thus, we propose a blockchain health information framework for healthcare facilities. Our ensemble yields a permissioned blockchain using a hyper-fabric ledger. Using this state of technology on a peer-to-peer blockchain with various actors to include patient, practitioners and other users playing the roles of the creation, retrieval and storage of medical data for a patient to aid interoperability, our ensemble produce a query response time of 0.56 secs and https response time of 0.42 secs for 2500-users, and 0.78 secs and 0.63 secs respectively for 7500-users.
Key-Words / Index Term
Blockchain Technology, Electronic Medical Records, Data Security and Privacy, Interoperability
References
[1] I. Abu-elezz, A. Hassan, A. Nazeemudeen, M. Househ, A. Abd-alrazaq, " The benefits and threats of blockchain technology in healthcare: A scoping review," International Journal of Medical Informatics, Elsevier, Vol. 142, 104246, pp.1-9, 2020.
[2] H. Dang, T. T. A. Dinh, D. Loghin, E. Chang, Q. Lin, B. C. Ooi, "Towards Scaling Blockchain Systems via Sharding," In the Proceedings of the 2019 International Conference on Management of Data, ACM, 2019.
[3] G. Habib, S. Sharma, S. Ibrahim, I. Ahmad, S. Qureshi, M. Ishfaq, “Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Future Internet,” MDPI 14 (11): 1-22, 14 (11), pp.1–22, 2022.
[4] M. J. H. Faruk, H. Shahriar, M. Valero, S. Sneha, S. I. Ahamed and M. Rahman, "Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring," In the Proceedings of the IEEE International Conference on Digital Health (ICDH), Chicago, IL, USA, pp.299-308, 2021.
[5] A. Khatoon, “A Blockchain-Based Smart Contract System For Healthcare Management. Electronics,” MDPI, 9 (94), 2020.
[6] J. W. Kim, S.J. Kim, W. C. Cha, T. A. Kim, “Blockchain-Applied Personal Health Record Application: Development and User Experience,” Appl. Sci., MDPI, 12, 1847, 2022
[7] E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta and B. Ford, "OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding," In IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2018.
[8] H. Li , X. Yang , H. Wang, W. Wei, W. Xue, “A Controllable Secure Blockchain-Based Electronic Healthcare Records Sharing Scheme,”. Journal of Healthcare Engineering,v Hindawi, pp.1-11, 2022.
[9] J. Liu, X. Sun, K. Song, “A Food Traceability Framework Based on Permissioned Blockchain. Journal of Cyber Security, 2(2), pp.107–113, 2020.
[10] S. Sayyad-Modi, R. K. Shingate, R. G. Jagtap, M. D. K., R. H. Sabale, “Smart Transfer Certificate Generator and Employer Verification Using Blockchain,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.6, pp.26-29, 2023.
[11] K. Saraf, “Fusing Blockchain and AI with the Metaverse: Unveiling the Future of Digital Transformation,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.9, pp.1-10, 2023.
[12] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,”, SSRN Product and Services, pp.1-9, 2008.
[13] E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, “Hyperledger Fabric: A Distributed Operating System For Permissioned Blockchains,” In the Proceedings of 13th EuroSys Conference, Article 30, pp.1-15, 2018.
[14] F. Armknecht, G. O. Karame, A. Mandal, F. Youssef, E. Zenner (2015). “Ripple: Overview and outlook,`` In Proceedings of 8th International Conference on Trust Trustworthy Computing, Heraklion, Greece: Springer, pp.163180, 2015.
[15] S. B. Far, M. R. Asaar, “A blockchain-based anonymous reporting system with no central authority: Architecture and protocol,” Cyber Security and Applications, Volume 2, 100032, Elsevier, pp.1-17, 2024.
[16] A. Wahrstatter, S. Khan, D. Svetinovic, “OpenFL: A Scalable and Secure Decentralized Federated Learning System on the Ethereum Blockchain,” Internet of Things, Vol. 00, Elsevier, pp.1–18, 2024.
[17] A. S. Balobaid, Y. H. Alagrash, A. H. Fadel, J. N. Hasoon, “Modeling of blockchain with encryption based secure education record management system,” Egyptian Informatics Journal, Vol.24, 100411, Elsevier, pp.1-11, 2023.
[18] A. Panwar, V. Bhatnagar, Manju. Khari, A. W. Salehi and G. Gupta (2022) A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud-Based Data Lake. Computational Intelligence and Neuroscience, Hindawi, Vol.2022, pp.1-19, 2022.
