Keywords : security
REVIEW AND ANALYSIS ON PRIVACY ISSUES IN DATA MINING AND SECURITY
European Journal of Molecular & Clinical Medicine,
2022, Volume 9, Issue 7, Pages 5514-5521
This article provides a complete review on new perspectives and systematic interpretations of published literatures by painstakingly organising them into subcategories. [This article] [gives] [a] comprehensive overview on new perspectives and this is accomplished by supplying a list of the various pieces of published literature. This article discusses the fundamental ideas behind the numerous existing data mining methods that protect users' privacy, as well as the benefits and drawbacks associated with these technologies. The techniques that are currently available for protecting the privacy of users during data mining can be categorised according to various aspects. These aspects include things like distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity. The most salient advantages and disadvantages of the procedures are outlined here within their respective categories. This in-depth investigation highlights the historical development, the research issues that are occurring at the present time, the future tendencies, the gaps, and the deficiencies. It has been decided that obligatory additional significant changes must be implemented for the purpose of providing stronger protection and preservation of personal privacy
SMART E-HEALTH DEVICE FOR MEASUREMENT OF BLOOD PRESSURE AND HEARTBEAT
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 9, Pages 1591-1595
DOI:
10.31838/ejmcm.07.09.174
In previous years various cases of cardiac disease and abnormal heart rate and blood pressure adjustments have been reported. Even such accidents lead to death. Hence, awareness of critical circumstances concerning swimming and children is essential to an organization. This thesis suggests a heart and blood pressure monitoring-based swimmingsave program. There are two units: the swimmer and the rescuer. The machine checks the pulse rate and blood pressure of the swimmer, and then stores the hero''s cell app attributes. Those values are related to standard pulse and pressure levels. When such values are not within the standard range, the program may trigger an alert.
A SURVEY ON CRYPTOGRAPHIC ALGORITHM FOR DATA SECURITY IN CLOUD STORAGE ENVIRONMENT
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 9, Pages 1602-1620
People are using lot of cloud storage service (CSs) to store documents. The cloud storage
services are used to conserve people personal data and facilitate data transferable. The
computer which connected via internet is adequate to access the data anywhere without
carrying any physical drives like Pen drive, CD, etc. In existing techniques like, CSs providers
are using 256-bit Advanced Encryption Standard (AES) and 128-bit (AES) encryption
algorithm. This is one of the best techniques to secure data, but once the intruder gets
encrypted data, there is possibility for data insecurity by means of applying brute force
attacking technique in future increasing the speed performance of computer. The objective of
this paper to analysis cryptographic algorithm which perfume on various data formats and
data security attacks and threads in cloud storage environment. The aim to overcome this kind
of attacks and key tampering technique, the key generation and maintain process handover to
user’s itself. It makes cloud storage service provider to maintain data only, with high efficientencryption technique that provides strong protection for data.
EVALUATION OF DIFFERENT KINDS OF ATTACKS AND ALSO FEASIBLE SOLUTIONS TOWARDS IOT
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 9, Pages 3085-3094
The significant requests of wireless interaction systems reside in the military, company, health care, retail, as well as transports. These systems utilize wired, cell, or even Adhoc units. Wireless sensor networks, actuator networks, as well as also automobile devices have acquired a fantastic rate of interest in order and industry. In the last handful of years, the Internet of Things (IoT) has obtained considerable research study rate of interest. The IoT is thought about as future of the internet. In future, IoT will certainly take part in a vital obligation along with will certainly transform our living layouts, criteria, along with company versions. The utilization of IoT in various apps is anticipated to climb swiftly in the happening years. The IoT allows billions of devices, people, as well as remedies, to associate with others and also replacement pertinent info. This paper provides the evaluation of different kinds of attacks and also feasible solutions towards iot
COOPERATION OF THE UNITED STATES OF AMERICA WITH THE REPUBLIC OF UZBEKISTAN IN FIELD OF PROVIDING SECURITY IN THE CENTRAL ASIA
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 2, Pages 635-639
Abstract. In this article author is tried to show explicit cooperation of the Republic of Uzbekistan and the United States of America in field of providing security in the region of Central Asia. Besides, in the article is given information the role of the Republic of Uzbekistan in the sphere of maintaining stable situation in the region and assistance of the USA. The article includes itself also information of modern policy of the Republic of Uzbekistan towards the Islamic Republic of Afghanistan and further proposals to provide its stable situation.
