Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819644
P. K. Bharne, S. Prabhune
The fuzzy logic and neural networks are the two powerful techniques commonly used in various application field from their evolution. The combination of both techniques is commonly termed as Neuro-Fuzzy System (NFS). Both techniques are combined because they overcome the limitations of each other. Basically, this model is used to construct the complex model by using fuzzy logic and its capabilities are improves with a neural network. In NFS, fuzzy rules are adjusted by the input-output patterns of a neural network. This paper presents the use of this powerful NFS system in the fields of stock market application for stock price prediction. Most of the traditional approaches do not consider all kind of stock price movements. But literature proves that the NFS is a leading technique in stock market prediction. This paper initially describes the brief description of neural networks and Fuzzy logic system along with their pros and cons. Further discussing, how the advantages of both systems combined in NFS. Also, the different types and architectures of NFS are presented here. Finally, this paper studies the recent NFS dependent methods which is used for the prediction of stock market. This paper summarizes the analysis of these techniques based on the technique used, the dataset used, their advantages and some research gap of all these techniques.
{"title":"Comparative Analysis of Recent Neuro Fuzzy Systems For Stock Market Prediction","authors":"P. K. Bharne, S. Prabhune","doi":"10.1109/ICCMC.2019.8819644","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819644","url":null,"abstract":"The fuzzy logic and neural networks are the two powerful techniques commonly used in various application field from their evolution. The combination of both techniques is commonly termed as Neuro-Fuzzy System (NFS). Both techniques are combined because they overcome the limitations of each other. Basically, this model is used to construct the complex model by using fuzzy logic and its capabilities are improves with a neural network. In NFS, fuzzy rules are adjusted by the input-output patterns of a neural network. This paper presents the use of this powerful NFS system in the fields of stock market application for stock price prediction. Most of the traditional approaches do not consider all kind of stock price movements. But literature proves that the NFS is a leading technique in stock market prediction. This paper initially describes the brief description of neural networks and Fuzzy logic system along with their pros and cons. Further discussing, how the advantages of both systems combined in NFS. Also, the different types and architectures of NFS are presented here. Finally, this paper studies the recent NFS dependent methods which is used for the prediction of stock market. This paper summarizes the analysis of these techniques based on the technique used, the dataset used, their advantages and some research gap of all these techniques.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126170842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819865
Siddharekh S. Patil, Kalpana Malpe
Diabetic retinopathy (DR) is the most common cause of newly diagnosed blindness every year. Annual eye checking for diabetic patients are suggested in order to find and treat DR in a timely manner, since blindness from this condition is preventable with early identification. DR detection is solely based on existing patient records. Now a day’s medical data growing tremendously and we need to process that data for detection. But it is time consuming hence data mining techniques helps to get rid from this issue. We use neural network (NN) and naïve bayes for classification. According to comparison results NN gives better accuracy than naïve bayes and time and memory required for NN is less as compared to naïve bayes.
{"title":"Implementation of Diabetic Retinopathy Prediction System using Data Mining","authors":"Siddharekh S. Patil, Kalpana Malpe","doi":"10.1109/ICCMC.2019.8819865","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819865","url":null,"abstract":"Diabetic retinopathy (DR) is the most common cause of newly diagnosed blindness every year. Annual eye checking for diabetic patients are suggested in order to find and treat DR in a timely manner, since blindness from this condition is preventable with early identification. DR detection is solely based on existing patient records. Now a day’s medical data growing tremendously and we need to process that data for detection. But it is time consuming hence data mining techniques helps to get rid from this issue. We use neural network (NN) and naïve bayes for classification. According to comparison results NN gives better accuracy than naïve bayes and time and memory required for NN is less as compared to naïve bayes.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
WSN have large numbers of spatially distributed and dedicated sensing devices, which are used for sensing the physical condition of the environment in which they are deployed. Todays time, WSN have lots of areas for research and it plays important role like tracking of area, health-scanning, earthquake-sensing and so on. WSN sets supplementary life as well as nodes time-period in sensor nodes. Network life cycle is dependent on many factors like their topology type, residual energy after some rounds, sensor-node distance to sink node etc. There are already lots of work done on this concept. Clustering is one of the most important approach to make efficient communication. In this paper, we used clustering approach that uses the minimum energy consumption by choosing the Clusters-Heads (CHs) using five parameters: delay, standard deviation of Eres, average distance of CHs, standard deviation of average life time of cluster head and max distance to Base Station (BS). Results verify that our proposed algorithm will prolong the lifetime of network over LEACH and base algorithm.
