scholarly journals CLE against SOA with Better Data Security Storage to Cloud 5G

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Huige Wang ◽  
Xing Chang ◽  
Kefei Chen

Cloud 5G and Cloud 6G technologies are strong backbone infrastructures to provide high data rate and data storage with low latency for preserving QoS (Quality of Service) and QoE (Quality of Experience) in applications such as driverless vehicles, drone-based deliveries, smart cities and factories, remote medical diagnosis and surgery, and artificial-intelligence-based personalized assistants. There are many techniques to support the aforementioned applications, but for privacy preservation of Cloud 5G, the existing methods are still not sufficient. Public key encryption (PKE) scheme is an important means to protect user data privacy in Cloud 5G. Currently, the most common PKE used in Cloud 5G is CCA or CPA secure ones. However, its security level maybe not enough. SOA security is a stronger security standard than CPA and CCA. Roughly speaking, PKE with SOA security means that the adversary is allowed to open a subset of challenger ciphertexts and obtains the corresponding encrypted messages and randomness, but the unopended messages and randomness remain secure in the rest of the challenger ciphertexts. Security against SOA in PKEs has been a research hotspot, especially with the wide discussion in Cloud 5G. We revisited the SOA-CLE and proposed a new security proof, which is more concise and user friendly to understand privacy preservation in Cloud 5G applications.

Author(s):  
Samiha Abdelrahman Mohammed Marwan ◽  
Ahmed Shawish ◽  
Khaled Nagaty

There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of information is crucial. From nature to science, the idea that genes themselves are made of information stimulated the research in molecular deoxyribonucleic acid (DNA). DNA is capable of storing huge amounts of data, which leads to its promising effect in steganography. DNA steganography is the art of using DNA as an information carrier which achieves high data storage capacity as well as high security level. Currently, DNA steganography techniques utilize the properties of only one DNA strand, since the other strand is completely dependent on the first one. This paper presents a DNA-based steganography technique that hides data into both DNA strands with respect to the dependency between the two strands. In the proposed technique, a key of the same length of the reference DNA sequence is generated after using the second DNA strand. The sender sends both the encrypted DNA message and its reference DNA sequence together into a microdot. If the recipient receives this microdot uncontaminated, the sender can safely send the generated key afterwards. The proposed technique doubles the amount of data stored and guarantees a secure transmission process as well, for even if the attacker suspects the first-sent DNA sequence, they will never receive the key, and hence full data extraction is nearly impossible. The conducted experimental study confirms the effectiveness of the proposed.


2019 ◽  
Vol 8 (3) ◽  
pp. 7544-7548

The increasing popularity of cloud data storage and its ever-rising versatility, shows that cloud computing is one of the most widely excepted phenomena. It not only helps with powerful computing facilities but also reduce a huge amount of computational cost. And with such high demand for storage has raised the growth of the cloud service industry that provides an affordable, easy-to-use and remotely-accessible services. But like every other emerging technology it carries some inherent security risks associated and cloud storage is no exception. The prime reason behind it is that users have to blindly trust the third parties while storing the useful information, which may not work in the best of interest. Hence, to ensure the privacy of sensitive information is primarily important for any public, third-party cloud. In this paper, we mainly focus on proposing a secure cloud framework with encrypting sensitive data’s using AES-GCM cryptographic techniques in HEROKU cloud platform. Here we tried to implement Heroku as a cloud computing platform, used the AES-GCM algorithm and evaluate the performance of the said algorithm. Moreover, analyses the performance of AES/GCM execution time with respect to given inputs of data


2012 ◽  
Vol 9 (2) ◽  
pp. 1
Author(s):  
Asra Hosseini

From earliest cities to the present, spatial division into residential zones and neighbourhoods is the universal feature of urban areas. This study explored issue of measuring neighbourhoods through spatial autocorrelation method based on Moran's I index in respect of achieving to best neighbourhoods' model for forming cities smarter. The research carried out by selection of 35 neighbourhoods only within central part of traditional city of Kerman in Iran. The results illustrate, 75% of neighbourhoods' area in the inner city of Kerman had clustered pattern, and it shows reduction in Moran's index is associated with disproportional distribution of density and increasing in Moran's I and Z-score have monotonic relation with more dense areas and clustered pattern. It may be more efficient for urban planner to focus on spatial autocorrelation to foster neighbourhood cohesion rather than emphasis on suburban area. It is recommended characteristics of historic neighbourhoods can be successfully linked to redevelopment plans toward making city smarter, and also people's quality of life can be related to the way that neighbourhoods' patterns are defined. 


