The rapid urbanization and the need for sustainable city management have driven the demand for intelligent and efficient smart city planning solutions. This paper explores an innovative approach to automated smart cit...
详细信息
In the face of information security trends, key technical challenges, and scenarios, many higher education institutions began to reflect on data security and privacy protection, and actively took various response meas...
详细信息
Health information Systems (HIS) have the potential to improve the productivity and efficiency of healthcare staff. However, the adoption of HIS has been lower in Sri Lanka compared to developed countries. This study ...
详细信息
Many higher education institutions (HEIs) are implementing or reviewing the implementation of predictive Learning Analytics to improve learning processes, identify students at risk or provide personalized learning pat...
详细信息
The clustering of medical transcriptions is an essential task for the categorization and summarization of large volumes of medical records. This paper explores the efficacy of k-means clustering, a well-known unsuperv...
详细信息
As informationtechnology advances, smart healthcare has become a key avenue for enhancing the quality and efficiency of medical services. Cloud computing plays a central role by providing robust data processing capab...
详细信息
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitatio...
详细信息
ISBN:
(纸本)9781665456456
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitations on speeds and sizes as well as the evolving of the Internet of Things made it challenging to rely on the cloud due to the extremely slow data processing. Therefore, to store and interpret the massive amount of data rapidly, programmers switched towards a new technology which is fog computing. This mini survey paper will outline fog computing as an integral part of cloud and edge computing for improving security and data protection. A systematic literature review of selected research papers that include findings and algorithms used to enhance security-related problems such as availability, latency, and intrusion detection will be discussed. This mini review paper finds out a state-of-the-art on the cybersecurity issues in fog computing using blockchain.
The transmission of image data over the internet is inevitable considering its effective use-cases in tele-healthcare, online-banking, remote-education, e-commerce, email exchanges, and many others. However secure com...
详细信息
ISBN:
(纸本)9798350370027;9798350370034
The transmission of image data over the internet is inevitable considering its effective use-cases in tele-healthcare, online-banking, remote-education, e-commerce, email exchanges, and many others. However secure communication of the image data is still evolving and not standardized yet, but it is desirable owing to various cyber attacks especially adversarial attack leading to the loss of critical information. One of the primary challenges on adopting secure communication is to balance computational and communication cost for encrypting the data but also attain high security. Applying encryption across all pixelated data is likely to increase the communication overhead and reduce the throughput which otherwise becomes bottleneck for some of real-time applications. The large size of ciphertext makes the system highly inefficient. This research proposes an approach based on one-pixel attack factored selective image encryption scheme (PA-SIE) to reduce the size of the ciphertext while ensuring the security of the image data. The proposed approach identifies the sensitive pixels in the image by using the differential evolution algorithm and encrypts them using a preferred encryption scheme, while leaving the remaining pixels unencrypted. To the best of our knowledge, this is the first study to propose this approach for balancing cost and security in image data transmission. This approach significantly reduces the cost of data transfer while ensuring the secure transmission of sensitive image data. The proposed PA-SIE approach offers maximum communication latency improvement and energy savings of 84.65%, when compared with full Elliptic Curve Cryptography (ECC) applied encrypted image transmission for web traffic over the HTTPS protocol. The proposed approach is a step towards ensuring secure and efficient transmission of image data over the internet from low resource and bandwidth constrained edge-computing systems.
Recent advancements in large-scale language models, as exemplified by ChatGPT, have undergone rapid and substantial development. Their efficacy in natural language processing (NLP) and related domains has notably surp...
详细信息
Healthcare data contains large amounts of personal information and is privacy sensitive. The healthcare sector needs privacy protection to keep private and sensitive information safe from unauthorized access. Security...
详细信息
暂无评论