A Review of Golden Days of Deep Learning Process
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.144-149, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.144149
Abstract
The finish of Moore’s law and Dennard scaling has prompted the finish of fast enhancement all in all reason program execution. Machine learning (ML), and specifically profound learning is an appealing option for designers to investigate. It has as of late altered vision, discourse, dialect understanding, and numerous different fields, and it guarantees to help with the fabulous difficulties confronting our general public. The calculation at its center is low-accuracy straight variable based math. Accordingly, ML is both sufficiently wide to apply to numerous areas and sufficiently tight to profit by space explicit models, for example, Googles Tensor Processing Unit (TPU). In addition, the development sought after for ML registering surpasses Moore’s law at its pinnacle, similarly as it is blurring. Consequently, ML specialists and PC modelers must cooperate to plan the registering frameworks required to convey the capability of ML. This article offers inspiration, proposals, and alerts to PC draftsmen on the best way to best add to the ML insurgency.
Key-Words / Index Term
Machine Learning, Moore’s Law, Different Fields, Googles Tensor Processing Unit
References
[1]. A. Krizhevsky, I. Sutskever, G. Hinton, "lmageNet Classification with Deep Convolutional Neural Networks", Advances in Neural Information Processing Systems 25 (NIPS), 2012.
[2]. O. Russakovsky et al., "ImageNet Large Scale Visual Recognition Challenge", International Journal of Computer Vision, vol. 115, no. 3, pp. 211-252, 2015.
[3]. C. Szegedy et al., Going Deeper with Convolutions, 2014, [online] Available: https://arxiv.org/abs/1409.4842.
[4]. S. Ioffe, C. Szegedy, Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, 2015, [online] Available: https://arxiv.org/abs/1502.03167.
[5]. C. Szegedy et al., Rethinking the Inception Architecture for Computer Vision, 2015, [online] Available: https://arxiv.org/abs/1512.00567.
[6]. K. He et al., Deep Residual Learning for Image Recognition, 2015, [online] Available: https://arxiv.org/abs/1512.03385.
[7]. G. Hinton et al., "Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups", IEEE Signal Processing Magazine, vol. 29, no. 6, pp. 82-97, 2012.
[8]. J. Clark, Google Turning Its Lucrative Web Search Over to AI Machines, Bloomberg Technology, 2015, [online] Available: www.bloomberg.com/news/articles/2015-10-26/google-turning-its-Iucrative-web-search-over-to-ai-machines.
[9]. Y. Wu et al., Google`s Neural Machine Translation System: Bridging the Gap between Human and Machine Translation, 2016, [online] Available: https://arxiv.org/abs/1609.08144.
[10]. M. Johnson et al., Google`s Multilingual Neural Machine Translation System: Enabling Zero-Shot Translation, 2016, [online] Available: https://arxiv.org/abs/1611.04558.
[11]. V. Gulshan, L. Peng, M. Coram, "Development and Validation of a Deep Learning Algorithm for Detection of Diabetic Retinopathy in Retinal Fundus Photographs", JAMA, vol. 316, no. 22, pp. 2402-2410, 2016.
[12]. Y. Liu et al., Detecting Cancer Metastases on Gigapixel Pathology Images, 2017, [online] Available: https://arxiv.org/abs/1703.02442.
[13]. J. Olczak et al., "Artificial intelligence for analyzing orthopedic trauma radiographs", Acta Orthopaedica, 2017, [online] Available: www.tandfonline.com/doi/full/10.1080/17453674.2017.1344459.
[14]. D. Silver et al., "Mastering the game of Go with deep neural networks and tree search", Nature, vol. 529, pp. 484-489, 2016.
[15]. 14 Grand Challenges for Engineering in the 21st Century, [online] Available: www.engineeringchallenges.org/challenges.aspx.
[16]. N. Jouppi et al., "In-Datacenter Performance Analysis of a Tensor Processing Unit", Proc. 44th Annual International Symposium on Computer Architecture (ISCA), pp. 1-12, 2017.
