An Enriched Information Security Framework from Various Attacks in the IoT
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2020, Vol 8, Issue 4
Abstract
Security in various E-commerce Applications includes an efficient framework in Information Security especially in Computer Security, Data Security and other online transactions in E-commerce applications. Security in E-Commerce application plays an important role for the secure and scalable transaction which includes various dimensions such as security-integrity, Confidentiality, Non-repudiation, Privacy etc. Hence for the Security of Online Transactions in E-Commerce based application various Security algorithms are implemented. Although these Security algorithms are efficient and provides Security from various attacks but Data Storage during the transactions and Computational time of the algorithms is also important. The existing architecture proposed for the security of online e-transactions in web applications provides security from different attacks and is efficient in terms of computational parameters, but there are certain issues which need to be overcome such as: Security Prevention from different attacks during Online Transactions in Web Mining especially in E-commerce Applications, Increase use of Computational Cost at the Client and Server Side. The Proposed framework provides Security prevention from various attacks especially in IoT. The methodology implemented here works on the basis of authenticating the validity of the User by allocating a challenge value and hope that our proposed framework will be more effective and efficient.
Authors and Affiliations
Mohammad Salman Husain, Dr. Mohammad Haroon
Convergence of Hybrid Grey Wolf Optimization with Heuristic Approaches for Enhanced Job Shop Scheduling
This scholarly inquiry examines the utilization of the Hybrid Grey Wolf Optimization Algorithm (HGWOA) in addressing the Job Shop Scheduling Problem (JSSP), a combinatorial optimization problem commonly encountered withi...
Comparative Study and Utilization of Best Deep Learning Algorithms for the Image Processing
Deep learning has gained immense popularity in scientific computing, and its algorithms are widely used in complex problem-solving industries. Every deep learning algorithm use different types of neural networks to perfo...
Material Bottlenecks in the Future Development of Green Technologies
Reducing emissions global economies demands the development of "green technology," which entails a reorganization of the energy sector to use renewable energy sources and nitrogen transportation systems. This reconstruct...
A Review on Drinking Water Treatment with Disinfectant
The majority of the world's natural water sources are not always safe to consume untreated. Raw water from rivers, lakes, ponds, and groundwater can include microorganisms. Waterborne diseases can be contracted by consum...
Distributed and Grid Computing: An Analytical Comparison
CPU utilization is an important aspect of distributed and grid computing environment. The computing nodes can be overloaded, i.e., they can have more jobs than their capacity such that no more jobs can be associated to t...