SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3205
A Joint Optimization Approach to Security and Insurance Management
System
D. Vetriselvi1, A. Abinayaa2, S. Akshara3
1Assistant Professor, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering College, Chennai.
2,3 Final year Student, Dept of Computer Science and Engineering, Jeppiaar SRR Engineering College, Chennai.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - The main aim of this paper is acombinedapproach
to security and the cyber insurance provisioning in the cloud
based resources. Using a stochastic optimization, optimally
provisioning both services within the face of uncertainty
regarding future pricing, incoming traffic and cyberattacksis
presented. Thus, an application may guard against attacks by
provisioning security services from providers such as Avast
and Trend Micro. These services may take various forms, such
as secure data storage, and intrusion detection services to
screen incoming traffic. And then cyber insurance is employed
to provide explicit cover within the event that malicious
activity results in loss. Insurance coverage may be first- or
third-party with such as theft of money and digital assets,
business interruption, and cyber extortion, privacy breaches,
loss of third-party data.
Key Words: Security services, Cyber Insurance,
Stochastic Optimization, Cloud, Intrusion Detection.
1. INTRODUCTION
Computing services are increasingly cloud-based, resources
are invested in cloud based security measures.TheSecurity-
as-a-Service (SECaaS) allows customers to provide security
to the cloud, through the subscription fee. However, no
security system is bulletproof. So, one successful attack can
result in the loss of data and revenue worth millions of
dollars. To compensate the loss, customers may also
purchase cyber insurance. It uses a stochastic optimization
model to optimally provision security, and insurance
services in the cloud. The accurate estimation of damages
caused by cyber attacks is one of the key challenges in cyber
insurance.. The model designed may be a mixed integer
problem we also introduce a partial Lagrange multiplier
algorithm that takes advantage of the entire unimodularity
property to unravel the answer in polynomial time. In this
application run on customer machine that we assume to be
Internet-accessible, either on a cloud service like Amazon.
Applications receive data packets in accordance with their
operating purpose, e.g. email data or financial transactions.
Legitimate packets are called safe packets, while packets
used in cyber attacks are called unsafe packets. Unsafe
packets are deemed handled if they're correctly detected by
security services, or unhandled if they're not successfully
processed. These unhandled packets will cause damage,
which incurs costs to the customer will refund the quantity
to insurance firm . And then IMP will refund the particular
data cost to customer.
2. RELATED WORKS
There are two aspects to thesystemmodelwhichwepropose
during this paper. One is the matter of Security Service
allocation, and thus the second is cyber insurance
provisioning. Recent add security within thepapertitledWill
Cyber-Insurance Improve Network Security? Has illustrated
that solutions aimed toward detection and elimination of
security threats alone are unlikely to end in a strong
cyberspace. Asan orthogonal approachinmitigatingsecurity
problems, some have pursued the utilization of cyber-
insurance as an appropriate risk management technique.
Such an approach has the potential to jointly align with the
incentives of security vendors, cyber-insurers, cloud
providers, and network users (individuals and
organizations), successively paving the way for
comprehensive and robust cyber-security mechanisms. To
the present end, during this work, we are motivated by the
subsequent important question: can cyber-insurance really
improve the safety during a network? To deal with this
question, we adopt a market-based approach. This fact also
emphasizes the necessity for designing mechanisms that
incentivize the insurer to permanently be a part of the
market.
With the implementation of cloud platforms in mobile
system, within the paper titled Security in Mobile Cloud
Computing by Prashant Pranav the storage of bulk data by
client has becomeeasier. IT Industries also are exploitingthe
advantages of cloud computing by producing moreandmore
smart phones that take full advantage of the features of
clouds. Because the use of smart phones by the users is
increasing rapidly, the difficulty of security associated with
use of cloud computing technique in mobile computing
environment has emerged together of the most important
challenges during this regard. Security with regard to mobile
cloud computing is often addressedatthreelevelsviz.mobile
terminal, mobile network security, and cloud storage.
Although many attempts are made in developing a model
which ensures privacy and security of knowledge in mobile
cloud system, no model is free frommaliciousattacks.During
this review paper, we have focused on few models which are
aimed toward giving security and privacy of knowledge in
mobile cloud.
A comparative study of a different cloud service, cloud
security issues andcloud providers helpinchoosingtheright
cloud service. Cloud computing is the most emerging field in
the field of computing. In this various cloud services along
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3206
with the cloud security issues has been analyzed. Also, the
comparison of three major cloud service providers namely
Amazon AWS, windows Azure and Google App Engine have
been carried out in the terms of security and security issues.
It will help the consumers of cloud services to choose the
right cloud provider according to their requirements and
needs.
3. PROPOSED SYSTEM
In this paper, we present SECaaS in firewall-style to provide
a security policy enforcement and monitoringinfrastructure
for network traffic which focuses on network traffic analysis
like IDS (Intrusion Detection System) implementations to
identify attack behaviors. And then relationship between
cyber insurance and SECaaS provisioning, contains a
