Poonam Lohiya - Academia.edu (original) (raw)

Papers by Poonam Lohiya

Research paper thumbnail of Blockchain Based Secrete Key And Transaction Storage System For Documents Stored On Cloud

Cloud document storage is becoming very popular, cost efficient and secure nowadays. Though cloud... more Cloud document storage is becoming very popular, cost efficient and secure nowadays. Though cloud is very cost-efficient storage, the documents are accessible to service providers. Many literatures are available for document security in cloud. In most of the literatures, document encryption technique is described using different algorithms. Encrypting documents before storage is a good idea, but if encrypted documents as well as the secrete keys both are maintained on cloud server only, there is a possibility of leakage as the cloud service provider is an honest but curious entity. So, it can be a big risk if we maintain documents as well as their keys on cloud. On the other hand, if we apply unbreakable encryption on documents before storing on cloud then the searching over documents will be critical. Therefore, in this paper we focus on cloud document security as well as searching over cloud documents using AES algorithm, Caesar algorithm and blockchain technology.

Research paper thumbnail of Real-time Scheduler For Wireless Sensor Network : A Review

With the great advancement in the area of embedded systems and sensor technology, a wireless sens... more With the great advancement in the area of embedded systems and sensor technology, a wireless sensor networks (WSNs) attract a great deal of research attention and this technology are widely used in the number of applications related to variety of fields including military, healthcare monitoring, biological, home, vehicular monitoring, infrastructure monitoring, building energy monitoring and industrial sensing. Many of applications in WSNs are real time applications that are requested to run in real time way. To support such real time applications we need Real Time Operating System (RTOS) which provides logically correct results and also deadline has to be met. This paper presents an overview of existing work in sensornet operating system (OS) design. Then, the specialties what sensornet OS should posses are discussed in detail. Next, we discuss scheduling algorithms to be used for real time systems. At last, we proposed Micro Controller OS-II (μC/OS-II) with Earliest Deadline First...

Research paper thumbnail of A Survey On Web Search Result Clustering And Engines

Now a days World Wide Web is a very large distributed digital information space. The ability to s... more Now a days World Wide Web is a very large distributed digital information space. The ability to search and retrieve information from the Web efficiently and effectively is an enabling technology for realizing its full potential. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Web clustering engines organize search results by topic, thus offering a complementary view to the flat-ranked list returned by conventional search engines. This paper highlights the main characteristics of a number of existing Web clustering engines and also discuss how to evaluate their retrieval performance.

Research paper thumbnail of Light Weight Defense Mechanism Against Camera Based Attacks

IRA-International Journal of Technology & Engineering, 2017

A number of android security and privacy vulnerabilities have been exposed in past several years.... more A number of android security and privacy vulnerabilities have been exposed in past several years. However, the mobile malware and privacy leakage remain a big threat to mobile phone security and privacy. It has been observed that phone camera would become a traitor in such attacks by capturing photos or videos secretly. Secret photography is not only immoral but also illegal due to invasion of privacy. Phone users themselves could also become victims and if the phone camera is exploited by malicious spy camera app, it may cause serious security and privacy problems. Most of the existing mobile antivirus apps are unable to monitor such camera based attacks. Hence, we demonstrate two camera based attacks through our proposal namely, Remote controlled real time monitoring Attack like Screen unlocking Attack, SMS Attack. We also propose a light weight defense scheme as a countermeasure for the camera attacks that can protect android phones against harmful spy Camera attacks.

Research paper thumbnail of Information retrieval system based on ontology

2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016

Over the years, the volume of information available through the world wide web has been increasin... more Over the years, the volume of information available through the world wide web has been increasing continuously, and never has so much information readily available and shared among so many people. Unfortunately, the unstructured nature and huge volume of information accessible over network have made it difficult for users to shift through and find relevant information. The information retrievals commonly used are based on keywords. These techniques used keyword lists to describe the content of information, but one problem with such list is that they do not say anything about the symantic relationships between keywords, nor do they take into account the meaning of words or phrases.

