Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seema Rawat is active.

Publication


Featured researches published by Seema Rawat.


international conference on computer communications | 2014

A novel based security architecture of cloud computing

Subham Kumar Gupta; Seema Rawat; Praveen Kumar

Cloud computing is considered as the future of IT organizations. In weigh against to conventional solutions where all type of computing services are controlled through any type of personnel controls, it transfers all computing resources to the centralized large data centers, so users can enjoy services in a large scale on demand. Chiefly small and medium-size organizations can manage their projects by using cloud-based services and also able to achieve productivity enhancement with limited budgets. But, apart from all of these benefits, it may not be fully trustworthy. Cloud Computing do not keep data on the users system, so there is a need of data security. The user pays progressively attention about data security due to this off-side storage of data on cloud computing. In order to retain confidentiality of data against un-trusted cloud service providers, There are so many approaches. All modern cloud service providers solve this problem by encryption and decryption techniques. They all have their merits and demerits. In present thesis, the basic dilemma of cloud computing security is inspected. We have also proposed a survey of various models for cloud security. To ensure the data security in the cloud, we suggest an efficient, accessible and adaptable cryptography based scheme. In-depth security and enactment inspection proved the proposed scheme as greatly efficient and robust against spiteful data alteration outbreak. The proposed scheme achieves scalability as well as flexibility due to its hierarchical structure.


international conference system modeling advancement research trends | 2016

Evaluating and exploring the MYO ARMBAND

Seema Rawat; Somya Vats; Praveen Kumar

Electromyography (EMG) is a technique that studies the electrical activity of the muscle. EMG is the basic component of Myo armband. The MYO ARMBAND is a device which can be used by humans to interact with computers. The myo armband involves the interaction of devices in VE (virtual environment). Working and characteristics of Myo are studied and analyzed. This paper surveys the work on visual analysis of gestures by using Myo armband and the input from keyboard and mouse. We have also performed two tests where participants are allowed to play a game, first by using keyboard and other by using MYO. Discussion and conclusion are also written at the end of this paper.


innovative applications of computational intelligence on power energy and controls with their impact on humanity | 2014

Analysis of security trends and control methods in Android platform

Payal Mittal; Bhawna Dhruv; Praveen Kumar; Seema Rawat

We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday lifes needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.


international conference system modeling advancement research trends | 2016

A performance based comparison of various symmetric cryptographic algorithms in run-time scenario

Praveen Kumar; Seema Rawat; Tanupriya Choudhury; Saurabh Pradhan

Today, with a wide use of internet all across the globe where it has become a significant tool of commerce, security and protection of information becomes a vital issue to deal with. Cryptography is a historical art and in basic terms it refers to the science of writing in secret and covert code. The first use of it dates back to centuries ago. Without any surprise, with the widespread development of computer communications the new forms of cryptography have emerged. It has always been used to safeguard and protect the military and diplomatic communication since its very inception. The primary objective of this paper is to define and briefly explain the fundamental terms and concepts regarding the cryptographic methods and also to assess the various cryptographic schemes that are in use today. It is imperative to mention that this paper is chiefly focussed on the concepts, schemes and terminologies and does not comprise the thesis of the entire field.


international conference on computer communications | 2015

Design and development of a prototype application for intrusion detection using data mining

Kalpana Jaswal; Praveen Kumar; Seema Rawat

In the world of communication, security is a big concern. Most of our crucial data is stored in a computer system and in most cases we exchange it over a network. But its not just our data transmitting over the network but different types of attacks too. These attacks can harm our stored data. Monitoring computer system and its logs (administration logs, security logs, system logs, network logs) and protecting our crucial data is necessary. For these necessities we use intrusion detection system. An intrusion detection system is an application that provides protection from malicious activities or policy violations and generates various rules to defend computer security. Intrusion detection system can be designed and developed on any platform but for its better functionality we are using data mining technique. In past years, many techniques have been introduced to improvise the detection rate. Earlier, in the initial stages of its designing, hardware had to be installed to detect and monitor the system. But, with the help of data mining it has become easier to work with software and algorithm development. In the recent trends, many new algorithms have been introduced to increase its efficiency. They are categorized under machine learning algorithms: supervised, unsupervised and hybrid. Though hybrid has not yet been categorized finely but various authors have used it by merging different machine learning algorithms. Machine learning algorithms provide a process of detecting intrusion and generating rules for its detection and prevention. Rule generation is defined by association rule mining and apriori algorithm. An intrusion detection system is not a new application but developing a prototype which will work for the saved logs (administration logs, security logs and system logs) and monitor network logs on host system as well as on client system, so that the Intrusion detection system can alert the user on regular basis, is. In this paper we are using a hybrid machine learning algorithm following with rule generation algorithm to detect the intrusion in the network logs by training KDD dataset. Training and Testing KDD data set provides the way of analyzing the actual behavior and predicted behavior of the network logs. This paper shows the methodology and results in Netbeans IDE 8.1(Java platform using Weka library). Through the obtained results, it can be interpreted that optimal performance is obtained against most attacks after detection.


