Submit Search
Upload
IRJET - A Joint Optimization Approach to Security and Insurance Management System
•
0 likes
•
4 views
IRJET Journal
Follow
https://irjet.net/archives/V7/i2/IRJET-V7I2690.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
20120130406025
20120130406025
IAEME Publication
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
ijcncs
Recommended
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
20120130406025
20120130406025
IAEME Publication
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
ijcncs
A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...
eSAT Publishing House
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IJECEIAES
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
Confident Technologies
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Publishing House
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
Venkat Projects
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
ijcncs
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
ijcncs
Ad4502189193
Ad4502189193
IJERA Editor
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Cloud computing
Cloud computing
cloudresearcher
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
ravi sharma
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
paperpublications3
Ijcet 06 07_002
Ijcet 06 07_002
IAEME Publication
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
Securing Cloud from Cloud Drain
Securing Cloud from Cloud Drain
Eswar Publications
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
More Related Content
What's hot
A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...
eSAT Publishing House
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IJECEIAES
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
Confident Technologies
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Publishing House
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
Venkat Projects
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
ijcncs
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
ijcncs
Ad4502189193
Ad4502189193
IJERA Editor
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Cloud computing
Cloud computing
cloudresearcher
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
ravi sharma
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
paperpublications3
Ijcet 06 07_002
Ijcet 06 07_002
IAEME Publication
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
Securing Cloud from Cloud Drain
Securing Cloud from Cloud Drain
Eswar Publications
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
What's hot
(20)
A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
Survey on cloud computing security techniques
Survey on cloud computing security techniques
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
Ad4502189193
Ad4502189193
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Cloud computing
Cloud computing
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
Ijcet 06 07_002
Ijcet 06 07_002
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
Securing Cloud from Cloud Drain
Securing Cloud from Cloud Drain
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Similar to IRJET - A Joint Optimization Approach to Security and Insurance Management System
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
Br36413417
Br36413417
IJERA Editor
Latest Cybersecurity Trends
Latest Cybersecurity Trends
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
Ijmer 41025357
Ijmer 41025357
IJMER
Ijmer 41025357
Ijmer 41025357
IJMER
Ijmer 41025357
Ijmer 41025357
IJMER
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
IRJET- Machine Learning based Network Security
IRJET- Machine Learning based Network Security
IRJET Journal
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
I017225966
I017225966
IOSR Journals
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
iosrjce
Smart surveillance using deep learning
Smart surveillance using deep learning
International Journal of Reconfigurable and Embedded Systems
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Similar to IRJET - A Joint Optimization Approach to Security and Insurance Management System
(20)
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
Br36413417
Br36413417
Latest Cybersecurity Trends
Latest Cybersecurity Trends
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IRJET- Machine Learning based Network Security
IRJET- Machine Learning based Network Security
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
I017225966
I017225966
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
Smart surveillance using deep learning
Smart surveillance using deep learning
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
power system scada applications and uses
power system scada applications and uses
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
IRJET - A Joint Optimization Approach to Security and Insurance Management System
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3205 A Joint Optimization Approach to Security and Insurance Management System D. Vetriselvi1, A. Abinayaa2, S. Akshara3 1Assistant Professor, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering College, Chennai. 2,3 Final year Student, Dept of Computer Science and Engineering, Jeppiaar SRR Engineering College, Chennai. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - The main aim of this paper is acombinedapproach to security and the cyber insurance provisioning in the cloud based resources. Using a stochastic optimization, optimally provisioning both services within the face of uncertainty regarding future pricing, incoming traffic and cyberattacksis presented. Thus, an application may guard against attacks by provisioning security services from providers such as Avast and Trend Micro. These services may take various forms, such as secure data storage, and intrusion detection services to screen incoming traffic. And then cyber insurance is employed to provide explicit cover within the event that malicious activity results in loss. Insurance coverage may be first- or third-party with such as theft of money and digital assets, business interruption, and cyber extortion, privacy breaches, loss of third-party data. Key Words: Security services, Cyber Insurance, Stochastic Optimization, Cloud, Intrusion Detection. 1. INTRODUCTION Computing services are increasingly cloud-based, resources are invested in cloud based security measures.TheSecurity- as-a-Service (SECaaS) allows customers to provide security to the cloud, through the subscription fee. However, no security system is bulletproof. So, one successful attack can result in the loss of data and revenue worth millions of dollars. To compensate the loss, customers may also purchase cyber insurance. It uses a stochastic optimization model to optimally provision security, and insurance services in the cloud. The accurate estimation of damages caused by cyber attacks is one of the key challenges in cyber insurance.. The model designed may be a mixed integer problem we also introduce a partial Lagrange multiplier algorithm that takes advantage of the entire unimodularity property to unravel the answer in polynomial time. In this application run on customer machine that we assume to be Internet-accessible, either on a cloud service like Amazon. Applications receive data packets in accordance with their operating purpose, e.g. email data or financial transactions. Legitimate packets are called safe packets, while packets used in cyber attacks are called unsafe packets. Unsafe packets are deemed handled if they're correctly detected by security services, or unhandled if they're not successfully processed. These unhandled packets will cause damage, which incurs costs to the customer will refund the quantity to insurance firm . And then IMP will refund the particular data cost to customer. 2. RELATED WORKS There are two aspects to thesystemmodelwhichwepropose during this paper. One is the matter of Security Service allocation, and thus the second is cyber insurance provisioning. Recent add security within thepapertitledWill Cyber-Insurance Improve Network Security? Has illustrated that solutions aimed toward detection and elimination of security threats alone are unlikely to end in a strong cyberspace. Asan orthogonal approachinmitigatingsecurity problems, some have pursued the utilization of cyber- insurance as an appropriate risk management technique. Such an approach has the potential to jointly align with the incentives of security vendors, cyber-insurers, cloud providers, and network users (individuals and organizations), successively paving the way for comprehensive and robust cyber-security mechanisms. To the present end, during this work, we are motivated by the subsequent important question: can cyber-insurance really improve the safety during a network? To deal with this question, we adopt a market-based approach. This fact also emphasizes the necessity for designing mechanisms that incentivize the insurer to permanently be a part of the market. With the implementation of cloud platforms in mobile system, within the paper titled Security in Mobile Cloud Computing by Prashant Pranav the storage of bulk data by client has becomeeasier. IT Industries also are exploitingthe advantages of cloud computing by producing moreandmore smart phones that take full advantage of the features of clouds. Because the use of smart phones by the users is increasing rapidly, the difficulty of security associated with use of cloud computing technique in mobile computing environment has emerged together of the most important challenges during this regard. Security with regard to mobile cloud computing is often addressedatthreelevelsviz.mobile terminal, mobile network security, and cloud storage. Although many attempts are made in developing a model which ensures privacy and security of knowledge in mobile cloud system, no model is free frommaliciousattacks.During this review paper, we have focused on few models which are aimed toward giving security and privacy of knowledge in mobile cloud. A comparative study of a different cloud service, cloud security issues andcloud providers helpinchoosingtheright cloud service. Cloud computing is the most emerging field in the field of computing. In this various cloud services along
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3206 with the cloud security issues has been analyzed. Also, the comparison of three major cloud service providers namely Amazon AWS, windows Azure and Google App Engine have been carried out in the terms of security and security issues. It will help the consumers of cloud services to choose the right cloud provider according to their requirements and needs. 3. PROPOSED SYSTEM In this paper, we present SECaaS in firewall-style to provide a security policy enforcement and monitoringinfrastructure for network traffic which focuses on network traffic analysis like IDS (Intrusion Detection System) implementations to identify attack behaviors. And then relationship between cyber insurance and SECaaS provisioning, contains a customer who uses applications, which receive Internet traffics in the form of packets. These packets are scanned by security services,provisionedbya subscriptionmanagement process (SMP). In this application run on customer machine that we assume to be Internet-accessible, either on a cloud service like Amazon. Applications receive data packets in accordance with theiroperatingpurpose.Legitimatepackets are called safe packets, while packets used in cyber attacks are called unsafe packets. Unsafe packets are deemed handled if they are correctly detectedbysecurityservices,or unhandled if they are not successfully processed. These unhandled packets will cause damage, which incurs costs to the customer will refund the amount to insurance company. And then IMP(insurance management process) will refund the particular data cost to customer. 