Pub Date : 2022-10-01DOI: 10.22247/ijcna/2022/215912
N. Chandrakala, Vamsidhar Enireddy
– Cloud providers generally run one or more Virtual Machine (VM) instances on the same physical machine. Though it increases data center utilization, it exposes VM to a co-location attack. VM placement and migration are the two strategies adopted for mitigating co-locations. Current methods for VM placement or VM migration consider only security as decision criteria and do not consider other factors like Quality-of-Service degradation, data center utilization, etc. This work proposes a placement and migration strategy for mitigation of co-location attacks with joint consideration of multi objectives like QoS, data center utilization, energy consumption, and security risks. A security-driven multi-criteria optimization -based VM placement policy is proposed. A joint consideration of multi objective performance optimization along with co-location security risk minimization is done to design a novel VM placement policy based on user categorization. The policy can reduce the likelihood of co-location target VM with attacker VM without much degradation to the performance of VM and data center utilization. The solution mitigates co-location risks without much compromise to the performance of VM and data center resource utilization. The co-residence risk is mitigated by the categorization of users into three levels i.e. unlabeled, risky, and safe, and physical machines into two groups as safe and unsafe. The PMs available in data center is grouped into three different VM placement policies, they are undecided pool, safe pool and unsafe pool.
{"title":"Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers","authors":"N. Chandrakala, Vamsidhar Enireddy","doi":"10.22247/ijcna/2022/215912","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215912","url":null,"abstract":"– Cloud providers generally run one or more Virtual Machine (VM) instances on the same physical machine. Though it increases data center utilization, it exposes VM to a co-location attack. VM placement and migration are the two strategies adopted for mitigating co-locations. Current methods for VM placement or VM migration consider only security as decision criteria and do not consider other factors like Quality-of-Service degradation, data center utilization, etc. This work proposes a placement and migration strategy for mitigation of co-location attacks with joint consideration of multi objectives like QoS, data center utilization, energy consumption, and security risks. A security-driven multi-criteria optimization -based VM placement policy is proposed. A joint consideration of multi objective performance optimization along with co-location security risk minimization is done to design a novel VM placement policy based on user categorization. The policy can reduce the likelihood of co-location target VM with attacker VM without much degradation to the performance of VM and data center utilization. The solution mitigates co-location risks without much compromise to the performance of VM and data center resource utilization. The co-residence risk is mitigated by the categorization of users into three levels i.e. unlabeled, risky, and safe, and physical machines into two groups as safe and unsafe. The PMs available in data center is grouped into three different VM placement policies, they are undecided pool, safe pool and unsafe pool.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46228020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.22247/ijcna/2022/215918
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran
– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.
{"title":"Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT)","authors":"R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran","doi":"10.22247/ijcna/2022/215918","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215918","url":null,"abstract":"– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41580410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.22247/ijcna/2022/215915
K. Giridhar, C. Anbuananth, N. Krishnaraj
– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.
{"title":"Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency","authors":"K. Giridhar, C. Anbuananth, N. Krishnaraj","doi":"10.22247/ijcna/2022/215915","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215915","url":null,"abstract":"– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48580871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.22247/ijcna/2022/215914
Ajay Kumar
– Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.
{"title":"Region Based Secured Data Transmission Protocol for Wireless Sensor Network","authors":"Ajay Kumar","doi":"10.22247/ijcna/2022/215914","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215914","url":null,"abstract":"– Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49041794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.22247/ijcna/2022/215923
A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa
– Nowadays, the speed of the internet becomes very high and users use a lot of data from a data center, so users need to access a lot of data from the nearest place to avoid any delay. The data will be stored without any interference from users. Due to the previous reasons, Cloud Computing (CC) plays an important role in finding the best route for data to reach users by general networks without a delay and with the least energy consumption. To achieve scalability, protocols are used and developed for networks for a suitable performance in the cloud computing networks. In this paper, a natural-inspired protocol is used in cloud networks to find a good routing, this protocol is called Chaotic Black Widow Optimization Algorithm (CBWOA). Some natural characteristics of the routing strategy are inspired by the black widow optimization algorithm. Taguchi's methods were used for tuning parameters of CBWOA based on orthogonal array experiments. CBWOA is applied with three constraints to measure two factors called energy consumption and throughput by finding best path direction in cloud Computing networks. CBWOA is evaluated in an experimental cloud using the current routing protocols against old routing protocols of the performance network. Finally, the best route in cloud networks is founded successfully and the performance of the developed protocol is associated with two factors, the first one is maximizing (the throughput with efficiency 93.4921% and the Packet delivery ratio with efficiency 90.3087%) and the second one is minimizing (the delay with efficiency 62.1788% and the energy consumed with efficiency 51.1406%).
{"title":"Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm","authors":"A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa","doi":"10.22247/ijcna/2022/215923","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215923","url":null,"abstract":"– Nowadays, the speed of the internet becomes very high and users use a lot of data from a data center, so users need to access a lot of data from the nearest place to avoid any delay. The data will be stored without any interference from users. Due to the previous reasons, Cloud Computing (CC) plays an important role in finding the best route for data to reach users by general networks without a delay and with the least energy consumption. To achieve scalability, protocols are used and developed for networks for a suitable performance in the cloud computing networks. In this paper, a natural-inspired protocol is used in cloud networks to find a good routing, this protocol is called Chaotic Black Widow Optimization Algorithm (CBWOA). Some natural characteristics of the routing strategy are inspired by the black widow optimization algorithm. Taguchi's methods were used for tuning parameters of CBWOA based on orthogonal array experiments. CBWOA is applied with three constraints to measure two factors called energy consumption and throughput by finding best path direction in cloud Computing networks. CBWOA is evaluated in an experimental cloud using the current routing protocols against old routing protocols of the performance network. Finally, the best route in cloud networks is founded successfully and the performance of the developed protocol is associated with two factors, the first one is maximizing (the throughput with efficiency 93.4921% and the Packet delivery ratio with efficiency 90.3087%) and the second one is minimizing (the delay with efficiency 62.1788% and the energy consumed with efficiency 51.1406%).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49127578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-30DOI: 10.22247/ijcna/2022/214508
N. Khan
– The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and mobile multihop relay WiMAX networks technology to move into the fifth-generation (5G). The 5G network was envisioned to be built to encounter the fundamental challenges of quality of services in existing networks, such as allowing higher data rates, enhanced end-user quality of experience, reduced end-to-end latency, lower energy consumption, and higher traffic capacity. In order to satisfy and achieve the vision of the 5G network, extensive debates are in progress about the numerous techniques to be adapted. The objective of this study is to analyze various techniques for 5G networks to achieve the high enhance Quality of Service (QoS) and Quality of Experience (QoE) for users. Moreover, this paper also discussed several combinations of techniques for the upcoming 5G network, such as mmWave with Massive MIMO, D2D with SDN, D2D with mmWave, and D2D with Machine-to-machine communication and NFV and SDN hybrid. This study will be a significant endeavor in choosing possible techniques for 5G networks and further investigating various combinations of such techniques for future works. To make suitable techniques for the emerging 5G network, guidelines and challenges are highlighted to modify the existing techniques.
{"title":"5G Network: techniques to Increase Quality of Service and Quality of Experience","authors":"N. Khan","doi":"10.22247/ijcna/2022/214508","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214508","url":null,"abstract":"– The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and mobile multihop relay WiMAX networks technology to move into the fifth-generation (5G). The 5G network was envisioned to be built to encounter the fundamental challenges of quality of services in existing networks, such as allowing higher data rates, enhanced end-user quality of experience, reduced end-to-end latency, lower energy consumption, and higher traffic capacity. In order to satisfy and achieve the vision of the 5G network, extensive debates are in progress about the numerous techniques to be adapted. The objective of this study is to analyze various techniques for 5G networks to achieve the high enhance Quality of Service (QoS) and Quality of Experience (QoE) for users. Moreover, this paper also discussed several combinations of techniques for the upcoming 5G network, such as mmWave with Massive MIMO, D2D with SDN, D2D with mmWave, and D2D with Machine-to-machine communication and NFV and SDN hybrid. This study will be a significant endeavor in choosing possible techniques for 5G networks and further investigating various combinations of such techniques for future works. To make suitable techniques for the emerging 5G network, guidelines and challenges are highlighted to modify the existing techniques.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47552561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-30DOI: 10.22247/ijcna/2022/214505
S. Anuradha, P. Kanmani
– Cloud computing is used for large-scale applications. Therefore, a lot of organizations and industries are moving their data to the cloud. Nevertheless, cloud computing might have maximum failure rates because of the great number of servers and parts with a high workload. Reducing the false in scheduling is a challenging task. Hence, in this study, an efficient multi-objective fault detector strategy using an improved Squirrel Optimization Algorithm (ISOA) in cloud computing is proposed. This method can effectively reduce energy consumption, makespan, and total cost, while also tolerating errors when planning scientific workflows. To increase the detection accuracy of failures, the Active Fault Tolerance Mechanism (PFTM) is used. Similarly, the reactive fault tolerance mechanism (RFTM) is used for processor failures. The efficiency of the proposed approach is analysed based on various measurements and performance compared to other approaches.
