Packet-Hiding Methods for Preventing Selective Jamming Attacks
- Ashish Kumar, S. Gupta, Shubham Singh
- Computer Science
- 2013
This work addresses the problem of selective jamming attacks in wireless networks by developing three schemes that prevent real-time packet classification by combining cryptographic primit ives with physical-layer attributes and demonstrating the security of these methods.
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage
- Mohammad Taha Khan, Christopher Tran, E. Zheleva
- Computer ScienceUSENIX Security Symposium
- 2021
Aletheia’s performance validates a human-centric approach to feature selection when using inference techniques on subjective security-related tasks and improves upon the state of the art in minimizing the attack surface of cloud accounts.
Integrity Checking Using Third Party Auditor in Cloud Storage
- Sutirtha Chakraborty, Shubham Singh, Surmila Thokchom
- Computer ScienceInternational Conference on Contemporary…
- 1 August 2018
The proposed scheme checks the integrity of data stored at remote location through a third party auditor using bilinear pairing and aggregation is applied over the proposed scheme for further optimization.
Public integrity auditing for shared dynamic cloud data
- Shubham Singh, Surmila Thokchom
- Computer Science
- 2018
Honeypot Deployment Experience at IIT Kanpur
- Rohit Sehgal, N. Majithia, S. Shukla
- Computer Science
- 2020
This chapter provides an idea about honeypots and different types of honeypots, and describes the analysis of the attacks on honeypots deployed at IIT Kanpur.
Secured Cloud Storage using Blockchain Technology
- Shubham Singh, Snehal Gite, Neha Bahare, Ankita V. Raut
- Computer Science
- 2018
This scheme is the first attempt to formally address the problem of authorized data deduplication and demonstrates that the scheme is secure in terms of the definitions specified in the proposed security model.
Host Based Intrusion Detection System Using Decision Tree and Naïve Bayes Algorithms
- Abhijeet Mahadule, Atul Rathod, Shubham Singh, Rahul B. Adhao
- Computer Science
- 5 May 2018
This project aims to monitor computer network for malicious activity using Intrusion Detection System (IDS), and aims to use Supervised Machine Learning Algorithms such as Naive Bayes Classifier and Decision Tree Classifiers, and compare their output and efficiency.
Group Data Sharing and Auditing While Securing Sensitive Information
- Shubham Singh, Deepti Aggarwal
- Computer Science
- 2020
In today’s world, it can be said that cloud computing is a most important research topic nowadays. The reason behind this is the number of services provided by it to its users. Among them, there…
SQL Injection and Areas of Security Concern
- Shubham Singh, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia, Narendra Joshi
- Computer Science
- 30 May 2021
Cyber-crimes are growing rapidly and to prevent these crimes one should share all the knowledge he/she has to make people aware of these attacks. In the field of Application Security there is a very…