Browse Items (11855 total)
Sort by:
-
Securing International Law Against Cyber Attacks through Blockchain Integration
Cyber-attacks have become a growing concern for governments, organizations, and individuals worldwide. In this paper, we explore the use of blockchain technology to secure international law against cyber-attacks. We discuss the advantages of blockchain technology in providing secure and transparent data storage and transmission, and how it can enhance the security of international law. We also review the current state of international law regarding cyber-attacks and the need for a robust and effective legal framework to address cyber threats. The study proposes a blockchain-based approach to secure international law against cyber-attacks. We examine the potential of blockchain technology in providing a decentralized and tamper-proof database that can record and track the implementation of international laws related to cyber-attacks. We also discuss how smart contracts can be utilized to automate compliance with international laws and regulations related to cybersecurity. The study also discusses the challenges and limitations of using blockchain technology to secure international law against cyber-attacks. These include the need for interoperability between different blockchain networks, the high energy consumption of blockchain technology, and the need for international cooperation in implementing and enforcing international laws related to cybersecurity. Overall, this study provides a comprehensive overview of the potential of blockchain technology in securing international law against cyber-attacks. It highlights the need for a robust legal framework to address cyber threats and emphasizes the importance of international cooperation in implementing and enforcing international laws related to cybersecurity. 2023 IEEE. -
Securing her digital footprint: AI for women's safety
This chapter emphasizes the importance of artificial intelligence (AI) tools, analysis about the existing AI tools, and recommendations for future AI tools for women's safety. AI is experiencing significant growth and influence in the current era. Several key trends and developments highlight the role of AI in various domains: AI is being used for medical diagnosis, drug discovery, and patient care. Machine learning models are helping doctors analyse medical images, predict disease outcomes, and personalize treatment plans. Self-driving cars and drones are utilizing AI algorithms for navigation, obstacle detection, and decision-making. These technologies are advancing transportation and logistics. Natural language processing models like GPT-3 are transforming language-related tasks, from chatbots and virtual assistants to content generation, translation, and sentiment analysis. This chapter highlights the AI tools that exist for women's safety in the digital world and future apps needs for the same. 2024, IGI Global. All rights reserved. -
Securing grayscale image using improved Arnold transform and ElGamal encryption
The security of sensitive data is critical, and it opens up a wide area of research to find efficient and effective methods to prevent unauthorized access. Our study provides a secure framework for sending visual information over an untrusted channel, such as a social networking site. The proposed framework is a combination of scrambling and encryption techniques. Initially, a hybrid block-wise and pixel-wise scrambling approach is administered to the grayscale image, followed by the Arnold transform, which causes all pixel points to move within the image. Finally, to improve the efficiency of the diffusion process, the asymmetric encryption ElGamal algorithm has been mastered. Peak-signal-To-noise ratio (PSNR), structural similarity index metric (SSIM), number of pixels change rate (NPCR), and unified average changing intensity (UACI) are the metrics utilized to evaluate the efficiency of the proposed scheme. The efficiency of the suggested scheme validates the low-Average PSNR value of <9 dB and the SSIM average value of <0.01 for the encrypted images. The NPCR and UACI values achieved in our study are above the threshold values of 99.6% and 33.33%, respectively, exhibiting the strength of the proposed framework. 2022 SPIE and IS&T. -
Securing end user computing environments using blockchain
COVID-19's phenomenal effect has expedited the adoption of digital technologies over several years, indicating that several of these breakthroughs are here to stay. Several enabling technologies are currently being implemented as major solutions for improving and responding to the pandemic's numerous issues, with blockchain being one of the preferred solution options. Blockchain can be used to re-structure processes, resulting in most effective operational and business models (e.g., democratising quality cancer detection with advanced artificial intelligence based radiomics technologies). The authors posit here that while there is a lot of anticipation about using blockchain to improve business capabilities, the lessons learned from the many pilots and proofs of concept so far should be considered. The necessity for a structured, formal decision-making process, based on good business logic and an awareness of the problem's process lifecycle, is however critical. Blockchain is a means to an end, not an end in and of itself. 2024, IGI Global. All rights reserved. -
Securing cloud data against cyber-attacks using hybrid aes with MHT algorithm
Cloud computing is dealing with large amount of data during data communication. This data processing is named as big data. The big data is growth of the demand in accessing the storage, computation and communication. This big data has the major defects. A raising issue in emerging big data is cost minimization. The architecture of big data ranges over multiple machines and cluster which have sub system. The major challenge of this big data is preprocessing and analysing the data patterns. This research article is dealing with different data pre-processing and secure data storage. There are many research challenges during this data process. The possible gap and drawbacks in the technology are identified through this survey and the efficient big data service is provided through MHT and AES algorithm. The main aim of this proposed method is to provide better data security during larger data process. The proposed hybrid MHT with AES algorithm is to minimize the encryption and decryption time apart from that it reduces the attacker ratio. All these parameters automatically increase the Quality of Service. Copyright Research Institute for Intelligent Computer Systems, 2020. All rights reserved. -
