Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

RESEARCH ARTICLE OPEN ACCESS

Cyber Security in Cloud Using Blowfish Encryption


Dr. Sheena Hussaini
R&D Engineer Affiliation/Institution or Company-United States
ABSTRACT
Due to the inexorable notoriety of ubiquitous mobile devices and cloud processing, storing of data (for example
photographs, recordings, messages, and texts) in the cloud has turned into a pattern among individual and hierarchical
clients. Be that as it may, cloud service providers can't be completely trusted to guarantee the accessibility or honesty of
client data re-appropriated/transferred to the cloud. Consequently, to enhance the cybersecurity level of cloud data, a
new security model is introduced along with optimal key selection. In the proposed study, first cluster the secret
information which we are taken using K-Mediod clustering algorithm based on a data distance measure. Then, the
clustered data are encrypted using Blowfish Encryption (BE) and stored in the cloud. The result demonstrates that the
optimal blowfish algorithm improves the accuracy of cyber security for all secret information compared to existing
algorithms.
Keyword: Inexorable notoriety of ubiquitous mobile devices and cloud processing.

I. INTRODUCTION
Cloud processing grows rapidly alongside the of data is vital in cloud condition and dependent on
quick ascent of enormous data. The cloud makes huge that, we propose a proficient system that gives data
data preparing conceivable by giving storage as well as secrecy and honesty in cloud storage in both
computing power [1-10]. Thusly, enormous data transmission as well as storing tasks [58-60]. In
additionally push cloud registering forward, as an ever- addition, this structure will decrease the
increasing number of clients might want to make unpredictability and processing time used to encrypt the
utilization of the cloud to store and process their data data [61]. By understanding the benefits of encryption
[11-16]. Cloud storage administrations are utilized in giving fit security to interesting data, a viable
generally to store and naturally back up subjective data algorithm BE along with optimization is presented.
in manners that are viewed as cost sparing, simple to
utilize and open [17-25]. They additionally encourage II. LITERATURE SURVEY
data sharing among clients and synchronization of
various gadgets. However, there are fundamental data In 2016 Manish M Potey et al. [62], has been proposed
that is processed also stored in the cloud frameworks the data security process in CSP utilizing completely
[26-35]. Losing or uncovering these profitable data will homomorphic encryption. The data is stored in Amazon
have a tremendous terrible effect on the data proprietors Web Service (AWS) open cloud. Client's calculation is
being people or associations. Thus, there is an performed on encrypted data out in the open cloud. At
expanding request to secure data over the cloud the point results are required they can be downloaded
frameworks [36-40]. on a customer machine. In this situation, user’s data is
never stored in plaintext on the open cloud.
The current cloud storage systems utilize same
key size to encrypt all data without taking in thought its Security has been seen as extraordinary compared to
secrecy level which may be infeasible (a few strategies other issues in the enhancement of Cloud Computing.
are Fuzzy personality-based encryption (FIBE), The key issue in viable execution of Cloud Computing
Homomorphic Encryption (HE), Data Encryption is to sufficiently manage the security in the cloud
Standard (DES)) [41-49]. Treating the low and high applications, [63] ECC can be used as a piece of mobile
classified data by a similar route and at a similar computing, remote sensor frameworks, and server-
security level will include superfluous overhead also based encryption, image encryption and its application
increment the processing time [50-56]. Inspired by the in each field of correspondence.
above realities, this paper concentrated on two vital
The cloud data strategies and security in virtual
parts of data computing, security along with capacity
condition [64]. To give data storage and security in the
[57]. The classification
cloud, they exhibited RSA open key cryptosystem.
Further, portrays the security administrations
incorporates key age, encryption, and decryption in
virtual condition.

ISSN: 2454-5414 www.ijitjournal.org Page 13


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

III. OVERVIEW OF ENCRYPTION IN The utilization of cloud computing has expanded


CLOUD SECURITY quickly in numerous associations. There are some
security issues in cloud processing, for example, data
To enhance the cyber security in the cloud, data ought security, outsider control, and protection. In the event
to be encrypted before being sent to the cloud. Initially, that, all data stored in the cloud were encrypted
the client login and utilizes the key age given by the utilizing conventional cryptosystems, this would viably
server to produce the secret key, the client is the main illuminate the three above issues. In the proposed work,
holder of this secret key. At that point, the client the security issues of data to be stored in the cloud can
encrypts the data that needs to send it to the cloud. be solved by utilizing BE technique [73-75].
Encryption is an outstanding innovation for ensuring
cloud data. Existing papers emphasize the different 4.2 Blowfish Encryption (BE): Proposed Security
cryptographic encryption algorithms as the real Model
arrangement of security challenges like DES, RSA and
Blowfish is a symmetric encryption algorithm that
homomorphic. The enhancement of the current
implies it utilizes a similar secret key to both encrypts
cryptosystems to enable servers to perform different
as well as decrypt messages. The block length for
activities asked for by the customer, here blowfish
Blowfish is 64 bits; messages that aren't a multiple of
algorithm is utilized to secure the cloud data [65-72].
eight bytes in size must be cushioned. Blowfish
comprises two sections:
IV. METHODOLOGY
• Key-expansion
The study addresses the secrecy and
• Data encryption
confidentiality of user data (stored in the cloud) by the
execution of innovative clustering and security model. Key-expansion: In the key-expansion phase, the
Initially, the collected data can be either in text or in inputted key is changed over into several sub key arrays
image format, hence we have to cluster the data and absolute 4168 bytes. There is the P array, which is
cyber security based on the similarity measure. The eighteen 32- bit boxes, along with the S-boxes, which
clustered data are secured in the cloud using the are four 32-bit arrays with 256 entries each. After the
encryption model i.e. BE model. Encrypted data can be string initialization, the initial 32 bits of the key is
safely accessed to since that the approved data holders XORed with P1 (the first 32-bit box in the P-array).
can get the symmetric keys utilized for data decryption. The second 32 bits of the key is XORed with P2, etc
Pursued by the encryption, it's stored in the cloud or until each of the 448.
important zone, after that optimal private key is utilized
for the decryption procedure. Data encryption: In this stage, the information is
utilized with 64-bit plain text and it is encrypted to 64-
4.1 Cloud Service Model bit cipher text. The 64 bit of information data is
segmented into two 32-bits as left parts just as right
Cloud administrations enable people and
parts delineated in figure 2. Each 32-bit is XORed with
organizations to utilize programming and equipment
P-cluster and the outcome is conveyed to the function
assets that are overseen by cloud suppliers at remote
(F). At that point, complete the XOR undertaking for
areas. The service model conveyed can be private,
similarly left parts and the accordingly 32 bit right parts
open, hybrid or network cloud according to the client
effortlessly. This procedure proceeds until the finishing
necessities.
of 16 round.
Need for Cryptosystems in Cloud Computing
P1 P16

32 bit 32 bit

64 Bit F F 64 Bit
plain 15 more cipher
text iteration text
32 bit
32 bit

Fig 1: Blowfish Algorithm

ISSN: 2454-5414 www.ijitjournal.org Page 14


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

F function in Data Encryption VI. CONCLUSION


The F function sends four 32 bit S-boxes, with each The major challenge of the cyber data security is the
one including 256 entries. In the novel blow fish protection and privacy of secret information in the
technique, the underlying 32 bit left halves are cloud. In this paper, we have projected an effective
subdivided into four 8 bit blocks such as e, f, g, and h. confidentiality-based cloud storage framework that
The formula for Ft function is depicted in equation (2). upgrades the processing time and guarantees privacy
and trustworthiness via data clustering (K-medoid).
F ( LH ) = (( Sb1,e + Sb 2, f mod 232 )  Sb3, g ) + Sb 4,h mod 232 Here, the cyber security level is enhanced by the BE
(1) algorithm where the optimal key is chosen by the
metaheuristic algorithm. The proposed optimal
V. RESULT ANALYSIS blowfish encryption technique attains a maximum
level of cyber security in cloud storage by attaining
The result analysis section explains the efficiency or maximum key breaking time compared to blowfish,
performance of the presented optimal blowfish RSA [13], AES [14]. The simulation result
encryption algorithm. Also, the optimal key is chosen demonstrates that the proposed optimal blowfish
by the breaking time analysis with the help of IDA and algorithm improves the accuracy of cyber security for
its efficiency is analyzed in this section. The presented all secret information and it achieves less encryption,
cloud data security model is implemented in JDK 1.4 decryption and execution time compared to existing
with 4GB RAM and i5 processor. Figure 3 depicts the algorithms. For future investigations, we will study the
user login window. sensitive data based on other similarity measures,
encryption-based hybrid optimization approach.

