Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.320-324, Feb-2019
Abstract
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients` control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this proposal a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, it leverages attribute-based encryption (ABE) techniques to encrypt each patient`s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. This technique also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.
Key-Words / Index Term
Attribute, Encryption, Health Record, Cloud, Trusted Server
References
[1] A. Toninelli, R. Montanari, and A. Corradi, “Enabling Secure Service Discovery in Mobile Healthcare Enterprise Networks,” IEEE Wireless Comm., vol. 16, no. 3, pp. 24-32, June 2009.
[2] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Handshake with Symptoms-Matching: The Essential to the Success of Mhealthcare Social Network,” Proc. Fifth Int’l Conf. Body Area
Networks (BodyNets ’10), 2010.
[3] Y. Ren, R.W.N. Pazzi, and A. Boukerche, “Monitoring Patients via a Secure and Mobile Healthcare System,” IEEE Wireless Comm., vol. 17, no. 1, pp. 59-65, Feb. 2010.
[4] R. Lu, X. Lin, X. Liang, and X. Shen, “A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network,” Mobile Networks and Applications—special issue on wireless andpersonal comm., vol. 16, no. 6, pp. 683-694, 2011.
[5] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE Trans. Parallel and Distributed System, to be published.
[6] M.R. Yuce, S.W.P. Ng, N.L. Myo, J.Y. Khan, and W. Liu, “Wireless Body Sensor Network Using Medical Implant Band,” J. Medical Systems, vol. 31, no. 6, pp. 467-474, 2007.
[7] M. Avvenuti, P. Corsini, P. Masci, and A. Vecchio, “Opportunistic Computing for Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems (MASS ’07), pp. 1-6, 2007.
[8] A. Passarella, M. Conti, E. Borgia, and M. Kumar, “Performance Evaluation of Service Execution in Opportunistic Computing,” Proc. 13th ACM Int’l Conf. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM ’10), pp. 291-298, 2010.
[9] M. Conti, S. Giordano, M. May, and A. Passarella, “From Opportunistic Networks to Opportunistic Computing,” IEEE Comm. Magazine, vol. 48, no. 9, pp. 126-139, Sept. 2010.
[10] M. Conti and M. Kumar, “Opportunities in Opportunistic Computing,” IEEE Computer, vol. 43, no. 1, pp. 42-50, Jan. 2010.
[11] W. Du and M. Atallah, “Privacy-Preserving Cooperative Statistical Analysis,” Proc. 17th Ann. Computer Security Applications Conf. (ACSAC ’01), pp. 102-111, 2001,
[12] J. Vaidya and C. Clifton, “Privacy Preserving Association Rule Mining in Vertically Partitioned Data,” Proc. Eighth ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD ’02), pp. 639-644, 2002.
[13] A. Amirbekyan and V. Estivill-Castro, “A New Efficient Privacy-Preserving Scalar Product Protocol,” Proc. Sixth Australasian Conf. Data Mining and Analytics (AusDM ’07), pp. 209- 214, 2007.
[14] P. Paillier, “Public-Key Cryptosystems Based on Composite Degree Residuosity Classes,” Proc. 17th Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT ’99), pp. 223-238, 1999.
[15] R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “Eppa: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Comm.,” IEEE Trans. Parallel Distributed and Systems, to be published.
[16] X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, “Sage: A Strong Privacy-Preserving Scheme against Global Eavesdropping for Ehealth Systems,” IEEE J. Selected Areas in Comm., vol. 27, no. 4, pp. 365-378, May 2009.
[17] M. Li, W. Lou, and K. Ren, “Data Security and Privacy in Wireless Body Area Networks,” IEEE Wireless Comm., vol. 17, no. 1, pp. 51-58, Feb. 2010.
[18] J. Sun and Y. Fang, “Cross-Domain Data Sharing in Distributed Electronic Health Record Systems,” IEEE Trans. Parallel Distributed and Systems, vol. 21, no. 6, pp. 754-764, June 2010.
[19] “Exercise and Walking is Great for the Alzheimer’s and Dementia Patient’s Physical and Emotional Health,” http://freealzheimers-support.com/wordpress/2010/06/exercise-andwalking/, June 2010.
[20] R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications,” IEEE Comm. Magazine, vol. 49, no. 4, pp. 28-35, Apr. 2011.
[21] D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Ann. Int’l Conf. Cryptology Organized (CRYPTO ’01), pp. 213-229, 2001.
[22] X. Lin, X. Sun, P. Ho, and X. Shen, “GSIS: A Secure and Privacy Preserving Protocol for vehicular communications,” IEEE Trans.Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
[23] R. Lu, X. Lin, H. Zhu, and X. Shen, “An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications,” IEEE Trans. Vehicular Technology, vol. 59, no. 6,pp. 2772-2785, July 2010.
[24] R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, “Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in Vanets,” IEEE Trans. Vehicular Technology, vol. 61,
pp. 86-96, 2012.
