Paper Publications and Conference Papers
Modern computing facilities for medical surveillance, which appear to be the essential computing keystone that aided access and processing of health data of each patient at the very edge of the healthcare system to combat regional or global virus pestilence, appear to be the essential computing keystone. Many computing system architectures for medical surveillance have been given in past studies, but only a few researchers have focused on the pure effectiveness of healthcare data transport in depth. To test the efficacy of an Internet of Healthcare Things (IoHT) architecture, researchers used an M/M/c/K queuing network strategy in conjunction with a three-layer cloud computing continuum. Medical data from body-attached IoT devices at the network edge to local consumers in the fog layer and faraway customers in the fog layer is taken into account in the model. In addition, in two situations, researchers examine how changes in setup and computer layer processing capacity affect key performance indicators. The results of the analysis and modeling reveal that the proposed model can accurately forecast the system response time and the number of computing resources required for healthcare data services in a variety of workload scenarios to reach the goal of efficiency. As a consequence, the study’s findings can be applied to better clinical administration in hospitals and medical centers, and also the development of computing structures that are suitable for medical monitoring in the case of a virus epidemic.
The Internet of Things (IoT), cloud services, and artificial intelligence (AI) have all improved in recent years, converting traditional medical into smart healthcare. The application of important technologies such as AI and IoT to healthcare treatments could improve outcomes. The combination of IoT and AI in the medical industry opens up a world of possibilities. As a result, the current study suggests a new AI- and IoT-based disease detection paradigm for smart medical systems. The model includes phases such as preprocessing, data collection, parameterization, and categorization. IoT devices, such as wearables and detectors, allow for real-time data collecting, which AI systems then use to identify ailments. For illness detection, the suggested method employs a Crow Search Optimization algorithm-based Cascaded Long Short Term Memory (CSO-CLSTM) model. CSO is used to alter the CLSTM model’s ‘weights’ and ‘bias’ variables to enhance the categorization of health data. This study also employs the isolation Forest (iForest) approach to reduce outliers. The CLSTM model’s diagnostic outcomes are greatly improved when CSO is used. The CSO-LSTM model was put to the test using healthcare data. During the testing, the CSO-LSTM model identified diabetes and heart disease with the highest accuracies of 96.16 percent and 97.26 percent, etc. As a result, the suggested CSO-LSTM model can be used in smart health systems as a diagnostic tool.
Systematic Outline of Computer Oriented Safety and Evaluates Its Threats,Dr.K.Sai Manoj,International Journal of Aquatic Science (IJAS)
Role of Tourism in India’s Economic Development, Dr.K.Sai Manoj, International Journal of Advanced Research ( IJAR) (Research Article)
Thomson Reuters Publons.
Research on the Function of Block Chain and Its Process, Dr.K.Sai Manoj International Journal of All Research Education and Scientific Methods (IJARESM), ISSN: 2455-6211 Volume 9, Issue 5, May -2021, Impact Factor: 7.429, Available online at: www.ijaresm.com
Research based on the new algorithms for the complex Infrastructure as a Service (IaaS)
Impact of Covid 19 on International Tourism Industry,Dr.K.Sai Manoj,Journal of Information and Computational Science ISSN: 1548-7741 Volume 11 Issue 6 – 2021
Developing A Service Software WSN For The Process of Blockchain, Dr.K.Sai Manoj, International Journal of Aquatic Science (IJAS) (Web of Science Group)
Detection of Plant Disease Using Deep Learning Techniques
Cyber Security and Privacy Internal Attacks Measurements Through Blockchain, Dr.K.Sai Manoj, IT in Industry, Vol. 9, No.1, 2021, Published Online 16-03-2021
Cyber Security : Detecting Identity Deception on Social Media Platforms
Cyber Risk in Banking Services: The Extent of Cyber Risks Previsions and Security Measures
Banks Holistic Approach to Cyber Security : Tools to Mitigate Cyber Risk
A Process of Developing a Mobile Cyber Physical system Utilising Blockchain , Dr.K.Sai Manoj, Vidyabharati International Interdisciplinary Research Journal (VIIRJ) (Web of Science Group)
A Learning of Intimidation of Computer Safety for Future K.Sai Manoj International Journal for Research in Engineering Application & Management (IJREAM) ISSN : 2454-9150 Vol-07, Issue-01, APR 2021 (First Author)
Approved by UGC and Advanced Science Index (ASI), Germany.
