Dr. Yogesh Manohar Gajmal

@famt.ac.in

Associate Professor, Information Technology Departmnet
Finolex Academy of Management and Technology



              

https://researchid.co/yogeshmgajmal

RESEARCH INTERESTS

Blockchain, Information Security, Cloud Computing

11

Scopus Publications

87

Scholar Citations

4

Scholar h-index

3

Scholar i10-index

Scopus Publications

  • A Survey on a Novel Cryptojacking Covert Attack
    Yogesh M. Gajmal, Pranav More, Kiran Dhanaji Kale, and Arvind Jagtap

    IEEE
    New technologies based on cryptocurrencies and blockchain are revolutionizing how we conduct commercials online. Nowadays, a wide range of blockchain as well as cryptocurrency systems, apps, also technologies are publicly accessible in the direction of businesses, end users, as well as even malicious attackers that seek towards deploy cryptojacking malware to abuse the computational resources of common people. Without the victims' knowledge, this type of malware operates on their machines. In order to mine cryptocurrency for the cybercriminal, it frequently infects browsers and performs CPU-intensive computations. The cybercriminal then steals the revenues without compensating for the resources used. However, current detection techniques, for instance browser extensions that designed to defend users using blacklist protection or antivirus programmes by different analysis techniques, can only partially solve the problem of emerging cryptojacking because attackers can simply get around them via using obfuscation methods or else frequently altering their domains or else scripts. As a result, numerous researches in the literature suggested employing different dynamic/behavioral indicators to identify cryptojacking malware. However, a systematic study using a deep grasp of the new cryptojacking attack as well as a thorough assessment of studies into the literature is lacking in the literature. Therefore, using data from the web and journal articles, we give a systematic study of cryptojacking in this paper. Finally, we offer some prevention advice as well as warning signs that you might have been a victim of cryptojacking.

  • Access control and data sharing mechanism in decentralized cloud using blockchain technology
    Yogesh Gajmal, Pranav More, Arvind Jagtap, and Kiran Kale

    Frontier Scientific Publishing Pte Ltd
    <p class="abstract">Access control is the most vital aspect of cloud data storage security. Traditional techniques for data distribution as well as access control face noteworthy challenges in the arena of research as a result of extensive abuse and privacy data breaches. The blockchain concept provides security by verifying users by multiple encryption technologies. Collaboration in the cloud improves management but compromises privacy. Consequently, we created an efficient access management and data exchange system for a blockchain-based decentralized cloud. On the basis of an ID and password, the data user (DU) submits a registering request to the data owner (DO). The DO data is incorporated into a transactional blockchain by an encoded master key. The data owner (DO) provides data encryption, and encrypted files are still published to the Interplanetary File System (IPFS). The DO generates ciphertext metadata, which is then published to the transactional blockchain utilizing a secure file location and a secure key. The projected access control and data sharing solution performed better in a decentralized blockchain based cloud, as measured by metrics such as a reduced illegitimate user rate of 5%, and a size blockchain of is 100 and 200, respectively.<strong><em></em></strong></p>

  • Anomaly Detection for Internet of Things Security Attacks Based on Recent Optimal Federated Deep Learning Model
    Udayakumar Dr.R., Anuradha Dr.M., Dr. Yogesh Manohar Gajmal, and Elankavi Dr.R.

    SASA Publications
    The mushrooming of IoTs (Internet of Things) and decentralised paradigm in cyber security have attracted a lot of interest from the government, academic, and business sectors in recent years. The use of MLT-assisted techniques in the IoT security arena has attracted a lot of attention in recent years. Many current studies presume that massive training data is readily accessible from IoT devices and transferable to main servers. However, since data is hosted on single servers, security and privacy concerns regarding this data also increase. It is suggested to use decentralised on-device data in OFDL (Optimal Federated Deep Learning) based anomaly detections to proactively identify infiltration in networks for IoTs. The GRUs (Gated Recurrent Units) used in OFDL's training rounds share only learned weights with the main OFDL servers, protecting data integrity on local devices. The model's training costs are reduced by the use of appropriate parameters, which also secures the edge or IoT device. In order to optimise the hyper-parameter environments for the limited OFDL environment, this paper suggests an MSSO (Modified Salp Swarm Optimisation) approach. Additionally, ensembles combine updates from multiple techniques to enhance accuracies. The experimental findings show that this strategy secures user data privacy better than traditional/centralized MLTs and offers the best accuracy rate for attack detection.

