Examination on Various Mining Techniques used in Healthcare Field for the Best Decision Making
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.98-101, Jan-2019
Abstract
One among the quickest developing fields is health care industry. The medical industry contains vast measure of medical data which would not be "mined". The mined data helps in finding the shrouded data. Broad measure of data in medical database require the advancement of devices which are utilized to get to the data, examine the data, learning disclosure, and effective utilization of the put away information and data. The medical industry have huge measure of data gathered about the patient including the subtleties, determination and prescriptions. Transforming these data into valuable example helps in foreseeing with the new medications and medicines. This aides in the better analysis and therapy where the patients can achieve the great QoS (Nature of Administration). This paper includes the diverse data mining and warehousing procedures utilized in healthcare field for the best basic leadership.
Key-Words / Index Term
Medical Industry, Health Care, Warehousing
References
[1] Anshari M, and Nabil M.A., “Evaluating CRMImplementation in Healthcare Organization”, 2011International Conference on Economics and Business Information, IPEDR vol.9 IACSIT Press,Bangkok, Thailand. 2011.
[2] Askool, S. S., and Nakata, K., “Scoping Study toIdentify Factors Influencing the Acceptance of SocialCRM”, Proceedings of the 2010 IEEE ICMIT P. 1055-1060, 2010.
[3] Ball MJ, Peterson H, Douglas JV. “The computerizedpatient record: a global view”. MD Comput 1999; 16: 40-6.
[4] Ball, M.J., and Lillis, J,“E-health: transforming thephysician/patient relationship”, Int. J. Med. Inform, 2001.
[5] Bourke M.K, “Strategy and Architecture of Health CareInformation Systems”, Springer-Verlag New York, 1994.
[6] Brennan PF,“Characterizing the use of health careservices delivered via computer networks”. Journal of theAmerican Medical Informatics Association 2:160–168.
[7] Cheng, P.H., Chen, S.J., Lai, J.S., & Lai, F., “Acollaborative knowledge management process forimplementing healthcare enterprise information systems”, IEICE Transactions on Information and Systems, E91-D(6), 1664-1672, 2008.
[8] Cheung, K.H., & Stephens, S,“Semantic Web forhealth care and life sciences: A review of the state of theart. Briefings in Bioinformatics”, 10(2), 111-113 2008.
[9] Conrick, M. “Health informatics: Transforminghealthcare with technology. Thomson Social SciencePress.Management Work”, Kogan Page Limited, Milford, Ct, USA, 2009.
[10] Peppard, J., “Customer Relationship Management (CRM) in Financial Services”, European Management Journal, Vol. 18, No. 3, pp. 312–327, 2008.
Citation
J. Lavanya, "Examination on Various Mining Techniques used in Healthcare Field for the Best Decision Making", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.98-101, 2019.
Web Acceptance Mining Based Web Advocacy Systems-A Review
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.102-106, Jan-2019
Abstract
Data mining for Web intelligence leads to formulate the Web a richer, friendlier, and more intelligent resource for users sharing and exploring. Web acceptance mining has become the accountable of all-embracing research, as its abeyant for Web-based alone services, anticipation of user abreast approaching intentions, adaptive Web sites, and chump profiling are recognized. In recent times, an array of advocacy systems to adumbrate user approaching movements through Web acceptance mining accept been proposed. Nevertheless, the superior of recommendations in the accepted systems to adumbrate user approaching requests in an accurate website is beneath satisfaction. Diverse efforts accept been fabricated to abode the botheration of advice afflict on the Internet. Web advocacy systems based on web acceptance mining try to abundance users behavior patterns from web admission logs, and acclaim pages to the online user by analogous the user’s browsing behavior with the mined actual behavior patterns.
Key-Words / Index Term
Web Acceptance Mining, Web advocacy, Web Log, Web Personalization
References
[1] Agrawal R, Imielinski T, Swami A., “Mining association rules between sets of items in large databases”, Proceeding of ACM SIGMOD Interation Confidence. Management of Data, Washington, pp 207- 216, 1993.
[2] Akiz Uddin Ahmed, Chowdhury Farhan Ahmed, Md. Samiullah, Nahim Adnan, Carson Kai-Sang Leung, “Mining interesting patterns from uncertain databases” ,Information Sciences, Elsevier journals,Vol.354, pp 60-85, 2016.
[3] Anitha.A, “A New Web Usage Mining Approach for Next Page Access Prediction”, International Journal of Computer Applications VOL. 8, No.11, pp.7-10, 2014.
[4] Anitha.A. and N.Krishnan, “A Web Usage Mining based Recommendation Model for Learning Management Systems”, IEEE International Conference on Computational Intelligence and Computing Research, 2016.
[5] Ben Ishay, Roni, “A Novel Algorithm for the Integration of the Imputation of Missing Values and Clustering,Machine Learning and Data Mining in Pattern Recognition” , Springer,Vol. 9729/2016, pp 115-129, 2016.