REFERENCE
[1] Chakchai So-In, Tri Gia Nguyen, Gia Nhu
Nguyen: Barrier Coverage Deployment
Algorithms for Mobile Sensor Networks.
Journal of Internet Technology 12/2017;
18(7):1689-1699.
[2] Suresh, G., Epsiba, P., & Kumaratharan, N.
(2016). Content based Image Retrieval Based
on Curvelet and PCA using HTF. Asian Journal
of Research in Social Sciences and
Humanities, 6(8), 2165-2176.
[3] Shankar, K., Zhang, Y., Liu, Y., Wu, L., &
Chen, C. H. (2020). Hyperparameter tuning
deep learning for diabetic retinopathy fundus
image classification. IEEE Access, 8, 118164-
118173.
Fig 2: Encryption and Decryption Time Analysis
[4] Kumar, M. R., Lenine, D., & Babu, C. S.
The encryption, decryption and execution time (2011). A variable switching frequency with
analysis of cloud data security is demonstrated in table boost power factor correction
2 and the graphical representation of encryption and converter. Telkomnika, 9(1), 47.
decryption time for different file size (Mb) are [5] Lenine, D., Babu, C. S., & Shankaraiah, G.
illustrated in figure 2. The performance of proposed (2012). Performance Evaluation of Fuzzy and
optimal blowfish algorithm is analyzed and compared PI Controller for Boost Converter with Active
with existing algorithms like blowfish, RSA [13] and PFC. International Journal of Power Electronics
AES [14]. Results conclude that the optimal blowfish and Drive Systems, 2(4), 445.
encryption technique achieves minimum time to [6] Kathiresan, S., Sait, A. R. W., Gupta, D.,
encrypt, decrypt and execute the data. Lakshmanaprabu, S. K., Khanna, A., & Pandey,
H. M. (2020). Automated detection and
classification of fundus diabetic retinopathy
images using synergic deep learning
model. Pattern Recognition Letters.