[25] http://www.uaproperty.com/articles/In-Ukraine-ambulancecome-patient-10-minute s.html, 2012.
[26] S. Ross, Introduction to Probability Models, Ninth Ed., 2007.
[27] X. Lin, R. Lu, X. Liang, and X. Shen, “STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in Vanets,” Proc. of INFOCOM ’11, pp. 2147-2155, 2011.
[28] W. Du and Z. Zhan, “Building Decision Tree Classifier on Private Data,” Proc. of CRPIT ’14, ser. CRPIT ’14, pp. 1-8, 2002.
[29] I. Ioannidis, A. Grama, and M. Atallah, “A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments,”Proc. of ICPP ’02, pp. 379-384, 2002.
[30] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure Friend Discovery in Mobile Social Networks,” Prof. of INFOCOM ’11,pp. 1647-1655, 2011.
[31] R. Zhang, Y. Zhang, J. Sun, and G. Yan, “Fine-Grained Private Matching for Proximity-Based Mobile Social Networking,” Prof. of INFOCOM ’12, pp. 1-9, 2012.
[32] M. Li, N. Cao, S. Yu, and W. Lou, “Findu: Privacy-Preserving Personal Profile Matching in Mobile Social Networks,” Proc. INFOCOM, pp. 2435-2443, 2011.
[33] K.-H. Huang, Y.-F.Chung, C.-H.Liu, F. Lai, and T.-S. Chen, “Efficient Migration for Mobile Computing in Distributed Networks,”Computer Standards and Interfaces, vol. 31, no. 1, pp. 40-47,2009.
Citation
P. Swetha, P. Srividhya, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.320-324, 2019.
The Impact of Big Data Applications in Health Care Industry
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.325-327, Feb-2019
Abstract
With the advent of new technologies, devices and communication means like social networking sites the amount of data produced by mankind is increasing every year. Though the information produce is meaningful, it can be useful only with proper data analytics. There is a vast amount of data generated in the healthcare industry in recent years. This paper discusses about the recent research of big data tools and approaches for the analysis of healthcare informatics data gathered at various levels. The data thus collected is to be structured and analyzed for finding possible solutions. In this paper we use the predictive analysis algorithm in Hadoop and Map Reduce to predict the diabetes prevalent, complications associated with it and the type of treatment to be provided. The result is predicted based on the analysis of big data in an efficient way to cure and care the patients.
Key-Words / Index Term
Ecosystem for Health care, Big Data Case, Need of Big Data in Government
References
[1]. Yanglin Ren, Monitoring patients via a secure and mobile healthcare system, IEEE Symposium on wireless communication,2011
[2]. Dai Yuefa, Wu Bo, GuYaqiang ,Data Security Model for Cloud Computing, International Workshop on Information Security and Application,2009
[3]. Jeffrey Dean and Sanjay Ghemawat,MapReduce: Simplified Data Processing on Large Clusters,ACM,2008
[4]. Cong Wang, Privacy-Preserving Public Auditing for Secure Cloud Storage,IEEE,2010
[5]. Konstantin Shvachko, HairongKuang, Sanjay Radia, Robert Chansler ,The Hadoop Distributed File System,IEEE,2010
[6]. Bill Hamilton, Big Data Is the Future of Healthcare, Cognizant white paper, 2010.
[7]. White Paper by SAS, How Government are using the Power of High Performance Analytics, 2013.
Citation
N. Vanjulavalli, M. Saravanan, "The Impact of Big Data Applications in Health Care Industry", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.325-327, 2019.
A Survey on Ontology Tools in Semantic Web
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.328-334, Feb-2019
Abstract
The linguistics internet will be thought of as a mesh of connected data (resources) or a globally connected distributed information [4, 5, 7]. the most goal is that information ought to simply be processed by machines. Ontology tools will be applicable for all stages of the metaphysics lifecycle (creation, population, validation, deployment, maintenance and evolution). metaphysics will be accustomed support varied data management together with data retrieval, store and sharing. There ar many metaphysics languages like XML, RDF(S), DAML+OIL and bird of prey. several metaphysics tools are developed for implementing information of metaphysics victimisation these languages. However, current metaphysics tools have some issues in interoperation and cooperative work. the first goal of this survey is to grasp and measure every tool by analyzing and victimisation them. Therefore, we will develop the new generation tool not solely supporting a lot of capabilities, however additionally determination current tools’ issues.
Key-Words / Index Term
Ontology, RDF, Semantic web.
References
[1] J. Arpirez, O. Corcho, M. Fernandez-Lopez, A. Gomez- Perez. WebODE: a Scalable Workbench for Ontological Engineering. First International Conference on Knowledge Capture (KCAP`01) ACM Press (1-58113-380-4). pp:6-13. October 2001
[2] Sean Bechhofer, Carole Goble and Ian Horrocks. DAML+OIL is not enough. SWWS-1, Semantic Web working symposium, Stanford (CA), July 29th-August 1st, 2001.