A Digital Record For Privacy And Security In Internet of Things,Dr.K.Sai Manoj, International Journal of Application or Innovation in Engineering & Management (IJAIEM),Volume 10, Issue 6, June 2021,ISSN 2319 – 4847.
A Digital Record for Privacy and Security in Internet of Things,Dr.K. Sai Manoj, International Journal of Scientific Research in Science, Engineering and Technology
Research on Security and Vulnerabilities of Blockchain Systems by Dr.K.Sai Manoj published in International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.177 Volume 8 Issue I, Jan 2020 (Single Author)
Abstract:
Recent research successfully improved the unauthorized access to data in a system pointing clearly on the blockchain technology and also hack from these systems have raised more restrictions about whether this new technology can be secured from ongoing, evolving cyber attacks. While the technology is known to provide an environment that is fundamentally safer than other existing centralized systems offer, security professionals warn that the current blockchain ecosystem is still technically not fully developed and also so much of investigations are required, technology need to improve for many known as well as unknown imperfection [1]. This research paper focused upon the number of research studies and various other technical related things pointing to blockchain systems security.
PoAh: Proof-of-Authentication for Post-Blockchain Based Security in Large Scale Complex Cyber-Physical Systems, Dr.K.Sai Manoj, PSYCHOLOGY AND EDUCATION (2020) 57(9): 2031-2040 ISSN: 00333077
Major Issues and Challenges in Energy Efficient Cloud Storage Service, Dr.K.Sai Manoj,PSYCHOLOGY AND EDUCATION (2020) 57(9): 2041-2048 ISSN: 00333077.
Data Mining and Machine Learning Techniques for Cyber Security Intrusion Detection International Journal of Engineering and Advanced Technology (IJEAT) Dr.K.Sai Manoj ISSN: 2249 – 8958, Volume-9 Issue-3, February, 2020
Abstract:
An interference discovery framework is customizing that screens a singular or an arrangement of PCs for toxic activities that are away for taking or blue-penciling information or spoiling framework shows. The most methodology used as a piece of the present interference recognition framework is not prepared to deal with the dynamic and complex nature of computerized attacks on PC frameworks. In spite of the way that compelling adaptable methodologies like various frameworks of AI can realize higher discovery rates, cut down bogus alert rates and reasonable estimation and correspondence cost. The use of data mining can realize ceaseless model mining, request, gathering and littler than ordinary data stream. This examination paper portrays a connected with composing audit of AI and data delving procedures for advanced examination in the assistance of interference discovery. In perspective on the number of references or the congruity of a rising methodology, papers addressing each procedure were recognized, examined, and compacted. Since data is so fundamental in AI and data mining draws near, some striking advanced educational records used as a piece of AI and data burrowing are depicted for computerized security is shown, and a couple of recommendations on when to use a given system are given.
Keywords: Cloud Computing, Data mining, Block Chain, Machine Learning, Cyber Security, Attacks, ADS, SMV
Blockchain Cyber Security Vulnerabilities and Potential Counter measures International Journal of Innovative Technology and Exploring Engineering (IJITEE) Dr.K.Sai Manoj Dr.P.S.Aithal ISSN: 2278-3075, Volume-9 Issue-5, March 2020
Abstract:
Blockchain technology has attracted appreciable attention as a result of its big selection of possible application and it initial appear since a cryptocurrency, referred to as Bitcoin, however have as be employed inside several different industry and non-business applications. In contrast to the majority presented system to be supported decentralized system; this innovative expertise utilize peer‐to‐peer networks and circulated a system which incorporates blockchain register to stock up connections. Its construction is intended as a digital log file and hold on as a series of coupled teams, referred to as blocks. Every individual block is latched cryptographically with the previous block. Once a block has been another, it can’t be altered. Several security specialists speculate that the inherent cryptographically nature of the blockchain system is comfortable to resist constant hacking and security threats.
However, earlier studies on the security and confidentiality of blockchain technology include given away that several application contain fall casualty to thriving cyber attacks. As a result of the growing require for cryptocurrency and its current security challenges, earlier study haven’t centered on blockchain technology cybersecurity vulnerabilities extensively, and we study after provide additional way to spotlight potential attacks against blockchain technology weakness to cybersecurity.