{"title":"Load Balanced Clustering protocol for lifetime enhancement of WSN","authors":"Kumkum Dubey, Vijeta Sharma, Amrita Gupta, Ankita Srivastava, Shivendu Mishra, Prince Rajpoot","doi":"10.1109/ICCMC.2019.8819854","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819854","url":null,"abstract":"WSN have large numbers of spatially distributed and dedicated sensing devices, which are used for sensing the physical condition of the environment in which they are deployed. Todays time, WSN have lots of areas for research and it plays important role like tracking of area, health-scanning, earthquake-sensing and so on. WSN sets supplementary life as well as nodes time-period in sensor nodes. Network life cycle is dependent on many factors like their topology type, residual energy after some rounds, sensor-node distance to sink node etc. There are already lots of work done on this concept. Clustering is one of the most important approach to make efficient communication. In this paper, we used clustering approach that uses the minimum energy consumption by choosing the Clusters-Heads (CHs) using five parameters: delay, standard deviation of Eres, average distance of CHs, standard deviation of average life time of cluster head and max distance to Base Station (BS). Results verify that our proposed algorithm will prolong the lifetime of network over LEACH and base algorithm.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121818386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819817
Padma Tatiparti, C. Kumari
It deals with the detection of heart diseases as a deciding path for treatment. The proposed work is for finding an effective technique for ECG Signal Analysis with modest reasonable accuracy and minimum computation time. ECG signal Patterns and heart rate are the parameters to indicate cardiac health. ECG signals are recorded by placing the surface electrodes on body to pick up rhythmically produced due to repolarization and depolarization activity of heart. For Instance the arrhythmia of ECG rhythm are irregular, it neither too slow nor too fast significant based on difference observed between normal sinus heart rhythm and types of arrhythmia. To avoid any risk, the recognition using computer based for classification of ECG signals pinched significant attention since last few decades. The predominant attributes used in detection of cardiac cycle for arrhythmic activity are Heart Rate, QRS complex and intervals and ST segment. Algorithms used for detection and also classification of various ECG signal abnormalities, some recordings from databases of arrhythmias is used in training and also testing classification based on Neural Networks. The data mining tool like Multilayer Perceptron, Radial Basis Functions Neural Networks are implemented for classification purpose due to its simplicity, adaptiveness and easy implementation produced high efficiency.
{"title":"Effective Analysis using DWT and RBF for Biomedical Signals Pick-up from Heart through Surface Electrodes","authors":"Padma Tatiparti, C. Kumari","doi":"10.1109/ICCMC.2019.8819817","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819817","url":null,"abstract":"It deals with the detection of heart diseases as a deciding path for treatment. The proposed work is for finding an effective technique for ECG Signal Analysis with modest reasonable accuracy and minimum computation time. ECG signal Patterns and heart rate are the parameters to indicate cardiac health. ECG signals are recorded by placing the surface electrodes on body to pick up rhythmically produced due to repolarization and depolarization activity of heart. For Instance the arrhythmia of ECG rhythm are irregular, it neither too slow nor too fast significant based on difference observed between normal sinus heart rhythm and types of arrhythmia. To avoid any risk, the recognition using computer based for classification of ECG signals pinched significant attention since last few decades. The predominant attributes used in detection of cardiac cycle for arrhythmic activity are Heart Rate, QRS complex and intervals and ST segment. Algorithms used for detection and also classification of various ECG signal abnormalities, some recordings from databases of arrhythmias is used in training and also testing classification based on Neural Networks. The data mining tool like Multilayer Perceptron, Radial Basis Functions Neural Networks are implemented for classification purpose due to its simplicity, adaptiveness and easy implementation produced high efficiency.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet continues to spread itself over the globe, providing a great opportunity for various threats which are growing on a daily basis. Current static detection techniques only detect known malicious attacks and they also require frequent updates to signature-based databases. To reduce this work, systems are proposed for network intrusion detection systems capable of analyzing contents of the network by means of machine learning techniques to analyze and classify the malicious contents. Various machine learning algorithms are used for developing a Network Intrusion Detection System. The review intends to provide an exhaustive survey of the currently proposed machine learning based intrusion detection systems in order to assist Network Intrusion Detection System developers to gain a better intuition.
