Browsing by Author "Das, Manik Lal"
Now showing items 1-20 of 26
-
Auditing access to private DATA by android applications
Rangnath, Maral Vishal (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)"The capabilities of the mobile device are extended in various useful by Android applications. But with the usefulness and swift advancement of Android, its security issues have also become more and more alarming. The more ... -
Credit Card Fraud Detection Using MachineLearning Algorithms
Tank, Ekta (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)Credit Card payment facilitating people to pay for goods and service quickly. The credit payment is gaining popularity day by day because of its benefits. With the popularity of credit card payment, crime related to credit ... -
Cross-Platform Data Deduplication and Ownership over Encrypted Data
Tarkunde, Dipak (2021)Data deduplication is the most important data compression technique used in the cloud domain. With this technique, cloud service providers can utilize their storage space efficiently to store large amounts of data. There ... -
Deduplication On Cloud Storage
Gosai, Bhautik (2021)Day by day people are moving towards cloud storage for ease of accessibility, availability, security etc. Data Deduplication helps cloud storage to utilize storage space efficiently. Deduplication process is easy when data ... -
Design and Analysis of Privacy Models against Background Knowledge in Privacy - Preserving Data Publishing
Desai, Nidhi Nitin (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)"Humongous amount of data gets collected by various online applications like social networks, cellular technologies, the healthcare sector, location - based services, and many more. The collected data can be accessed by ... -
Design and analysis of schemes for privacy preserving cloud storage services
Chaudhari, Payal (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)Public cloud storage services have become the leading choice for individuals and organizations to store their data, as the service provides the benefits of availability and reliability together at a reduced cost. While ... -
Image authentication using genetic algorithm
Londhey, Arjun (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)With a widespread deployment of digital images, there is need to authenticatesuch images for their originality and integrity.The main objective of the work is todesign an authentication scheme that allows two parties to ... -
Medical image security with cheater identification using secret sharing scheme
Krishnan, Arun (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)The progress in the field of information and communication technology has brought about quick and efficient transfer of textual as well as multimedia data . However, the growth of technology has also provided new ways ... -
On insider attack in distributed file systems
Solani, Riddhi (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)Due to heavy use of internet, mobiles, sensors etc. Data is growing rapidly day-by-day. However traditional database systems fail to store such a huge semi structured or unstructured data which raises the need for distributed ... -
On Minimality Attack in Privacy Preserving Data Publishing
Hemantha, K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)"Data Publishing has become much concern in recent yerars for protecting the individual privacy. Information about the individuals is collected from various domain and is being published public. We can extract lot of wealth ... -
Privacy and accountability in cloud computation and storage
Gajera, Hardik (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)Cloud computing is a cost-effective computing paradigm for convenient, ondemand data access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services. While providing ... -
Privacy preservation in vehicular ad-hoc networks (VANETs)
Garg, Garima (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)Vehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other ... -
Privacy Preserving Identity Verification and Verifiable Computation For HealthCare System
Naik, Shruti Rajendrakumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)Paper based medical consulting system has been replaced by electronic health monitoring system due to features like low cost, on demand global accessibility, reliability, accuracy and mobility. Generally, mobile healthcare ... -
Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications
Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ... -
Private Contact Tracing based on Trajectory-data through Trusted Hardware
Kurkiya, Astha (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)The COVID19 pandemic has triggered technical measures to halt the disease�s spread. One of the most promising solutions for this is private contact tracing (PCT). However, the recently suggested Bluetooth-based PCT has ... -
Private targeted advertising using homomorphic encryption
Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ... -
Scalable Privacy-Preserving Recommendation System
Tamboli, Rushabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)Recommendation systems, which are used by e-business applications, play an essential role in our daily life. For example, companies like Amazon, Flipkart, YouTube use recommendation systems to generate customized recommendations ... -
Secure and efficient dealing with node capture attack in wireless sensor networks
Agrawal, Sarita (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)Wireless Sensor Networks (WSN) have found enormous applications in various areas of day-to-day life such as in health-care, battle-field surveillance and disaster management. The communication amongst the sensor nodes ... -
Secure data delivery in mobile ad hoc network using multiple paths
Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ... -
Secure SQL with access control for database as a service model
Dave, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)Rapid growth of internet and networking technology emerges "Software as a service model". In this model, application service providers (ASP) provides each functionality of software over internet. ASP provides access of ...