ISSN: 2454-5414 www.ijitjournal.org Page 15


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

[7] Ezhilarasu, P., & Krishnaraj, N. (2015). Triple search-a review. International Journal of
Substring Based Classification for Science, Engineering and Computer
Nondeterministic Finite Technology, 5(5), 116.
Automata. IJAER, 10(59), 177-82. [18] Suresh, G., Epsiba, P., Sivanandam, S. N., &
[8] Epsiba, P., Kumaratharan, N., & Suresh, G. Rajaram, M. (2011). Block Based Motion
(2020). A novel discrete CURVELET transform Estimation using FWS-LMedS Algorithm for
and modified WHOG for video surveillance Video Compression. European Journal of
services. Concurrency and Computation: Scientific Research, 49(4), 533-541.
Practice and Experience, 32(4), e5046. [19] Shankar, K., Lakshmanaprabu, S. K., Gupta, D.,
[9] Shankar, K., & Elhoseny, M. (2019). Trust Khanna, A., & de Albuquerque, V. H. C.
Based Cluster Head Election of Secure Message (2020). Adaptive optimal multi key based
Transmission in MANET Using Multi Secure encryption for digital image
Protocol with TDES. J. UCS, 25(10), 1221- security. Concurrency and Computation:
1239. Practice and Experience, 32(4), e5122.
[10] Le, D.-N.a, Kumar, R.b, Nguyen, G.N., [20] Lenine, D., Babu, C. S., & Kumari, J. S. (2010,
Chatterjee, J.M.d, Cloud Computing and October). A static improvement of predictive
Virtualization, DOI: 10.1002/9781119488149, control for single phase voltage fed power
Wiley. factor correction converters. In 2010
[11] Kumari, J. S., Babu, C. S., Lenine, D., & International Conference on Advances in
Lakshman, J. (2009, December). Improvement Recent Technologies in Communication and
of static performance of multilevel inverter for Computing (pp. 116-120). IEEE.
single-phase grid connected photovoltaic [21] Shankar, K., Elhoseny, M., Kumar, R. S.,
modules. In 2009 Second International Lakshmanaprabu, S. K., & Yuan, X. (2020).
Conference on Emerging Trends in Engineering Secret image sharing scheme with encrypted
& Technology (pp. 691-697). IEEE. shadow images using optimal homomorphic
[12] Senthil Kumar, B. V., Kumar, A., & Suresh, G. encryption technique. Journal of Ambient
(2016). Functional equations related to spatial Intelligence and Humanized Computing, 11(5),
filtering in image enhancement. Int. J. Control 1821-1833.
Theory Appl, 9(28), 555-564. [22] Reddy, J. N., Lenine, D., & Kumar, M. V.
[13] Shankar, K., Lakshmanaprabu, S. K., Khanna, (2018). Experimental Study of Seven Level
A., Tanwar, S., Rodrigues, J. J., & Roy, N. R. Magnetic Coupled Impedance Source Inverter.
(2019). Alzheimer detection using Group Grey [23] Suresh, G. (2009). IMAGE AND VIDEO
Wolf Optimization based features with CODING WITH A NEW WASH TREE
convolutional classifier. Computers & ALGORITHM FOR MULTIMEDIA
Electrical Engineering, 77, 230-243. SERVICES 1.
[14] Epsiba, P., Suresh, G., & Kumaratharan, N. [24] Shankar, K., Elhoseny, M., Chelvi, E. D.,
(2020). Edge Detection-Based Depth Analysis Lakshmanaprabu, S. K., & Wu, W. (2018). An
Using TD-WHOG Scheme. In Intelligent efficient optimal key based chaos function for
Computing in Engineering (pp. 397-407). medical image security. IEEE Access, 6,
Springer, Singapore. 77145-77154.
[15] Anand Nayyar, Vikram Puri, Nhu Gia Nguyen, [25] EPSIBA, P., SUBATHRA, S., SARDAR
BioSenHealth 1.0: A Novel Internet of Medical BASHA, N., SURESH, G., &
Things (IoMT) Based Patient Health KUMARATHARAN, N. (2013). METADATA
Monitoring System, Lecture Notes in Networks BASED HIGH QUALITY IMAGE/VIDEO
and Systems. Springer, 2019 STREAMING USING CURVELET
[16] Kumari, J. Surya, Ch Sai Babu, and Mr D. TRANSFORM. Journal of Theoretical &
Lenine. "An Enhancement of Static Applied Information Technology, 57(2).
Performance of Multilevel Inverter for Single [26] Lopez-Martinez, F., Schwarcz, A., Núñez-
Phase Grid Connected Photovoltaic Valdez, E. R., & Garcia-Diaz, V. (2018).
modules." International journal of Recent Machine learning classification analysis for a
Trends in Engineering, Academy Publishers, hypertensive population as a function of several
Finland 3.3 (2010): 20-24. risk factors. Expert Systems with Applications,
[17] Ezhilarasu, P., Krishnaraj, N., & Babu, S. V. 110, 206-215.
(2015). Applications of finite automata in text