{"title":"A Review of Machine Learning Methodologies for Network Intrusion Detection","authors":"Aditya Phadke, Mohit Kulkarni, Pranav Bhawalkar, Rashmi Bhattad","doi":"10.1109/ICCMC.2019.8819748","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819748","url":null,"abstract":"The Internet continues to spread itself over the globe, providing a great opportunity for various threats which are growing on a daily basis. Current static detection techniques only detect known malicious attacks and they also require frequent updates to signature-based databases. To reduce this work, systems are proposed for network intrusion detection systems capable of analyzing contents of the network by means of machine learning techniques to analyze and classify the malicious contents. Various machine learning algorithms are used for developing a Network Intrusion Detection System. The review intends to provide an exhaustive survey of the currently proposed machine learning based intrusion detection systems in order to assist Network Intrusion Detection System developers to gain a better intuition.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133173561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819861
Touko Tcheutou Stephane Borel, Arvind R. Yadav, Utkarsh Shah
Microstrip patch array antennas are widely used in satellite communication, because of its advantages compared to the conventional antennas. Literature study of previous years of patch array antenna (PAA) shows that several techniques were used for making the small size of patch array antenna. This paper presents the micro strip array antenna 2x2 operating at 12 GHz with a bandwidth equal to 693.6 MHZ (5.9 %), a gain equal to 8.98 dB, directivity equal to 10.83 dB and finally an efficiency equal to 83 %. A 2x2 linear array is designed for line feeding, the substrate used is FR4 with a thickness of 1.6mm and a dielectric constant of 4.4. This array antenna is made for satellite communication, X-band applications, and KU applications. The antenna array is designed by using HFSS 12 (High Frequency Structure Simulator) and also the simulation has been done by the same software.
微带贴片阵列天线由于具有传统天线所不能比拟的优点,在卫星通信中得到了广泛的应用。对以往贴片阵天线的文献研究表明,小尺寸贴片阵天线的制作采用了多种技术。本文介绍了工作在12 GHz的微带阵列天线2x2,其带宽为693.6 MHZ(5.9%),增益为8.98 dB,指向性为10.83 dB,最终效率为83%。设计2x2线阵供线,衬底为FR4,厚度为1.6mm,介电常数为4.4。这种阵列天线是为卫星通信、x波段应用和KU应用而设计的。采用hfss12 (High Frequency Structure Simulator,高频结构模拟器)软件对天线阵进行了设计,并进行了仿真。
{"title":"Design of Rectangular Patch Array Antenna for Satellite Communication","authors":"Touko Tcheutou Stephane Borel, Arvind R. Yadav, Utkarsh Shah","doi":"10.1109/ICCMC.2019.8819861","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819861","url":null,"abstract":"Microstrip patch array antennas are widely used in satellite communication, because of its advantages compared to the conventional antennas. Literature study of previous years of patch array antenna (PAA) shows that several techniques were used for making the small size of patch array antenna. This paper presents the micro strip array antenna 2x2 operating at 12 GHz with a bandwidth equal to 693.6 MHZ (5.9 %), a gain equal to 8.98 dB, directivity equal to 10.83 dB and finally an efficiency equal to 83 %. A 2x2 linear array is designed for line feeding, the substrate used is FR4 with a thickness of 1.6mm and a dielectric constant of 4.4. This array antenna is made for satellite communication, X-band applications, and KU applications. The antenna array is designed by using HFSS 12 (High Frequency Structure Simulator) and also the simulation has been done by the same software.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"247 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819827
K. Mankar, Chitra T. Wasnik
Vehicle ad-hoc networks (VANETs) are susceptible to numerous attacks since all nodes of the network contain information like driver details, vehicle type, license plate, speed, location, and moving route. Since human lives are at stake, privacy is one of the major challenges. The abovementioned information is required by legal authorities for traffic management and prevention of accidents/crimes. Hence, the requirement of a conditional privacy scheme to achieve both obscurity as well as traceability has become a growing field of research. This paper presents an improved conditional privacy protection scheme in VANETs where an identity-based cryptosystem uses pseudonyms to assure user obscurity; at the same time, a backdoor access is provided for legal authorities to track defiant and untrustworthy users.
