A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques
In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot be published without privacy. It is henceforth crucial to maintain an equilibrium between the utility and privacy of data. In this paper, a no...
Saved in:
Published in | Scientific programming Vol. 2021; pp. 1 - 9 |
---|---|
Main Authors | , , , , , , , , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
Hindawi
28.12.2021
John Wiley & Sons, Inc |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot be published without privacy. It is henceforth crucial to maintain an equilibrium between the utility and privacy of data. In this paper, a novel technique on trade-off between the utility and privacy is developed, where the former is developed with a metaheuristic algorithm and the latter is developed using a cryptographic model. The utility is carried out with the process of clustering, and the privacy model encrypts and decrypts the model. At first, the input datasets are clustered, and after clustering, the privacy of data is maintained. The simulation is conducted on the manufacturing datasets over various existing models. The results show that the proposed model shows improved clustering accuracy and data privacy than the existing models. The evaluation with the proposed model shows a trade-off privacy preservation and utility clustering in smart manufacturing datasets. |
---|---|
AbstractList | In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot be published without privacy. It is henceforth crucial to maintain an equilibrium between the utility and privacy of data. In this paper, a novel technique on trade-off between the utility and privacy is developed, where the former is developed with a metaheuristic algorithm and the latter is developed using a cryptographic model. The utility is carried out with the process of clustering, and the privacy model encrypts and decrypts the model. At first, the input datasets are clustered, and after clustering, the privacy of data is maintained. The simulation is conducted on the manufacturing datasets over various existing models. The results show that the proposed model shows improved clustering accuracy and data privacy than the existing models. The evaluation with the proposed model shows a trade-off privacy preservation and utility clustering in smart manufacturing datasets. |
Author | Sundramurthy, Venkatesa Prabhu Surendran, S. Niranjan, P. Mukunthan, M. A. Somasundaram, K. Gobinathan, B. Ashmitha, G. Moeed, Syed Abdul Srihari, K. Natarajan, Yuvaraj Mohammad, Gouse Baig Shanmuganathan, V. K. Gouthami, V. |
Author_xml | – sequence: 1 givenname: B. orcidid: 0000-0002-0829-5582 surname: Gobinathan fullname: Gobinathan, B. organization: Department of Computer Science and EngineeringJaya Sakthi Engineering CollegeChennai 602 024Tamil NaduIndia – sequence: 2 givenname: M. A. surname: Mukunthan fullname: Mukunthan, M. A. organization: Department of Computer Science and EngineeringVel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and TechnologyAvadiChennai 600 062TamilnaduIndia – sequence: 3 givenname: S. surname: Surendran fullname: Surendran, S. organization: Department of Computer Science and EngineeringTagore Engineering CollegeChennai 600127TamilNaduIndiatagoreengg.edu.in – sequence: 4 givenname: K. surname: Somasundaram fullname: Somasundaram, K. organization: Department of Information TechnologySaveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennaiTamilnaduIndiasaveetha.com – sequence: 5 givenname: Syed Abdul surname: Moeed fullname: Moeed, Syed Abdul organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org – sequence: 6 givenname: P. surname: Niranjan fullname: Niranjan, P. organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org – sequence: 7 givenname: V. surname: Gouthami fullname: Gouthami, V. organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org – sequence: 8 givenname: G. surname: Ashmitha fullname: Ashmitha, G. organization: Department of CSEKakatiya Institute of Technology and ScienceWarangalTelanganaIndiakitswgl.org – sequence: 9 givenname: Gouse Baig surname: Mohammad fullname: Mohammad, Gouse Baig organization: Department of Computer Science and EngineeringVardhaman College of EngineeringHyderabadIndia – sequence: 10 givenname: V. K. surname: Shanmuganathan fullname: Shanmuganathan, V. K. organization: Dept of Mechanical EngineeringJ.N.N. Institute of EngineeringChennaiIndia – sequence: 11 givenname: Yuvaraj surname: Natarajan fullname: Natarajan, Yuvaraj organization: ICT AcademyChennaiIndia – sequence: 12 givenname: K. surname: Srihari fullname: Srihari, K. organization: Department of CseSnsctCoimbatoreIndia – sequence: 13 givenname: Venkatesa Prabhu orcidid: 0000-0003-1101-6051 surname: Sundramurthy fullname: Sundramurthy, Venkatesa Prabhu organization: 0Department of Chemical EngineeringAddis Ababa Science and Technology UniversityEthiopiaaastu.edu.et |
BookMark | eNp9kEtLAzEUhYNUsK3u_AEBlzo2j3kuS_FRqAq2BXdDJpN0UqbJmGRa5t87pV0Jurp38Z1zOGcEBtpoAcAtRo8YR9GEIIInNMYYp-QCDHGaREGGs69B_6MoDTIShldg5NwWIZxihIZAT-G72YsavglfmRJ6A5em3gv4KVgNV2on4FLw1irfwblzrXBQ6R6R_sCsgHNdts7bDq6d0hs4LfdMc1HCme0abzaWNZXicCV4pdV3L74Gl5LVTtyc7xisn59Ws9dg8fEyn00XAac08UEhCoSpjGlSplmRRCwNecz6jpJzjrJEZmUaIxQXNM4KFBZYSkIiSYqCyjLBiI7B3cm3seaY6_Otaa3uI3MS99UJTmnWUw8nilvjnBUyb6zaMdvlGOXHRfPjovl50R4nv3CuPPPKaG-Zqv8S3Z9EldIlO6j_I34AcBSHmQ |
CitedBy_id | crossref_primary_10_1155_2022_2250275 crossref_primary_10_1155_2022_4486756 crossref_primary_10_1155_2022_8335255 crossref_primary_10_1155_2022_4048197 crossref_primary_10_1155_2022_4921153 crossref_primary_10_1155_2022_3437364 crossref_primary_10_46632_jemm_8_1_4 crossref_primary_10_1007_s42835_023_01777_5 crossref_primary_10_1155_2022_1541938 crossref_primary_10_1155_2022_4086213 crossref_primary_10_1155_2022_8356081 crossref_primary_10_1155_2022_6980335 crossref_primary_10_1155_2022_3770871 crossref_primary_10_1155_2023_6709109 crossref_primary_10_1155_2022_2845755 crossref_primary_10_1155_2022_3357508 crossref_primary_10_1155_2022_6138490 |
Cites_doi | 10.1016/j.pisc.2015.11.013 10.1016/j.jbi.2014.04.002 10.1016/j.future.2018.07.018 10.1109/tkde.2015.2435777 10.1016/j.adhoc.2018.05.009 10.1016/j.tcs.2020.02.004 10.1016/j.eswa.2009.12.038 10.1016/j.ijhcs.2018.04.003 10.1016/j.procs.2012.09.050 10.1016/j.eswa.2014.08.037 10.1016/j.jnca.2013.03.010 10.1016/j.jnca.2014.07.022 10.1016/j.inffus.2018.02.008 10.1109/tpds.2009.26 10.1186/s12911-016-0293-4 10.1016/j.procs.2013.09.295 10.1142/s0218488502001648 10.1016/j.jksuci.2018.03.014 10.1016/j.engappai.2016.07.003 10.1007/11839088_31 10.1016/j.jup.2020.101106 10.1016/j.cels.2020.03.006 |
ContentType | Journal Article |
Copyright | Copyright © 2021 B. Gobinathan et al. Copyright © 2021 B. Gobinathan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
Copyright_xml | – notice: Copyright © 2021 B. Gobinathan et al. – notice: Copyright © 2021 B. Gobinathan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1155/2021/3611182 |
DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database CrossRef |
Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1875-919X |
Editor | Pallikonda Rajasekaran, M. |
Editor_xml | – sequence: 1 givenname: M. surname: Pallikonda Rajasekaran fullname: Pallikonda Rajasekaran, M. |
EndPage | 9 |
ExternalDocumentID | 10_1155_2021_3611182 |
GroupedDBID | .4S .DC 0R~ 4.4 5VS AAFWJ AAJEY ABDBF ABJNI ACGFS ADBBV AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS ASPBG AVWKF BCNDV DU5 EAD EAP EBS EDO EMK EPL EST ESX GROUPED_DOAJ HZ~ I-F IAO IHR IOS KQ8 MIO MK~ ML~ MV1 NGNOM O9- OK1 RHU RHW RHX TUS 24P AAYXX ACCMX CITATION H13 7SC 7SP 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c337t-beb013f637d89b75a84c6a115fccc097f9d86006b369b04b1ff225f2bb3fd7103 |
IEDL.DBID | RHX |
ISSN | 1058-9244 |
IngestDate | Fri Jul 25 09:29:08 EDT 2025 Tue Jul 01 02:50:08 EDT 2025 Thu Apr 24 22:58:21 EDT 2025 Sun Jun 02 19:18:03 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c337t-beb013f637d89b75a84c6a115fccc097f9d86006b369b04b1ff225f2bb3fd7103 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-1101-6051 0000-0002-0829-5582 |