[19] G. Verma, N. Pathak, N. Sharma, “A Secure Framework for Health Record Management Using Blockchain in Cloud Environment,” Journal of Physics: Conference Series, 1998 012019, 2021.
[20] S. Sabu, H. M. Ramalingam M. Vishaka, M. H. R. Swapna, S. Hegde, “Implementation Of A Secure And Privacy-Aware E-Health Record And Iot Data Sharing Using Blockchain,” Global Transitions Proceedings, Elsevier, Vol.2, Issue.2, pp.429–433, 2021.
[21] Dinh C. Nguyen, Pubudu N. Pathirana, Ming Ding; Aruna Seneviratne, “Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges,” IEEE Communications Surveys & Tutorials, IEEE, Vol.22, Issue: 4, 2020.
[22] R. Sangeetha, B. Harshini, A.Shanmugapriya, T.K.P. Rajagopal, “Electronic Health Record System using Blockchain.” International Research Journal of Multidisciplinary Technovation, 1(2), pp.57-61, 2019.
[23] M. Usmana,. U. Qamar, “Secure Electronic Medical Records Storage and Sharing Using Blockchain Technology,” Procedia Computer Science, Elsevier, Vol.174, pp. 321–327, 2020.
[24] H. L Gururaj, A. M. Athreya, A. A. Kumar, A. M. Holla, S M Nagarajath, V. R. Kumar, “A New Era of Technology,” Wiley, pp.1-24, 2020.
[25] A. Ekblaw, j. D.. Azaria, M. D. Halamka, A. Lippman, “A Case Study for Blockchain in Healthcare: “MedRec” prototype for electronic health records and medical research data,” MIT Media Lab, 2016.
[26] D. Allenotor, D. A. Oyemade. “An optimized parallel hybrid architecture for cryptocurrency mining.” Computing, Information Systems, Development Informatics & Allied Research Journal; Vol.12, Issue 1, pp.94-104, 2022.
[27] A. Abayomi-Alli, A. J. Ikuomola,, I. S. Robert, O. O. AbayomiAlli, “An enterprise cloud-based electronic health records system.” Journal of Computer Science and Information Technology, 2(2), pp.21-36, 2014.
Citation
David Ademola Oyemade, James Kolapo Oladele, "Secured Framework for Electronic Medical Record Protection and Exchange Using Blockchain Technology," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.28-34, 2024.
Exploring Cloud Computing Advancement and Future Technology Direction Impacts
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.35-41, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.3541
Abstract
Cloud computing is a crucial element of contemporary computing structure, offering scalability, flexibility, and cost-effectiveness to organizations in various industries. This paper aims to thoroughly examine cloud computing, covering its evolution, key features, adoption trends, challenges, and future potential. Utilizing a mixed-methods approach, this study integrates literature reviews, case studies, surveys, and interviews to reveal valuable insights into how cloud computing is transforming businesses and society.
Key-Words / Index Term
Cloud Computing, Evolution, Adoption Trends, Challenges, Future Prospects, Cloud Computing Impacts
References
[1] Presedence Research, “Cloud Computing Market (By Deployment: Private, Hybrid, Public; By Service: Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS); By End User: IT and Telecom, BFSI, Manufacturing, Healthcare, Retail and Consumer Goods, Media and Entertainment, Energy and Utilities, Government and Public Sector, Others; By Organization Size; By Workload) - Global Industry Analysis, Size, Share, Growth, Trends, Regional Outlook, and Forecast 2023 – 2032”, pp.20-97, 2023.
[2] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia, “A View of Cloud Computing”, Vol.4, Issue.12, pp.50-55, 2014.
[3] Peter Mell,Timothy Grance, “The NIST Definition of Cloud Computing”, NIST Publisher, USA, pp.1-3, 2011.
[4] Alaska edu, “Overview of Amazon Web Services”,pp.19-24, December 2015.
[5] Rakesh Prasad Sarang, “Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey”, IJCSE- Oct, Vol.6, Issue.10, 2018.
[6] Tim Maurer, Garrett Hinck, “Cloud Security: A Primer for Policymakers”, Carnegie Endowment for International Peace, Aug. 1, pp.10-22, 2020.