ISSN: 2454-5414 www.ijitjournal.org Page 16


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

[27] Ezhilarasu, P., Prakash, J., Krishnaraj, N., Classifier and Grey Wolf Optimization
Satheesh Kumar, D., Sudhakar, K., & Algorithm Based Intelligent Classification
Parthasarathy, C. (2014). A Novel Approach to Algorithm for Chronic Kidney Disease."
Classify Nondeterministic Finite Automata Journal of Medical Imaging and Health
Based on More than Two Loops and its Informatics 10.10 (2020): 2297-2307.
Position. SSRG International Journal of [36] Sreenivas, M. B. S., Babu, C. S., & Lenine, M.
Computer Science and Engineering (SSRG- D. (2012). Design and Analysis of Predictive
IJCSE), 1(10), 46-49. control using PI controller for Boost Converter
[28] Suresh, G., Epsiba, P., Rajaram, D. M., & with Active Power Factor
Sivanandam, D. S. (2010). Scalable ACC-DCT Correction. International Journal of Emerging
Based Video Compression Using Up/Down Technology and Advanced Engineering, 2(6).
Sampling Method. International Journal of [37] Krishnaraj, N., Ezhilarasu, P., Karthik, S., &
Computer and Network Security, 2(6). Prabhakar, M. (2016). J,” Enhancing Security in
[29] Lenine, D., Babu, C. S., & Kumari, J. S. (2010, Mobile Devices through Multimodal
October). A static improvement of predictive biometrics”. Middle-East Journal of Scientific
control for single phase voltage fed power Research, 23(8), 1598-1603.
factor correction converters. In 2010 [38] Shankar, K., Lakshmanaprabu, S. K., Gupta, D.,
International Conference on Advances in Maseleno, A., & De Albuquerque, V. H. C.
Recent Technologies in Communication and (2020). Optimal feature-based multi-kernel
Computing (pp. 116-120). IEEE. SVM approach for thyroid disease
[30] Van, V.N., Chi, L.M., Long, N.Q., Nguyen, classification. The Journal of
G.N., Le, D.-N, A performance analysis of Supercomputing, 76(2), 1128-1143.
openstack open-source solution for IaaS cloud [39] Suresh, G., Epsiba, P., Rajaram, M., &
computing, Advances in Intelligent Systems Sivanandam, S. N. (2010). An improved low
and Computing, 380, pp. 141-150. complex spatially scalable ACC-DCT based
[31] Suresh, G., Epsiba, P., Rajaram, M., & video compression method. IJCSE)
Sivanandam, S. N. (2010, July). A low complex International Journal on Computer Science and
scalable spatial adjacency ACC-DCT based Engineering, 2(03).
video compression method. In 2010 Second [40] Lambert, J. R., Arulanthu, P., & Perumal, E.
International conference on Computing, Identification of Nominal Attributes for
Communication and Networking Intelligent Classification of Chronic Kidney
Technologies (pp. 1-6). IEEE. Disease using Optimization Algorithm.
[32] Nieto, Y., García-Díaz, V., Montenegro, C., & [41] Bhateja, V., Gautam, A., Tiwari, A., Nhu, N.G.,
Crespo, R. G. (2019). Supporting academic Le, D.-N, Haralick features-based classification
decision making at higher educational of mammograms using SVM, Advances in
institutions using machine learning-based Intelligent Systems and Computing, Volume
algorithms. Soft Computing, 23(12), 4145- 672, 2018, Pages 787-795.
4153. [42] López-Martínez, F., Núñez-Valdez, E. R.,
[33] Shankar, K., Elhoseny, M., Lakshmanaprabu, S. Gomez, J. L., & García-Díaz, V. (2019). A
K., Ilayaraja, M., Vidhyavathi, R. M., Elsoud, neural network approach to predict early
M. A., & Alkhambashi, M. (2020). Optimal neonatal sepsis. Computers & Electrical
feature level fusion based ANFIS classifier for Engineering, 76, 379-388.
brain MRI image [43] Lenine, D., & Bau, S. (2009). Comparison
classification. CONCURRENCY AND between variable switching frequency and timer
COMPUTATION-PRACTICE & controller with constant switching frequency
EXPERIENCE, 32(1). techniques for PFC converters. International
[34] Dey, N., Ashour, A.S., Chakraborty, S., Le, D.- Journal of Computer and Electrical
N., Nguyen, G.N, Healthy and unhealthy rat Engineering, 1(2), 183-187.
hippocampus cells classification: A neural [44] Shankar, K., & Eswaran, P. (2017). RGB based
based automated system for Alzheimer disease multiple share creation in visual cryptography
classification, Journal of Advanced Microscopy with aid of elliptic curve cryptography. China
Research, 11(1), pp. 1-10 Communications, 14(2), 118-130.
[35] Rubini, L. Jerlin, and Eswaran Perumal. [45] Ezhilarasu, P., Thirunavukkarasu, E.,
"Hybrid Kernel Support Vector Machine Karuppusami, G., & Krishnaraj, N. (2015).

