A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques

In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot be published without privacy. It is henceforth crucial to maintain an equilibrium between the utility and privacy of data. In this paper, a no...

Full description

Saved in:
Bibliographic Details
Published inScientific programming Vol. 2021; pp. 1 - 9
Main Authors Gobinathan, B., Mukunthan, M. A., Surendran, S., Somasundaram, K., Moeed, Syed Abdul, Niranjan, P., Gouthami, V., Ashmitha, G., Mohammad, Gouse Baig, Shanmuganathan, V. K., Natarajan, Yuvaraj, Srihari, K., Sundramurthy, Venkatesa Prabhu
Format Journal Article
LanguageEnglish
Published New York Hindawi 28.12.2021
John Wiley & Sons, Inc
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot be published without privacy. It is henceforth crucial to maintain an equilibrium between the utility and privacy of data. In this paper, a novel technique on trade-off between the utility and privacy is developed, where the former is developed with a metaheuristic algorithm and the latter is developed using a cryptographic model. The utility is carried out with the process of clustering, and the privacy model encrypts and decrypts the model. At first, the input datasets are clustered, and after clustering, the privacy of data is maintained. The simulation is conducted on the manufacturing datasets over various existing models. The results show that the proposed model shows improved clustering accuracy and data privacy than the existing models. The evaluation with the proposed model shows a trade-off privacy preservation and utility clustering in smart manufacturing datasets.
AbstractList In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot be published without privacy. It is henceforth crucial to maintain an equilibrium between the utility and privacy of data. In this paper, a novel technique on trade-off between the utility and privacy is developed, where the former is developed with a metaheuristic algorithm and the latter is developed using a cryptographic model. The utility is carried out with the process of clustering, and the privacy model encrypts and decrypts the model. At first, the input datasets are clustered, and after clustering, the privacy of data is maintained. The simulation is conducted on the manufacturing datasets over various existing models. The results show that the proposed model shows improved clustering accuracy and data privacy than the existing models. The evaluation with the proposed model shows a trade-off privacy preservation and utility clustering in smart manufacturing datasets.
Author Sundramurthy, Venkatesa Prabhu
Surendran, S.
Niranjan, P.
Mukunthan, M. A.
Somasundaram, K.
Gobinathan, B.
Ashmitha, G.
Moeed, Syed Abdul
Srihari, K.
Natarajan, Yuvaraj
Mohammad, Gouse Baig
Shanmuganathan, V. K.
Gouthami, V.
Author_xml – sequence: 1
  givenname: B.
  orcidid: 0000-0002-0829-5582
  surname: Gobinathan
  fullname: Gobinathan, B.
  organization: Department of Computer Science and EngineeringJaya Sakthi Engineering CollegeChennai 602 024Tamil NaduIndia
– sequence: 2
  givenname: M. A.
  surname: Mukunthan
  fullname: Mukunthan, M. A.
  organization: Department of Computer Science and EngineeringVel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and TechnologyAvadiChennai 600 062TamilnaduIndia
– sequence: 3
  givenname: S.
  surname: Surendran
  fullname: Surendran, S.
  organization: Department of Computer Science and EngineeringTagore Engineering CollegeChennai 600127TamilNaduIndiatagoreengg.edu.in
– sequence: 4
  givenname: K.
  surname: Somasundaram
  fullname: Somasundaram, K.
  organization: Department of Information TechnologySaveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennaiTamilnaduIndiasaveetha.com
– sequence: 5
  givenname: Syed Abdul
  surname: Moeed
  fullname: Moeed, Syed Abdul
  organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org
– sequence: 6
  givenname: P.
  surname: Niranjan
  fullname: Niranjan, P.
  organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org
– sequence: 7
  givenname: V.
  surname: Gouthami
  fullname: Gouthami, V.
  organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org
– sequence: 8
  givenname: G.
  surname: Ashmitha
  fullname: Ashmitha, G.
  organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org
– sequence: 9
  givenname: Gouse Baig
  surname: Mohammad
  fullname: Mohammad, Gouse Baig
  organization: Department of Computer Science and EngineeringVardhaman College of EngineeringHyderabadIndia
– sequence: 10
  givenname: V. K.
  surname: Shanmuganathan
  fullname: Shanmuganathan, V. K.
  organization: Dept of Mechanical EngineeringJ.N.N. Institute of EngineeringChennaiIndia
– sequence: 11
  givenname: Yuvaraj
  surname: Natarajan
  fullname: Natarajan, Yuvaraj
  organization: ICT AcademyChennaiIndia
– sequence: 12
  givenname: K.
  surname: Srihari
  fullname: Srihari, K.