{"title":"Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing","authors":"S. Anuradha, P. Kanmani","doi":"10.22247/ijcna/2022/214505","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214505","url":null,"abstract":"– Cloud computing is used for large-scale applications. Therefore, a lot of organizations and industries are moving their data to the cloud. Nevertheless, cloud computing might have maximum failure rates because of the great number of servers and parts with a high workload. Reducing the false in scheduling is a challenging task. Hence, in this study, an efficient multi-objective fault detector strategy using an improved Squirrel Optimization Algorithm (ISOA) in cloud computing is proposed. This method can effectively reduce energy consumption, makespan, and total cost, while also tolerating errors when planning scientific workflows. To increase the detection accuracy of failures, the Active Fault Tolerance Mechanism (PFTM) is used. Similarly, the reactive fault tolerance mechanism (RFTM) is used for processor failures. The efficiency of the proposed approach is analysed based on various measurements and performance compared to other approaches.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45009594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-30DOI: 10.22247/ijcna/2022/214502
Mercy Joseph, Gobi Mohan
– Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.
{"title":"Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment","authors":"Mercy Joseph, Gobi Mohan","doi":"10.22247/ijcna/2022/214502","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214502","url":null,"abstract":"– Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49537086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-30DOI: 10.22247/ijcna/2022/214506
M. Gobi
– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.
{"title":"Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks","authors":"M. Gobi","doi":"10.22247/ijcna/2022/214506","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214506","url":null,"abstract":"– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41390809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-30DOI: 10.22247/ijcna/2022/214509
Abdualrahman Johari, R. Alsaqour
– Network security is a vast topic that combines processes, devices, and technologies. Network security is the group of rules and configurations. This designed to protect the information and networks' integrity, accessibility, and confidentiality using software and hardware. The network nowadays has become complex, which is changing the threat environment. Similarly, smart homes are also becoming prone to security threats. Due to that, ensuring network security is very important. The vulnerabilities of the smart home network can exist in many areas, including users, location, data, and applications. Some smart devices in smart homes may lack system hardening and can have hardcoded passwords, or the passwords can be found without any encryption inside the device or the software. Security of the smart home network is a high priority of the connected devices so that hackers do not get access to sensitive and personal data. Otherwise, this may risk the entire network of the smart home. This research will provide a model to analyze various security concerns of the smart home network. For this research, a qualitative method such as a case study analysis will be done for conducting this research study. In addition, relevant information through the secondary data collection method will be collected. Investigation of various security threats related to smart home networks will be performed, and Blockchain Technology will be used technologies to mitigate the security issues and secure and protect the smart home network secured and protected. In this research, the novel, decentralized, and innovative approach to blockchain technology will be presented, which will be used to enhance the security architecture of the smart home network.
{"title":"Blockchain-Based Model for Smart Home Network Security","authors":"Abdualrahman Johari, R. Alsaqour","doi":"10.22247/ijcna/2022/214509","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214509","url":null,"abstract":"– Network security is a vast topic that combines processes, devices, and technologies. Network security is the group of rules and configurations. This designed to protect the information and networks' integrity, accessibility, and confidentiality using software and hardware. The network nowadays has become complex, which is changing the threat environment. Similarly, smart homes are also becoming prone to security threats. Due to that, ensuring network security is very important. The vulnerabilities of the smart home network can exist in many areas, including users, location, data, and applications. Some smart devices in smart homes may lack system hardening and can have hardcoded passwords, or the passwords can be found without any encryption inside the device or the software. Security of the smart home network is a high priority of the connected devices so that hackers do not get access to sensitive and personal data. Otherwise, this may risk the entire network of the smart home. This research will provide a model to analyze various security concerns of the smart home network. For this research, a qualitative method such as a case study analysis will be done for conducting this research study. In addition, relevant information through the secondary data collection method will be collected. Investigation of various security threats related to smart home networks will be performed, and Blockchain Technology will be used technologies to mitigate the security issues and secure and protect the smart home network secured and protected. In this research, the novel, decentralized, and innovative approach to blockchain technology will be presented, which will be used to enhance the security architecture of the smart home network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}