OpenAccessLink | https://dx.doi.org/10.1155/2021/3611182 |
PQID | 2618121839 |
PQPubID | 2046410 |
PageCount | 9 |
ParticipantIDs | proquest_journals_2618121839 crossref_primary_10_1155_2021_3611182 crossref_citationtrail_10_1155_2021_3611182 hindawi_primary_10_1155_2021_3611182 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-12-28 |
PublicationDateYYYYMMDD | 2021-12-28 |
PublicationDate_xml | – month: 12 year: 2021 text: 2021-12-28 day: 28 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | Scientific programming |
PublicationYear | 2021 |
Publisher | Hindawi John Wiley & Sons, Inc |
Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
References | 23 24 25 26 (22) 2015 R. C. W. Wong (5) 10 11 12 13 14 15 16 17 18 19 T. Asikis (8) 2017 (21) 2015 1 2 3 4 6 7 9 20 |
References_xml | – start-page: 543 ident: 5 article-title: Minimality attack in privacy preserving data publishing – ident: 12 doi: 10.1016/j.pisc.2015.11.013 – ident: 15 doi: 10.1016/j.jbi.2014.04.002 – ident: 26 doi: 10.1016/j.future.2018.07.018 – ident: 3 doi: 10.1109/tkde.2015.2435777 – ident: 9 doi: 10.1016/j.adhoc.2018.05.009 – ident: 23 doi: 10.1016/j.tcs.2020.02.004 – ident: 17 doi: 10.1016/j.eswa.2009.12.038 – ident: 10 doi: 10.1016/j.ijhcs.2018.04.003 – ident: 4 doi: 10.1016/j.procs.2012.09.050 – year: 2015 ident: 21 article-title: Smart Energy data: aachen/Cologne smart factory – ident: 14 doi: 10.1016/j.eswa.2014.08.037 – ident: 19 doi: 10.1016/j.jnca.2013.03.010 – ident: 7 doi: 10.1016/j.jnca.2014.07.022 – ident: 18 doi: 10.1016/j.inffus.2018.02.008 – year: 2015 ident: 22 article-title: Power system datasets and gas pipeline datasets – ident: 6 doi: 10.1109/tpds.2009.26 – ident: 2 doi: 10.1186/s12911-016-0293-4 – ident: 16 doi: 10.1016/j.procs.2013.09.295 – ident: 1 doi: 10.1142/s0218488502001648 – ident: 11 doi: 10.1016/j.jksuci.2018.03.014 – ident: 13 doi: 10.1016/j.engappai.2016.07.003 – ident: 20 doi: 10.1007/11839088_31 – year: 2017 ident: 8 article-title: Optimization of privacy-utility trade-offs under informational self-determination – ident: 24 doi: 10.1016/j.jup.2020.101106 – ident: 25 doi: 10.1016/j.cels.2020.03.006 |
SSID | ssj0018100 |
Score | 2.5011103 |
Snippet | In recent times, the utility and privacy are trade-off factors with the performance of one factor tends to sacrifice the other. Therefore, the dataset cannot... |
SourceID | proquest crossref hindawi |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Assaults Clustering Cryptography Data integrity Data mining Datasets Heuristic methods Manufacturing Privacy Tradeoffs |
Title | A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques |
URI | https://dx.doi.org/10.1155/2021/3611182 https://www.proquest.com/docview/2618121839 |
Volume | 2021 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na8JAEF2qUOil36W2VuZgTyU02WTzcRSpSEEpVcFbyG52qSBRNFX8951NNkIrpT0GJjnM7Oy8yey-R0ibskRT3jkWTQLb8rwE98GECSsJUhpJHihq6_vOg6Hfn3ivUzY1JEnrwxE-VjvdnjvPru9oKFwjNVxguinvT_fDgtCxS9IBhrmL5ao63_7j3W-V5_hDt7zb2cEWXNSV3jk5NYAQOmUEL8iRzC7JWSW2ACb3rkjWgeFiI-cwKDSfIV_AaDHfSHhHqAf6JgeMjBYdlJJ6MMvQROXbZCXBSHTsoDgjAB0z-ofuarfMS9rqmYBxxei6viaT3su427eMWIIlXDfILS71H03lu0EaRjxgSegJP0EnKCGEHQUqSkMENz53_YjbHneUwlRWlHNXpQgz3BtSzxaZvCUgEOMpjkDWTrF5U37EWCDTUDghp6mjaIM8VY6MhWES14IW87joKBiLtdtj4_YGedxbL0sGjV_s2iYmf5g1q4DFJt3WMbaBCFQ02Lv731fuyYl-1OdSaNgk9Xz1KR8QXeS8RWrUe2sVK-wLUnXGpQ |
linkProvider | Hindawi Publishing |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Method+to+Solve+Real+Time+Security+Issues+in+Software+Industry+Using+Advanced+Cryptographic+Techniques&rft.jtitle=Scientific+programming&rft.au=Gobinathan%2C+B.&rft.au=Mukunthan%2C+M.+A.&rft.au=Surendran%2C+S.&rft.au=Somasundaram%2C+K.&rft.date=2021-12-28&rft.issn=1058-9244&rft.eissn=1875-919X&rft.volume=2021&rft.spage=1&rft.epage=9&rft_id=info:doi/10.1155%2F2021%2F3611182&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2021_3611182 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1058-9244&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1058-9244&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1058-9244&client=summon |