ISSN: 2454-5414 www.ijitjournal.org Page 17


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

Single substring based classification for Image Compression Scheme Using


nondeterministic finite automata. International Neighborhood Correlation Sequence Algorithm
Journal on Applications in Information and in WSN. IEEE Transactions on Reliability.
Communication Engineering, 1(10), 29-31. [55] Jiménez, A. C., García-Díaz, V., & Bolaños, S.
[46] Rao, S. K., Lenine, D., & Sujatha, P. (2020). (2018). A decentralized framework for multi-
Constant Current Analysis of Shell Type agent robotic systems. Sensors, 18(2), 417.
Transformer at Different Temperatures of Core [56] Elhoseny, M., & Shankar, K. (2019). Reliable
by Using Quickfield Software. In Emerging data transmission model for mobile ad hoc
Trends in Electrical, Communications, and network using signcryption technique. IEEE
Information Technologies (pp. 175-184). Transactions on Reliability.
Springer, Singapore. [57] Krishnaraj, N., Kumar, P., & Bhagavan, S. K.
[47] Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu (2018). Conceptual Semantic Model for Web
Nguyen, Vikrant Bhateja, Suresh Chandra Document Clustering Using Term
Satapathy (2017), Optimizing Feature Selection Frequency. EAI Endorsed Transactions on
in Video-based Recognition using Max-Min Energy Web, 5(20).
Ant System for the Online Video Contextual [58] Jerlin Rubini, L., & Perumal, E. (2020).
Advertisement User-Oriented System, Journal Efficient classification of chronic kidney
of Computational Science, Elsevier ISSN: disease by using multi‐kernel support vector
1877-7503. Vol.21, pp.361-370. machine and fruit fly optimization algorithm.
[48] Arulanthu, P., & Perumal, E. (2020). An International Journal of Imaging Systems and
intelligent IoT with cloud centric medical Technology, 30(3), 660-673.
decision support system for chronic kidney [59] Elhoseny, M., Shankar, K., & Uthayakumar, J.
disease prediction. International Journal of (2019). Intelligent diagnostic prediction and
Imaging Systems and Technology. classification system for chronic kidney
[49] Shankar, K., & Eswaran, P. (2016). RGB-based disease. Scientific reports, 9(1), 1-14.
secure share creation in visual cryptography [60] Elhoseny, M., Selim, M. M., & Shankar, K.
using optimal elliptic curve cryptography (2020). Optimal Deep Learning based
technique. Journal of Circuits, Systems and Convolution Neural Network for digital
Computers, 25(11), 1650138. forensics Face Sketch Synthesis in internet of
[50] Ezhilarasu, P., & Krishnaraj, N. (2015). Double things (IoT). International Journal of Machine
Substring based Classification for Learning and Cybernetics, 1-12.
Nondeterministic Finite Automata. Indian [61] Krishnaraj, N., Kavitha, M. G., Jayasankar, T.,
Journal Of Science And Technology, 8, 26. & Kumar, K. V. A Glove Based Approach to
[51] Velu, K., Arulanthu, P., & Perumal, E. (2019, Recognize Indian Sign Languages.
October). Energy Reduction Stratagem in Smart [62] Montenegro-Marin, C. E., Cueva-Lovelle, J.
Homes Using Association Rule Mining. In M., Sanjuán-Martínez, O., & García-Díaz, V.
International Conference on Innovative Data (2012). Domain specific language for the
Communication Technologies and Application generation of learning management systems
(pp. 188-193). Springer, Cham. modules. Journal of Web Engineering, 11(1),
[52] Núñez-Valdez, E. R., García-Díaz, V., Lovelle, 23.
J. M. C., Achaerandio, Y. S., & González- [63] Pustokhina, I. V., Pustokhin, D. A., Gupta, D.,
Crespo, R. (2017). A model-driven approach to Khanna, A., Shankar, K., & Nguyen, G. N.
generate and deploy videogames on multiple (2020). An effective training scheme for deep
platforms. Journal of Ambient Intelligence and neural network in edge computing enabled
Humanized Computing, 8(3), 435-447. Internet of medical things (IoMT)
[53] Huyen, D.T.T., Binh, N.T., Tuan, T.M., systems. IEEE Access, 8, 107112-107123.
Nguyen, G.N, Dey, N., Son, L.H, Analyzing [64] Amira S. Ashour, Samsad Beagum, Nilanjan
trends in hospital-cost payments of patients Dey, Ahmed S. Ashour, Dimitra Sifaki Pistolla,
using ARIMA and GIS: Case study at the Hanoi Gia Nhu Nguyen, Dac-Nhuong Le, Fuqian Shi
Medical University Hospital, Vietnam, Journal (2018), Light Microscopy Image De-noising
of Medical Imaging and Health Informatics, using Optimized LPA-ICI Filter, Neural
7(2), pp. 421-429. Computing and Applications, Vol.29(12), pp
[54] Uthayakumar, J., Elhoseny, M., & Shankar, K. 1517–1533, Springer, ISSN: 0941-0643.
(2020). Highly Reliable and Low-Complexity