[6] Chimphlee.S., N.Salim, M. S. B.Ngadiman, W.chimphlee, and S. srinoy, “Rough Sets Clustering and Markov Model for Web Access Prediction”, Proceedings of post graduate annual seminar, pp. 470-474, 2015.
[7] Cooley.R., J.Srivastava, and B. Mobasher,“Webmining: Information and pattern discovery on theworld wide web”, IEEE InternationalConferenceon Tools with Artificial Intelligence, 2011.
[8] Dhyani.D., S. S. Bhowmick, and W. K. Ng, “Modelling and predicting web page accesses using Markov Processes”, IEEE, Computer Society, 2013.
[9] Diamanto Oikonomopoulou, Maria Rigou, Spiros Sirmakessis, Athanasios Tsakalidis,, “Full-Coverage Web Prediction based on Web Usage Mining and Site Topology”. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, 2009.
[10] Géry.M. and H. Haddad, “Evaluation of Web Usage Mining Approaches for User’s Next Request Prediction”, ACM international workshop on Web information and data management, New York, NY, USA, pp.74-81, 2013.
[11] GuibingGuo, China, JieZhang, NeilYorke-Smith, “A Novel Recommendation Model Regularized with User Trust and Item Ratings”, IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 7, pp1607 – 1620, 2016.
[12] GuochenCai, Kyungmi Lee, Ickjai Lee, "Mining Semantic Sequential Patterns from Geo-Tagged Photos", Hawaii International Conference on System Sciences, pp.2187-2196, 2016.
[13] HeungmoRyang, UnilYun, “High utility pattern mining over data streams with sliding window technique,Expert Systems with Applications”, Elsevier journals, Vol. 57, pp 214-231, 2016.
[14] Jalali.M., N. Mustapha, Md. N.Sulaiman and A.Mamat, “WebPUM: A Web based recommendation system to predict user future movements”, Expert Systems with Applications, vol. 37, No.10, pp. 6201–6212 , 2014.
[15] Khalil.F., J. Li, and H. Wang, “A framework of combining Markov model with association rules for predicting web page accesses”, Australasian Data Mining Conference , vol. 61, pp 177–184, 2016.
[16] Maratea.A. and A.Petrosino, “An Heuristic Approach to Page Recommendation in Web Usage Mining”, Ninth International Conference on Intelligent Systems Design and Applications, pp. 1043-1048, 2016.
[17] Nigam.B. and S. Jain, “Generating a New Model for Predicting the Next Accessed Web Page in Web Usage Mining”, Third International Conference on Emerging Trends in Engineering and Technology, India, Goa, pp.485-490, 2010.
[18] Quanshi Zhang, Xuan Song, Xiaowei Shao, Huijing Zhao, RyosukeShibasaki, "Object Discovery: Soft Attributed Graph Mining", IEEE Transactions on Pattern Analysis & Machine Intelligence, vol.38, no. 3, pp. 532-545, 2016.
[19] Rao.V.V.R.M. and V. V.Kumari, “An Efficient Hybrid Successive Markov Model for Predicting Web User Usage Behavior using Web Usage Mining”, International Journal of Data Engineering, vol.1, No. 5, pp.43-62, 2013.
[20] Salah, Saber, “Optimizing the Data-Process Relationship for Fast Mining of Frequent Itemsets in MapReduce,Machine Learning and Data Mining in Pattern Recognition”, Springer,Vol. 9729/2016, pp 217-231, 2016.
[21] Shoichi Nakamura, Kaname Nozaki, Hiroki Nakayama, Yasuhiko Morimoto, YouzouMiyadera, "Sequential Pattern Mining System for Analysis of Programming Learning History", IEEE International Conference on Data Science and Data Intensive Systems, pp. 69-74, 2015.
[22] Sutheera Puntheeranurak , Hidekazu Tsuji, “Mining Web logs for a Personalized Recommender System”, IEEE Third International Conference on Information Technology: Research and Education, Taiwan, 2005.
[23] Tak Woon Yan , Matthew Jacobsen , Hector Garcia-Molina , Umeshwar Dayal, “From user access patterns to dynamic hypertext linking”, Fifth international World Wide Web conference on Computer networks and ISDN systems, Paris, France, pp.1007-1014, 1996.
[24] Turki, “A Learning Framework to Improve Unsupervised Gene Network Inference,Machine Learning and Data Mining in Pattern Recognition”, Springer,Vol. 9729/2016, pp 28-42, 2016.
[25] Unil Yun, GanginLee, “Incremental mining of weighted maximal frequent itemsets from dynamic databases,Expert Systems with Applications”, Elsevier journals,Vol.54, pp304-327, 2016.
Citation
P. Manivel, "Web Acceptance Mining Based Web Advocacy Systems-A Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.102-106, 2019.
