{"title":"A novel intrusion detection system in cloud infrastructure using deep learning technique","authors":"Dharani Kumar Talapula, Adarsh Kumar, Kiran Kumar Ravulakollu, Manoj Kumar","doi":"10.47974/jdmsc-1739","DOIUrl":"https://doi.org/10.47974/jdmsc-1739","url":null,"abstract":"One of the business strategies for selling computer resources with services and technology for better use of computing infrastructures is Cloud computing (CC). Nowadays, every IT company prefers cloud computing because it provides consumers with flexible, pay-per-use services. Due to its open and distributed structure, which is susceptible to attackers, thereby, privacy and security is a key obstacle to its sustainability. The most prevalent approach for detecting assaults on the cloud is known to be Intrusion Detection System (IDS). This article aims to propose a novel intrusion pattern detection system (IPDS) in cloud computing that includes three stages: (1) pre-processing, (2) feature extraction, and (3) classification. At first, pre-processing is performed on the input data via Z-score normalization and then feature extraction is performed along with statistical and higher-order statistical features. Subsequently, the extracted features are given to the classification phases that use the Optimized Quantum Neural Network (QNN) classifier. The hidden neuron optimization is performed by Cubic Chaotic Map integrated Cat and Mouse Based Optimization (CC-CMBO) Algorithm to make the classification more exact. Finally, the results of the proposed work are assessed to those of standard systems with respect to various measures.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satpal Singh Kushwaha, Sandeep Joshi, Amit Kumar Gupta
{"title":"An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach","authors":"Satpal Singh Kushwaha, Sandeep Joshi, Amit Kumar Gupta","doi":"10.47974/jdmsc-1815","DOIUrl":"https://doi.org/10.47974/jdmsc-1815","url":null,"abstract":"The technology behind blockchain is quickly becoming one of the most crucial innovations in recent years. The Smart contracts are digital agreements, made in between two untrusted parties. Smart contracts are self-executable small piece of code that gets executed due to some predefined triggering conditions. Smart contracts store cryptocurrencies as their balances and deal in cryptocurrencies on network transactions. Because of this, smart contracts are constantly open to the possibility of being attacked. A single security vulnerability can make the smart contract very much insecure. The immutability property of the blockchain ensures that, once a smart contract has been placed on the blockchain, cannot be modified in any way. So, the smart contract must be analyzed for any kind of security vulnerability before its deployment on the blockchain. Existing analysis approaches detect vulnerabilities with high false positive rates. Our proposed approach analyses the smart contracts using a hybrid combination of pattern matching and symbolic execution, which produces results with a low false positive rate. We have performed a comparative analysis of our proposed approach to prove its efficiency with the existing research approaches on a data set of 453 smart contracts with tagged vulnerabilities.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An advanced cloud based framework for privacy and security in medical data using cryptographic method","authors":"Rashmi Welekar, Farhadeeba Shaikh, Abhijit Chitre, Kirti Wanjale, Shabana Pathan, Anil Kumar","doi":"10.47974/jdmsc-1826","DOIUrl":"https://doi.org/10.47974/jdmsc-1826","url":null,"abstract":"The exchange of medical information has been drastically altered by patient-centered developments such as personal health records (PHR). By giving patients a place to handle their own PHR on a unified transactional platform, personal health record (PHR) services increase the efficiency with which medical information may be kept, accessed, and transferred. With the ultimate objective of providing patients with total surveillance under data, our findings is focused on creating a state-of-the-art infrastructure for the safe transfer of personal health data via cloud computing. Patients have the option of encrypting their PHR files, which provides an additional layer of security and allows them to set access control limits such as who has access to their files and to what degree. When data is encrypted in the cloud, only approved users may access it. Using cloud-based platforms to share health records raises concerns over confidentiality and privacy, which are addressed by the proposed method. Patients may still benefit from data interchange for the goal of better healthcare thanks to the framework’s provision of an encrypted PHR file option. This framework may accommodate attribute-based encryption (ABE) and other kinds of granular security. These measures ensure that people may continue to have access to, and make changes to, their own medical data, even when they are stored on the cloud. This article presents research that attempts to meet the demands of patients while also providing a safe method of transferring individual health information through cloud computing.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135358397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The inclusion subsemimodule graph of a semimodule","authors":"Ahmed H Alwan, Zahraa A. Nema","doi":"10.47974/jdmsc-1636","DOIUrl":"https://doi.org/10.47974/jdmsc-1636","url":null,"abstract":"Let R be an abelian semiring with unity, U be an R-semimodule. The inclusion subsemimodule graph of U, indicated IS(U), is a graph with nodes that all non-trivial subsemimodules of U and two different nodes N and L are adjacent if and only if N ⊂ L or L ⊂ N. In this worke, proved that if U is subtractive semimodule then IS(U) is not connected if is a direct sum of two simple R-semimodules. Besides, it has been proved that IS(U) is a complete graph if and only if U is a uniserial semimodule. girth, diameter, chromatic and clique numbers of IS(U) have been studied. and only if U.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mamoqenelo P. Morolong, Fungai Bhunu Shava, Attlee M. Gamundani
