SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Compressive Sensing Based Simultaneous Data
Compression and Convergent Encryption for
Secure Deduplication
M. Tanooj Kumar Dr. M. Babu Reddy
Research Scholar Assistant Professor
Department of Computer Science Department of Computer Science
Krishna University Krishna University
Machilipatnam, India Machilipatnam, India
Abstract -- This paper proposes a new compressive
sensing based method for simultaneous data
compression and convergent encryption for secure
deduplication to efficiently use for the cloud storage. It
performs signal acquisition, its compression and
encryption at the same time. The measurement matrix
is generated using a hash key and is exploited for
encryption. It seems that it is very suitable for the cloud
model considering both the data security and the
storage efficiently.
Keywords –Convergent Encryption, Compressive Sensing,
Sparsity, Measurement Matrix, Deduplication, Cloud
storage.
I.INTRODUCTION
Enterprises, Organizations and Individuals
outsource data storage to cloud storage because of its
less maintenance, accessibility, disaster recovery and
cost savings. A survey [1] publishes that nearly 75%
of our digital world is a copy - in other words, solely
25% is unique. Keeping it in view, most of the Cloud
Storage Providers (CSP’s) have taken up the data de-
duplication, a way that avoids the storage of single
data copy multiple times. Several data deduplication
schemes have been proposed by the researchers [2]
show how data deduplication minimizes redundant
data and maximize space savings.
To outsource data optimally and securely,
the data is compressed and encrypted. Conventional
cryptography is not suitable with data de-duplication.
In conventional cryptography, users will encrypt /
decrypt the data with their individual keys. If
conventional cryptography is used, identical data
copies {of totally different or of various} users can
create different cipher-texts, causes the data de-
duplication impossible. To resolve this problem, most
of the researchers use Convergent Encryption [3] to
produce identical cipher text from identical plaintext.
The major difficulty with the existing
compression and encryption methods is the
performance and the complexity of using two
different processes [4, 5, 6]. To resolve the problem,
a new compressive sensing based method is proposed
for simultaneous data compression and convergent
encryption for secure de-duplication, which is useful
for effective utilization of cloud storage. This method
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
144 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
performs both encryption and compression at the
same time and decreases the processing time.
The reminder of this paper is as following.
Section 2 provides background; Section 3 gives the
design and implementation of our deduplication
framework; Section 4 evaluates the implementation;
and, finally, we mention conclusion in Section 5.
II. BACKGROUND
A) Convergent Encryption
In convergent Encryption, any user derives
the convergent key from the data and encrypts the
data with the key derived. By applying this
technique, two users with same plain texts will obtain
the same cipher text because the encryption key is the
same; hence the CSP will be able to perform de-
duplication on such cipher texts. Furthermore, Users
need not interact with each other for establishing an
agreement on the key because the key is generated
deterministically and users have to retain and protect
the encryption keys. Therefore, convergent
encryption becomes a good and efficient technique
for the selection of encryption and deduplication in
the cloud storage [6].
B) Compressive sensing (CS)
In compressive sensing, the input signal (x)
with N samples is converted into some domain (DCT,
DFT etc.), in which the signal(x) has sparse
representation, produces K-sparse signal. Where K is
the largest coefficients, which contains the large
portion of information about the signal, obtained
using thresolding. Finally,to produce the compressed
and encrypted signal, M-length measurement matrix,
the K-sparse signal is multiplied with sensing matrix
(Φ).
On the other side, different optimization techniques
are used for rebuilding the original signal. First
multiply the signal with sensing matrix, which gives
N samples from M measurements. Then K-sparse
signal is recovered by using convex optimization
techniques. Once again apply inverse scarcity to get
the original signal.
C) Chaotic Measurement Matrix
Chaotic sequence is used to construct the
measurement matrix, which has been proved to as
Toeplitz-structured and sufficient to satisfy Restricted
Isometry Property (RIP) with high probability.The
definitionof logistic map is
Xn+1 = μ xn(1_xn); xn ε (0,1) (1)
It becomes chaotic when μ ε [3.57, 4].
III. PROPOSED SYSTEM
The main aim of designing this system is to
introduce a simple simultaneous compression and
convergent encryption technique for optimized cloud
storage based on compressive sensing. In this
algorithm sampling, compression and encryption can
be done at the same time.
Assume that User selects a file to store it in
the cloud storage. The content of the file (message) is
changed into digital signal (x) utilizing extended