4. PROPOSED ARCHITECTURE 5. PROPOSED METHODOLOGY In this paper, Lagrange multiplier algorithm and banking interface is used. 5.1. Lagrange Multiplier Algorithm The model designed may be a mixed integer problem we introduce a partial Lagrange multiplier algorithm that takes advantage of the entire unimodularity property to identify the answer in the polynomial time. The mixed integer programming deterministic equivalent formulation is an effective way of identifying the optimum solution to the stochastic optimization, but suffers from tractability problems, as we would normally use a way like branch-and- bound, which has exponential computational complexity. Both the Artificial Intelligence (AI) community, and therefore, the research (OR) community have an interest in developing techniques for solving hard combinatorial problems. Furthermore, there's an excellent deal ofoverlap in research on local search and meta-heuristics by both communities. However, if we will convert our problem to a linear program (LP) without lossofprecision,wewill solveit in polynomial time. The partial Lagrange multiplier method will always converge to the optimal solution. 5.2. Banking Interface In this banking is interfaced for the financial transactions. With the help of this, amount could be debited and credited. 6. MODULES AND DESCRIPTION 6.1. Purchase the Security services In this module user first register the cloud site and provide the user details. And then login the user credential details. Then user will purchase Security Service in cloud. In this Security Service has a variouscontrolandprice,validity.User will choose our system performance based services then immediately transfer amount to security management. Once got the service, will protect the customer application and system to particular time periods. 6.2. Cloud service In this module, user register thecloudservicesupporteduser credential details then login the cloud resource. Once enter the cloud site or application to utilize the location. If your application could also be social network to share your post and chat with our friends. Users can also upload their pictures intothesocialnetworkingsite.Whileuploading,user provides tags for the image. At equivalent time security system will protect the appliance to every and each request to cloud then way of securing cloud-based data. 6.3. Screening Data traffic In our security model, service managed by the customer applications then monitor the traffic flow and screening
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3207 incoming data packets in accordance with their operating purpose, e.g. email data or financial transactions, web pages. Legitimate packets are called safe packets, while packets utilized in cyber attacks are called unsafe packets. Unsafe packets are deemed to be handled if they are correctly detected by security services, or unhandled if they are not successfully processed. These unhandled packets incurcosts to the customer. So SECaaS tobe noted onuserpacketsize.At an equivalent time service will redirect to the insurance management process(IMP). 6.4. Claim Insurance In this module IMP will check whether the user isa customer or not. And then check the customer current premium data and evaluatethe present unhandled data size tocalculatethe particular per-packet, price, duration,andmaximumnumber of packets affected. We introduce a partial Lagrange multiplier algorithm to find the optimal solution in a parameter change to calculate the amount to data size. And then refund the amount to particular customer. The price for insurance purchased beforehand ischargedataratereferred to as a future premium. The IMP purchases insurance policies, which incorporates the premium, sorts of risks covered, indemnity value, and policy duration. 7. CONCLUSION In this paper, we've presented a combined approach to security and the cyber insurance provisioning within the cloud. It provides an experimental evaluation derived by running real traffic data through an Intrusion Detection System. Lagrange multiplier method exploits the total unimodularity property to guarantee integer solutions.This problem is solved iteratively employing a sub gradient method, which we proveconvergestotheoptimal solutionin at the worst polynomial time. The main challenge of cyber insurance is that the ability to detect cyber attacks, estimate accurate damages, and successfully make insurance claims. 8. REFERENCES [1] R. Pal, L. Golubchik, K. Psounis, and P. Hui, “Will cyber- insurance improve network security? A market analysis,” in Proc. IEEE INFOCOM 2014 - IEEE Conf. Comput. Commun., Apr. 2014, pp. 235–243. [2] S. Chaisiri, R. K. L. Ko, and D. Niyato, “A joint optimization approach to security-as-a-service allocation and cyber insurance management,” in Proc. Trustcom. Big Data SE/ISPA, 2015, pp. 426–433. [3] Kai Hwang, Deyi Li, Trusted Cloud Computing with Secure Resources and Data Coloring in IEEE Internet computing ,2010. [4] A. Holder, Parametric Linear Programming, March 3, 2010. [5]C. P. Gomes, “Structure, duality, and randomization: Common themes in AI and OR,” in Proc. 17th National Conf. Artif. Intell. 12th Conf. Innovative Appl. Artif. Intell., 2000, pp. 1152–1158. [6] Satish Kumar, Vishal Thakur, Ashok Kumar Kashyap, A Comparative study of differentcloudservices,Cloudsecurity issues and Cloud Providers in IJLTET in 2016.
Download now