A Study of Fuzzy Minimum Spanning Trees Using Prufer Sequences
Survey Paper | Journal Paper
Vol.07 , Issue.02 , pp.107-110, Jan-2019
Abstract
The fuzzy minimum spanning tree (FMST) problem, where the arc costs have fuzzy values, is one of the most studied problems in fuzzy sets and systems area. In this paper, we concentrate on an FMST problem on aPrufer sequence in which instead of a real number, is assigned to each arc length. The fuzzy Prufer sequences are able to represent the uncertainty in the arc costs of the fuzzy minimum spanning tree. Two key matters need to be addressed in FMST problem with fuzzy numbers. The other is how to determine the addition of edges to find out the cost of the FMST. The definite integration representation of fuzzy numbers is used here to solve these problems. A famous sequence to solve the minimum spanning tree problem is Prufer sequences, where uncertainty is not considered, i.e., specific values of arc lengths are provided. A fuzzy version of classical Prufer sequences is introduced in this paper to solve the FMST problem in the fuzzy environment. We use the concept of definite integration representation of the fuzzy numbers in the proposed algorithm.
Key-Words / Index Term
Fuzzy Minimum spanning tree problem, fuzzy number, Prufer sequences
References
[1]. Abrosimov D I, Zelenogorsky V, Kryukov M. (1999). Computer Simulation of Water Surface View (in Russian), International Conference on Computer Graphics and Machine Vision.
[2]. Abrosimov, D. I., Zelenogorsky, V., Kryukov, M. (1999). Computer Simulation of Water Surface View (in Russian), International Conference on Computer Graphics and Machine Vision. 1999.
[3]. Alexei, M., Kirill, S., Maxim, C. (2010). Computer-Based Training System for Russian Word Pronunciation, Computer Assisted Language Learning, 2002(2): 201-214.
[4]. Bulatov, A. A., Shur, A. M. (2013). Computer science – theory and applications. 8th international computer science symposium in Russia, CSR 2013, Ekaterinburg, Russia, June 25–29, 2013. Proceedings, 2014.
[5]. Cary, C. D. A. (1977). Technique of Computer Content Analysis of Transliterated Russian Language Textual Materials: A Research Note, American Political Science Review, 71(1): 245-251.
[6]. Chlopak, O. (2003). Computers in Russian schools: current conditions, main problems, and prospects for the future, Computers & Education, 40(1): 41-55.
[7]. Diekert V, Volkov M V, Voronkov A. (2007). Computer Science - Theory and Applications, Second International Symposium on Computer Science in Russia, CSR 2007, Ekaterinburg, Russia, September 3-7, 2007, Proceedings, Springer, 2007.
[8]. Dietze J. (1987). Old Russian Texts and Computer-Controlled Lexicography, 1987.
[9]. Edwards E M, Cheng D M, Levenson S, et al. (2008). Behavioral Assessments in Russian Addiction Treatment Inpatients: A Comparison of Audio Computer-Assisted Self- Interviewing and Interviewer-Administered Questionnaires, Hiv Clinical Trials, 4, 247-53.
[10]. Frid, A., Morozov, A., Rybalchenko, A. (2009). Proceedings of the Fourth International Computer Science Symposium in Russia on Computer Science - Theory and Applications, International Computer Science Symposium in Russia on Computer Science - Theory and Applications. Springer-Verlag, 2009.
[11]. Ganelina N D, Grif M G, Korolkova O О. (2013). Linguistic Aspects of the Development, of Computer Sign Language Interpreters, Russian Language, Sovremennye Issled ovaniâSocial′nyh Problem, 2013(7).
[12]. Gnitetskaya T N, Gnitetskiy P V. (2013). Comparison of Russian, American and Japanese Students’ Computer Skills, Procedia - Social and Behavioral Sciences, 89: 148-153.
[13]. Grozin A. (2011). Quantum computer for dummies (in Russian), Physics, 2011.
[14]. Grudin, J., Maclean, A., Overmyer, S. (1993). Report on the 1992 East-West international conference on human computer interaction: St. Petersburg, Russia, August 4–8, AcmSigchi Bulletin, 25(2):36-39.
[15]. Gulenkin, V. M., Korennoy, F. I., Karaulov, A. K. (2011). Cartographical analysis of African swine fever outbreaks in the territory of the Russian Federation and computer modelling of the basic reproduction ratio, Preventive Veterinary Medicine, 102(3): 167-174.
Citation
M.Vijaya, B. Mohanapriyaa, "A Study of Fuzzy Minimum Spanning Trees Using Prufer Sequences", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.107-110, 2019.
Frequent Mining Techniques In Bigdata : Study
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.111-116, Jan-2019
Abstract
Big data is a collection of large amount of data with various types of data and usable to be processed at much higher frequency. Frequent Itemset Mining is one of the classical data mining problems in most of the data mining applications in big data era. In data mining, association rule mining is key technique for discovering useful patterns from large collection of data. Frequent itemset mining is a famous step of association rule mining. Many efficient pattern mining algorithms have been discovered in the last two decades, yet most do not hold good for Big Dataset. In association rule mining (ARM) a Frequent Itemset Mining (FIM) is a well-known step. In last two decades, many efficient pattern mining algorithms have been discovered, up till now most do not hold good for Big Dataset. The Apriori, FP-growth and Eclat algorithms are the most famous algorithms which can be used for Frequent Pattern mining. However, these parallel mining algorithms lack features like automated parallelization, fine load balancing, and distribution of data on large clusters. To overcome these problems various parallelized approaches using Hadoop MapReduce model are developed to perform frequent itemsets mining from big data. This paper gives overall study about frequent pattern mining in big data.