[7] Laura A. Odell, Brendan T. Farrar-Foley, John R. Kinkel, Rama S.Moorthy and Jennifer A. Schultz, “Beyond Enterprise Resource Planning (ERP): The Next Generation Enterprise Resource Planning Environment”, Institute for defense analyses, USA, pp.48-55, 2012.
[8] Huiming Yu, Nakia Powell, Dexter Stembridge and Jonathan Rann, “Developed and Taught Course Modules to Enhance Cloud Computing Education”,SCITEPRESS, pp.167-175, 2014.
[9] Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese and Paul Hopkins, “The Cloud, Chapter Title: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing”, RAND Corporation, pp.45-56, 2011.
[10] Merugu.Gopichand, “A Survey on Service Models in Mobile Cloud Computing”, International Journal of Computer Sciences and Engineering, May, Vol.7, Issue.5, 2019.
[11] Trey Herr, “Four myths about the cloud, there is no cloud, just other people’s computers”, Atlantic Council, pp.5-7, 2020.
[12] Andrew Davies and Patrick Kennedy, “From little things, Quantum Computing, Quantum technologies and their application to defence”, Australian Strategic Policy Institute, pp.9-10, 2017.
[13] J. David Bolter, “Artificial Intelligence”,The MIT Press on behalf of American Academy of Arts & Sciences, pp.1-18, 2021.
[14] Ankit Prajapati1, Chetan Agarwal2, Pawan Meena3, "Assessment of Phishing Websites Prediction using Machine Learning Approaches", February, Vol.12, Issue.2, pp.37-45, 2024.
[15] Amy Whitaker, “Art and Blockchain: A Primer, History, and Taxonomy of Blockchain Use Cases in the Arts”, University of Arkansas Press, Summer, Vol.8, Issue.2, pp.21-46, 2019.
[16] Joshua Baron, Angela O’Mahony, David Manheim and Cynthia DionSchwarz, “National Security Implications of Virtual Currency, Examining the Potential for Non-state Actor Deployment”, RAND Corporation, pp.11-12, 2015.
[17] Steven C. Dudash, “The Department of Defense and the Power of Cloud Computing, History of Department of Defense Cloud Computing, Weighing Acceptable Cost versus Acceptable Risk”, Air University Press, pp.13-14, 2016.
Citation
Deeraj Kumar Mutyala, "Exploring Cloud Computing Advancement and Future Technology Direction Impacts," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.35-41, 2024.
Optimization of Variational Autoencoder Model for Mobile Computing Environment Using Amortized Stochastic Variational Inference and Miniaturization Techniques
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.42-53, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.4253
Abstract
Variational Autoencoders (VAEs) are powerful machine learning models that can be deployed on mobile devices. However, VAEs are often deployed on resource-constrained mobile platforms, resulting in a high computational overhead. In this study, we present a novel framework, called the Miniaturizing Variations Auto Encoder (mVAE), to overcome the computational constraints associated with VAE deployment on mobile platforms. By leveraging advanced miniaturization techniques and integrating Amortized Stochastic Variational Inference (ASVI), this framework unlocks the full potential of VAE models in the mobile realm. Through extensive experiments and performance analysis, we aim to demonstrate the feasibility and efficiency of the m VAE framework in enabling the deployment of sophisticated machine learning applications on mobile systems. The findings of this study not only contribute to the advancement of mobile computing but also pave the way for a wide range of practical applications, empowering mobile users with powerful AI capabilities. Overall, this research contributes not only to theoretical foundations but also provides practical insights into implementation, addressing the need for efficient machine learning systems in mobile computing environments.
Key-Words / Index Term
AI, Autoencoder, Amortized, Variational Inference, VAE, ASVI
References
[1] Z. Chang et al., "A survey of recent advances in edge-computing-powered artificial intelligence of things," IEEE Internet of Things Journal, Vol.8, Issue.18, pp.13849-13875, 2021.
[2] S. N. Ajani et al., "Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing," International Journal of Intelligent Systems and Applications in Engineering, Vol.12, Issue.7, pp.546-559, 2024.
[3] R. G. Wei et al., "Variations in variational autoencoders-a comparative evaluation," IEEE Access, Vol.8, pp.153651-153670, 2020.
[4] M. Agiwal et al., "Next generation 5G wireless networks: A comprehensive survey," IEEE, Vol.18, Issue.3, pp.1617-1655, 2016.
