Skip to main content

Fusion of IoT and Machine Learning Approach to Prevent Confidential Data from Digital Crimes and Cyber Mugging for Covert Transmission

  • Conference paper
  • First Online:
Book cover Applications of Computing, Automation and Wireless Systems in Electrical Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 553))

Abstract

We are aware of the scenario of the twenty-first century where each and every nation of the world wants to progress at a rapid rate, weaker nations are destabilized by adopting policies like state-sponsored terrorism and online hacking which are part of the government official agenda. In this situation, there is strong need for policies to prevent data from online hacking and cyber mugging. Every nation wants to secure its data in terms of future plans, satellite images, new military setups, new river linkage plans, etc. Here, we have developed a new model advanced private content-based image retrieval (APCBIR) of data privacy based on content-based image query and retrieval (CBIQ/R). In this approach, data is smartly encrypted with only 10% of the original data, features of the original and newly encrypted images are matched by statistical parameters, and finally, the transmission of the data is done in a manner so that no one is able to reveal the identity of the original data. The efficiency of this system becomes more effective as IoT is attached to the model; data of usefulness is automatically selected and encrypted accordingly. Finally, the data gets secured from various types of malware attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gilbert K, Stephenson P (2013) Investigating computer-related crime, 2nd edn. Taylor and Francis Group, Boca Raton

    Google Scholar 

  2. Times of India. Over half a million Indian Facebook users may have been affected in data breach

    Google Scholar 

  3. The New York Times. Russian hacking and influence in the U.S. election

    Google Scholar 

  4. Dinstein Y (2012) The principle of distinction and cyber war in international armed conflicts. J Confl Secur Law 17(2):261–277

    Article  Google Scholar 

  5. Gervais M (2012) Cyber attacks and the laws of war. Berkeley J Int Law 30(2):525–579

    Google Scholar 

  6. Farwell J, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40

    Article  Google Scholar 

  7. Landau S (2013) Making sense from Snowden: what’s significant in the NSA surveillance revelations. IEEE Comput Reliab Soc 11(4):54–63

    MathSciNet  Google Scholar 

  8. Hyman P (2013) Cybercrime: it’s serious but exactly how serious? Commun ACM 56(3):18–20

    Article  Google Scholar 

  9. Thomas K, Li F, Zand A, Barrett J, Ranieri J (2017) Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, vol I, Dallas, Texas, USA, Nov 2017, pp 1421–1434

    Google Scholar 

  10. Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Article  Google Scholar 

  11. Akhilomen J (2013) Data mining application for cyber credit-card fraud detection system. In: Advances in data mining. Applications and theoretical aspects, vol III, London, pp 218–228

    Chapter  Google Scholar 

  12. Gai K, Qiu M, Thuraisingham B (2015) Proactive attribute-based secure data schema for mobile cloud in financial industry. In: IEEE high performance computing and communications (HPCC), New York, NY, USA, pp 1332–1337

    Google Scholar 

  13. Ben-Asher N, Gonzalez C (2015) Effects of cyber security knowledge on attack detection. Comput Hum Behav 48(1):51–61

    Article  Google Scholar 

  14. Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur M, Conti M (2014) Android security: a survey of issues, malware penetration and defenses. IEEE Commun Surv Tutor 17(2):998–1022

    Article  Google Scholar 

  15. Faghani M, Nguyen U (2017) Modeling the propagation of Trojan malware in online social networks. IEEE Trans Dependable Secure Comput 15:1–18

    Google Scholar 

  16. Roy S, DeLoach J, Li Y, Herndon N (2015) Experimental study with real-world data for android app security analysis using machine learning. In: ACM proceedings of the 31st annual computer security applications conference, vol I, Los Angeles, CA, USA, pp 81–90

    Google Scholar 

  17. Ahmad M, Woodhead S, Gan D (2016) Early containment of fast network worm malware. In: IEEE information and computer science (NICS), vol I, Danang, Vietnam

    Google Scholar 

  18. He D, Chan S, Guizani M (2015) Mobile application security: malware threats and defenses. IEEE Wirel Commun 22(1):138–144

    Article  Google Scholar 

  19. Muthumanickam K, Ilavarasan E (2015) Optimization of rootkit revealing system resources—a game theoretic approach. J King Saud Univ Comput Inform Sci 27(4):386–392

    Google Scholar 

  20. Eshete B, Alhuzali A, Monshizadeh M, Porras P, Venkatakrishnan VN, Yegneswaran V (2015) EKHUNTER: a counter-offensive toolkit for exploit kit infiltration. In: NDSS internet society I, pp 1–15

    Google Scholar 

  21. Chandra J, Challa N, Pasupul S (2015) Intelligence based defense system to protect from advanced persistent threat by means of social engineering on social cloud platform. Indian J Sci Technol 8(28):1–9

    Google Scholar 

  22. Carrasquilla J, Melko R (2017) Machine learning phases of matter. Nat Phys 13(1):431–434

    Article  Google Scholar 

  23. Lee K, Lam M, Pedarsani R, Papailiopoulos D, Ramchandran K (2016) Speeding up distributed machine learning using codes. In: IEEE information theory (ISIT), vol I, Barcelona, Spain, pp 1143–1147

    Google Scholar 

  24. Conti M, Dehghatanha A, Franke K, Watson S (2017) Internet of Things security and forensics: challenges and opportunities. Future Gener Comput Syst 78:544–546

    Article  Google Scholar 

Download references

Acknowledgements

The author would like to express their deep gratitude to NASA Jet Propulsion Laboratory, California Institute of Technology, USA, for providing ‘Mars Hand Lens Images’; McGill Vision Lab of McGill University, Montreal, Quebec H3G 1A4, for providing the texture dataset; Institute of Computer Science and Technology of Peking University and Institute of Digital Publishing of Founder R&D Center, China, for allowing use of their Marmot Chinese Math Dataset v 1.0; and Mr. Joan Andreu Sanchezfor allowing use of their handwritten text dataset of ICFHR HTR competition 2016. All the dataset providers are acknowledged deeply.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Shakya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shakya, A.K., Ramola, A., Pokhariya, H.S., Kandwal, A. (2019). Fusion of IoT and Machine Learning Approach to Prevent Confidential Data from Digital Crimes and Cyber Mugging for Covert Transmission. In: Mishra, S., Sood, Y., Tomar, A. (eds) Applications of Computing, Automation and Wireless Systems in Electrical Engineering. Lecture Notes in Electrical Engineering, vol 553. Springer, Singapore. https://doi.org/10.1007/978-981-13-6772-4_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6772-4_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6771-7

  • Online ISBN: 978-981-13-6772-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics