Enhancing Data Management: An Integrated Solution For Database Backup, Recovery, Conversion, and Encryption Capabilities
Enhancing Data Management: An Integrated Solution For Database Backup, Recovery, Conversion, and Encryption Capabilities
Abstract: In today’s world, there is a growing need for a flexible solution that can handle the complexities of SQL and MongoDB databases
while providing reliable backup, recovery, conversion, and data protection in the constantly changing world of data management. The
creation of an integrated backup, recovery, and conversion tool with encryption and decryption capabilities is described in this work. This
application offers platform support for SQL and MongoDB databases, scheduling, backups, point-in-time recovery, and secure storage to
meet the urgent needs of businesses and data professionals. Additionally, it provides smooth data transformation and schema mapping
during conversion. The solution integrates strong encryption algorithms for data protection at rest and in transit and permits secure
decryption utilising encryption keys and strategies like symmetric and Caesar cyphers. This improves data security. Essentially, the goal
of our suggested technology is to improve and streamline data management, making it an essential resource in the current data-driven
environment.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 720
incompatible database systems to newer, more efficient party service providers, the model is not used in
platforms. It facilitates system upgrades, scalability, and unsupervised cloud systems.
improved performance.
Management choices to secure data security and disaster
Data Consistency and Standardization: Database recovery alternatives have been foretold by the growing
conversion enhances the quality and integrity of data by relevance of enormous amounts of data and data analysis
enabling uniform data formats, structures, and rules across for business agility. In [5], The databases should be
many systems. housed on many servers, with each server supporting one
or more related schemas, as opposed to a single central
2. Literature Survey
disaster recovery structure, according to authors'
In [1] by utilising write-ahead logging (WAL) in database proposals. Cyclic backup strategy, which offers superior
systems, the authors had suggested an effective backup decentralisation and is more secure, is employed to
and recovery technique. The important concept was to achieve this. The update frequency and query forwarding
divide the recovery range into numerous threads and apply both affect this schema. However, when distributed
backup data to each area separately. It had a backup databases are used, designing the backup strategy to
system that used the system log data already there to account for existing fragmentation will need more
manage backup data without requiring additional I/O dynamic decision-making.
activities. However, using many threads to optimise the
[6] Bigdata is becoming increasingly popular in
WAL crash recovery process does not achieve the desired
cloud computing, and many current systems must expand
result.
their services to keep up with the exploding rate of data
The authors in [2] explored and proposed that one in can collection. NoSQL databases can manage massive
eliminate the effects of bad activities by reversing amounts of data. A data adaptor that supports relational
operations with the help of NOSQL UNDO, a recovery databases, NoSQL databases, and hybrid database
strategy and tool that returns the system to a consistent systems is suggested in this work. The development of
state. Incorrect MongoDB actions can be deleted using the hybrid database systems is also supported by a seamless
tool described in the paper by a database administrator. mechanism that enables simultaneous access to both
The utility provides focused recovery and comprehensive databases. Three distinct approaches are given for its
recovery as two options for restoring a database. The database queries. blocking transformation, blocking
study does not, however, offer a way to balance truncation, and direct access modes. For data
performance and the quantity of undo operations. synchronisation, three techniques have been developed:
direct access, dump blocking, and transformation
The researchers in [3] reviewed various threats and
blocking. The query parser, database converter, and query
challenges, as well as their impact on sensitive data, and
strategies all still require improvement, despite the fact
presentation of various safety models. All database
that each approach has a different set of principles for
dangers, challenges, and viable solutions are covered in
prohibiting queries.
