Introduction to Internet of Things
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1086-1090, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.10861090
Abstract
Internet of things (IoT) is a new technology uses sensors, networking, big data, and artificial intelligence technology to deliver complete systems for a product or service. Billions of devices are expected to be associated into the system and that shall require huge distribution of networks as well as the process of transforming raw data into meaningful inferences. Internet of Things (IoT) has provided a promising opportunity to build powerful industrial systems and applications by leveraging the growing ubiquity of RFID, wireless, mobile and sensor devices. A wide range of Internet of Things applications have been developed and deployed in recent. In an effort to understand the development of IoT in industries, this paper reviews the current research of IoT, key enabling technologies, major IoT applications in industries and identifies research trends and challenges.
Key-Words / Index Term
RFID, IoT, PDA’s, Smartphones, WSN, SOA, Sensors, Objects
References
[1] D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), The Internet of Things, Springer, 2010. ISBN: 978-1-4419-1673-0.
[2] J. Zheng, D. Simplot-Ryl, C. Bisdikian, and H. Mouftah, “The Internet of Things,” in IEEE Communications Magazine, Volume:49 , Issue: 11,pp:30-31, 2011.
[3] Y. Huang and G. Li, “Descriptive Models for Internet of Things,” in IEEE International Conference on Intelligent Control and Information Processing (ICICIP), August 2010.
[4] T. Fan and Y. Chen, “A Scheme of Data Management in the Internet of Things,” in 2nd IEEE International Conference on Network Infrastructure and Digital Content, Sept. 2010.
[5] Y. Huang and G. Li, “A Semantic Analysis for Internet of Things,” in International Conference on Intelligent Computation Technology and Automation (ICICTA), May 2010.
[6] Q. Zhou and J. Zhang, “Research Prospect of Internet of Things Geography,” in 19th International Conference on Geoinformatics, June 2011.
[7] J. Li, Z. Huang, and X. Wang, “Countermeasure Research about Developing Internet of Things Economy,” in International Conference on E -Business and E -Government (ICEE), May 2011.
[8] Y. Yu, J. Wang, and G. Zhou, “The Exploration in the Education of Professionals in Applied Internet of Things Engineering,” in 4th International Conference on Distance Learning and Education (ICDLE), October 2010.
[9] L. Tan, and N. Wang, “Future internet: The Internet of Things,” in Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), August 20-22, 2010, pp.V5-376-380.
[10] X. Jia, O. Feng, T. Fan, and Q. Lei, “RFID technology and its applications in Internet of Things (IoT),” in Proceedings of the 2nd IEEE International Conference on Consumer Electronics, Communications and Networks (CECNet), April 21-23, 2012, pp.1282-1285.
[11] C. Sun, “Application of RFID technology for logistics on Internet of Things,” AASRI Procedia, vol.1, pp.106-111, 2012.
[12] E. W. T. Ngai, K. K. Moon, F. J. Riggins, and C. Y. Yi, “RFID research: an academic literature review (1995–2005) and future research directions,” International Journal of Production Economics, vol.112, no.2, pp.510-520, 2008.
[13]S. Li, L. Xu, and X. Wang, “Compressed sensing signal and data acquisition in wireless sensor networks and Internet of Things,” IEEE Transactions on Industrial Informatics, vol.9, no.4, pp. 2177-2186, 2013.
[14] W. He, and L. Xu, “Integration of distributed enterprise applications: a survey,” IEEE Transactions on Industrial Informatics, vol.10, no. 1, pp.35-42, 2014.
[15] D. Uckelmann, M. Harrison, and F. Michahelles, “An architectural approach towards the future internet of things”, in Architecting the Internet of Things, pp. 1-24, Springer, 2011.
[16] S. Li, L. Xu, X. Wang, J. Wang, “Integration of hybrid wireless networks in cloud services oriented enterprise information systems,” Enterprise Information Systems, vol.6, no.2, pp.165-187, 2012.
[17] Li. Wang, L. Xu, Z. Bi, Y. Xu,”Data Filtering for RFID and WSN Integration,” IEEE Transactions on Industrial Informatics, vol.10, no.1, pp. 408-418, 2014.
[18] L. Ren, L. Zhang, F. Tao, X. Zhang, Y. Luo, Y. Zhang, “A methodology towards virtualization-based high performance simulation platform supporting multidisciplinary design of complex products,” Enterprise Information Systems, vol.6, no.3, pp.267-290, 2012.
[19] F. Tao, Y. Laili, L. Xu, L. Zhang, “FC-PACO-RM: a parallel method for service composition optimal-selection in cloud manufacturing system,” IEEE Transactions on Industrial Informatics, vol.9, no.4, pp.2023-2033, 2013.
[20] Q. Li, Z. Wang, W. Li, J. Li, C. Wang, R. Du, “Applications integration in a hybrid cloud computing environment: modelling and platform,” Enterprise Information Systems, vol.7, no.3, pp.237-271, 2013.
[21] D. Bandyopadhyay, and J. Sen, “Internet of things: applications and challenges in technology and standardization,” Wireless Personal Communications, vol.58, no.1, pp.49-69, 2011.
[22] ITU NGN-GSI Rapporteur Group, “Requirements for support of USN applications and services in NGN environment,” Geneva: International Telecommunication Union (ITU), 2010.
[23] L. Atzori, A. Iera, and G. Morabito, “The Internet of things: a survey,”
Computer Networks, vol.54, no.15, pp.2787-2805, 2010.
[24] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: vision, applications and research challenges,” Ad Hoc Networks, vol.10, no.7, pp.1497-1516, 2012.
[25] O. Vermesan, P. Friess, P. Guillemin, “Internet of things strategic research
roadmap,” The Cluster of European Research Projects, 2009, available from http://www.internet-of-things-research.eu/pdf/IoT
Cluster Strategic Research Agenda 2009.pdf
[26] H. Sundmaeker, P. Guillemin, P. Friess, “Vision and challenges for realizing the Internet of Things,” European Commission, 2010.
[27] K. Voigt, “China looks to lead the Internet of Things,” 2012. Available at http://www.cnn.com/2012/11/28/business/china-internet-of-things/
[28] H. Zhang, and L. Zhu, “Internet of Things: key technology, architecture and challenging problems,” in Proceedings of 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), June 10-12, 2011, pp. 507-512.
[29] S. Wang, L. Li, K. Wang, J. Jones, “e-business system integration: a systems perspective,” Information Technology and Management, vol.13, no.4, pp.233-249, 2012.
[30] F. Tao, H. Guo, L. Zhang, Y. Cheng,“Modelling of combinable relationship-based composition service network and the theoretical proof of its scale-free characteristics,” Enterprise Information Systems, vol.6, no.4, pp.373-404, 2012.
[31] L. Xu, W. Viriyasitavat, P. Ruchikachorn, A. Martin, “Using propositional logic for requirements verification of service workflow,” IEEE Transactions on Industrial Informatics, vol.8, no. 3, pp.639-646, 2012.
[32] D. Paulraj, S. Swamynathan, M. Madhaiyan, “Process model-based atomic service discovery and composition of composite semantic web services using web ontology language for services,” Enterprise Information Systems, vol.6, no.4, pp.445-471, 2012.
[33] H. Panetto, J. Cecil, “Information systems for enterprise integration, interoperability and networking: theory and applications,” Enterprise Information Systems, vol.7, no.1, pp.1-6, 2013.
[34] W. Viriyasitavat, L. Xu, A. Martin, “SWSpec, service workflow requirements specification language: the formal requirements specification in service workflow environments,” IEEE Transactions on Industrial Informatics, vol.8, no.3, pp.631-638, 2012.