[17]. Cloud TPUs: Google`s second-generation Tensor Processing Unit is coming to Cloud Google.ai, 2017, [online] Available: http://g.co/tpu.
[18]. M. Abadi et al., Tensorflow: Large-scale machine learning on heterogeneous distributed systems, 2016, [online] Available: https://arxiv.org/abs/1603.04467.
[19]. Y. Jia et al., "Caffe: Convolutional Architecture for Fast Feature Embedding", Proceedings of the 22nd ACM international conference on Multimedia (MM), pp. 675-678, 2014.
[20]. A. Paszke, S. Chintala, PyTorch, 2017, [online] Available: www.pytorch.org.
[21]. Machine Learning Glossary, Google, [online] Available: https://developers.google.com/machine-learning/glossary/#batchsize.
[22]. P. Goyal et al., Accurate Large Minibatch SGD: Training ImageNet in 1 Hour, 2017, [online] Available: https://arxiv.org/abs/1706.02677.
[23]. Y. You et al., 100-epoch ImageNet Training with AlexNet in 24 Minutes, 2017, [online] Available: https://arxiv.org/pdf/1709.05011.pdf.
[24]. M.D. Zeiler et al., "On rectified linear units for speech processing", Proc. IEEE Int`l Conf. on Acoustics Speech and Signal Processing (ICASSP), pp. 3517-3521, 2013.
[25]. M. Shazeer et al., Outrageously large neural networks: The sparsely-gated mixture-of-experts layer, 2017, [online] Available: https://arxiv.org/abs/1701.06538.
[26]. P. Warden, What I`ve learned about neural network quantization, 2017, [online] Available: https://petewarden.com/2017106122/what-ive-learned-about-neural-network-quantization/.
[27]. G. Hinton, O. Vinyals, J. Dean, Distilling the knowledge in a neural network, 2015, [online] Available: https://arxiv.org/abs/1503.02531.
[28]. A. Graves, G. Wayne, I. Danihelka, Neural Turing machines, 2014, [online] Available: https://arxiv.org/abs/1410.5401.
[29]. A. Graves et al., "Hybrid computing using a neural network with dynamic external memory", Nature, vol. 538, pp. 471-476, 2016.
[30]. J. Weston, S. Chopra, A. Bordes, Memory Networks, 2014, [online] Available: https://arxiv.org/abs/1410.3916.
[31]. D. Bahdanau, K. Cho, Y. Bengio, Neural Machine Translation by Jointly Learning to Align and Translate, 2014, [online] Available: https://arxiv.org/abs/1409.0473.
[32]. B. Zoph, Q. Le, Neural Architecture Search with Reinforcement Learning, 2016, [online] Available: https://arxiv.org/abs/1611.01578.
[33]. J. Hennessy, D.A. Patterson, Computer Architecture: a Quantitative Approach, Elsevier, 2018, [online] Available: www.elsevier.com/books/computer-architecture/patterson/978-0-12-811905-1.
Citation
K Jyothi, K Sunitha, "A Review of Golden Days of Deep Learning Process", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.144-149, 2019.
Survey on Recent Trends in Bio Metrics as Authentication
Survey Paper | Journal Paper
Vol.07 , Issue.06 , pp.150-153, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.150153
Abstract
In this paper, With the raise of rapid innovation in current biometric technology field, new uses are appearing to make the process of authentication more convenient and secure. These innovative and useful processes of human identification are increasing in frequency with every year. As these users are increasing enormously, they are also creating some trends or ways and restructuring the way we identify humans. Passwords can’t be used that much extensively as they are easily guessed and prone to guess attacks or brute force attacks. Of all the trends we see in the field of biometric technology, most are focused on finding a better and more efficient way of authenticating a person based on “Who they are.” Of course, there are still the traditional ways of identifying a person including personal identification numbers (PINs), ID cards, and passwords but these methods identify a person based on “what they have” or “what they know.” Two Factor Security or Multi factor security measures are quite applicable to some of the domains / ideas. None of them identifies a person with the most important factor, which is “Who they are.” As biometric traits are personal and unique, this is perhaps the most accurate way of identifying a person.