Keywords: Block Chain, Cloud Computing, Cyber security, Ledger, Smart Contracts, Cryptocurrency, attacks
Adaptive Street Light Monitoring Using Internet of Things, International Journal of Advanced Science and Technology, Dr.K.Sai Manoj, Volume-29 Bo:7s(Special Issue), June 2020.
Streetlights are an integral part of any developing locality. They are present on all major road-ways and in the suburbs too. Every day, streetlights are powered from sunset to sunrise at full strength, even when there is no one around. On a global scale, millions of dollars are spent each day on these street lights to provide the required electrical energy. This paper gives the best solution for electrical power wastage. Also, the manual operation of the lighting system is completely eliminated. The energy consumption in entire world is increasing at a faster rate due to population growth and economic development and the availability of energy sources remains woefully constrained. The word “smart” is used because the system not only provide power to the street lights but also helps in detecting the direction of movement of the pedestrian and helps him by means of illuminating the path of movement till the near next street light. A simple and effective solution to this would be dimming the lights during off peak hours. Whenever presence is detected, the lights around it will glow at the normal (bright) mode. This would save a lot of energy and also reduce cost of operation of the streetlights. The status of street lights can be checked on internet using IOT (Internet of things) from anywhere in real time and solve the issues happening during the process.
A Novelty on Mobile Devices Fast Authentication and Key Agreement, International Journal of Psychosocial Rehabilitation (ISSN: 1475-7192), Dr.K.Sai Manoj, Volume-24, Issue -8, February 2020.
Gadget to-gadget correspondence is generally utilized for cell phones and Internet of Things. Validation and key understanding are basic to manufacture a safe channel between two gadgets. In any case, existing methodologies frequently depend on a pre-fabricated unique mark database and experience the ill effects of serene age rate. We present GeneWave, a quick gadget confirmation and key assention convention for item cell phones. GeneWave first accomplishes bidirectional starting verification dependent on the physical reaction interim between two gadgets. To keep the precision of interim estimation, we wipe out time vulnerability on ware gadgets through quick flag location and excess time crossing out. At that point, we infer the underlying acoustic channel reaction for gadget verification. We structure a novel coding plan for productive key assention while guaranteeing security. Hence, two gadgets can confirm one another and safely concur on a symmetric key.
Uncrackable Cipher Dynamic Double Encryption Standard In Cloud For Data Access Control And Privacy Preserving Mechanism Dr. K. Sai Manoj, World Journal of Engineering Research and Technology WJERT
Risk Factors And Security Issues In Various Cloud Storage Operations Dr.K.Sai Manoj Volume-8 Issue-12, October 2019, ISSN: 2278-3075 (Online) Published By: Blue Eyes Intelligence Engineering & Sciences Publication (First Author) (Elsevier Scopus)
Abstract:
Presently a days, cloud computing is a rising and method for registering in software engineering. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Distributed computing broadens different figuring methods like framework registering, appropriated processing. Today distributed computing is utilized as a part of both mechanical, research and scholastic fields. Cloud encourages its clients by giving virtual assets through web. As the field of distributed computing is spreading the new procedures are producing for cloud security. This expansion in distributed computing condition likewise expands security challenges for cloud designers. Customers or Users of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client’s trust. In this paper we will discuss about on cloud database and information mining security issues in different viewpoints like multi-occupancy, flexibility, unwavering quality, accessibility on different divisions like modern and research regions, and furthermore examine existing security methods and methodologies for a safe cloud condition through enormous information ideas. What’s more, this paper additionally study different parts of mechanical, training and research areas. This paper will empower scientists and experts to think about various security dangers, models and apparatuses proposed in existing distributed storage.
