Generous Information Safety System for Investors in Online Trading Secretly using KP-ABE Machine Learning Method

Authors

  • Srinivas Kolli Assistant professor, Department of information technology, Vallurupalli nageswara rao vignana Jyothi Institute of engineering & technology, Vignana jyothi nagar, pragathi nagar, Nizampet (s.o), hyderabad, telangana-500090, India.
  • Akundi Sai Hanuman Professor of CSE , Gokaraju Lailavathi womens engineering college, Hyderabad
  • Javvaji V. K. Ratnam Professor Narasaraopeta Engineering College, Narasaraopet, AP , India,
  • J. N. S. S. Janardhana Naidu Department of CSE, Vishnu Institute of Technology, Vishnupur, Bhimavaram, Andhra Pradesh-534202
  • D. Shankar Department of CSE,Vishnu Institute of Technology, Vishnupur, Bhimavaram, Andhra Pradesh-534202
  • K. Saikumar School of engineering, department of CSE, Malla Reddy University, Maisammaguda, Dulapally, Hyderabad, Telangana 500043

Keywords:

Secure Pub/inv, Investors’ Privacy, Publicists’ Confidentiality, Collusion Resistance

Abstract

Publishers and investors (pub/inv) have agreed on a framework for the sharing of information as part of a brokering network. However, malicious brokers or brokers who are curious about the data may hack into the system and take the information. This is a suitable way for safeguarding sensitive information and data security subscriptions until brokers begin to disseminate it. To prevent revealing subscriptions and publications, modern techniques need brokers to employ encrypted connections. Even if the preferences of evil publications are protected, the data of innocent subscribers will be hacked, even if they are protected by malicious brokers. When pessimistic brokers are present, the programmed provides a publishing and subscription service that ensures publication and subscription anonymity. As a result, assaults on the KP-ABE algorithms by unskilled traders or antagonistic publishers are futile.

Downloads

Download data is not yet available.

References

Chen, E., Zhu, Y., Liang, K., & Yin, H. (2021). Secure Remote Cloud File Sharing with Attribute-based Access Control and Performance Optimization. IEEE Transactions on Cloud Computing.

Zhang, C. (2021). Sharcs: Secure Hierarchical Adaptive Reliable Cloud Storage Systems (Doctoral dissertation, Arkansas State University).

GOVARDHANA, G. (2019). MASTER OF COMPUTER APPLICATIONS.

Zhen, Y. (2011). Privacy-preserving personal health record system using attribute-based encryption (Doctoral dissertation, Worcester Polytechnic Institute).

Someswar, E. D. G. M. (2014). Security Techniques for Protecting Data in Cloud Computing. Global Research Academy, Hyderabad, India.

Cui, S., Belguith, S., De Alwis, P., Asghar, M. R., & Russello, G. (2018, August). Malicious entities are in vain: Preserving privacy in publish and subscribe systems. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 1624-1627). IEEE.

Yang, K., Zhang, K., Jia, X., Hasan, M. A., & Shen, X. S. (2017). Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Information Sciences, 387, 116-131.

Esposito, C., & Ciampi, M. (2014). On security in publish/subscribe services: A survey. IEEE Communications Surveys & Tutorials, 17(2), 966-997.

Asghar, M. R., Gehani, A., Crispo, B., & Russello, G. (2014, June). PIDGIN: Privacy-preserving interest and content sharing in opportunistic networks. In Proceedings of the 9th ACM symposium on information, computer and communications security (pp. 135-146).

Esposito, C., Ciampi, M., & De Pietro, G. (2014). An event-based notification approach for the delivery of patient medical information. Information Systems, 39, 22-44.

Cinque, M., Di Martino, C., & Esposito, C. (2012). On data dissemination for large-scale complex critical infrastructures. Computer Networks, 56(4), 1215-1235.

Ion, M., Russello, G., & Crispo, B. (2012). Design and implementation of a confidentiality and access control solution for publish/subscribe systems. Computer networks, 56(7), 2014-2037.

Bakken, D. E., Bose, A., Hauser, C. H., Whitehead, D. E., & Zweigle, G. C. (2011). Smart generation and transmission with coherent, real-time data. Proceedings of the IEEE, 99(6), 928-951.

Shand, B., Pietzuch, P., Papagiannis, I., Moody, K., Migliavacca, M., Eyers, D. M., & Bacon, J. (2011). Security policy and information sharing in distributed event-based systems. In Reasoning in Event-Based Distributed Systems (pp. 151-172). Springer, Berlin, Heidelberg.

Delamer, I. M., & Lastra, J. L. M. (2006). Service-oriented architecture for distributed publish/subscribe middleware in electronics production. IEEE Transactions on Industrial Informatics, 2(4), 281-294.

Pittala, C. S., Vijay, V., & Reddy, B. N. K. (2022). 1-Bit FinFET carry cells for low voltage high-speed digital signal processing applications. Silicon, 1-12.

Saran, O. S., Reddy, A. P., Chaturya, L., & Kumar, M. P. (2022). 3D printing of composite materials: A short review. Materials Today: Proceedings.

Dasari, K., Anjaneyulu, L., & Nadimikeri, J. (2022). Application of C-band sentinel-1A SAR data as proxies for detecting oil spills of Chennai, East Coast of India. Marine Pollution Bulletin, 174, 113182.