2012 ◽  
Vol 9 (2) ◽  
pp. 1
Author(s):  
Asra Hosseini

From earliest cities to the present, spatial division into residential zones and neighbourhoods is the universal feature ofurban areas. This study explored issue ofmeasuring neighbourhoods through spatial autocorrelation method based on Moran's I index in respect of achieving to best neighbourhoods' model for forming cities smarter. The research carried out by selection of 35 neighbourhoods only within central part of traditional city of Kerman in Iran. The results illustrate, 75% ofneighbourhoods, area in the inner city of Kerman had clustered pattern, and it shows reduction in Moran's index is associated with disproportional distribution of density and increasing in Moran's I and Z-score have monotonic relation with more dense areas and clustered pattern. It may be more efficient for urban planner to focus on spatial autocorrelation to foster neighbourhood cohesion rather than emphasis on suburban area. It is recommended characteristics of historic neighbourhoods can be successfully linked to redevelopment plans toward making city smarter, and also people's quality of life can be related to the way that neighbourhoods' patterns are defined.


2020 ◽  
Vol 18 (4) ◽  
pp. 765-779
Author(s):  
E.V. Popov ◽  
K.A. Semyachkov ◽  
K.V. Zhunusova

Subject. This article explores the basic elements of the engineering infrastructure of smart cities. Objectives. The article aims to systematize theoretical descriptions of the engineering infrastructure of a smart city. Methods. For the study, we used a logical analysis and systematization. Results. The article highlights the main areas of infrastructure development of smart cities. Conclusions. Improving process management mechanisms, optimizing urban infrastructure, increasing the use of digital technologies, and developing socio-economic innovation improve the quality of the urban environment in a digitalized environment. And improving the efficiency of urban planning and security, studying its properties and characteristics, and forming an effective urban information system lead to its functional transformations.


Author(s):  
Shalin Eliabeth S. ◽  
Sarju S.

Big data privacy preservation is one of the most disturbed issues in current industry. Sometimes the data privacy problems never identified when input data is published on cloud environment. Data privacy preservation in hadoop deals in hiding and publishing input dataset to the distributed environment. In this paper investigate the problem of big data anonymization for privacy preservation from the perspectives of scalability and time factor etc. At present, many cloud applications with big data anonymization faces the same kind of problems. For recovering this kind of problems, here introduced a data anonymization algorithm called Two Phase Top-Down Specialization (TPTDS) algorithm that is implemented in hadoop. For the data anonymization-45,222 records of adults information with 15 attribute values was taken as the input big data. With the help of multidimensional anonymization in map reduce framework, here implemented proposed Two-Phase Top-Down Specialization anonymization algorithm in hadoop and it will increases the efficiency on the big data processing system. By conducting experiment in both one dimensional and multidimensional map reduce framework with Two Phase Top-Down Specialization algorithm on hadoop, the better result shown in multidimensional anonymization on input adult dataset. Data sets is generalized in a top-down manner and the better result was shown in multidimensional map reduce framework by the better IGPL values generated by the algorithm. The anonymization was performed with specialization operation on taxonomy tree. The experiment shows that the solutions improves the IGPL values, anonymity parameter and decreases the execution time of big data privacy preservation by compared to the existing algorithm. This experimental result will leads to great application to the distributed environment.


Smart Cities ◽  
2021 ◽  
Vol 4 (3) ◽  
pp. 1058-1086
Author(s):  
Franklin Oliveira ◽  
Daniel G. Costa ◽  
Luciana Lima ◽  
Ivanovitch Silva

The fast transformation of the urban centers, pushed by the impacts of climatic changes and the dramatic events of the COVID-19 Pandemic, will profoundly influence our daily mobility. This resulted scenario is expected to favor adopting cleaner and flexible modal solutions centered on bicycles and scooters, especially as last-mile options. However, as the use of bicycles has rapidly increased, cyclists have been subject to adverse conditions that may affect their health and safety when cycling in urban areas. Therefore, whereas cities should implement mechanisms to monitor and evaluate adverse conditions in cycling paths, cyclists should have some effective mechanism to visualize the indirect quality of cycling paths, eventually supporting choosing more appropriate routes. Therefore, this article proposes a comprehensive multi-parameter system based on multiple independent subsystems, covering all phases of data collecting, formatting, transmission, and processing related to the monitoring, evaluating, and visualizing the quality of cycling paths in the perspective of adverse conditions that affect cyclist. The formal interactions of all modules are carefully described, as well as implementation and deployment details. Additionally, a case study is considered for a large city in Brazil, demonstrating how the proposed system can be adopted in a real scenario.