[35] S. Hachani, L. Gzara, H. Verjus, “A service-oriented approach for flexible process support within enterprises: an application on PLM systems,” Enterprise Information Systems, vol.7, no.1, pp.79-99, 2013.
[36] L. Xu, “Enterprise Systems: state-of-the-art and future trends,” IEEE Transactions on Industrial Informatics, vol.7, no.4, pp. 630-640, 2011.
[37] M. C. Domingo, “An overview of the Internet of Things for people with disabilities,” Journal of Network and Computer Applications, vol.35, no.2, pp.584-596, 2012.
[38] C. H. Liu, B. Yang, and T. Liu, “Efficient naming, addressing and profile services in Internet-of-Things sensory environments,” Ad Hoc Networks, in press, 2013.
Citation
Bagadhi Sateesh, "Introduction to Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1086-1090, 2018.
Text Clustering Techniques : A Review
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1091-1099, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.10911099
Abstract
Text clustering is an unsupervised data mining technique which involves the process of classifying an unlabeled dataset into the groups of similar data objects. These groups are known as clusters; each cluster consists of data objects such that the data objects are more similar within the same group and dissimilar to the data objects of other groups. There is a variety of text clustering techniques used to compute the similarity among the given unlabeled dataset patterns. Moreover, huge literature is available on clustering algorithms and a comprehensive survey would also be an immense task. The purpose of this paper is an attempt to explore the text clustering techniques and to facilitate the researchers for the future inventions. In this paper, literature survey of different text clustering techniques has been performed and presented an analysis of various studies in this area. After reviewing various text clustering techniques from different aspects, this paper suggests research directions for the researchers in this field that can be proved useful for the researchers. Survey of text clustering techniques is performed for the English text/documents as well as for the documents in vernaculars like Gurumukhi script.
Key-Words / Index Term
Text clustering, Clustering techniques, Data mining techniques, Unsupervised learning, Machine learning
References
[1]. S.Prabha, K.Duraiswamy, M.Sharmila, “Analysis of Different Clustering Techniques in Data and Text Mining” International Journal of Computer Science Engineering (IJCSE), Vol. 3, PP. 107-116, 2014.
[2]. Han, J., Kamber, M., & Tung, A. K., “Spatial Clustering Methods in Data Mining: A Survey”, Geographic Data Mining and Knowledge Discovery, Taylor and Francis, PP. 1–29, 2001.
[3]. Ester, M., Kriegel, H., Sander, J., & Xu, X., “A Density-Based Algorithm for Discovering Clusters in Large Spatial Database with Noise”, Second International conference on Knowledge Discovery and Data Mining, Portland, PP. 226-231, 1996.
[4]. Gholamhosein Sheikholeslami, Surojit Chatterjee, Aidong Zhang, “Wave Cluster: a wavelet-based clustering approach for spatial data in very large databases”, the VLDB Journal, Vol. 8, PP. 289- 304, 2000.
[5]. Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, Prabhakar Raghavan, “Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications”, Data Mining and Knowledge Discovery, PP. 5-33, 2005,.
[6]. Michael Steinbach, George Karypis Vipin Kumar, “A Comparison of Document Clustering Techniques”, Proc. Knowledge Discovery and Data Mining (KDD) Workshop Text Mining, PP.1-20, 2000.
[7]. Jain, Anil K., M. Narasimha Murty, and Patrick J. Flynn, "Data clustering: a review" ACM computing surveys (CSUR,) No. 3, PP. 264-323, 1999.
[8]. Anjana Gosain, Sonika Dahiya, “Performance Analysis of Various Fuzzy Clustering Algorithms: A Review”, Prodedia Computer Science 79, Elsevier Science Ltd.,Vol. 79, PP. 100-111, 2016.
[9]. Anjana Gosain, Sonika Dahiya, “Performance Analysis of Various Fuzzy Clustering Algorithms: A Review”, Prodedia Computer Science 79, Elsevier Science Ltd., PP. 100-111, 2016.
[10]. R. Krishnapuram, J.M. Keller, “A possibilistic approach to clustering”, IEEE transactions on fuzzy systems, vol. 1, issue: 2, 1993.
[11]. R. Krishnapuram, “Generation of membership functions via possibilistic clustering” published in Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference on, 1994.
[12]. Nikhil R. Pal, Kuhu Pal, James M. Keller, and James C. Bezdek, ”A Possibilistic Fuzzy c-Means Clustering Algorithm”, IEEE Transactions on Fuzzy Systems, Vol. 13, No. 4, 2005.
[13]. Jain, Anil K., M. Narasimha Murty, and Patrick J. Flynn, "Data clustering: a review" ACM computing surveys (CSUR,) No. 3, PP. 264-323, 1999.
[14]. MacQueen, J., “Some methods for classification and analysis of multivariate observations”, Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probabilities, 1, 281-296, 1967.
[15]. Kaufman L, Rousseeuw PJ, “Clustering by means of medoids”. In: Dodge Y, editor. Statistical data analysis based on the L1 norm and related methods. Amsterdam: North Holland/Elsevier. pp. 405–416, 1987.
[16]. Bezdek, J. C., Ehrlich, R., & Full, W., “FCM: The fuzzy C-means clustering algorithm”. Computers & Geosciences, 10 (2–3), 191–203, 1984.
[17]. Krishna, K., & Murty, M. N., “Genetic K-means algorithm”. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 29 (3), 433–439, 1999,
[18]. Aristidis Likasa, Nikos Vlassisb and JakobJ. Verbeekb, “The global k-means clustering algorithm”, Pattern Recognition Society, Elsevier Science Ltd. 36, 451 – 461, 2002.
[19]. Arthur, D., & Vassilvitskii, S., “K-means ++ : The advantages of careful seeding”. In Proceedings of the eighteenth annual ACM-SIAM symposium on discrete algorithms pp. 1027–1035, 2007.
[20]. Kwedlo, W., “A clustering method combining differential evolution with the K-means algorithm”. Pattern Recognition Letters, Elsevier Science Ltd. 32 (12), 1613–1621, 2011.
[21]. Malinen, M. , Mariescu-Istodor, R. , & Fränti, “K-means*: Clustering by gradual data transformation”. Pattern Recognition, 47 (10), 3376–3386, 2014.
[22]. M. Ester, H.-P. Kriegel, J. Sander, X. Xu, “A density-based algorithm for discovering clusters in large spatial databases with noise”, in: Proceedings of Second International Conference on Knowledge Discovery and Data Mining, Portland, OR 1996, pp. 226–231, 1996.
[23]. Derya Birant, Alp Kut, “ST-DBSCAN: An algorithm for clustering spatial–temporal data” Data & Knowledge Engineering, Elsevier Science Ltd. 60, 208–221, 2007.
[24]. Heiko Timm, Christian Borgelt, and Rudolf Kruse, “An Extension of Possibilistic Fuzzy Cluster Analysis” Fuzzy Sets and Systems, Elsevier Science Ltd. Volume 147, Issue 1, 1 October 2004, Pages 3-16, 2004.
[25]. Brendan J. Frey and Delbert Dueck, “Clustering by Passing Messages Between Data Points” Elsevier Science Ltd., vol. 315, pp. 972-976, 2007.
[26]. Chen, M., Li, L., Wang, B., Cheng, J., Pan, L., & Chen, X., “Effectively clustering by finding density backbone based-on kNN”. Pattern Recognition, Elsevier Science Ltd. 60, 486–498, 2016.
