scispace - formally typeset
Search or ask a question
Author

V Alekhya

Bio: V Alekhya is an academic researcher from K L University. The author has contributed to research in topics: Password & Zero-knowledge password proof. The author has an hindex of 1, co-authored 1 publications receiving 5 citations.

Papers
More filters
Journal Article
TL;DR: A new framework i.e., Password Authentication System for Cloud Environment (PASCE), which is immune to the common attacks suffered by other verification schemes is introduced.
Abstract: Verification is the major part of protection against compromising secrecy and authenticity. Though long-established login/password based schemes are easy to implement in the cloud environment, they have been subjected to numerous attacks. As a substitute, token and biometric based verification systems were introduced for security. However, they have not enhanced significantly to justify the expenditure. For providing more security-in this paper, we introduce a new framework i.e., Password Authentication System for Cloud Environment (PASCE), which is immune to the common attacks suffered by other verification schemes.

5 citations

Proceedings ArticleDOI
16 Oct 2022
TL;DR: In this paper , the Discrete Wavelet Transform (DWT) is proposed as an effective signal processing technique for estimating harmonics in the low voltage grid connected to EV charging stations.
Abstract: The advancement of power semiconductor switching devices has opened the road for the widespread usage of nonlinear power electronics loads in businesses and residences. Large converter-based devices, such as electric automobiles, have increased harmonic and supra-harmonic emissions in low-voltage networks, potentially damaging customer equipment and the grid. In the discipline of harmonic analysis, a precise assessment of harmonics is a must. The Discrete Wavelet Transform (DWT) is proposed in this study as an effective signal processing technique for estimating harmonics in the low voltage grid connected to EV charging stations. Simulated voltage and current signals from single and multiple EV chargers are used to test the suggested approach. The findings of this study will be vital in explaining how electric vehicles will affect the low-voltage grid.
TL;DR: From the proposed research and references, Facebook's Prophet algorithm is determined as the forecasting algorithm because it is predicting at better accuracy, low error rate, handles messy data, doesn’t bother for null values and better fitting.
Abstract: Forecasting can be used in many fields such as crypto currency prediction, financial entities, supermarkets etc. We get the time series date which we use to feed the data into the algorithm is given by Y finance with this we get refreshed data every day. The stock market prediction or forecasting helps customers and brokers get a brief view of how the market behaves for the coming years. Many models are currently in use Like Regression techniques, Long Short-Term Memory algorithm etc. FB Prophet is proven to perform better than most other Algorithms with better accuracy. From the proposed research and references we have determined Facebook's Prophet algorithm as our forecasting algorithm because it is predicting at better accuracy, low error rate, handles messy data, doesn’t bother for null values and better fitting.

Cited by
More filters
Book ChapterDOI
18 Dec 2013
TL;DR: The research findings indicated that the midyear mark can be considered as a factor which correctly predicts the Computer Science I final year marks and can be used practically in the school of Computer Science to identify students at risk of failing.
Abstract: A major concern for higher education institutions is the high failure and drop-out rates amongst students, especially first year students. Tertiary institutions thus have a common interest in identifying students at risk of failing or dropping out. Previous research studies have identified factors that influence success/failure which include, but are not limited to, the students' personal information, academic background and social environment. This study aims to use the emerging field of Educational Data Mining as a preventative measure rather than reiterate factors that influence success. The first year student data collected and stored in the School of Computer Science at the University of the Witwatersrand has been utilised in this study. The study used the students' first semester/midyear mark to predict success/failure at the end of the academic year. This will assist in identifying students at risk of failing and could assist with early intervention. A modified version of the CRISP-DM methodology was used. The investigation was broken down into two phases: training and test phase. In the training phase, student data from the years 2009 to 2011 were modelled using the WEKA Explorer GUI. Three classifiers: J48 classifier, Naive Bayes and Decision Table, were used for modelling and were also compared. Using both the run information from WEKA and performance metrics, the J48 classifier was shown to be the better performing algorithm in the training phase. This algorithm was then integrated into the back-end of the Success Or Failure Determiner (SOFD) tool, which was created specifically for this study. In the test phase 92% of the instances were predicted correctly. Furthermore 23 of the 25 students who failed were flagged. The research findings indicated that the midyear mark can be considered as a factor which correctly predicts the Computer Science I final year marks. After further investigation with larger sample sizes, the tool can be used practically in the school of Computer Science to identify students at risk of failing.