ISSN: 2454-5414 www.ijitjournal.org Page 18


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

[65] Tolosa, J. B., Sanjuán‐Martínez, O., [74] Le Nguyen, B., Lydia, E. L., Elhoseny, M.,
García‐Díaz, V., G‐Bustelo, B. C. P., & Pustokhina, I., Pustokhin, D. A., Selim, M. M.,
Lovelle, J. M. C. (2011). Towards the ... & Shankar, K. (2020). Privacy Preserving
systematic measurement of ATL transformation Blockchain Technique to Achieve Secure and
models. Software: Practice and Experience, Reliable Sharing of IoT Data. CMC-
41(7), 789-815. COMPUTERS MATERIALS &
[66] Raj, R. J. S., Shobana, S. J., Pustokhina, I. V., CONTINUA, 65(1), 87-107.
Pustokhin, D. A., Gupta, D., & Shankar, K. [75] Ezhilarasu, P., & Krishnaraj, N. (2015).
(2020). Optimal Feature Selection-Based Applications of Finite Automata in Lexical
Medical Image Classification Using Deep Analysis and as a Ticket Vending Machine–A
Learning Model in Internet of Medical Review. Int. J. Comput. Sci. Eng.
Things. IEEE Access, 8, 58006-58017. Technol, 6(05), 267-270.
[67] García-Díaz, V., Espada, J. P., Crespo, R. G.,
G-Bustelo, B. C. P., & Lovelle, J. M. C. (2018).
An approach to improve the accuracy of
probabilistic classifiers for decision support
systems in sentiment analysis. Applied Soft
Computing, 67, 822-833.
[68] Mohanty, S. N., Ramya, K. C., Rani, S. S.,
Gupta, D., Shankar, K., Lakshmanaprabu, S. K.,
& Khanna, A. (2020). An efficient Lightweight
integrated Blockchain (ELIB) model for IoT
security and privacy. Future Generation
Computer Systems, 102, 1027-1037.
[69] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z.
Hybrid Soft Computing Approach for
Prediction of Cancer in Colon Using
Microarray Gene Data. Current Signal
Transduction Therapy, 11(2).
[70] Cueva-Fernandez, G., Espada, J. P., García-
Díaz, V., García, C. G., & Garcia-Fernandez, N.
(2014). Vitruvius: An expert system for vehicle
sensor tracking and managing application
generation. Journal of network and computer
applications, 42, 178-188.
[71] Anand Nayyar, Vikram Puri, Nhu Gia Nguyen,
Dac Nhuong Le, Smart Surveillance Robot for
the Real Time Monitoring and Control System
in Environment and Industrial Applications,
Advances in Intelligent System and Computing,
pp 229-243, Springer
[72] Sankhwar, S., Gupta, D., Ramya, K. C., Rani,
S. S., Shankar, K., & Lakshmanaprabu, S. K.
(2020). Improved grey wolf optimization-based
feature subset selection with fuzzy neural
classifier for financial crisis prediction. Soft
Computing, 24(1), 101-110.
[73] García-Díaz, V., Fernández-Fernández, H.,
Palacios-González, E., G-Bustelo, B. C. P.,
Sanjuán-Martínez, O., & Lovelle, J. M. C.
(2010). Talisman mde: Mixing MDE principles.
Journal of Systems and Software, 83(7), 1179-
1191.

ISSN: 2454-5414 www.ijitjournal.org Page 19

You might also like