[27]. W.L. Cai, S.C. Chen, D.Q. Zhang, “Fast and robust fuzzy c-means clustering algorithms incorporating local information for image segmentation”, Pattern Recognition, Elsevier Science Ltd. 40 (3) 825–838, 2007
[28]. S. Krinidis, V. Chatzis, “A Robust fuzzy local Information C-means clustering Algorithm”, IEEE Trans. Image Process. 19 (5) 1328–1337, 2010.
[29]. Li, C., Zhou, J., Kou, P., Xiao, J., “A novel chaotic particle swarm optimization based fuzzy clustering algorithm”. Neurocomputing, Elsevier Science Ltd. 83, 98–109, 2012.
[30]. Du-Ming Tsai, Chung-Chan Lin, “Fuzzy C-means based clustering for linearly and non linearly separable data”. Pattern Recognition, Elsevier Science Ltd. 44, 1750–1760, 2011.
[31]. Witold Pedrycz, “Conditional Fuzzy C-Means” Pattern Recognition Letters, Elsevier Science Ltd., Vol. 17 PP. 625-631, 1996.
[32]. Prabhjot Kaur and Anjana Gosain, “Density-Oriented Approach to Identify Outliers and Get Noiseless Clusters in Fuzzy C – Means”, Fuzzy Systems (FUZZ), 2010 IEEE International Conference on, 2010.
[33]. Rhee, Frank Chung Hoon, and Cheul Hwang. "A type-2 fuzzy C-means clustering algorithm." In IFSA World Congress and 20th NAFIPS International Conference, 2001. IEEE, Joint 9th, vol. 4, pp. 1926-1929, 2001.
[34]. Prabhjot Kaur, Dr. I. M. S. Lamba, Dr. Anjana Gosain, “Kernelized Type-2 Fuzzy C-means Clustering Algorithm in Segmentation of Noisy Medical Images” Recent Advances in Intelligent Computational Systems (RAICS), IEEE, 2011.
[35]. Rafik A. Aliev, Witold Pedrycz, Babek G. Guirimov, Rashad R. Aliev, Umit Ilhan, Mustafa Babagil, Sadik Mammadli, “Type-2 fuzzy neural networks with fuzzy clustering and differential evolution optimization”, Information Sciences, Elsevier Science Ltd. 181 1591–1608, 2011.
[36]. Ondrej Linda, Milos Manic, “General Type-2 Fuzzy C-Means Algorithm for Uncertain Fuzzy Clustering”, IEEE Transactions on Fuzzy Systems, Vol. 20, No. 5, 2012.
[37]. M.H. Fazel Zarandi, R. Gamasaee, I.B. Turksen, “A type-2 fuzzy c-regression clustering algorithm for Takagi–Sugeno system identification and its application in the steel industry”, Information Sciences, Elsevier Science Ltd. 187,179–203, 2012.
[38]. Indices Samira Malek Mohamadi Golsefid, Mohammad Hossein Fazel Zarandi, “Dual-centers type-2 fuzzy clustering framework and its verification and validation indices” Applied Soft Computing, Elsevier Science Ltd. 1568-4946, 2015.
[39]. S. Malek Mohamadi Golsefid, M.H. Fazel Zarandi, I.B. Turksen, “Multi-central general type-2 fuzzy clustering approach for pattern recognitions”, Information Sciences, Elsevier Science Ltd. Vol. 328, PP 172–188, 2016.
[40]. Jnanendra Prasad Sarkar, Indrajit Saha, Ujjwal Maulik, “Rough Possibilistic Type-2 Fuzzy C-Means clustering for MR brain image segmentation” Applied Soft Computing, Elsevier Science Ltd. Vol. 46, PP 527–536, 2016.
[41]. Zeshui Xu and Junjie Wu “Intuitionistic fuzzy C-means clustering algorithms”, Journal of Systems Engineering and Electronics, IEEE, Vol. 21, Issue: 4, 2010.
[42]. Prabhjot Kaur, Dr. A. K. Soni, Dr. Anjana Gosain, “Robust Intuitionistic Fuzzy C-Means Clustering for linearly and nonlinearly Separable Data”, International Conference on Image Information Processing (ICIIP 2011), IEEE, 2011.
[43]. Tamalika Chaira, “A novel intuitionistic fuzzy C-means clustering algorithm and its application to medical images”, Applied Soft Computing, Elsevier Science Ltd., Vol. 11, PP. 1711–1717, 2011.
[44]. Dawei Xu, Zeshui Xu, Shousheng Liu, Hua Zhao, “A spectral clustering algorithm based on intuitionistic fuzzy information”, Knowledge-Based Systems, Elsevier Science Ltd., Vol. 53, PP. 20–26, 2013.
[45]. Kuo-Ping Lin, Member, IEEE, “A Novel Evolutionary Kernel Intuitionistic Fuzzy C-means Clustering Algorithm”, IEEE Transactions on Fuzzy Systems, Vol. 22, No. 5, 2014.
[46]. Zhong Wang, Zeshui Xu, Shousheng Liu, Zeqing Yao, “Direct clustering analysis based on intuitionistic fuzzy implication”, Applied Soft Computing, Elsevier Science Ltd., Vol. 23, , PP 1–8, 2014.
[47]. Hanuman Verma, R. K. Agrawal and Aditi Sharan, “An Improved Intuitionistic Fuzzy C-means Clustering Algorithm Incorporating Local Information for Brain Image Segmentation”, Applied Soft Computing, Elsevier Science Ltd., Vol. 46, PP. 543–557, 2016.
[48]. Kewen Chen, Zuping Zhang, Jun Long, Hao Zhang, “Turning from TF-IDF to TF-IGM for term weighting in text classification” Expert Systems with Applications, Elsevier Science Ltd., Vol. 66. PP. 245–260, 2016.
[49]. Liangxiao Jiang, ChaoqunLi, ShashaWang, LunganZhang, “Deep feature weighting for naïve Bayesand its application to text classification”, Engineering Applications of Artificial Intelligence, Elsevier Science Ltd., Vol. 52, PP. 26–39, 2016.
[50]. Emre Gungor, Ahmet Ozmen, “Distance and density based clustering algorithm using Gaussian kernel”, Expert Systems With Applications, Elsevier Science Ltd., Vol. 69, PP. 10–20, 2017.
[51]. Saurabh Sharma, Vishal Gupta, “Punjabi Documents Clustering System”, Journal of Emerging Technologies in Web Intelligence, Vol. 5, No. 2, May, 2013.
Citation
Mukesh Kumar, Amandeep Verma, "Text Clustering Techniques : A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1091-1099, 2018.
Review of Hybrid Intrusion Detection System
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1100-1104, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11001104
Abstract
Insurance of computer assets and put away archives is a vital issue in this day and age. Intruders have made numerous triumphant endeavors to topple esteemed organization systems. In spite of the fact that the present security arrangements, for example, firewalls and hostile to infection programming have their critical parts in securing associations however they don`t identify a wide range of attacks of the present digital world. Intrusion detection is a system used to identify different attacks on a system. There are numerous Intrusion detection Systems (IDSs) accessible today. This paper gives a brief introduction about intrusion detection system and its components. Further, classification of intrusion detection system is discussed. Also various researches done in previous years are discussed.
Key-Words / Index Term
intrusion detection system, data mining, confidentiality, integrity, availability, intrusion detector.
References
[1] Sanjay Sharma, R. K. Gupta, “Intrusion Detection System: A Review”, International Journal of Security and Its Applications, Vol. 9, No. 5, pp. 69-76, 2015.
[2] Sheenam, Sanjeev Dhiman, “Comprehensive Review: Intrusion Detection System and Techniques”, IOSR Journal of Computer Engineering, Vol. 18, Issue. 4, pp. 20-25, 2016.