this document. It is acknowledged that a task is to
carefully craft bugs and use cutting-edge technology to [7] Authors suggest an interactive protocol and
detect and thwart security threats while also preserving the communication design known as Dex to increase the
privacy and security of sensitive data. The security capacity of analytics for big data in SQL databases. Next,
measures suggested, though, are not especially good at we can combine a big data system with SQL database
spotting hazards and threats. They were unable to system into one holistic analysis of data platform by
recognise several vulnerabilities as a result. utilizing Dex protocol. Operators of the integrated system
can use a straightforward SQL statement to access
S. Gokulakrishnan in [4] attempted to provide a
sophisticated analytics capabilities offered by the
description of data integrity & recovery management in
analytics system of big data. We test our concept using
cloud systems. To do this, a brand-new methodology
PostgreSQL along with Spark to show possible efficiency
known as the tailing method, which is used for data
improvements over plain SQL UDF solutions. Dex makes
recovery and management, is focused on and proposed to
it possible to integrate heterogeneous systems while
ensure high-level scalability and high order reliability in
paying less for management and having more flexibility.
cloud-based systems to segment data and generate tokens
Our system improves overall performance while requiring
for the data split-up by adding the cloud address or
little additional development work, yet additional protocol
locations of cloud storage that offer fault recognition and
structure, communication of data, and other
fault tolerance. Despite providing an effective optimised
implementation concerns need to be optimised for this
method and successfully demonstrating an accuracy rate
database. We compare our system to existing methods for
of 1.67 when compared to other usual systems and third-
enhancing the database's analytics capabilities.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 721
[8] A blended learning approach for Relational [11] The authors of this study presented two different
Database Systems that provides students with a variety of types of databases, examined their security, and then
connected tools and learning resources was reviewed by suggested a fix for securing and upholding the
the authors. This uses TestSQL, a query tool that provides confidentiality, availability, and integrity of the data kept
automatic feedback to students on SQL query exercises in these databases. They suggested fusing NoSQL and
but is not used to evaluate the students. The evaluation is RDBMS, with permissions being recorded in both NoSQL
done using a variety of questions that evaluate not just the and RDBMS data. Two lines of defence would be
ability to write SQL, but also other abilities related to the provided by such a combination, ensuring the security of
subject, such as optimisation, physical modelling, the RDBMS's stored data. This was done with the
PL/SQL, and questions that indirectly test SQL intention of avoiding DDOS attacks, NoSQL injections,
knowledge, like processing order. This analysis and the loss of any stored data. Only the users' identities
demonstrates that students' usage of additional resources and hashed passwords would be stored in NoSQL. If a
is highly connected with higher results, but that network specialist were installed, this would function
performance at the many subtopics assessed is not at all properly because when the system detects any
well correlated, demonstrating that students might be abnormality, it must enter lockdown mode by
strong in some areas while yet being unprepared for disconnecting all networks using network management.
others. More investigation is required to confirm this Based on a recent DDOS attack against a hospital, this
finding and pinpoint precisely what types of queries make study was conducted.
for the best summative evaluation in SQL.
[12] Users who possess the secret key can do keyword
[9] When dealing with NoSQL Data Stores, security searches on encrypted material without having to first
methods, and privacy solutions, Vonitsanos and others decrypt it thanks to searchable symmetric encryption. A
have highlighted security and privacy challenges. When searchable symmetric encryption system that can produce
users first connect to the system, one such approach where indexes suited for DBMSs has been put forth by Takato
they can access different services by entering their and others. This uses a symmetric encryption method that
credentials just once. It is possible to protect data at rest may produce an index appropriate for database
and in motion, safeguard integrity, and implement management systems and is tag-based searchable. They
authentication, fine-grained authorization, and access also put out a plan that would include deterministic tags,
control in a distributed context. Kerberos is used in which are short chunks of values produced by
NoSQL databases to authenticate clients and data nodes. cryptographically deterministic functions, along with the
Data are specifically organised into groups based on their probabilistic tags of the standard tag-based SSE system.
security level to ensure fine-grained permission. In This system offered the user a way to govern their own
contrast, MongoDB administrators must put rules in place information disclosure, allowing them to gradually reveal
to make sure that users and applications only have access some deterministic tag information. Although they had
to the data they need to maintain a secure MongoDB established the concept of their scheme's security and
deployment. Cassandra employs TDE approach to protect demonstrated the evidence of it, well-known attacks
data at rest. against searchable encryption had not yet been
investigated, necessitating the need to investigate its
[10] Unstructured data present in the NOSQL
efficacy.