[3] Sean Bechhofer, Ian Horrocks, Carole Goble, Robert Stevens. OilEd: a Reasonable Ontology Editor for the Semantic Web. Proceedings of KI2001, Joint German/Austrian conference on Artificial Intelligence, September 19-21, Vienna. Springer-Verlag LNAI Vol. 2174, pp 396-408. 2001
[4] O. Corcho, M. Fernandez-Lopez, A. Gomez-Perez, O. Vicente. WebODE: an integrated workbench for ontology representation, reasoning and exchange.Lecture Notes on Artificial Intelligence Vol 2473. 13th International Conference on Knowledge Engineering an Knowledge Management (EKAW`02). Springer-Verlag. pp: 138-153.October 2002
[5] Aseem Das, Wei Wu, Deborah L. McGuinness: Industrial Strength Ontology Management. SWWS, pp 17-37. 2001
[6] Tom Deray, Pieter Verheyden: Towards a Semantic Integration of Medical Relational Databases by Using Ontologies: A Case Study. OTM Workshops, pp137-150. 2003
[7] J. Domingue. Tadzebao and WebOnto: Discussing, Browsing, and Editing Ontologies on the Web. 11th Knowledge Acquisition for Knowledge-Based Systems Workshop, April 18th-23rd. 1998, Banff, Canada
[8] J. Domingue, E. Motta and O. Corcho Garcia. Knowledge Modelling in WebOnto and OCML: A User Guide, 1999
[9] F. Manola, E. Miller (eds.), RDF (Resource Description Framework) Primer, W3C Recommendation, Boston, 2004: http://www.w3.org/TR/rdf-primer/
[10] http://delicias.dia.fi.upm.es/webODE/
[11] http://kaon.semanticweb.org/
[12] http://kmi.open.ac.uk/projects/webonto/
[13] http://oiled.man.ac.uk/
[14] http://protege.stanford.edu/8
[15] http://sourceforge.net/projects/protege-owl
[16] http://en.wikipedia.org/wiki
Citation
P. Karpagam, "A Survey on Ontology Tools in Semantic Web", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.328-334, 2019.
Patient Care Monitoring and Mobile Notification Using Health Care IoT
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.335-337, Feb-2019
Abstract
The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow the machine to machine communication that is the basis of IoMT. IoMT devices link to cloud platforms such as Amazon Web Services, on which captured data can be stored and analyzed. IoMT is also known as healthcare IoT. The proposed idea is based on the advancement of new advanced technology and Internet of Things which act as an airing device for patient care identification and patient care monitoring. It allows doctors to attend manifold of patients in rural areas without regular concentrating on a single patient. It also includes mobile notifications to doctors if the patient condition is critical. The (IoMT) is an incorporation of medical devices and applications that can connect to healthcare ideas using networking technologies. It connects patients to their doctors and allows transfer of medical data over a secure network, which in turn reduces unnecessary hospital visits and reduces the burden on healthcare ideas largely. In this paper an IoT idea will be developed to monitor the patient with this chronic disorder using cloud data logging. The developed idea can also be used to monitor various other parameters of patients such as Respiration, Body temperature, Pressure and the same can be logged every 20 seconds on cloud services. The doctors can monitor the patient’s data using his mobile phone by logging into the cloud service and take necessary actions according to the parameters measured.
Key-Words / Index Term
IOMT, MALAISE DETECTION, DENGUE
References
[1]. Gupta P., Agrawal D., Chhabra J.,Dhir P.K. IOT Based Smart Healthcare Kit. Jaypee University of Information Technology.
[2]. Kumar R., Rajasekaran M.P. An IOT Based Patient Monitoring Idea Using Raspberry Pi. Department of Electronics and Communication Engineering Kalasalingam University Tamilnadu, India.
[3]. 3) Freddy Jimenez Universidad Andres Bello, Vina del Mar, Chile Romina Torres Universidad Andres Bello, Vina del Mar. Building An IOT-Aware Healthcare Monitoring Idea. Chile.
[4]. Clinical Practice Guidelines (CPG) Management of Dengue Infection in Adults (Revised 2nd Edition) (2010).
Citation
M. Dhasarathi, R. Priyadharshini, "Patient Care Monitoring and Mobile Notification Using Health Care IoT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.335-337, 2019.
A Survey on Assistive Systems
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.338-341, Feb-2019
Abstract
Assistive technology is any hardware or software designed to enable independence for disabled and older people. Technologies are growing up day to day. The disabled and older people are very difficult to adopt new technologies. Disabled people are an important part of our society who has not yet received the same opportunities as others in their inclusion in the Information society. It is necessary to develop easily accessible systems for computers to achieve their inclusion within the new technologies. The main objective of this paper is to review and discuss the assistive systems that help disabled and older people to be drawn nearer to new technologies.
