International Journal of Interpreting Enigma Engineers (IJIEE) https://ejournal.svgacademy.org/index.php/ijiee <p>The <strong>International Journal of Interpreting Enigma Engineers</strong> is peer-reviewed, interdisciplinary, quarterly, scholarly, refereed journal, where we embark on a journey to decode the complexities that define engineering innovation.</p> <p>The mission is to provide a platform for scholars, practitioners, engineers, researchers, industry experts, and academics to delve into the depths of enigmatic challenges, interpreting them to reveal transformative insights and share their groundbreaking work, contribute to the global engineering community, and drive solutions in technological progress. The journal's goal is to give a platform, to make engineers are not just problem solvers, but enigma interpreters, redefining the boundaries of engineering through deep understanding and innovative interpretations.</p> <p>The Journal welcomes and recognises high quality theoretical and empirical original research papers, case studies, review papers, literature reviews, book reviews, conceptual framework, analytical and simulation models, technical notes, and technical notes from scholars, researchers, academicians, professionals, practitioners, and students worldwide.</p> <p style="color: #27397d;"><strong>Published by</strong><br /><a href="https://www.svgacademy.org/" target="_blank" rel="noopener"><strong>Swami Vivekananda Global Academy, India</strong></a></p> <p style="color: #27397d;"> </p> <table style="width: 100%;" border="1" cellpadding="1"> <tbody> <tr> <td style="width: 149px;"> <p>Title</p> </td> <td style="width: 413px;"> <p><strong>International Journal of Interpreting Enigma Engineers</strong></p> </td> </tr> <tr> <td style="width: 149px;"> <p>Frequency</p> </td> <td style="width: 413px;"> <p>Quarterly</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Publisher</p> </td> <td style="width: 413px;"> <p><a href="https://www.svgacademy.org/"><strong>Swami Vivekananda Global Academy, India</strong></a></p> </td> </tr> <tr> <td style="width: 149px;"> <p>Editor in Chief</p> </td> <td style="width: 413px;"> <p>Dr Gavini Sreelatha</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Copyright</p> </td> <td style="width: 413px;"> <p><a href="https://www.svgacademy.org/"><strong>Swami Vivekananda Global Academy, India</strong></a></p> </td> </tr> <tr> <td style="width: 149px;"> <p>Starting Year</p> </td> <td style="width: 413px;"> <p>2024</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Subjects</p> </td> <td style="width: 413px;"> <p>Engineering</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Language</p> </td> <td style="width: 413px;"> <p>English</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Publication Format</p> </td> <td style="width: 413px;"> <p>Online</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Phone No</p> </td> <td style="width: 413px;"> <p>9230973662</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Email ID</p> </td> <td style="width: 413px;"> <p><a href="mailto:info@ijieengineers.org">info@ijieengineers.org</a></p> </td> </tr> <tr> <td style="width: 149px;"> <p>Website</p> </td> <td style="width: 413px;"> <p>https://ejournal.svgacademy.org/index.php/ijiee/index</p> </td> </tr> <tr> <td style="width: 149px;"> <p>Address</p> </td> <td style="width: 413px;"> <p>19/1, P. C. Banerjee Road, Dakshineswar, Kolkata - 700 076 West Bengal, India</p> </td> </tr> </tbody> </table> en-US International Journal of Interpreting Enigma Engineers (IJIEE) Optimized Cloud Security Ecc-enhanced Homomorphic Paillier Re-encryption https://ejournal.svgacademy.org/index.php/ijiee/article/view/49 <p>In the dynamic domain of cloud computing, ensuring data security is of utmost importance. Conventional encryption techniques, while providing a high level of security, introduce substantial computational burdens, rendering them impractical for environments with limited resources. In response to this predicament, our study introduces a novel lightweight encryption framework that amalgamates Elliptic Curve Cryptography (ECC) with Homomorphic Paillier Re-Encryption, thereby reinforcing the security of data within cloud infrastructures.</p> <p>Our methodology exploits the inherent advantages of ECC, notably its ability to maintain stringent security measures with relatively smaller key dimensions, thereby optimizing efficiency without sacrificing the level of security. The integration of ECC with Homomorphic Paillier Encryption facilitates the execution of secure computations on ciphered data, maintaining user privacy while permitting the cloud to perform meaningful data operations. The re-encryption feature of our scheme ensures the secure mobility and modification of data sans decryption, thus augmenting security measures and operational flexibility.</p> <p>The proposed encryption paradigm has been validated through rigorous theoretical scrutiny and empirical implementation, revealing marked enhancements in both computational efficiency and security measures when juxtaposed with established encryption techniques. The empirical evidence suggests that the streamlined nature of our encryption scheme renders it exceptionally compatible with real-world cloud applications, particularly in scenarios where the optimization of resources is imperative.