Affiliation:
1. Department of CSE, SRM Institute of Science and Technology, Chennai, Tamilnadu, India
2. Department of Computational Intelligence, SRM Institute of Science and Technology, Chennai, Tamilnadu, India
Abstract
Because significantly complex crypto procedures such as holomorphic encryption are robotically applied, despite the fact that consumer gadgets under our software circumstances are not, computational overhead is outrageously high. Simply hiding customers with the aid of nameless communications to act to protect the server and adversaries from linking suggestions made with the aid of the same customer makes the traditional method, which computes with the aid of any server based on the amount of provided services, impossible, and customers with charge features widely publicised with the aid of the server cause additional security concerns, impossible. To overcome the above existing drawbacks, this research study presents a Privacy Preservation Data Collection and Access Control Using Entropy-Based Conic Curve. To safeguard the identity of clients and their requests, EBCC employs a unique group signature technic and an asymmetric cryptosystem. First, we ought to implement our EBCC method for data acquisition while maintaining privacy. Second, we consider looking at the properties of secure multiparty computation. EBCC employs lightweight techniques in encryption, aggregation, and decryption, resulting in little computation and communication overhead. Security research suggests that the EBCC is safe, can withstand collision attacks, and can conceal consumer distribution, which is required for fair balance checks in credit card payments. Finally, the results are analysed to illustrate the proposed method performance in addition to the more traditional ABC, AHRPA, ECC, and RSA methods. The proposed work should be implemented in JAVA.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference32 articles.
1. A secure and verifiable access control scheme for big data storage in clouds;Hu;IEEE Transactions on Big Data,2017
2. Credit card default prediction using artificial neural networks;Hassan;GIS Science Journal,2020
3. Prediction of default probability of credit-card bills;Ma;Open Journal of Business and Management,2020
4. Default prediction in P2P lending from high-dimensional data based on machine learning,;Zhou;Physica A: Statistical Mechanics and its Applications,2019
5. Simulating data stories of clients’ credit card default;Salleh;Applications of Modelling and Simulation,2021
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Transaction Mechanism of Measurement and data Privacy;2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT);2023-10-20