[5] D. P. Kingma and M. Welling, "An introduction to variational autoencoders," Foundations and Trends® in Machine Learning, Vol.12, Issue.4, pp.307-392, 2019.
[6] G. Roeder et al., "Efficient amortised Bayesian inference for hierarchical and nonlinear dynamical systems," In International Conference on Machine Learning, PMLR, pp.4445-4455, 2019
[7] J. Paul et al., "Resource-aware programming for robotic vision," arXiv preprint arXiv:1405.2908, 2014.
[8] A. Frickenstein et al., "Resource-aware optimization of dnns for embedded applications," In 2019 16th Conference on Computer and Robot Vision (CRV), IEEE, pp.17-24, 2019.
Citation
D.S. Ene, V.I.E. Anireh, D. Matthias, E.O. Bennett, "Optimization of Variational Autoencoder Model for Mobile Computing Environment Using Amortized Stochastic Variational Inference and Miniaturization Techniques," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.42-53, 2024.
A Scientific Review of Feature Selection Algorithms and Kernel Methods for SVM Classification Models
Review Paper | Journal Paper
Vol.12 , Issue.5 , pp.54-58, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.5458
Abstract
Feature selection is crucial for improving the efficiency and effectiveness of machine learning models by identifying and choosing the most pertinent subset of features from the original dataset. This review article comprehensively surveys a diverse range of feature selection techniques in the context of Support Vector Machine (SVM) classification model in machine learning. This research work delves into several prominent techniques, including Mutual Information, Chi-Square, Sequential Feature Selection (SFS), Recursive Feature Elimination (RFE), LASSO, and Random Forest. The study reveals that RFE (Recursive Feature Elimination) emerges as the highly effective feature selection technique, demonstrating superior performance metrics compared to the other methods considered. Additionally, the study proposes the integration of hybrid algorithms to further enhance the performance of SVM classification models. Furthermore, this review extends its scope to encompass an evaluation of various kernel methods within the SVM classification paradigm, offering a comprehensive perspective on their efficacy and performance.
Key-Words / Index Term
Feature Selection Technique, Chi-Square, RFE (Recursive Feature Elimination), SVM (Support Vector Machine), Kernel methods
References
[1] Hamed Mazreati, Reza Radfar, Mohammad-Reza Sohrabi, Babak Sabet Divshali, Mohammad Ali Afshar Kazemi, “Comparing the Performance of Feature Selection Methods for Predicting Gastric Cancer”, International Journal of Cancer Management, Vol.16, Issue 1, 2023.
[2] Mei-Ling Huang, Yung-Hsiang Hung, W. M. Lee, R. K. Li and Bo-Ru Jiang, “SVM-RFE Based Feature Selection and Taguchi Parameters Optimization for Multiclass SVM Classifier”, The Scientific World Journal, Hindawi, 2014.
[3] Prasannavenkatesan Theerthagiri & Sahana Devarayapattana Siddalingaiah, “Recursive Gaussian support vector machine based feature selection algorithm for liver disease classification”, Multimedia Tools and Applications, Springer Link, 2023.
[4] Javier Alcaraz, Martine Labbé and Mercedes Landete, “Support Vector Machine with feature selection: A multiobjective approach”, Elsevier, Vol.204, 2022.
[5] J. Vijayashree & H. Parveen Sultana, “A Machine Learning Framework for Feature Selection in Heart Disease Classification Using Improved Particle Swarm Optimization with Support Vector Machine Classifier”, Journal of Russian Law, 2019.
[6] Chandra Babu Gokulnath, S.P. Shantharajah, “An optimized feature selection based on genetic approach and support vector machine for heart disease”, Springer link, Vol.22, pp.14777-14787, 2018.
[7] M. Sahaya Sheelal, C. A. Arun, “Hybrid PSO–SVM algorithm for Covid-19 screening and quantification”, International Journal of Information Technology”, Springer Link, Vol.14, pp.2049-2056, 2022.
[8] Shaoze Cui, Dujuan Wang, Yanzhang Wang, Pay-Wen Yu, Yaochu Jin, “An improved support vector machine-based diabetic readmission prediction”, Elsevier, Vol.166, pp.123-135, 2018.
[9] Vamsidhar Enireddy, Mathe John Kenny Kumar, Babitha Donepudi and C Karthikeyan, “Detection of COVID-19 using Hybrid ResNet and SVM”, IOP Science, 2020.