Keywords: Cloud Computing, Cloud Security, Security Threats, Security Techniques, Cloud Security Standards
Research on the Security Policies for Cloud Computing International Journal of Innovative Technology and Exploring Engineering (IJITEE) Dr.K.Sai Manoj ISSN: 2278-3075, Volume-8 Issue-12S2, October 2019
Abstract:
The sizable progressive patterns in customary exchange and the need for non-public statistics to skip global outskirts featured the need to diagram protection pointers and inspire particular guidelines to improve the nicely-being of residents’ close to home statistics. An modern jump beforehand, which makes stressful situations to the well being of individual records, is Cloud Computing. the rule of thumb highlight of Cloud Computing is that it allows on-name for arrange get admission to figuring property with least control assignment or company association collaboration. This new innovation gives new measurements to traditional exchanges of private records and due to this it has become easy to installed order a safety affiliation for Cloud Computing administrations. For the easy out of the plastic new age of Cloud Computing, the idea device of a fitness inclusion is to shield humans and data, set proposals for foreseen conduct with the valuable asset of customers, problem threats and help to tune consistence with guideline
This investigations paper centered at the development of a Cloud safety inclusion, in admire to facts insurance. basically focused on the model of programming as-an management (SaaS), this paper is meant to focus on a Framework for gatherings, clients, Cloud bearers and supply a gauge to the security inclusion of Cloud Computing. Pointed honestly on the protection requirements which is probably specific to Cloud circumstance, feature how those conditions connect to our Cloud well-being inclusion and endorse, the measures and the relating health regulations. except, it proposes a manner that might be observed with the manual of Cloud corporations for comparing the well being in their structures as, insurance is one of the internal abilties of the Cloud provide
INVESTIGATIONS ON THE CLOUD DATA STORAGE SECURITY BASED USING DIFFIE HELLMAN ALGORITHM by Dr.K.Sai Manoj selected in the merit list by International Journal of Computer Engineering and Applications, Volume XIII, Issue VI, JUNE. 19, www.ijcea.com ISSN 2321-3469 (First Author)
Abstract:
This research article point out on the two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, we investigated on the own public elements and also investigated on the corresponding private key using a secret. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Expectation regarding experimental results, under Open Stack Swift, about the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side.
Keywords: IBC, PKG, Open stack, cloud sec
Investigations and Findings on the Cloud Computing architecture for the improvement of the Security research Paper by Dr.K.Sai Manoj Proceedings of the second international conference on computing, communications and Data Engineering (CCODE-2019) held on Feburary 1-2,2019 at Sri Padmavathi Mahila Viswavidyalayam,Tiruapti.All the reviewers, experts and Media people appreciated the presentation of Deligate Dr.K.Sai Manoj
Investigation on the security aspects of the cloud computing using symmetric and asymmetric algorithms , Dr.K.Sai Manoj International Journal of Computer Engineering and Applications, Volume XIII, Issue I, January. 19, www.ijcea.com ISSN 2321-3469 with Thomson Reuters Research Id: P1671-2016. Also It is UGC approved Journal. For this article author Dr.K.Sai Manoj received appreciation certificate in the merit list from the Editor. (First Author)
Abstract:
Many Developers are concentrating on the security aspect of the cloud computing. Still there is need to concentrate on the investigation of the new type of security algorithms. In this research paper we had done an investigation on the comparison of symmetric and asymmetric algorithms. Data security is one of the very important issue in the cloud computing. In this article we investigated on the comparative study on one important technique related to the symmetric and asymmetric algorithm that enhanced Data Security in cloud computing system. We Pointed AES for symmetric encryption algorithm and Elliptic curve for asymmetric encryption algorithm.
Keywords: Data Security, cloud computing, symmetric algorithm, Asymmetric algorithm, AES, Elliptic curve.
Investigation On The Cloud Computing Security Using PET And Remote Attestation in Cloud Architectures by Dr.K.Sai Manoj published in International Journal of Current Advanced Research Volume 8; Issue 10 (D); October 2019 Impact Factor: 6.614 ISSN: O: 2319-6475, ISSN: P: 2319-6505 ;
Abstract:
Cloud computing offers opportunities for organizations to reduce IT costs by using the computation and storage of a remote provider. Despite the benefits offered by cloud computing paradigm, organizations are still wary of delegating their computation and storage to a cloud service provider due to trust concerns. The trust issues with the cloud can be addressed by a combination of regulatory frameworks and supporting technologies. Privacy Enhancing Technologies (PET) and remote attestation provide the technologies for addressing the trust concerns.
Keywords:Trust, Privacy, PET, remote attestation
Investigation on the Cloud Computing in terms of the current trends and also to meetthe important challenges with security for the improvement of the Health care services Dr.K.Sai Manoj IJCEA Feb. 2019, with Thomson Reuters Research Id: P1671-2016. Also It is UGC approved Journal. For this article author Dr.K.Sai Manoj research article in the merit list from the Reviewers and Editorial Team. (First Author)
Abstract:
Cloud computing is a new challenge in terms of the delivering computing resources and services. Many developers and experts expectation is that it can improve health care services, lot of benefits in the health care research, and also tremendous change in the technology of the health information. However, as with any type of new investigations, cloud computing should be carefully evaluated before proposing in to the new idea. This paper investigates on the conceptual oriented research in health care, and applies on the two stages such as technology and security to investigate the new challenges of this computing model.
Keywords: Health care, cloud computing, Security.
Design and Development of Various Cloud Computing Architectures Improving the Security International Journal of Innovative Technology and Exploring Engineering (IJITEE)Dr.K.Sai Manoj ISSN: 2278-3075, Volume-8 Issue-12S2, October 2019 )
Abstract:
numerous engineers have deliberate their very own format for introducing the distributed computing basis. The modern dispensed computing designs contrasts from severa points of view. protection has been the massive problem as patron related statistics and handling is embraced utilizing the framework gave by way of using outsider professional co-ops fluctuates especially. it’s far vital to understand the degree of incorporation of security into the distributed computing framework and in some time discover the excellent layout that contains satisfactory and tight protection framework.
in this examination paper, a correlation of present models from the factor of view of attention of protection foundation internal dispensed computing framework is added along an intensive engineering that is included with each a part of protection considering.
Keywords: allotted computing, protection framework, allotted computing models, upholding protection among allotted computing frameworks
Conceptual oriented study on the cloud computing architecture for the full-security, K.Sai Manoj International Journal of Engineering & Technology, Science Publishing Corporation (First Author) (SPC)
Abstract
Many developers have designed their own architecture for installing the cloud computing infrastructure. The existing cloud computing architectures differs in many ways. Security has been the serious issue as client related data and processing is un-dertaken using the in- frastructure provided by third party service providers varies greatly. It is necessary to know the extent of inclusion of security into the cloud computing system and then find the best architecture that includes best and tight security system.
In this paper, a comparison of existing architectures from the perspective of inclusion of security infrastructure within cloud computing system is presented along with a comprehensive architecture that is included with every aspect of security taking into account the most of the vulnerabilities
Keywords:Cloud Computing; Security Infrastructure; Cloud Computing Architectures; Enforcing Security among Cloud Computing Systems.
Conceptual Oriented Analysis on the Security based on the SaaS Cloud Computing Architecture for the Cyber Security Issues by Dr.K.Sai Manoj published in International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.177 Volume 7 Issue VII, July 2019 (First Author)
Abstract:
The Main aim of this research paper is to focus on the extensive literature survey to analyze the concept of the user- oriented cyber security and also to point out that concept on the cloud computing architecture as a SaaS. Actually Cloud infrastructure is closely related to its architecture and comprises of many cloud components. In this research paper, we proposed a cloud computing based architecture for facing cyber security situation awareness. Especially; we pointed out on the cloud computing security architecture for SaaS with reduction of the cost for data storage and also to investigate the efficient stream processing techniques to reduce operational delays. Main important thing is detect threats; we pointed out a parallel cloud based threat detection that integrates both signature-based detection and anomaly-based detection.
Keywords: Cyber security,SaaS,Cloud Infrastructure.
Conceptual oriented analysis on the modern tools and techniques to Enrich Security Vulnerabilities in Ethical Hacking Dr.K.Sai Manoj International Journal of Computer Science Trends and Technology (IJCST) in May-June 2019, Volume Number 7 Issue3 with ISSN: 2347-8578 & ISO 3297:2007.This Journal has Thomson Reuters ResearcherID: M-3066-2016. (First Author)
Abstract:
The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. As public and private organizations migrate more of their critical functions to the Internet, criminals have more opportunity and incentive to gain access to sensitive information through the Web application. Thus the need of protecting the systems from the trouble of hacking generated by the hackers is to promote the persons who will punch back the illegal attacks on our computer systems. So, Ethical hacking is an assessment to test and check an information technology environment for possible weak links and vulnerabilities. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions. This research paper describes what ethical hacking is, what it can do, an ethical hacking methodology as well as some tools which can be used for an ethical hack.
