the security of the color images is challenged by the illegal copying and distribution over various communication networks. this work proposed a novel color image encryption scheme based on the chaos and Deoxyribonucl...
详细信息
ISBN:
(纸本)9798350350920
the security of the color images is challenged by the illegal copying and distribution over various communication networks. this work proposed a novel color image encryption scheme based on the chaos and Deoxyribonucleic acid (DNA). Firstly, A novel four dimensions chaotic system is constructed and analyzed. Secondly, the DNA coding rules are controlled by the chaos-based pseudorandom sequence to substitute the image pixels. the column and row rotation are designed to disturb the image pixels. Finally, the DNA matrix coded from the color image is divided into blocks to implement the XOR and addition operation withthe pseudorandom sequence. Its security is simulated and compared with other schemes. the comparison show that the proposed scheme has a higher key sensitivity, lower correlation of adjacent pixels, and higher NPCR and information entropy. therefore, the proposed image encryption scheme is more capable against statical attacks and efficiency while keeping high robustness.
Next generation networks and the strength of the distributedcomputing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources pro...
详细信息
ISBN:
(纸本)9798350399806
Next generation networks and the strength of the distributedcomputing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources provided by different entities or organisations, that becomes essential to satisfy the most demanding computation and storage service requirements. However, it also entails challenges such as infrastructure and technologies heterogeneity, which directly impacts infrastructure management and especially security, that usually tends to be relegated to a second place. this paper provides a by-default security orchestrator approach to mitigate the above mentioned challenges in distributed edge/cloud computing frameworks. We use an Intent-based/policy-based orchestration paradigm for dealing with heterogeneity, allowing users to request service deployments securely without requiring knowledge about the underlying distributed infrastructure. By-default security orchestration will decide how to provide the requested services, ensuring that they are compliant withthe security requirements provided by the user and the ones gathered by the system, locally and from reliable external sources (1). We provide design and use-cases based workflows for managing by-default security orchestration in proactive and reactive ways. In the future, it is expected to perform the implementation and validation of the proposed approach inside the scope of the FLUIDOS EU project.
the escalating mortality rate attributed to lung cancer is exacerbated by its inflammatory nature, fostering uncontrolled cellular proliferation within lung tissues. While complete eradication remains a challenge, pro...
详细信息
Fog computing, an extension of cloud computing, places computational resources closer to data sources, enhancing network efficiency and security. this paper addresses the challenges posed by cybersecurity threats with...
详细信息
ISBN:
(纸本)9798350366495;9798350366488
Fog computing, an extension of cloud computing, places computational resources closer to data sources, enhancing network efficiency and security. this paper addresses the challenges posed by cybersecurity threats within fog computing environments, specifically in managing vast volumes of network traffic from IoT devices which are vulnerable to cyberattacks. We propose a novel architecture for real-time anomaly detection that integrates fog and cloud computing layers. this two-tiered system utilizes machine learning and deep learning models for dynamic and adaptive threat detection. By leveraging the computational power of modern GPUs, the system analyzes network traffic at speeds up to 10 Gbps, enabling the detection of anomalies before they can cause significant damage. We introduce a distributed anomaly supervisor that operates at the fog level to provide real-time analysis and immediate response to potential threats, while cloud-level operations facilitate a comprehensive overview and coordination. the effectiveness of this architecture is demonstrated through extensive experimentation, proving its capability to manage high-speed data transfers and improve security measures across fog networks.
this study examines key characteristics of cloud computing technology within the domain of federated learning, withthe primary objective of exploring the principles concerning distributedcomputing acceleration ratio...
详细信息
this study has been undertaken to amalgamate the principles of Site Reliability Engineering and Data Engineering to effectively measure, monitor and manage the reliability of petabyte-scale data engineering process fr...
详细信息
ISBN:
(纸本)9798400716379
this study has been undertaken to amalgamate the principles of Site Reliability Engineering and Data Engineering to effectively measure, monitor and manage the reliability of petabyte-scale data engineering process from collection at source to processing, analyzing, and distributing the data for appropriate decision making to improve business outcomes and system performance. Modern data architectures increasingly leverage cloud platforms, low-code systems, and serverless technologies to enable scalable data engineering. However, these innovations also introduce new complexities regarding reliability assurance. As these failure-prone yet business-critical data infrastructures continue rapid adoption, it is vital to elucidate architectural paradigms, quantified benchmarks, and procedural methodologies tailored to safeguarding dependability across heterogeneous, distributed data ecosystems. this paper will equip end users with a reusable framework ingrained with best practices to develop a blueprint for data reliability across business units of an organization.
Cloud Network Slicing (CNS) is a concept that describes a mechanism to provide computing, networking, and storage as a virtual slice entity, enabling new approaches to applications and structuring resources at the edg...
详细信息
ISBN:
(纸本)9798350399806
Cloud Network Slicing (CNS) is a concept that describes a mechanism to provide computing, networking, and storage as a virtual slice entity, enabling new approaches to applications and structuring resources at the edge of the network. In this paper, the architecture defined in the NECOS Project is adopted, and the functions for creating CNS in resource-constrained edge devices were designed and implemented. the implementation was evaluated on Single Board Computers (SBCs), using lightweight virtualization solutions (microservices) and the results achieved show that it is possible to instantiate CNSs on that hardware, however, also show some limitations of multiple slice support on resource-constrained devices.
the proliferation of the Internet of things (IoT) requires efficient and scalable data management solutions at the edge of the network. Edge devices play a critical role in processing data and making real-time decisio...
详细信息
Urban computing is an emerging computing paradigm for processing urban data to serve urban applications, which is an important manner to realize smart cities. To be specific, cloud computing and edge computing are usu...
详细信息
the increasing prevalence of distributed Denial-of- Service (DDoS) attacks poses a serious threat to network security, emphasizing the crucial need for effective intrusion detection methods. the continuous evolution o...
详细信息
暂无评论