  • User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks
    Udayakumar Dr.R., Dr. Suvarna Yogesh Pansambal, Dr. Yogesh Manohar Gajmal, Vimal Dr.V.R., and Sugumar Dr.R.

    SASA Publications
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better performances. These previously suggested techniques for network traffic analysis typically need voluminous information on network usages. Hence, this work proposes OFedeMWOUAA (optimal federated learning-based UAA technique with Meadow Wolf Optimisation) and DNN (deep Neuron Networks) for minimizing risks of data leakages in MWNs (Mobile Wireless Networks). In the proposed OFedeMWOUAA, the need to submit data to cloud servers does not arise because it trains DLTs locally and only uploads model gradients or knowledge weights. The OFedeMWOUAA approach effectively decreases dangers to data privacies with very minor performance losses in simulations.

  • Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System
    Yogesh M Gajmal and R. Udayakumar

    Informa UK Limited
    ABSTRACT The outsourcing of Electronic Health Records (EHR) on cloud infrastructures has enabled medical data sharing among several healthcare applications. The blockchain offers security by authenticating users with encryption methods. The collaboration with the cloud provides better management but poses threats to the privacy of the patient. This paper devises a novel blockchain-assisted framework for effective data sharing and retrieval using cloud platforms. Here, the data protection model is devised in EHR application for secure transmission. The entities in the cloud platform include data user, data owner, smart agreement, transactional blockchain, and Inter-Planetary File System (IPFS). Here, the data owner includes a data protection model to secure EHR in which secured EHR is transferred to IPFS before sharing with the data user. The data protection is done by preserving data privacy using Tracy-Singh product and proposed Conditional Autoregressive Value at risk (CAViaR)-based Bird swarm algorithm (CAViaR-based BSA) combination of BSA and CAViaR for generating optimal privacy-preserving coefficients. The objective function is newly devised considering privacy and utility. The proposed CAViaR-based BSA outperformed other methods with minimal responsiveness of 251.339 s, maximal genuine user detection of 32.451%, maximal privacy of 96.5%, and minimal information loss of 3.5%.

  • Blockchain-Based Access Control and Data Sharing Mechanism in Cloud Decentralized Storage System
    Yogesh M Gajmal and R. Udayakumar

    River Publishers
    Access control is a major factor in enhancing data security in the cloud storage system. However, the existing data sharing and the access control method have privacy data leakage and key abuse, which is a major challenge in the research community. Therefore, an effective method named Blockchain-based access control and data sharing approach is developed in the cloud storage system to increase data security. The proposed Blockchain-based access control and data sharing approach effectively solve single-point failure in the cloud system. It provides more benefits by increasing the throughput and reducing the cost. The Data user (DU) makes the registration request using the ID and password and forwards it to the Data Owner (DO), which processes the request and authenticates the Data user. The information of the data owner is embedded in the transactional blockchain using the encrypted master key. The Data owner achieves the data encryption process, and encrypted files are uploaded to the Interplanetary File System (IPFS). Based on the encrypted file location and encrypted key, the Data owner generates the ciphertext metadata and is embedded in the transactional blockchain. The proposed Blockchain-based access control and data sharing approach achieved better performance using the metrics, like a better genuine user detection rate of 95% and lower responsiveness of 25sec with the blockchain of 100 sizes.