[3] Rajni Tewatia, Asha Mishra, “Introduction To Intrusion Detection System: Review”, International Journal of Scientific & Technology Research, Vol. 4, Issue. 5, pp. 219-223, 2015.
[4] D. Ashok Kumar, S. R. Venugopalan, “Intrusion Detection Systems: A Review”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 8, pp. 356-370, 2017.
[5] Kajal Rai, M. Shyamala Devi, “Intrusion Detection Systems: A Review”, Journal of Network and Information Security, Vol. 1, Issue. 2, pp. 15-21, 2013.
[6] Shadi Aljawarneh, Muneer Bani Yassein, Mohammed Aljundi, “An enhanced J48 classification algorithm for the anomaly intrusion detection systems”, Springer, 2017.
[7] Varsha Singh, Shubha Puthran, Avanish Tiwari, “Intrusion Detection Using Data Mining with Correlation”, IEEE, International Conference for Convergence in Technology, pp. 620-625, 2017.
[8] Sandeep Kaur, Dr. Sheetal Kalra, “Disease Prediction using Hybrid K-means and Support Vector Machine”, IEEE, 2016.
[9] Roshan Chitrakar, Huang Chuanhe, “Anomaly based Intrusion Detection using Hybrid Learning Approach of combining k-Medoids Clustering and Naïve Bayes Classification”, IEEE, 2012.
[10] Manish Kumar, Dr. M. Hanumanthappa, Dr. T. V. Suresh Kumar, “Intrusion Detection System Using Decision Tree Algorithm”, IEEE, pp. 629-634, 2012.
[11] Imtiaz Ullah, Qusay H. Mahmoud, “A Filter-based Feature Selection Model for Anomaly-based Intrusion Detection Systems”, IEEE, International Conference on Big Data, pp. 2151-2159, 2017.
[12] Luigi Coppolino, Salvatore D’Antonio, Alessia Garofalo, Luigi Romano, “Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks”, IEEE, International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 247-254, 2013.
[13] Saad Mohamed Ali Mohamed Gadal, Rania A. Mokhtar, “Anomaly Detection Approach using Hybrid Algorithm of Data Mining Technique”, IEEE, International Conference on Communication, Control, Computing and Electronics Engineering, 2017.
[14] Jithin Mathew, S. Ajikumar, "Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Vol. 2, Issue. 2, pp.92-97, March-April.2017.
[15] P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques”, Int. J. Sci. Res. in Network Security and Communication, Vol. 5, Issue. 6, pp. 5-8, Dec 2017.
Authors Profile
Citation
S. Soni, P. Sharma, "Review of Hybrid Intrusion Detection System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1100-1104, 2018.
Pruning and Ranking Based Classifier for Efficient Detection of Android Malware
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1105-1109, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11051109
Abstract
Mobile devices that run Android operating system are widely used. The applications running in Android mobiles can have malicious permissions due to malware. In other words, Android applications might spread malware which can sabotage valuable data. Therefore it is essential to have mechanism to classify malware and benign mobile applications running in Android phones. Since Android mobile applications run in the confines of mobile devices and associated servers, it is very challenging task to detect Android malware. Many solutions came into existence to detect malware applications. Of late Abawajy et al. proposed a technique known as Iterative Classifier Fusion System (ICFS) which employs classifiers iteratively with fusion to generate a final classifier for effective detection of malware. They combined NB tree classifier, Multilayer perception and Lib SVM with polynomial kernel to achieve this. However, the system does not focus on reduction or pruning of Android application permissions so as to build a classifier that reduces time and space complexity. In the proposed system, a methodology is proposed that focuses on reduction or pruning of android application permissions and ranking them in order to build a classifier that reduces time and space complexity. The classifier modelled with best ranked permissions can be representative of all permissions as least significant permissions are pruned to reduce search space. This paper built a prototype application to demonstrate proof of the concept. The experimental results revealed that the proposed system performs better in improving detection accuracy besides precision and recall measures.
Key-Words / Index Term
Malware, malware detection technique, pruning, ranking
References
[1] P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. S. Gaur, M. Conti, and M. Rajarajan, “Android security: A survey of issues, malware penetration, and defences,” IEEE Communications Surveys and Tutorials, vol. 17, pp. 998–1022, 2015.
[2] Y. Zhou and X. Jiang, “Dissecting Android malware: Characterization and evolution,” in Proceedings of the 33rd IEEE Symposium on Security and Privacy, San Francisco, CA, pp. 95–109, 2012.
[3] J. Walls and K.-K. R. Choo, “A review of free cloud-based antimalware apps for Android,” in Proceedings of 2015 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Trust Com 2015, vol. 1, pp. 1053–1058, 2015.
[4] S. Naval, V. Laxmi, M. Rajarajan, M. S. Gaur, and M. Conti, “Employing program semantics for malware detection,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2591–2604, 2015.
[5] P. Faruki, S. Bhandari, V. Laxmi, M. Gaur, and M. Conti, “Droid analyst : Synergic app framework for static and dynamic app analysis,” Studies in Computational Intelligence, vol. 621, pp. 519–552, 2015.
[6] L. Sinha, S. Bhandari, P. Faruki, M. S. Gaur, V. Laxmi, and M. Conti, “Flow Mine : Android app analysis via data flow,” in Proceeding of the 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016, pp. 435–441, 2016.
[7] J. Abawajy, M. Chowdhury, and A. Kelarev, ”Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection,” IEEE Transaction on Cloud Com put 3(2):111, 2017.
[8] S. Sheen, R. Anitha, and V. Natarajan, “Android based malware detection using a multi feature collaborative decision fusion approach,” Neuro computing, vol. 151, pp. 905–912, 2015.
[9] S. Naval, V. Laxmi, M. S. Gaur, S. Raja, M. Rajarajan, and M. Conti, “Environment-reactive malware behaviour: Detection and categorization,” in Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, ser. LNCS, vol. 8872, pp. 167–182, 2015.
[10] F. Daryabar, A. Dehghantanha, F. Norouzi, and F. Mahmoodi, “Analysis of virtual honey net and vlan-based virtual networks,” in International Symposium on Humanities, Science and Engineering Research, SHUSER 2011, pp. 73–77, 2011.
[11] K. Zhao, D. Zhang, X. Su, and W. Li, “Fest: A feature extraction and selection tool for Android malware detection,” in 20th IEEE Symposium on Computers and Communication, ISCC 2015, pp. 714–720, 2015
[12] J. Abawajy, A. Kelarev “Iterative Classifier Fusion System for the Detection of Android Malware”. IEEE Transactions on Big Data, Vol. 5, No. 4, p1-12, 2017.
Citation
Ramisetti Uma Maheswari, R Raja Sekhar, "Pruning and Ranking Based Classifier for Efficient Detection of Android Malware," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1105-1109, 2018.
Zinc OS-Linux Based OS for Educational Institutes
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1110-1115, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11101115
Abstract
Now these days educational institutes are facing the challenge of managing the full technologies stack for the students. Most of the institutes are managing their infrastructure on windows operating system. It will take lots of investments to manage the infrastructure on Microsoft technologies like windows operating system, windows server, SQL server, visual studio etc. Our main aim to minimize this investment for the educational institutes. So we want to develop an open source operating system based on linux with simplified UI and experience i.e. Zinc OS. Institutes can use Zinc OS and they can install the windows applications on our operating system. We studied about the development of a common kernel that can support Linux and Windows system calls and provide a common platform for Linux packages and windows software’s. Linux Kernel supports ELF based executable formats but Windows NT Kernel supports PE based executable formats. So it is very difficult to develop a common kernel and operating system which can support to Linux and Windows applications. We provide support for ELF and PE based executable format by using windows application compatibility layer (wine library) on main operating system that converts the windows application calls into linux system calls.