[10] Warda M. Shaban, Asmaa hamdy Rabie, Ahmed Ibrahim Saleh, Mohy Eldin A. Abo-Elsoud, “A new COVID-19 Patients Detection Strategy (CPDS) based on hybrid feature selection and enhanced KNN classifier”, Knowledge Based Systems, Research Gate, 2020.
[11] Behnood Gholami, saiah Norton, Allen R. Tannenbaum, and Nathalie Y. R. Agar, “Recursive Feature Elimination for Brain Tumor Classification using Desorption Electrospray Ionization Mass Spectrometry Imaging”, PubMed, National Library of Medicine, 2012.
[12] Viktor Wottschela, Declan T. Chard , Christian Enzingerd , Massimo Filippie, “SVM recursive feature elimination analyses of structural brain MRI predicts near-term relapses in patients with clinically isolated syndromes suggestive of multiple sclerosis”, Multicenter Study, PubMed, 2019.
[13] Irfan Ullah Khattak, Aihab Khan, Farhan Hassan Khan, Abdullah Gani, Muhammad Shiraz, “A Novel Feature Selection Method for Classification of Medical Data using Filters, Wrappers and Embedded Approaches”, Hindawi, Vol.2022, 2022.
[14] Hector Sanz , Clarissa Valim, Esteban Vegas , Josep M. Oller and Ferran Reverter, “SVM-RFE: selection and visualization of the most relevant features through non-linear kernels”, BMC Bioinformatics, Nov. 2018.
[15] Huda M. Alshanbari, Tahir Mehmood, Waqas Sami, Wael Alturaiki, Mauawia A. Hamza and Bandar Alosaimi, “Prediction and Classification of COVID-19 Admissions to Intensive Care Units (ICU) Using Weighted Radial Kernel SVM Coupled with Recursive Feature Elimination (RFE)”, PubMed, National Library of Medicine, 2022.
[16] Arti Patle; Deepak Singh Chouhan, “SVM kernel functions for classification”, 2013 International Conference on Advances in Technology and Engineering (ICATE), IEEE, 2013.
[17] Asa Ben-Hur, Cheng Soon Ong, Sören Sonnenburg, Bernhard Schölkopf, Gunnar Rätsch, “Support Vector Machines and Kernels for Computational Biology”, PubMed, National Library of Medicine, 2008,
[18] Wenbo Liu, Shengnan Liang, Xiwen Qin, “Weighted p-norm distance t kernel SVM classification algorithm based on improved polarization”, Scientific Reports, 2022.
[19] Jiawei Yanga, Zeping Wua,KePenga, Patrick N. Okolob,c, Weihua Zhanga,Hailong Zhaoaand Jingbo Sun, “Parameter selection of Gaussian kernel SVM based on local density of training set”, Inverse Problem in Science and Engineering, Taylor & Francis”, Vol.29, No.4, pp.536-548, 2021.
[20] C. Dharmadevi and S. Thaddeus, “Prediction of COVID-19 Infections using Classification Algorithms in Machine Learning”, Indian Journal of Natural Sciences, Vol.24, pp.61005-61011, 2023.
Citation
C. Dharmadevi, S. Thaddeus, "A Scientific Review of Feature Selection Algorithms and Kernel Methods for SVM Classification Models," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.54-58, 2024.
Enhancing Interpretable Anomaly Detection: Depth-based Extended Isolation Forest Feature Importance (DEIFFI)
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.59-67, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.5967
Abstract
The research introduces a novel approach, Depth-based Extended Isolation Forest Feature Importance (DEIFFI), to enhance the interpretability of Extended Isolation Forest (EIF) algorithm in anomaly detection (AD). Anomaly detection is critical for identifying rare and significant deviations from norm in data. However, understanding the reasons behind classifying instances as anomalies poses a challenge. DEIFFI addresses this challenge by providing valuable insights, empowering users of EIF-based AD to conduct thorough root cause analysis. A noteworthy feature of DEIFFI is its capacity to improve interpretability without imposing heavy computational burdens. This is crucial for real world applications requiring efficient AD, particularly in situations demanding real-time decision-making. DEIFFI achieves remarkable results with low computational costs, making it an appealing option for practical implementations. With an accuracy of 0.914 and 0.942, precision of 0.607 and 0.64, recall of 0.773 and 0.96, and an F1 score of 0.68 and 0.768 on real and synthetic datasets, respectively. DEIFFI provides interpretable insights alongside competitive performance metrics, solidifying its suitability for real-time decision support. Importantly, DEIFFI contributes to AD by enhancing interpretability and assisting in unsupervised feature selection. This dual capability highlights practical utility of DEIFFI, improving EIF’s capabilities and extending its applicability across diverse AD scenarios.
Key-Words / Index Term
Anomaly Detection, Explainable Artificial Intelligence, Extended Isolation Forest, Feature Selection, Interpretability, Outlier Detection
References
[1] Andrew Bell, Ian Solano-Kamaiko, Oded Nov, and Julia Stoyanovich. It’s just not that simple: an empirical study of the accuracy-explainability trade-off in machine learning for public policy. In Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency, pp.248–266, 2022.
[2] G´erard Biau and Erwan Scornet. A random forest guided tour. Test, 25, pp.197–227, 2016.
[3] Mattia Carletti, Matteo Terzi, and Gian Antonio Susto. Interpretable anomaly detection with diffi: Depth-based feature importance of isolation forest. Engineering Applications of Artificial Intelligence, 119:105730, 2023.
[4] Chengjie Chen, Hao Chen, Yi Zhang, Hannah R Thomas, Margaret H Frank, Yehua He, and Rui Xia. Tbtools: an integrative toolkit developed for interactive analyses of big biological data. Molecular plant, Vol.13, Issue.8, pp.1194–1202, 2020.
[5] Zhiguo Ding and Minrui Fei. An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window. IFAC Proceedings Vol.46, Issue.20, pp.12–17, 2013.
[6] Finale Doshi-Velez and Been Kim. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608, 2017.
[7] Timo Freiesleben, Gunnar K¨onig, Christoph Molnar, and Alvaro Tejero-Cantero. Scientific inference with interpretable machine learning: Analyzing models to learn about real-world phenomena. arXiv preprint arXiv:2206.05487, 2022.
[8] David Gunning and David Aha. Darpa‘s explainable artificial intelligence (xai) program. AI magazine, Vol.40, Issue.2, pp.44–58, 2019.
[9] Sahand Hariri, Matias Carrasco Kind, and Robert J. Brunner. Extended isolation forest. IEEE Transactions on Knowledge and Data Engineering, Vol.33, Issue.4, pp.1479–1489, 2021.
[10] Abderrahim BENI Hssane and Moulay Lahcen. Improved and balanced leach for heterogeneous wireless sensor networks. IJCSE International Journal on Computer Science and Engineering, Vol.2, Issue.8, pp.2633–2640, 2010.
[11] Vladislav Ishimtsev, Alexander Bernstein, Evgeny Burnaev, and Ivan Nazarov. Conformal k-nn anomaly detector for univariate data streams. In Conformal and Probabilistic Prediction and Applications, pages 213–227. PMLR, 2017.
[12] Pawe-l Karczmarek, Adam Kiersztyn, Witold Pedrycz, and Ebru Al. K-means-based isolation forest. Knowledge-based systems, 195:105659, 2020.
[13] Edwin M Knorr, Raymond T Ng, and Vladimir Tucakov. Distance-based outliers: algorithms and applications. The VLDB Journal, Vol.8, Issue.3, pp.237–253, 2000.
[14] Hans-Peter Kriegel, Matthias Schubert, and Arthur Zimek. Angle-based outlier detection in high-dimensional data. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.444– 452, 2008.
[15] Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. Isolation forest. In 2008 eighth ieee international conference on data mining, pp.413–422, 2008.
[16] Lorenzo Meneghetti, Matteo Terzi, Simone Del Favero, Gian Antonio Susto, and Claudio Cobelli. Data-driven anomaly recognition for unsupervised model-free fault detection in artificial pancreas. IEEE Transactions on Control Systems Technology, Vol.28, Issue.1, pp.33–47, 2020.
[17] Hla Yin Min and Win Zaw. Performance evaluation of energy efficient cluster-based routing protocol in wireless sensor networks. International Journal of Computer Science Engineering IJCSE, Vol.3, Issue.2, pp.71–76, 2014.
[18] KM Archana Patel and Prateek Thakral. The best clustering algorithms in data mining. In 2016 International Conference on Communication and Signal Processing (ICCSP), pp.2042–2046, 2016.
