Aqeel Khalique - Academia.edu (original) (raw)
Papers by Aqeel Khalique
RECENT ADVANCES IN SCIENCES, ENGINEERING, INFORMATION TECHNOLOGY & MANAGEMENT
Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India
Sustainability is the need of the hour to preserve global resources for future generation. As tec... more Sustainability is the need of the hour to preserve global resources for future generation. As technologically, we are advancing in such a manner, where exploitation of natural resources has become obvious. Sustenance is required to live healthy and happily. Sustainable development is one the most trending topic globally and due to involvement of United Nations, Sustainable Development Goals (SDGs) were set up in 2015 by the United Nations General Assembly and are intended to be achieved by the year 2030. In this paper, a review has been conducted on sustainability, need and importance of sustainable development, SDGs, current global status of SDGs, application domain of SDGs. Further, a suggestive methodology has been proposed to be performed by humans in their workplace so that they as individuals can also contribute towards achieving these SDGs.
International Journal of Innovative Technology and Exploring Engineering, 2020
Fog computing brings cloud services closer to the network’s Edge. Despite various applications in... more Fog computing brings cloud services closer to the network’s Edge. Despite various applications in today’s world, these applications lack in data security aspects. Developers have few solutions that need to be tested thoroughly. Data encipherment is one of the most popular mechanisms to protect data confidentiality, data integrity, etc. We propose two steps flexible dynamic scalable model in which the system will dynamically choose an encryption mechanism depending on the access frequency of data being encrypted. If data is frequently accessed, then the model will choose the algorithm with minimum computational complexity. In next step, model will use a scalable approach to decide the security strength needed by determining size of encryption key. A longer key will be used to encrypt more sensitive and secretive data automatically by security model and a smaller key will be used to encrypt public data or less sensitive, saving the fog node from computation overload. Our model is more...
International Journal of Innovative Technology and Exploring Engineering, 2020
Social Network becomes widely accepted by the users and active communication tool in 21st century... more Social Network becomes widely accepted by the users and active communication tool in 21st century. In this paper, we use test data of Twitter, for sentiment analysis. Users may post vulnerable tweets which can result in threats; hence we analyze these tweets to determine threat warnings from specific group of users or organizations. We discuss brief literature review and present our methodology for doing sentiment analysis. We find several users most active and regularly mentioning other users. Based on our results, we present our analysis in the paper. Dataset was requested from Kaggle for research purposes.
CRC Press eBooks, May 25, 2022
Sensors
With the rapid development of deep learning techniques, new innovative license plate recognition ... more With the rapid development of deep learning techniques, new innovative license plate recognition systems have gained considerable attention from researchers all over the world. These systems have numerous applications, such as law enforcement, parking lot management, toll terminals, traffic regulation, etc. At present, most of these systems rely heavily on high-end computing resources. This paper proposes a novel memory and time-efficient automatic license plate recognition (ALPR) system developed using YOLOv5. This approach is ideal for IoT devices that usually have less memory and processing power. Our approach incorporates two stages, i.e., using a custom transfer learned model for license plate detection and an LSTM-based OCR engine for recognition. The dataset that we used for this research was our dataset consisting of images from the Google open images dataset and the Indian License plate dataset. Along with training YOLOv5 models, we also trained YOLOv4 models on the same da...
Computational Intelligence and Neuroscience
In recent years, the application of various recommendation algorithms on over-the-top (OTT) platf... more In recent years, the application of various recommendation algorithms on over-the-top (OTT) platforms such as Amazon Prime and Netflix has been explored, but the existing recommendation systems are less effective because either they fail to take an advantage of exploiting the inherent user relationship or they are not capable of precisely defining the user relationship. On such platforms, users generally express their preferences for movies and TV shows and also give ratings to them. For a recommendation system to be effective, it is important to establish an accurate and precise relationship between the users. Hence, there is a scope of research for effective recommendation systems that can define a relationship between users and then use the relationship to enhance the user experiences. In this research article, we have presented a hybrid recommendation system that determines the degree of friendship among the viewers based on mutual liking and recommendations on OTT platforms. Th...