Key-Words / Index Term
Zinc OS, Wine Library, Linux Kernel, Ubuntu OS
References
[1] Rajala, R./Rossi, M. Tuunainen, V. K. “A framework for analyzing software business models”, Presented in the European Conference on Information Systems, Naples, Italy. 2013.
[2] C. T. Lee, Z. W. Hong, and J. M. Lin, “Linux kernel customization for embedded system by using call graph approach,” Asia and South Pacific Design Automation Conference, pp. 689-692,2003.
[3] Kaashoek, M. Frans; O’Toole, James Jr. "Exokernel: An Operating System Architecture for Application-Level Resource Management, MIT, 1995
[4] C. T. Lee, Z. W. Hong, and J. M. Lin, “An application-oriented Linux kernel customization for embedded systems,” National Computer Symposium, 2003.
[5] K. S. Rani, “Open Source Software: A Prominent Requirement of Information Technology” International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256), ol.6 , Issue.2, pp.24-29, Apr-2018
[6] Hemant Malviya, Sita Solanki, “Article Survey of Quality Models for Evaluating Quality in OSS (Open Source Software)”, International Journal of Computer Sciences and Engineering, Vol.4 , Issue.1, pp.15-20, Feb-2016
[7] P. Jayaraju and V. Prakash “Web Based Interface Implementation”, International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639), Vol.3 , Issue.5,pp.6-11, Sep-2015.
[8] LK. Ojha, LK. Tiwary, R.i Sharma, “Information Communication Technology Integration in Education” International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639), Vol.4 , Issue.3, pp.14-15, Jun-2016
Citation
U. Kushwaha, "Zinc OS-Linux Based OS for Educational Institutes," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1110-1115, 2018.
Sentiment Analysis based on Different Machine Learning Algorithms
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1116-1120, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11161120
Abstract
Sentiment analysis is a research topic in the field of text mining. In today’s world it plays an important role as we are living in the age of digital world where each and every work is based on internet. These websites are working totally based on online review of various users. Sentiment analysis has gained focus in recent world due to increase in opinion rich web sources such as twitter, online review of products. This paper presents a review of different machine learning algorithms used for Sentiment analysis. A comparative study is being made on decision tree, Naive Bayes Algorithm and Neural Network. Our system is being tested on four products with positive, negative and neutral review. The system processes the text collected as dataset for review and accordingly it is being trained to classify these reviews efficiently.
Key-Words / Index Term
Sentiment analysis, text mining, machine learning, NLP, Decision Tree, Naive Bayes, Neural Network algorithms
References
[1] Emma Haddi, Xiaohui Liu, Yong Shi, “The Role of Text Pre-processing in Sentiment Analysis”, Information Technology and Quantitative Management (ITQM2013), Procedia Computer Science 17 ( 2013 ) 26 – 32
[2] A. Suresh , C.R. Bharathi, “Sentiment Classifi cation using Decision Tree Based Feature Selection”, IJCTA, 9(36), 2016, pp. 419-425
[3] Anuja P Jain, Padma Dandannavar, “Application of Machine Learning Techniques to Sentiment Analysis”
[4] Lopamudra Dey, Sanjay Chakraborty, Anuraag Biswas, Beepa Bose, Sweta Tiwari, ” Sentiment Analysis of Review Datasets Using Naive Bayes and K-NN Classifier”
[5] Kim Schouten and Flavius Frasincar, ” Survey on Aspect-Level Sentiment Analysis”, IEEE TRANSACTIONS on knowledge and data engineering, vol. 28, no. 3, march 2016.
[6] Alvaro Ortigosa , José M. Martín, Rosa M. Carro, “Sentiment analysis in Facebook and its application to e-learning”, Computers in Human Behavior 31 (2014) 527–541
[7] Raymond Y.K. Lau , Chunping Li, Stephen S.Y. Liao , “Social analytics: Learning fuzzy product ontologies for aspect-oriented sentiment analysis”, Decision Support Systems 65 (2014) 80–94.
[8] Zhi-Hong Deng , Kun-Hu Luo, Hong-Liang Yu, “A study of supervised term weighting scheme for sentiment analysis”, Expert Systems with Applications 41 (2014) 3506–3513
[9] Tahura Shaikh, Dr. Deepa Deshpande, “Feature Selection Methods in Sentiment Analysis and Sentiment Classification of Amazon Product Reviews”, International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 4 - June 2016
[10] Min-Ling Zhang Zhi-Hua Zhou, “A Review on Multi-Label Learning Algorithms”, IEEE TRANSACTIONS ON Knowledge And Data Engineering, VOL. 26, NO. 8, AUGUST 2014
[11] Bo Pang and Lillian Lee, Shivakumar Vaithyanathan, “Thumbs up? Sentiment Classification using Machine Learning Techniques”
[12] Arman S. Zharmagambetov, Alexandr A. Pak, “Sentiment Analysis of a document using deeplearning approach and decision trees”
[13] Ahmed Alsaffar, Nazlia Omar, “Study on Feature Selection and Machine Learning Algorithms For Malay Sentiment Classification”, 2014 International Conference on Information Technology and Multimedia (ICIMU), November 18 – 20, 2014, Putrajaya, Malaysia
[14] V.K. Singh, R. Piryani, A. Uddin, P. Waila, Marisha,” Sentiment Analysis of Textual Reviews”, 2013 5th International Conference on Knowledge and Smart Technology (KST)
[15] V. K. Singh, M. Mukherjee & G. K. Mehta, “Combining Collaborative Filtering and Sentiment Analysis for Improved Movie Recommendations”, In C. Sombattheera et. al. (Eds.):Multi-disciplinary Trends in Artificial Intelligence, LNAI 7080, Springer-Verlag, Berlin-Heidelberg, pp. 38-50, 2011.
[16] V. K. Singh, M. Mukherjee & G. K. Mehta, “Combining a Content Filtering Heuristic and Sentiment Analysis for Movie Recommendations”, In K.R. Venugopal & L.M. Patnaik (Eds.): ICIP 2011, Aug. 2011, CCIS 157, pp. 659-664, Springer, Heidelberg, 2011.
[17] P. Turney, “Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews”, Proceedings of ACL-02, 40th Annual Meeting of the Association for Computational Linguistics, pp. 417-424, Philadelphia, US, 2002.
[18] Walaa Medhat ,Ahmed Hassan, “Sentiment analysis algorithms and applications:A survey” Shams Engineering Journal (2014) 5, 1093–1113
[19] S. Milstein, A. Chowdhury, G. Hochmuth, B. Lorica, and R. Magoulas. “Twitter and the micromessaging revolution:Communication, connections” An OReilly Radar Report. 54 pages, November 2008.
[20] J. Ashok Kumar and S. Abirami, "An Experimental Study Of Feature Extraction Techniques In Opinion Mining," International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.4, No.1,February 2015.
[21] GurneetKaur and AbhinashSingla, “Sentimental Analysis of Flipkart reviews using Naïve Bayes and Decision Tree algorithm,” International Journal Of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 5, ISSN: 2278- 1323, January 2016.
[22] Aashutosh Bhatt, Ankit Patel, Harsh Chheda and Kiran Gawande, "Amazon Review Classification and Sentiment Analysis", International Journal of Computer Science and Information Technologies, Vol. 6, ISSN:0975-9646, 2015.
[23] Lisette García-Moya, Henry Anaya-Sánchez, and Rafael Berlanga-Llavori, “Retrieving Product Features and Opinions from Customer Reviews”, IEEE Intelligent Systems, vol. 28, pp. 1541-1672, May/Jun 2013.