Securing Automated Systems with BT: Opportunities and Challenges
The use of automated systems is becoming increasingly prevalent in various industries; however, they pose significant security risks. In order to enhance the security of these systems, Blockchain Technology (BT) provides a promising solution. This chapter discusses the opportunities and challenges associated with using BT to secure automated systems. The role of BT in securing automated systems is discussed, emphasizing its ability to improve security and transparency. Additionally, BT-based systems with enhanced security are examined, such as decentralized data management, immutable and transparent ledgers, reduced cyber-attacks, and secure data sharing. Despite these opportunities, challenges such as high computational power requirements, integration challenges, BT scalability, and regulatory challenges must be addressed. Utilizing BT can create a more secure and transparent system that can help to prevent fraud, hacking, and other forms of cyber-attacks, ultimately enhancing the reliability and safety of automated systems. In conclusion, this paper highlights the potential of using BT for securing automated systems and the need for continued research and development to overcome the challenges associated with its implementation. 2024 selection and editorial matter, Nidhi Sindhwani, Rohit Anand, A. Shaji George and Digvijay Pandey; individual chapters, the contributors. -
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure
This present research proposes the digitalised healthcare system that enables patients to generate, aggregate and store in the form of personal health records (PHRs). This requires more attention on cost effectiveness and less response time on public cloud platform. The existing cloud platforms have failed to implement the systemic approach for immediate verification and correction models on increasing PHR datasets. The storage and computation are two prime factors. Moreover, cloud systems need more attention on security and privacy breaches. In this proposed model the publisher-observer pattern-based healthcare systems allow the patients to verify and correct the PHRs before any type of computations. The cloud system acts as a backend framework that offers openness and easy accessibility. The experimental segment ensures the computational cost and response time for multiple polynomial PHR variations. The details evaluation also ensures the security and privacy preservation on sensitive healthcare datasets. Copyright 2022 Inderscience Enterprises Ltd. -
Secured Health Insurance Management
Many Low- and Middle-Income Countries (LMICs) have expanded their healthcare coverage over the past decade thanks to reforms and investments motivated by Universal Health Coverage (UHC). UHC strives to guarantee that all individuals have access to high-quality healthcare, protecting them from public health hazards and financial hardship caused by the need to treat sick family members. With UHC as its end objective, this study examines health insurances function as a policy instrument to address health funding. Here, researchers study the laws to ensure that all Indians have access to health care and how technology facilitates quicker participation in health insurance programs. The data was collected between August and October of 2022. The study was designed as a cross-sectional case study: (i) the research on the effects of UHC, (ii) documents about Indias health insurance systems (HIS), and (iii) a discussion of the benefits and challenges of using MedStrat, a homegrown digital Health Insurance Management System (HIMS), to run health insurance programs across different states in India. Data from research and document evaluations, as well as health insurance statistics, were triangulated with modern technology adoption models to determine (i) factors that influence the rate at which digital insurance plans are adopted, (ii) the effect of technology on increasing peoples access to health insurance; and (iii) the potential for the digital insurance intervention to be scaled further. Digital insurance administration systems can increase insurance enrolment, especially among low-income households. There are three enabling contexts for digital insurance plan adoption: supportive regulation, public-private partnerships, and ongoing stakeholder contact and education. There are three essential requirements for digital health insurance programs to be widely adopted in India and other similar situations. (i) user-friendliness; (ii) an established network for digital insurance policies; and (iii) confidence, which may be shown through measures like encrypted data storage, complete audit trails, and built-in fraud protection. Our results prove that digital health technologies hold great promise for achieving UHC in LMICs. 2024 Scrivener Publishing LLC. -
Secured Electronic Transactions Using Visual Encryption: An E-Commerce Instance
The developments in the information technology has led the modern world to rely on the internet for digital information. People around the world depend on the internet for every information from general information to sharing confidential data over the network. Technology has grown so wide that even all the transactions are happening through online platforms. Along with this, there has been a rise in the security threats of the user's confidential data which are shared by the users while buying goods online. To maintain the security there are many authentication techniques available today like OTP, CAPTCHA etc. These security measures taken till now have been adequate till the present day but over time the hackers would find out ways to attack. Data breaches and hacking of user data would increase day by day if preventive measures are not taken time to time. This project focuses on providing security to the user's confidential data with a two way authentication technique. The aim of the project is to include one more security level to the existing online transaction system. The visual cryptographic method is used along with the OTP generating system. 2018 IEEE. -
