Papers by Rajanpreet Chahal

2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
The automobile industry is a sector that brings together art, innovation, science, technology and... more The automobile industry is a sector that brings together art, innovation, science, technology and ideas that empower the economy, people and the nation as a whole. A great deal of advancement has been done in automobiles, but there is always room for improvement. Security of the vehicle is an essential requirement. The conventional key-turning ignition process has become a hassle as access to the vehicle requires the user to possess the key at all times. In a scenario where the key is unavailable, it becomes very difficult to make use of the vehicle. So, In today’s fast-paced technological world, it becomes imperative that a keyless system be built, that would provide the user with ease to operate the vehicle. Considering this, we have developed "FaceIgnition", which is an automatic vehicle ignition system that makes use of face recognition to check authenticity along with providing security against theft and unauthenticated use. It enables the user to make use of the vehicle without having the need to keep the key.
Steganography is the art and science of secret message. The secret message or plain text may be h... more Steganography is the art and science of secret message. The secret message or plain text may be hidden in one various ways. The media with hidden information are called stego media and without hidden information are called cover media. Steganography can use for hide both legal and illegal information. It is the technique of hiding information in digital media in order to conceal the existence of the information. To make the system more secured this system uses most powerful algorithm in the first level of security which encrypts the data. In the second level the encrypted data is embedded in to the audio file using modified LSB algorithm. This system ensures more security. To conceal a secret message we need a wrapper or container as a host file. Different wrappers or host files or cover medium are used to

International Journal of Fuzzy Systems, 2016
Cloud Computing has a great potential to transform the way we use technology. People have started... more Cloud Computing has a great potential to transform the way we use technology. People have started using cloud services but they still have a lot of apprehensions resulting from the lack of trust on Cloud Service Provider (CSP) and the associated security risks. In this paper, we have proposed a fuzzy rule-based expert system that evaluates trustworthiness of a CSP from the viewpoint of consumers (called Direct-Trust), their Public-Review, and the Cloud Auditor (called Auditor-Trust). A survey has been conducted to rate the five CSPs on the basis of their Reliability, Performance, Security, and Usability. The data collected from the survey serve as the dataset to calculate the Direct-Trust and Public-Review. Auditor-Trust has been calculated using the data generated by Nasuni, a cloud storage company which evaluates CSPs on the basis of their Performance, Availability, Scalability, and Accuracy. Final Trustworthiness is then calculated by combining Direct-Trust, Public-Review, and Auditor-Trust. All the simulations have been done using Fuzzy Logic Toolbox of MATLAB. The results generated rank the CSPs according to their Final Trustworthiness. A scale of 1–5 has been used in all the calculations for ratings.
Advances in Intelligent Systems and Computing, 2016
The paper presents an approach to rank various Cloud-Service providers (CSPs) on the basis of fou... more The paper presents an approach to rank various Cloud-Service providers (CSPs) on the basis of four parameters, namely, Performance, Availability, Scalability and Accuracy, using Analytic Hierarchy Process (AHP). The CSPs were monitored by the cloud storage company named Nasuni and tests were conducted to evaluate the CSPs for the four parameters mentioned above. This paper makes use of the data provided by Nasuni to propose a method for ranking various CSPs. AHP has been selected for this purpose because it uses the foundations of mathematics and psychology to enable one to make complicated decisions. Instead of recommending a correct decision, AHP provides the decision makers with an opportunity to select the option that is most befitting to their goals.

Advances in Intelligent Systems and Computing, 2015
The paper presents an approach to rank various Cloud-Service providers (CSPs) on the basis of fou... more The paper presents an approach to rank various Cloud-Service providers (CSPs) on the basis of four parameters, namely, Reliability, Performance, Security and Usability, using a combination of Likert scale, Fuzzy logic and Analytic Hierarchy Process (AHP). The CSPs have been ranked using data collected through a survey of cloud computing users. The purpose of this paper is to help provide a technique through which various CSPs can be ranked on the basis of a number of parameters keeping in mind the users’ perceptions. We have chosen fuzzy logic because it has the capability to model the vague and imprecise information provided by the users and can handle the uncertainty involved. Similarly, AHP has been chosen because of its ability to make complex decisions on the basis of mathematics and psychology. The proposed model derives its strength from the fact that it takes into account the uncertainty and dilemma involved in decision-making.
Handbook of Research on Security Considerations in Cloud Computing
Uploads
Papers by Rajanpreet Chahal