Citation
S. Manna, "Sentiment Analysis based on Different Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1116-1120, 2018.
Applications of Stream ciphers in wireless communications
Technical Paper | Journal Paper
Vol.6 , Issue.6 , pp.1121-1126, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11211126
Abstract
Stream ciphers are widely used in wireless communications to transforms the data and delivers through wireless channel. This paper presents various stream ciphers used for data encryption in different wireless communication technologies. The main purpose of this paper is to provide information on various stream ciphers used in wireless communications.
Key-Words / Index Term
Stream Ciphers, Wireless Communications, GSM, Bluetooth, WEP
References
[1] Goutam Paul and Subhamoy Maitra (2012), RC4 Stream Ciphers and its variants, CRC Press ,Taylor & Francis Group.
[2] RC4 Link
https://www.vocal.com/cryptography/rc4-encryption-algoritm/- R
[3] Lazar Stošić, Milena Bogdanović (2012), RC4 stream cipher and possible attacks on WEP, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 3, 2012.
[4] Shenam Chugh, Kamal(2015),Securing data transmission over Wireless LAN (802.11) by redesigning RC4 Algorithm, 2015,IEEE International Conference on Green Computing and Internet of Things (IeGCloT).
[5] Olakanmi.O, Nigeria (2012), RC4c : A Secured Way to View Data Transmission in Wireless Communication Networks , International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.2, March 2012.
[6] Yao Yao, Jiang Chong, Wang Xingwei(2010), Enhancing RC4 algorithm for WLAN WEP Protocol, IEEEChinese Control and Decision Conference,2010.
[7] Mohsen Toorani, Ali A. Beheshti (2008), Solutions to the GSM Security Weaknesses, Proceedings of the 2nd International Conference on Next Generation Mobile Applications, Services, and Technologies (NGMAST`08), pp.576-581, University of Glamorgan, Cardiff, UK, Sep. 2008.
[8] Slobodan petrovie and Amparo Fuster sabater(2000), Cryptanalysis of The A5/2 algorithm, Instituto de Fisica Aplicada serrano 144 ,28006,Madrid,Spain. Shahzad
[9] Marc Briceno, Ian Goldberg, DavidWagner (1998): A pedagogical implementation of A5/1,http://www.gsm-security.net/papers/a51.shtml.
[10] Jovan Dj. Goli´c: Cryptanalysis of Alleged A5 Stream Cipher, Springer-Verlag (1998).
[11] Thomas Stockinger (2005), GSM network and its privacy- the A5 stream cipher, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.8718.
[12] Eli Biham, Orr Dunkelman (2000), Cryptanalysis of the A5/1 GSM Stream Cipher,Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, (pp.43-51).
[13] Ross Anderson (1998): The GSM cipher, http://groups.google.com/group/sci.crypt/msg/ba76615fef32ba32.
[14] Ch. Naveen, Vishal R. Satpute (2016), Image encryption technique using improved A5/1 cipher on image bit planes for wireless data security, International Conference on Microelectronics, Computing and Communications (MicroCom), 2016.
[15] Komal Rege, Nikita Goenka, Pooja Bhutada, Sunil Mane(2013) ,Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA, International Journal of Computer Applications (0975 – 8887) Volume 71– No.22, June 2013.
[16] Wuling Ren and Zhiqian Miao(2010), "A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication", Second International Conference on Modelling, Simulation and Visualization Methods, 2010.
[17] Bluetooth link-
https://krazycoder.wordpress.com/2010/09/08/basics-of-bluetooth-security/
[18] 3GPP specifications: Link
http://www.3gpp.org/specifications
[19] ETSI/SAGE Specification (2006): Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2, Document 2: SNOW 3G Specification, September 2006.
[20] ETSI/SAGE Technical report (2006): Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 5: Design and Evaluation Report, Version 1.1, September 2006.
[21] ETSI/SAGE Specification(2011): Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification; Version: 1.6; Date: 1st July 2011.
[22] Hadia M.S. El Hennawy , Alaa E.A. Omar , Salah M.A. Kholaif(2015), LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm, Ain Shams Engineering Journal (2015) 6, 57–65.
[23] Mahdi Madani, Ilyas Benkhaddra, Camel Tanougast, Salim Chitroub, and Loic Sieler (2017), Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG, Hindawi Security and Communication Networks Volume 2017, article ID 5746976, 15 pages.
[24] GSM link- http://pages.cpsc.ucalgary.ca/~szrrizvi/cpsc329/t2.html
[25] Romil Gandhi, Amitha Nair, Jason D’Souza (2014), GSM Networks: Substantiation of GSM Stationed algorithm, International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 153.
[26] Khan,Shahzad, Shahid Peracha, Zain Ul Abideen Tariq(2014), Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher, International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014.
[27] Voice and packet encryption -https://security.stackexchange.com/questions/99559/cellular-encryption-algorithms-currently-in-use-globally
[28] Harsh Bhasin, Neha Kathuria Cryptography Automata Based Key Generation, International Journal of Scientific Research in Network Security and Communication , p 15-17,Volume-1, Issue-2, June- 2013
[29] P. Sharma, D.Mishra,V.K. Sarthi,P. Bhatpahri,R. Shrivastava,Visual Encryption Using Bit Shift Technique, International Journal of Scientific Research in Computer Sciences and Engineering, vol.5, Issue.3, pp.57-61, June (2017)
Citation
Y.Nagendar, V. Kamakshi Prasad, Allam Appa Rao, G.Padmavathi, "Applications of Stream ciphers in wireless communications," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1121-1126, 2018.
Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective
Technical Paper | Journal Paper
Vol.6 , Issue.6 , pp.1127-1129, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11271129
Abstract
Several Symmetric Key based algorithms exist for securing data of big size. In Order to investigate the efficient one , performance analysis is often desirable activity over variety of parameters including number of cores or processors. In present work one symmetric key algorithm has been considered for analysis for n=1( Serially) and (n =2) for Parallel analysis, (where n is number of core). The relative gain of serial implementation and tested for efficiency indicates that encryption of data chunks in parallel is the for blowfish algorithm. The findings in this study provides a useful direction to users and designers of low power handheld devices and IOT to exploit faster encryption and decryption of data with more number of cores.
Key-Words / Index Term
Symmetric Key Cryptography, Blowfish , parallel implementation
References
[1] D. Miorandi, S. Sicari, F. D. Pellegrini, I. Chlamtac, Internet of things: Vision, applications and research challenges, Ad Hoc Networks 10 (7) (2012) 1497.
[2] E. Isa, N. Sklavos, “Smart Home Automation: GSM Security System Design and Implementation”, proceedings of the 3rd Conference on Electronics and Telecommunications (PACET’15), Ioannina, Greece, May 8-9, 2015.
[3] M. Katsaiti, A. Rigas, I. Tzemos, N. Sklavos, “Real-World Attacks Toward Circuits & Systems Design, Targeting Safety Invasion”, proceedings of the International Conference on Modern Circuits and Systems Technologies (MOCAST’15), Thessaloniki, Greece, May 14-15, 2015.
[4] N. Sklavos, P. Souras, “Economic Models and Approaches in Information Security for Computer Networks”, International Journal of Network Security (IJNS), Science Publications, Vol. 2, No 1, Issue: January, pp. 14-20, 2006.
[5] S. Gusmeroli, S. Piccione, D. Rotondi, “A capability-based security approach to manage access control in the internet of things”, Mathematical and Computer Modelling 58 (5) (2013) 1189.