{"title":"Improved Conditional Privacy Protection in Vehicle Ad-hoc Networks","authors":"K. Mankar, Chitra T. Wasnik","doi":"10.1109/ICCMC.2019.8819827","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819827","url":null,"abstract":"Vehicle ad-hoc networks (VANETs) are susceptible to numerous attacks since all nodes of the network contain information like driver details, vehicle type, license plate, speed, location, and moving route. Since human lives are at stake, privacy is one of the major challenges. The abovementioned information is required by legal authorities for traffic management and prevention of accidents/crimes. Hence, the requirement of a conditional privacy scheme to achieve both obscurity as well as traceability has become a growing field of research. This paper presents an improved conditional privacy protection scheme in VANETs where an identity-based cryptosystem uses pseudonyms to assure user obscurity; at the same time, a backdoor access is provided for legal authorities to track defiant and untrustworthy users.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131803656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819737
Ruchi Dewangan, Fahiem Altaf, Soumyadev Maity
In VANET, vehicles periodically transmit beacon messages to the neighboring vehicles and the RSU. To establish the authenticity of these messages, a number of digital signature schemes have been proposed in literature. Many of these schemes enable an RSU to perform aggregate verification of the signatures to deal with high vehicle density scenarios. These schemes are either based on traditional PKC concept involving certificate management overhead or identity based cryptography having key escrow problem. Further, these schemes require the existence of OBU device which is resistant to side channel attacks. In this paper, we propose a hierarchical trusted authority privacy preserving certificateless aggregate signature scheme for VANET. In addition to providing message authentication, integrity and non-repudiation, our scheme is resistant to message forgeability attack. The proposed scheme assumes hierarchical organization of network such that vehicles operate under multiple trusted authorities (TA) which in turn are controlled by single root TA. Using our scheme, the entity could verify messages received from vehicles which operate under multiple TAs. The proposed scheme is free from key escrow problem and resistant to side channel attacks on OBU. It also possesses conditional linkability such that originator of a message could be revealed whenever required. Simulations confirm the efficient nature in terms of verification delay as compared to other well known schemes proposed in literature.
{"title":"Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET","authors":"Ruchi Dewangan, Fahiem Altaf, Soumyadev Maity","doi":"10.1109/ICCMC.2019.8819737","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819737","url":null,"abstract":"In VANET, vehicles periodically transmit beacon messages to the neighboring vehicles and the RSU. To establish the authenticity of these messages, a number of digital signature schemes have been proposed in literature. Many of these schemes enable an RSU to perform aggregate verification of the signatures to deal with high vehicle density scenarios. These schemes are either based on traditional PKC concept involving certificate management overhead or identity based cryptography having key escrow problem. Further, these schemes require the existence of OBU device which is resistant to side channel attacks. In this paper, we propose a hierarchical trusted authority privacy preserving certificateless aggregate signature scheme for VANET. In addition to providing message authentication, integrity and non-repudiation, our scheme is resistant to message forgeability attack. The proposed scheme assumes hierarchical organization of network such that vehicles operate under multiple trusted authorities (TA) which in turn are controlled by single root TA. Using our scheme, the entity could verify messages received from vehicles which operate under multiple TAs. The proposed scheme is free from key escrow problem and resistant to side channel attacks on OBU. It also possesses conditional linkability such that originator of a message could be revealed whenever required. Simulations confirm the efficient nature in terms of verification delay as compared to other well known schemes proposed in literature.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819847
N V Satya Naresh Kalluri, Divya Vani Yarlagadda, K. R. Kumari, Rajesh Arepalli
Cloud computing is network consisting of configurable multifarious resources and predominant-level services which can be rapidly exerted with minimal management effort over the Internet. Cloud computing endows lot of services and consumers avail services from cloud agilely bestowed through internet. Some consumers without any knowledge about quality peculiarities, consumers may merely avail cloud service and feel unhappy, disenchant by using cloud service. As it is extremely imperative for consumers to recognize about cloud service quality before availing the service, this paper bestows about contemplation of quality for the services existing in cloud. This paper induces Yajat method for cogitation about cloud services quality to forthcoming patrons. In Yajat method quality ranking fixin based on different quality peculiarities is calculated for every service in cloud. Security quandary will occur while congregating quality assessment testimony by deeming multifarious quality peculiarities from consumers for Yajat method. To solve security quandary coadunate cryptography and Coalesce cryptography method is induced in this paper. Firstly by exerting Coadunate and coalesce cryptography, quality assessment testimony about cloud is collected securely and bestowed to Yajat method as input. Secondly by availing proctors in Yajat method, quality ranking fixin are calculated and bestowed to forthcoming consumers. The output of yajat method is bestowed to forthcoming consumers by proctors of cloud. Thus this paper intends forthcoming consumers by scrutinizing the output of yajat method, effortlessly choose to avail cloud service with the quality they aspire and feel elated, blissful by using cloud service.
