Table Of ContentStudies in Computational Intelligence 1065
Hiren Kumar Thakkar
Mayank Swarnkar
Robin Singh Bhadoria Editors
Predictive
Data Security
using AI
Insights and Issues of Blockchain, IoT,
and DevOps
Studies in Computational Intelligence
Volume 1065
SeriesEditor
JanuszKacprzyk,PolishAcademyofSciences,Warsaw,Poland
The series “Studies in Computational Intelligence” (SCI) publishes
new developments and advances in the various areas of computational
intelligence—quickly and with a high quality. The intent is to cover the theory,
applications, and design methods of computational intelligence, as embedded in
the fields of engineering, computer science, physics and life sciences, as well as
themethodologiesbehindthem.Theseriescontainsmonographs,lecturenotesand
editedvolumesincomputationalintelligencespanningtheareasofneuralnetworks,
connectionist systems, genetic algorithms, evolutionary computation, artificial
intelligence, cellular automata, self-organizing systems, soft computing, fuzzy
systems,andhybridintelligentsystems.Ofparticularvaluetoboththecontributors
and the readership are the short publication timeframe and the world-wide
distribution,whichenablebothwideandrapiddisseminationofresearchoutput.
IndexedbySCOPUS,DBLP,WTIFrankfurteG,zbMATH,SCImago.
AllbookspublishedintheseriesaresubmittedforconsiderationinWebofScience.
· ·
Hiren Kumar Thakkar Mayank Swarnkar
Robin Singh Bhadoria
Editors
Predictive Data Security
using AI
Insights and Issues of Blockchain, IoT,
and DevOps
Editors
HirenKumarThakkar MayankSwarnkar
DepartmentofComputerScience DepartmentofComputerScience
andEngineering andEngineering
PanditDeendayalEnergyUniversity IndianInstituteofTechnologyBHU
Gandhinagar,Gujarat,India Varanasi,UttarPradesh,India
RobinSinghBhadoria
DepartmentofComputerEngineering
andApplications
GLAUniversity
Mathura,UttarPradesh,India
ISSN 1860-949X ISSN 1860-9503 (electronic)
StudiesinComputationalIntelligence
ISBN 978-981-19-6289-9 ISBN 978-981-19-6290-5 (eBook)
https://doi.org/10.1007/978-981-19-6290-5
©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature
SingaporePteLtd.2023
Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether
thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse
ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and
transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar
ordissimilarmethodologynowknownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook
arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor
theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany
errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional
claimsinpublishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
Intherecentpast,duetotheaffordableandeasyaccesstotheInternet,thenumber
ofconnecteddeviceshasgrownexponentially.Contrarytoadecadeback,millions
of new devices are connecting each day forming a giant network of Internet of
Things(IoT)leadingtoenormousamountsofdatacommunicationacrossthedevices.
However, with the convenience of IoT enabled communications, substantial chal-
lengesarealsoemergingintheformofdatasnooping,datahacking,dataphishing,
man-in-the-middleattack,denial-of-serviceattack,etc.Moreover,fewdataattacks
greatly affect the stability of applications by attacking the underlying Machine
Learning (ML) and Deep Learning (DL) codes. The rate of the novel data attacks
designedtocompromisethesecuritiesismuchfasterthantherateofprovidingthe
remedial security solutions. Therefore, there is an increasing demand to refer to
theexistingsecuritysolutionsandstateoftheartsinthedatasecuritydomain.This
bookattemptstoprovideacomprehensivereviewoftheexistingtypesofdatasecurity
attacksandcorrespondingsolutionswithdiscussiononthetrends,technology.More-
over,thebookfocusesonArtificialIntelligence(AI)enableddatasecuritysolutions
overandabovetheover-the-shelfconventionaldatasecuritymechanismtoprovide
thefuturisticviews.ThebookcoversthedomainssuchasImageforgerydetection,
securityissuesinMLandDL,reversibledatahidinginhealthcare,Blockchain-based
authentication,securityconcernsincloud,fog,andedgecomputing,andsocialmedia
securityanalysis.