{"title":"Cloud computing security in health cyber physical systems","authors":"Mamoqenelo P. Morolong, Fungai Bhunu Shava, Attlee M. Gamundani","doi":"10.47974/jdmsc-1821","DOIUrl":"https://doi.org/10.47974/jdmsc-1821","url":null,"abstract":"The health industry as one of the Critical Infrastructures has rapidly grown in adopting the use of new ubiquitous technologies in advancing its critical services. The industry because of its high need and usage of new technologies is encountering a myriad of challenges including cyber-attacks. Among the technologies adopted by the health industry is the use of cloud computing services for managing Electronic Medical Records (EMR) on the cloud environment. Today’s medical devices use sensors that collect data from the diverse environments such as the human heart and such data is sent to the cloud for better analysis, monitoring, or management. However, attackers exploit every single development to advance health or medical services like all the other cyber systems. The scope of this paper is to investigate how cloud computing services adopted in Health Cyber Physical Systems can be secured from the prevalent cybersecurity challenges. The study followed a systematic literature review, where data was collected from online databases with set search constraints such as language, date of publication and specific keywords. This paper presents how cloud computing integrated with the medical cyber physical systems can impeccably securely manage the health systems. More specifically the collection, monitoring, and management of real-time data and as a result of this integration, different cyber-attacks are escalating.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amara S. A. L. G. Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru
{"title":"Multiplayer reputation-based coalition game model (MRCGM) with dominant strategy analysis for detecting malicious attacks in wireless sensor networks","authors":"Amara S. A. L. G. Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru","doi":"10.47974/jdmsc-1772","DOIUrl":"https://doi.org/10.47974/jdmsc-1772","url":null,"abstract":"Wireless Sensor Networks (WSNs) are turning into an essential portion of our lives. Devoid of assuring WSNs security (WS), there remain no broad implementations of WSNs. Because of sensor nodes’ constrained capacities concerning computation, communication, and energy, giving protection to WSNs remains competitive. Indeed, the procedure of applying WS remains adaptable and vibrant that develops consistently. Attack-defend’s crux in WS could be conveyed by collaborative schemes of interdependency when Game Theory (GT) could be employed to consider communications amidst schemes of logical decision-makers. Hence, learning WS alongside GT possesses greater logic. This study proffers a Multiplayer Reputation-based Coalition Game Model (MRCGM) for seeking the false data injection amidst the nodes. An attacker attempts to sustain an ideal level of belief by correlating the identifications within the network (NW) to initiate a victorious transfer. Concurrently, the attacker should acquire a few charges for sustaining the trustability of its identifications. This proffered procedure employs this notion and turns the attack expensive by fixing a global threshold for nodes or identifications to be trustable and functional within the NW. Additionally, the beneficial function of the attacker and defender is as well described. The MRCGM has been correlated with 2 advanced methodologies like security-aware routing scheme employing repeated game (SARSRGM) paradigm and a Game-based Fuzzy Q-learning (GBFQL) scheme concerning diverse criteria. Consequently, the proffered MRCGM attains 124 kbps of Packet Drop Rate, 76.14% of energy efficiency, 96.1% of detection accuracy, 25.45% of energy consumption, and 102.45 ms of routing latency.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy visible submodules in the class of fuzzy faithful multiplication modules","authors":"Sajda K. Mohammed, Buthyna N. Shihab","doi":"10.47974/jdmsc-1635","DOIUrl":"https://doi.org/10.47974/jdmsc-1635","url":null,"abstract":"In this paper, the behavior of fuzzy visible submodules and its effect of it in the class of fuzzy faithful multiplication modules have been studied. Some relationship between fuzzy visible modules and fuzzy residual quotient ideals has been presented. Also, other properties with important results have been studied.