2021 ◽  
Vol 13 (2) ◽  
pp. 769
Author(s):  
Mona Treude

Cities are becoming digital and are aiming to be sustainable. How they are combining the two is not always apparent from the outside. What we need is a look from inside. In recent years, cities have increasingly called themselves Smart City. This can mean different things, but generally includes a look towards new digital technologies and claim that a Smart City has various advantages for its citizens, roughly in line with the demands of sustainable development. A city can be seen as smart in a narrow sense, technology wise, sustainable or smart and sustainable. Current city rankings, which often evaluate and classify cities in terms of the target dimensions “smart” and “sustainable”, certify that some cities are both. In its most established academic definitions, the Smart City also serves both to improve the quality of life of its citizens and to promote sustainable development. Some cities have obviously managed to combine the two. The question that arises is as follows: What are the underlying processes towards a sustainable Smart City and are cities really using smart tools to make themselves sustainable in the sense of the 2015 United Nations Sustainability Goal 11? This question is to be answered by a method that has not yet been applied in research on cities and smart cities: the innovation biography. Based on evolutionary economics, the innovation biography approaches the process towards a Smart City as an innovation process. It will highlight which actors are involved, how knowledge is shared among them, what form citizen participation processes take and whether the use of digital and smart services within a Smart City leads to a more sustainable city. Such a process-oriented method should show, among other things, to what extent and when sustainability-relevant motives play a role and which actors and citizens are involved in the process at all.


Smart Cities ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 894-918
Author(s):  
Luís Rosa ◽  
Fábio Silva ◽  
Cesar Analide

The evolution of Mobile Networks and Internet of Things (IoT) architectures allows one to rethink the way smart cities infrastructures are designed and managed, and solve a number of problems in terms of human mobility. The territories that adopt the sensoring era can take advantage of this disruptive technology to improve the quality of mobility of their citizens and the rationalization of their resources. However, with this rapid development of smart terminals and infrastructures, as well as the proliferation of diversified applications, even current networks may not be able to completely meet quickly rising human mobility demands. Thus, they are facing many challenges and to cope with these challenges, different standards and projects have been proposed so far. Accordingly, Artificial Intelligence (AI) has been utilized as a new paradigm for the design and optimization of mobile networks with a high level of intelligence. The objective of this work is to identify and discuss the challenges of mobile networks, alongside IoT and AI, to characterize smart human mobility and to discuss some workable solutions to these challenges. Finally, based on this discussion, we propose paths for future smart human mobility researches.


2021 ◽  
Vol 11 (2) ◽  
pp. 807
Author(s):  
Llanos Tobarra ◽  
Alejandro Utrilla ◽  
Antonio Robles-Gómez ◽  
Rafael Pastor-Vargas ◽  
Roberto Hernández

The employment of modern technologies is widespread in our society, so the inclusion of practical activities for education has become essential and useful at the same time. These activities are more noticeable in Engineering, in areas such as cybersecurity, data science, artificial intelligence, etc. Additionally, these activities acquire even more relevance with a distance education methodology, as our case is. The inclusion of these practical activities has clear advantages, such as (1) promoting critical thinking and (2) improving students’ abilities and skills for their professional careers. There are several options, such as the use of remote and virtual laboratories, virtual reality and game-based platforms, among others. This work addresses the development of a new cloud game-based educational platform, which defines a modular and flexible architecture (using light containers). This architecture provides interactive and monitoring services and data storage in a transparent way. The platform uses gamification to integrate the game as part of the instructional process. The CyberScratch project is a particular implementation of this architecture focused on cybersecurity game-based activities. The data privacy management is a critical issue for these kinds of platforms, so the architecture is designed with this feature integrated in the platform components. To achieve this goal, we first focus on all the privacy aspects for the data generated by our cloud game-based platform, by considering the European legal context for data privacy following GDPR and ISO/IEC TR 20748-1:2016 recommendations for Learning Analytics (LA). Our second objective is to provide implementation guidelines for efficient data privacy management for our cloud game-based educative platform. All these contributions are not found in current related works. The CyberScratch project, which was approved by UNED for the year 2020, considers using the xAPI standard for data handling and services for the game editor, game engine and game monitor modules of CyberScratch. Therefore, apart from considering GDPR privacy and LA recommendations, our cloud game-based architecture covers all phases from game creation to the final users’ interactions with the game.


Sign in / Sign up

Export Citation Format

Share Document