Biological organisms are dealing with competitive atmosphere to relate with demands of exceptionally rationalize environments to solve there problems whereas humans are using traditional engineered approaches for problem solving. Bioinspired computing is a field devoted to handle complex problems using computational methods to model and design principle problems encountered by nature. The bio inspired computing deals with databases related to biomedical nature where databases usually comprise on the principles of biology to store and retrieve huge information from large and complex biological databases. Disseminating information from such databases can be crucial for future medical research. Often this data can be patient-specific, and therefore requires the privacy should be maintained. We propose in this paper a way for secure access of data in these databases using CAPTCHA. The CAPTCHA help in ensuring that the access of data is by a real human being not by a computer or program.
Authentication is an obligatory factor in the technological world regarding security. Two factor authentication secures access network and validates and protects user identities. CAPTCHA--Completely Automated Public Turing‖ is a challenge response test used in evaluating to check the user is human or not. Modern Cryptography is a practice of representing the assumptions in which the cryptographic protocols are secured in a clear manner. Graphical user Authentication is in the form of cued-click points. However, they do not deal much with shoulder surfing attacks. It is a security option that is designed based on hotspot concepts and the hidden patterns.
Abstract:. Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users are asked to read and type a string of distorted characters in order to ensure that the user is human or not. Automation is real problem for web application. Automated attacks can exploit many services:1. Blogs 2. Forums 3. Phishing 4. Theft of data Registration Websites use CAPTCHA (completely automated public turing test to tell computers and human apart) systems to prevent the bot programs from wasting their resources. Today is the Era of where technologies are changes very rapidly. So spammers are hackers are also trying something new to cracking captcha. That's why it is necessary to developing an advanced technology to generating a captcha. Just like simply generating a Captcha Images from text, or rotating an object within images.
Earlier, web services are used to retrieve data for small amount of user only, but now a day's more data retrieved through web services by more number of users in all the actions of day to day life. There are numerous web services available in the internet to collect the data. Today internet plays a vital role in every body's life. Internet provides all the information one can access through the web service. To make the retrieval more efficient, Hidden Markov Models (HMM) &Mediator Agent Model are used in the project. The Hidden Markov Models can be used to measure and predict the behavior of Web Services in terms of response time, and thus can be used to rank services quantitatively. The mediator agent Model is used to select web services with the help of ranking method. The Mediator Agent Model will provide web service to the user from the web service provider. It will be processed in such a way that optimal result is obtained. If many users refer the optimal site then server loading will occur to reduce that problem server redirection is used in this project.
cloud computing service is the most important services for many of the organizations. The service providers must ensure of their security and protection techniques to guarantee to protect the client data. There are some cloud security guidelines that supports the cloud data security are need to be followed by the vendors. Despite the fact, the vendors are facing the mess of security and protection controls and eventually leads to an confusion among the consumers on concerning the safety efforts and whether their measures satisfies the security measures. An inclusive report to survey the risk and security issues faced by cloud consumers have depicted to control the hazards. In light of this investigation, an ontology describing the cloud security controls, threats and compliances framed. a web based cloud application is designed to recommend the cloud security policies from the ontology such that it also helps the existing cloud providers. Security strategies can also be planned by the consumers by utilizing the web application that describing the ontology
Land forgery is predominant in India, the project aims to eliminate forgery activities while selling and buying the land with the guideline value. The money transaction made during the purchase of property majorly contributes to the black money problem in our country. To overcome this black money rotation and land forgery, both the Buyer and Seller has to register the land with their Aadhaar card to verify the genuineness of them. While verifying, if the system identifies any criminal cases filed against the buyer or seller or the land acquired by the seller is not authorized, it blocks the transaction. The process involves of document unique verification, legal activity verification and black money tracking, all the data are maintained in Hbase database and then integrated and stored in HDFS file storage. Map Reduce programming model is used to retrieve required information from big amount of data at a faster rate. If there are no such issues on the buyer and the seller. The overall transaction amount between the buyer and seller is finally referred to the Income Tax Department. If any illegal activity is detected in the transaction, the alert is sent to the Income Tax department and police officials so that the registration is blocked and black money rotation could be avoided.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.