Online ISSN: 2515-8260

Author : Bhardwaj, Diwakar


Key based Secured Cryptosystems used for Online Data Sharing on the Cloud

Diwakar Bhardwaj; RAKESH KUMAR

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 33-36

Since the advent of cloud its has become a efficient platform for sharing data for big enterprises, companies, startups and individuals. Cloud has allowed multiple users to collaborate on data. A certain level of security is desired by the cloud users while sharing data. Data owners would want to store their data on the cloud while preserving confidentiality and would want to allow access or provide decryption details to the users he wants to share data with along with the ability to revoke that access ant any given time. In this paper the system proposed uses broadcast encryption to encrypt the data while using the cloud resources efficiently by reducing the overhead caused in the Key Aggregate Cryptosystem (KAC).

Identification and Recognizing of Security System for Various Interruptions using ANN Algorithm

Diwakar Bhardwaj; Anjani Rai

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 27-32

Framework security is of basic disturbed now days for broad setup. The interference area systems (IDS) are getting the chance to be fundamental for palatable confirmation against ambushes that are reliably changing in result and multifaceted nature. With data devotion, acknowledgment and accessibility, they ought to be reliable, easy to control and by low conservation cost. Diverse alteration is associated with IDS routinely to depict new strikes and finger them. Present paper recommends a soft inherited figuring (SIF) for intrusion area. The SIF structure is a soft classifier, whose learning curved, be shown as a feathery rule, for instance, expecting by then and overhauled by an intrinsic count. The technique is accepted on the model KDD'99 interference instructive file and associated by enduring limit available in the composition. The consequences are solid and show the upsides of the recommended getting to

A Digital and Distributed Block Chain Technology for Money Dealings in INDIA

Anshi Singh; Diwakar Bhardwaj

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 45-49

A block chain is a digitized, dispersed, open proof of all cryptographic cash managing. Continually ascending as 'completed' ruins (the most recent dealings) are recorded and added to it in consecutive solicitation; it grants feature individuals to screen modernized money dealings without central record keeping. Each hub (a PC related with the framework) gets a copy of the square chain, which is downloaded thus. At first made as the accounting technique for the virtual money Bit coin, square binds – which use to known as appropriated record advancement (DLT) – are appearing in a combination of business applications today. Starting at now, the development is mainly used to check dealings, inside cutting edge financial structures anyway it is possible to digitize code and supplement basically any report into the square chain. Doing so makes a perpetual record that can't be changed; also, the records believable can be affirmed by the entire system using the block chain rather than a solitary concentrated power.
Block Chain alters apparent, shared computerized record that records dealings in an open or private distributed system. Dispersed to all part nodes in the system, the record for all time records, in a successive chain of cryptographic hash-connected hinders, the historical backdrop of benefit trades that occur between the friends in the system. All the affirmed and approved dealings blocks are connected and tied from the earliest starting point of the chain to the most current block, thus the name block chain. The block chain in this manner goes about as a solitary wellspring of truth, and individuals in a block chain system can see just those dealings that are related to them

An Energy Efficient Sector-Based Routing Protocol for Reliable Data Transmission Through Reducing the Hop- Count and Balanced Energy Consumption in UWSNs

Rakesh Kumar; Diwakar Bhardwaj

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 1120-1135

The one of the main objectives of any energy efficient routing mechanism of Underwater Wireless Sensor Networks (UWSNs) is to extend the network lifespan. The characteristics of underwater environs and acoustic communications make to prolonging network lifetime is a challenging task. To achieve the same, topology control and optimize energy consumption is needed, which can be achieved through clustering. In this paper, we proposed a sector-based forwarding scheme through dividing 3D network in sectors of same size and dimensions. Forwarding takes place in a sector-by-sector in a single hop manner via some nominated nodes called sector-heads and gateway nodes. The sector-heads of each sector elected on the basis of residual energy of the nodes, and dynamically changed after reaching energy threshold decided to forward data packets. The gateway nodes are some boundary nodes utilize when sector-head does not have sufficient energy to forward data packets towards other sector- heads. However, the proposal utilizes the depth information to forward data packets. Hence, all the communication is done towards vertical direction in, each sector-head adaptively based on the depth of a particular node. The proposal is evaluated and analyzed against some existing energy efficient routing mechanism, and the simulation outcomes reveal significant improvement in energy consumption, network lifetime, and packet reception rate of the network and reduces the overall network overhead

Study of Significant and Competent Intrusion Detection System by FA-SVM Technique

Diwakar Bhardwaj

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 64-68

Interruption detection is a basic problem in network safety, for ensuring network assets. In this manner a precise method of distinguishing interruptions works to provide confirmation for data in any association moreover open or personal. The fundamental purpose is to build the recognition rate and lessen the bogus alert rate. Given that active Intrusion Detection Systems (IDSs) utilize all the highlights to distinguish recognized as interruptions, they accomplish discouraged outcomes. We have projected a technical Feature Study based Support Vector Machine (FA-SVM) for creating effective IDS by utilizing well known factual strategy known as Feature Study (FA) throughout the highlights are broke down as variables. To plan increasingly viable and effective IDSs it is basic to choose the greatest classifiers. In this manner we utilized Support Vector Machines (SVMs) has sufficient by elevated speculation capacity. Present work completed on information revelation and information digging cup dataset for directing tests. The exhibition of this methodology was examined and contrasted and existing methodologies like Principal Component Study (PCA) utilizing SVM and furthermore arrangement by SVM that does not include choice. The outcomes demonstrated that the projected strategy improves the interruption recognition and beats active methodologies consequently displaying computationally proficient IDS by least fault optimistic charge.