MongoDB database has been subjected to a security study
by the authors of this paper. They used symmetric [13] In order to improve efficiency when retrieving
cryptographic methods to ensure the privacy of encrypted data from a multilevel database, the authors of
unstructured data contained in MongoDB's NoSQL this study updated the select operation model. The system
documents. Additionally, the document data is encrypted first verifies the user's security, following which it sets the
and decrypted using the DES, AES, and blowfish encryption key in accordance with user-level security, and
algorithms with random key generation before being then it determines if the user is authorized to access the
stored in and retrieved from the NoSQL MongoDB encrypted data contained in the database. The elimination
database. Zlib compression technique is used to reduce the of numerous decryptions made this modification operate
storage size used by the encrypted data and provide better and faster. They take a single call to both encryption
comparison results, even if the encrypted data in and decryption. When managing and processing massive
MongoDB databases takes up more storage space than the amounts of data, the model performs better than the
original data. Although the research offers a more original model, which is extremely obvious.
effective method for encrypting data for document-
[14] One of the essential components of a scalable
oriented MongoDB, secrecy and integrity are not yet
and adaptable system, asynchronous replication, has been
concurrently attained, though they might be in the near
outlined by the authors in this study. The primary
future.
objective is to compare the time performance for CRUD
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 722
operations across several NoSQL document-oriented optimisation of AES and the incorporation of a productive
system implementations in a distributed setting. The Montgomery Scalar Multiplication for ECC have
results are compared with test results obtained for three produced an overall effective cryptosystem in terms of
relational database management systems: Microsoft SQL execution time, surface occupation, and power
Server, MySQL, and PostgreSQL. The execution time for consumption. The integration of software and hardware
CRUD operations for a single database instance and for a defences against Side-Channel Attacks (SCA) has not
distributed environment with two nodes is taken into been completed, leaving this as a potential future project.
consideration. When used to design applications, it
[19] The database forensics and its security measures
advises selecting the option that, after a comprehensive
were briefly covered by the authors in this work.
examination of all the characteristics it provides, best
Investigating and analysing digital databases to find
meets the requirements.
unapproved access, data breaches, or cyberattacks is
[15] The Double Chaining Algorithm (DCA), which known as database forensics. Organisations must employ
the authors of this work proposed, is a new symmetric-key strong security measures like encryption, access controls,
encryption algorithm. This approach has a low level of and auditing to protect sensitive data within their systems
complexity since it chains operations using the XOR in order to defend against cyber threats. These security
function. The chaining stage and the substitution stage are measures help identify offenders and stop such breaches
the two key steps of the encoding process. The key's SHA- by not only discouraging possible attackers but also
256 digest is utilised to create the key that is used during allowing forensic professionals to trace and recreate
the chaining stage. The suggested algorithm section activities in the case of a breach. A proactive database
describes how this algorithm's high Avalanche Effect is security approach must include routinely updating
achieved without any complicated operations, making it security procedures and monitoring for new threats.
efficient and safe to implement on both software and
[20] Using Elliptic Curve Cryptography (ECC) to
hardware platforms.
construct a Distributed Certificate Authority (CA) in a Big
[16] The authors of this study described how to Data context is a cutting-edge method of managing and
translate MySQL requests into a database structure based safeguarding cryptographic certificates. In order to
on MongoDB. It is divided into four stages: parsing, provide a decentralised CA infrastructure and improve
producing a query dictionary, converting the data to a scalability and resilience in large-scale data settings, this
structured tree, and establishing a database from the system makes use of the efficiency and security
dictionary. This article's conclusion displays the findings advantages of ECC. It reduces single points of failure and
from trying the suggested strategy with various queries. potential bottlenecks by spreading out the certificate
Since index optimisation has not yet been optimised, it has issuance and validation processes across several nodes,
been left as a future area of study. ensuring strong cryptographic security for the expanding
demands of Big Data applications while upholding
[17] With the help of a quantitative description, this
cryptographic integrity and ecosystem trust. The
study aims to determine the current state of document-
experiment demonstrates that the certificate management
oriented database MongoDB and emphasise the
services' availability and response times are greatly
advancement of NoSQL databases. Two datasets—the
improved.