  • Comprehensive analysis for fraud detection of credit card through machine learning
    Parth Roy, Prateek Rao, Jay Gajre, Kanchan Katake, Arvind Jagtap, and Yogesh Gajmal

    IEEE
    A credit card which remains a very widespread compensation method is accepted online & offline that provides cashless transactions. It’s an easy, suitable then very common to make payments and other transactions. With the increase of developments credit card frauds are also growing. Financial deception is severely cumulative in the worldwide statement enhancement. Billion dollars are at loss due to these fraudulent acts. These actions are accomplished so gracefully that it is similar to genuine transactions. Therefore, simple design practices and other less composite methods will be non-operating. In directive to minimalize disorder and bring order in place having a well-organized method of fraud detection has become a need for all banks. In this paper we used Machine learning, to notice Master Card fake transactions. Also, IFA and OD approaches are applied towards enhance finest answer on behalf of scam finding problems. Approaches remain proved toward diminish untrue alarm proportions also upsurge scam discovery proportion. Dataset of card dealings stays obtained since European card owners having 284,807 communications. To detect and prevent the fraudulent, slightly of these approaches can be applied on bank credit card scam detection system, to detect and prevent the scam.

  • A Bibliometric Analysis of Authentication based Access Control in Cloud using Blockchain



  • Data access security in cloud computing: A review
    Anagha Markandey, Prajakta Dhamdhere, and Yogesh Gajmal

    IEEE
    Now a days, the big data is stored on the internet called as clouds. With usage of cloud storage users can store their data on the internet. Cloud computing provides various services to the users. Data storage is one of them. But it is observed that there is very big problem of data stealing through the internet. More is the problem of data leaking & attacks on the data on clouds. The intention of this paper is to attain data security of cloud storage and to put together equivalent cloud storage security strategy. These strategies are combined with the outcomes of existing data by considering the security risks & user data on cloud storage & move towards the appropriate security technique , which is based on properties of cloud storage system. The paper will go in to subtle elements of information assurance strategies and methodologies utilized all through the world to guarantee most extreme information insurance by diminishing dangers and dangers. Accessibility of information in the cloud is helpful for some applications yet it postures hazards by presenting information to applications which may as of now have security provisos in them. Also, utilization of virtualization for distributed computing may chance information when a visitor OS is keep running over a hypervisor without knowing the unwavering quality of the visitor OS which may have a security proviso in it. The paper will likewise give a knowledge on information security perspectives for Data-in-Transit and Data-at-Rest.

  • A survey on access controls in cloud computing
    Yogesh Gajmal and K. P. Thooyamani

    IEEE
    Cloud computing is a technique for conveying Information Technology (IT) benefits in which assets stay recouped after the Internet over connected apparatuses plus appliance. Instead of keeping documents on a restrictive hard drive or nearby storage device, cloud-based capacity makes it conceivable to spare them to a remote database. For whatever length of time that an electronic device approaches the web, it approaches the data and the software programs to run it. Cloud computing opens up another universe of chances, however blended in with these opportunities are various information get to control security challenges that should be considered and tended to preceding focusing on a Cloud computing procedure. Cloud computing security challenges fall into three general classifications are Data Protection, User Authentication and Disaster and Data Breach. In this paper we examined different existing security solution accessible for access control mechanism like Key-Policy constructed Encoding, Characteristic constructed Encoding, Multi-specialist, and Individuality constructed Encoding.

RECENT SCHOLAR PUBLICATIONS

  • A Survey on a Novel Cryptojacking Covert Attack
    YM Gajmal, P More, KD Kale, A Jagtap
    2024 2nd International Conference on Intelligent Data Communication 2024

  • Original Research Article Access control and data sharing mechanism in decentralized cloud using blockchain technology
    Y Gajmal, P More, A Jagtap, K Kale
    Journal of Autonomous Intelligence 7 (3) 2024

  • Anomaly detection for internet of things security attacks based on recent optimal federated deep learning model
    R Udayakumar, M Anuradha, YM Gajmal, R Elankavi
    J Internet Services Inform Secur. 13 (3), 104-121 2023

  • Privacy and utility-assisted data protection strategy for secure data sharing and retrieval in cloud system
    YM Gajmal, R Udayakumar
    Information Security Journal: A Global Perspective 31 (4), 451-465 2022

  • Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
    YM Gajmal, R Udayakumar
    Journal of web engineering 20 (5), 1359-1388 2021

  • Digital voting and Election Forecasting System
    PYG Avi Prasad, Chakradhari kumar, Sanjay Kumar Panjiar, Sandesh katkar
    International Journal of All Research Education and Scientific Methods 2021