Secured Cloud Computing for Medical Database Monitoring Using Machine Learning Techniques
A growing number of people are calling on the health-care industry to adopt new technologies that are becoming accessible on the market in order to improve the overall quality of their services. Telecommunications systems are integrated with computers, connectivity, mobility, data storage, and information analytics to make a complete information infrastructure system. It is the order of the day to use technology that is based on the Internet of Things (IoT). Given the limited availability of human resources and infrastructure, it is becoming more vital to monitor chronic patients on an ongoing basis as their diseases deteriorate and become more severe. A cloud-based architecture that is capable of dealing with all of the issues stated above may be able to provide effective solutions for the health-care industry. With the purpose of building software that would mix cloud computing and mobile technologies for health-care monitoring systems, we have assigned ourselves the task of designing software. Using a method devised by Higuchi, it is possible to extract stable fractal values from electrocardiogram (ECG) data, something that has never been attempted previously by any other researcher working on the development of a computer-aided diagnosis system for arrhythmia. As a result of the results, it is feasible to infer that the support vector machine has attained the best classification accuracy attainable for fractal features. When compared to the other two classifiers, the feed forward neural network model and the feedback neural network model, the support vector machine excels them both. Furthermore, it should be noted that the sensitivity of both the feed forward neural network and the support vector machine yields results that are equivalent in quality (92.08% and 90.36%, respectively). 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Secured automated voice controller based on security parameters /
Patent Number: 202241001260, Applicant: Jabez samuel F.
A smart home security system (700) comprising: a wearable (701) worn by a family user, wherein the wearable (701) comprises: sensors (711a-711e) configured to sense signals representing security parameters of the registered family user; a location detector (712) configured to detect real-time coordinates the family user. -
Secured automated contactless vehicle door access system based on thermal mechanism of sensory devices /
Patent Number: 202141043350, Applicant: Dr.S.Balakrishnan.
Automatic entrance/exit door control is widely used in public places such as grocery stores, businesses, transportation stations, airports, and wholesale department stores to eliminate the need of manually opening and closing actions in this pandemic outbreak. Contemporary sensor based automatic door control technologies include infrared, ultrasonic/radio, or other wireless sensing methods. In this work, we designed a smart device which helps to perform a contact less temperature sensing door opening system. -
Secured and Provisioned Access Authentication using Subscribed User Identity in Federated Clouds
Cloud computing has become an essential source for modern trade or market environments by abled frameworks. The exponential growth of cloud computing services in the last few years has resulted in extensive use, especially in storing and sharing the data on various cloud servers. The current trend in the cloud shows that the cloud owners use relative functions and target areas in such a way that cloud customers access or store their data either in the same servers or related servers. Simultaneously, from the security point of view, the lack of confidence about the customer's data on the cloud server is still questionable. The hour's need is to provide the cloud service in a single port way by forming the joint management policy to increase customer satisfaction and profitability. In addition to this, the authentication steps also need to be improvised. This paper discusses issues on the security authentication and access provisioning of the cloud service consumers in federated clouds using subscribed user identity. This work proposes the user identity verification module (UidVM) in the cloud service consumer's authentication process to serve as a cloud broker to minimize the work overloads on the central cloud federation management system, thus enhancing the cloud security. 2021. All Rights Reserved. -
Secured and flexible user authentication protocol for wireless sensor network
Purpose: In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused. Design/methodology/approach: In previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique. Findings: Here, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished. Originality/value: The foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner. 2020, Emerald Publishing Limited. -
Secure visual cryptography scheme with meaningful shares
Visual cryptography is an outstanding design, which is also known as visual secret sharing. It used to encode a secret portrait into various pointless share images. Normally, item bossed on transparencies and decrypts as loading one or two or the entire share images by means of the human visual system. Suppose, if we encompass great sets of secret shares then the pointless shares are complicated to handle. In this paper, a meaningful secret sharing algorithm and a modified Signcryption algorithm is used to enhance the security of the Visual Cryptography encryption schemes. The foremost intend of the anticipated format is to extend consequential shares and similarly make sure the isolation on conveying the secret data. The anticipated process is executed in the functioning platform of MATLAB and the presentation results are investigated. 2020, Engg Journals Publications. All rights reserved. -