MongoDB dataset and the MySQL dataset—are used in
the experiment. These are a web application's sign-up and [21] This work focuses on addressing security and
login pages. The study was completed after one million efficiency concerns in IoT cloud integration by
records had been entered into the tables because the implementing a secure lightweight key establishment
authors wanted to assess the performance after so many system that utilizes symmetric lightweight and AES
records had been added to the databases. The functionality algorithms. This approach helps secure IoT device
provided by the application's registration page allows for communications and facilitates the sharing of sensor data
the database-based registration of any user with valid in a cloud environment.
information to the website.
[22] This survey paper serves as a valuable resource for
[18] With the use of a co-design methodology, the researchers new to the field and provides insights into the
authors of this work describe an enhanced AES-ECC current security challenges and future research directions
system in which ECC's scalar multiplication is in cloud computing security. It emphasizes the need for
implemented as a hardware accelerator and AES operates robust security measures in cloud environments due to the
on NIOS II's softcore. The suggested solution depends on storage of sensitive data and the shared nature of cloud
improvements to both ECC (Point Addition/Doubling computing services.
layer) and AES (MixColumn/InvMiColumn operation).
[23] Paper highlights the critical importance of securing
When compared to similar studies, the software
communication between IoT devices and cloud servers
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 723
due to the sensitivity of the data involved. It acknowledges enhances the scalability, efficiency, and data analysis
the challenges posed by insecure IoT devices and the capabilities of these systems, making it valuable for
complexity of selecting suitable security mechanisms. various industries and applications.
The primary focus of the paper is to propose a lightweight
[28] The proposed system depends on the strength of
key establishment mechanism to address these security
encryption methods employed, the security of
concerns and prevent common types of attacks, ultimately
authentication mechanisms, and the overall
ensuring the security of IoT-Cloud communication.
implementation of the system. Careful consideration of
[24] The paper seems to emphasize the significance of these factors is crucial to ensure the desired level of data
early brain tumor diagnosis through MRI scans and security and privacy protection.
highlights the benefits of using deep learning techniques
[29] This study explores the field of controlled abstractive
to improve the efficiency and accuracy of this diagnostic
summarization, summarizing the progress made in this
process. It also discusses recent trends and evaluates the
area. Researchers have developed various techniques and
performance of the proposed approach in comparison to
methodologies to allow users to control the
existing methods. This kind of research is essential in
summarization process.\The study also reviews the
advancing medical imaging and improving patient
assessment methodologies used to evaluate the quality of
outcomes.
controlled abstractive summaries.
[25] Author’s work outlines a comprehensive approach to
3. Proposed Methodology
brain tumor detection and diagnosis, with an emphasis on
glioblastoma, using deep learning techniques applied to In figure 1, we study the working of the Backup and
MRI images. The method involves data collection, pre- Recovery Tab. We can upload data to AWS S3 where user
processing, radiomics feature extraction, tumor credentials such as S3 bucket ID and Access Key are
segmentation, dimensionality reduction, and a novel taken. These files are uploaded in S3 bucket due to Boto3
model architecture to achieve accurate and efficient which is a Python library that provides an interface to
diagnosis of brain tumors. interact with Amazon Web Services (AWS). For backup,
we select a directory where we provide the database
[26] Research focuses on the development of machine
details. SQL and Mongo backup commands run via the
learning-based models and radiomics techniques to
subprocess module of python. Then for recovery, we enter
predict the risk of recurrence in GBM patients. It
its details and select a file for recovery and recovery has
addresses data preprocessing challenges, handles
been completed. This tab also provides security measure
unbalanced data using RNN-GAN, and achieves high
which include encryption and decryption. This gives us
accuracy in predicting patient outcomes. The proposed
the choice of symmetric encryption and Caesar Cipher.
