Raza Imam | Aligarh Muslim University (original) (raw)
Papers by Raza Imam
International Journal of Information Technology
Cryptography is the mechanism of providing significant security services such as confidentiality,... more Cryptography is the mechanism of providing significant security services such as confidentiality, authentication, and integrity. These services are essentially more important in the current era, where lots of IoT devices are generating data and being stored in the cloud environment. Public key cryptography is highly effective in achieving confidentiality and authentication services. One of the popular public-key cryptography schemes is the RSA algorithm, which besides other concepts uses two very large prime integers. In the proposed study, the authors enhanced the RSA algorithm in the context of generation of a more complex key pair, i.e., public and private key, so that adversary should never be able to determine the private key using public-key. The proposed scheme uses four random large prime numbers to generate public–private key pairs and applies XOR operation along with the more complex intermediate process in key-generation encryption and decryption phases to achieve higher algorithm complexity, which would require more time to break the proposed cipher and would make it extremely difficult for third-parties to attack, hence boosting security. The method is also compared with other RSA-based algorithms to demonstrate the potency of the proposed algorithm in terms of enhanced performance and security.
Journal of King Saud University - Computer and Information Sciences
The widespread adoption of cloud technology in the healthcare industry has achieved effective out... more The widespread adoption of cloud technology in the healthcare industry has achieved effective outcomes in sharing health records and sensitive data. In recent years, many organizations have prioritized E-Health as their primary goal for advancement in health services. As a result, Attribute Based Encryption (ABE) has emerged as a reliable model for health information exchange across cloud settings. Eventually, it leads to provide acceptable solutions for challenging scenarios like fine-grained access control. Despite ABE significance and its breadth of applications, no systematic and comprehensive survey exists in the literature that covers every variation of ABE in healthcare, highlighting its past and present status. This paper presents a systematic and comprehensive study of ABE works concerning E-Health as the authors rigorously investigate healthcare-focused ABE frameworks and examine them based on various descriptive criteria, along with categorizing them systematically in 10 distinct domains and sub-domains, ultimately offering observations and potential recommendations. The descriptive research design, significant findings along with the suggested future works will help future research in ABE to secure the existing E-Health data sharing more effectively. The present study will also facilitate researchers and practitioners to comprehend the past trends and current state of ABE architectures in secure health data-sharing scenarios, as well as the prospect of ABE deployment in most recent technological evolutions.
2021 International Conference on Data Analytics for Business and Industry (ICDABI), 2021
Artificial Intelligence (AI) techniques have successfully demonstrated reliable outcomes for asse... more Artificial Intelligence (AI) techniques have successfully demonstrated reliable outcomes for assessing visual aesthetics. Throughout this work, we examine the visual art aesthetics classification problem, often known as automatically categorizing a picture as having a low or high aesthetic value in digital and hand-drawn posters, which is a complex challenge exceeding the domain of image recognition. We focus on configuring a system to judge digital art posters without any human intervention. A Convolutional Neural Network (CNN) model with a self-assembled and classified dataset is trained. The images of our dataset come from a variety of artists, preventing any bias. Our model was able to predict the classes with an accuracy percentage of 89%.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2022
Nowadays, people are using more cloud services than ever before as it provides more storage, coll... more Nowadays, people are using more cloud services than ever before as it provides more storage, collaborative environment, and more security than any other platform. Public Key Cryptography plays a significant role in securing the cloud applications, particularly, Elliptic Curve Cryptography, as its small key size nature is the most suitable aspect in the Cloud. Although, many contributions have been made in recent years to enhance the security aspect of Elliptic Curve approaches in Cloud service by modifications made in the algorithm or in various algorithm phases, but a review work that integrates recent studies providing research directions is missing in the literature. In this paper, we reviewed recent studies along with the various phases of Elliptic Curve Cryptography, which then follows the data analysis of various approaches and techniques. Several research directions and open research problems are derived that would efficiently assist the future relevant research.
The interconnected digital world is generating enormous data that must be secured from unauthoriz... more The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security. Public key Cryptography provides a set of cryptographic algorithms in achieving data security through confidentiality, integrity and authentication. Among all cryptographic algorithms in general and public key cryptography in particular, RSA is one of the most widely used and applied algorithms. Since its inception, it is commonly being adopted in securing data across different domains such as cloud, image and others. Despite its importance and wide applications, no such systematic and extensive survey exists in the literature. A systematic and thorough study of RSA based cryptography is presented in this work covering several domains. All the available works in this direction are divided into 11 different categories, viz, Hybrid, Parallel, Cloud, Image, Multiple-Keys, Chinese-Remainder-Theorem-based, Digital-Signatures, K-Nearest-Theorem-based, Batch, Wireless, and Core-Modifications. This study methodically explores RSA-based cryptosystems, either modifications in core RSA or applications of enhanced RSA across different domains, systematically categorizing in various categories and eventually providing findings and indications. The current study compares RSA methods based on parameters such as key generation, encryption schemes, decryption schemes, key features and enhancements, and also finds the leading areas where modified RSA has been applied in the recent past. As a result, this study will guide researchers and practitioners in understanding the past and present status of RSA cryptography along with the possibility of its applications in other domains.
Academia Letters, 2021
With growing maturity of technology and rapid development in video games industry, players have h... more With growing maturity of technology and rapid development in video games industry, players have higher needs for game display. To fulfil this, game developers still pursue higher game effects. Effects like fire, rain, shadow, explosion makes game attractive and shut to reality. it's difficult to experience these effects personally in world, but are often simulated in virtual gaming world. during this paper, through the analysis of the essential principle and application method of Unity3D's particle system, we design and implement common game scene effects, mainly simulation and realize the effect of a fire-system and water-system in conjunction with a "Exhaustive" effect by combining both the results.