Key-Words / Index Term
Assistive Technology, Information Society, Accessible Systems
References
[1] https://www.atia.org/at-resources/what-is-at/
[2] Goddard, M, “Access through technology”, Library Journal, vol. 2, Spring, p.26, 2004.
[3] Koulikourdi, A., “Assistive technologies in Greek libraries”, Library Hi Tech, Vol.26, no.3, p.387-397, 2008.
[4] Assistive Technology Act of 1998, 27 Jan 1998.
[5] Brophy, P. and Craven, J., “Web accessibility”, Library Trends, Vol.55, no.4, pp.950-972, 2007.
[6] Lane, J.P., and W.C. Mann, Technology, disability and professional services. In Assistive technology for persons with disabilities, 2nd edn., (5–23) ,1995.
[7] Lee, C Learning disabilities and assistive technologies. Retrieved December 1, 2007
[8] Assistive Technology for Children with Disabilities: Creating Opportunities for Education, Inclusion and participation, A discussion paper, organized by Unicef WHO, 2015.
[9] UNICEF. The state of the world’s children 2013. Children with disabilities. New York: United Nations Children’s Fund, 2013.
[10] WHO. Joint position paper on the provision of mobility devices in less -resourced settings: a step towards implementation of the Convention on the Rights of Persons with Disabilities (CRPD) related to personal mobility. Geneva: World Health Organization,2011.
[11] http://www.pbs.org/parents/education/learning-disabilities/strategies-for-learning-disabilities/assistive-technology-devices/
Citation
R. Indhumathi, A. Geetha, "A Survey on Assistive Systems", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.338-341, 2019.
A Trusted Hardware- Database Based with Data Confidentiality
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.342-346, Feb-2019
Abstract
Traditionally, as soon as confidentiality becomes a concern, data are encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging server-hosted, tamper-proof trusted hardware in critical query processing stages, thereby removing any limitations on the type of supported queries. Despite the cost overhead and performance limitations of trusted hardware, we show that the costs per query are orders of magnitude lower than any (existing or) potential future software-only mechanisms. TrustedDB is built and runs on actual hardware, and its performance and costs are evaluated here.
Key-Words / Index Term
Encryption,SQL,Query,DB
References
[1] FIPS PUB 140-2, Security Requirements for Cryptographic Modules, http://csrc.nist.gov/groups/STM/cmvp/standards.html#02, 2013.
[2] TPC-H Benchmark, http://www.tpc.org/tpch/, 2013.
[3] IBM 4764 PCI-X Cryptographic Coprocessor, http://www-03.ibm.com/security/cryptocards/pcixcc/overview.shtml, 2007.
[4] G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu, “Two Can Keep a Secret: A Distributed Architecture for Secure Database Services,” Proc. Conf. Innovative Data Systems Research(CIDR), pp. 186-199, 2005.
[5] A. Iliev and S.W. Smith, “Protecting Client Privacy with Trusted Computing at the Server,” IEEE Security and Privacy, vol. 3, no. 2, pp. 20-28, Mar./Apr. 2005.
[6] M. Bellare, “New Proofs for NMAC and HMAC: Security Without Collision-Resistance,” Proc. 26th Ann. Int’l Conf. Advances inCryptology, pp. 602-619, 2006.
[7] B. Bhattacharjee, N. Abe, K. Goldman, B. Zadrozny, C. Apte, V.R. Chillakuru, and M. del Carpio, “Using Secure Coprocessors for Privacy Preserving Collaborative Data Mining and Analysis,”
Proc.Second Int’l Workshop Data Management on New Hardware (DaMoN ’06), 2006.
[8] M. Canim, M. Kantarcioglu, B. Hore, and S. Mehrotra, “Building Disclosure Risk Aware Query Optimizers for Relational Data-bases,” Proc. VLDB Endowment, vol. 3, nos. 1/2, pp. 13-24, Sept. 2010.
[9] Y. Chen and R. Sion, “To cloud or Not to Cloud?: Musings on Costs and Viability,” Proc. Second ACM Symp. Cloud Computing(SOCC ’11), pp. 29:1-29:7, 2011.
[10] V. Ciriani, S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Combining Fragmentation and Encryption to Protect Privacy in Data Storage,” ACM Trans. Information andSystem Security, vol. 13, no. 3, pp. 22:1-22:33, July 2010.
[11] T. Denis, Cryptography for Developers,Syngress, 2007.
[12] E. Damiani, C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, “Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs,” Proc. 10th ACM Conf. Computer and Commu-nications Security (CCS ’12), 2003.
[13] E. Mykletun and G. Tsudik, “Aggregation Queries in the Database-as-a-Service Model,” Proc. 20th IFIP WG 11.3 WorkingConf. Data and Applications Security, pp. 89-103, 2006.
[14] F.N. Afrati and V. Borkar, and M. Carey, and N. Polyzotis, and J.D. Ullman, “Map-Reduce Extensions and Recursive Queries,” Proc.14th Int’l Conf. Extending Database Technology (EDBT), pp. 1-8, 2011.
