{"title":"A hybrid blockchain proposal to improve valued added tax recovery","authors":"C. Gaie, M. Mueck","doi":"10.1504/ijitst.2022.10042220","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10042220","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nair, D. Harikrishnan, Shelbi Joseph, N. Sunilkumar
{"title":"A novel verification framework to analyse security attacks in a fingerprint authentication system","authors":"K. Nair, D. Harikrishnan, Shelbi Joseph, N. Sunilkumar","doi":"10.1504/ijitst.2022.10049155","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10049155","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ch. Madhubabu, P. Jancy, S. Pandiaraj, Iwin Thanakumar Joseph, S. Velliangiri
{"title":"An enhanced security framework for IoT environment using Jaya optimisation based genetic algorithm","authors":"Ch. Madhubabu, P. Jancy, S. Pandiaraj, Iwin Thanakumar Joseph, S. Velliangiri","doi":"10.1504/ijitst.2022.10047960","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047960","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Credit card fraud detection using predictive features and machine learning algorithms","authors":"Naoufal Rtayli, N. Enneya","doi":"10.1504/ijitst.2022.10051923","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10051923","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coded cooperative trust derivation for internet of things","authors":"Vidushi Sharma, Gamini Joshi","doi":"10.1504/ijitst.2022.10047056","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047056","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain technology for protection of biomedical documents in healthcare society","authors":"M. Kumar, A. Srivastava, R. Jayaraman","doi":"10.1504/ijitst.2022.10047205","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047205","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient way in sharing of IoT data and uses of blockchain in auditing the stored data","authors":"A. J. Lyimo, K. A. Kumar","doi":"10.1504/ijitst.2022.119669","DOIUrl":"https://doi.org/10.1504/ijitst.2022.119669","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Megha Vashishtha, P. Chouksey, D. Rajput, Somula Rama Subba Reddy, M. S. K. Reddy, G. T. Reddy, Harshita Patel
{"title":"Security and detection mechanism in IoT-based cloud computing using hybrid approach","authors":"Megha Vashishtha, P. Chouksey, D. Rajput, Somula Rama Subba Reddy, M. S. K. Reddy, G. T. Reddy, Harshita Patel","doi":"10.1504/ijitst.2021.10040779","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040779","url":null,"abstract":"The combination of RSA and RC4 is accepted for the generation of key to get the superior security method, on image, blowfish algorithm is applied. In this method, initially cloud provider registers the cloud user which authenticates the user, then text and image data can be uploaded in the existing four servers. If those files are demanded by the other cloud user's then data classification encryption standard have been applied. The textual data is practiced with the enhanced RC6 method with key processing method of RC4 and RSA algorithm. These keys are used for the data decryption from the further side. The TA gives the information of the mismatch in the last prefix of the combination of the user detail and the data. If it does not match then the data will be corrupted by the blocker algorithm. The whole parametric comparison implies that the performance of our framework outperforms over traditional techniques.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42423505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Venkateswara Raju Konduru, Manjula R. Bharamagoudra
{"title":"An architecture for enabling IoT interoperability between cross-platforms","authors":"Venkateswara Raju Konduru, Manjula R. Bharamagoudra","doi":"10.1504/ijitst.2021.10040788","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040788","url":null,"abstract":"The internet of things (IoT) continues to evolve and more and more IoT platforms provide access to things. However, IoT's ability lies in the development of cross-domain IoT ecosystems in these platforms, offering new, unexpected applications and value-added services. We have identified two key perspectives critical to the development of an IoT ecosystem: 1) enable interoperability between platform development and cross-platform implementation of applications on internet platforms; 2) market (or trade centre) to exchange and adapt IoT resources. Given these two important perspectives of an IoT ecosystem, this article introduces the bridging the interoperability gap (BIG) IoT architecture as the basis for the creation of IoT ecosystems. Architecture responds to key needs that have been evaluated by industry and research associations as a key aspect of the BIG IoT project. We present a proof of the application of the concept in the context of a smart healthcare scenario. We adopted the generic RESTful application programming interface (API) methodology to detect and interact the smart object platforms.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47654789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective cloud-based smart home appliances automation in IoT using PHMM model","authors":"M. Sundarakumar, S. Sankar, S. Reddy","doi":"10.1504/ijitst.2021.10040789","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040789","url":null,"abstract":"Internet of things (IoT) is an emerging and innovative approach to control the home appliances remotely. A trillion of devices are connected to the internet that are controlled and monitored in real-world applications. The main goal is to provide the automation for home appliances using IoT. Wireless sensor networks (WSNs)-based home automation systems are very difficult to manage with the devices using a centralised approach due to the mobility. To solve this issue, wireless home automation system (WHAS) is proposed, which uses the predictive hidden Markov model (PHMM) to control the devices efficiently and conserves the energy utilisation among the devices. The status of the devices are monitored continuously and selecting the device operation either in manual mode or automatic mode using the PHMM model. The proposed approach conserves more energy than traditional methods.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49332176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}