[6] Kiev Gama, Lionel Touseau, Didier Donsez, “Combining heterogeneous service technologies for building an Internet of Things middleware”, Computer Communications, Volume 35, Issue 4, 15 February 2012, Pages 405-417, ISSN 0140-3664.
[7] R. Roman, J. Zhou, J. Lopez, “On the features and challenges of security and privacy in distributed internet of things”, Computer Networks 57 (10) (2013).
[8] N. Sklavos, R. Chaves, F. Regazzoni, Wireless-SoC-Security: “FPGA Based System-On-A-Chip Security Schemes for 4G & 5G”, Tutorial, 11th HiPEAC Conference 2016 (HiPEAC’16), Prague, Czech Republic, January 18-20, 2016.
[9] N. Sklavos, “Securing Communication Devices via Physical Unclonable Functions (PUFs)”, Information Security Solutions Europe (isse’13), Brussels, 22-23 October, Belgium, 2013, pp. 253-261, Springer, ISBN: 978-3-658-03370-5
[10]http://circuitcellar.com/cc-blog/light-weight-data-encryption-for-iot-and-m2m-applications).
[11] Peter Mell and Timothy Grance, ‘The NIST Definition of Cloud Computing’ Special Publication 800-145, Jan. 2011.
[12] Shakeeba S. Khan, Prof. R.R. Tuteja, ‘Security in Cloud Computing using Cryptographic Algorithms’ International Journal of Innovative Research in Computer and Communication Engineering , Jan. 2015 , ISSN (Print): 2320-9798 Vol. 3, Issue 1.
[13] Er. Ashima Pansotra and Er. Simar Preet Singh, ‘Cloud Security Algorithms’ International Journal of Security and Its Applications , 2015 , Vol.9, No.10 , pp.353-360.
[14] Ako Muhamad Abdullah, ‘Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data’, June 16, 2017.
[15] B. Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), In proc. Cambridge Security Workshop, 191204 ,1993.
[16] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, New York, 1996.
[17] Soufiane Oukili and Seddik Bri, ‘High Throughput Parallel Implementation of Blowfish Algorithm’ Applied Mathematics & Information Sciences No. 6, 2087-2092 2016
[18] B. Schneier, `The Blowfish Encryption Algorithm`. ‘https://www.schneier.com/academic/blowfish/ .
[19] Shaligram Prajapat , Ramjeevan Singh Thakur, "Cryptic Mining for Automatic Variable Key Based Cryptosystem", Procedia Computer Scienc , Volume 78, PP.199-209,2016,https://doi.org/10.1016/j.procs.2016.02.034
[20] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, IEEE 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp.1-5, Mar, 2016. DOI: dx.doi.org/10.1109/CDAN.2016.7570921
[21] Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms”, IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)”, pp.663-666, March, 2016, DOI: http://www.dx.doi.org/10.13140/RG.2.2.22077.05607
Citation
Manju Suchdeo, Deepak Mawane, Mahek Negandhi, Shipra Sarkar, Shaligram Prajapat, "Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1127-1129, 2018.
A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining
Survey Paper | Journal Paper
Vol.6 , Issue.6 , pp.1130-1139, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11301139
Abstract
In the age of computer driven decision making the Data Science has become a vital important area for the parties storing the data. For the efficient use of available data; users need to excel in better Data Mining through robust Machine Learning techniques. Data mining applications are intensively used in government and corporate sector to analyze data for prediction, pattern recognitions, and classification. Accuracy of data mining algorithm depends on volume of training data. Advancement in computer and communication technologies allowed distributed computing environment, where multiple clients/parties can conduct joint learning process by incorporating distributed data. Distributed data may be arbitrary partitioned among parties. Recent data mining application uses power of cloud computing to execute complex computation involved in learning process. Despite of these advancements, individual or organizations holding data are reluctant to share their sensitive data due to fear of privacy breach and losses. Privacy Preserving Data Mining (PPDM) is solution to protect personal information while sharing it in distributed environment. Privacy preservation is achieved by data randomization or encryption techniques. Robust security to personal information and more accuracy in mining applications, offer more popularity to privacy preservation encryption techniques than data randomization techniques. Homomorphic encryption is one of the popular encryption techniques, where users can perform operations on cipher text; the results are similar to operations on their respective plaintexts. In present survey paper some data mining techniques like- ANN, RDT, SVM and Deep Learning, based on distributed partitioned data such are reviewed in special context to privacy preservation.
Key-Words / Index Term
Data mining, Privacy preservation, homomorphic encryption, ANN, RDT, SVM, Deep Learning
References
[1] L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, “Information security in big data: Privacy and data mining,” IEEE Access, vol. 2, pp. 1151–1178, 2014.
[2] J. P. J. Han, M. Kamber, Data Mining: Concepts and Techniques. San Mateo: Morgan Kaufmann, 2006.
[3] J. Yuan and S. Yu, “Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing,” Tpds, vol. 25, no. 1, pp. 212–221, 2014.
[4] Y. Zhang and S. Zhong, “A privacy-preserving algorithm for distributed training of neural network ensembles,” Neural Comput. Appl., vol. 22, no. S1, pp. 269–282, 2012.
[5] A. Bansal, T. Chen, and S. Zhong, “Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data,” Neural Comput. Appl., vol. 20, no. 1, pp. 143–150, 2011.
[6] M. Chicurel, “Databasing the brain.,” Nature, vol. 406, no. 6798, pp. 822–5, Aug. 2000.
[7] K. Flouri, B. Beferull-Lozano, and P. Tsakalides, “Training a SVM-based classifier in distributed sensor networks,” Eur. Signal Process. Conf., pp. 1–5, 2006.
[8] Q. Zhang, L. T. Yang, and Z. Chen, “Privacy Preserving Deep Computational Model on Cloud for Big Data Feature Learning,” vol. 65, no. 5, pp. 1–11, 2015.
[9] R. L. Grossman, “The case for cloud computing,” IT Prof., vol. 11, no. 2, pp. 23–27, 2009.
[10] R. L. Grossman and Y. Gu, “Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere,” Proc. 14th ACM SIGKDD Int. Conf. Knowl. Discov. data Min., pp. 920–927, 2008.
[11] M. Rajarajan, K. Cumanan, S. Veluru, R. C.-W. Phan, and Y. Rahulamathavan, “Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud,” IEEE Trans. Dependable Secur. Comput., vol. 11, no. 5, pp. 467–479, 2013.
[12] J. Vaidya and C. Clifton, “Privacy-Preserving Data Mining: Why, How, and When,” IEEE Secur. {&} Priv., vol. 2, no. 6, pp. 19–27, 2004.
[13] “Your Rights Under HIPAA | HHS.gov.” [Online]. Available: http://www.hhs.gov/hipaa/for-individuals/ guidance-materials-for-consumers/index.html. [Accessed: 13-May-2016].
[14] T. Chen and S. Zhong, “Privacy-preserving backpropagation neural network learning.,” IEEE Trans. Neural Netw., vol. 20, no. 10, pp. 1554–64, 2009.
[15] C. Gentry, “Fully Homomorphic Encryption without Bootstrapping,” Security, vol. 111, no. 111, pp. 309–325, 2011.
[16] R. Agrawal and R. Srikant, “Privacy-preserving data mining,” Proc. 2000 ACM SIGMOD Int. Conf. Manag. data - SIGMOD ’00, vol. 29, no. 2, pp. 439–450, 2000.
[17] A. C. Yao, “Protocols for secure computations,” 23rd Annu. Symp. Found. Comput. Sci. (sfcs 1982), pp. 1–5, 1982.
[18] O. Goldreich, S. Micali, and A. Wigderson, “How to Play any Mental Game,” Stoc ’87, pp. 218–229, 1987.