Keywords: Vulnerabilities, Hacker, Cracker, Port and Intrusion.
Conceptual Oriented Analysis On The Industrial Standard Cyber Security by Dr.K.Sai Manoj published in International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul – Aug 2019 (Single author)
Abstract:
Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction.
Keywords: 0jjSoftware Verification and Validation, Cyber security.
CONCEPTUAL ORIENTED ANALYSIS ON THE IMPACT ON THE CLOUD SECURITY ON THE CYBER ATTACKS by Dr.K.Sai manoj selected in the merit list by Journal of Analysis and Computation (JAC) (An International Peer Reviewed Journal), www.ijaconline.com, ISSN 0973-2861 Volume XII, Issue I, May 2019 (First Author)
Abstract:
Many Developers are concentrating on research related to the cloud security techniques and measures have been intended to safeguard the cloud but nevertheless cloud security is at a high risk due to the innovative hacking techniques. This research paper addresses cloud security in regards to three aspects to conclude the guidelines for improved cloud security. This research follows a three layered research approach whereas each layer ́s outcome is directly affecting the investigations into the subsequent layers. At first, the structure and mechanism of the cloud security measures will be explored, for example, the use of firewalls, private cloud, encryption/decryption algorithms, digital signatures and the protection against DOS attacks.
Conceptual based on the Data Mining Techniques for the Prediction of Hydration Assessment, Breath Analysis and Heart Disease International Journal of Innovative Technology and Exploring Engineering (IJITEE) Dr.K.Sai Manoj ISSN: 2278-3075, Volume-8 Issue-12S2, October 2019
Abstract:
Both the facts mining and medicinal offerings corporation have risen some of robust early area frameworks and amazing well being associated frameworks from the scientific and locating facts. With the fast developing of health associated facts advances it’s miles quite simple for the health care providers to examine and save extremely good measures of Patent data. For the effective usage of this statistics for the improvement of the best outcomes within the medicinal services and manner, properly-being professionals need to differentiate the best measures and comply with the proper research techniques for the sort of statistics within acquire. This audit Paper has merged at the information digging strategies for the evaluation of Hydration reputation via Breathe examination and furthermore usage of data digging structures for the expectancy of heart sickness.
Keywords: statistics Mining, health care enterprise, Hydration recognition Breathe studies, coronary heart infection.
Cloud security: risk factors and security issues in current trends Dr.K.SaiManoj International Journal of Engineering & Technology, Science Publishing Corporation October 2019 (Scopus) (Single Author)
Abstract:
Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are of- fered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud compu- ting is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.
Keywords: Cloud Computing, Cloud Security, Security Threats, Security Techniques, Cloud Security Standards.
CHALLENGING ISSUES RELATED TO SOME SPECIFIC IMPORTANT PROBLEMS IN THE CLOUD PLATFORM by Dr.K.Sai Manoj published in the merit list by International Journal of Computer Engineering and Applications Volume XIII, Issue VIII August 2019. ( UGC Approved Journal with Thomson researcher id) (Single author)
Abstract:
Load balancing in a cloud platform is one of the challenging issues and related to specific problems. Hence, generalized solutions for improving load balancing schemes in terms of time and cost are the need of the hour. Similarly, customized information delivery in real-time is another challenging issue in this computing environment. Development of efficient algorithm is a requirement for content-based event dissemination in pub/sub system. Further integration of sensor network with cloud computing have been investigated recently and has the opportunity to be integrated upon. There are many issues associated with the deployment..
Keywords: Load balancing, cloud computing, efficient algorithm
Analysis of the Technique for the Improvement of the Data Confidentiality in the Cloud Computing Environment by Dr.K.Sai Manoj Published in international Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul – Aug 2019 (First Author)
Abstract:
Many Developers have been reviewed with some proposed solutions but these solutions have fallen short of addressing account misused and malicious insider threats. In addition, the online survey conducted highlighted that insider breaches are among the main form of vulnerability to cloud data. These challenges within the cloud storage informed the basis for the design of a scheme for improving data confidentiality in the cloud computing environment. The data confidentiality is achieved by implementing authentication login which triggers a six digit code to be sent to a client mobile or e-mail for further authentication, thus, enabling situational awareness of data breaches in real-time. This approach will enhance reliability and trust of cloud services enabling users to maximize on potential benefits offered by the cloud environment.