Analysis on Cyber Crimes and its Malware using FRAppE Categoriser
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 483-491
Together with 20 billion includes each day, 0.33-party Apps may be a critical purpose for the attraction not withstanding addictiveness of Facebook. Unfortunately, cyber criminals get went to the acknowledgment the possibly of Applying Facebooks near scattering malware however spontaneous mail. Up to now, the examination close by corporation gives committed to revealing noxious substance but advertisements. On this file, a massive detail parents question the problem: delivered some form of Facebook programming, can real a massive element parents find out inside the event that it's miles noxious? Our very own fundamental percentage is in building FRAppE Facebook's Thorough Request Evaluator in all likelihood the vital tool dedicated to revealing vindictive Facebooks in Facebook. To create FRAppE, the extra part of us rent actualities received essentially through looking on the submitting conduct of 111K Facebooks decided in some unspecified time within the destiny of 2 billion clients in Facebook. Initially, the extensive majority human beings understand a few attributes which will help in reality each person separate pernicious Facebooks with the beneficial aid of no longer malignant individuals.
Key based Secured Cryptosystems used for Online Data Sharing on the Cloud
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 33-36
Since the advent of cloud its has become a efficient platform for sharing data for big enterprises, companies, startups and individuals. Cloud has allowed multiple users to collaborate on data. A certain level of security is desired by the cloud users while sharing data. Data owners would want to store their data on the cloud while preserving confidentiality and would want to allow access or provide decryption details to the users he wants to share data with along with the ability to revoke that access ant any given time. In this paper the system proposed uses broadcast encryption to encrypt the data while using the cloud resources efficiently by reducing the overhead caused in the Key Aggregate Cryptosystem (KAC).
VM based Shared Resource Protecting in Cloud Environment
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 1846-1850
Cloud computing is the prevalent change occurring in the area of data innovation. At present a significant concern in cloud appropriation is towards its security and protection. In the progression of distributed computing the application part of virtualization in the long run builds, the extent of the security and protection steadily extends. The clients profit from cloud innovation for two main considerations that are Data protection and security. Cloud security conveys all the administrations dependent on clients need-firewalls, URL channels, sandboxes, SSL assessment, antivirus and remaining in a unified platform. It is an airtight security without the expense and multifaceted nature of apparatuses which shuts the security holes made by BYOD and portability. Despite the fact that distributed computing gives security there are some backlogs. The cloud security is hazards due to absence of information excess and consistency. Here, it represents the calculation of security by utilizing SRP convention which is a solid confirmation protocol (one-time guess per association endeavour) that oppose all well-known dynamic and detached assault over the system.
Medical Image Security Analysis and Enhancement for Telemedicine Applications
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 2229-2242
With the remarkable development of digital medical images and high-speed transmission networks and computer technologies in current year, authenticity and security of the medical images have been big issues for E-health application. In order to this many different remarkable watermarking strategies and concepts have been introduced by researchers. In this paper we concentrate on the possibilities for assurance of medical images using the principle of digital watermarking. There are many methods it looks from their basic perspective. One of them perspective is security to ensure authenticity and copyrights. Other we discuss watermarking methods classification which are based on different parameters such as: insertion domain (spatial and frequency domains)..
Cloud Computing Technology-Security Issues In Banks-An Overview
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 2, Pages 5299-5304
To enhance the capacity for data management and to offer various services, Cloud computing technology is a best source. This technology is providing various services to the customers on demand through internet. Several benefits are provided by this Cloud technology to banks such as reducing costs, improved capacity of data processing and superior excellence in banking services. Financial institutions would use the services of cloud technology with more flexibility and efficiency as and when they require. But several organizations are hesitating to introduce this technology due to security challenges. This paper is studying about the challenges of cloud technology in offering various enhanced services to banks as well as to customers with alternative solution to contain the issues. Moreover, it is discussed about various challenges in offering these financial services to banking institutions. Hence the data is gathered through secondary sources such as newspapers, magazines and various journals. The study is descriptive in nature.