[19] Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” J. Cryptol., vol. 15, no. 3, pp. 177–206, 2002.
[20] J. Sen, “Homomorphic Encryption: Theory & Applications,” arXiv Prepr. arXiv1305.5886, pp. 1–32, 2013.
[21] R. L. Rivest, L. Adleman, and M. L. Dertouzos, “On Data Banks and Privacy Homomorphisms,” Found. Secur. Comput. Acad. Press, pp. 169–179, 1978.
[22] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
[23] T. Okamoto and S. Uchiyama, “A new public-key cryptosystem as secure as factoring,” Advance Cryptology—EUROCRYPT’ 1998, Lect. Notes Comput. Sci., vol. 1403, pp. 308–318, 1998.
[24] P. Paillier, “Public-Key Cryptosystems Based on Composite Degree Residuosity Classes,” Adv. Cryptol. — EUROCRYPT ’99, vol. 1592, pp. 223–238, 1999.
[25] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” Inf. Theory, IEEE Trans., vol. 31, no. 4, pp. 469–472, 1985.
[26] C. Gentry, “Fully homomorphic encryption using ideal lattices,” Proc. 41st Annu. ACM Symp. Symp. theory Comput. STOC 09, vol. 19, no. September, p. 169, 2009.
[27] Z. Brakerski, “Fully homomorphic encryption without modulus switching from classical GapSVP,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7417 LNCS, pp. 868–886, 2012.
[28] N. Schlitter, “A Protocol for Privacy Preserving Neural Network Learning on Horizontally Partitioned Data,” 2008.
[29] D. Boneh, E. Goh, and K. Nissim, “Evaluating 2-DNF formulas on ciphertexts,” Theory Cryptogr., pp. 325–341, 2005.
[30] B. Schneier, “Applied Cryptography,” Electr. Eng., vol. 1, no. [32, pp. 429–455, 1996.
[31] J. Vaidya, B. Shafiq, W. Fan, D. Mehmood, and D. Lorenzi, “A Random Decision Tree Framework for Privacy-Preserving Data Mining,” IEEE Trans. Dependable Secur. Comput., vol. 11, no. 5, pp. 399–411, 2014.
Authors Profile
S. B. Javheri in pursed Bachelor of Engineering from North Maharashtra University, Jalgaon, Marashatra, India in 1998 and Master of Engineering from B. V. D. University, Pune, Maharashtra, India in year 2009. He is currently pursuing Ph.D. from S.G.G.S.I.E.& T., Nanded, Maharashtra, India and currently working as Associate Professor in Department of Computer Engineering , JSPM’s Rajarshi Shahu College of Engineering, Pune since 2004. He has published 12 research papers in reputed international journals/conferences. His main research work focuses on information security, machine learning, Neural network. He has 19 years of teaching experience.
U. V. Kulkarni has obtained Bachelor of Engin- eering degree in Electronics from Marathwada University, Aurangabad, Maharashtra, India in 1987. He completed Master of Engineering in system software from Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra, India in 1992. He has completed his Ph.D. in Electronics and Computer Science Engineering in 2002 from Swami Ramanand Teerth Marathwada University Nanded, Maharashtra, India. He is currently working as Professor and Head in Computer Science and Engineering Department at SGGSIE&T (Autonomous), Nanded, Maharashtra, India. He has received National Level Gold Medal and Computer Engineering Division Prize for the paper published in the Journal of Institution of Engineers, titled as Fuzzy Hypersphere Neural Network Classifier, May 2004 and the best paper award for the research paper presented in international conference held at Imperial College London, U.K., 2014. He has published many research papers in reputed National and International Journals. His areas of interest include Microprocessors, Data Structures, Distributed Systems, Fuzzy Neural Networks, and Pattern Classification. He has more than 30 years of teaching experience.
Citation
S. B. Javheri, U. V. Kulkarni, "A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1130-1139, 2018.
Intelligence Paradigm comparative study using ANN and fuzzy logic with respect to WSN
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1140-1143, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11401143
Abstract
In this paper, a picture of energy awareness and parameters in Intelligence paradigm of ANN and fuzzy logic with respect to WSNs is explained so that ultimate intelligence like the human can be optimized by the hybrid technique which enables the technology to handle issues in a reliable fashion. An intelligent paradigm of ANN and fuzzy logic features shows its authenticity and adaptation of hybrid approach to achieve more optimized and deterministic result.
Key-Words / Index Term
WSNs(Wireless Sensor Networks), ANN(Artificial Neural Network), and Fuzzylogic
References
[1] Ani1 K. Jain, Jianchang Mao K.M. Mohiuddin IBM Almaden Research Center, “Artificial Neural Networks : A TUTORIAL”, IEEE transactions on computer, Vol. 29, No. 3,pp. 31-44, March 1996.
[2] Park, Derrick Takeshi Mirikitani,” Energy Reduction in WSNs through Measurement Estimation with Second Order Recurrent Neural Networks”,3rd International Conference on Networking & Services ,pp.103,June 2007.
[3] Wenhui Zhao, Daxin Liu, Yu Jiang,” Distributed Neural Network Routing Algorithm Based on Global Information of WSN”, International Conference on Communications and Mobile Computing, pp.552-555,March2009.
[4] Neeraj Kumar, Manoj Kumar, R.B. Patel,” Neural Network Based Energy Efficient Clustering and Routing in WSNs”, First International Conference on Networks & Communications, pp. 34- 39,December 2009.
[5] WenTsai sung, yu-feng Liu, Jui-Ho Chen, chia-hao chen,”Enhance the efficient of WSN data fusion by neural networks training process”, International symposium on computer, communication, control and automation ,pp. 373-376,July 2010.
[6] Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy, ” Neural Network Based Secure Media Access Control Protocol for WSNs”, proceedings of International Joint Conference on Neural Networks, Atlanta, Georgia, USA, pp 1680-1687, June 2009.
[7] Yu Hu,Xiaorui Shen, Zhenhua Kang,” Energy-Efficient Cluster Head Selection in Clustering Routing for WSN”, 5th International Conference on Wireless Communications, Networking and Mobile Computing ,pp. 1-4,October 2009.
[8] Qingchun Ren and Qilian Liang,” An Energy-Efficient MAC Protocol for WSNs”, IEEE Global telecommunication conference, vol. 1, pp. 5pp, January 2006.
[9] Sudip Misra, Sanchita Roy, Mohammad S. Obaidat, Debashish Mohanta,” A Fuzzy Logic Based Energy Efficient Packet Loss Preventive Routing Protocol”, International Symposium on Performance Evaluation of Computer & Telecommunication Systems, ,SPECTS ,vol. 41,pp 185-192,August 2009.
[10] Timothy black, pubudu n pathirana, saeid nahavandi,” using autonomous mobile agents for efficient data collection in sensor networks”, world automation congress, pp. 1-6, June 2007.
[11] "Computational Intelligence Based Optimization of Energy Aware Routing in WSN" Rabia Iram, Muhammad Irfan Sheikh, Sohail Jabbar, Abid Ali M.
[12] "Fuzzy Logic Based Fault Detection in Distributed Sensor Networks" L. B. Bhajantri, International Journal of Scientific Research in Research Paper . Computer Science and Engineering Vol.6, Issue.2, pp.27-32, April(2018)
[13] "Neural Network through Face Recognition "A.K.Gupta1* , S.Gupta2 International Journal of Scientific Research in Research Paper . Computer Science and Engineering Vol.6, Issue.2, pp.38-40, April (2018)
Citation
Supriya Singh, Awadhesh Kumar, "Intelligence Paradigm comparative study using ANN and fuzzy logic with respect to WSN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1140-1143, 2018.