{"title":"Contemplation of Cloud Services Quality by exerting Coadunate-Coalesce Cryptography and Yajat method","authors":"N V Satya Naresh Kalluri, Divya Vani Yarlagadda, K. R. Kumari, Rajesh Arepalli","doi":"10.1109/ICCMC.2019.8819847","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819847","url":null,"abstract":"Cloud computing is network consisting of configurable multifarious resources and predominant-level services which can be rapidly exerted with minimal management effort over the Internet. Cloud computing endows lot of services and consumers avail services from cloud agilely bestowed through internet. Some consumers without any knowledge about quality peculiarities, consumers may merely avail cloud service and feel unhappy, disenchant by using cloud service. As it is extremely imperative for consumers to recognize about cloud service quality before availing the service, this paper bestows about contemplation of quality for the services existing in cloud. This paper induces Yajat method for cogitation about cloud services quality to forthcoming patrons. In Yajat method quality ranking fixin based on different quality peculiarities is calculated for every service in cloud. Security quandary will occur while congregating quality assessment testimony by deeming multifarious quality peculiarities from consumers for Yajat method. To solve security quandary coadunate cryptography and Coalesce cryptography method is induced in this paper. Firstly by exerting Coadunate and coalesce cryptography, quality assessment testimony about cloud is collected securely and bestowed to Yajat method as input. Secondly by availing proctors in Yajat method, quality ranking fixin are calculated and bestowed to forthcoming consumers. The output of yajat method is bestowed to forthcoming consumers by proctors of cloud. Thus this paper intends forthcoming consumers by scrutinizing the output of yajat method, effortlessly choose to avail cloud service with the quality they aspire and feel elated, blissful by using cloud service.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819822
S. Sodagudi, Sita Kumari Kotha, M. David Raju
Security is the biggest challenging approach in today’s internet accessible technologies like, mobile phones, webmail, instant messaging services, and removable storage media. Internet access has given the ability to easily carry and handle the large amounts of data. With the growing technologies, the usage of internet increases along with the threats/data breaches like view or modify the confidential data by an unauthorized entities. Though the technology increases, there is no guarantee for the overall security. Every web application contains vulnerabilities and it is the most crucial area for the intruders to place cyber attacks on it. These attacks are very harmful for the society. They involve creating financial theft, data threats, blackmailing, resource upholding and many more. This paper provides the approaches to identify, detect and taking preventive measures for the eradication of attacks. For this available tools and scanners can also be used in the present world scenario. SQL injection, DNS attacks and DoS attacks are emphasized towards implementation since the risk encountered is more in such attacks.
{"title":"Novel Approaches to Identify and Prevent Cyber Attacks in Web","authors":"S. Sodagudi, Sita Kumari Kotha, M. David Raju","doi":"10.1109/ICCMC.2019.8819822","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819822","url":null,"abstract":"Security is the biggest challenging approach in today’s internet accessible technologies like, mobile phones, webmail, instant messaging services, and removable storage media. Internet access has given the ability to easily carry and handle the large amounts of data. With the growing technologies, the usage of internet increases along with the threats/data breaches like view or modify the confidential data by an unauthorized entities. Though the technology increases, there is no guarantee for the overall security. Every web application contains vulnerabilities and it is the most crucial area for the intruders to place cyber attacks on it. These attacks are very harmful for the society. They involve creating financial theft, data threats, blackmailing, resource upholding and many more. This paper provides the approaches to identify, detect and taking preventive measures for the eradication of attacks. For this available tools and scanners can also be used in the present world scenario. SQL injection, DNS attacks and DoS attacks are emphasized towards implementation since the risk encountered is more in such attacks.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}