14 citations

Journal ArticleDOI
TL;DR: Encrypted message is sent by a sender to a receiver such that only the receiver’s identity is known by the sender and no other information regarding the data to be accessed and performance of the system in the cloud environment is analyzed.
Abstract: When concerned about cloud the security has to be the major factor considered by providers of service. Double encryption is a tool used by the storage server to transfer data by the sender and enhancing the security. The first key performs the identification of the receiver or public key at sender side to generate first-level cipher-text. The other key is stored in the security device issued by SDI (security device issuer) shared with cloud storage systems to originate second-level cipher-text. In the proposed scheme, a file in the cloud is uploaded by the sender and encrypts using the public key, and stores it in the cloud. File in the cloud is visible to the people. Only after the execution of two-step process receiver will be able to access the file. When the user has logged into the application by scanning the QR code in the cloud, the data is sent to the mobile application. As the user passes these step, the shared document is decrypted using a key generated by key generator and user can download the shared file. For each step utmost three attempts are provided, the user will be locked if the user is unable to login during these attempts. A notification facility which enables the user to notify an alert message through e-mail to the concerned user if they exceed more than two attempts or any intruder is trying to access the file is provided. Performance of the system in the cloud environment is analyzed. We present that, encrypted message is sent by a sender to a receiver such that only the receiver’s identity is known by the sender and no other information regarding the data to be accessed. To decrypt the cipher text receiver should perform two-steps. User’s secret key is in the computer and personal security device is connected to it. It is tedious to handle with decrypting the cipher text without either of the above two. This device is revoked In case the security of device is breached. It is not possible to decrypt the cipher text by cloud server.

8 citations

Journal ArticleDOI
TL;DR: This paper proposes an efficient and secure scheme to non- interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity, and avoids using low entropy passwords or biometric mechanisms, instead, it employs pseudonym systems.
Abstract: In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system - under court order - must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non- interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.

3 citations

07 Mar 2015
TL;DR: The proposed scheme is provided with additional security and also its resistance against attacks, built based on ElGamal encryption scheme and Diffie-Hellman Key Exchange algorithm in the two-server password based authentication and key exchange protocol.
Abstract: In real time applications, more number of servers and data centers are needed for fast processing in the required time and to provide high level of security in communication due to rapid growth of data. Password Authenticated Key Exchange (PAKE) protocol is used to verify the authentication of the communicating parties and then secret key is generated based on their passwords. Mostly in single server environment the users share a password with a trusted single server. If the single server is compromised, then the environment is prone to many attacks such as online dictionary attacks, server spoofing attack and stolen verification attacks. The proposed system is built based on ElGamal encryption scheme and Diffie-Hellman Key Exchange algorithm in the two-server password based authentication and key exchange protocol. Discrete logarithm in f*p is used in ElGamal encryption to provide additional security. Discrete logarithm problem would render the ElGamal cryptosystem, secure against the man in the middle attack and other cryptographic attacks. The proposed scheme is provided with additional security and also its resistance against attacks.
Journal ArticleDOI
TL;DR: This paper presents an extensive survey of various Password Authenticated Key Exchange protocols available in the literature to eliminate the drawbacks in the current authentication procedure of cloud computing environment.
Abstract: Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security and confidentiality. Adopting a cloud computing paradigm may have positive as well as negative effects on authenticating a user and exchanging the data. This paper presents an extensive survey of various Password Authenticated Key Exchange (PAKE) protocols available in the literature to eliminate the drawbacks in the current authentication procedure of cloud computing environment.