Gandhinagar,India HirenKumarThakkar
Varanasi,India MayankSwarnkar
Mathura,India RobinSinghBhadoria
v
Acknowledgements
Wewouldliketofirstthankthealmightyforprovidingusthestrengthtopursuethe
idea and carry it forward to make a complete book. Our sincere thanks to all the
contributorswhohaveprovidedtheirvaluabletime,support,andtimelycontributions
tomakeacomprehensivebookondatasecurity.Wewouldalsoliketothankallthe
reviewers for their informative and constructive suggestions to the contributors to
improvizethechapters.Finally,wewouldliketothankourInstitutionsPanditDeen-
dayalEnergeyUniversity(PDEU),India,IndianInstituteofTechnology—Banaras
HinduUniversity(IIT-BHU),India,andGLAUniversity,Indiaforprovidingallthe
requiredresourcesfordrafting,proofreading,andeditingthebook.
vii
Contents
AComprehensiveStudyofSecurityAspectsinBlockchain ............ 1
PranavSinghandSushrutaMishra
AnExplorationAnalysisofSocialMediaSecurity .................... 25
ShreejaVermaandSushrutaMishra
A Pragmatic Analysis of Security Concerns in Cloud, Fog,
andEdgeEnvironment ............................................. 45
ManishJena,UdayanDas,andMadhabanandaDas
SecureInformationandDataCentres:AnExploratoryStudy ......... 61
PranavPant,KunalAnand,andDjeaneDeboraOnthoni
Blockchain-Based Secure E-voting System Using Aadhaar
Authentication .................................................... 89
AnkitKumarJain,SahilKalra,KaranKapoor,andVishalJangra
DevOpsTools:SilverBulletforSoftwareIndustry .................... 105
DivyaSrivastava, MadhushiVerma, ShashankSheshar,
andMadhuriGupta
RobustandSecuredReversibleDataHidingApproachforMedical
ImageTransmissionoverSmartHealthcareEnvironment ............. 119
K.JyothsnaDevi,PriyankaSingh,JoséSantamaría,andShrinaPatel
Advancements in Reversible Data Hiding Techniques and Its
ApplicationsinHealthcareSector ................................... 133
BuggaveetiPadmaja,MaharanaSuraj,andV.M.Manikandan
SecurityIssuesinDeepLearning .................................... 151
ShrinaPatel,ParulV.Bakaraniya,SushrutaMishra,andPriyankaSingh
CNN-BasedModelsforImageForgeryDetection ..................... 185
ShyamSinghRajput,DeepakRai,DeetiHothrik,SudhanshuKumar,
andShubhangiSingh
ix
x Contents
MaliciousURLDetectionUsingMachineLearning ................... 199
MayankSwarnkar,NehaSharma,andHirenKumarThakkar
About the Editors
Dr. Hiren Kumar Thakkar received his M.Tech in Computer Science and Engi-
neering from IIIT Bhubaneswar, India, in 2012 and a Ph.D. degree from Chang
GungUniversity,Taiwan,in2018.Later,heworkedasapostdoctoralresearcherin
theDepartmentofOccupationTherapy,MotorBehavioralResearchLab(MBRL),
Chang Gung University, Taiwan. Currently, he is an Assistant Professor in the
Department of Computer Science and Engineering, Pandit Deendayal Energy
University,Gujarat,India.Dr.Thakkarhaspublishedseveraljournalresearchpapers
intheareassuchasoptimization,machinelearning,andreinforcementlearning.He
isamemberofIEEE.
Dr. Mayank Swarnkar is currently an Assistant Professor in the Department of
Computer Science and Engineering at the Indian Institute of Technology (BHU)
Varanasi.HecompletedhisPh.D.fromtheIndianInstituteofTechnologyIndorein
2019.HecompletedhisM.TechinWirelessCommunicationandComputingfrom
theIndianInstituteofInformationTechnologyAllahabadPrayagrajin2013andB.E.
in Information Technology from Jabalpur Engineering College in 2011. He joined
IIT(BHU)in2020.HealsoworkedasSoftwareEngineerinNECTechnologiesIndia
during2013–2014.Hisprimaryareasofinterestarenetworkandsystemsecurity.He
worksmainlyinnetworktrafficclassification,zero-dayattacks,intrusiondetection
systems, IoT security analysis, network protocol vulnerability analysis, and VoIP
spamdetection.Hehasseveralpublicationsininternationaljournalsandconferences.
HeisamemberofIEEEandACM.
Robin Singh Bhadoria completed his Ph.D. degree from the Indian Institute of
TechnologyIndoreinJanuary2018.HealsofinishedhisM.Tech.andB.E.inCSE
fromdifferentinstitutionsaffiliatedwithRGPVBhopalin2011and2008,respec-
tively. He has been awarded the University Gold Medal for his M.Tech. Degree at
xi