Search results

1 – 3 of 3
Article
Publication date: 8 January 2021

S. Vaithyasubramanian and R. Sundararajan

Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in…

Abstract

Purpose

Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in all authentication process, as the usage of computing facilities and electronic devices have developed hugely to access networks. Over the years with the increase in numerous Web developments and internet applications, each platform needs ID and password validation for individual users.

Design/methodology/approach

In the technological development of cloud computing, in recent times, it is facing security issues. Data theft, data security, denial of service, patch management, encryption management, key management, storage security and authentication are some of the issues and challenges in cloud computing. Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password. Markov passwords – a rule-based password formation are created or generated by using Markov chain. Representation of Markov password formation can be done by state space diagram or transition probability matrix. State space classification of Markov chain is one of the basic and significant properties. The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper. Analysis on strength of obvious password of length eight has shown range of 7%–9% although the converted Markov password has shown more than 82%. As an effective methodology, this password authentication can be implemented in cloud portal and password login validation process.

Findings

The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper.

Originality/value

Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 5 November 2021

Manimuthu Arunmozhi, Jinil Persis, V. Raja Sreedharan, Ayon Chakraborty, Tarik Zouadi and Hanane Khamlichi

As COVID-19 outbreak has created a global crisis, treating patients with minimum resources and traditional methods has become a hectic task. In this technological era, the rapid…

Abstract

Purpose

As COVID-19 outbreak has created a global crisis, treating patients with minimum resources and traditional methods has become a hectic task. In this technological era, the rapid growth of coronavirus has affected the countries in lightspeed manner. Therefore, the present study proposes a model to analyse the resource allocation for the COVID-19 pandemic from a pluralistic perspective.

Design/methodology/approach

The present study has combined data analytics with the K-mean clustering and probability queueing theory (PQT) and analysed the evolution of COVID-19 all over the world from the data obtained from public repositories. By using K-mean clustering, partitioning of patients’ records along with their status of hospitalization can be mapped and clustered. After K-mean analysis, cluster functions are trained and modelled along with eigen vectors and eigen functions.

Findings

After successful iterative training, the model is programmed using R functions and given as input to Bayesian filter for predictive model analysis. Through the proposed model, disposal rate; PPE (personal protective equipment) utilization and recycle rate for different countries were calculated.

Research limitations/implications

Using probabilistic queueing theory and clustering, the study was able to predict the resource allocation for patients. Also, the study has tried to model the failure quotient ratio upon unsuccessful delivery rate in crisis condition.

Practical implications

The study has gathered epidemiological and clinical data from various government websites and research laboratories. Using these data, the study has identified the COVID-19 impact in various countries. Further, effective decision-making for resource allocation in pluralistic setting has being evaluated for the practitioner's reference.

Originality/value

Further, the proposed model is a two-stage approach for vulnerability mapping in a pandemic situation in a healthcare setting for resource allocation and utilization.

Details

International Journal of Quality & Reliability Management, vol. 39 no. 9
Type: Research Article
ISSN: 0265-671X

Keywords

Content available
Article
Publication date: 19 February 2021

V. Vinoth Kumar, Gautam Srivastava, David Asirvatham and Biplab Sikdar

303

Abstract

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 1
Type: Research Article
ISSN: 1742-7371

1 – 3 of 3