method shows improvements in accuracy, specificity, and
Symmetric encryption involves key generation post file
sensitivity compared to existing models like SVM and
encryption and Caesar Cipher involves key encryption
LR, which is promising for enhancing the prediction of
post key input from user. For Symmetric decryption,
GBM recurrence.
select the generated key and encrypted file which through
[27] This invention integrates IoT, cloud computing, and the algorithm gets decrypted while for Caesar Cipher,
simulation tools to create a comprehensive solution for enter the key which was entered in the form and all
building and managing IoT systems. This combination characters will be shifted back to the original words.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 724
Fig 1: Block Diagram of Tab 1
In figure 2, we see the working of the Query Tab. This tab enters the data and leaves the query section blank. After
consists of two queries – SQL and Mongo. In SQL query, clicking on the button, query is handled by mongo
data for the database is taken from the user. This data is connectors and result is displayed. Type 2 is a singular
then passed to subprocess module of python and is made search query where user enter the fields as “fieldsToQuery
into SQL query. In Mongo query, selection can be done in Query” into input. The data again is handled and displayed
two type – 1 and 2. Type 1 selects all queries where user in the same manner.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 725
Fig 2: Block Diagram/Flowchart of Tab 2
In figure 3, we see the working of the conversion tab. This MongoDB to SQL conversion, schema is again taken
tab converts SQL to MongoDB and vice-versa. For SQL from the user. Query is then created according to the
to MongoDB conversion, the schema is taken from the schema. Data is then converted into strings and gets added
user. Select all query is made into the table after user to pandas’ data frame. NaN values are removed from the
enters the database details through which the data is parser data frame. Data is then added to SQL as an insert query
into a json. This is done through mongo connectors and is performed on the database table. This is how both
because of this data is put into the collection. For conversions take place in the software.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 726
In today's data-driven world, our project stands as a The methodology for our software application involves a
dependable and adaptable solution. It equips users to combination of technologies and functionalities
unlock the full potential of their data assets, whether encapsulated within three distinct tabs: Backup and
through database management, query execution, or data Recovery, Query, and Conversion. Our software utilizes a
schema conversion. Our software facilitates better- tech stack comprising PyQt5 for the graphical user
informed decisions and improved data management interface, Pandas for data manipulation, MySQL and
practices, ultimately contributing to enhanced MongoDB connectors for database operations, and boto3
productivity and efficiency. for interactions with Amazon Web Services (AWS) S3.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 728
Fig 11: Symmetric Decryption
In figure 9, 10 and 11, shows images of symmetric encryption, key generation and decryption respectively as per the proposed
methodology.
ii. Caesar Cipher
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 731
Fig 21: Conversion of Mongo to SQL
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 732
[6] G. B. Solanke and K. Rajeswari, "SQL to NoSQL Database," 2015 20th International Conference on
transformation system using data adapter and Control Systems and Computer Science, Bucharest,
analytics," 2017 IEEE International Conference on Romania, 2015, pp. 191-196, doi:
Technological Innovations in Communication, 10.1109/CSCS.2015.32.
Control and Automation (TICCA), Chennai, India, [15] H. Kurniawan and R. Munir, "Double Chaining
2017, pp. 59-63, doi: Algorithm: A secure symmetric-key encryption
10.1109/TICCA.2017.8344580. algorithm," 2016 International Conference On
[7] M. Cai, T. Bai, M. Cheng and C. Xu, "A Protocol for Advanced Informatics: Concepts, Theory And
Extending Analytics Capability of SQL Database," Application (ICAICTA), Penang, Malaysia, 2016,
2016 7th International Conference on Cloud pp. 1-6, doi: 10.1109/ICAICTA.2016.7803097.
Computing and Big Data (CCBD), Macau, China, [16] M. Ha and Y. Shichkina, "The Query Translation
2016, pp. 110-115, doi: 10.1109/CCBD.2016.031. from MySQL to MongoDB Taking into Account the
[8] C. Boisvert, K. Domdouzis and J. License, "A Structure of the Database," 2021 IEEE Conference
Comparative Analysis of Student SQL and of Russian Young Researchers in Electrical and
Relational Database Knowledge Using Automated Electronic Engineering (ElConRus), St. Petersburg,
Grading Tools," 2018 International Symposium on Moscow, Russia, 2021, pp. 383-386, doi:
Computers in Education (SIIE), Jerez, Spain, 2018, 10.1109/ElConRus51938.2021.9396591.
pp. 1-5, doi: 10.1109/SIIE.2018.8586684. [17] M. M. Patil, A. Hanni, C. H. Tejeshwar and P. Patil,
[9] G. Vonitsanos, E. Dritsas, A. Kanavos, P. Mylonas "A qualitative analysis of the performance of
and S. Sioutas, "Security and Privacy Solutions MongoDB vs MySQL database based on insertion
associated with NoSQL Data Stores," 2020 15th and retriewal operations using a web/android
International Workshop on Semantic and Social application to explore load balancing — Sharding in
Media Adaptation and Personalization (SMA, MongoDB and its advantages," 2017 International
Zakynthos, Greece, 2020, pp. 1-5, doi: Conference on I-SMAC (IoT in Social, Mobile,
10.1109/SMAP49528.2020.9248442. Analytics and Cloud) (I-SMAC), Palladam, India,
[10] J. Kumar and V. Garg, "Security analysis of 2017, pp. 325-330, doi: 10.1109/I-
unstructured data in NOSQL MongoDB database," SMAC.2017.8058365.
2017 International Conference on Computing and [18] Hafsa, N. Alimi, A. Sghaier, M. Zeghid and M.
Communication Technologies for Smart Nation Machhout, "A hardware-software co-designed AES-
(IC3TSN), Gurgaon, India, 2017, pp. 300-305, doi: ECC cryptosystem," 2017 International Conference
10.1109/IC3TSN.2017.8284495. on Advanced Systems and Electric Technologies
[11] O. Abahussain and A. Alqaddoumi, "DBMS, (IC_ASET), Hammamet, Tunisia, 2017, pp. 50-54,
NoSQL and Securing Data: the relationship and the doi: 10.1109/ASET.2017.7983665.
recommendation," 2020 International Conference on [19] P. S. Murthy and V. Nagalakshmi, "Database
Innovation and Intelligence for Informatics, Forensics and Security Measures to Defend from
Computing and Technologies (3ICT), Sakheer, Cyber Threats," 2020 3rd International Conference
Bahrain, 2020, pp. 1-6, doi: on Intelligent Sustainable Systems (ICISS),
10.1109/3ICT51146.2020.9311958. Thoothukudi, India, 2020, pp. 1302-1307, doi:
[12] T. Hirano, Y. Kawai and Y. Koseki, "DBMS- 10.1109/ICISS49785.2020.9316042.
Friendly Searchable Symmetric Encryption: [20] O. S. F. Shareef and A. M. Sagheer, "Implementing
Constructing Index Generation Suitable for a Distributed Certificate Authority Using Elliptic
Database Management Systems," 2021 IEEE Curve Cryptography for Big Data Environment,"
Conference on Dependable and Secure Computing 2020 2nd Annual International Conference on
(DSC), Aizuwakamatsu, Fukushima, Japan, 2021, Information and Sciences (AiCIS), Fallujah, Iraq,
pp. 1-8, doi: 10.1109/DSC49826.2021.9346255. 2020, pp. 132-140, doi:
[13] Y. Mahmoud and M. M. Abu-Saqer, "Modification 10.1109/AiCIS51645.2020.00031.