ASCII code. This accomplishes a 1D digital signal. If
the message is too long, it is divided to smaller
blocks (segments) which are encrypted separately.
Compute the hash value of the message by using
SHA-512 algorithm. If the file is not sufficiently
sparse, user uses some suitable basis (Ψ) to “sparsify”
its representation. Use hash value as key to generates
pseudo-random Chaotic measurement matrix Φ
(Hash key serves as a seed for Chaotic pseudo-
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
145 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
random number generator; using this generator, a
sequence of pseudo-random numbers is generated
and this sequence forms the columns of the
measurement matrix).
The Simultaneous Compression-Convergent
Encrypted signal is produced by multiplying the
sparse signal (x) with a random chaotic measurement
matrix (Φ). The resultant signal has a lower
dimension than initial sparse signal. Mathematically,
the compressed-encrypted signal (y) is given by y=Φ
x. The signal thus obtained is not sparse. The
resultant signal (y) is sent to the server. It is
important to note that the random matrix (Φ), which
acts as secret key,is not sent along with the cipher
text. The proposed method is shown in Algorithm1.
Algorithm 1: CS based Convergent
Encryption
Input: File Selected
Output: File Uploaded to Cloud
Procedure: CS based Convergent Encryption
begin CS-Based-Convergent-Encryption
/* select file to upload */
Sparse representation of the file (content) of
order N x1
Generate Hash value of the file (content)
Generate µ of chaotic based on Hash Value
Generate Chaotic Measurement Matrix of order
M x N
Multiply chaotic measurement matrix with
sparse representation of file (content)
Develop an M-dimensional measurement vector
end
Whenever user requests the same fie, user has to
perform decompress-decrypt the message.
Decryption of the message is done by using a greedy
algorithm (either orthogonal matching pursuit
(OMP), or matching pursuit (MP), or greedy LS etc.)
or convex relaxation algorithm (basis pursuit (BP))
with the following: random matrix encryption (Φ),
the encrypted message (the cipher text) Y, and the
base for sparsity Ψ. Any extremely small decryption
error can be corrected by rounding the decrypted
values to the nearest integer values because extended
ASCII code is built from integers.
IV. EXPERIMENTAL RESULTS
This part shows simple examples of simultaneous
compression–convergent encryption based on
compressed sensing. Let assume that the message of
the text file is
TOTO JE TAJNY VZKAZ PRO BOBA
(The message is in Czech with the meaning “This is a
secret message for Bob”). After assigning the
Extended ASCII code to each character in the
message, The binary code forms a vector of length
216; 81 vector elements are non-zero so this vector
has relative sparsity 0.375. It was checked
experimentally that measurement matrix (generated
with secret key) must have at least compression ratio
0:8 (i. e. matrix size 173 x 216) for successful
reconstruction of message.
V. CONCLUSIONS
This paper presents a possibility of using
compressed sensing for simultaneous compression
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
146 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
and convergent encryption. Chaotic Measurement
matrix (in CS) is generated according to the hash key
and it is used also for convergent encryption. Results
show that this algorithm can provide good security
and compression performance.
REFERENCES
[1] I.D. Corporation, The digital universe – are you
ready? Online 2010.
[2] Wen Xia., Hong jiang, Dan Feng et al., A
comprehensive study of the past, present, and future
of data deduplication, Proceedings of IEEE, Vol. No
104(9), (2016).
[3] Madhuri Kavade, A.C. Lomte, Secure De-
dulication using convergent keys (convergent
cryptography) for cloud storage., International
Journal of computer Applications, Vol. 126(10),
(2015).
[4] Adrain, Monica Fira, Marius Daniel, Compressed
sensing based Encryption approach for tax forms
data, International Journal of Advanced Research in
Artificial Intelligence, Vol. 4(11), (2015).
[5] Nanrun Zhou, Aidi Zhang, Fen Zheng, Lihua
Gong, Novel image compression-encryption hybrid
algorithm based on Key-controlled measurement
matrix in compressive sensing, Optics & Laser
Technology, Vol. 62, (2014).
[6] Wang et al., Simultaneous encryption and
compression of medical images based on optimized
tensor compressed sensing, Bio Med Engg. online
(2016).
AUTHOR PROFILES
M. Tanooj Kumar is presently
pursuing Ph.D from Krishna
University, working as Assistant
professor in Department of CSE, K. L.
University, Vaddeswaram. His Research interest
includes Internet of Things, Information security and
privacy. He is a member of IETE.
Dr. M. Babu Reddy, Assistant
Professor and Head of the Department
(I/C), Department of Computer
Science, Krishna University,
Macilipatnam. Completed his Ph.D in CSE from
Acharya Nagarjuna University. His Research Interest
includes Software Engineering, Data Mining, Neural
Networks and Machine Learning. He is a member of
IEEE, CSI, ISTE and African Computational Society.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
147 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

Contenu connexe

Tendances

Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networksIAEME Publication
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONIJCNCJournal
 
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...ijaia
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...IOSR Journals
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryptionNamit Sinha
 
Template Protection with Homomorphic Encryption
Template Protection with Homomorphic EncryptionTemplate Protection with Homomorphic Encryption
Template Protection with Homomorphic EncryptionTolun Tosun
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
 

Tendances (19)

Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
 
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
Data Mining Un-Compressed Images from cloud with Clustering Compression techn...
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
A1804010105
A1804010105A1804010105
A1804010105
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
Template Protection with Homomorphic Encryption
Template Protection with Homomorphic EncryptionTemplate Protection with Homomorphic Encryption
Template Protection with Homomorphic Encryption
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 

Similaire à Compressive Sensing Based Simultaneous Data Compression and Convergent Encryption for Secure Deduplication

Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874hemant gupta
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security byIJNSA Journal
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Eswar Publications
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED
 

Similaire à Compressive Sensing Based Simultaneous Data Compression and Convergent Encryption for Secure Deduplication (20)

Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security by
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
L017217579
L017217579L017217579
L017217579
 
G04433953
G04433953G04433953
G04433953
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Compressive Sensing Based Simultaneous Data Compression and Convergent Encryption for Secure Deduplication