customer who uses applications, which receive Internet
traffics in the form of packets. These packets are scanned by
security services,provisionedbya subscriptionmanagement
process (SMP). In this application run on customer machine
that we assume to be Internet-accessible, either on a cloud
service like Amazon. Applications receive data packets in
accordance with theiroperatingpurpose.Legitimatepackets
are called safe packets, while packets used in cyber attacks
are called unsafe packets. Unsafe packets are deemed
handled if they are correctly detectedbysecurityservices,or
unhandled if they are not successfully processed. These
unhandled packets will cause damage, which incurs costs to
the customer will refund the amount to insurance company.
And then IMP(insurance management process) will refund
the particular data cost to customer.
4. PROPOSED ARCHITECTURE
5. PROPOSED METHODOLOGY
In this paper, Lagrange multiplier algorithm and banking
interface is used.
5.1. Lagrange Multiplier Algorithm
The model designed may be a mixed integer problem we
introduce a partial Lagrange multiplier algorithm that takes
advantage of the entire unimodularity property to identify
the answer in the polynomial time. The mixed integer
programming deterministic equivalent formulation is an
effective way of identifying the optimum solution to the
stochastic optimization, but suffers from tractability
problems, as we would normally use a way like branch-and-
bound, which has exponential computational complexity.
Both the Artificial Intelligence (AI) community, and
therefore, the research (OR) community have an interest in
developing techniques for solving hard combinatorial
problems. Furthermore, there's an excellent deal ofoverlap
in research on local search and meta-heuristics by both
communities. However, if we will convert our problem to a
linear program (LP) without lossofprecision,wewill solveit
in polynomial time. The partial Lagrange multiplier method
will always converge to the optimal solution.
5.2. Banking Interface
In this banking is interfaced for the financial transactions.
With the help of this, amount could be debited and credited.
6. MODULES AND DESCRIPTION
6.1. Purchase the Security services
In this module user first register the cloud site and provide
the user details. And then login the user credential details.
Then user will purchase Security Service in cloud. In this
Security Service has a variouscontrolandprice,validity.User
will choose our system performance based services then
immediately transfer amount to security management. Once
got the service, will protect the customer application and
system to particular time periods.
6.2. Cloud service
In this module, user register thecloudservicesupporteduser
credential details then login the cloud resource. Once enter
the cloud site or application to utilize the location. If your
application could also be social network to share your post
and chat with our friends. Users can also upload their
pictures intothesocialnetworkingsite.Whileuploading,user
provides tags for the image. At equivalent time security
system will protect the appliance to every and each request
to cloud then way of securing cloud-based data.
6.3. Screening Data traffic
In our security model, service managed by the customer
applications then monitor the traffic flow and screening
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3207
incoming data packets in accordance with their operating
purpose, e.g. email data or financial transactions, web pages.
Legitimate packets are called safe packets, while packets
utilized in cyber attacks are called unsafe packets. Unsafe
packets are deemed to be handled if they are correctly
detected by security services, or unhandled if they are not
successfully processed. These unhandled packets incurcosts
to the customer. So SECaaS tobe noted onuserpacketsize.At
an equivalent time service will redirect to the insurance
management process(IMP).
6.4. Claim Insurance
In this module IMP will check whether the user isa customer
or not. And then check the customer current premium data
and evaluatethe present unhandled data size tocalculatethe
particular per-packet, price, duration,andmaximumnumber
of packets affected. We introduce a partial Lagrange
multiplier algorithm to find the optimal solution in a
parameter change to calculate the amount to data size. And
then refund the amount to particular customer. The price for
insurance purchased beforehand ischargedataratereferred
to as a future premium. The IMP purchases insurance
policies, which incorporates the premium, sorts of risks
covered, indemnity value, and policy duration.
7. CONCLUSION
In this paper, we've presented a combined approach to
security and the cyber insurance provisioning within the
cloud. It provides an experimental evaluation derived by
running real traffic data through an Intrusion Detection
System. Lagrange multiplier method exploits the total
unimodularity property to guarantee integer solutions.This
problem is solved iteratively employing a sub gradient
method, which we proveconvergestotheoptimal solutionin
at the worst polynomial time. The main challenge of cyber
insurance is that the ability to detect cyber attacks, estimate
accurate damages, and successfully make insurance claims.
8. REFERENCES
[1] R. Pal, L. Golubchik, K. Psounis, and P. Hui, “Will cyber-
insurance improve network security? A market analysis,” in
Proc. IEEE INFOCOM 2014 - IEEE Conf. Comput. Commun.,
Apr. 2014, pp. 235–243.
[2] S. Chaisiri, R. K. L. Ko, and D. Niyato, “A joint optimization
approach to security-as-a-service allocation and cyber
insurance management,” in Proc. Trustcom. Big Data
SE/ISPA, 2015, pp. 426–433.
[3] Kai Hwang, Deyi Li, Trusted Cloud Computing with
Secure Resources and Data Coloring in IEEE Internet
computing ,2010.
[4] A. Holder, Parametric Linear Programming, March 3,
2010.
[5]C. P. Gomes, “Structure, duality, and randomization:
Common themes in AI and OR,” in Proc. 17th National Conf.
Artif. Intell. 12th Conf. Innovative Appl. Artif. Intell., 2000,
pp. 1152–1158.
[6] Satish Kumar, Vishal Thakur, Ashok Kumar Kashyap, A
Comparative study of differentcloudservices,Cloudsecurity
issues and Cloud Providers in IJLTET in 2016.