</p> <p>This work contributes to the field of cloud data security by providing a scalable, efficient, and secure encryption solution, paving the way for more secure and practical cloud computing applications. <strong><em>&nbsp;&nbsp;&nbsp;&nbsp;</em></strong></p> Veeresh Dachepalli Copyright (c) 2024 International Journal of Interpreting Enigma Engineers (IJIEE) 2024-06-18 2024-06-18 1 2 Smart Security Solutions for Cloud Infrastructure Using Machine Learning https://ejournal.svgacademy.org/index.php/ijiee/article/view/50 <p>Cloud computing has become a ubiquitous storage, processing, and data management tool. However, providing strong security measures inside cloud infrastructure remains a primary priority.The purpose of this study is to give an overview of the process of integrating cloud infrastructure with machine learning. The main objective of this work is to leverage machine learning approaches and models for threat identification, anomaly detection, and access control methods in order to protect sensitive data and reduce growing risks in the cloud infrastructure.&nbsp; Ultimately, this research endeavours to enhance the overall security posture of cloud computing, enabling organisations to harness the full potential of the cloud while safeguarding their critical assets and sensitive information.</p> Sindhooja Abbagalla Srividhya Gavini Copyright (c) 2024 International Journal of Interpreting Enigma Engineers (IJIEE) 2024-06-18 2024-06-18 1 2 Atm Transaction Without a Card Via Biometric and Hand Recognitionmetric https://ejournal.svgacademy.org/index.php/ijiee/article/view/51 <p>Cloud computing has become a ubiquitous storage, processing, and data management tool. However, providing strong security measures inside cloud infrastructure remains a primary priority.The purpose of this study is to give an overview of the process of integrating cloud infrastructure with machine learning. The main objective of this work is to leverage machine learning approaches and models for threat identification, anomaly detection, and access control methods in order to protect sensitive data and reduce growing risks in the cloud infrastructure.&nbsp; Ultimately, this research endeavours to enhance the overall security posture of cloud computing, enabling organisations to harness the full potential of the cloud while safeguarding their critical assets and sensitive information.</p> Manisha Bandari Dr GVS RAJU Copyright (c) 2024 International Journal of Interpreting Enigma Engineers (IJIEE) 2024-06-18 2024-06-18 1 2 Study and Analysis of Market Basket Analysis Using Apirori Algorithm https://ejournal.svgacademy.org/index.php/ijiee/article/view/52 <p>One data mining technique that has been increasingly popular across several industries, especially in retail and e-commerce, is market basket analysis, or MBA. This technique examines transactional data to find patterns and relationships between the products that are frequently purchased. An MBA is essential for understanding consumer behavior, which helps companies place products more effectively, develop more effective marketing campaigns, and run their operations more efficiently overall. The MBA is still a vital tool for organizations to stay abreast of changing customer preferences, stimulate rapid decision-making, and extract relevant information from the massive amounts of transactional data they are dealing with. MBA is used in various industries outside of retail, including supply chain management, healthcare, and internet platforms.</p> Tanusha Gorak Copyright (c) 2024 International Journal of Interpreting Enigma Engineers (IJIEE) 2024-06-18 2024-06-18 1 2 A Roadmap to Success: Strategies and Challenges in Adopting Aiops for it Operations https://ejournal.svgacademy.org/index.php/ijiee/article/view/53 <p>The evolution of information technology (IT) has introduced significant complexities that far exceed the capabilities of traditional IT management approaches. Artificial Intelligence for IT Operations (AIOps) offers a transformative prowess by leveraging AI and machine learning to enhance IT operations using some of the concepts such as anomaly detection and predictive analysis and many more. Regardless of the benefits, integrating AIOps with existing IT operations poses significant challenges, including data integration, model interpretability, and overcoming organizational resistance to change. This article aims to explore the technological advancements, practical applications and the challenges of AIOps. The findings highlight that while AIOps can significantly improve operational efficiency and accuracy, addressing integration challenges is crucial for its successful adoption. This article emphasises the significance and crucial role of data management, and strategic change management can help pave a future for resilient AIOps infrastructure. Effective implementation strategies, such as developing robust data pipelines and employing interpretable AI models are also discussed. These insights will be invaluable for those looking to stay ahead in the rapidly advancing landscape of IT operations so follow along.</p> Anil Kumar Mondru Ramesh Bollavathini Shreyas Thanay Sisir Anabathula Copyright (c) 2024 International Journal of Interpreting Enigma Engineers (IJIEE) 2024-06-18 2024-06-18 1 2