Keywords: Cloud Computing
Towards CLOUD COMPUTING: A literature survey on the cloud computing Risk Factors and Security issues in current trends research Paper by Dr.K.SAI Manoj Proceedings of the International Conference on New trends in Engineering and Technology at GRT institute of engineering and technology,Tiruttani on September 7th and 8thAlso this research Paper was Promoted to IEEE XPlore Digital Library. Technical support by IEEE Chennai
Protecting Sensitive Labels in Social Network Data Anonymization, Dr. K. Sai Manoj, International Journal of Modern Engineering Research (Second Author)
INVESTIGATION ON THE DATA SECURITY IN CLOUD COMPUTING USING BIOMETRICS International journal of current advanced research UGC approved and also Thomson Reuters journal with researcher id and END NOTE ISSN: O: 2319-6475, ISSN: P: 2319-65,Impact factor:6.614, Volume 7;Issue 12(B);December 2018;Page No.16473-16475.( First Author)
Abstract:
With the rapid increase in the usage of cloud computing, it is very important to address the security issues also. Many Developers are designing so many techniques. Still there are some problems related to authentication in cloud environment. In cloud computing, both data and software are fully not contained on the user’s computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. This research paper Point out clearly on such problems and their solution with the use of Biometric techniques.
Investigation on the Data Protection in the Cloud using Predicate Based Encryption International Journal of Computer Science and Information Technology Research UGC approved with ISSN 2348-120X (online) Vol. 6, Issue 4, pp: (61-65), Month: October – December 2018.( First Author )
Investigation on the Attribute Based Encryption for Secure Data Access in Cloud, Dr.K.Sai Manoj International Journal of Computer Science Trends and Technology (IJCST) with Thomson Reuters Researcher ID: M-3066-2016 – Volume 6 Issue 6, Nov-Dec 2018. ISSN: 2347-8578 (First Author)
Abstract:
Cloud computing is a progressive computing worldview, which empowers adaptable, on request, and ease use of Information Technology assets. However, the information transmitted to some cloud servers, and various protection concerns are arising out of it. Different plans given the property-based encryption have been proposed to secure the Cloud Storage. In any case, most work spotlights on the information substance security and the get to control, while less consideration towards the benefit control and the character protection. In this paper, a semi-anonymous benefit control conspires AnonyControl to address the information protection, as well as the client character security in existing access control plans. AnonyControl decentralizes the central authority to restrain the character spillage and accordingly accomplishes semi-anonymity. Furthermore, it likewise sums up the document get to control to the benefit control, by which advantages of all operations on the cloud information managed in a fine-grained way. Along these lines, display the AnonyControl-F, which ultimately keeps the character spillage and accomplish the full secrecy. Our security assessment demonstrates that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie-Hellman presumption, and our execution assessment shows the attainability of our plans.
Keywords: Anonymity, multi-authority, attribute-based encryption.
Content Filtering and cloud based intrusion detection system, Dr.K.Sai Manoj, Global Journal of Engineering Science and Research Management – January 2018 (First Author)
Conceptual based Investigation on the Data Mining Techniques for the Prediction of Hydration assessment, Breath analysis and Heart disease. Resesearch Paper by Dr.K.SAI Manoj Proceedings of the International Conference on the Innovations in Engineering Technology and Sciences (ICIETS 2018) at NIE Institute of Technology,Mysuru on September 20-21, 2018. This Practical Oriented research article was appreciated by the NIE Experts. Also this research article was promoted to IEEE XPlore Digital Library. Technical Support by IEEE Bangalore.
Cloud Security Risk Factors and Security Issues in current trends research paper by Dr.K.SaiManoj Proceedings of the International Conference on Materials, Applied Physics and Engineering (ICMAE 2018) at Effotel Hotel Indore on June 3rd and 4th 2018. Paper Number: 443. All the IIT Indore experts were appreciated by the quality of the Paper Presentation by Dr.K.SAI Manoj and also this article was promoted to Scientific Publication.
