2,514 research outputs found

    Regulating Data as Property: A New Construct for Moving Forward

    Get PDF
    The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership of digital information be achieved? How can those rights be transferred and enforced? Those calls for data ownership emphasize the impact of ownership on the automotive industry and the vast quantities of operational data which smart automobiles and self-driving vehicles will produce. We looked at how, if at all, the issue was being considered in consumer-facing statements addressing the data being collected by their vehicles. To formulate our proposal, we also considered continued advances in scientific research, quantum mechanics, and quantum computing which confirm that information in any digital or electronic medium is, and always has been, physical, tangible matter. Yet, to date, data regulation has sought to adapt legal constructs for “intangible” intellectual property or to express a series of permissions and constraints tied to specific classifications of data (such as personally identifiable information). We examined legal reforms that were recently approved by the United Nations Commission on International Trade Law to enable transactions involving electronic transferable records, as well as prior reforms adopted in the United States Uniform Commercial Code and Federal law to enable similar transactions involving digital records that were, historically, physical assets (such as promissory notes or chattel paper). Finally, we surveyed prior academic scholarship in the U.S. and Europe to determine if the physical attributes of digital data had been previously considered in the vigorous debates on how to regulate personal information or the extent, if at all, that the solutions developed for transferable records had been considered for larger classes of digital assets. Based on the preceding, we propose that regulation of digital information assets, and clear concepts of ownership, can be built on existing legal constructs that have enabled electronic commercial practices. We propose a property rules construct that clearly defines a right to own digital information arises upon creation (whether by keystroke or machine), and suggest when and how that right attaches to specific data though the exercise of technological controls. This construct will enable faster, better adaptations of new rules for the ever-evolving portfolio of data assets being created around the world. This approach will also create more predictable, scalable, and extensible mechanisms for regulating data and is consistent with, and may improve the exercise and enforcement of, rights regarding personal information. We conclude by highlighting existing technologies and their potential to support this construct and begin an inventory of the steps necessary to further proceed with this process

    Rescaling Urbanism: Fostering Low-Tech, Digitally Fabricated, and Transient Structures Through Innovation in Local Renewable Material

    Get PDF
    This dissertation presumes that innovation in design and sustainable building practices can alleviate environmental and socio-economic issues within cities. Exploration of small-scale design and intelligent systems reveals a connection between local resources and new technologies that advance yesterday’s way of building. The study focuses on the challenges of a vulnerable island community, addressing Hawaii’s major housing crisis and the effects of impending climate change. Isolation and a global market has encouraged dependency on imports and deterred the state from achieving sustainability. At the intersection of localized materials and global technologies, this project argues a simple and practical solution. Through a series of case study investigations and applied research on innovative design strategies, it establishes the framework for an alternative building model of less permanent and more process-based structures. Rescaling Urbanism reveals the potential for a system that can challenge the existing methods of Hawaii’s building industry. The project embraces the use of local material with new technologies in digital fabrication to create a streamlined approach for building sustainably in Hawaii. To compliment new statewide green initiatives, we must learn to embrace the use of vernacular materials, renewable energies, and closed-loop systems. Hawaii’s surplus of invasive tree species bears the potential for local renewable building materials. This study examines the use of lumber from the highly invasive albizia tree as a building v material through application of wood engineering. By reconceptualizing the tree from invasive to useful, a problem becomes a viable solution to Hawaii’s housing deficit and outsourced building industry. This project integrates the design and construction process by proposing a structure that is composed almost entirely of albizia and digitally fabricated from computer numerically control, or CNC routing. Engineered wood is a resource-light material that supports rapid on-site construction. CNC routing is being increasingly utilized with engineered wood to streamline the entire building process. Merging these two principles enables fabrication of sustainably sourced, high-precision, and easy to assemble building components. The outcome reveals a process that can radically lessen the threshold of scale, cost, and construction time

    Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains

    Get PDF
    In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology. The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication credentials using Lamport\u27s well-known one-time passwords. The basic idea in this scheme revolves around utilizing sparse caching units, where authentication credentials pertaining to cookies are stored and fetched once needed, thereby, mitigating computational overhead generally associated with one-way hash constructions. The second and third proposed schemes rely on dividing the one-way hash construction into a hierarchical two-tier construction. Each tier component is responsible for some aspect of authentication generated by using two different hash functions. By utilizing different cryptographic hash functions arranged in two tiers, the hierarchical two-tier protocol (our second contribution) gives significant performance improvement over previously proposed solutions for securing Internet cookies. Through indexing authentication credentials by their position within the hash chain in a multi-dimensional chain, the third contribution achieves improved performance. In the fourth proposed scheme, an attempt is made to apply the one-way hash construction to achieve user and broadcast authentication in wireless sensor networks. Due to known energy and memory constraints, the one-way hash scheme is modified to mitigate computational overhead so it can be easily applied in this particular setting. The fifth scheme tries to reap the benefits of the sparse cache-supported scheme and the hierarchical scheme. The resulting hybrid approach achieves efficient performance at the lowest cost of caching possible. In the sixth proposal, an authentication scheme tailored for the multi-server single sign-on (SSO) environment is presented. The scheme utilizes the one-way hash construction in a Merkle Hash Tree and a hash calendar to avoid impersonation and session hijacking attacks. The scheme also explores the optimal configuration of the one-way hash chain in this particular environment. All the proposed protocols are validated by extensive experimental analyses. These analyses are obtained by running simulations depicting the many scenarios envisioned. Additionally, these simulations are supported by relevant analytical models derived by mathematical formulas taking into consideration the environment under investigation

    Halting Neotropical Deforestation: Do the Forest Principles Have What It Takes?

    Get PDF
    INTRODUCTION I crashed into the thick secondary growth, stopping suddenly to duck a certain branch in my path: a fat black bullet ant crawled along it with indifference, an attitude that would have quickly changed had I brushed up against him. I headed toward the large patch of Heliconia just to the right. We had earlier mapped out the clump, and finding it to contain seventeen flower clusters, it was one of the prize patches in the study plot. I took my spot ten paces from the outer clusters, started my stop watch, and waited with field book in hand. The Birds of Paradise were dripping nectar from their red fingertips. With such a gold mine, I did not have to wait long for a hummingbird. Like an Evinrude-powered flat bottom whizzing up a winding lagoon, the bird\u27s sound reached me before I saw him. He appeared from the back of the patch, taking a drink here, then there, then here again, then at some other spot, then there again and back to here. He did not sit and sip for long at each spot, but he did pause long enough for me to see him gleam green and deep violet. He was a red-footed plumeleteer, emerald green on the head, changing to dark purple through his body and on to his tail. His feet and straight bill were distinctively red. Without a doubt he owned this lucrative Heliconia patch. But then from my right came another whir. A ..

    Internet of Things (IoT) for Automated and Smart Applications

    Get PDF
    Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications

    The Effect of Emotional Freedom Technique on Stress and Anxiety in Nursing Students

    Get PDF
    Stress and anxiety have been identified as significant issues experienced by student nurses during their education. In fact, some studies have suggested that the stress experienced by nursing students is greater than that experienced by medical students, other non-nursing healthcare students, degreed nurses, and the female population in general. A recently introduced energy type therapy, Emotional Freedom Technique (EFT), combines the tapping of meridian points with a focus on the feared object or negative emotion to provide desensitization to the fear. In addition, there is repetition of a statement of self-acceptance suggested to contribute to cognitive restructuring. The purpose of this study was to determine the efficacy of EFT in decreasing anxiety and stress in a convenience sample of nursing students enrolled in an associate degree nursing program. Utilizing a one group pretest-posttest design, participants received group instruction in the technique and were encouraged to repeat it daily. Data collection instruments included a demographic questionnaire, pretest State-Trait Anxiety Inventory (STAI) and Perceived Stress Scale (PSS). STAI and PSS were re-administered at the second, third and the fourth week. A qualitative questionnaire was also administered at the end of the four weeks. Significant reductions in anxiety on both the STAI and PSS were achieved using EFT. Qualitative data suggested that nursing students experienced a decrease in feelings of stress and anxiety including a decrease in somatic symptoms

    Blockchain for secured IoT and D2D applications over 5G cellular networks : a thesis by publications presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer and Electronics Engineering, Massey University, Albany, New Zealand

    Get PDF
    Author's Declaration: "In accordance with Sensors, SpringerOpen, and IEEE’s copyright policy, this thesis contains the accepted and published version of each manuscript as the final version. Consequently, the content is identical to the published versions."The Internet of things (IoT) is in continuous development with ever-growing popularity. It brings significant benefits through enabling humans and the physical world to interact using various technologies from small sensors to cloud computing. IoT devices and networks are appealing targets of various cyber attacks and can be hampered by malicious intervening attackers if the IoT is not appropriately protected. However, IoT security and privacy remain a major challenge due to characteristics of the IoT, such as heterogeneity, scalability, nature of the data, and operation in open environments. Moreover, many existing cloud-based solutions for IoT security rely on central remote servers over vulnerable Internet connections. The decentralized and distributed nature of blockchain technology has attracted significant attention as a suitable solution to tackle the security and privacy concerns of the IoT and device-to-device (D2D) communication. This thesis explores the possible adoption of blockchain technology to address the security and privacy challenges of the IoT under the 5G cellular system. This thesis makes four novel contributions. First, a Multi-layer Blockchain Security (MBS) model is proposed to protect IoT networks while simplifying the implementation of blockchain technology. The concept of clustering is utilized to facilitate multi-layer architecture deployment and increase scalability. The K-unknown clusters are formed within the IoT network by applying a hybrid Evolutionary Computation Algorithm using Simulated Annealing (SA) and Genetic Algorithms (GA) to structure the overlay nodes. The open-source Hyperledger Fabric (HLF) Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The quantitative arguments demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported methods. The proposed lightweight blockchain model is also better suited to balance network latency and throughput compared to a traditional global blockchain. Next, a model is proposed to integrate IoT systems and blockchain by implementing the permissioned blockchain Hyperledger Fabric. The security of the edge computing devices is provided by employing a local authentication process. A lightweight mutual authentication and authorization solution is proposed to ensure the security of tiny IoT devices within the ecosystem. In addition, the proposed model provides traceability for the data generated by the IoT devices. The performance of the proposed model is validated with practical implementation by measuring performance metrics such as transaction throughput and latency, resource consumption, and network use. The results indicate that the proposed platform with the HLF implementation is promising for the security of resource-constrained IoT devices and is scalable for deployment in various IoT scenarios. Despite the increasing development of blockchain platforms, there is still no comprehensive method for adopting blockchain technology on IoT systems due to the blockchain's limited capability to process substantial transaction requests from a massive number of IoT devices. The Fabric comprises various components such as smart contracts, peers, endorsers, validators, committers, and Orderers. A comprehensive empirical model is proposed that measures HLF's performance and identifies potential performance bottlenecks to better meet blockchain-based IoT applications' requirements. The implementation of HLF on distributed large-scale IoT systems is proposed. The performance of the HLF is evaluated in terms of throughput, latency, network sizes, scalability, and the number of peers serviceable by the platform. The experimental results demonstrate that the proposed framework can provide a detailed and real-time performance evaluation of blockchain systems for large-scale IoT applications. The diversity and the sheer increase in the number of connected IoT devices have brought significant concerns about storing and protecting the large IoT data volume. Dependencies of the centralized server solution impose significant trust issues and make it vulnerable to security risks. A layer-based distributed data storage design and implementation of a blockchain-enabled large-scale IoT system is proposed to mitigate these challenges by using the HLF platform for distributed ledger solutions. The need for a centralized server and third-party auditor is eliminated by leveraging HLF peers who perform transaction verification and records audits in a big data system with the help of blockchain technology. The HLF blockchain facilitates storing the lightweight verification tags on the blockchain ledger. In contrast, the actual metadata is stored in the off-chain big data system to reduce the communication overheads and enhance data integrity. Finally, experiments are conducted to evaluate the performance of the proposed scheme in terms of throughput, latency, communication, and computation costs. The results indicate the feasibility of the proposed solution to retrieve and store the provenance of large-scale IoT data within the big data ecosystem using the HLF blockchain
    corecore