  • 1. Compressive Sensing Based Simultaneous Data Compression and Convergent Encryption for Secure Deduplication M. Tanooj Kumar Dr. M. Babu Reddy Research Scholar Assistant Professor Department of Computer Science Department of Computer Science Krishna University Krishna University Machilipatnam, India Machilipatnam, India Abstract -- This paper proposes a new compressive sensing based method for simultaneous data compression and convergent encryption for secure deduplication to efficiently use for the cloud storage. It performs signal acquisition, its compression and encryption at the same time. The measurement matrix is generated using a hash key and is exploited for encryption. It seems that it is very suitable for the cloud model considering both the data security and the storage efficiently. Keywords –Convergent Encryption, Compressive Sensing, Sparsity, Measurement Matrix, Deduplication, Cloud storage. I.INTRODUCTION Enterprises, Organizations and Individuals outsource data storage to cloud storage because of its less maintenance, accessibility, disaster recovery and cost savings. A survey [1] publishes that nearly 75% of our digital world is a copy - in other words, solely 25% is unique. Keeping it in view, most of the Cloud Storage Providers (CSP’s) have taken up the data de- duplication, a way that avoids the storage of single data copy multiple times. Several data deduplication schemes have been proposed by the researchers [2] show how data deduplication minimizes redundant data and maximize space savings. To outsource data optimally and securely, the data is compressed and encrypted. Conventional cryptography is not suitable with data de-duplication. In conventional cryptography, users will encrypt / decrypt the data with their individual keys. If conventional cryptography is used, identical data copies {of totally different or of various} users can create different cipher-texts, causes the data de- duplication impossible. To resolve this problem, most of the researchers use Convergent Encryption [3] to produce identical cipher text from identical plaintext. The major difficulty with the existing compression and encryption methods is the performance and the complexity of using two different processes [4, 5, 6]. To resolve the problem, a new compressive sensing based method is proposed for simultaneous data compression and convergent encryption for secure de-duplication, which is useful for effective utilization of cloud storage. This method International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 144 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. performs both encryption and compression at the same time and decreases the processing time. The reminder of this paper is as following. Section 2 provides background; Section 3 gives the design and implementation of our deduplication framework; Section 4 evaluates the implementation; and, finally, we mention conclusion in Section 5. II. BACKGROUND A) Convergent Encryption In convergent Encryption, any user derives the convergent key from the data and encrypts the data with the key derived. By applying this technique, two users with same plain texts will obtain the same cipher text because the encryption key is the same; hence the CSP will be able to perform de- duplication on such cipher texts. Furthermore, Users need not interact with each other for establishing an agreement on the key because the key is generated deterministically and users have to retain and protect the encryption keys. Therefore, convergent encryption becomes a good and efficient technique for the selection of encryption and deduplication in the cloud storage [6]. B) Compressive sensing (CS) In compressive sensing, the input signal (x) with N samples is converted into some domain (DCT, DFT etc.), in which the signal(x) has sparse representation, produces K-sparse signal. Where K is the largest coefficients, which contains the large portion of information about the signal, obtained using thresolding. Finally,to produce the compressed and encrypted signal, M-length measurement matrix, the K-sparse signal is multiplied with sensing matrix (Φ). On the other side, different optimization techniques are used for rebuilding the original signal. First multiply the signal with sensing matrix, which gives N samples from M measurements. Then K-sparse signal is recovered by using convex optimization techniques. Once again apply inverse scarcity to get the original signal. C) Chaotic Measurement Matrix Chaotic sequence is used to construct the measurement matrix, which has been proved to as Toeplitz-structured and sufficient to satisfy Restricted Isometry Property (RIP) with high probability.The definitionof logistic map is Xn+1 = μ xn(1_xn); xn ε (0,1) (1) It becomes chaotic when μ ε [3.57, 4]. III. PROPOSED SYSTEM The main aim of designing this system is to introduce a simple simultaneous compression and convergent encryption technique for optimized cloud storage based on compressive sensing. In this algorithm sampling, compression and encryption can be done at the same time. Assume that User selects a file to store it in the cloud storage. The content of the file (message) is changed into digital signal (x) utilizing extended ASCII code. This accomplishes a 1D digital signal. If the message is too long, it is divided to smaller blocks (segments) which are encrypted separately. Compute the hash value of the message by using SHA-512 algorithm. If the file is not sufficiently sparse, user uses some suitable basis (Ψ) to “sparsify” its representation. Use hash value as key to generates pseudo-random Chaotic measurement matrix Φ (Hash key serves as a seed for Chaotic pseudo- International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 145 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 3. random number generator; using this generator, a sequence of pseudo-random numbers is generated and this sequence forms the columns of the measurement matrix). The Simultaneous Compression-Convergent Encrypted signal is produced by multiplying the sparse signal (x) with a random chaotic measurement matrix (Φ). The resultant signal has a lower dimension than initial sparse signal. Mathematically, the compressed-encrypted signal (y) is given by y=Φ x. The signal thus obtained is not sparse. The resultant signal (y) is sent to the server. It is important to note that the random matrix (Φ), which acts as secret key,is not sent along with the cipher text. The proposed method is shown in Algorithm1. Algorithm 1: CS based Convergent Encryption Input: File Selected Output: File Uploaded to Cloud Procedure: CS based Convergent Encryption begin CS-Based-Convergent-Encryption /* select file to upload */ Sparse representation of the file (content) of order N x1 Generate Hash value of the file (content) Generate µ of chaotic based on Hash Value Generate Chaotic Measurement Matrix of order M x N Multiply chaotic measurement matrix with sparse representation of file (content) Develop an M-dimensional measurement vector end Whenever user requests the same fie, user has to perform decompress-decrypt the message. Decryption of the message is done by using a greedy algorithm (either orthogonal matching pursuit (OMP), or matching pursuit (MP), or greedy LS etc.) or convex relaxation algorithm (basis pursuit (BP)) with the following: random matrix encryption (Φ), the encrypted message (the cipher text) Y, and the base for sparsity Ψ. Any extremely small decryption error can be corrected by rounding the decrypted values to the nearest integer values because extended ASCII code is built from integers. IV. EXPERIMENTAL RESULTS This part shows simple examples of simultaneous compression–convergent encryption based on compressed sensing. Let assume that the message of the text file is TOTO JE TAJNY VZKAZ PRO BOBA (The message is in Czech with the meaning “This is a secret message for Bob”). After assigning the Extended ASCII code to each character in the message, The binary code forms a vector of length 216; 81 vector elements are non-zero so this vector has relative sparsity 0.375. It was checked experimentally that measurement matrix (generated with secret key) must have at least compression ratio 0:8 (i. e. matrix size 173 x 216) for successful reconstruction of message. V. CONCLUSIONS This paper presents a possibility of using compressed sensing for simultaneous compression International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 146 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 4. and convergent encryption. Chaotic Measurement matrix (in CS) is generated according to the hash key and it is used also for convergent encryption. Results show that this algorithm can provide good security and compression performance. REFERENCES [1] I.D. Corporation, The digital universe – are you ready? Online 2010. [2] Wen Xia., Hong jiang, Dan Feng et al., A comprehensive study of the past, present, and future of data deduplication, Proceedings of IEEE, Vol. No 104(9), (2016). [3] Madhuri Kavade, A.C. Lomte, Secure De- dulication using convergent keys (convergent cryptography) for cloud storage., International Journal of computer Applications, Vol. 126(10), (2015). [4] Adrain, Monica Fira, Marius Daniel, Compressed sensing based Encryption approach for tax forms data, International Journal of Advanced Research in Artificial Intelligence, Vol. 4(11), (2015). [5] Nanrun Zhou, Aidi Zhang, Fen Zheng, Lihua Gong, Novel image compression-encryption hybrid algorithm based on Key-controlled measurement matrix in compressive sensing, Optics & Laser Technology, Vol. 62, (2014). [6] Wang et al., Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing, Bio Med Engg. online (2016). AUTHOR PROFILES M. Tanooj Kumar is presently pursuing Ph.D from Krishna University, working as Assistant professor in Department of CSE, K. L. University, Vaddeswaram. His Research interest includes Internet of Things, Information security and privacy. He is a member of IETE. Dr. M. Babu Reddy, Assistant Professor and Head of the Department (I/C), Department of Computer Science, Krishna University, Macilipatnam. Completed his Ph.D in CSE from Acharya Nagarjuna University. His Research Interest includes Software Engineering, Data Mining, Neural Networks and Machine Learning. He is a member of IEEE, CSI, ISTE and African Computational Society. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 147 https://sites.google.com/site/ijcsis/ ISSN 1947-5500