CFP last date
21 October 2024
Reseach Article

A Novel Approach using XMI Log Generation Cryptography and Mining Techniques for to Enhance Security of Data

by Gurpreet Kaundal, Sheveta Vashisht
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 10
Year of Publication: 2015
Authors: Gurpreet Kaundal, Sheveta Vashisht
10.5120/20190-2418

Gurpreet Kaundal, Sheveta Vashisht . A Novel Approach using XMI Log Generation Cryptography and Mining Techniques for to Enhance Security of Data. International Journal of Computer Applications. 115, 10 ( April 2015), 25-32. DOI=10.5120/20190-2418

@article{ 10.5120/20190-2418,
author = { Gurpreet Kaundal, Sheveta Vashisht },
title = { A Novel Approach using XMI Log Generation Cryptography and Mining Techniques for to Enhance Security of Data },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 10 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number10/20190-2418/ },
doi = { 10.5120/20190-2418 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:29.745105+05:30
%A Gurpreet Kaundal
%A Sheveta Vashisht
%T A Novel Approach using XMI Log Generation Cryptography and Mining Techniques for to Enhance Security of Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 10
%P 25-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the major issue in IT sector because data of an organization is an important asset for them. The information can be there client or customer contacts or it may be the information about their accounts, in short that information is very confidential information that they never want to disclose. But because of security attacks an attacker i. e. Hackers can access this information. Securities are required for network data and the database data. The all information is stores in the databases and the log of this information is also generated by the server. In the log files all information of users is stored, so the security of the log files is required. The log contains the all information of the users such as IP address, Mac address, Session time, Operating System etc. The hacker can hack the log and steal all the users' information and edit it and upload on the server to avoid intrusion detection. So, in this research work proposes an idea for to prevent these types of attacks of the hacker. This work proposes the security of log files with the XMI file because the XMI file is a secured file. Retrieving the contents of XMI file is not easy because the XMI file contains the very big library of the java named XMI. Java. The log file data converting it into XMI file then encrypt the XMI file data again; it provides the more security of data. This makes the information more secure.

References
  1. Wuliang Sun, Paul Grabow and Devon M. Simmonds (2013) "Web Mining: An Introduction",International Journal of Advanced Research in Computer Science and Software Engineering, pp. 683-687.
  2. Tomar Archana, Kumar Dubey Ashutosh and Richhariya Vineet (2011) "Novel Sensitive Information Preserving Mining (SIPM) Algorithm for Association Rule Mining in Centralized Database", IEEE, pp. 392-397.
  3. V. K. Deepa and J. Rexy R. Geetha (2013) "Rapid Development of Applications in Data Mining" IEEE-Proc. of International Conference on Green High Performance Computing.
  4. D. Karthikeswarant, V. M. Suresh and A. Javed Sultan (2012) "A Pattern Based Framework For Privacy Preservation Through Association Rule Mining", IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM) , pp. 816-821.
  5. Han, J. , and Kamber, M. (2006) "Data Mining: Concepts and Techniques", Morgan Kaufmann, India, p. 6-10, 33-34.
  6. Arun Singh and Dheeraj Sharma (2013) "Web Usage Mining: Discovery of Mined Data Patterns and their Applications",International Journal of Computer Science and Management Research. 2(5), pp. 2423-2429.
  7. Shaily G. Langhnoja, Mehul P. Barot and Darshak B. Mehta (2013) "Web Usage Mining to Discover Visitor Group with Common Behavior Using DBSCAN Clustering Algorithm", International Journal of Engineering and Innovative Technology (IJEIT). 2(7), pp. 169-173.
  8. Bernhard Hoisl, Stefan Sobernig and Mark Strembeck (2012)"Modeling and enforcing secure object ?ows in process-driven SOAs: an integrated model-driven approach", Springer-Verlag, pp. 816-821.
  9. Wuliang Sun, Eunjee Song, Paul Grabow and Devon M. Simmonds (2010) "XMI2USE: A Tool for Transforming XMI to USE Speci?cations",Springer, pp. 147-156.
  10. Kaur Gurtaptish, Malhotra Sheenam (2013) "A Hybrid Approach for Data Hiding using Cryptography Schemes", International Journal of Computer Trends and Technology (IJCTT). 4(8), pp. 2917-2923.
  11. Stallings, W. (2011). Cryptography and Network Security. India: Dorling Kindersley Pvt. Ltd.
  12. D. Manivannan and R. Sujarani (2010) "Light Weight and Secure Database Encryption Using TSFS Algorithm", International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1-7.
Index Terms

Computer Science
Information Sciences

Keywords

XMI Log Files RAS AES Data mining