Research Article

Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication

by  S.L. Swapna, V. Saravanan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Issue 32
Published: Aug 2023
Authors: S.L. Swapna, V. Saravanan
10.5120/ijca2023923078
PDF

S.L. Swapna, V. Saravanan . Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication. International Journal of Computer Applications. 185, 32 (Aug 2023), 1-8. DOI=10.5120/ijca2023923078

                        @article{ 10.5120/ijca2023923078,
                        author  = { S.L. Swapna,V. Saravanan },
                        title   = { Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication },
                        journal = { International Journal of Computer Applications },
                        year    = { 2023 },
                        volume  = { 185 },
                        number  = { 32 },
                        pages   = { 1-8 },
                        doi     = { 10.5120/ijca2023923078 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2023
                        %A S.L. Swapna
                        %A V. Saravanan
                        %T Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier for Secured Big Data Communication%T 
                        %J International Journal of Computer Applications
                        %V 185
                        %N 32
                        %P 1-8
                        %R 10.5120/ijca2023923078
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The application of big data analytics and related technologies like the Internet of Things (IoT) facilitates user intentions and behaviours as well as operational decision-making. Security is the major concern in the application of big data analytics to protect the system and secure the information as well as the data being handled. Conventional security techniques have become inefficient in terms of processing and identifying network threats in a reasonable amount of time. To deal with this problem, a unique Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier based Secured Data Communication (CSDECGBAC-SDC) model with improved accuracy and lower time complexity is introduced. The CSDECGBAC-SDC model's core functions for enhancing security include user registration, data collection, and data communication. During the registration process, the user's information is initially registered. Following that, the CSDECGBAC-SDC model collects data from the enrolled user. The Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier is used in the CSDECGBAC-SDC Model to accomplish user authentication for anyone who want to access the data. For detecting the authorized user, the ensemble technique uses a group of weak learners as a Tversky Indexive Chi-square automatic interaction detection decision tree. The weak learner results are combined. Finally, cardinal voting is applied to find the majority vote in data classification by using the gradient ascent function.  This in turn helps to improve secured data communication. Experimental evaluation is carried out on factors such as classification accuracy, error rate, and classification time with respect to a number of users. The results indicate that the CSDECGBAC-SDC model effectively improves the classification accuracy with minimum error rate and classification time than the conventional approaches.