More Related Content

What's hot

A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...eSAT Publishing House
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesConfident Technologies
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centerVenkat Projects
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmijcncs
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military NetworksSecure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networksravi sharma
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 

What's hot (20)

A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military NetworksSecure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 

Similar to IRJET - A Joint Optimization Approach to Security and Insurance Management System

IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network SecurityIRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 

Similar to IRJET - A Joint Optimization Approach to Security and Insurance Management System (20)

IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Br36413417
Br36413417Br36413417
Br36413417
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

IRJET - A Joint Optimization Approach to Security and Insurance Management System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3205 A Joint Optimization Approach to Security and Insurance Management System D. Vetriselvi1, A. Abinayaa2, S. Akshara3 1Assistant Professor, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering College, Chennai. 2,3 Final year Student, Dept of Computer Science and Engineering, Jeppiaar SRR Engineering College, Chennai. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - The main aim of this paper is acombinedapproach to security and the cyber insurance provisioning in the cloud based resources. Using a stochastic optimization, optimally provisioning both services within the face of uncertainty regarding future pricing, incoming traffic and cyberattacksis presented. Thus, an application may guard against attacks by provisioning security services from providers such as Avast and Trend Micro. These services may take various forms, such as secure data storage, and intrusion detection services to screen incoming traffic. And then cyber insurance is employed to provide explicit cover within the event that malicious activity results in loss. Insurance coverage may be first- or third-party with such as theft of money and digital assets, business interruption, and cyber extortion, privacy breaches, loss of third-party data. Key Words: Security services, Cyber Insurance, Stochastic Optimization, Cloud, Intrusion Detection. 1. INTRODUCTION Computing services are increasingly cloud-based, resources are invested in cloud based security measures.TheSecurity- as-a-Service (SECaaS) allows customers to provide security to the cloud, through the subscription fee. However, no security system is bulletproof. So, one successful attack can result in the loss of data and revenue worth millions of dollars. To compensate the loss, customers may also purchase cyber insurance. It uses a stochastic optimization model to optimally provision security, and insurance services in the cloud. The accurate estimation of damages caused by cyber attacks is one of the key challenges in cyber insurance.. The model designed may be a mixed integer problem we also introduce a partial Lagrange multiplier algorithm that takes advantage of the entire unimodularity property to unravel the answer in polynomial time. In this application run on customer machine that we assume to be Internet-accessible, either on a cloud service like Amazon. Applications receive data packets in accordance with their operating purpose, e.g. email data or financial transactions. Legitimate packets are called safe packets, while packets used in cyber attacks are called unsafe packets. Unsafe packets are deemed handled if they're correctly detected by security services, or unhandled if they're not successfully processed. These unhandled packets will cause damage, which incurs costs to the customer will refund the quantity to insurance firm . And then IMP will refund the particular data cost to customer. 