scholarly journals Smart Contract Centric Inference Engine For Intelligent Electric Vehicle Transportation System

Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4252 ◽  
Author(s):  
Prince Waqas Khan ◽  
Yung-Cheol Byun

The provision of electric vehicles (EVs) is increasing due to the need for ecological green energy. The increment in EVs leads to an intelligent electric vehicle transportation system’s need instead of cloud-based systems to manage privacy and security issues. Collecting and delivering the data to current transportation systems means disclosing personal information about vehicles and drivers. We have proposed a secure and intelligent electric vehicle transportation system based on blockchain and machine learning. The proposed method utilizes the state of the art smart contract module of blockchain to build an inference engine. This system takes the sensors’ data from the vehicle control unit of EV, stores it in the blockchain, makes decisions using an inference engine, and executes those decisions using actuators and user interface. We have utilized a double-layer optimized long short term memory (LSTM) algorithm to predict EV’s stator temperature. We have also performed an informal analysis to demonstrate the proposed system’s robustness and reliability. This system will resolve the security issues for both information and energy interactions in EVs.

Author(s):  
A. Denker

Abstract. The project of smart cities has emerged as a response to the challenges of twenty-first- century urbanization. Solutions to the fundamental conundrum of cities revolving around efficiency, convenience and security keep being sought by leveraging technology. Notwithstanding all the conveniences furnished by a smart city to all the citizens, privacy of a citizen is intertwined with the benefits of a smart city. The development processes which overlook privacy and security issues have left many of the smart city applications vulnerable to non-conventional security threats and susceptible to numerous privacy and personal data spillage risks. Among the challenges the smart city initiatives encounter, the emergence of the smartphone-big data-the cloud coalescence is perhaps the greatest, from the viewpoint of privacy and personal data protection. As our cities are getting digitalized, information comprising citizens' behavior, choices, and mobility, as well as their personal assets are shared over smartphone-big data-the cloud coalescences, thereby expanding cyber-threat surface and creating different security concerns. This coalescence refers to the practices of creating and analyzing vast sets of data, which comprise personal information. In this paper, the protection of privacy and personal data issues in the big data environment of smart cities are viewed through bifocal lenses, focusing on social and technical aspects. The protection of personal data and privacy in smart city enterprises is treated as a socio-technological operation where various actors and factors undertake different tasks. The article concludes by calling for novel developments, conceptual and practical changes both in technological and social realms.


Author(s):  
Luca Caviglione ◽  
Mauro Coccoli ◽  
Alessio Merlo

With millions of users, Online Social Networks (OSNs) are a huge cultural phenomenon. Put briefly, they are characterized by: i) an intrinsic sharing of personal information, ii) a rich set of features to publish, organize and retrieve contents, especially for emphasizing their social organization, iii) the interaction with a heterogeneous set of devices, e.g., ranging from desktops to mobile appliances, and iv) the mix of Web-based paradigms and sophisticated methodologies for processing data. However, if not properly implemented, or without effective security policies, i) – iv) could lead to severe risks in terms both of privacy and security. In this perspective, this chapter analyzes the major peculiarities of OSN platforms, the preferred development methodologies, and usage patterns, also by taking into account how personal information can be exploited to conduct malicious actions. Then, a graph-based modeling approach is introduced to reveal possible attacks, as well as to elaborate the needed countermeasures or (automated) checking procedures.


Entropy ◽  
2020 ◽  
Vol 22 (7) ◽  
pp. 712
Author(s):  
Hong Zhao ◽  
Xue Bai ◽  
Shihui Zheng ◽  
Licheng Wang

As the blockchain 2.0 platform, Ethereum’s turing complete programming language and smart contract components make it play an important role in the commercialization of blockchain. With the further development of blockchain applications, the privacy and security issues of Ethereum have gradually emerged. To solve this problem, we proposed a blockchain privacy protection model called RZcash in the previous work. It implements the dynamically updateable and verifiable hiding of the asset information in Ethereum, namely the account balance and transaction amount. However, RZcash does not pay attention to the key redundancy problem that may be caused by the creation of secret accounts. In addition, the large size of proofs gives it high communication costs. In response to these problems, we further improve RZcash. For the key redundancy problem, we construct a new signature scheme based on the ciphertext equivalent test commitment. Moreover, we use the Schnorr signature and bulletproof to improve the corresponding proof scheme in RZcash, thereby reducing the size of proof. Based on these improvements, we propose a decentralized payment system, called RZcoin, based on Ethereum. Finally, we implement the algorithm model of RZcoin and evaluate its security and performance. The results show that RZcoin has higher security and Lower communication cost than RZcash.


Author(s):  
Miss. Komal K. Khandare

Abstract: Social networks have become a part of human life. online interaction, communication, and interest sharing, letting individuals create online profiles that other users can view these are basic features that are offer by most of social networking sites Unfortunately, In many cases, users are not even aware of the disclosure of their personal information through their profiles. Leakage of a user’s private information can happen in different ways. Many of the security risks associated with using social media are presented in this paper. Also, the issue of privacy and how it relates to security are described. Based on these discussions, some key points are provided to improve a user’s privacy and security on social networks. Our inquest will help the readers to understand the security and privacy issues for the social network users, and this research will help the user. Keywords: OSN; security; classic privacy threats; modern threat.


Author(s):  
Kyu-Ok Kim ◽  
L. R. Rilett

In recent years, microsimulation has become increasingly important in transportation system modeling. A potential issue is whether these models adequately represent reality and whether enough data exist with which to calibrate these models. There has been rapid deployment of intelligent transportation system (ITS) technologies in most urban areas of North America in the last 10 years. While ITSs are developed primarily for real-time traffic operations, the data are typically archived and available for traffic microsimulation calibration. A methodology, based on the sequential simplex algorithm, that uses ITS data to calibrate microsimulation models is presented. The test bed is a 23-km section of Interstate 10 in Houston, Texas. Two microsimulation models, CORSIM and TRANSIMS, were calibrated for two different demand matrices and three periods (morning peak, evening peak, and off-peak). It was found for the morning peak that the simplex algorithm had better results then either the default values or a simple, manual calibration. As the level of congestion decreased, the effectiveness of the simplex approach also decreased, as compared with standard techniques.


2020 ◽  
pp. 16-30
Author(s):  
Mukesh Soni ◽  
◽  
◽  
◽  
YashKumar Barot ◽  
...  

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.


2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


Sign in / Sign up

Export Citation Format

Share Document