Key-Words / Index Term
Biometrics, Two Factor Security, Authentication, Iris Scan, Palm Vein Technologies
References
[1] R. Clarke “Human identification in information systems: management challenges and public information issues”. December 1994. Available in http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html
[2] S. Furui Digital Speech Processing, synthesis, and recognition., Marcel Dekker, 1989.
[3] A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, “The DET curve in assessment of detection performance”, V. 4, pp.1895-1898, European speech Processing Conference Eurospeech 1997
[4] A. J. Mansfield, J. L. Wayman, “Best Practices in Testing and Reporting Performance of Biometric Devices”. Version 2.01. National Physical Laboratory Report CMSC 14/02. August 2002.
[5] M. Faundez-Zanuy “Door-opening system using a low-cost fingerprint scanner and a PC”. IEEE Aerospace and Electronic Systems Magazine. Vol. 19 nº 8, pp.23-26. August 2004
[6] M. Faundez-Zanuy y Joan Fabregas “Testing report of a fingerprint-based door-opening system”. IEEE Aerospace and Electronic Systems Magazine Vol.20 nº 6, pp 18-20, ISSN: 0885-8985. June 2005..
[7] D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar “Handbook of Fingerprint Recognition” Springer professional computing. 2003
[8] M. Faundez-Zanuy “Technological evaluation of two AFIS systems” IEEE Aerospace and Electronic Systems Magazine Vol.20 nº 4, pp13-17, ISSN: 0885-8985. April 2005.
[9] M. Faundez-Zanuy “Are Inkless fingerprint sensors suitable for mobile use? IEEE Aerospace and Electronic Systems Magazine, pp.17-21, April 2004
[10] S. Prabhakar, S. Pankanti, A. K. Jain ”Biometric recognition: security and privacy concerns” IEEE Security
and Privacy, pp. 33-42, March/April 2003
[11] M. Faundez-Zanuy “On the vulnerability of biometric security systems” IEEE Aerospace and Electronic Systems Magazine Vol.19 nº 6, pp.3-8, June 2004
[12] M. Faundez-Zanuy “Data fusion in biometrics”. IEEE Aerospace and Electronic Systems Magazine. Vol. 20 nº 1, pp.34-38, January 2005
[13] http://www.faceblind.org/research
[14] http://www.rarediseases.org
[15] S.K. Zhou “Face recognition using more than one still image: what is more?. Lecture Notes In Computer Science LNCS 3338, pp.212-223, A. Z. Li et al. Ed., Sinobiometrics. Springer Verlag 2004
[16] M. Faundez-Zanuy, V. Espinosa-Duró, J. A. Ortega-Redondo “Face verification by means of a single Neural Network classifier”. Enviado a IWANN’05. Lecture Notes In Computer Science 2005
[17] M. Faundez-Zanuy, E. Monte-Moreno “State-of-the-art in speaker recognition”. IEEE Aerospace and Electronic Systems Magazine. Vol.20 nº 5, pp 7-12, ISSN: 0885-8985. May 2005
[18] Marcos Faundez-Zanuy, G. Mar Navarro-Mérida “Biometric identification by means of hand geometry and a neural net classifier” “IWANN’05 Lecture Notes In Computer Science 2005
[19] P. W. Hallian “Recognizing human eyes” Geometric methods computer vision, vol. 1570, pp. 214-216, 1991.
[20] M. Faundez-Zanuy “Signature recognition state-of-the-art”. IEEE Aerospace and Electronic Systems
Magazine. 2005. Vol.20 nº 7, pp 28-32, ISSN: 0885-8985. July 2005.