  organization: Department of CseSnsctCoimbatoreIndia
– sequence: 13
  givenname: Venkatesa Prabhu
  orcidid: 0000-0003-1101-6051
  surname: Sundramurthy
  fullname: Sundramurthy, Venkatesa Prabhu
  organization: 0Department of Chemical EngineeringAddis Ababa Science and Technology UniversityEthiopiaaastu.edu.et
BookMark eNp9kEtLAzEUhYNUsK3u_AEBlzo2j3kuS_FRqAq2BXdDJpN0UqbJmGRa5t87pV0Jurp38Z1zOGcEBtpoAcAtRo8YR9GEIIInNMYYp-QCDHGaREGGs69B_6MoDTIShldg5NwWIZxihIZAT-G72YsavglfmRJ6A5em3gv4KVgNV2on4FLw1irfwblzrXBQ6R6R_sCsgHNdts7bDq6d0hs4LfdMc1HCme0abzaWNZXicCV4pdV3L74Gl5LVTtyc7xisn59Ws9dg8fEyn00XAac08UEhCoSpjGlSplmRRCwNecz6jpJzjrJEZmUaIxQXNM4KFBZYSkIiSYqCyjLBiI7B3cm3seaY6_Otaa3uI3MS99UJTmnWUw8nilvjnBUyb6zaMdvlGOXHRfPjovl50R4nv3CuPPPKaG-Zqv8S3Z9EldIlO6j_I34AcBSHmQ
CitedBy_id crossref_primary_10_1155_2022_2250275
crossref_primary_10_1155_2022_4486756
crossref_primary_10_1155_2022_8335255
crossref_primary_10_1155_2022_4048197
crossref_primary_10_1155_2022_4921153
crossref_primary_10_1155_2022_3437364
crossref_primary_10_46632_jemm_8_1_4
crossref_primary_10_1007_s42835_023_01777_5
crossref_primary_10_1155_2022_1541938
crossref_primary_10_1155_2022_4086213
crossref_primary_10_1155_2022_8356081
crossref_primary_10_1155_2022_6980335
crossref_primary_10_1155_2022_3770871
crossref_primary_10_1155_2023_6709109
crossref_primary_10_1155_2022_2845755
crossref_primary_10_1155_2022_3357508
crossref_primary_10_1155_2022_6138490
Cites_doi 10.1016/j.pisc.2015.11.013
10.1016/j.jbi.2014.04.002
10.1016/j.future.2018.07.018
10.1109/tkde.2015.2435777
10.1016/j.adhoc.2018.05.009
10.1016/j.tcs.2020.02.004
10.1016/j.eswa.2009.12.038
10.1016/j.ijhcs.2018.04.003
10.1016/j.procs.2012.09.050
10.1016/j.eswa.2014.08.037
10.1016/j.jnca.2013.03.010
10.1016/j.jnca.2014.07.022
10.1016/j.inffus.2018.02.008
10.1109/tpds.2009.26
10.1186/s12911-016-0293-4
10.1016/j.procs.2013.09.295
10.1142/s0218488502001648
10.1016/j.jksuci.2018.03.014
10.1016/j.engappai.2016.07.003
10.1007/11839088_31
10.1016/j.jup.2020.101106
10.1016/j.cels.2020.03.006
ContentType Journal Article
Copyright Copyright © 2021 B. Gobinathan et al.
Copyright © 2021 B. Gobinathan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2021 B. Gobinathan et al.
– notice: Copyright © 2021 B. Gobinathan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2021/3611182
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1875-919X
Editor Pallikonda Rajasekaran, M.
Editor_xml – sequence: 1
  givenname: M.
  surname: Pallikonda Rajasekaran
  fullname: Pallikonda Rajasekaran, M.
EndPage 9
ExternalDocumentID 10_1155_2021_3611182
GroupedDBID .4S
.DC
0R~
4.4
5VS
AAFWJ
AAJEY
ABDBF
ABJNI
ACGFS
ADBBV
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
ASPBG
AVWKF
BCNDV
DU5
EAD
EAP
EBS
EDO
EMK
EPL
EST
ESX
GROUPED_DOAJ
HZ~
I-F
IAO
IHR
IOS
KQ8
MIO
MK~
ML~
MV1
NGNOM
O9-
OK1
RHU
RHW
RHX
TUS
24P
AAYXX
ACCMX
CITATION
H13
7SC
7SP
8FD
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c337t-beb013f637d89b75a84c6a115fccc097f9d86006b369b04b1ff225f2bb3fd7103
IEDL.DBID RHX
ISSN 1058-9244
IngestDate Fri Jul 25 09:29:08 EDT 2025
Tue Jul 01 02:50:08 EDT 2025
Thu Apr 24 22:58:21 EDT 2025
Sun Jun 02 19:18:03 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c337t-beb013f637d89b75a84c6a115fccc097f9d86006b369b04b1ff225f2bb3fd7103
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-1101-6051
0000-0002-0829-5582
OpenAccessLink https://dx.doi.org/10.1155/2021/3611182
PQID 2618121839
PQPubID 2046410
PageCount 9
ParticipantIDs proquest_journals_2618121839
crossref_primary_10_1155_2021_3611182
crossref_citationtrail_10_1155_2021_3611182
hindawi_primary_10_1155_2021_3611182
