Indian Journal of Cryptography and Network Security
Latest Publications


TOTAL DOCUMENTS

6
(FIVE YEARS 6)

H-INDEX

0
(FIVE YEARS 0)

Published By Blue Eyes Intelligence Engineering And Sciences Engineering And Sciences Publication - BEIESP

2582-9238

Author(s):  
Ms. Pooja Goyal ◽  
◽  
Dr. Sukhvinder Singh Deora ◽  

Cloud computing is an innovation that conveys administrations like programming, stage, and framework over the web. This computing structure is wide spread and dynamic, which chips away at the compensation per-utilize model and supports virtualization. Distributed computing is expanding quickly among purchasers and has many organizations that offer types of assistance through the web. It gives an adaptable and on-request administration yet at the same time has different security dangers. Its dynamic nature makes it tweaked according to client and supplier’s necessities, subsequently making it an outstanding benefit of distributed computing. However, then again, this additionally makes trust issues and or issues like security, protection, personality, and legitimacy. In this way, the huge test in the cloud climate is selecting a perfect organization. For this, the trust component assumes a critical part, in view of the assessment of QoS and Feedback rating. Nonetheless, different difficulties are as yet present in the trust the board framework for observing and assessing the QoS. This paper talks about the current obstructions present in the trust framework. The objective of this paper is to audit the available trust models. The issues like insufficient trust between the supplier and client have made issues in information sharing likewise tended to here. Besides, it lays the limits and their enhancements to help specialists who mean to investigate this point.


Author(s):  
Shiladitya Raj ◽  
◽  
Megha Jain ◽  
Dr. Pradeep Chouksey ◽  
◽  
...  

Massive volumes of network traffic & data are generated by common technology including the Internet of Things, cloud computing & social networking. Intrusion Detection Systems are therefore required to track the network which dynamically analyses incoming traffic. The purpose of the IDS is to carry out attacks inspection or provide security management with desirable help along with intrusion data. To date, several approaches to intrusion detection have been suggested to anticipate network malicious traffic. The NSL-KDD dataset is being applied in the paper to test intrusion detection machine learning algorithms. We research the potential viability of ELM by evaluating the advantages and disadvantages of ELM. In the preceding part on this issue, we noted that ELM does not degrade the generalisation potential in the expectation sense by selecting the activation function correctly. In this paper, we initiate a separate analysis & demonstrate that the randomness of ELM often contributes to some negative effects. For this reason, we have employed a new technique of machine learning for overcoming the problems of ELM by using the Categorical Boosting technique (CATBoost).


2021 ◽  
Vol 1 (2) ◽  
pp. 1-4
Author(s):  
Shiladitya Raj ◽  
◽  
Megha Jain* ◽  
Dr. Pradeep Chouksey ◽  
◽  
...  

Massive volumes of network traffic & data are generated by common technology including the Internet of Things, cloud computing & social networking. Intrusion Detection Systems are therefore required to track the network which dynamically analyses incoming traffic. The purpose of the IDS is to carry out attacks inspection or provide security management with desirable help along with intrusion data. To date, several approaches to intrusion detection have been suggested to anticipate network malicious traffic. The NSL-KDD dataset is being applied in the paper to test intrusion detection machine learning algorithms. We research the potential viability of ELM by evaluating the advantages and disadvantages of ELM. In the preceding part on this issue, we noted that ELM does not degrade the generalisation potential in the expectation sense by selecting the activation function correctly. In this paper, we initiate a separate analysis & demonstrate that the randomness of ELM often contributes to some negative effects. For this reason, we have employed a new technique of machine learning for overcoming the problems of ELM by using the Categorical Boosting technique (CATBoost).


2021 ◽  
Vol 1 (2) ◽  
pp. 5-14
Author(s):  
Abhishek Balamurugan ◽  
◽  
Sai Dhanush. R ◽  
Sundeep J ◽  
Sivasankari. K ◽  
...  
Keyword(s):  

In this project, we are planning to create a strong robust calculation for executing cash in higher level security reason with high acknowledgment rates in a shifting environment. To begin with, Haar cascade based calculation has been connected for quick and basic confront location from the input picture. The confront picture is at that point being changed over into grayscale picture. After that, the iris, eyebrows, nose, mouth of candidates are extricated from the escalated valleys from the recognized confront.


Author(s):  
Abhishek Balamurugan ◽  
◽  
Sai Dhanush R ◽  
Sundeep. J ◽  
Sivasankari. K ◽  
...  
Keyword(s):  

In this project, we are planning to create a strong robust calculation for executing cash in higher level security reason with high acknowledgment rates in a shifting environment. To begin with, Haar cascade based calculation has been connected for quick and basic confront location from the input picture. The confront picture is at that point being changed over into grayscale picture. After that, the iris, eyebrows, nose, mouth of candidates are extricated from the escalated valleys from the recognized confront.


Author(s):  
Dr. Harjinder Kaur ◽  
◽  
Prof. Amandeep Kaur ◽  

Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services. A primitive or protocol should be defined to reach the security goal. Beside the introduction part this paper represents the types of cryptography, algorithm of cryptography and techniques of cryptography and the interaction between Government and cryptography.


Sign in / Sign up

Export Citation Format

Share Document