Research paper thumbnail of Blockchain Based Secrete Key And Transaction Storage System For Documents Stored On Cloud

Cloud document storage is becoming very popular, cost efficient and secure nowadays. Though cloud... more Cloud document storage is becoming very popular, cost efficient and secure nowadays. Though cloud is very cost-efficient storage, the documents are accessible to service providers. Many literatures are available for document security in cloud. In most of the literatures, document encryption technique is described using different algorithms. Encrypting documents before storage is a good idea, but if encrypted documents as well as the secrete keys both are maintained on cloud server only, there is a possibility of leakage as the cloud service provider is an honest but curious entity. So, it can be a big risk if we maintain documents as well as their keys on cloud. On the other hand, if we apply unbreakable encryption on documents before storing on cloud then the searching over documents will be critical. Therefore, in this paper we focus on cloud document security as well as searching over cloud documents using AES algorithm, Caesar algorithm and blockchain technology.

Research paper thumbnail of Real-time Scheduler For Wireless Sensor Network : A Review

With the great advancement in the area of embedded systems and sensor technology, a wireless sens... more With the great advancement in the area of embedded systems and sensor technology, a wireless sensor networks (WSNs) attract a great deal of research attention and this technology are widely used in the number of applications related to variety of fields including military, healthcare monitoring, biological, home, vehicular monitoring, infrastructure monitoring, building energy monitoring and industrial sensing. Many of applications in WSNs are real time applications that are requested to run in real time way. To support such real time applications we need Real Time Operating System (RTOS) which provides logically correct results and also deadline has to be met. This paper presents an overview of existing work in sensornet operating system (OS) design. Then, the specialties what sensornet OS should posses are discussed in detail. Next, we discuss scheduling algorithms to be used for real time systems. At last, we proposed Micro Controller OS-II (μC/OS-II) with Earliest Deadline First...

Research paper thumbnail of A Survey On Web Search Result Clustering And Engines

Now a days World Wide Web is a very large distributed digital information space. The ability to s... more Now a days World Wide Web is a very large distributed digital information space. The ability to search and retrieve information from the Web efficiently and effectively is an enabling technology for realizing its full potential. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Web clustering engines organize search results by topic, thus offering a complementary view to the flat-ranked list returned by conventional search engines. This paper highlights the main characteristics of a number of existing Web clustering engines and also discuss how to evaluate their retrieval performance.

Research paper thumbnail of Light Weight Defense Mechanism Against Camera Based Attacks

IRA-International Journal of Technology & Engineering, 2017

A number of android security and privacy vulnerabilities have been exposed in past several years.... more A number of android security and privacy vulnerabilities have been exposed in past several years. However, the mobile malware and privacy leakage remain a big threat to mobile phone security and privacy. It has been observed that phone camera would become a traitor in such attacks by capturing photos or videos secretly. Secret photography is not only immoral but also illegal due to invasion of privacy. Phone users themselves could also become victims and if the phone camera is exploited by malicious spy camera app, it may cause serious security and privacy problems. Most of the existing mobile antivirus apps are unable to monitor such camera based attacks. Hence, we demonstrate two camera based attacks through our proposal namely, Remote controlled real time monitoring Attack like Screen unlocking Attack, SMS Attack. We also propose a light weight defense scheme as a countermeasure for the camera attacks that can protect android phones against harmful spy Camera attacks.

Research paper thumbnail of Information retrieval system based on ontology

2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016

Over the years, the volume of information available through the world wide web has been increasin... more Over the years, the volume of information available through the world wide web has been increasing continuously, and never has so much information readily available and shared among so many people. Unfortunately, the unstructured nature and huge volume of information accessible over network have made it difficult for users to shift through and find relevant information. The information retrievals commonly used are based on keywords. These techniques used keyword lists to describe the content of information, but one problem with such list is that they do not say anything about the symantic relationships between keywords, nor do they take into account the meaning of words or phrases.