International Journal of Information Technology
Cryptography is the mechanism of providing significant security services such as confidentiality,... more Cryptography is the mechanism of providing significant security services such as confidentiality, authentication, and integrity. These services are essentially more important in the current era, where lots of IoT devices are generating data and being stored in the cloud environment. Public key cryptography is highly effective in achieving confidentiality and authentication services. One of the popular public-key cryptography schemes is the RSA algorithm, which besides other concepts uses two very large prime integers. In the proposed study, the authors enhanced the RSA algorithm in the context of generation of a more complex key pair, i.e., public and private key, so that adversary should never be able to determine the private key using public-key. The proposed scheme uses four random large prime numbers to generate public–private key pairs and applies XOR operation along with the more complex intermediate process in key-generation encryption and decryption phases to achieve higher algorithm complexity, which would require more time to break the proposed cipher and would make it extremely difficult for third-parties to attack, hence boosting security. The method is also compared with other RSA-based algorithms to demonstrate the potency of the proposed algorithm in terms of enhanced performance and security.
Journal of King Saud University - Computer and Information Sciences
The widespread adoption of cloud technology in the healthcare industry has achieved effective out... more The widespread adoption of cloud technology in the healthcare industry has achieved effective outcomes in sharing health records and sensitive data. In recent years, many organizations have prioritized E-Health as their primary goal for advancement in health services. As a result, Attribute Based Encryption (ABE) has emerged as a reliable model for health information exchange across cloud settings. Eventually, it leads to provide acceptable solutions for challenging scenarios like fine-grained access control. Despite ABE significance and its breadth of applications, no systematic and comprehensive survey exists in the literature that covers every variation of ABE in healthcare, highlighting its past and present status. This paper presents a systematic and comprehensive study of ABE works concerning E-Health as the authors rigorously investigate healthcare-focused ABE frameworks and examine them based on various descriptive criteria, along with categorizing them systematically in 10 distinct domains and sub-domains, ultimately offering observations and potential recommendations. The descriptive research design, significant findings along with the suggested future works will help future research in ABE to secure the existing E-Health data sharing more effectively. The present study will also facilitate researchers and practitioners to comprehend the past trends and current state of ABE architectures in secure health data-sharing scenarios, as well as the prospect of ABE deployment in most recent technological evolutions.
2021 International Conference on Data Analytics for Business and Industry (ICDABI), 2021
Artificial Intelligence (AI) techniques have successfully demonstrated reliable outcomes for asse... more Artificial Intelligence (AI) techniques have successfully demonstrated reliable outcomes for assessing visual aesthetics. Throughout this work, we examine the visual art aesthetics classification problem, often known as automatically categorizing a picture as having a low or high aesthetic value in digital and hand-drawn posters, which is a complex challenge exceeding the domain of image recognition. We focus on configuring a system to judge digital art posters without any human intervention. A Convolutional Neural Network (CNN) model with a self-assembled and classified dataset is trained. The images of our dataset come from a variety of artists, preventing any bias. Our model was able to predict the classes with an accuracy percentage of 89%.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2022
Nowadays, people are using more cloud services than ever before as it provides more storage, coll... more Nowadays, people are using more cloud services than ever before as it provides more storage, collaborative environment, and more security than any other platform. Public Key Cryptography plays a significant role in securing the cloud applications, particularly, Elliptic Curve Cryptography, as its small key size nature is the most suitable aspect in the Cloud. Although, many contributions have been made in recent years to enhance the security aspect of Elliptic Curve approaches in Cloud service by modifications made in the algorithm or in various algorithm phases, but a review work that integrates recent studies providing research directions is missing in the literature. In this paper, we reviewed recent studies along with the various phases of Elliptic Curve Cryptography, which then follows the data analysis of various approaches and techniques. Several research directions and open research problems are derived that would efficiently assist the future relevant research.
The interconnected digital world is generating enormous data that must be secured from unauthoriz... more The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security. Public key Cryptography provides a set of cryptographic algorithms in achieving data security through confidentiality, integrity and authentication. Among all cryptographic algorithms in general and public key cryptography in particular, RSA is one of the most widely used and applied algorithms. Since its inception, it is commonly being adopted in securing data across different domains such as cloud, image and others. Despite its importance and wide applications, no such systematic and extensive survey exists in the literature. A systematic and thorough study of RSA based cryptography is presented in this work covering several domains. All the available works in this direction are divided into 11 different categories, viz, Hybrid, Parallel, Cloud, Image, Multiple-Keys, Chinese-Remainder-Theorem-based, Digital-Signatures, K-Nearest-Theorem-based, Batch, Wireless, and Core-Modifications. This study methodically explores RSA-based cryptosystems, either modifications in core RSA or applications of enhanced RSA across different domains, systematically categorizing in various categories and eventually providing findings and indications. The current study compares RSA methods based on parameters such as key generation, encryption schemes, decryption schemes, key features and enhancements, and also finds the leading areas where modified RSA has been applied in the recent past. As a result, this study will guide researchers and practitioners in understanding the past and present status of RSA cryptography along with the possibility of its applications in other domains.
Academia Letters, 2021
With growing maturity of technology and rapid development in video games industry, players have h... more With growing maturity of technology and rapid development in video games industry, players have higher needs for game display. To fulfil this, game developers still pursue higher game effects. Effects like fire, rain, shadow, explosion makes game attractive and shut to reality. it's difficult to experience these effects personally in world, but are often simulated in virtual gaming world. during this paper, through the analysis of the essential principle and application method of Unity3D's particle system, we design and implement common game scene effects, mainly simulation and realize the effect of a fire-system and water-system in conjunction with a "Exhaustive" effect by combining both the results.