INTRODUCTION: Cloud computing, a still emerging technology, allows customers to pay for services based on usage. It provides internet-based services, whilst virtualization optimizes a PC’s available resources. OBJECT...
详细信息
Vehicular consumer electronics, such as autonomous vehicles (AVs), need collecting large amounts of private user information, which face the risk of privacy leakage. To protect the privacy of consumers, researchers ha...
详细信息
Community question and answer (Q&A) websites have become invaluable information and knowledge-sharing sources. Effective topic modelling on these platforms is crucial for organising and navigating the vast amount ...
详细信息
In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellma...
详细信息
Most of the traditional cloud-based applications are insecure and difficult to compute the data integrity with variable hash size on heterogeneous supply chain datasets. Also, cloud storage systems are independent of ...
详细信息
The Intelligent Surveillance Support System(ISSS) is an innovative software solution that enables real-time monitoring and analysis of security footage to detect and identify potential threats. This system incorporate...
详细信息
The landscape of the Internet of Things is evolving rapidly. The security and efficiency of data handling and device management are multifaceted and complex problems, which are only exacerbated by the huge volumes of ...
详细信息
ISBN:
(纸本)9798350387490
The landscape of the Internet of Things is evolving rapidly. The security and efficiency of data handling and device management are multifaceted and complex problems, which are only exacerbated by the huge volumes of data and the sprawling growth of IoT deployments. The goal of this paper is to outline innovative solutions to the most pressing issues in the field through the use of advanced cryptographic protocols and scalable management systems. The integrity and maintainability of IoT ecosystems face threats not only from quantum-capable attackers but also from vendor lock-in, which necessitates special attention. First, the Secure Data Retrieval Encryption system will be presented, which is based on the Learning with Errors assumptions, Self-Managed Public Key Infrastructure, Next-generation Hashed Elliptic Curve Protocol, and Dynamic Unclonable Physical Properties. In a single round of queries, SDRE enables forward security and efficient searches defined by authorized clients. This work presents a distinctive innovation. Initially, the search process was accelerated greatly, and the data being transmitted and decrypted was implemented based on secure computation. In addition, the Self-Managed Public Key Infrastructure protocol is a simple and standard-acquiescent answer for changing control between IoT service providers. SMS-PKI seeks to diminish this necessity of manual effort, especially in light of the massive upsurge in IoT deployments. SM-PKI also mechanizes the IoT PKI credentials updating and trusted domains process, allowing multiple domains to be run on one client apparatus. Tamarin is used to prove security and efficiency, which demonstrates the necessity of using SM-PKI to maintain desired security properties with the minimal cost and device overhead. Finally, a universal authentication scheme grounded on edge computing and involving Next-generation Hashed Elliptic Curve Protocol and Dynamic Unclonable Physical Properties will be shown. This approach
The advancement of automated number plate recognition (ANPR) systems has garnered noteworthy attention in recent times owing to their diverse applications across multiple domains, including traffic management, parking...
详细信息
This article introduces a brand new supervised method to make speech sound better and clearer by getting rid of background noise and mess-ups. It brings together two kinds of signal processes: the dual-tree complex wa...
详细信息
Research into Medicare fraud detection that utilizes machine learning methodologies is of great national interest due to the significant fiscal ramifications of this type of fraud. Our big data analysis pertains to th...
详细信息
暂无评论