Rao, A. D., Chaitanya, A. K., Seshaiah, T., & Bridjesh, P. (2022). An Integrated Approach by Using Various Approaches for a Green Supplier Selection Problem. In Recent Advances in Manufacturing, Automation, Design and Energy Technologies: Proceedings from ICoFT 2020 (pp. 909-919). Springer Singapore.

Yakaiah, P., & Naveen, K. (2022). An Approach for Ultrasound Image Enhancement Using Deep Convolutional Neural Network. In Advanced Techniques for IoT Applications: Proceedings of EAIT 2020 (pp. 86-92). Springer Singapore.

Kumar, C. A., & Haribabu, K. (2022). A Great Adaptive SNR Assumed Low Power LDPC Decoder. In Advanced Techniques for IoT Applications: Proceedings of EAIT 2020 (pp. 443-451). Springer Singapore.

Thottempudi, P., Dasari, V. S. C. B., & Sista, V. S. P. (2022). Recognition of Moving Human Targets by Through the Wall Imaging RADAR Using RAMA and SIA Algorithms. In Advanced Techniques for IoT Applications: Proceedings of EAIT 2020 (pp. 544-563). Springer Singapore.

Arun, V., Reddy, D. L., & Rao, K. N. (2022). A Novel Analysis of Efficient Energy Architecture in Cryptography. In Advanced Techniques for IoT Applications: Proceedings of EAIT 2020 (pp. 339-345). Springer Singapore.

Amareswer, E., & Raju Naik, M. (2022). Smart Erobern of Vehicles on Crosswalks. In Advanced Techniques for IoT Applications: Proceedings of EAIT 2020 (pp. 489-497). Springer Singapore.

Saikumar, K., Rajesh, V., Babu, B.S. (2022). Heart disease detection based on feature fusion technique with augmented classification using deep learning technology. Traitement du Signal, Vol. 39, No. 1, pp. 31-42. https://doi.org/10.18280/ts.390104

Kailasam, S., Achanta, S.D.M., Rama Koteswara Rao, P., Vatambeti, R., Kayam, S. (2022). An IoT-based agriculture maintenance using pervasive computing with machine learning technique. International Journal of Intelligent Computing and Cybernetics, 15(2), pp. 184–197.

Saikumar, K., Rajesh, V. A machine intelligence technique for predicting cardiovascular disease (CVD) using Radiology Dataset. Int J Syst Assur Eng Manag (2022). https://doi.org/10.1007/s13198-022-01681-7.

Shravani, C., Krishna, G. R., Bollam, H. L., Vatambeti, R., & Saikumar, K. (2022, January). A Novel Approach for Implementing Conventional LBIST by High Execution Microprocessors. In 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 804-809). IEEE.

Kiran, K. U., Srikanth, D., Nair, P. S., Ahammad, S. H., & Saikumar, K. (2022, March). Dimensionality Reduction Procedure for Bigdata in Machine Learning Techniques. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 836-840). IEEE.

Srinivas Rao, K., Divakara Rao, D. V., Patel, I., Saikumar, K., & Vijendra Babu, D. (2023). Automatic Prediction and Identification of Smart Women Safety Wearable Device Using Dc-RFO-IoT. Journal of Information Technology Management, 15(Special Issue), 34-51.

Sreelakshmi, D., Sarada, K., Sitharamulu, V., Vadlamudi, M. N., & Saikumar, K. (2023). An Advanced Lung Disease Diagnosis Using Transfer Learning Method for High-Resolution Computed Tomography (HRCT) Images: High-Resolution Computed Tomography. In Digital Twins and Healthcare: Trends, Techniques, and Challenges (pp. 119-130). IGI Global.

Saikumar, K., Rajesh, V., & Rahman, M. Z. U. (2022). Pretrained DcAlexnet Cardiac Diseases Classification on Cognitive Multi-Lead Ultrasound Dataset. International Journal of Integrated Engineering, 14(7), 146-161.

Maddileti, T., Sirisha, J., Srinivas, R., & Saikumar, K. (2022). Pseudo Trained YOLO R_CNN Model for Weapon Detection with a Real-Time Kaggle Dataset. International Journal of Integrated Engineering, 14(7), 131-145.

Koppula, N., Rao, K. S., Nabi, S. A., & Balaram, A. (2023). A novel optimized recurrent network-based automatic system for speech emotion identification. Wireless Personal Communications, 128(3), 2217-2243.

Shankar, D., George, G. V. S., JNSS, J. N., & Madhuri, P. S. (2023). Deep analysis of risks and recent trends towards network intrusion detection system. International Journal of Advanced Computer Science and Applications, 14(1).

Mehraj, H., Jayadevappa, D., Haleem, S.L.A., Parveen, R., Madduri, A., Ayyagari, M.R., Dhabliya, D. Protection motivation theory using multi-factor authentication for providing security over social networking sites (2021) Pattern Recognition Letters, 152, pp. 218-224.

Keerthi, R.S., Dhabliya, D., Elangovan, P., Borodin, K., Parmar, J., Patel, S.K. Tunable high-gain and multiband microstrip antenna based on liquid/copper split-ring resonator superstrates for C/X band communication (2021) Physica B: Condensed Matter, 618, art. no. 413203,

Downloads

Published

05.12.2023

How to Cite

Kolli, S. ., Hanuman, A. S. ., Ratnam, J. V. K. ., Naidu, J. N. S. S. J. ., Shankar, D. ., & Saikumar, K. . (2023). Generous Information Safety System for Investors in Online Trading Secretly using KP-ABE Machine Learning Method. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 285–297. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4072

Issue

Section

Research Article

Most read articles by the same author(s)