Key-Words / Index Term
Big data, Pattern Mining, Frequent Itemset Mining, Data Mining, ItemSets
References
[1]. K. Mehmed. Data Mining: Concepts, Models, Methods, and Algorithms. John Wiley & Sons., 2003.
[2]. J. Han and M. Kamber. Data Mining: Concpets and Techniques. Academic Press, 2nd edition edition, 2006.
[3]. J. Vreeken. Making Pattern Mining Useful. PhD thesis, the Dutch Research School for Information and Knowledge Systems, Netherlands, 2009.
[4]. F. Hadzic, H. Tan, and T.S. Dillon. Mining of Data with Complex Structures, volume 333. Springer, 2010.
[5]. J. Han, H. Cheng, D. Xin, and X. Yan. Frequent pattern mining: Current status and future direction. Data Mining and Knowledge Discovery, 15:55–86, 2007.
[6]. I.H. Witten, E. Frank, and A.M. Hall. Data Mining: Practical Machine Learning Tools and Techniques. Elsevier, 3rd edition edition, 2011. [7] R. Kosala and H. Blockeel. Web mining research: A survey. SIGKDD Explorations, 2(1):1–15, 2000.
[7]. F. Medici, M.I. Hawa, A. Giorgini, A. Panelo, C.M. Solfelix, R.D.G. Leslie, and P. Pozzilli. Antibodies to GAD65 and a tyrosine phosphatase-like molecule IA-2ic in Filipino Type I diabetic patients. Diabetes Care, 22(9):1458–1461, 1999.
[8]. W. Shi, F.K. Ngok, and D.R. Zusman. Cell density regulates cellular reversal frequency in Myxococcus xanthus. In Proceedings of the National Academy of Sciences of the United States of America, volume 93(9), pages 4142–4146, 1996.
[9]. R. Agrawal, T. Imieinski, and A. Swami. Mining association rules between sets of items in large databases. In P. Buneman and S. Jajodia, editors, Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 207–216, Washington DC, 1993. ACM Press.
[10]. A. Jim´enez, F. Berzal, and J. Cubero. Frequent tree pattern mining: A survey. Intelligent Data Analysis, 14:603–622, 2002.
[11]. M.J. Zaki. Efficiently mining frequent trees in a forest: Algorithms and applications. IEEE Transactions on Knowledge and Data Engineering, 17(8):1021– 1035, 2005.
[12]. X. Yan and J. Han. gSpan: Graph-based substructure pattern mining. In Proceedings of 2002 International Conference on Data Mining (ICDM’02), pages 721–724, Maebashi, Japan, December 2002.
[13]. Y. Chi, R.R. Muntz, S. Nijssen, and J.N. Kok. Frequent subtree mining – an overview. Special Issue on Graph and Tree Mining, 66(1-2):161–198, 2005.
[14]. P. Cserk´uti, T. Levendovszky, and H. Charaf. Survey on subtree matching. In Proceedings of the International Conference on Intelligent Engineering Systems (INES 200), pages 216–221, London, September 2006.
[15]. R. Shamir and D. Tsur. Faster subtree isomorphism. Journal of Algorithms, 33:267–280, 1999.
[16]. A. Gupta and N. Nishimura. The complexity of subgraph isomorphism: Duality results for graphs of bournded path- and tree-width. Technical report, University of Waterloo, April 1995.
[17]. M.B. Miles and A.M. Huberman. Qualitative Data Analysis: An Expanded Sourcebook. SAGE Publications, Inc., 2nd edition edition, 1994.
[18]. A.N. Oppenheim. Questionnaire Design and Attitude Measurement. Pinter Publications, 1992.
[19]. B. Boukhatem, S. Kenai, A. Tagnit-Hamou, and M. Ghrici. Application of new information technology on concrete: An overivew. Journal of Civil Engineering and Management, 17(2):248–258, 2011.
[20]. D.L. Olson. Data mining in business services. Service Business, 1(3):181–193, 2007.
[21]. N.R.S. Raghavan. Data mining in e-commerce: A survey. Sadhana – Academy Proceedings in Engineering Sciences, 30(2-3):275–289, 2005.
[22]. C. Romero and S. Ventura. Educational data mining: A review of the state of the art. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 40(6):601–618, 2010.
[23]. R. Law, R. Leung, and D. Buhalis. Information technology applicaions in hospitality and tourism: A review of publications from 2005 to 2007. Journal of Travel and Tourism Marketing, 26:599–23, 2009.
[24]. C.J. Date. An Introduction to Database Systems. Addison-Wesley, 6th edition edition, 1994.