[21] P. J. Phillips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone “FRVT 2002: Evaluation report”, available online: http://www.frvt.org/DLs/FRVT_2002_Evaluation_Report.pdf, March 2003
[22] T. Mansfield, G. Kelly, D. Chandler, and J. Kane (2001, Mar.) biometric product testing final report.
[23] D. Maio, D. Maltoni, R. Capelli, J. L. Wayman, and A. K. Jain ”FVC2000: fingerprint verification competition”. IEEE Trans. Pattern analysis Machine Intelligence, Vol. 24, pp. 402-412, march 2002
[24] A. Martin and M. Przybocki, “The NIST 1999 speaker recognition evaluation: An overview”. Digital signal processing Vol. 10, no.1-3, pp.1-18, 2000.
[25] D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto and G. Rigoll “SVC2004: First international signature verification competition”. Lecture Notes on Computer Science LNCS-3072, Springer Verlag pp.16-22, 2004.
[26] L. O’Gorman “Comparing passwords, tokens and biometrics for user authentication”. Proceedings of the IEEE, Vol. 91, No. 12, pp.2021-2040, December 2003.
[27] M. Faundez-Zanuy “Biometric recognition: why not massively adopted yet?”. IEEE Aerospace and Electronic Systems Magazine. Vol.20 nº 8, pp.25-28, ISSN: 0885-8985. August 2005.
[28] M. Faundez-Zanuy “Privacy issues on biometric systems”. IEEE Aerospace and Electronic Systems Magazine. Vol. 20 nº 2, pp13-15, February 2005.
Citation
D. Vinitha, P.V Ramesh, "Survey on Recent Trends in Bio Metrics as Authentication", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.150-153, 2019.
Cyberbullying Discovery on Social Networks: A Study
Research Paper | Journal Paper
Vol.07 , Issue.06 , pp.154-158, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.154158
Abstract
The fast improvement of relational cooperation is upgrading the development of advanced tormenting works out. Most of the general population connected with these activities have a place with the more energetic ages, especially youngsters who are the most exceedingly terrible circumstance are at more risk of pointless undertakings we propose a fruitful predator and harmed singular ID with semantic enhanced thought little of de-noising auto-encoder approach to manage distinguish advanced tormenting message from online life through the measuring plan of a component of decision. We present a graph model to expel the cyberbullying framework, which is used to perceive the most unique cyberbullying predators and abused individuals to situating counts the present channels generally work with the clear catchphrase look moreover, can`t grasp the semantic noteworthiness of the substance. So we propose Semantic-Enhanced Marginalized De-noising Auto-Encoder. (smSDA) is created by methods for a semantic development of the notable significant learning model stack de-noising auto-encoder. The semantic expansion includes semantic dropout clatter and sparsely necessities, where the semantic dropout bustle is organized in perspective of zone data and the word embeddings framework. The test demonstrates practical of our strategy.
Key-Words / Index Term
Detection, Cyberbullying, Social-Networking, De-noising
References
[1]. A. M. Kaplan and M. Haenlein, "Clients of the world, join together! The difficulties and chances of online life," Business skylines, vol. 53, no. 1, pp. 59– 68, 2010.
[2].R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R.Lattanner, "Harassing in the computerized age: A basic audit and metaanalysis of cyberbullying research among youth." 2014.
[3]. M. Ybarra, "Patterns in innovation based sexual and non-sexual hostility after some time and linkages to nontechnology aggression,"National Summit on Interpersonal Violence and Abuse Across the Lifespan: Forging a Shared Agenda, 2010.
[4]. B. K. Biggs, J. M. Nelson, and M. L. Sampilo, "Peer relations in the anxiety–depression link: Test of a mediation model," Anxiety, Stress, & Coping, vol. 23, no. 4, pp. 431–447, 2010.
[5]. S. R. Jimerson, S. M. Swearer, and D. L. Espelage, Handbook of bullying in schools: An international perspective. Routledge/Taylor & Francis Group, 2010.
[6]. G. Gini and T. Pozzoli, "Association between bullying and psychosomatic problems: A metaanalysis," Pediatrics, vol. 123, no. 3, pp. 1059– 1065, 2009.
