Utsav Upadhyay’s research while affiliated with Sir Padampat Singhania University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (7)


Ethical Implications in AI-Based Health Care Decision Making: A Critical Analysis
  • Article

July 2024

·

2 Reads

AI in Precision Oncology

Alok Kumar

·

Utsav Upadhyay


Figure 1: Moore Cellular Automata
Figure 4: SORCHIC Architecture Algorithm 4 Decryption Algorithm Input: Cipher Image C, Key K, SOCA Iterations p Output: Original Image 1: iter ← p 2: C 0 ← C 3: C 1 ← K 4: C2 ← Initialize with 0 5: for x ← 0 to iter − 1 do 6:
Figure 5: Input and Result Images using SORCHIC
Figure 7: Channel-wise histograms of Baboon generated by SORCHIC
Figure 9: Decryption results with altered key

+6

SORCHIC: Second Order Reversible Cellular Automata based Hybrid Image Cipher for IoT applications
  • Preprint
  • File available

February 2024

·

78 Reads

In the rapidly evolving digital world, ensuring secure data transmission, especially in image data pivotal to modern communication, remains critical. The Internet of Things (IoT) amplifies the need for encryption systems that blend robust security with efficiency. However, current cryptosystems often compromise one for the other. To address this, emerging algorithmic techniques aim to strike a balance. Among these, First Order Cellular Automata (FOCA) show promise for image encryption, aligning seamlessly with image processing intricacies while maintaining lower implementation complexity. This paper introduces SORCHIC, a novel hybrid encryption algorithm designed specifically for IoT applications encrypting multichannel images. Leveraging Second-Order Cellular Automata (SOCA) and Chaotic Maps, SORCHIC undergoes comprehensive exploration within this work. Detailed insights into its inner workings are provided, followed by a rigorous experimental analysis comparing it to existing encryption methods. The results underscore SORCHIC’s resilience against diverse cryptanalysis attacks and highlight its superior efficiency compared to established techniques. This study contributes to advancing encryption methods, particularly in IoT, by presenting a robust, efficient, and secure approach tailored for image data transmission.

Download

Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques

January 2024

·

249 Reads

·

5 Citations

International Journal of Cloud Applications and Computing

The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct characteristics, including its dynamic nature, diverse user base, and shared spaces, highlighting privacy concerns and legal implications. The paper analyzes access control principles specific to the cloud-based metaverse, emphasizing least privilege, separation of duties, RBAC, defense-in-depth, and auditability/accountability. It delves into identity verification and authorization methods, such as biometrics, multi-factor authentication, and role-based/attribute-based authorization. Advanced access control technologies for the cloud-based metaverse are examined, including SSO solutions, blockchain-based access control, ABAC, adaptive access control, and VMI for isolation. Risk mitigation strategies encompass IDS/IPS, SIEM, and user education programs.


Balancing innovation and privacy : A machine learning perspective

January 2024

·

4 Reads

Journal of Discrete Mathematical Sciences and Cryptography

As digital innovation advances, concerns surrounding privacy escalate. This manuscript explores the intricate relationship between machine learning and privacy preservation. Beginning with a comprehensive literature review, we delve into the current state of privacy in the digital age and examine machine learning’s role in addressing these concerns. The manuscript highlights key privacy-preserving techniques, including homomorphic encryption, differential privacy, and federated learning, providing in-depth insights into their applications and real-world implementations. Anticipating future challenges and trends, we recommend maintaining a delicate equilibrium between innovation and privacy in the dynamic landscape of machine learning.



Figure 1. Potential types of cyberbullying in the metaverse
Figure 2. Cyberbullying combating mechanisms in the metaverse
Examples of global information systems
Cyberbullying in the Metaverse: A Prescriptive Perception on Global Information Systems for User Protection

January 2023

·

1,418 Reads

·

21 Citations

The emergence of the metaverse, a virtual reality space, has ushered in a new era of digital experiences and interactions in global information systems. With its unique social norms and behaviors, this new world presents exciting opportunities for users to connect, socialize, and explore. However, as people spend more time in the metaverse, it has become increasingly apparent that the issue of cyberbullying needs to be addressed. Cyberbullying is a serious problem that can harm victims psychologically and physically. It involves using technology to harass, intimidate, or humiliate individuals or groups in global information systems. The risk of cyberbullying is high in the metaverse, where users are often anonymous. Therefore, it is crucial to establish a safer and more respectful culture within the metaverse to detect and prevent such incidents from happening.

Citations (3)


... This approach not only enhances the detection of malicious activities but also aids in the investigation and response processes by providing clear, actionable insights into how decisions are made. The integration of XAI into IDS is presented as a crucial step toward more reliable and understandable security solutions for protecting cloud infrastructures [21]. The potential of using Explainable AI (XAI) to enhance the security of energy systems against cyberattacks. ...

Reference:

Advancements in Securing Cloud-Stored Data and Managing Sensitive Information: A Comprehensive Review of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) Techniques
Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems
  • Citing Conference Paper
  • November 2023

... Bautista-Villalpando and Abran (2021) [15] , AL-Qtiemat & AL-Odat, (2024) [5] , Sai Shreya and Kavitha (2024) [55] , Liubchenko & Volkov (2024) [37] , Reece et al. (2024) [54] , Amara et al. (2017) [6][7] , Kunduru (2023) [34] . Pranjal (2024) [50] , Bouchama and Kamal (2021) [18] , Shilpa (2024) [64] , Sharma (2024) [63] Upadhyay (2024) [69] 2 Data Encryption Amara et al. (2017) [6][7] , Bautista-Villalpando and Abran (2021) [15] , Shabbir et al. (2024) [61] , Bouchama and Kamal (2021) [18] Khodayer et al. (2024) [33] , Shilpa (2024) [64] , Arogundade (2024) [9] Saxena and Gayathri (2021) [58] Mukherjee (2019) [44] , George and Sagayarajan, (2023) [25] , AL-Qtiemat & AL-Odat, (2024) [5] , Sai Shreya, R., & Kavitha, R. (2024) [55] . Reece et al. (2024) [54] , Kunduru (2023) [34] and Pranjal (2024) [50] 3 Cloud network security AL-Qtiemat & AL-Odat, (2024) [5] , Alenezi (2021) [3] , Kunduru (2023) [34] , Bautista-Villalpando and Abran (2021) [15] , Shabbir et al. (2024) [61] , Shilpa (2024) [64] Sharma (2024) [63] Pranjal (2024) [50] , Amara et al. (2017) [6][7] , George and Sagayarajan, S. (2023) [25] . ...

Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques

International Journal of Cloud Applications and Computing

... It makes use of the long-lasting effects of digital information and the possibility of a large audience causing emotional distress and harm to victims. Various tactics, such as education and awareness campaigns, social media campaigns, in-game events, policies and procedures, parental participation, and digital health interventions, can be used to reduce cyberbullying [7]. ...

Cyberbullying in the Metaverse: A Prescriptive Perception on Global Information Systems for User Protection