[15] V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motwani, “Distributing Data for Secure Database Services,” Proc.Fourth Int’l Workshop Privacy and Anonymity in the Information Soc. (PAIS ’11), pp. 8:1-8:10, 2011.
[16] T. Ge and S. Zdonik, “Fast Secure Encryption for Indexing in a Column-Oriented DBMS,” Proc. IEEE 23rd Int’l Conf. Data Eng.(ICDE), 2007.
[17] R. Gennaro, C. Gentry, and B. Parno, “Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers,”
Proc.30th Ann. Conf.Advances in Cryptology (CRYPTO ’10), pp. 465-482, 2010.
[18] O. Goldreich, Foundations of Cryptography I. Cambridge Univ. Press, 2001.
[19] B.I.H. Hacigumus and S. Mehrotra, “Efficient Execution of Aggregation Queries over Encrypted Relational Databases,” Proc.Ninth Int’l Conf. Database Systems for Advanced Applications, vol. 2973, pp. 633-650, 2004.
[20] H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,”
Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’02),216-227, 2002.
Citation
S. Bavithra, T. Manivannan, "A Trusted Hardware- Database Based with Data Confidentiality", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.342-346, 2019.
Testing and Analysis of Secured AODV Routing Protocol
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.347-350, Feb-2019
Abstract
Mobile ad hoc networking is a technology which works without requiring an already established infrastructure and centralized administration and provides for the cooperative engagement of a group of mobile nodes. In a mobile ad hoc network, each node can function as router and thus mobile nodes directly send messages to each other via wireless to a destination node beyond its transmission range by using other nodes as relay points. In recent years, research on mobile ad-hoc network is growing exponentially. In mobile ad-hoc network, abbreviated as MANET, transmission can be takes place without any use of wires. In this network, nodes are mobile and free to move in any directions. They send their messages to any other mobile nodes in the network. One of the protocol of MANET is AODV (Ad-hoc On demand Distance Vector) Routing Protocol. The main problem in this network is that the nodes in this network is frequently moving thereby the topology is changing frequently in MANET. Thus it is very much necessary for every node in the network to keep track of change so that an efficient packet transmission can be done. This is done by modeling the AODV routing protocol. In this paper, the network is modeled by using the Colored Petri Nets(CPN). CPN is the high level petri net that has the capacity of formally modeling and verifying complex system.
Key-Words / Index Term
AODV, Colored petri net tool, Mobile Ad-hoc Network, routing protocol, TPN
References
[1] Ye Wint Maung Maung, Aung Aung Hein. Colored Petri Nets (CPN) based model for Web Services composition. International journal for computer and communication engineering research (IJCCER), vol 2, issue 5, sep 2015.
[2] Richa Agarwal, Ashish Jain. A Review Paper on Colored Petri Nets and their application in Protocol Verification. International Journal of Research in Computer and Communication Technology, Vol 2, Issue 8, August -2013.
[3] Alessandro Bianchi, Sebastiano Pizzutilo. A Coloured Nested Petri Nets Model for Discussing MANET Properties. International Journal of Multimedia Technology Jun. 2013, Vol. 3 Iss. 2, PP. 38-44.
[4] Jatinder Pal Singh, Anuj Kr. Gupta. A Review on Dynamic MANET On Demand Routing Protocol in MANETs. Volume 2, No.2, March - April 2013 International Journal of Advanced Trends in Computer Science and Engineering.
[5] Lakshmi P.S., Pasha Sajid and Ramana M.V. Security and Energy efficiency in Ad Hoc Networks. Research Journal of Computer and Information Technology Sciences Vol. 1(1), 14-17, February (2013).
[6] Agrahari S., and S. Chinara. Simulation of Random Waypoint Mobility Model Using Coloured Petri Nets. In ICCTS, 18th 19th August, New Delhi, 2012.
[7] Simaremare, Harris. Energy consumption analysis of modified AODV routing protocol under random waypoint and reference point group mobility models. Advanced Computer Science and Information Systems (ICACSIS), 2012 International Conference on IEEE, 2012.
[8] Shabestar Branch, Islamic Azad University, Validation of Ad hoc On- demand Multipath Distance Vector Using Colored Petri Nets. Iran. 2011 International Conference on Computer and Software Modeling IPCSIT vol.14 (2011) © (2011) IACSIT Press, Singapore.
[9] Hadjidj, Rachid, and Hanifa Boucheneb. Efficient reachability analysis for time Petri nets. Computers, IEEE Transactions on 60.8 (2011): 1085- 1099.
[10] Suchismita Chinara, Santanu Kumar Rath. CPN validation of neighbor detection protocol for ad-hoc networks. In 8th International conference on information, communication and signal processing, 2011.
[11] Ali Nakhaee, Ali Harounabadi, Javad Mirabedini. A Novel Communication Model to Improve Mobile Ad hoc Network Routing Reliability. In Application of Information and Communication Technologies (AICT), 5th International Conference on 2011, Page(s): 1 - 7.