[19] Andrew Pavlo, Gustavo Angulo, Joy Arulraj, Haibin Lin, Jiexi Lin, Lin Ma, Prashanth Menon, Todd C Mowry, Matthew Perron, Ian Quah, et al. Self-driving database management systems. In CIDR, Vol.4, pp.1, 2017.
[20] Luca Puggini and Se‘n McLoone. An enhanced variable selection and isolation forest-based methodology for anomaly detection with oes data. Engineering Applications of Artificial Intelligence, 67: pp.126–135, 2018.
[21] Guillaume Staerman, Pavlo Mozharovskyi, Stephan Cl´emen¸con, and Florence d‘Alch´e Buc. Functional isolation forest. In Asian Conference on Machine Learning, pp.332–347. 2019.
[22] Simon Tong and Daphne Koller. Support vector machine active learning with applications to text classification. Journal of machine learning research, 2(Nov), pp.45–66, 2001.
[23] Ke Wu, Kun Zhang, Wei Fan, Andrea Edwards, and S Yu Philip. Rs-forest: A rapid density estimator for streaming anomaly detection. In 2014 IEEE international conference on data mining, pp.600–609, 2014.
[24] Junbo Zhang, Yu Zheng, Dekang Qi, Ruiyuan Li, and Xiuwen Yi. Dnn-based prediction model for spatio-temporal data. In Proceedings of the 24th ACM SIGSPATIAL international conference on advances in geographic information systems, pp.1–4, 2016.
Citation
Rahul Singh , Deepti Gupta, "Enhancing Interpretable Anomaly Detection: Depth-based Extended Isolation Forest Feature Importance (DEIFFI)," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.59-67, 2024.
P2P Loan Management System Using Blockchain in 6G Network System
Research Paper | Journal Paper
Vol.12 , Issue.5 , pp.68-73, May-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i5.6873
Abstract
Decentralized, secure platform that aids in managing loan operations is the loan management system that uses blockchain technology. Through the use of blockchain`s distributed ledger technology, security, immutability, and transparency are guaranteed. The loan lifecycle may be managed with this system in an open and effective manner, from the point of loan application to loan payback. Every stage of the loan application process is documented on the blockchain, resulting in an irreversible and permanent record of all transactions. The loan management system automates a number of loan-related tasks, including loan application, credit evaluation, approval, and disbursal, by using smart contracts. This guarantees more accuracy and transparency, gets rid of the need for middlemen, and shortens processing times.
Key-Words / Index Term
Loan origination, Transparency, Security, Blockchain
References
[1] Adam Hahn and Rajveer Singh, “Smart contract-based campus demonstration of decentralized transactive energy auctions,” 17, 2018.
[2] Hiroki Watanabe and Jay Kishigami, “Blockchain Contract: Securing a block chain applied to Smart contracts,” 20,2018.
[3] Jiin– Chiou Cheng and Narn – Yih Lee, “Blockchain and Smart Contract for Digital certificate”, 21,2017.
[4] Maxim Ya. Afanasev and Yuri V. Fedosov, “An application of block chain and smart contracts for machine-to-machine communication”, May21,2017.
[5] S. Hema Kumar, J. Uday Kiran, V. D. A Kumar, G. Saranya, Ramalakshmi V, “Effective Online Medical Appointment System. International Journal of Scientific & Technology Research,” Vol 8, Issue 09, September 2019.
[6] Heffernan, Sh: “Modern Banking”, 2005.
[7] Arunkumar, R., Kotreshwar, G: “Risk Management in Commercial Banks”, December.2005.
[8] Matthews, K. and Thompson, J: "The Economics of Banking", 2005.
[9] Mckinley J., E., & Barrickman, J.R: "Strategic Credit Risk Management," Robert Morris Association, Philadelphia, 1994.
[10] Osayameh, R., “Banking practice: Lending and Finance,” Vol. 2, Lagos: F.A. Publishers, (1996).
[11] Ciuriak, D: "Applying the Best Banking Standards and Standards. - Lessons from the Past," March 2001, (revised February 2010).
[12] Saunders A, and Walter, I: “Financial Architecture Systemic Risk and Universal Banking,”Stern School of Business, New York University, New York, 2011.
Citation
P.S. Gayke, Pawan Gajanan Badak, Dipak Namdev Pund, Rushikesh Dattatray Jawale, Mayur Bhausaheb Kotkar, Sarthak Shantilal Gaware, "P2P Loan Management System Using Blockchain in 6G Network System," International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.68-73, 2024.