Cloud Computing Technology – A Digital Transformative Solution For Banking Industry- An Overview
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 2, Pages 5305-5310
The banking industry hosts a large amount of customer data and is always anxious with providing the best services to its customers. In such a scenario, cloud computing technology is the contemporary transformative digital solution that offers unprecedented security, quickness and scalability to banking industry, while improving the ability to manage customer data. Several benefits are offered by Cloud technology such as cost effectiveness, enhanced data processing capacity and high-end financial services, digital accountability, transparency and timeless. Additively the application of cloud computing in banking industry provides the relative solution for the security issues. Large banks, building their own customized financial cloud as a precise tool, in contrary small banks relying on public financial cloud for a cloud service provider, can help their business to grow quickly and effectively by reducing information gap with limited man power. This paper is intended to provide an overview to this advanced technology and advantages of the cloud computing of banking industry above the traditional banking processes.
AUTOMATIC LPG IN CYLINDER MONITORING & BOOKING OVER ANDROID
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 2418-2424
In over Country day to day we are using in every house LPG cylinder Plays very important role and its cost is also pays an important for every middle class family so we need have a control on it like weight of cylinder and lick of the any gas from the cylinder as now days max in all family all the members are working people only so to provide security to LPG cylinder if we have any gas licking finder it will help everyone at home to take action to overcome this problem in exiting system, in our paper in the proposed system we fixed a weight sensor for monitoring of weight of LPG cylinder time to time using a weight sensor, any type of Gas lick using gas sensor MQ-2, we will provide any android app to end user so that he will have live monitoring of LPG Gas Level, temperature and humidity sensor GAS lice and SMS notification like gas level, gas status.
DESIGN OF MOBILE SURVEILLANCE AND SECURITY BOT FOR HOME SAFETY
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 2586-2591
Nowadays robots are incorporated in the job which are often difficult for humans and these robots can be used as an effective alternative for humans.Mobile robots have become a significant topic in the security field Several techniques have been introduced to work with mobile robots and security. Most of these methods are not capable of working in low visibility environments and need to be manually controlled by a person all the time. In this smart security system, a mobile robot acts as an e-patrol in both light and dark environments. The design and implementation of mobile robots consist of three subsystems: The obstacle avoidance,image capturing and alarm indication for theft prevention.By means of which bot can be deployed for surveillance in a defined path with specific intervals.
Smart Mirror for Security and Home Appliances
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 1, Pages 4187-4199
The aim of the paper is design and develop a smart mirror for security and home appliances.The present generation devices are built with smart capabilities. The intelligence is embedded in themto act wise in deployed environment. Mirrors are basically used in home for the purpose of grooming upor getting ready for the day. The same mirrors can be made to behave Smart to provide Security andcontrol home appliances in deployed environment.The proposed system is designed using Raspberry Pi, Camera, raspberry Pi compatible touch screen,microphone as major hardware components and Python for programming. The system can accept threemodes of input commands namely touch, Mobile commands and voice commands. Touch screencommands can be used whenever an administrator/owner is in front of the mirror. The mobile basedcontrols can be used when the administrator/owner of the mirror is away from the mirror. The voicecommands can be used whenever the person is busy in work. Basically, the work of smart mirror is todisplay date, time on it and to provide security with the help of camera which is inserted behind the smartmirror and can also operate house hold appliances using this smart mirror. The basic theme of theproposed model is that, to make use and control of household appliances and providing security.
Energy Efficient and Secure Design for Wireless Sensor Networks Using Network Simulator
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 1, Pages 2367-2372
The scope of Wireless Sensor Networks (WSN) is fields tremendously improved in science, engineering, military, and health. Wireless Sensor Networks (WSN) equips the portable clients having large bandwidths through dynamic range with accessing different methods along with wireless various architecture. In This Proposed article is focus on optimize energy system with high security. Security became very challenging task now days to provide WSN systems. We proposed energy and security of WSN implement using cluster based grid adversarial method. The sensor nodes have a huge range of data to destination. Then the routing method is employed to analyze the shortest course of travel from source to destination. The proposed system will provide energy efficiency and security to the network with comparison with existing routing algorithm. The proposed method is using Network Simulator 2 for design.