In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud ***,when the model is not completely trusted,the data owners face several security-rel...
详细信息
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud ***,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data *** addressing and handling the security-related issues on Cloud,several models were *** that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud *** preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data ***,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the ***,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
This experiment focuses on employing machine learning techniques to create an automated system for classifying palm leaf manuscripts into three distinct categories based on their degradation levels: good, bad, and med...
详细信息
Affective computing (AC), also known as emotion AI, is a concept that applies modern technology to help systems to recognize and process human emotions and their feelings. Several uses of affective computing have been...
详细信息
Dyslexia or reading impairment is a reading disorder that can have an effect on both children and adults. Though reading impairment affects the reading abilities of an individual it does not have an effect on the inte...
详细信息
The integration of IoT technology provides realtime, data-driven monitoring that reduces waste and maintains the quality of the food, changing the way food is preserved and managed. This research focuses on the develo...
详细信息
With sudden proliferation in evolving Deepfake technology to manipulate media content, identity theft etc., several modern deep learning based solutions are being continuously developed for Deepfake detection, disting...
详细信息
This study tackles the difficult issues of image captioning while negotiating the complexity of visual data processing. The complexity of visual data and the associated processing requirements make image captioning a ...
详细信息
As digital data continues to grow exponentially, the reliability of Hard Disk Drives (HDDs) becomes a critical concern for ensuring data integrity and preventing unexpected system downtimes. The research dataset conta...
详细信息
Our research introduces a novel approach for recognizing multiple emotions by leveraging perspective-based methods. This technique integrates facial features and speech characteristics obtained from different encoders...
详细信息
暂无评论