of Select Operation Model for Multilevel Security: [21] Shrimant, Gaikwad Vidya, Ravindranath, K. &
Medical Database Systems as an Application," 2020 Prasad, Gudapati Syam(2023) A mathematical
International Conference on Assistive and model for secure Cloud-IoT communication:
Rehabilitation Technologies (iCareTech), Gaza, Introducing the revolutionary lightweight key
Palestine, 2020, pp. 47-50, doi: mechanism, Journal of Discrete Mathematical
10.1109/iCareTech49914.2020.00016. Sciences and Cryptography, 26:5, 1341–1354, DOI:
[14] -O. Truica, F. Radulescu, A. Boicea and I. Bucur, 10.47974/JDMSC-1750
"Performance Evaluation for CRUD Operations in [22] Prasad, Gudapati & Gaikwad, Vidya. (2018). A
Asynchronously Replicated Document Oriented Survey on User Awareness of Cloud Security.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 733
International Journal of Engineering and of Brain Glioblastoma Multiforme Recurrence
Technology (UAE). 7. 131-135. Using Deep Neural Networks “ Journal of Algebric
10.14419/ijet.v7i2.32.15386. Statistics ,Volum13 issue 3 ,2022,
[23] Gudapati, S.P., Gaikwad, V. (2021). Light-Weight https://www.publishoa.com/index.php/journal/articl
Key Establishment Mechanism for Secure e/view/1198, e-ISSN: 1309-3452
Communication Between IoT Devices and Cloud. In: [27] Kurhade Anirudha, Moon Aditya,Pratham
Satapathy, S., Bhateja, V., Janakiramaiah, B., Chen, Shaantanu, Dudhane Akash, Lonari Gaurav,
YW. (eds) Intelligent System Design. Advances in Gaikwad Vidya S, Sable Nilesh P., IOT
Intelligent Systems and Computing, vol 1171. SIMULATION AND CLOUD INTEGRATION
Springer, Singapore. https://doi.org/10.1007/978- SYSTEM, 2023/03129, 2023/6/28.
981-15-5400-1_55 [28] Thakare, P., Telang, A., Sonawane, H., Mantri, Y.,
[24] Mrs. Disha Sushant Wankhede, Dr. Selvarani Gaikwad, V., & Vishwakarma Institute of
Rangasamy,"REVIEW ON DEEP LEARNING Information Technology. (2020). Secure File
APPROACH FOR BRAIN TUMOR GLIOMA Storage on Cloud using Homomorphic Encryption.
ANALYSIS" Journal of Information Technology in International Research Journal of Engineering and
Industry, VOL. 9 NO. 1 (2021) pp. 395 - 408 , DOI: Technology (IRJET), 7(5).
https://doi.org/10.17762/itii.v9i1.144 https://www.irjet.net/archives/V7/i5/IRJET-
[25] Disha Sushant Wankhede, R. Selvarani, Dynamic V7I5861.pdf
architecture based deep learning approach for [29] Karnik, M.P., Kodavade, D.V. (2023). A Survey on
glioblastoma brain tumor survival prediction, Controllable Abstractive Text Summarization. In:
Neuroscience Informatics, Volume 2, Issue 4, 2022, Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj,
100062, ISSN 2772-5286, A. (eds) Intelligent Systems Design and
https://doi.org/10.1016/j.neuri.2022.100062. Applications. ISDA 2022. Lecture Notes in
(https://www.sciencedirect.com/science/article/pii/ Networks and Systems, vol 715. Springer, Cham.
S2772528622000243) https://doi.org/10.1007/978-3-031-35507-3_30
[26] Mrs. Disha Sushant Wankhede, Dr. Selvarani
Rangasamy, Dr. Chetan J. Shelke,”Risk Prediction
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(6s), 720–734 | 734