Secure Through Development: Evaluation of Indias Border Area Development Programme
The Border Area Development Programme was initiated in the year 198687, to strengthen Indias security by ensuring developed and secure borders. Initially, the programme was implemented in the western border states to facilitate deployment of the Border Security Force. Later, the geographical and functional scope of the programme was widened to include eastern and northern sectors of Indias borders and as well as socio-economic aspects such as education, health, agriculture and other allied sectors. But, it is difficult to say that the implementation has been uniform in all the sectors. While the programme on the Western front along the IndiaPakistan border has been fairly successful, it is yet to achieve its stated objectives on the Eastern front. Using an analytical framework, the article examines three aspects of BADP: Its context and concept; identifying challenges that hinder the Programmes effectiveness; and certain policy prescriptions. 2019, 2019 Institute for Defence Studies and Analyses. -
Secure provenance-based communication using visual encryption
Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are good number of security mechanisms in place to withstand the cyber-attacks. Almost all of these algorithms uses complex mathematical calculations in providing security for the systems. Visual cryptography is a peculiar approach which uses concept of secret sharing by dividing the message into transparencies as encryption process. Upon superimposing transparencies one obtains the original message. In this paper, we propose secret sharing as a notion of security onto data provenance. Main inference of this writing is to throw a model combining above two mentioned aspects which gives away an indigenous solution in the area of information security. This proposed model is implemented with specific use case scenarios for substantiation and related analysis. Simulated results and discussion of the same is presented in the paper. 2019 Inderscience Enterprises Ltd. -
Secure multi-party computation protocol using asymmetric encryption
Privacy preservation is very essential in various real life applications such as medical science and financial analysis. This paper focuses on implementation of an asymmetric secure multi-party computation protocol using anonymization and public-key encryption where all parties have access to trusted third party (TTP) who (1) doesn't add any contribution to computation (2) doesn't know who is the owner of the input received (3) has large number of resources (4) decryption key is known to trusted third party (TTP) to get the actual input for computation of final result. In this environment, concern is to design a protocol which deploys TTP for computation. It is proposed that the protocol is very proficient (in terms of secure computation and individual privacy) for the parties than the other available protocols. The solution incorporates protocol using asymmetric encryption scheme where any party can encrypt a message with the public key but decryption can be done by only the possessor of the decryption key (private key). As the protocol works on asymmetric encryption and packetization it ensures following: (1) Confidentiality (Anonymity) (2) Security (3) Privacy (Data). 2014 IEEE. -
Secure medical sensor monitoring framework using novel optimal encryption algorithm driven by Internet of Things
Recently, healthcare monitoring systems have emerged as significant tolls for constant monitoring of patient's physiological characteristics. These systems use implanted sensors. IoT (Internet of Things) have revolutionized healthcare systems where health care equipment's are equipped with many sensors that actively collect data from patients and pass it on to cloud based storages using gateway sensors. Securing data have been significant barriers in many applications as false information get injected, or important information are modified or stolen at different phases of health care systems dependent on IoT. The attacks can also result in fatalities making it imperative to secure IoT based health care systems. A Hybrid technique combining MOAES (Modified Optimal Advanced Encryption Standard) with CM (Chaotic Map) Encryptions called HMOAES-CM technique is proposed. This technique can be helpful in securely accessing the patient data over online mode, and in addition, the data sharing can be performed in an encrypted form for the necessary targets of stakeholders. The proposed authentication approach is aimed at IoT, which is resilient to all kinds of network attacks and its implementation is also simpler. Comparing the suggested work to similar works, the level of evaluation is much improved. 2023 The Authors -
Secure magnetic resonance image transmission and tumor detection techniques
The transmission of important medical diagnostic, MRI (Magnetic Resonance Imaging) images are vulnerable to third party hackers who does spoofing and they are able to introduce faulty and noisy data that damage the transmission data, which hinders the proper medical diagnostics, research and credibility of labs and doctors, there is a clear lack of awareness and lack of proper security measures taken in transmission of MRI images in the present labs, hospitals and research centers. This project is helpful to reduce the problem of secure transmission of medical images. There are many algorithms which can be applied to these medical images. This project is helpful to provide good security to medical images during transmission. Tumor detection or prediction in medical science is a very complex and expensive job, which is not yet been addressed properly and no proper graphical user interface exists in an open source environment. This project is dedicated to analyze the best tumor detection from an MRI brain image after several segmentation methods such as K-means Clustering and Watershed segmentation. Security is realized considering various techniques for encryption and decryption of the image. The encryption technique finally selected after the survey was based on Rivest, Shamir & Adleman [RSA] algorithm. 2016 IEEE.