[12] Ali Nakhaee, Ali Harounabadi, javad Mirabedini. A Novel Communication Model to Improve AODV Protocol Routing Reliability. Application of Information and Communication Technologies (AICT), 2011 5th International Conference on 2011, Page(s): 1- 7
[13] Hanifa Boucheneb and Rachid Hadjidj. Model Checking of Time Petri Nets (2009).
[14] K. Jensen and L.M. Kristensen . Coloured Petri Nets - Modelling and Validation of Concurrent Systems. Springer, ISBN: 978-3-642-00283-0, 2009.
[15] Lisa Wells. Performance Analysis using CPN Tools. Department of Computer Science, University of Aarhus. Aabogade 34, 8200 Aarhus N, Denmark
Citation
S. Eswari, "Testing and Analysis of Secured AODV Routing Protocol", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.347-350, 2019.
Survey on Machine Learning Algorithms for Classification and Prediction of Land Use Changes Using GIS
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.351-354, Feb-2019
Abstract
Large area land-cover monitoring scenarios, involving large volumes of data, are becoming more prevalent in remote sensing applications. Thus, there is a pressing need for increased automation in the change mapping process the land transformation Model (LTM), which couples geographic information systems (GIS) with artificial neural networks. The objective of this research presents the survey report based on compare the performance of three machine learning algorithms (MLAs) and prediction of land use changes in GIS. The change map generated using ARTMAP has similar accuracies to a human-interpreted map produced by the U.S. Forest Service in the southern study area (John Rogan et al 2007). ARTMAP appears to be robust and accurate for automated, large area change monitoring as it performed equally well across the diverse study areas with minimal human intervention in the classification process. GIS is used to develop the spatial, predictor drivers and perform spatial analysis on the results. The predictive ability of the model improved at larger scales when assessed using a moving scalable window metric. the individual contribution of each predictor variable was examined and shown to vary across spatial scales.At the smallest scales, quality views were the strongest predictor variable. We interpreted the multi-scale influences of land use change, illustrating the relative influences of site (e.g. quality of views, residential streets) and situation (e.g. highways and county roads) variables at different scales.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert (key words)
References
[1] Alig, R. J. (1986). Econometric analysis of the factors influencing forest acreage trends in the southeast. Forest Science,32, 119-114.
[2] Alig, R. J., & Healy, R. G. (1987). Urban and built-up land area changes in the United States: an empirical investigation of determinants. Land Economics, 63(3), 216–226.
[3] Anderson, J. R., Hardy, E. E., Roach, J. T., & Witmer, R. E. 1976). A land use and land cover classification system for use with remote sensor data. US Geological Survey, Professional Paper 964, p. 28, Reston, VA.
[4] Atkinson, P., & Tatnall, A. (1997). Neural networks in remote sensing. International Journal of RemoteSensing, 18(4), 699–709.
[5] Babaian, R., Miyashita, H., Evans, R., Eshenbach, A., & Ramimrez, E. (1997). Early detection program for prostate cancer: results and identification of high-risk patient population. Urology, 37(3), 193–197.
[6] Batty, M., & Longley, (1994). Urban modeling in computer-graphic and geographic information system environments. Environment and Planning B, 19, 663–688.
[7] Bingham, G., Bishop, R., Brody, M., Bromley, D., Clark, E., Cooper, W., Costanza, R., Hale, T., Hayden, DeFries, R. S., & Chan, J. (2000).
[8] Multiple criteria for evaluating machine learning algorithms for land-cover classification from satellite data. Remote Sensing of Environment, 74, 503−515.
[9] Dobson, J., & Bright, E. (1994). Largearea change analysis: The Coast-watch Change analysis Project (C-CAP). Proceedings of Pecora 12, 24–26 August 1993, Sioux Falls, South Dakota (pp. 73−81).
[10] Foody, G. M., & Arora, M. K. (1997). Evaluation of some factors affecting the accuracy of classification by an artificial neural network. International Journal of Remote Sensing, 18, 799−810.
[11] Foody, G.M. (2003). Uncertainty, knowledge discovery and data mining in GIS. Progress in Physical Geography, 27(1), 113−121.
[12] Franklin, J. (1998). Predicting the distribution of shrub species in southern California from climate and terrainderived variables. Journal of Vegetation Science, 9, 733−748.
[13] G., Kellert, S., Norgaard, R., Norton, B., Payne, J., Russell, C., & Suter II, G.(1995). Issues in ecosystem valuation: improving information for decision making. Ecological Economics, 14, 73– 90.
[14] Bockstael, N., Costanza, R., Strand, I., Boyton, W., Bell, K., & Wagner, L. (1995). Ecological economic modeling and valuation of ecosystems. Ecological Economics, 14, 143–159.
[15] Boutt, D. F., Hyndman, D. W., Pijanowski, B. C., & Long, D. T. (2001). Identifying potential land usederived solute sources to stream baseflow using ground water models and GIS. Groundwater, 39(1),24–34.
