CFP last date
20 January 2025
Reseach Article

Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication

by S.L. Swapna, V. Saravanan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 32
Year of Publication: 2023
Authors: S.L. Swapna, V. Saravanan
10.5120/ijca2023923078

S.L. Swapna, V. Saravanan . Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication. International Journal of Computer Applications. 185, 32 ( Aug 2023), 1-8. DOI=10.5120/ijca2023923078

@article{ 10.5120/ijca2023923078,
author = { S.L. Swapna, V. Saravanan },
title = { Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 32 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number32/32897-2023923078/ },
doi = { 10.5120/ijca2023923078 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:37.131003+05:30
%A S.L. Swapna
%A V. Saravanan
%T Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 32
%P 1-8
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The application of big data analytics and related technologies like the Internet of Things (IoT) facilitates user intentions and behaviours as well as operational decision-making. Security is the major concern in the application of big data analytics to protect the system and secure the information as well as the data being handled. Conventional security techniques have become inefficient in terms of processing and identifying network threats in a reasonable amount of time. To deal with this problem, a unique Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier based Secured Data Communication (CSDECGBAC-SDC) model with improved accuracy and lower time complexity is introduced. The CSDECGBAC-SDC model's core functions for enhancing security include user registration, data collection, and data communication. During the registration process, the user's information is initially registered. Following that, the CSDECGBAC-SDC model collects data from the enrolled user. The Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier is used in the CSDECGBAC-SDC Model to accomplish user authentication for anyone who want to access the data. For detecting the authorized user, the ensemble technique uses a group of weak learners as a Tversky Indexive Chi-square automatic interaction detection decision tree. The weak learner results are combined. Finally, cardinal voting is applied to find the majority vote in data classification by using the gradient ascent function.  This in turn helps to improve secured data communication. Experimental evaluation is carried out on factors such as classification accuracy, error rate, and classification time with respect to a number of users. The results indicate that the CSDECGBAC-SDC model effectively improves the classification accuracy with minimum error rate and classification time than the conventional approaches.