[7]. A. Kontostathis, L. Edwards, and A. Leatherman, "Text mining and cybercrime," Text Mining: Applications and Theory. John Wiley & Sons, Ltd, Chichester, UK, 2010.
[8]. J.M. Xu, K.- S. Jun, X. Zhu, and A. Bellmore, "Gaining from tormenting follows in internet based life," in Proceedings of the 2012 conferenceof the North American part of the relationship for computational phonetics: Human dialect advancements. Relationship for Computational Linguistics, 2012, pp. 656– 666.
[9]. Q. Huang, V. K. Singh, and P. K. Atrey, "Digital harassing identification utilizing social and printed investigation," in Proceedings of the third International Workshop on Socially-Aware Multimedia. ACM, 2014, pp.3– 6.
[10]. D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards, "Location of badgering on web 2.0," Proceedings of the Content Analysis in the WEB, vol. 2, pp. 1– 7, 2009. Volume 2 | Issue 3 | May-June-2017 | www.ijsrcseit.com 856
[11]. K. Dinakar, R. Reichart, and H. Lieberman, "Modeling the detection of textual cyberbullying." in The Social Mobile Web, 2011.
[12]. V. Nahar, X. Li, and C. Pang, "An effective approach for cyberbullying detection," Communications in Information Science and Management Engineering, 2012.
[13]. M. Dadvar, F. de Jong, R. Ordelman, and R. Trieschnigg, "Improved cyberbullying detection using gender information," in Proceedings of the 12th -Dutch-Belgian Information Retrieval Workshop (DIR2012). Ghent, Belgium: ACM, 2012.
[14]. M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong, "Enhancing cyberbullying location with client setting," in Advances in Information Retrieval. Springer, 2013, pp. 693– 696.
[15]. P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.- A. Manzagol, "Stacked denoising autoencoders: Learning helpful portrayals in a profound system with a neighborhood denoising paradigm," The Journal of Machine Learning Research, vol. 11, pp. 3371– 3408, 2010.
[16]. P. Baldi, "Autoencoders, unsupervised learning, and deep architectures," Unsupervised and Transfer Learning Challenges in Machine Learning, Volume 7, p. 43, 2012.
[17]. M. Chen, Z. Xu, K. Weinberger, and F. Sha, "Marginalized denoising autoencoders for domain adaptation," arXiv preprint arXiv: 1206.4683, 2012. [18]. T. K. Landauer, P. W. Foltz, and D. Laham, "An introduction to latent semantic analysis," Discourse processes, vol. 25, no. 2-3, pp.259– 284, 1998.
[19]. T. L. Griffiths and M. Steyvers, "Finding scientific topics," Proceedings of the National academy of Sciences of the United States of America, vol. 101, no. Suppl 1, pp. 5228–5235, 2004.
[20]. D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," the Journal of machine Learning research, vol. 3, pp. 993–1022, 2003. [
21]. T. Hofmann, "Unsupervised learning by probabilistic inactive semantic investigation," Machine learning, vol. 42, no. 1-2, pp. 177– 196, 2001.
22]. [22]. Y. Bengio, A. Courville, and P. Vincent, "Portrayal learning: A survey and new points of view," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, no. 8, pp. 1798– 1828, 2013.
[23]. B. L. McLaughlin, A. A. Braga, C. V. Petrie, M. H. Moore et al., Deadly Lessons:: Understanding Lethal School Violence. National Academies Press, 2002.
Citation
G Sireesha, G Kranthikumar, "Cyberbullying Discovery on Social Networks: A Study", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.154-158, 2019.