[25]. R.B. Sher and R.J. Daverman. Handbook of Geometric Topology. Elsevier, North-Holland, 2002.
[26]. A. Ceglar and J.F. Roddick. Association mining. ACM Computing Survey, 38(2):5, 2006.
[27]. V.P. Magnini, E.D.Jr. Honeycutt, and S.K. Hodge. Data mining for hotel firms: Use and limitations. Cornell Hotel and Restaurant Administration Quarterly, 44(2):94–105, 2003.
[28]. G.G. Emel, C, . Takin, and ¨ O. Akat. Profiling a domestic tourism market by means of association rule mining. Anatolia, 18(2):334–342, 2007.
[29]. X. Wu, C. Zhang, and S. Zhang. Efficient mining of both positive and negative association rules. ACM Transactions on Information Systems, 22(3):381–405, 2004.
[30]. Y.-J. Tsay, T.-J. Hsu, and J.-R. Yu, “FIUT: A new method for mining frequent itemsets,” Inf. Sci., vol. 179, no. 11, pp. [20] 1724–1737, 2009.
Citation
Muthamiz Selvi, P. Srivaramangai, "Frequent Mining Techniques In Bigdata : Study", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.111-116, 2019.
Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.117-120, Jan-2019
Abstract
A set of resources and services offered over the Internet, is called cloud computing. These computing services are delivered from data centers located across the world. Cloud computing consumers benefited by providing virtual resources via internet such as Platform, Infrastructure and Software as a Service. The consequential challenge in cloud computing are the privacy and security issues caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data. It is available on Pay-Per-Use model. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control mechanism. The occurrence of these threats may result into spoil or illegal access of critical and private data of end user and business user. In this paper, we identify the most vulnerable security issues or attribute in cloud computing architecture, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud computing environment. We propose secure cloud architecture by using sequel homomorphic encryption scheme with diffie-hellman algorithm for organizations to strengthen the security mechanism.
Key-Words / Index Term
References
[1] Aditi Soral, “Achieving Fully Homomorphic Encryption in Security -A Survey”, SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) , Vol.3, Issue.2, pp. 2348 – 8387.
[1] Anjana Chaudhary, Ravinder Thakur, Manish Mann “Security In Cloud Computing By Using Sequel Homomorphic Encryption Scheme With Diffie-Hellman Algorithm”, International Journal of Advanced Computational Engineering and Networking, Vol.2, Issue.10, pp. 2320-2106.
[2] Umer Khalida,Abdul Ghafoor, Misbah Irum, Muhammad Awais Shibli “Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol”, ScienceDirect, Procedia Computer Scurity, pp 22(2103) 680 – 688
[3] Kashif Munir1, Dr. Sellapan Palaniappan, “Secure Cloud Architecture”, International Journal of Advanced Computing Vol.4, Issue.1.
[4] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy: An Enterprise perspective of Risks and Compliance, O`Reilly Media, Inc.,2009.
[5] L.Arockiam,S.Monikandan & G.Parthasarathy “Cloud Computing: A Survey” http://interscience.in/IJIC_Vol1Iss2/paper5.pdf
[6] Anitha Y “Security Issues in Cloud Computing - A Review” in International Journal of Thesis Projects and Dissertations (IJTPD) Vol. 1, Issue 1, PP: (1-6),Month: October-December 2013.
[7] R. Kalaichelvi Chandrahasan, S Shanmuga Priya and Dr. L. Arockiam “Research Challenges and Security Issues in Cloud Computing” in International Journal of Computational Intelligence and Information Security, March 2012 Vol. 3, No. 342
Citation
K Kuppuswamy, M.R. Nagarajan, "Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.117-120, 2019.
Analysis of Intrusion Detection System in Data mining
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.121-125, Jan-2019
Abstract
It ends up being logically basic to separate interferences with cloud precedents to guarantee our business from digital psychological warfare dangers. This paper presents information digging advances planned therefore; SmartSifter (special case area engine), ChangeFinder, AccessTracer. All of them can learn quantifiable instances of logs adaptively and to perceive interferences as verifiable characteristics concerning the insightful precedents. We rapidly graph the measures of these engines and demonstrate their applications to sort out intrusion distinguishing proof, worm revelation, and impostor acknowledgment.
Key-Words / Index Term
Data mining, Security, IDS
References
[1] W. Lee, S.J. Stolfo, K.W. Mok, “A data mining framework for building intrusion detection models”, in: Proceedings of IEEE Symposium on Security and Privacy, 1999, pp. 120–132.
[2] W. Feng, Q. Zhng, G. Hu, J Xiangji Huang,” Mining network data for intrusion detection through combining SVMs with ant colony networks ”Future Generation Computer Systems,2013.
[3] T. Zhang, R. Ramakrishnan, M. Livny, “BIRCH: an efficient data clustering method for very large databases”, in: Proceedings of SIGMOD, ACM, 1996, pp. 103–114.
[4] L. Khan, M. Awad, B. Thuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering”, The VLDB Journal 16(2007) 507–521
[5] X. Xu, “Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction”, Information Assurance and Security 4 (2006) 237–246.