  • Comprehensive analysis for fraud detection of credit card through machine learning
    P Roy, P Rao, J Gajre, K Katake, A Jagtap, Y Gajmal
    2021 international conference on emerging smart computing and informatics 2021

  • A Bibliometric Analysis of Authentication based Access Control in Cloud using Blockchain
    YM Gajmal, R Udayakumar
    Library Philosophy and Practice, 0_1-16 2021

  • Artificial Intelligence based intimation of houses for Tenants, Landlords and Other Folks
    S Motiwala, V Sutar, A Nandan, A Moharkar, A Jagtap, Y Gajmal
    2021

  • Analysis of Authentication based Data Access Control Systems in Cloud
    YM Gajmal, R Udayakumar
    PalArch's Journal of Archaeology of Egypt/Egyptology 17 (7), 5319-5328 2020

  • Data Access Controls in Cloud: A Survey.
    YM GAJMAL, R UDAYAKUMAR
    International Journal of Pharmaceutical Research (09752366) 12 (4) 2020

  • Authentication based data access control and sharing mechanism in cloud using blockchain technology
    R Gajmal, Y.M., Udayakumar
    International Journal of Emerging Trends in Engineering Research 8 (No. 9 2020

  • Data Access Controls in Cloud: A Survey
    RU YOGESH M. GAJMAL
    The Journal of Research on the Lepidoptera 51 (3), 109-118 2020

  • A Survey on Access Controls in Cloud Computing
    Y Gajmal, KP Thooyamani
    2018 4th International Conference on Computing Communication and Automation 2018

  • Data access security in cloud computing: A review
    A Markandey, P Dhamdhere, Y Gajmal
    2018 International Conference on Computing, Power and Communication 2018

  • DATA ACCESS CONTROL SCHEMES IN CLOUD COMPUTING: A REVIEW
    MYM Gajmal, KP Thooyamani
    2017

  • Survey on Friend Recommendation System for Social Network’s
    CH Hegshetye, NC Bandbe, YM Gajmal
    2015

  • User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks
    R Udayakumar, SY Pansambal, YM Gajmal, VR Vimal, R Sugumar


  • MDT: Middle Tire Automation Testing Framework
    YM Gajmal, VM Gaikwad


  • A SURVEY ON TESTING TOOLS FOR WEB SERVICES
    YM GAJMAL, VM GAIKWAD


MOST CITED SCHOLAR PUBLICATIONS

  • Data access security in cloud computing: A review
    A Markandey, P Dhamdhere, Y Gajmal
    2018 International Conference on Computing, Power and Communication 2018
    Citations: 48

  • Comprehensive analysis for fraud detection of credit card through machine learning
    P Roy, P Rao, J Gajre, K Katake, A Jagtap, Y Gajmal
    2021 international conference on emerging smart computing and informatics 2021
    Citations: 13

  • Privacy and utility-assisted data protection strategy for secure data sharing and retrieval in cloud system
    YM Gajmal, R Udayakumar
    Information Security Journal: A Global Perspective 31 (4), 451-465 2022
    Citations: 12

  • Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
    YM Gajmal, R Udayakumar
    Journal of web engineering 20 (5), 1359-1388 2021
    Citations: 7

  • Analysis of Authentication based Data Access Control Systems in Cloud
    YM Gajmal, R Udayakumar
    PalArch's Journal of Archaeology of Egypt/Egyptology 17 (7), 5319-5328 2020
    Citations: 3

  • A Bibliometric Analysis of Authentication based Access Control in Cloud using Blockchain
    YM Gajmal, R Udayakumar
    Library Philosophy and Practice, 0_1-16 2021
    Citations: 2

  • Anomaly detection for internet of things security attacks based on recent optimal federated deep learning model
    R Udayakumar, M Anuradha, YM Gajmal, R Elankavi
    J Internet Services Inform Secur. 13 (3), 104-121 2023
    Citations: 1

  • Data Access Controls in Cloud: A Survey.
    YM GAJMAL, R UDAYAKUMAR
    International Journal of Pharmaceutical Research (09752366) 12 (4) 2020
    Citations: 1