Analysis of the Cloud Computing Architectures for the Better Security research Paper by Dr.K.SAI Manoj Proceedings of the International Conference on the Recent Innovations in Electrical and Electronic Communication Engineering (ICRIEECE-2018) at KIIT Bhubaneswar on 27th and 28th July 2018. Paper Number: 633.All the KIIT University Panel members were appreciated about the quality of this research article. Also this research article was promoted to IEEE XPlore Digital Library. Technical Support by IEEE Bhubaneswar
Analysis Of Innovative Phased Array Antenna For The Space Based Applications As Per The Industrial Standards, Dr. Sai Manoj, International Journal of New Technologies in Science and Engineering , Vol. 5, Issue. 2, 2018, ISSN 2349-0780 (Second Author)
A Study on identifying defects and solutions of search engines, Dr.K.Sai Manoj, Global Journal of Engineering Science and Research Management – January 2018 (Second Author)
Abstract:
In internet, a wide range of web information increases rapidly, user wants to retrieve the information based upon his preference of using search engines. Our paper is going to propose a new type of search engine for web personalization approach. It will capture the interests and preferences of the user in the form of concepts of mining search results and their clickthroughs. Our approach is to improve the search accuracy by means of separating the concepts into content based concepts and location based which plays an important role in global search. Moreover, recognizing the fact that different users and queries may have different emphasis on content and location information, we introduce the content and location based concepts and achieves their respective results. Additionally, search engine also provides the facility of local search by entering keywords without using internet. And feature of integrity of the search engines at one location so that user can work with different search engines in parallel.
Keywords: Web Ontology Language (OWL), Personalization, SpyNB(NAÏVE BAYESIAN), Ontology based Multi-Facet (OMF),WKB (World Knowledge Base).
A Study on Data Controller-Preserving Public Auditing for Secured Cloud Storage, Dr. K. Sai Manoj, International Journal of Modern Engineering Research (First Author)
SOA Based CAM Cloud- Assisted Privacy Preserving Mobile Health Monitoring, Dr. Sai Manoj Kudaravalli, International journal of computer science Mechatronics. SJIF-4.454|Vol.3.Issue .6.2017. ISSN: 2455-1910. (First Author)
Literature survey on the destruction of attaches with MH HOP to HOP to HOP-AODV Routing Protocol in Vehicular Ad-hoc Network, Dr.K.Sai Manoj, Mrudula Kudaravalli , © December 2017 | | Volume 4 Issue 7 | ISSN: 2349-6002 (Second Author)
Faster content sharing over smart phone based Delay- tolerant networks. Dr. Sai Manoj Kudaravalli, International Journal of Engineering Research- Online. Vol.5,Issue.4,2017,ISSN: 2321-7758. July-Aug. Article available online http://www.ijor.in; (First Author)
Data acquisition through telephone K.Phani srinivas , Dr.K.Sai Manoj, International journal of recent Engineering and Development October 2017 Volume 02 – Issue 10 PP 01-05. www.ijrerd.com || Volume 02 – Issue 10 || October 2017 || PP. 50-54 (Second Author)
Analysis of Rectangular Micro-Strip Patch Antenna for Wi-Fi Applications , K Phani Srinivas 1, Dr.K.Sai Manoj2 , Mrudula Kudaravalli , International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 p-ISSN: 2395-0072
An Efficient and Novel Approach Using T.H.E.S Methodology for CBIR, Dr. Sai Manoj Kudaravalli, International journal of computer science Mechatronics. SJIF-4.454|Vol.3.Issue .5.2017. ISSN: 2455-1910. (Second Author)
A Survey on Protection of Multimedia Content in Cloud Computing, Dr. K.Sai Manoj, Mrudula Kudaravalli, International Journal of Computer Science and Mobile Computing – Vol.6 Issue.11, November- 2017, pg. 7-11 (First Author)
A Dynamic Framework of Advanced Mobile Video Streaming and Social video sharing in clouds, Dr. Sai Manoj Kudaravalli, International Journal of Engineering Research Online. Vol.5.,Issue.5,2017, sept-oct, ISSN:23217758.With an Impact Factor 5.8701