2. RELATED WORKS There are two aspects to thesystemmodelwhichwepropose during this paper. One is the matter of Security Service allocation, and thus the second is cyber insurance provisioning. Recent add security within thepapertitledWill Cyber-Insurance Improve Network Security? Has illustrated that solutions aimed toward detection and elimination of security threats alone are unlikely to end in a strong cyberspace. Asan orthogonal approachinmitigatingsecurity problems, some have pursued the utilization of cyber- insurance as an appropriate risk management technique. Such an approach has the potential to jointly align with the incentives of security vendors, cyber-insurers, cloud providers, and network users (individuals and organizations), successively paving the way for comprehensive and robust cyber-security mechanisms. To the present end, during this work, we are motivated by the subsequent important question: can cyber-insurance really improve the safety during a network? To deal with this question, we adopt a market-based approach. This fact also emphasizes the necessity for designing mechanisms that incentivize the insurer to permanently be a part of the market. With the implementation of cloud platforms in mobile system, within the paper titled Security in Mobile Cloud Computing by Prashant Pranav the storage of bulk data by client has becomeeasier. IT Industries also are exploitingthe advantages of cloud computing by producing moreandmore smart phones that take full advantage of the features of clouds. Because the use of smart phones by the users is increasing rapidly, the difficulty of security associated with use of cloud computing technique in mobile computing environment has emerged together of the most important challenges during this regard. Security with regard to mobile cloud computing is often addressedatthreelevelsviz.mobile terminal, mobile network security, and cloud storage. Although many attempts are made in developing a model which ensures privacy and security of knowledge in mobile cloud system, no model is free frommaliciousattacks.During this review paper, we have focused on few models which are aimed toward giving security and privacy of knowledge in mobile cloud. A comparative study of a different cloud service, cloud security issues andcloud providers helpinchoosingtheright cloud service. Cloud computing is the most emerging field in the field of computing. In this various cloud services along
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3206 with the cloud security issues has been analyzed. Also, the comparison of three major cloud service providers namely Amazon AWS, windows Azure and Google App Engine have been carried out in the terms of security and security issues. It will help the consumers of cloud services to choose the right cloud provider according to their requirements and needs. 3. PROPOSED SYSTEM In this paper, we present SECaaS in firewall-style to provide a security policy enforcement and monitoringinfrastructure for network traffic which focuses on network traffic analysis like IDS (Intrusion Detection System) implementations to identify attack behaviors. And then relationship between cyber insurance and SECaaS provisioning, contains a customer who uses applications, which receive Internet traffics in the form of packets. These packets are scanned by security services,provisionedbya subscriptionmanagement process (SMP). In this application run on customer machine that we assume to be Internet-accessible, either on a cloud service like Amazon. Applications receive data packets in accordance with theiroperatingpurpose.Legitimatepackets are called safe packets, while packets used in cyber attacks are called unsafe packets. Unsafe packets are deemed handled if they are correctly detectedbysecurityservices,or unhandled if they are not successfully processed. These unhandled packets will cause damage, which incurs costs to the customer will refund the amount to insurance company. And then IMP(insurance management process) will refund the particular data cost to customer. 4. PROPOSED ARCHITECTURE 5. PROPOSED METHODOLOGY In this paper, Lagrange multiplier algorithm and banking interface is used. 5.1. Lagrange Multiplier Algorithm The model designed may be a mixed integer problem we introduce a partial Lagrange multiplier algorithm that takes advantage of the entire unimodularity property to identify the answer in the polynomial time. The mixed integer programming deterministic equivalent formulation is an effective way of identifying the optimum solution to the stochastic optimization, but suffers from tractability problems, as we would normally use a way like branch-and- bound, which has exponential computational complexity. Both the Artificial Intelligence (AI) community, and therefore, the research (OR) community have an interest in developing techniques for solving hard combinatorial problems. Furthermore, there's an excellent deal ofoverlap in research on local search and meta-heuristics by both communities. However, if we will convert our problem to a linear program (LP) without lossofprecision,wewill solveit in polynomial time. The partial Lagrange multiplier method will always converge to the optimal solution. 