International Journal of Mathematical Sciences and Computing (IJMSC)

IJMSC Vol. 10, No. 4, Dec. 2024

Cover page and Table of Contents: PDF (size: 611KB)

Table Of Contents

REGULAR PAPERS

Forecasting the Environmental Situation at Mining Company Treatment Facilities Based on Fuzzy Logic

By Oleg Ivashchuk Zhanat Kenzhebaeva Hanna Martyniuk

DOI: https://doi.org/10.5815/ijmsc.2024.04.01, Pub. Date: 8 Dec. 2024

This study analyzes wastewater treatment processes at a mining company in the Almaty region, Kazakhstan. Four treatment schemes were developed and assessed, with a focus on optimizing efficiency. The discharged water quality from different technological lines was evaluated using integral functions for a quantitative comparison of each scheme's performance. Additionally, an expert system was developed to validate the results and support future research in wastewater treatment.

[...] Read more.
Roman Domination in Semi-Middle Graphs: Insights and Applications in Computer Network Design

By R. Vinodhini T. N. M. Malini Mai

DOI: https://doi.org/10.5815/ijmsc.2024.04.02, Pub. Date: 8 Dec. 2024

Consider a G=(V,E) and the function f :V -{0,1,2}. . Unguarded with regard to is defined as a node u with  f (u) = 0  that is not next to a node with 1 or 2 . The function f (V0 ,V1,V2 ) fulfilling the condition, in which each node u for which f (u)=0 is adjoint to at least one node v to which f (v) =2 , is referred to be a Roman dominant function, known as RDF of a graph G . Roman domination number (RDN) of graph represented by rR (G), is the bare lowest count of guards that must be employed in any RDF. In this paper, we introduce a new form for graph called Semi-Middle Graph for any given graph and we find the RDN for the Semi - Middle Graph of some specific graphs. In the field of networking, the concept of the Semi-Middle Graph can be applied to network topology optimization. Specifically, it can be used in the design of communication networks where each direct connection (edge) between two nodes (devices or routers) has an intermediary node that facilitates more efficient data routing or enhances fault tolerance. Usefulness of Roman Domination Number of a Semi-Middle Graph in Networking includes Network Coverage and Monitoring, Fault Tolerance and Redundancy, Optimal Placement of Relays and Routers, Load Balancing and Resource Allocation.

[...] Read more.
An Automated Solution for Secure Password Management

By Prageeth Fernando Navinda Dissanayake Venusha Dushmantha Chamara Liyanage Chamila Karunatilake

DOI: https://doi.org/10.5815/ijmsc.2024.04.03, Pub. Date: 8 Dec. 2024

This research paper introduces SecretCentric, an innovative automated hardware-based password management system addressing the challenges of widely used password authentication methods, which have long been criticized for their poor performance. Password management plays a crucial role in protecting users' digital security and privacy, with key factors including password generation, storage, renewal, and reuse mitigation. Although numerous password managers and solutions have been introduced to tackle these challenges, password management automation has never been thoroughly explored. This study aims to revolutionize the field by eliminating the burden of manual password management from users by automating the entire process. Upon concluding a comprehensive survey, insights into user perceptions of password management and prevalent malpractices were identified. SecretCentric was designed to maximize the security and usability trade-off aligning with identified user expectations. Preliminary evaluations indicate that SecretCentric offers significant improvements over existing options, highlighting the necessity for an automated solution that balances security and usability in the era of increasing online services. The system's success demonstrates the importance of proper password management rather than replacement, contributing to research advancement in user authentication and credential management.

[...] Read more.
Hive-Based Data Encryption for Securing Sensitive Data in HDFS

By Shivani Awasthi Narendra Kohli

DOI: https://doi.org/10.5815/ijmsc.2024.04.04, Pub. Date: 8 Dec. 2024

Big Data is a new class of technology that gives businesses more insight into their massive data sets, allowing them to make better business decisions and satisfy customers. Big data systems are also a desirable target for hackers due to the aggregation of their data. Hadoop is used to handle large data sets through reading and writing application programs on a distributed system. Hadoop Distributed File System is used to store massive data. Since HDFS does not safeguard data privacy, encrypting the file is the right way to protect the stored data in HDFS but takes a long time. In this paper, regarding privacy concerns, we use different compression-type data storage file formats with the proposed user-defined function (XOR-Onetime pad with AES) to secure data in HDFS. In this way, we provide a dual level of security by masking the selective data and whole data in the file. Our experiment demonstrates that the whole process time is significantly smaller than that of a conventional method. The proposed UDF with ORC, Zlib file format gives 9-10% better performance results than 2DES and other methods.  Finally, we decreased the load time of secure data and significantly improved query processing time with the Hive engine.

[...] Read more.
Authentication in VANETs with Conditional Privacy-Preserving Property Using Certificateless Aggregate Signature Schemes

By Parvin Rastegari

DOI: https://doi.org/10.5815/ijmsc.2024.04.05, Pub. Date: 8 Dec. 2024

In a Vehicular Ad Hoc Network (VANET), numerous vehicles are interconnected through a wireless network to facilitate communication. The primary objective of a VANET is to enhance driver safety and comfort by enabling the exchange of traffic-related messages within the vehicular environment. These messages can include vital information such as traffic conditions, accident alerts, and road hazards. However, addressing the security challenges in VANETs is paramount to avoid serious vulnerabilities that can compromise the entire network. One of the critical security challenges is conditional privacy-preserving authentication. This requirement mandates that each vehicle must be authenticated by other vehicles or Roadside Units (RSUs) while ensuring the privacy of the vehicle's identity. Moreover, it is essential to have the capability to trace a malicious user under specific conditions, such as in the event of a security breach or misuse of the network. In this research, we conduct an in-depth cryptanalysis of a recently proposed aggregate signature scheme designed for authentication in VANETs with conditional privacy-preserving property. Our analysis identifies the existing scheme is vulnerable against a malicious Key Generation Center (KGC) attacker, in contrast to the authors' claims. To address these issues, we propose a novel, secure, and efficient authentication scheme that maintains the conditional privacy-preserving property. We evaluate our scheme and provide a formal security proof within the Random Oracle Model (ROM). In addition to enhancing security, our scheme improves efficiency by reducing the computational and communication overhead typically associated with authentication processes in VANETs. This makes our solution not only secure but also practical for real-world deployment.

[...] Read more.