[16] Brown, D. G., Duh, J. D., & Drzyzga, S. (2000). Estimating error in an analysis of forest fragmentation change using North American Landscape Characterization (NALC) Data. Remote Sensing of Environment, 71, 106–117.
[17] Gopal, S., & Woodcock, C. E. (1996). Remote sensing of forest change using artificial neural networks. IEEE Transactions on Geoscience and Remote Sensing, 34, 398−404.
Citation
N. Bharanikumar, P. Dhanalakshmi, "Survey on Machine Learning Algorithms for Classification and Prediction of Land Use Changes Using GIS", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.351-354, 2019.
A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.355-358, Feb-2019
Abstract
In this work, the Provider aware forwarding convention is planned as illustrative of the attentive distribution classification. The considered arrangement is planned not to modify the Interest/Data trade and without extra packages. The main required information structure is the alleged Distance Table, which keeps up panel of data between every centre and the correspondence endpoints. LFBL use three packet type content demand and reply, which are utilized like Interest and Data bundles, and acknowledgement, which is utilized by the consumer to affirm the provider determination. The information healing happens by steps: first, the Interest is scattered in the system with a controlled flooding procedure so as to find the accessible provider; at that point, the consumer chooses a provider and sends an acknowledgement packet for assertion; at long last, a separation based sending plan is empowered, so each middle of the path centre chooses if sending the resulting content demand or not by checking its Distance table. In particulars every core keeps up the Distance table, in addition to the standard NDN table, which incorporates, for each prepared content name, the provider identifier (ID) and the bound partition to it.
Key-Words / Index Term
Provider-aware forwarding (PAF), Distance Table (DT), Named Data Network, LFBL, E-CHANET
References
[1] A. Detti, D. Tassetto, N. B. Melazzi, and F. Fedi, “Exploiting content centric networking to develop topic-based, publish–subscribe manet systems,” Ad Hoc Networks, vol. 24, pp. 115–133, 2015.
[2] M. Amadeo, A. Molinaro, and G. Ruggeri, “E-chanet: Routing, forward-ing and transport in information-centric multihop wireless networks,” Computer Communications, vol. 36, no. 7, pp. 792–803, 2013.
[3] F. Angius, M. Gerla, and G. Pau, “Bloogo: Bloom filter based gossip algorithm for wireless ndn,” in Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design-Architecture, Algorithms, and Applications. ACM, 2012, pp. 25–30.
[4]S. Gao, H. Zhang, and B. Zhang, “Energy efficient interest forwarding in ndn-based wireless sensor networks,” Mobile Information Systems, vol. 2016, 2016.
[5] Michael Meisel, Ph.D. Advisor: Lixia Zhang, “A Data-First Architecture for Unstructured Wireless Networks”, In Mobile computing ,oct 2010.
[6] X. Liu, Z. Li, P. Yang, and Y. Dong, “Information-centric mobile ad hoc networks and content routing: A survey,” Ad Hoc Networks, 2016.
[7] R. A. Rehman and B. S. Kim, “Content centric networking approach in cognitive radio ad hoc networks,” in 2015 13th International Conference on Frontiers of Information Technology (FIT), Dec 2015, pp. 309–313.
[8] M. Amadeo, C. Campolo, A. Molinaro, and N.Mitton, “Named data networking: a natural design for data collection in wireless sensor networks,” in Proceedings of the IFIPWireless Days Conference (WD ’13), pp. 1–6, Valencia, Spain, November 2013.
[9] L. Zhang, A. Afanasyev, J. Burke et al., “Named data networking,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, pp. 66–73, 2014.
[10] M. A. Hail, M. Amadeo, A. Molinaro, and S. Fischer, “On the performance of caching and forwarding in information-centric networking for the IoT,” in Proceedings of the 13th International Conference (WWIC ’15), M. C. Aguayo-Torres, G. G´omez, and J. Poncela, Eds., vol. 9071 of Lecture Notes in Computer Science, pp. 313–326, Malaga, Spain, May 2015.
[11] M. Amadeo, C. Campolo, A. Molinaro et al., “Multi-source data retrieval in IoT via named data networking,” in Proceedings of the 1st International Conference on Information-Centric Networking (ICN ’14), pp. 67–76, Paris, France, September 2014.
[12] E. Baccelli, C. Mehlis, O. Hahm, T. C. Schmidt, and M. W¨ahlisch, “Information centric networking in the IoT: experiments with NDN in the wild,” in Proceedings of the 1st ACM International Conference on Information-Centric Networking (ICN ’14), pp. 77–86, ACM, September 2014.
[13] C.Wang, J. Li, F. Ye, and Y. Yang, “NETWRAP: an NDN based real-timewireless recharging framework for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 6, pp. 1283–1297, 2014.
[14] Augustine A, Sebastian EJ, “Routing Mechanism for Mobile Ad Hoc Networks with Improved Security Features”, Journal of Telecommunications System & Management, Telecommun Syst Manage 2016, 5:2.
[15] J. Lee and D. Kim, “Proxy-assisted content sharing using content centric networking (ccn) for resource-limited mobile consumer devices,” Consumer Electronics, IEEE Transactions on, vol. 57, no. 2, pp. 477– 483, 2011.
[16] A. Passarella, “A survey on content-centric technologies for the current internet: Cdn and p2p solutions,” Computer Communications, vol. 35, no. 1, pp. 1–32, 2012.
[17] A. Passarella, “A survey on content-centric technologies for the current internet: Cdn and p2p solutions,” Computer Communications, vol. 35, no. 1, pp. 1–32, 2012.
[18] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, k. claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named data networking,” SIGCOMM Comput. Commun. Rev., vol. 44, no. 3, pp. 66–73, Jul. 2014.
[19] “The rife project. http://rife-project.eu/.”
[20] “The umobile project. http://umobile-project.eu/.”
[21] Y.-T. Yu, R. B. Dilmaghani, S. Calo, M. Sanadidi, and M. Gerla, “Interest propagation in named data manets,” in Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 2013, pp. 1118–1122.
Citation
P. Lakshmi Priya, K. Premkumar, "A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.355-358, 2019.
A Survey on Oral Cancer Analysis among Hospitalized Patients Based Bioinformatics
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.359-362, Feb-2019
Abstract
Recent technologies and developments on bioinformatics emphasize for analysis of the biological data which is generated by the biological sciences and biotechnology. Definition of Bioinformatics is used to storage, manipulation and interpretation data of nucleic acids and amino acids and molecular rules and system that affects the structure. Cancer is a major and serious public health problem worldwide. Cancer is uncontrolled proliferation of cells that arise from virtually any cell type in the body. This paper discusses about the cancer symptoms, analysis and the preventing measures. However, additionally, there are even more discussion about oral cancer among hospitalized patients. This paper discusses the levels of preventing oral cancers and characteristics of patients is directed to get a better understanding of the existing research problems in this emerging field.
Key-Words / Index Term
Nucleic acids, Amino acids, Oral Cancer Levels, Preventing measures of Cancer patients, Applications of Bioinformatics.
References
[1] Louise Mc Grath-Lone, Sophie Day, Claudia Schoenborn and Helen Ward " Exploring research participation among cancer patients", DOI 10.1186/s12885-015-1628-8, 2015.
[2] M.C. McCall Msc, A. Ward Phd and C. Heneghan Dphil, "survey of attitudes and beliefs among oncologists", Curr Oncol, Vol. 22, pp. 13-19; doi: http://dx.doi.org/10.3747/co.22.2129.
[3] G. Muthu Laakshmi, "Awareness of Oral Cancer among a Hospital based Out-Patient Population- A Questionnaire Based Study", G. Muthu Laakshmi, J. Pharm. Sci. & Res. Vol. 8(7), 2016, 687-691.
[4] Maxine D.Fisher, AncillaW.Fernandes, TemitopeO.Olufade, Paul J.Miller, MarkS.Walker and MoonFenton , "Patient Characteristics and Costs in Recurrent or Refractory Head and Neck Cancer: Retrospective Analysis of a Community Oncology Database", 2018.
[5] Neel Shimpi, Monica Jethwani, Aditi Bharatkumar, Po-Huang Chyou, Ingrid Glurich and Amit Acharya,"a survey cross-sectional Patient awareness and knowledge towards oral cancer", 2018.
[6] Jose Bagan, Gracia Sarrion, Yolanda Jimenez ,"survey on Oral cancer Clinical features", Oral Oncology 46 (2010) 414–417.
[7] Anderson Rocha-Buelvas, Carlos Hidalgo-Patiño, Giuseppe Collela, Italo Angelillo, "Oral Cancer About Knowledge, Attitudes And Practices In A South Colombian Context", Vol. 25 Nº 2 / 2012 / 155-162 ISSN 0326-4815 Acta Odontol, Latinoam, 2012.
[8] G. Sridhar Reddy, K. Eswara Rao, K. Kiran Kumar, P. Chandra Sekhar, K. Lalith Prakash Chandra, B. Venkata Ramana Reddy, "Diagnosis of oral cancer", February 24, 2019, IP: [106.203.51.244]
[9] S. Warnakulasuriya, "Diagnostic adjuncts on oral cancer and precancer, an update for practitioners", 10 November 2017 doi:10.1038/sj.bdj.2017.883.
[10] C. M. Kelly, I. G. Johnson & M. Z. Morgan, "Oral cancer, exploring the stories in United Kingdom newspaper articles", 09 September 2016 doi:10.1038/sj.bdj.2016.643.
Citation
G. Shruthi, J. Madhusudhanan, "A Survey on Oral Cancer Analysis among Hospitalized Patients Based Bioinformatics", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.359-362, 2019.