5.2. Banking Interface In this banking is interfaced for the financial transactions. With the help of this, amount could be debited and credited. 6. MODULES AND DESCRIPTION 6.1. Purchase the Security services In this module user first register the cloud site and provide the user details. And then login the user credential details. Then user will purchase Security Service in cloud. In this Security Service has a variouscontrolandprice,validity.User will choose our system performance based services then immediately transfer amount to security management. Once got the service, will protect the customer application and system to particular time periods. 6.2. Cloud service In this module, user register thecloudservicesupporteduser credential details then login the cloud resource. Once enter the cloud site or application to utilize the location. If your application could also be social network to share your post and chat with our friends. Users can also upload their pictures intothesocialnetworkingsite.Whileuploading,user provides tags for the image. At equivalent time security system will protect the appliance to every and each request to cloud then way of securing cloud-based data. 6.3. Screening Data traffic In our security model, service managed by the customer applications then monitor the traffic flow and screening
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3207 incoming data packets in accordance with their operating purpose, e.g. email data or financial transactions, web pages. Legitimate packets are called safe packets, while packets utilized in cyber attacks are called unsafe packets. Unsafe packets are deemed to be handled if they are correctly detected by security services, or unhandled if they are not successfully processed. These unhandled packets incurcosts to the customer. So SECaaS tobe noted onuserpacketsize.At an equivalent time service will redirect to the insurance management process(IMP). 6.4. Claim Insurance In this module IMP will check whether the user isa customer or not. And then check the customer current premium data and evaluatethe present unhandled data size tocalculatethe particular per-packet, price, duration,andmaximumnumber of packets affected. We introduce a partial Lagrange multiplier algorithm to find the optimal solution in a parameter change to calculate the amount to data size. And then refund the amount to particular customer. The price for insurance purchased beforehand ischargedataratereferred to as a future premium. The IMP purchases insurance policies, which incorporates the premium, sorts of risks covered, indemnity value, and policy duration. 7. CONCLUSION In this paper, we've presented a combined approach to security and the cyber insurance provisioning within the cloud. It provides an experimental evaluation derived by running real traffic data through an Intrusion Detection System. Lagrange multiplier method exploits the total unimodularity property to guarantee integer solutions.This problem is solved iteratively employing a sub gradient method, which we proveconvergestotheoptimal solutionin at the worst polynomial time. The main challenge of cyber insurance is that the ability to detect cyber attacks, estimate accurate damages, and successfully make insurance claims. 8. REFERENCES [1] R. Pal, L. Golubchik, K. Psounis, and P. Hui, “Will cyber- insurance improve network security? A market analysis,” in Proc. IEEE INFOCOM 2014 - IEEE Conf. Comput. Commun., Apr. 2014, pp. 235–243. [2] S. Chaisiri, R. K. L. Ko, and D. Niyato, “A joint optimization approach to security-as-a-service allocation and cyber insurance management,” in Proc. Trustcom. Big Data SE/ISPA, 2015, pp. 426–433. [3] Kai Hwang, Deyi Li, Trusted Cloud Computing with Secure Resources and Data Coloring in IEEE Internet computing ,2010. [4] A. Holder, Parametric Linear Programming, March 3, 2010. [5]C. P. Gomes, “Structure, duality, and randomization: Common themes in AI and OR,” in Proc. 17th National Conf. Artif. Intell. 12th Conf. Innovative Appl. Artif. Intell., 2000, pp. 1152–1158. [6] Satish Kumar, Vishal Thakur, Ashok Kumar Kashyap, A Comparative study of differentcloudservices,Cloudsecurity issues and Cloud Providers in IJLTET in 2016.