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operating system security with discrete mathematical structure for secure round robin scheduling method with intelligent time quantum","authors":"Anil Kumar, Amit Kumar Gupta, Deepak Panwar, Sandeep Chaurasia, Dinesh Goyal","doi":"10.47974/jdmsc-1816","DOIUrl":"https://doi.org/10.47974/jdmsc-1816","url":null,"abstract":"These days, the problems of scheduling and security are increasingly pressing as a result of the rapidly growing number of implementations that are operated in operating systems. Process scheduling and scheduling security is the most effective methodology of operating a system which can improve and degrade the performance of the computer system. The performance of scheduling algorithm in operating system can be measured by scheduling principles like average waiting time, average turnaround time, response time, throughput etc. Much research carried out over operating system security and round robin scheduling used in time sharing operating system in previous years to resolve the issues regarding to improvement in the performance of round robin (RR) scheduling and improving the security in the scheduling approach. This study discussed the security issues in operating systems, scheduling security and discrete structure of a new approach for RR scheduling. The researcher has suggested a list of policy for scheduling method security and proposed a new approach for RR scheduling and investigated the scheduling principles. The proposed methodology covers distinctive strategy for selection manner of process from ready queue than RR and used diverges time quantum. The proposed methodology has been validated experimentally by comparing with a numerous scheduling algorithm namely as Round Robin (RR), Adaptive Round Robin (ARR), Round Robin Remaining time (RRRT), improved Round Robin (IRR), an additional improvement on the improved Round Robin (AAAIRR), and an Enhanced Round Robin (ERR). Numerous simulations have been conducted to validate the effectiveness of the proposed algorithm to compelling the performance of system. At the conclusion the performance of computing system is dependent on security of operating system as well as secluding methods.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based framework for secure and efficient exchange of electronic medical records on mobile cloud environments","authors":"Vaibhav Nivrutti Patil, Vijay H. Kalmani","doi":"10.47974/jdmsc-1817","DOIUrl":"https://doi.org/10.47974/jdmsc-1817","url":null,"abstract":"The maintenance of Electronic Medical Records (EMRs) on mobile cloud platforms, in which mobile devices are incorporated with cloud computing to ease healthcare information exchange between healthcare providers and patients, has become a paradigm shift in latest days. This cutting-edge strategy makes it possible to provide medical care at a low overhead expense, with a high level of flexibility, and with electronic health record access. Furthermore, this new approach also expresses concern over the confidentiality of patient data and the safety of the networks that support e-health systems. It is a tough problem to figure out a way to effectively share EMRs amongst mobile users while also maintaining maximum security measures in mobile cloud environments. In this research, a novel framework is presented for the sharing of EMRs that integrates blockchain technology and the decentralized Interplanetary File System (DIFS) on a mobile cloud. The empirical results suggest that the concept offers a useful method for ensuring the reliability of data transfers on mobile clouds, while also preserving important patient data from any potential dangers that may arise. Comparing the results of this performance assessment and security analysis to those of previously implemented data sharing models reveals significant performance enhancements in areas such as lightweight access control method, minimal network latency, maximum security levels, and data privacy protections.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an IoT-based smart healthcare eco system for precise ageing illness detection and prognosis","authors":"Kamlesh Mani, Kamlesh Kumar Singh, Ratnesh Litoriya","doi":"10.47974/jdmsc-1746","DOIUrl":"https://doi.org/10.47974/jdmsc-1746","url":null,"abstract":"The article aims to provide a comprehensive review of the current state of smart healthcare systems, focusing on important topics such as the use of wearables and smartphones for health monitoring, the application of AI and machine learning for illness detection, and the integration of assistive frameworks like social robots for ambient-supported living. One of the key aspects discussed in the study is the software integration architectures required for the development of smart healthcare systems and the seamless integration of data. Analytics and various AI technologies are utilized in conjunction to create these systems. The article examines the different approaches employed in the development of these systems, highlighting the contributions of each framework, the overall functioning methodology, performance outputs, and comparative advantages and limitations. Moreover, the article also addresses current research challenges and identifies prospective future directions. It emphasizes the shortcomings of existing smart healthcare systems and proposes strategies for introducing innovative frameworks to overcome these limitations. The analysis aims to provide detailed insights into recent advancements in smart healthcare systems, enabling specialists to contribute to the field with their expertise. Overall, the article serves as a valuable resource for understanding the current landscape of smart healthcare systems, shedding light on recent breakthroughs, and encouraging further research and development in this rapidly evolving field.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}