References
  • S L, Swapna., V Saravanan. Survival Analysis on Secured Data Communication in Cloud. International Journal of Computer Applications. 2022. https://doi.org/10.5120/ijca2022921864
  • Hui, Xie., Zhengyuan., Zhang., Qi, Zhang., Shengjun, Wei., Changzhen, Hu.: HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments. Computer Communications (2021). https://doi.org/10.1016/j.comcom.2021.03.018
  • Ahmed Yaser, Fahad, Alsahlani., Alexandru, Popa.: LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. Journal of Network and Computer Applications (2021). https://doi.org/10.1016/j.jnca.2021.103177
  • Mohamed Ahzam, Amanullah., Riyaz Ahamed, Ariyaluran, Habeeb., Fariza, Hanum, Nasaruddin., Abdullah, Gani., Ejaz, Ahmed., Abdul, Salam, Mohamed, Nainar., Nazi,hah, Md, Akim., Muhammad, Imran.: Deep learning and big data technologies for IoT security. Computer Communications (2020). https://doi.org/10.1016/j.comcom.2020.01.016
  • David, G. Rosado., Julio., Moreno., Luis, E. S´anchez., Antonio, Santos-Olmo., Manuel, A. Serrano., Eduardo, Fern´andez-Medina.: MARISMA-BiDa Pattern: Integrated Risk Analysis for Big Data. Computers & Security (2021). https://doi.org/10.1016/j.cose.2020.102155
  • Wuchao, Liang., Wenning, Li., Lili, Feng.: Information Security Monitoring and Management Method Based on Big Data in the Internet of Things Environment. IEEE Access (2021). https://doi.org/10.1109/ACCESS.2021.3064350
  • Imane, El Alaoui., Youssef, Gahi.: Network Security Strategies in Big Data Context. Procedia Computer Science (2020). https://doi.org/10.1016/j.procs.2020.07.108
  • Uma, Narayanan., Varghese. Paul., Shelbi, Joseph.: A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University - Computer and Information Sciences (2020). https://doi.org/10.1016/j.jksuci.2020.05.005
  • Abdul, Razaque., Nazerke, Shaldanbayeva., Bandar, Alotaibi, Munif, Alotaibi., Akhmetov. Murat., Aziz, Alotaibi.: Big Data Handling Approach for Unauthorized Cloud Computing Access. Electronics (2022). https://doi.org/10.3390/electronics11010137
  • Rohit, Sharma., Rajeev, Arya.: Secure transmission technique for data in IoT edge computing infrastructure. Complex & Intelligent Systems (2021). https://doi.org/10.1007/s40747-021-00576-7
  • Dongfeng, Fang., Yi, Qian., Ro, Qingyang, Hu.: A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications. IEEE Internet of Things Journal (2020). https://doi.org/10.1109/JIOT.2020.2970974
  • Deebak, B.D., Fadi, Al-Turjman.: Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. Future Generation Computer Systems (2021). https://doi.org/10.1016/j.future.2020.11.010
  • Qingyang, Zhang., Hong, Zhong., Weisong, Shi., Lu, Liu.: A trusted and collaborative framework for deep learning in IoT. Computer Networks (2021). https://doi.org/10.1016/j.comnet.2021.108055
  • Mohammad, Wazid., Ashok Kumar, Das., Vivekananda, Bhat, K., Athanasios, V. Vasila.: LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. Journal of Network and Computer Applications (2020). https://doi.org/10.1016/j.jnca.2019.102496
  • Seunghwan, Son., Yohan, Park., Youngho Park.: A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments. Sustainability (2021). https://doi.org/10.3390/su13169241
  • Manasha, Saqib., Bhat, Jasra., Ayaz Hassan, Moon.: A Lightweight Three Factor Authentication Framework for IoT Based Critical Applications. Journal of King Saud University - Computer and Information Sciences (2021). https://doi.org/10.1016/j.jksuci.2021.07.023
  • Hesham, A. El Zouka., Mustafa, M. Hosni.: Secure IoT Communications for Smart Healthcare Monitoring System. Internet of Things (2021). https://doi.org/10.1016/j.iot.2019.01.003
  • Ashish, Singh., Kakali, Chatterjee.: Securing smart healthcare system with edge computing. Computers & Security (2021). https://doi.org/10.1016/j.cose.2021.102353
  • Mustafa, A. Al Sibahee., Songfeng, Lu., Zaid Ameen, Abduljabbar., Xin, Liu., Hemn Barzan, Abdalla., Mohammed Abdulridha, Hussain., Zaid Alaa, Hussien., Mudhafar, Jalil Jassim Ghrabat.: Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System. IEEE Access (2020). https://doi.org/10.1109/ACCESS.2020.3041809
  • Sheeba Rani, S., Jafar, A. Alzubi., Lakshmanaprabu, S. K., Deepak, Gupta., Ramachandran, Manikandan.: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimedia Tools and Applications (2020). https://doi.org/10.1007/s11042-019-07760-5
  • Pampapathi, B. M., Nageswara, Guptha, M., Hema, M. S.: Data distribution and secure data transmission using IANFIS and MECC in IoT. Journal of Ambient Intelligence and Humanized Computing (2022). https://doi.org/10.1007/s12652-020-02792-4
  • R John, Martin. IoMT Supported COVID Care – Technologies and Challenges. International Journal of Engineering and Management Research, (2022). DOI: 10.31033/ijemr.12.1.16
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Secured Big data Communication Tversky Indexive Chi-Square Automatic Interaction Detection Ensembled Cardinal Gradient Bootstrap Aggregating Classifier Cardinal Voting Gradient Ascent Function

Powered by PhDFocusTM