Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

An Improved K-Means Clustering Process Solicitation for Mine Blood Donors Information

Anil Audumbar Pise , Ganesh Shivaji Pise , Saurabh Singh , Hemachandran K. , Jude Imuede , Sandip Shinde

The exponential rise in accidents and the introduction of new, supposedly trendy ways of living have contributed to the dire need for the needy to have an organ or blood transfusion. Circumstances refer to a circumstance where proper care should be taken when collecting the necessary blood or original parts for transfusion, typically in dire circumstances. To determine the distance at which the interested and qualified donors are located, a thorough investigation must be conducted. People are often first categorized according to their blood type, eligibility, and region. Following that, people group together according to locality. A healthy person can safely donate blood twice within 56 days, as this is the minimal time between successful donations that has been established as a norm. The decision to donate an organ is often made after careful consideration of the severity of the situation, the donor's health, and the health of the recipient. Knowledge data finding tasks can be made easier with the help of KEEL, an open-source programme. The graphs that are produced show clearly how the proposed algorithm varies from the standard K-means method. Therefore, it will be quite useful in the present day and could end up saving lots of lives. The necessity to decide ahead of time on the total number of groups is just one of the issues with the K-means clustering method. In practise, it is difficult to anticipate the precise number of clusters. When the number of clusters is small, incongruous clustering is more common, but when the number of clusters is large, like clustering is more common. Thanks to a method called Active Cluster with Modified k-means clustering, which finds the right number of clusters on the fly, the issue is now resolved.

Read More

Doi: https://doi.org/10.54216/JCIM.130101

Vol. 13 Issue. 1 PP. 08-16, (2024)

Securing the Future of Digital Marketing through Advanced Cybersecurity Approaches and Consumer Data Protection Privacy and Regulatory Compliance

L. Bhagyalakshmi

  The SecureDigitalGuard framework gets recognition for its all-encompassing strategy, which combines strict consumer data protection laws with state-of-the-art security safeguards with ease. This all-encompassing approach is designed to guarantee the longevity of digital marketing in the face of constantly changing cyberthreats. This cutting-edge system is based on three key strategies: the Behavioural Threat Detection (BTD) algorithm, the Adaptive Access Control (AAC) algorithm, and the Homomorphic Privacy Guard (HPG) programme. The vital task of dynamically controlling user access levels in response to continuing risk evaluations is taken on by the AAC algorithm. This dynamic control technique improves the framework's capacity to adjust to constantly shifting security circumstances. However, the BTD algorithm is proactive in spotting abnormalities in user behaviour, allowing for quick reactions to any dangers. The SecureDigitalGuard architecture gains an additional degree of protection from this preventive method. In addition, the HPG programme is responsible for doing analytics while maintaining user privacy. This careful approach shows a dedication to finding a fine balance between user protection and data analysis, making sure the framework complies with the strictest privacy regulations. Test results provide empirical evidence that SecureDigitalGuard is effective and that it can keep up with the dynamic and often changing nature of cyber threats. As a result, the architecture makes traditional cybersecurity techniques outdated. In an increasingly complex and dynamic cybersecurity world, SecureDigitalGuard provides a strong solution for protecting digital marketing through the seamless integration of state-of-the-art technology and strict adherence to privacy regulations.

Read More

Doi: https://doi.org/10.54216/JCIM.130102

Vol. 13 Issue. 1 PP. 17-27, (2024)

A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms

Vandana Roy

  In recent years, smart computing has emerged as a promising and rapidly expanding field of technology. It senses the environment in real time and gives powerful analytics to perform intelligent decisions. Creating a scheduling algorithm based on priorities in order to decrease IoT process latency was the primary emphasis of the study challenge. The constraints of existing scheduling algorithms were investigated in order to build a scheduling algorithm that is based on priorities. We provide a context-based priority scheduling method to get around these restrictions. In order to determine which steps of the IoT process were crucial, we developed context attributes. Once the criticality has been identified, the proposed scheduling technique is used to schedule the IoT processes. The outcomes of the algorithms were confirmed using a variety of evaluation indicators. As demonstrated by the experimental results, the suggested scheduling algorithms outperformed the state-of-the-art techniques. Smart ATM uses a Case Study technique to analyse the algorithm. We identified the sensors that are part of the ATM and the settings in which they are relevant. We determined the priority value for each sensor. The processes are subsequently categorized according to their priority values. Then, a priority-based FCFS scheduling algorithm is used, and its performance is assessed using metrics like Average TAT, Cost, Energy, and the High critical process TAT ratio.

Read More

Doi: https://doi.org/10.54216/JCIM.130103

Vol. 13 Issue. 1 PP. 28-35, (2024)

Pioneering Security: A Hybrid Logic Framework for the Future of IoT Protection

Rajeev Shrivastava

In a complicated situation, the Internet of Things simplifies the process of connecting a wide range of things. Because of its openness and lack of human control, the Internet of Things is open to assaults like denial of service (DoS) and man-in-the-middle attacks. Furthermore, any device that can connect to the internet may be hacked. These attacks put the network connections and the actual equipment at danger. IoT security and privacy will so be compromised. Due to its limited power, bandwidth, and storage, the Internet of Things requires a security solution that does not overload it. This study aims to preserve consumers' trust in the Internet of Things (IoT) by safeguarding their data against unauthorised access and maintaining the privacy of their personal information. With the ultimate objective of presenting a unique hybrid and optimised lightweight logical security architecture to ensure data privacy and integrity while making effective use of available resources, all research are carried out with this purpose in mind. The Hybrid Lightweight Security Framework (HLSF), which this study suggests, offers secrecy and integrity in addition to authentication. The structure consists of three distinct steps. The first step is registration, the second is authentication, and the third is transit security, which protects data while it is being transported. Compared to other current frameworks, the results reveal that HLSF performs better in terms of precision, recall, and accuracy when applied to an IoT situation.

Read More

Doi: https://doi.org/10.54216/JCIM.130104

Vol. 13 Issue. 1 PP. 36-45, (2024)

Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage

Anil Audumbar Pise , Saurabh Singh , Hemachandran K. , Shraddhesh Gadilkar , Zakka Benisemeni Esther , Ganesh Shivaji Pise , Jude Imuede

This article describes a massive cryptographic scheme that can safeguard IoT communication paths. A combination of algorithms makes the technique operate. Communication security is handled differently by each algorithm. Elliptic Curve Cryptography (ECC), SHA-256 Secure Data Hashing, HMAC Message Authentication, and Merkle Tree Structures Decryption and Verification are used. Ablation is used to determine how each strategy increases security. The paper emphasizes that the algorithms function effectively together, demonstrating their importance for cyberdefense and surveillance. The recommended strategy is evaluated and found to operate better across key parameters.Top of Form

Read More

Doi: https://doi.org/10.54216/JCIM.130105

Vol. 13 Issue. 1 PP. 46-59, (2024)