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-12-28
PublicationDateYYYYMMDD 2021-12-28
PublicationDate_xml – month: 12
  year: 2021
  text: 2021-12-28
  day: 28
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Scientific programming
PublicationYear 2021
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 23
24
25
26
(22) 2015
R. C. W. Wong (5)
10
11
12
13
14
15
16
17
18
19
T. Asikis (8) 2017
(21) 2015
1
2
3
4
6
7
9
20
References_xml – start-page: 543
  ident: 5
  article-title: Minimality attack in privacy preserving data publishing
– ident: 12
  doi: 10.1016/j.pisc.2015.11.013
– ident: 15
  doi: 10.1016/j.jbi.2014.04.002
– ident: 26
  doi: 10.1016/j.future.2018.07.018
– ident: 3
  doi: 10.1109/tkde.2015.2435777
– ident: 9
  doi: 10.1016/j.adhoc.2018.05.009
– ident: 23
  doi: 10.1016/j.tcs.2020.02.004
– ident: 17
  doi: 10.1016/j.eswa.2009.12.038
– ident: 10
  doi: 10.1016/j.ijhcs.2018.04.003
– ident: 4
  doi: 10.1016/j.procs.2012.09.050
– year: 2015
  ident: 21
  article-title: Smart Energy data: aachen/Cologne smart factory
– ident: 14
  doi: 10.1016/j.eswa.2014.08.037
– ident: 19
  doi: 10.1016/j.jnca.2013.03.010
– ident: 7
  doi: 10.1016/j.jnca.2014.07.022
– ident: 18
  doi: 10.1016/j.inffus.2018.02.008
– year: 2015
  ident: 22
  article-title: Power system datasets and gas pipeline datasets
– ident: 6
  doi: 10.1109/tpds.2009.26
– ident: 2
  doi: 10.1186/s12911-016-0293-4
– ident: 16
  doi: 10.1016/j.procs.2013.09.295
– ident: 1
  doi: 10.1142/s0218488502001648
– ident: 11
  doi: 10.1016/j.jksuci.2018.03.014
– ident: 13
  doi: 10.1016/j.engappai.2016.07.003
– ident: 20
  doi: 10.1007/11839088_31
– year: 2017
  ident: 8
  article-title: Optimization of privacy-utility trade-offs under informational self-determination
– ident: 24
  doi: 10.1016/j.jup.2020.101106
– ident: 25
  doi: 10.1016/j.cels.2020.03.006
SSID ssj0018100
Score 2.5011103
Snippet In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot...
SourceID proquest
crossref
hindawi
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Assaults
Clustering
Cryptography
Data integrity
Data mining
Datasets
Heuristic methods
Manufacturing
Privacy
Tradeoffs
Title A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques
URI https://dx.doi.org/10.1155/2021/3611182
https://www.proquest.com/docview/2618121839
Volume 2021
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na8JAEF2qUOil36W2VuZgTyU02WTzcRSpSEEpVcFbyG52qSBRNFX8951NNkIrpT0GJjnM7Oy8yey-R0ibskRT3jkWTQLb8rwE98GECSsJUhpJHihq6_vOg6Hfn3ivUzY1JEnrwxE-VjvdnjvPru9oKFwjNVxguinvT_fDgtCxS9IBhrmL5ao63_7j3W-V5_hDt7zb2cEWXNSV3jk5NYAQOmUEL8iRzC7JWSW2ACb3rkjWgeFiI-cwKDSfIV_AaDHfSHhHqAf6JgeMjBYdlJJ6MMvQROXbZCXBSHTsoDgjAB0z-ofuarfMS9rqmYBxxei6viaT3su427eMWIIlXDfILS71H03lu0EaRjxgSegJP0EnKCGEHQUqSkMENz53_YjbHneUwlRWlHNXpQgz3BtSzxaZvCUgEOMpjkDWTrF5U37EWCDTUDghp6mjaIM8VY6MhWES14IW87joKBiLtdtj4_YGedxbL0sGjV_s2iYmf5g1q4DFJt3WMbaBCFQ02Lv731fuyYl-1OdSaNgk9Xz1KR8QXeS8RWrUe2sVK-wLUnXGpQ
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Method+to+Solve+Real+Time+Security+Issues+in+Software+Industry+Using+Advanced+Cryptographic+Techniques&rft.jtitle=Scientific+programming&rft.au=Gobinathan%2C+B.&rft.au=Mukunthan%2C+M.+A.&rft.au=Surendran%2C+S.&rft.au=Somasundaram%2C+K.&rft.date=2021-12-28&rft.issn=1058-9244&rft.eissn=1875-919X&rft.volume=2021&rft.spage=1&rft.epage=9&rft_id=info:doi/10.1155%2F2021%2F3611182&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2021_3611182
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1058-9244&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1058-9244&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1058-9244&client=summon