References
  1. S L, Swapna., V Saravanan. Survival Analysis on Secured Data Communication in Cloud. International Journal of Computer Applications. 2022. https://doi.org/10.5120/ijca2022921864
  2. Hui, Xie., Zhengyuan., Zhang., Qi, Zhang., Shengjun, Wei., Changzhen, Hu.: HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments. Computer Communications (2021). https://doi.org/10.1016/j.comcom.2021.03.018
  3. Ahmed Yaser, Fahad, Alsahlani., Alexandru, Popa.: LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. Journal of Network and Computer Applications (2021). https://doi.org/10.1016/j.jnca.2021.103177
  4. Mohamed Ahzam, Amanullah., Riyaz Ahamed, Ariyaluran, Habeeb., Fariza, Hanum, Nasaruddin., Abdullah, Gani., Ejaz, Ahmed., Abdul, Salam, Mohamed, Nainar., Nazi,hah, Md, Akim., Muhammad, Imran.: Deep learning and big data technologies for IoT security. Computer Communications (2020). https://doi.org/10.1016/j.comcom.2020.01.016
  5. David, G. Rosado., Julio., Moreno., Luis, E. S´anchez., Antonio, Santos-Olmo., Manuel, A. Serrano., Eduardo, Fern´andez-Medina.: MARISMA-BiDa Pattern: Integrated Risk Analysis for Big Data. Computers & Security (2021). https://doi.org/10.1016/j.cose.2020.102155
  6. Wuchao, Liang., Wenning, Li., Lili, Feng.: Information Security Monitoring and Management Method Based on Big Data in the Internet of Things Environment. IEEE Access (2021). https://doi.org/10.1109/ACCESS.2021.3064350
  7. Imane, El Alaoui., Youssef, Gahi.: Network Security Strategies in Big Data Context. Procedia Computer Science (2020). https://doi.org/10.1016/j.procs.2020.07.108
  8. Uma, Narayanan., Varghese. Paul., Shelbi, Joseph.: A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University - Computer and Information Sciences (2020). https://doi.org/10.1016/j.jksuci.2020.05.005
  9. Abdul, Razaque., Nazerke, Shaldanbayeva., Bandar, Alotaibi, Munif, Alotaibi., Akhmetov. Murat., Aziz, Alotaibi.: Big Data Handling Approach for Unauthorized Cloud Computing Access. Electronics (2022). https://doi.org/10.3390/electronics11010137
  10. Rohit, Sharma., Rajeev, Arya.: Secure transmission technique for data in IoT edge computing infrastructure. Complex & Intelligent Systems (2021). https://doi.org/10.1007/s40747-021-00576-7
  11. Dongfeng, Fang., Yi, Qian., Ro, Qingyang, Hu.: A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications. IEEE Internet of Things Journal (2020). https://doi.org/10.1109/JIOT.2020.2970974
  12. Deebak, B.D., Fadi, Al-Turjman.: Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. Future Generation Computer Systems (2021). https://doi.org/10.1016/j.future.2020.11.010
  13. Qingyang, Zhang., Hong, Zhong., Weisong, Shi., Lu, Liu.: A trusted and collaborative framework for deep learning in IoT. Computer Networks (2021). https://doi.org/10.1016/j.comnet.2021.108055
  14. Mohammad, Wazid., Ashok Kumar, Das., Vivekananda, Bhat, K., Athanasios, V. Vasila.: LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. Journal of Network and Computer Applications (2020). https://doi.org/10.1016/j.jnca.2019.102496
  15. Seunghwan, Son., Yohan, Park., Youngho Park.: A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments. Sustainability (2021). https://doi.org/10.3390/su13169241
  16. Manasha, Saqib., Bhat, Jasra., Ayaz Hassan, Moon.: A Lightweight Three Factor Authentication Framework for IoT Based Critical Applications. Journal of King Saud University - Computer and Information Sciences (2021). https://doi.org/10.1016/j.jksuci.2021.07.023
  17. Hesham, A. El Zouka., Mustafa, M. Hosni.: Secure IoT Communications for Smart Healthcare Monitoring System. Internet of Things (2021). https://doi.org/10.1016/j.iot.2019.01.003
  18. Ashish, Singh., Kakali, Chatterjee.: Securing smart healthcare system with edge computing. Computers & Security (2021). https://doi.org/10.1016/j.cose.2021.102353
  19. Mustafa, A. Al Sibahee., Songfeng, Lu., Zaid Ameen, Abduljabbar., Xin, Liu., Hemn Barzan, Abdalla., Mohammed Abdulridha, Hussain., Zaid Alaa, Hussien., Mudhafar, Jalil Jassim Ghrabat.: Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System. IEEE Access (2020). https://doi.org/10.1109/ACCESS.2020.3041809
  20. Sheeba Rani, S., Jafar, A. Alzubi., Lakshmanaprabu, S. K., Deepak, Gupta., Ramachandran, Manikandan.: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimedia Tools and Applications (2020). https://doi.org/10.1007/s11042-019-07760-5
  21. Pampapathi, B. M., Nageswara, Guptha, M., Hema, M. S.: Data distribution and secure data transmission using IANFIS and MECC in IoT. Journal of Ambient Intelligence and Humanized Computing (2022). https://doi.org/10.1007/s12652-020-02792-4
  22. R John, Martin. IoMT Supported COVID Care – Technologies and Challenges. International Journal of Engineering and Management Research, (2022). DOI: 10.31033/ijemr.12.1.16
Index Terms

Computer Science
Information Sciences

Keywords

Secured Big data Communication Tversky Indexive Chi-Square Automatic Interaction Detection Ensembled Cardinal Gradient Bootstrap Aggregating Classifier Cardinal Voting Gradient Ascent Function