Online ISSN: 2515-8260

Keywords : Cryptography


Enhancement of Big Data Security in Cloud Environment

Anshi Singh; Anjani Rai

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 59-63

In this research, the advanced encryption mechanism is discussed to secure big data in cloud computing. The services of Cloud computing are used on broad level because these services are Platform independent. Cloud computing eliminates the need to set specific software on system of user. To improve the security of cloud, the concept of Advanced Encryption Standard (AES) with Intrusion Detection System (IDS) method is integrated here. It is capable to offer the protection according to demands. It also enlarges the overall time period of the network. It is made to decrease the power utilization by the node. For optimum the local node network is differentiated into little zones. In addition, the algorithm for encoding is mentioned which is used to make encryption with Advanced Encryption Standard (AES).

Analyzing the Performance of Cryptographic Algorithms in Cloud Environment

Devi. T; Ganesan. R

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2314-2323

People across the globe are very much interested in using latest technology at a lower cost. This is the reason for popularity of cloud services with the help of Internet across the globe. Storing of data in cloud is one of the major functions as outsourcing reduces the burden of local storage and issues related to them. The research focus is on protection of data stored on cloud which is usually sensitive data or private data as well. The protection mechanisms should be in such a way that the mechanisms for protection should be stringent thereby preventing access by the attackers. Manipulation by intruders should also be prevented. Cryptography helps in changing the critical data to a unreadable form so that manipulation by outsiders is not possible. In order to provide security, several approaches and algorithms are available. These algorithms are used based on the requirement of the user or the organization. The paper compares various algorithms available to secure the sensitive data stored in cloud. Key size of the algorithms are compared along with the performances based in the expenses produced in their usage. The results are shown in table which show the algorithms suitable for the purpose of encryption in cloud.

Prediction of Crypto Currency by Multiple Linear Regressions using Anaconda Software

Anshey Singh; Narendra Mohan

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 76-81

Financial instruments traded in the stock markets attract various categories of investors across the world. The major objective of investment strategy is to minimize the risk and maximize the return and this can be achieved by choosing the right security at an appropriate time will result in loss reduction. The modern day investment alternative across the globe is crypto currency. A crypto currency is digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets. However, cryptocurrency are highly volatile due to their supply and demand factors as they are been designed to have a high degree of non availability. Hence, it is important to have a bitcoins price prediction model that can predict the bitcoins total supply value. In this paper, a multiple linear regression model for predicting the bitcoins total supply is proposed. The change in bitcoins total supply for definite time intervals like total supply per an hour, a day and a week were input for developing the linear regression model using the software package ANACONDA. This is significant improvement in comparison to traditional models. In the present scenario there is no such method of predicting the price of bitcoins. The proposed model can be used a decision making technique during the intense situations of bitcoins trading, where human predictions will not make appropriate price predictions. This paper comprises of various sections where the first section describes the introduction to Bitcoins, their importance followed by methodology and the strategy of algorithm applied. The third section describes the processing steps and implementation of algorithm and followed by validation of the project accuracy and efficiency checker.