Security and Communication Networks, 2016
Cryptography is used for secure communication since ancient days for providing confidentiality, i... more Cryptography is used for secure communication since ancient days for providing confidentiality, integrity and availability of the information. Public key cryptography is a classification of cryptography having pair of keys for encryption and decryption. Public key cryptography provides security and authentication using several algorithms. The Rivest-Shamir-Adleman (RSA) algorithm is prominent since its inception and is widely used. Several modified schemes were introduced to increase security in the RSA algorithm involving additional complexity. In this paper, we introduce a generalized algorithm over RSA that is advanced, adaptable and scalable in using a number of primes. Our algorithm uses 2 k prime numbers with secure key generation involving additional complexity, making it computationally infeasible to determine decryption key. A user can use 4, 8, 16, 32, … (2 k) prime numbers for generating public and private components securely. In our algorithm, public key and private key components are generated by making use of N, where N is a function of 2 k prime numbers. When an attacker obtains a public key component n out of {E, n} by using factorization techniques such as general number field sieve or elliptic curve factorization, he or she can only obtain two initial prime numbers (because n is a product of the first two prime numbers). However, finding the remaining prime numbers is computationally infeasible as no relevant information is available to the attacker. Hence, it is difficult for the attacker to determine the private key component D out of {D, n} knowing the public key component {E, n}. Thus, it is practically impossible to break our system using a brute force attack.
International Journal of Computer Applications, 2016
In today's digital era, users are increasingly accessing countless number of applications every d... more In today's digital era, users are increasingly accessing countless number of applications every day. For accessing these services, the users first have to authenticate themselves and need to maintain a separate set of username and password for each application. This led to the development of Single Sign On (SSO). This paper presents review on SSO enabling technologies and discusses SSO architectures, protocols and analysis related to growing use of SSO.
International Journal of Computer Applications, 2016
International Journal of Computer Applications, 2015
International Journal of Computer Applications, 2010
Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and fin... more Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key techniques for its small key size and high security and is suitable for secure access of smart cards because implementation on smart cards is challenging due to memory, bandwidth, and computation constraints. In this paper, we proposed a passwordauthenticated key agreement scheme based on ECC. Our scheme provides more guarantees in security as follows: 1) the computation and communication cost is very low; 2) a user can freely choose and change his own password; 3) the privacy of users can be protected; 4) it generates a session key agreed upon by the user and the server; 5) it provides both implicit key and explicit key confirmation; and 6) it can prevent the offline dictionary attack even if the secret information stored in a smart card is compromised. And yet, our scheme is simpler and more efficient for smart card authentication.
International Journal of Advanced Research in Computer Science, Apr 30, 2017
Information Communication Technologies (ICT) practices are growing exponentially resulting in abu... more Information Communication Technologies (ICT) practices are growing exponentially resulting in abundant availability of computation, resources and processing are available abundantly at a specific cost. Over the last decade, cloud computing has been changed from connecting devices over internet to Internet of Things (IoT). IoT is commonly known as 'things' connected over internet for achieving a common goal such as processing, computation or information sharing. IoTs are connected devices such as RFID tags, sensors, mobile phones etc. having unique addressing schemes and coordinating computation to achieve a desired result. According to a study, it is expected that there will be 50 billion devices considered to be connected as IoT devices in distributed environment. Its applications are imminent in developing smart cities, smart retail markets, automated vehicles, real time traffic navigation, drone surveillance, environmental monitoring etc. Though there will be specific tradeoffs and costs implied over abundant availability of the computationally equipped devices. These tradeoffs may be resolved or become challenges in the growth and widespread adaptability of IoTs devices. Few of the issues include implementing framework, security, privacy, trust negotiation etc. In this paper, we discuss about IoT, its evolution, issues, concerns and challenges currently faced while implementing IoTs in distributed environment over the cloud.
Algorithms for Intelligent Systems, 2022
Algorithms for Intelligent Systems, 2022
Random numbers are sequences of integers which show absolutely no relation to each other anywhere... more Random numbers are sequences of integers which show absolutely no relation to each other anywhere in the sequence. Pseudo random numbers (PRNs) are random numbers which can be generated deterministically. Pseudo random numbers are widely used in cryptographic protocols to provide secrecy. A wide variety of pseudo random number generators (PRNGs) were proposed earlier which exhibit characteristics of PRNG and generate pseudo random numbers. In this paper, we propose a temporal based algorithm to generate pseudo random numbers. Our algorithm utilizes dynamic system clock and product of two large prime numbers generated randomly. Using dynamic system clock, we ensure that the seed is obtained from entropy source of some physical phenomenon and product of large prime numbers generated randomly ensure randomness of generated numbers. Our algorithm is easy to implement on any computing device and can be used for generating sequence of pseudo random numbers for desired purpose.