[6] J.X. Huang, J. Miao, Ben He, “High performance query expansion using adaptive co –training”, Information Processing & Management 49 (2) (2013) 441–453.
[7] Y. Li u, X. Yu, J.X. Huang, A.” An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets”, Information Processing &Management 47 (4) (2011) 617–631.
[8] V. Vapnik, “The Nature of Statistical Learning Theory”, Springer, 1999.
[9] Marcelloni, combining “supervised and unsupervised learning for data clustering”, Neural Computing & Applications 15 (3–4) (2006)289–297.
[10] C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, W.-Y. Lin, “Intrusion detection by machine learning: a review”, Expert Systems with Applications 36 (2009) 11994–12000.
[11] S.X. Wu, W. Banzhaf, “The use of computational intelligence in intrusion detection systems: a review”, Applied Soft Computing 10 (2010) 1–35.
Citation
P. Mangaiyakarasi, "Analysis of Intrusion Detection System in Data mining", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.121-125, 2019.
A Novel Approach for Security in Cloud Environment
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.126-133, Jan-2019
Abstract
Cloud registering is one of the present most energizing advances, since it can lessen the expense and intricacy of uses, and it is adaptable and versatile. These advantages changed cloud registering from a marvelous thought into one of the quickest developing innovations today. As a matter of fact, virtualization technology is based on virtualization technology which is an old technology and has had security issues that must be tended to before cloud technology is influenced by them. What`s more, the virtualization technology has limit security abilities so as to anchor wide zone condition, for example, the cloud. Along these lines, the improvement of a powerful security framework requires changes in conventional virtualization engineering. This paper proposes new security design in a hypervisor-based virtualization technology so as to anchor the cloud condition.
Key-Words / Index Term
Cloud Computing, Threats, Attack
References
[1] Biggs and S. Vidalis, "Cloud Computing: The Impact on Digital Forensic Investigations," 2010, pp. 1-6.
[2] G. Brunette and R. Mogull, "Security guidance for critical areas of focus in cloud computing v3.0," Cloud Security Alliance, 2011.
[3] Dhage, et al., "Intrusion detection system in cloud computing environment," presented at the Proceedings of the International Conference Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, 2011.
[4] M. B. Salem, et al., "A survey of insider attack detection research," Insider Attack and Cyber Security, pp. 69-90, 2008.
[5] J. Sheridan and C. Cooper, "Whitepaper: Defending the Cloud," 2012.
[6] L. M. Kaufman. Can Public-Cloud Security Meet Its Unique Challenges?, vol. 8, no. 4. IEEE Computer Society, 2010, pp. 55-57.
[7] D. L. Oppenheimer and M. R. Martonosi, "Performance signatures: A mechanism for intrusion detection," in Proceedings of the 1997 IEEE Information Survivability Workshop, 1997.
[8] A. Avritzer, et al., "Monitoring for security intrusion using performance signatures," 2010, pp. 93-104.
[9] M. Christodorescu, et al., "Cloud security is not (just) virtualization security: a short paper," in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009, pp. 97-102.
[10] T. Garfinkel and M. Rosenblum, "A virtual machine introspection based architecture for intrusion detection," 2003.
Citation
M. Prithika, "A Novel Approach for Security in Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.126-133, 2019.
Data Protection Using Elliptic Curve Cryptography
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.134-138, Jan-2019
Abstract
Cloud computing is a network-based service that provide sharing of resources such as virtual machine, storage, network, software and applications etc. It helps to reduce capital costs since that cloud users only need to rent resources according to their requirements and pay the services they use. It is very flexible since users can access its service in any place through intranet. However, a variety of security concerns such as integrity, availability and privacy act as barriers for cloud users to adopt the cloud service. Among all of these concerns, security of data is key concern holding back cloud adoption for individual or companies. The main purpose of this paper will introduce a method to protect data by using Elliptic Curve cryptography algorithm, how this algorithm works, and using ECC in data security of cloud computing.
Key-Words / Index Term
Cloud Computing, Security, Algorithm, Elliptic Curve, Challenges, Encryption, Decryption
References
[1]. L. Kleinrock, “A Vision for the Internet”, ST Journal of Research, 2(1):4-5, Nov, 2005.
[2]. Mell, Peter, and Timothy Grance, "The NIST definition of cloud computing (draft)," NIST special publication vol.800, 2011.pp 145.
[3]. P. Siani. "Privacy, security and trust in cloud computing." Privacy and Security for Cloud Computing. Springer London, 2013. pp3-42.
[4]. H.Jian, Z. . “Analysis and Application of Consumer Features with Cloud Computing and Data Mining Technology.” In Intelligent Computation Technology and Automation, 7th International Conference ICICTA, Oct 2014 ,pp. 84-87.
[5]. B. Rajiv R and M.Nitin."Cloud Computing A CRM Service Based On Separateencryption And Decryption Using Blowfish Algorithm." computing, vol.1, pp. 11.
[6]. Aye Aye Thu, “Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment”,International Journal of Computer Applications,Vol. 67– No.4, 2013.
[7]. VinayakShukla,ShobhitSrivastava, Nidheesh Sharma, “Cloud Computing: Security Issues and Solutions”,International Journal of Emerging Trends & Technology in Computer Science,Vol.3, Issue 5, 2014. [10]Mitchell Cochran,Paul D. Witman, “Governance And Service Level Agreement Issues In A Cloud Computing Environment”,Journal of Information Technology Management, Vol. XXII, Number 2, 2011.
[8]. Grispos, G., Glisson, W.B., and Storer, T., “Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization”, 21st European Conference on Information Systems, 5-8, 2013.
[9]. BijayalaxmiPurohit,PawanPrakash Singh, “Data leakage analysis on cloud computing”,International Journal of Engineering Research and Applications,Vol. 3, Issue 3, 2013.
[10]. V. Shobana, M. Shanmugasundaram, “Data Leakage Detection Using Cloud Computing”,International Journal of Emerging Technology and Advanced Engineering, Vol.3, Special Issue 1, 2013.
[11]. Manas M N, Nagalakshmi C K, Shobha G, “Cloud Computing Security Issues And Methods to Overcome”,International Journal of Advanced Research in Computer and Communication Engineering,Vol. 3, Issue 4, 2014.
[12]. Tomoyoshi Takebayashi, Hiroshi Tsuda, TakayukiHasebe, RyusukeMasuoka, “Data Loss Prevention Technologies”, FUJITSU Sci. Tech, vol.46, No.1, PP 47-55, 2010.
[13]. Certicom, Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Version 1.0, September 2000, Available at http://www.secg.org/download/aid-385/sec1_final.pdf
[14]. Certicom, Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0, September 2000, Available at http://www.secg.org/download/aid-386/sec2_final.pdf
[15]. Darrel Hankerson, Alfred Menezes and Scott Vanstone, Guide to Elliptic Curve Cryptography, Springer (2004).
[16]. Lawrence C. Washington, Elliptic Curves Number Theory and Cryptography, Taylor & Francis Group, Second Edition (2008).
[17]. Jorko Teeriaho, Cyclic Group Cryptography with Elliptic Curves, Brasov, May (2011).
[18]. S.Maria Celestin Vigila and K. Muneeswaran, Implementation of Text based Cryptosystem using Elliptic Curve Cryptography, International Conference on Advanced Computing, IEEE, pp. 82–85, December (2009).
[19]. D. Sravana Kumar, Ch. Suneetha and A. Chandrasekhar, Encryption of Data Using Elliptic Curve Over Finite Fields, International Journal of Distributed and Parallel Systems (IJDPS), vol. 3, no. 1, January (2012).
Citation
M. Subhashini, P. Srivaramangai, "Data Protection Using Elliptic Curve Cryptography", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.134-138, 2019.
A Literature Survey on Internet of Things security issues
Survey Paper | Journal Paper
Vol.07 , Issue.02 , pp.139-141, Jan-2019
Abstract
In day-to-day life, IoT plays a major role . The functionality of IoT is deployed in hospitals, banking sector and also in homes. The work of IoT starts from preventing fires at homes and also supports for the changes in environment. Apart from those benefits, security and privacy is also considering factor. In terms of IoT, the devices connected may not be of the same type which includes type of devices, network used , protocols followed etc. When such variations occur, the security issues cannot be considered in general. Based on the type of device, the security concern has to be independent. An Analysis of various existing protocols and mechanisms are discussed to secure communications in IoT applications. In this paper, Survey of various heterogeneous devices connected to IoT and the security issues related to IoT applications are discussed. Such a survey will be helpful in identification of security issues for different types of IoT applications.
Key-Words / Index Term
Internet of Things, Security, Privacy
References
[1] L. Atzori, A. Iera, and G. Morabito, “The internet of things” A survey, Comput. Netw, 2010 , vol. 54, no. 15, pp. 2787–2805.
[2] Ke Xu, Yi Qu, and Kun Yang. “A Tutorial on the Internet of Things:From a Heterogeneous Network Integration Perspective” IEEE network,March/April 2016.
[3] Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li_, and Hongbin Zhao “A Survey on Security and Privacy Issues in Internet-of-Things”
[4] Margaret Rouse, “Iot security (internet of things security),” Internet of-Things-security, 2013.
[5] J. Granjal, E. Monteiro, and J. S. Silva, “A secure interconnection model for ipv6 enabled wireless sensor networks,” in 2010 IFIP Wireless Days, Oct 2010, pp. 1–6
[6] L. Atzori, A. Iera, and G. Morabito, "Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm," Ad Hoc Networks, vol. 56, pp. 122-140, 2017.
[7] L. Srivastava and T. Kelly, "The internet of things," International Telecommunication Union, Tech. Rep, vol. 7, 2005.
[8] K. Zhao and L. Ge, "A survey on the internet of things security," in Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013, pp. 663-667.