Study and Review on BDAAS in OWL-S Based Secure Clouds Using Bigdata
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.159-161, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.159161
Abstract
Development of Information Technology moves all business associations to advanced business. Associations treat information as a benefit since it tends to be characterized as a gathering of put away realities that are available to translation and control for authoritative forms. Value-based, social, portable, cloud and sensor information accessible now a days offer tremendous possibilities in hierarchical handling. Database, enormous information and business knowledge innovations collaborate to make another business innovation. The advancements are progressively getting to be information driven. The accessibility of information procurement, accumulation and putting away stages are turning into a need since focal capacity of information in a database lessens information repetition, information disconnection, and information irregularity and permits for information to be shared among clients of the information. These extensive datasets, prominently known as Big Data, are hard to oversee utilizing conventional processing advancements. Distributed computing Cloud processing kills the need to keep up costly figuring equipment, devoted space, and programming. In this exploration paper the specialist examinations the execution of Big Data as an administration in cloud conditions and distinguished the elements to be considered actualizing Big Data-as-a-Service on the cloud.
Key-Words / Index Term
Data ,Processing, Big Data, Data Analytics, Cloud Computing
References
[1]. Big data: science in the petabyte era,” Nature 455 (7209):1, 2008.
[2]. Buyya R, Vecchiola C, Selvi T. Mastering in Cloud Computing – Foundations and Applications Programming.Morgan Kaufman: USA, 2013.
[3]. Cisco Cloud Computing - Data Center Strategy, architecture, and Solutions, Cisco Systems, (2009)
[4]. D. Logothetis and K. Yocum, “Ad-hoc data processing in the cloud,” Proceedings of the VLDB Endowment, vol. 1, no. 2,pp. 1472–1475, 2008
[5]. Dialogic Corporation (2010) ‘Introduction to cloud computing: white paper’,available at http://www.dialogic.com/products/docs/whitepapers/12023-cloud-computing-wp.pdf (accessed 12 December 2011).
[6]. Dialogic Corporation (2010) ‘Introduction to cloud computing: white paper’,availableat http://www.dialogic.com/products/docs/whitepapers/12023-cloud-computing-wp.pdf
[7]. Douglas and Laney, “The importance of ‘big data’: A definition,”2008.
[8]. Implementation of Cloud Computing in Education – A Revolution, Saju Mathew, International Journal of Computer Theory and Engineering, Vol. 4, No. 3, June 2012
[9]. James Manyika et al., "Big data: The next frontier for innovation, competition, and productivity," McKinsey Global Institute, Tech. rep. May 2011.
[10].Kart, Heudecker and Buytendijk 2013, Gartner Survey
[11].Mark Raskino, Jackie Fenn, and Alexander Linden, "Extracting Value From the Massively Connected World of 2015," Gartner Research, Tech. rep. 2005.
[12].Mell, P., & Grance, T. (September 2011). The NIST Definition of Cloud Computing. Retrieved January 28, 2014, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
[13].Mell, P., Grance, T. (2011). The NIST definition of cloud computing. Gaithersburg, MD: National Institution of Standards and Technology (NIST).
[14].Reuters , Stastitics Graph-Big Data growth 2099 to 2020 [15].S. Lohr, “The age of big data,” New York Times, vol. 11, 2012
[16].V. W. Consulting, “Big data, big impact: New possibilities for international development,” The World Economic Forum, Tech. Rep., 2012.
[17].Venkata Narasimha Inukollu, Sailaja Arsi and Srinivasa Rao Ravuri ―Security Issues Associated With Big Data In Cloud Computing‖ International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
Citation
Koppala Jyosna, N Bhanu Prakash, "Study and Review on BDAAS in OWL-S Based Secure Clouds Using Bigdata", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.159-161, 2019.
A Study on Secure Sharing of Application Data in Cloud Computing
Research Paper | Journal Paper
Vol.07 , Issue.06 , pp.162-166, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.162166
Abstract
Cloud clients utilizes "Cloud storage" administration to have their information in the cloud. Get to control benefit gave by cloud is accustomed to giving assurance against unapproved access to information. Cipher text-Policy Attribute-Based Encryption (CP-ABE) is generally considered for information get to control in distributed storage. The current CP-ABE is hard to apply in multi-specialist distributed storage because of the characteristic repudiation issue. The proposed revocable multi-specialist CP-ABE plot gives answer for the characteristic denial issue. The proposed plot refreshes the segments of the disavowed quality just and produces most recent mystery keys for the repudiated credit and advances it to the non renounced clients who have the properties as denied traits. The Backward security and Forward security is kept up. On the off chance that the repudiated client goes into the framework again by doing the enlistment procedure implies, the specific client is recognized by means of the character card detail in the renouncement rundown and they are not permit in the framework, so that these clients are halted at the enrolment stage itself.
Key-Words / Index Term
Cloud Storage, Security, Cloud, Privacy
References
[1]. J. Bethen court, A. Sahai, and B. Waters, “Cipher text Policy Attribute Based Encryption,” in Proc. IEEE Symp. Security and privacy (S&P07), 2007, pp. 321-334.
[2]. B. Waters, “Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” in Proc. 4th Int l Conf. Practice and Theory in Public Key Cryptography (PKC 11), 2011, pp. 53-70.
[3]. V. Goyal, A. Jain,O. Pandey, and A. Sahai, ”Bounded Cipher text Policy Attribute Based Encryption,” in Proc. 35th Int l Colloquium on Automata, Languages, and Programming (ICALP08), 2008, pp. 579-591.
[4]. A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully Secure Functional Encryption: Attribute Based Encryption and (Hierarchical) Inner Product Encryption,” in Proc. Advances in Cryptology EUROCRYPT 10, 2010, pp. 62-91.
[5]. M. Chase, “Multi-Authority Attribute Based Encryption,” in Proc. 4th Theory of Cryptography Conf. Theory of Cryptography (TCC 07), 2007, pp. 515-534.
[6]. M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in Proc. 16th ACM Conf. Computer and Comm. Security (CCS 09), 2009,pp. 121-130.
[7]. A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,” in Proc. Advances in Cryptology EUROCRYPT 11, 2011, pp. 568-588.
[8]. M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, ”Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131- 143, Jan. 2013.
[9]. S. Jahid, P. Mittal, and N. Borisov, “Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,” in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS 11), 2011, pp. 411- 415.
[10].S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed Access Control in Clouds,” in Proc. 10th IEEE Int?l Conf. Trust- Com, 2011, pp. 91-98.
[11].D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” in Proc. 21st Ann. Int l Cryptology Conf.: Advances in Cryptology CRYPTO 01, 2001, pp. 213-229.
Citation
P. Kiran Kumar Naik, GV. Ramesh Babu, "A Study on Secure Sharing of Application Data in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.162-166, 2019.
Study on Securely Digitalizing Crime Records by using RSA Algorithm
Research Paper | Journal Paper
Vol.07 , Issue.06 , pp.167-169, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.167169
Abstract
Crime Records are exists in Police Stations. Crime Records are enable to find crimes and their involved criminals. In the existing system they are using a FIR for maintain the crime and criminal details. It contain a less security and easy to perform fraud. The record has been updated manually every time. The main objective of this system is providing security to data, by using the RSA algorithm. It contain the two keys based security. In this, crime and involved criminal details are stored in database in the form of encrypted data. Criminal details such as (name, address, etc,) are stored in the Ciphertext format. So that we can speed up investigation process as soon as possible. Highly impossible to decrypt data who are unauthorized to access crime data. Through the using this system witnesses can easy to access and generate the reports. We can providing a security to witnesses data by using RSA algorithm. If any person performing misleading activities to on crime data they can’t access plain text and difficult to change cipher text to plain text.
Key-Words / Index Term
RSA, Encrypt, Decrypt, Ciphertext, Crime, Criminlas
References
[1] Anu Sharma 1 ,Mohd. Shahnawaz 2, “ Crime Record Management System”, 3rdInternational Conference on System Modeling & Advancement in Research Trends (SMART) College of Computing Sciences and Information Technology (CCSIT) ,TeerthankerMahaveer University , Moradabad , page 6-9, October 2016.