Integration of WSNs into Internet of Things, 2021
International Journal of Advanced Research in Computer Science, 2018
In Information & Communication Technology (ICT), communication plays vital role in current era of... more In Information & Communication Technology (ICT), communication plays vital role in current era of technology. Nowadays, ICT is being used among huge population to communicate for different purposes. For security reason, several security mechanisms are taken as standard in different communication technologies. However, security mechanisms only prevent the attack or sometimes reduce the intensity/loss of the damage incurred by the attack. Several attacks have evolved over last two decades as a result of the inability to reduce the intensity/loss of the damage imposed by these attacks. Among lots of attacks, one such attack became very popular because of its impact, lack of knowledge/awareness to prevent it from occurring and technological advancement of the concept used in it. The attack was evolved from Malware and is now commonly called as Ransomware. It is a malware that can encrypt all data of a user and make it inaccessbile to the user unless a ransom amount is paid. The widespre...
Proceedings of ICETIT 2019, 2019
In cloud environment, huge amount of data is stored in data centers. These data are generated fro... more In cloud environment, huge amount of data is stored in data centers. These data are generated from numerous sources such as social media, social networking and others. These data are generally in form of text, image, audio or video. These data are exponentially increasing due to huge amount of multiple streams generating these data at every millisecond. Many of these data are permanently stored in data centers over cloud and rarely used. However, all of the data stored in data centers over cloud are encrypted using some encipherment mechanisms for providing security objectives. There are several mechanisms used for encipherment such as DES, RSA etc. Using any of these encipherment mechanisms involve huge amount of cost. The cost is usually borne by the service provider. In this paper, we devised a novel method for scalable security based on data classification using Generalized RSA-AA using 2n prime numbers. The objective of proposing a scalable security model based on Generalized R...
RECENT ADVANCES IN SCIENCES, ENGINEERING, INFORMATION TECHNOLOGY & MANAGEMENT
Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India
Sustainability is the need of the hour to preserve global resources for future generation. As tec... more Sustainability is the need of the hour to preserve global resources for future generation. As technologically, we are advancing in such a manner, where exploitation of natural resources has become obvious. Sustenance is required to live healthy and happily. Sustainable development is one the most trending topic globally and due to involvement of United Nations, Sustainable Development Goals (SDGs) were set up in 2015 by the United Nations General Assembly and are intended to be achieved by the year 2030. In this paper, a review has been conducted on sustainability, need and importance of sustainable development, SDGs, current global status of SDGs, application domain of SDGs. Further, a suggestive methodology has been proposed to be performed by humans in their workplace so that they as individuals can also contribute towards achieving these SDGs.
International Journal of Innovative Technology and Exploring Engineering, 2020
Fog computing brings cloud services closer to the network’s Edge. Despite various applications in... more Fog computing brings cloud services closer to the network’s Edge. Despite various applications in today’s world, these applications lack in data security aspects. Developers have few solutions that need to be tested thoroughly. Data encipherment is one of the most popular mechanisms to protect data confidentiality, data integrity, etc. We propose two steps flexible dynamic scalable model in which the system will dynamically choose an encryption mechanism depending on the access frequency of data being encrypted. If data is frequently accessed, then the model will choose the algorithm with minimum computational complexity. In next step, model will use a scalable approach to decide the security strength needed by determining size of encryption key. A longer key will be used to encrypt more sensitive and secretive data automatically by security model and a smaller key will be used to encrypt public data or less sensitive, saving the fog node from computation overload. Our model is more...
International Journal of Innovative Technology and Exploring Engineering, 2020
Social Network becomes widely accepted by the users and active communication tool in 21st century... more Social Network becomes widely accepted by the users and active communication tool in 21st century. In this paper, we use test data of Twitter, for sentiment analysis. Users may post vulnerable tweets which can result in threats; hence we analyze these tweets to determine threat warnings from specific group of users or organizations. We discuss brief literature review and present our methodology for doing sentiment analysis. We find several users most active and regularly mentioning other users. Based on our results, we present our analysis in the paper. Dataset was requested from Kaggle for research purposes.
CRC Press eBooks, May 25, 2022
Sensors
With the rapid development of deep learning techniques, new innovative license plate recognition ... more With the rapid development of deep learning techniques, new innovative license plate recognition systems have gained considerable attention from researchers all over the world. These systems have numerous applications, such as law enforcement, parking lot management, toll terminals, traffic regulation, etc. At present, most of these systems rely heavily on high-end computing resources. This paper proposes a novel memory and time-efficient automatic license plate recognition (ALPR) system developed using YOLOv5. This approach is ideal for IoT devices that usually have less memory and processing power. Our approach incorporates two stages, i.e., using a custom transfer learned model for license plate detection and an LSTM-based OCR engine for recognition. The dataset that we used for this research was our dataset consisting of images from the Google open images dataset and the Indian License plate dataset. Along with training YOLOv5 models, we also trained YOLOv4 models on the same da...
Computational Intelligence and Neuroscience
In recent years, the application of various recommendation algorithms on over-the-top (OTT) platf... more In recent years, the application of various recommendation algorithms on over-the-top (OTT) platforms such as Amazon Prime and Netflix has been explored, but the existing recommendation systems are less effective because either they fail to take an advantage of exploiting the inherent user relationship or they are not capable of precisely defining the user relationship. On such platforms, users generally express their preferences for movies and TV shows and also give ratings to them. For a recommendation system to be effective, it is important to establish an accurate and precise relationship between the users. Hence, there is a scope of research for effective recommendation systems that can define a relationship between users and then use the relationship to enhance the user experiences. In this research article, we have presented a hybrid recommendation system that determines the degree of friendship among the viewers based on mutual liking and recommendations on OTT platforms. Th...
Security and Communication Networks, 2016
Cryptography is used for secure communication since ancient days for providing confidentiality, i... more Cryptography is used for secure communication since ancient days for providing confidentiality, integrity and availability of the information. Public key cryptography is a classification of cryptography having pair of keys for encryption and decryption. Public key cryptography provides security and authentication using several algorithms. The Rivest-Shamir-Adleman (RSA) algorithm is prominent since its inception and is widely used. Several modified schemes were introduced to increase security in the RSA algorithm involving additional complexity. In this paper, we introduce a generalized algorithm over RSA that is advanced, adaptable and scalable in using a number of primes. Our algorithm uses 2 k prime numbers with secure key generation involving additional complexity, making it computationally infeasible to determine decryption key. A user can use 4, 8, 16, 32, … (2 k) prime numbers for generating public and private components securely. In our algorithm, public key and private key components are generated by making use of N, where N is a function of 2 k prime numbers. When an attacker obtains a public key component n out of {E, n} by using factorization techniques such as general number field sieve or elliptic curve factorization, he or she can only obtain two initial prime numbers (because n is a product of the first two prime numbers). However, finding the remaining prime numbers is computationally infeasible as no relevant information is available to the attacker. Hence, it is difficult for the attacker to determine the private key component D out of {D, n} knowing the public key component {E, n}. Thus, it is practically impossible to break our system using a brute force attack.
International Journal of Computer Applications, 2016
In today's digital era, users are increasingly accessing countless number of applications every d... more In today's digital era, users are increasingly accessing countless number of applications every day. For accessing these services, the users first have to authenticate themselves and need to maintain a separate set of username and password for each application. This led to the development of Single Sign On (SSO). This paper presents review on SSO enabling technologies and discusses SSO architectures, protocols and analysis related to growing use of SSO.
International Journal of Computer Applications, 2016
International Journal of Computer Applications, 2015
International Journal of Computer Applications, 2010
Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and fin... more Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key techniques for its small key size and high security and is suitable for secure access of smart cards because implementation on smart cards is challenging due to memory, bandwidth, and computation constraints. In this paper, we proposed a passwordauthenticated key agreement scheme based on ECC. Our scheme provides more guarantees in security as follows: 1) the computation and communication cost is very low; 2) a user can freely choose and change his own password; 3) the privacy of users can be protected; 4) it generates a session key agreed upon by the user and the server; 5) it provides both implicit key and explicit key confirmation; and 6) it can prevent the offline dictionary attack even if the secret information stored in a smart card is compromised. And yet, our scheme is simpler and more efficient for smart card authentication.
International Journal of Advanced Research in Computer Science, Apr 30, 2017
Information Communication Technologies (ICT) practices are growing exponentially resulting in abu... more Information Communication Technologies (ICT) practices are growing exponentially resulting in abundant availability of computation, resources and processing are available abundantly at a specific cost. Over the last decade, cloud computing has been changed from connecting devices over internet to Internet of Things (IoT). IoT is commonly known as 'things' connected over internet for achieving a common goal such as processing, computation or information sharing. IoTs are connected devices such as RFID tags, sensors, mobile phones etc. having unique addressing schemes and coordinating computation to achieve a desired result. According to a study, it is expected that there will be 50 billion devices considered to be connected as IoT devices in distributed environment. Its applications are imminent in developing smart cities, smart retail markets, automated vehicles, real time traffic navigation, drone surveillance, environmental monitoring etc. Though there will be specific tradeoffs and costs implied over abundant availability of the computationally equipped devices. These tradeoffs may be resolved or become challenges in the growth and widespread adaptability of IoTs devices. Few of the issues include implementing framework, security, privacy, trust negotiation etc. In this paper, we discuss about IoT, its evolution, issues, concerns and challenges currently faced while implementing IoTs in distributed environment over the cloud.
Algorithms for Intelligent Systems, 2022
Algorithms for Intelligent Systems, 2022
Random numbers are sequences of integers which show absolutely no relation to each other anywhere... more Random numbers are sequences of integers which show absolutely no relation to each other anywhere in the sequence. Pseudo random numbers (PRNs) are random numbers which can be generated deterministically. Pseudo random numbers are widely used in cryptographic protocols to provide secrecy. A wide variety of pseudo random number generators (PRNGs) were proposed earlier which exhibit characteristics of PRNG and generate pseudo random numbers. In this paper, we propose a temporal based algorithm to generate pseudo random numbers. Our algorithm utilizes dynamic system clock and product of two large prime numbers generated randomly. Using dynamic system clock, we ensure that the seed is obtained from entropy source of some physical phenomenon and product of large prime numbers generated randomly ensure randomness of generated numbers. Our algorithm is easy to implement on any computing device and can be used for generating sequence of pseudo random numbers for desired purpose.
Integration of WSNs into Internet of Things, 2021
International Journal of Advanced Research in Computer Science, 2018
In Information & Communication Technology (ICT), communication plays vital role in current era of... more In Information & Communication Technology (ICT), communication plays vital role in current era of technology. Nowadays, ICT is being used among huge population to communicate for different purposes. For security reason, several security mechanisms are taken as standard in different communication technologies. However, security mechanisms only prevent the attack or sometimes reduce the intensity/loss of the damage incurred by the attack. Several attacks have evolved over last two decades as a result of the inability to reduce the intensity/loss of the damage imposed by these attacks. Among lots of attacks, one such attack became very popular because of its impact, lack of knowledge/awareness to prevent it from occurring and technological advancement of the concept used in it. The attack was evolved from Malware and is now commonly called as Ransomware. It is a malware that can encrypt all data of a user and make it inaccessbile to the user unless a ransom amount is paid. The widespre...
Proceedings of ICETIT 2019, 2019
In cloud environment, huge amount of data is stored in data centers. These data are generated fro... more In cloud environment, huge amount of data is stored in data centers. These data are generated from numerous sources such as social media, social networking and others. These data are generally in form of text, image, audio or video. These data are exponentially increasing due to huge amount of multiple streams generating these data at every millisecond. Many of these data are permanently stored in data centers over cloud and rarely used. However, all of the data stored in data centers over cloud are encrypted using some encipherment mechanisms for providing security objectives. There are several mechanisms used for encipherment such as DES, RSA etc. Using any of these encipherment mechanisms involve huge amount of cost. The cost is usually borne by the service provider. In this paper, we devised a novel method for scalable security based on data classification using Generalized RSA-AA using 2n prime numbers. The objective of proposing a scalable security model based on Generalized R...