[9] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of things: Security vulnerabilities and challenges,” in 2015 IEEE Symposium on Computers and Communication (ISCC), July 2015, pp. 180–187.
[10] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “Pauthkey: A pervasive authentication protocol and key Establishment scheme for wireless sensor networks in distributed iot applications,” in International Journal of Distributed Sensor Networks, 2014.
[11] C. Zhang and R. Green, “Communication security in internet of thing: Preventive measure and avoid ddos attack over iot network,” in Proceedings of the 18th Symposium on Communications & Networking, ser. CNS ’15. San Diego, CA, USA: Society for Computer Simulation International, 2015, pp. 8–15.
Citation
V. Suganthi, P.K. ManojKumar, "A Literature Survey on Internet of Things security issues", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.139-141, 2019.
A Survey On Network Layer Attack Detection And Isolation Techniques In MANET
Survey Paper | Journal Paper
Vol.07 , Issue.02 , pp.142-145, Jan-2019
Abstract
Mobile Ad Hoc Networks is an emerging trend through self configuring independent network environment consists of nodes and links. Due to this spontaneous configuring nature, it is more vulnerable to many attacks. Security is the vital concern in MANET. There are lot of attack strategies are vulnerable in the MANET. In this various attacks, the network layer attacks cause more vigorous. In network layer, the nodes are connected with the nodes in that range and the network formation and data transmission will be done through the multi hop wireless based routing scheme. The detection and mitigation of these attacks makes more complex when it deals with the n number of nodes and links. The detection and mitigation techniques are developed to isolate the attacks and not to make any impact to the legitimate nodes. This paper describes the network layer attacks and its detection and mitigation strategies with their performance. In this paper, the detection strategies are also compared with one another through the results provided from the references.
Key-Words / Index Term
MANET, Attack Detection and Mitigation
References
[1]. Fan-Hsun Tseng1, Li-Der Chou1 and Han-Chieh Chao , “A survey of black hole attacks in wireless mobile ad hoc networks “, Human-centric Computing and Information Sciences 2011.
[2]. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges”.
[3]. Rajes Chowdari and Srinivas K, “A Survey on detection of Blackhole and Grayhole Attacks in Mobile Ad-hoc Networks”, International Research Journal of Engineering and Technology, Vol. 04, Issue No.05, May 2017 pp. 1375-1378.
[4]. Jain, S., & Hemrajani, N. 2013, “Detection and mitigation techniques of black hole attack in MANET: An Overview”, International Journal of Science and Research (IJSR), India Online ISSN, 2319-7064.
[5]. Divya R and Maheswari D, “Study of Various Security Attacks and in Network Layer and the Mitigation Techniques for MANET”, International Journal of Advanced Research in Computer and Communication Engineering”, Vol.5, Issue No.2, February 2016, pp.404-410.
[6]. Alsumayt A and Haggerty J, “A Survey of the mitigation methods against DOS attacks on MANETs”, Science and Information Conference, UK, August 2014.
[7]. Mudgal R and Gupta R, “Study of various wormhole attack detection techniques in mobile ad hoc networks”, International Conference on Electrical, Electronics and Optimization Techniques, Published in IEEE, March 2016.
[8]. Rupinder, Jatinder and Ravinder Singh, “WRHT: AHybrid Technique for Detection of wormhole attacks in WSNs”, Research article on Mobile Information Systems, Vol.2016 – 13pps, Nov 2016.
[9]. Wang W, Bhargava B, Linderman M, “Defending against Collaborative Packet Drop Attacks on MANET”.
[10]. Goyal, P., Parmar, V., & Rishi, R., “Manet: vulnerabilities, challenges, attacks, application”, IJCEM International Journal of Computational Engineering & Management, 11(2011), 32-37.
[11]. Kejun Liu, Jing Deng “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs” IEEE transactions on mobile computing, vol. 6, no. 5, may 2007.
[12]. P.Rathiga, Dr. S. Sathappan “Hybrid Detection of Black hole and Gray hole attacks in MANET”, 2016 International Conference on Computational Systems and Information Systems for Sustainable Solutions, 2016.
[13]. Ahmad Salehi, M.A.Razzaque, Parisa Naraei, Ali Farrokhtala, “Detection of Sinkhole Attacks in wireless sensor networks”, IEEE Conf. on Space Science and Communication”, September 2013.
[14]. H.Shafiei, A.Khonsari, and P.Mousavi, “Detection and Mitigation of Sinkhole Attacks in wireless sensor networks”, Journal of Computer and System Sciences, Vol.80, Issue 3, pp.644-653, May 2014.
[15]. R.Sujatha, Dr.P.Srivaramangai,” Enhancing security in Manets Communication Issues and Mechanisms”, International Journal of Computer Techniques – Vol. 4 – Issues 3 (79-83) May – June 2017, ISSN: 2394 – 2231.
Citation
R. Sujatha, P. Srivaramangai , "A Survey On Network Layer Attack Detection And Isolation Techniques In MANET", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.142-145, 2019.