Volume 8 Issue 2 -2018

 

Page Title Full Text
8-9 Securing Network communication over Web using Onion Routing
Prof. Neha Singh, Prof. Samruddhi Thawkar
Abstract

In the modern era, all the devices are connected in the network via Internet. So, it becomes a major concern to protect data from  surveillance I.e. monitoring of computer activity, data being transferred over computer networks such as Internet. So, we proposed Onion Routing Protocol to provide security over network,  in terms of providing  users their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Keywords— Security,Onion Routing,Anonymous.


Full Text PDF
10-14 A Survey on Secure Data Sharing In Public Cloud Using Mediated Certificateless Encryption
Savitha N, Dr.S.V.M.G.Bavithiraja, Shanthi T
Abstract

A mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. mCL-PKE scheme is applied to construct a practical solution to the problem of sharing sensitive information in public clouds. In this system, the data owner encrypts the sensitive data using the cloud generated users public keys based on its access control policies and uploads the encrypted data to the cloud. Upon successful authorization, the cloud partially decrypts the encrypted data for the users. The users subsequently fully decrypt the partially decrypted data using their private keys. The confidentiality of the content and the keys is preserved with respect to the cloud, because the cloud cannot fully decrypt the information. To improve the efficiency of encryption at the data owner, mCL-PKE scheme is used and the overall cloud based systems evaluate its security and performance.

Keywords: Cloud Computing, Certificateless Encryption, Public Key, Private key, Access Control, Confidentiality.


Full Text PDF
15-18 PHR System of a Patient using Cloud Computing
Shanthi T, John Augustine P, Savitha N
Abstract

Cloud computing system becomes more popular which allows users to access and extract the sensitive information whenever they require. This is mainly applicable in   medical field, where the patients personal health information is often outsourced to be stored at a third party server, such as cloud providers. When the personal health information are stored and accessed   through the proxy server, security becomes the main concerns. The main goal of this system is to protect patient’s health information data confidentiality and then only the external entities such as doctors and nurses can gain access to the patient’s data with the patient’s consent. Hospitals are now benefitting from data sharing as this provides better, safe care of patients. There is no need to repeat medical history every time a new health professional is consulted which means no more unnecessary tests. The proposed scheme comes out with a novel encryption approach whereas the details of the patient’s health information are encrypted and that encrypted text are stored in cloud database which shows security.

Keywords: Person Health Record, encryption, proxy server, cloud provider.


Full Text PDF
19-22 High Utility Dataset Using Data Mining
Monisha D and Arul Kumar V
Abstract

High Utility Datasets(HUDs) mining is an popular technique  in the  data mining, which relates to search all datasets having an profits (utilities) higher than a customer-specified minimum profit point (threshold). Although, setting appropriate point value is a trouble for the customers. If the point is set to be too low, excessively numerous HUDs will be made, which may bring about the mining procedure extremely insufficient. And also, if the point is set to be too high, it comes out with no HUDs will be found. Setting point value is a problem by proposing a new setup for top-k high utility dataset mining, where k is the desired number of HUDs to be mined. The fundamental algorithm named TKU (mining Top-K Utility datasets) used for mining those datasets without the need of setting least benefit. The proposed scheme for utility mining with top-k HUDs in databases will provide a basic demonstration of the algorithm consult on their utilization and breaking points. Evaluate estimate on both certified and recreated datasets shows the activity of the propelled Opinion Mining algorithms around the best utility mining algorithms.

Keywords-Utility Mining, High Utility Dataset mining, Top-k pattern mining, Frequent dataset.


Full Text PDF
23-27 Web Based Application For Secure Online Voting System
Ilakkiyavani R and Shanthi S
Abstract

Data Mining  is an analysis tool used to extract  knowledge from vast amount of  data with security for effective decision making. Online voting system uses this technique, to increase transparency at highest level and to increase  operational effectiveness to minimize piracy of data and also to have faster access of  secure data for effective decision making. Since some years ago, different methods, such as the secret ballot method or the punch card systems have been held to carry on electoral processes, where  people have to visit the booth to cast their votes in the existing system. Since then Android app fast evolution of Information Technology, voting systems have emerged, which allow a voter to be part of an automated process, that can only be possible through Voting Systems. The proposed system is online and hence even people who live out of their home town can also vote. Increasing the voting percentage is the major goal. The main objective of  proposed  system is to provide, a quick and efficient retrieval of information.
Keywords: Data Mining, Voting System, Electoral Process, Encryption and Decryption.


Full Text PDF

 

 

 

 

 

IJCSET Menu

Downloads