Now showing items 1-20 of 24

    • Auditing access to private DATA by android applications 

      Rangnath, Maral Vishal (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "The capabilities of the mobile device are extended in various useful by Android applications. But with the usefulness and swift advancement of Android, its security issues have also become more and more alarming. The more ...
    • Credit Card Fraud Detection Using MachineLearning Algorithms 

      Tank, Ekta (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      Credit Card payment facilitating people to pay for goods and service quickly. The credit payment is gaining popularity day by day because of its benefits. With the popularity of credit card payment, crime related to credit ...
    • Cross-Platform Data Deduplication and Ownership over Encrypted Data 

      Tarkunde, Dipak (2021)
      Data deduplication is the most important data compression technique used in the cloud domain. With this technique, cloud service providers can utilize their storage space efficiently to store large amounts of data. There ...
    • Deduplication On Cloud Storage 

      Gosai, Bhautik (2021)
      Day by day people are moving towards cloud storage for ease of accessibility, availability, security etc. Data Deduplication helps cloud storage to utilize storage space efficiently. Deduplication process is easy when data ...
    • Design and Analysis of Privacy Models against Background Knowledge in Privacy - Preserving Data Publishing 

      Desai, Nidhi Nitin (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      "Humongous amount of data gets collected by various online applications like social networks, cellular technologies, the healthcare sector, location - based services, and many more. The collected data can be accessed by ...
    • Design and analysis of schemes for privacy preserving cloud storage services 

      Chaudhari, Payal (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Public cloud storage services have become the leading choice for individuals and organizations to store their data, as the service provides the benefits of availability and reliability together at a reduced cost. While ...
    • Image authentication using genetic algorithm 

      Londhey, Arjun (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      With a widespread deployment of digital images, there is need to authenticatesuch images for their originality and integrity.The main objective of the work is todesign an authentication scheme that allows two parties to ...
    • Medical image security with cheater identification using secret sharing scheme 

      Krishnan, Arun (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      The progress in the field of information and communication technology has brought about quick and efficient transfer of textual as well as multimedia data . However, the growth of technology has also provided new ways ...
    • On insider attack in distributed file systems 

      Solani, Riddhi (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Due to heavy use of internet, mobiles, sensors etc. Data is growing rapidly day-by-day. However traditional database systems fail to store such a huge semi structured or unstructured data which raises the need for distributed ...
    • On Minimality Attack in Privacy Preserving Data Publishing 

      Hemantha, K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Data Publishing has become much concern in recent yerars for protecting the individual privacy. Information about the individuals is collected from various domain and is being published public. We can extract lot of wealth ...
    • Privacy and accountability in cloud computation and storage 

      Gajera, Hardik (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      Cloud computing is a cost-effective computing paradigm for convenient, ondemand data access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services. While providing ...
    • Privacy preservation in vehicular ad-hoc networks (VANETs) 

      Garg, Garima (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Vehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other ...
    • Privacy Preserving Identity Verification and Verifiable Computation For HealthCare System 

      Naik, Shruti Rajendrakumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Paper based medical consulting system has been replaced by electronic health monitoring system due to features like low cost, on demand global accessibility, reliability, accuracy and mobility. Generally, mobile healthcare ...
    • Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications 

      Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ...
    • Private targeted advertising using homomorphic encryption 

      Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ...
    • Secure and efficient dealing with node capture attack in wireless sensor networks 

      Agrawal, Sarita (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Wireless Sensor Networks (WSN) have found enormous applications in various areas of day-to-day life such as in health-care, battle-field surveillance and disaster management. The communication amongst the sensor nodes ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Secure SQL with access control for database as a service model 

      Dave, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Rapid growth of internet and networking technology emerges "Software as a service model". In this model, application service providers (ASP) provides each functionality of software over internet. ASP provides access of ...
    • Security and Privacy concerns in Voice Assistants Devices 

      Trivedi, Revant (2021)
      Voice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing ...
    • Security of remote car locking system against eavesdropping 

      Patel, Jinita (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Vehicle industry is growing rapidly. To sustain in the market manufacturer uses various technology in vehicles. In today's world users need more comfort in addition to efficiency of vehicles. With the advancement in the ...