computational intelligence | 2015

Dissection and Proposal of Multitudinal Security Threats and Menace in Cloud Computing

Seema Rawat; Bhawna Dhruv; Praveen Kumar; Payal Mittal

Cloud computing has emerged as a amazing field in IT world today. It fords all the impediment of computing technology and allows the working and storage of data over internet itself. It has allowed the IT workers to expand their business over internet giving a hike to capabilities and potential in the business field. But the question of security remains unanswered as till now all the IT firms have not accepted cloud completely. Business firms still fear to deploy their enterprise solely on cloud due to the security issues. In this paper, we study about issues in the cloud service delivery models and the various security issue faced in cloud computing. Based on this detailed study, we further provide recommendation that could be followed to conquer the security concerns in the cloud.


innovative applications of computational intelligence on power energy and controls with their impact on humanity | 2014

An implementation of opinion mining using fuzzy inference system

Rashmi Priyadarshi; Seema Rawat; Praveen Kumar

Opinion mining is a technique by which we can find the semantic strength of reviews on an object using Fuzzy Inference System. Today people use information space to broadcast their opinions or views on any object or situation across the world. Analyses of these views yield a very useful information i.e. overall thinking about any object or situation. In this paper we have taken data from social networking site facebook on samsung mobile phones for analysis. After applying FIS on data collected we will give overall view on Samsung mobile phones across the virtual reality.


Archive | 2018

A Proposed Maturity Model for Himachal Pradesh Government e-Services

Alpana Kakkar; Seema Rawat; Piyush Gupta; Sunil Kumar Khatri

With new leaps in the advancement of technology on a daily basis, it becomes quite essential that basic and necessary governmental services are provided through the internet as e-services. These are small steps to fulfil the dream of a “digitalized India”. This paper is an aim to provide a maturity model for the existing e-services of Himachal Pradesh (HP) government. Its central focus is on how to make the services easily accessible for the masses and improve their functionality by giving a detailed and sophisticated maturity model. The paper also lists the major concerns of information security in the e-service portal of Himachal Pradesh (HP) government and an attempt has been made to provide a solution for the same. The proposed solution herewith will help the government to improve the level of its e-services and the security of the portal.


Archive | 2018

Analytical Planning and Implementation of Big Data Technology Working at Enterprise Level

Pooja Pant; Praveen Kumar; Irshad Alam; Seema Rawat

Today, a number of technologies are available for building of Big Data architecture deciding which technology will provide the maximum value out of the architecture depending on the extensive study of the present architecture in use, the type of data being ingested, and the desired value expected by the enterprise. In this research paper, we highlight Big Data and its characteristic, Big Data architect, various technologies involved at different levels, pipeline architecture of Big Data architecture, technologies used, planning and designing, and challenges faced while building Big Data architecture at enterprise scale.


Archive | 2018

Eco-Friendly Green Computing Approaches for Next-Generation Power Consumption

Seema Rawat; Richa Mishra; Praveen Kumar

The term Green Computing is combination of two words which basically means usage of electronic devices in an efficient way. Green computing is a trend/study which came recently and is about building, designing and operating electronic devices to maximize the efficiency in terms of energy. Green computing includes the manufacturing and disposing of electronic devices including the computer resources such as the monitor, storage devices, CPU, associated subsystems, etc., without causing any ill effect to the environment. Also, one of the important aspects of green computing is recycling of the devices which are used worldwide in IT industry. This research paper highlights the advantageous use of green computing and its associated approaches through a survey conducted over power consumption in Amity University.

Collaboration


Dive into the Seema Rawat's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge