Security Analytics Chapman & Hall/CRC Cyber-Physical Systems Series Editors: Jyotir Moy Chatterjee Lord Buddha Education Foundation, Kathmandu, Nepal Vishal Jain Sharda University, Greater Noida, India Cyber-Physical Systems: A Comprehensive Guide By: Nonita Sharma, L K Awasthi, Monika Mangla, K P Sharma, Rohit Kumar Introduction to the Cyber Ranges By: Bishwajeet Pandey, Shabeer Ahmad Security Analytics: A Data Centric Approach to Information Security By: Mehak Khurana, Shilpa Mahajan For more information on this series please visit: https://www.routledge.com/Chapman-- HallCRC-Cyber-Physical-Systems/book-series/CHCPS?pd=published,forthcoming& pg=1&pp=12&so=pub&view=list?pd=published,forthcoming&pg=1&pp=12&so=pub& view=list Security Analytics A Data Centric Approach to Information Security Edited by Mehak Khurana Shilpa Mahajan First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2022 selection and editorial matter, [Mehak Khurana & Shilpa Mahajan]; individual chapters, the contributors Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, includ- ing photocopying, microfilming, and recording, or in any information storage or retrieval system, without writ- ten permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Khurana, Mehak, editor. | Mahajan, Shilpa, editor. Title: Security analytics : a data centric approach to information security / edited by Mehak Khurana, Shilpa Mahajan. Description: First edition. | Boca Raton : Chapman & Hall/CRC Press, 2022. | Series: Chapman & Hall/CRC cyber-physical systems | Includes bibliographical references and index. | Identifiers: LCCN 2021060075 (print) | LCCN 2021060076 (ebook) | ISBN 9781032072418 (hardback) | ISBN 9781032265261 (paperback) | ISBN 9781003206088 (ebook) Subjects: LCSH: Computer security--Data processing. | Computer networks--Security measures--Data processing. | Data mining. | Machine learning--Industrial applications. Classification: LCC QA76.9.A25 S37566 2022 (print) | LCC QA76.9.A25 (ebook) | DDC 005.8--dc23/eng/20220322 LC record available at https://lccn.loc.gov/2021060075 LC ebook record available at https://lccn.loc.gov/2021060076 ISBN: 978-1-032-07241-8 (hbk) ISBN: 978-1-032-26526-1 (pbk) ISBN: 978-1-003-20608-8 (ebk) DOI: 10.1201/9781003206088 Typeset in Palatino by SPi Technologies India Pvt Ltd (Straive) Contents Preface ............................................................................................................................................vii Editors ..............................................................................................................................................ix Contributors ....................................................................................................................................xi 1. A Reliable Blockchain Application for Music in a Decentralized Network ...............1 Bhavna Saini, Gaurav Aggarwal, Anju Yadav, and Kabeer Nautiyal 2. An Authentic Data-Centric Application for Medical Stores ........................................15 S. L. Jayalakshmi, R. Girija, and R. Vedhapriyavadhana 3. Intelligent Data-Analytic Approach for Restaurant Recommendation .....................29 Nirmal Kirola, Sandesh Tripathi, Nitin Chhimwal, and Sudhir Sharma 4. Investigation on Mobile Forensics Tools to Decode Cyber Crime .............................45 Keshav Kaushik 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications .....................................................................................................57 Kannadhasan Suriyan and Nagarajan Ramalingam 6. Optical Encryption of Images Using Partial Pivoting Lower Upper Decomposition Based on Two Structured Deterministic Phase Masks in the Hybrid Transform Domain .............................................................73 Priyanka Maan, Hukum Singh, and A. Charan Kumari 7. A Comparative Analysis of Blockchain Integrated IoT Applications ........................93 Seema Verma 8. Blockchain: A New Power-Driven Technology for Smart Cities ..............................109 Shyamal Srivastava and R. Girija 9. Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks Based on Lattice Behavioral Using Spread Spectral Soft-Max-Recurrent Neural Networks ...........................................................................123 N. Umamaheshwari and R. Renuga Devi 10. Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems .................................................................................................................................143 Rachana Y. Patil and Aparna Bannore v vi Contents 11. FRAME Routing to Handle Security Attacks in Wireless Sensor Networks ..........165 Subramanyam Radha, Bidar Sachin, Seyedali Pourmoafi, and Perattur Nagabushanam 12. A Blockchain Security Management Based on Rehashing Shift Code Rail Encryption Using Circular Shift Round Random Padding Key for Decentralized Cloud Environment ...........................................................................191 K. Ganga Devi and R. Renuga Devi 13. Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems .........................................................209 Manas Kumar Yogi and Ardhani Satya Narayana Chakravarthy Index .............................................................................................................................................221 Preface The aim of Security Analytics: A Data-Centric Approach to Information Security is to encourage the community of multinational researchers to showcase the research work done in their field of security analytics. This medium provided an opportunity to researchers on an international forum to learn about the latest developments through scientific informa- tion interchange in the field of Cyber Security, Cyber Physical Systems, and Analytics. This book was conceived after analyzing the increase in the prevalence of cybercrime attacks on business organizations, government infrastructures, and individuals. It focuses on analysis of data based on context, value and compliance controls surround- ing the data being secured. This view helps us apply appropriate technical and local secu- rity controls depending on what is being secured. Data-centric security may result in reduced security controls surrounding less critical systems and data, saving on resource usage and budget, which can be applied to improving security in more sensitive areas. The content promotes a multidisciplinary approach that reflects the requirement of cybersecu- rity, security analytics and forensics in various other domains. The topics were categorized, namely: Cyber Physical Systems; Cyber Security; Blockchain; Network Security; Mobile Security; Security in IoT; Cloud Security, Web and Mobile Security; Security in Data Analytics; Security Analysis Using Machine Learning, Cryptology, and its applications; Cyber and Digital Forensics; Network and Mobile Security, Blockchain, and Software Technologies. We received a good number of submis- sions all over India and overseas; each submission was anonymously reviewed by three reviewers. After extensive reviews and shepherding, 13 chapters were accepted, and this book includes revised versions of all accepted papers. We must mention that the selection of the papers was an extremely challenging task. We would like to thank everyone who contributed directly or indirectly in making this book a success and ensured its smooth running. The support of technical partners is also appreciatively acknowledged. Dr. Mehak Khurana and Dr. Shilpa Mahajan have coordinated the whole process of promot- ing, editing, and compiling the book. vii Editors Mehak Khurana has more than 11 years of experience in teaching and research. She is currently working as an Assistant Professor at The NorthCap University, Gurugram. Prior to that, she has worked at HMRITM, GGSIPU. She earned a Ph.D. degree in the field of Information Security and Cryptography. She completed her M. Tech degree with a silver medal in Information Technology from USICT, GGSIPU, Delhi. To better align the department with the industry’s best practices, she introduced and designed courses on Penetration Testing, Secure Coding and Software Vulnerabilities, Web and Mobile Security. She also orga- nized International Conference on Cyber Security and Digital Forensics in 2021 in collaboration with Springer as a Convener. Her specialization is cybersecurity, information security, and cryptography. She has published many papers in various reputed National/International Journals and conferences. She has been a men- tor to various B. Tech and M. Tech projects. She has been a resource person in various FDPs, workshops, guest lectures, and chaired the session at various Conferences. She is editing books from the various publishers like Springer, CRC Press, etc. She is serving as a reviewer for many reputed Journals and TPC member for various International Conferences. She has also been involved in activities to improve the standard of the profession. For that, she has coordinated many events in collaboration with IIT Bombay, IIT Madras, and IIIT Delhi. She successfully organized TEDx 2017 and 2019 as a co-curator. She is leading a few chapters and societies in her current university, Institute of Engineers India (IEI) CSE chapter, Programmers Club, Alumni Sub-committee, and Open Web Application Software Project at the North Cap University, and many more. She is an active member of various global societies, such as the Open Web Application Software Project (OWASP), Optical Society of America (OSA), Women in Appsec (WIA), Cryptology Research Society of India (CRSI). Dr. Shilpa Mahajan has more than 14 years of teaching experience at postgraduate and undergraduate levels. She is a committed researcher in the field of sensor net- works and has done her Ph.D. in the area of Wireless Sensor Network at Guru Nanak Dev University, Amritsar. She completed her post-graduation with distinction from Punjab Engineering College, Chandigarh. She specializes in Cyber Security, Computer Networks, Data Structures, Operating Systems, and Mobile Computing. She has intro- duced and designed various courses like Network Security and Cyber Security. Presently two doctoral scholars are ix