[2] Richard Adderley, “Police Crime Recording and Investigation System”, Policing An International Journal Of Police Strategies And Management, 24(1):100-114, March 2001.
[3] Ms. Pooja.Bahule, Ms. Nisha Maria Abraham, “E-Police System” , International Journal of Engineering Research & Management Technology, Volume 2, Issue-1, January- 2015.
[4] Sandeep D. Nawale, Ms. Poonam C. Songra, “Online Criminal Record”, Global Journal of Computer Science and Technology, Volume 12, Issue 8, April 2012.
[5] NentaweY .Goshwe ,“Data Encryption and Decryption Using RSA Algorithm in a Network Environment”, International Journal of Computer Science and Network Security, VOL.13 No.7, July 2013.
[6] M. Preetha1 , M. Nithya2 , “A Study And Performance Analysis Of Rsa Algorithm”, International Journal of Computer Science and Mobile Computing , Vol. 2, Issue. 6, June 2013.
Citation
M. Nagaraju Naik, S.Muni Kumar, J.S. Ananda Kumar, "Study on Securely Digitalizing Crime Records by using RSA Algorithm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.167-169, 2019.
A study on Scalable and Secure Intrusion Detection in Network Security
Research Paper | Journal Paper
Vol.07 , Issue.06 , pp.170-172, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.170172
Abstract
Wireless Sensor Network (WSN) has a gigantic scope of uses, for example, front line, reconnaissance, crisis protect activity and savvy home innovation and so forth. Aside from its intrinsic requirements, for example, restricted memory and vitality assets, when sent in threatening ecological conditions, the sensor hubs are powerless against physical catch and other security limitations. These limitations put security as a noteworthy test for the analysts in the field of PC organizing. This paper reflects different issues and difficulties identified with security of WSN, its security engineering. The paper likewise gives an exchange on different security instruments conveyed in WSN condition to beat its security dangers.
Key-Words / Index Term
Sensor network, security, Denial of Service (DoS), Intrusion Detection System (IDS), Authentication
References
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102–114, August 2002.
[2] P. Albers and O. Camp. Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In First International Workshop on Wireless Information Systems, 4th International Conference on Enterprise Information Systems, 2002.
[3] R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, 1996.
[4] R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS, 1997.
[5] T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Revised Papers from the 8th International Workshop on Security Protocols, pages 170–177. Springer-Verlag, 2001.
[6] A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1):46–55, 2003.
[7] P. Bose, P. Morin, I. Stojmenovi´c;, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wirel. Netw., 7(6):609–616, 2001.
[8] D. Braginsky and D. Estrin. Rumor routing algorthim for sensor networks. In WSNA ’02: Proceedings of the 1st ACM international workshop on Wireless
Citation
Shaik. Arifa, E. Kesavulureddy, "A study on Scalable and Secure Intrusion Detection in Network Security", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.170-172, 2019.
A Study of Farmers Buddy App Development
Technical Notes | Journal Paper
Vol.07 , Issue.06 , pp.174-175, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.174175
Abstract
Agriculture is a way of life, a tradition, which, for centuries, has shaped the thought, the outlook, the culture and economic life of the people of India. The advent of modern technologies at the beginning of the last century has brought in development of various technologies, which has substantially increased the yields of various crops.It is an agricultural portal which gives solutions to the farmers and students of agricultural studies in India. Farmers Buddy aims to disseminate useful information about improved technology to the farming community and service providers in the rural areas. The major focus of Agriculture sector presently in the in this portal, is pertaining to Agricultural Credit, Policies & Schemes, Agricultural Bank loans, Market Information, Agricultural Best Practices, On & Off Farm Enterprises and various Products & Services.
Key-Words / Index Term
App development, Agricultural, Architecture
References
Missing
Citation
P. Haseemun, K. Somasekhar, "A Study of Farmers Buddy App Development", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.174-175, 2019.