76 research outputs found
Towards A Sustainable and Ethical Supply Chain Management: The Potential of IoT Solutions
Globalization has introduced many new challenges making Supply chain
management (SCM) complex and huge, for which improvement is needed in many
industries. The Internet of Things (IoT) has solved many problems by providing
security and traceability with a promising solution for supply chain
management. SCM is segregated into different processes, each requiring
different types of solutions. IoT devices can solve distributed system problems
by creating trustful relationships. Since the whole business industry depends
on the trust between different supply chain actors, IoT can provide this trust
by making the entire ecosystem much more secure, reliable, and traceable. This
paper will discuss how IoT technology has solved problems related to SCM in
different areas. Supply chains in different industries, from pharmaceuticals to
agriculture supply chain, have different issues and require different
solutions. We will discuss problems such as security, tracking, traceability,
and warehouse issues. All challenges faced by independent industries regarding
the supply chain and how the amalgamation of IoT with other technology will be
provided with solutions.Comment: 9 page
Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study
This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives
Privacy-Conflict Resolution for Integrating Personal and Electronic Health Records in Blockchain-Based Systems
Integrating personal health records (PHRs) and electronic health records (EHRs) facilitates the provision of novel services to individuals, researchers, and healthcare practitioners. Simultaneously, integrating healthcare data leads to complexities arising from the structural and semantic heterogeneity within the data. The subject of healthcare data evokes strong emotions due to concerns surrounding privacy breaches. Blockchain technology is employed to address the issue of patient data privacy in inter-organizational processes, as it facilitates patient data ownership and promotes transparency in its usage. At the same time, blockchain technology creates new challenges for e-healthcare systems, such as data privacy, observability, and online enforceabil-ity. This article proposes designing and formalizing automatic conflict resolution techniques in decentralized e-healthcare systems. The present study expounds upon our concepts by employing a running case study centered around preventive and personalized healthcare domains. © 2023, Partners in Digital Health. All rights reserved
A Review on Building Blocks of Decentralized Artificial Intelligence
Artificial intelligence is transforming our lives, and technological progress
and transfer from the academic and theoretical sphere to the real world are
accelerating yearly. But during that progress and transition, several open
problems and questions need to be addressed for the field to develop ethically,
such as digital privacy, ownership, and control. These are some of the reasons
why the currently most popular approaches of artificial intelligence, i.e.,
centralized AI (CEAI), are questionable, with other directions also being
widely explored, such as decentralized artificial intelligence (DEAI), to solve
some of the most reaching problems. This paper provides a systematic literature
review (SLR) of existing work in the field of DEAI, presenting the findings of
71 identified studies. The paper's primary focus is identifying the building
blocks of DEAI solutions and networks, tackling the DEAI analysis from a
bottom-up approach. In the end, future directions of research and open problems
are proposed.Comment: This work has been submitted to the IEEE for possible publication.
Copyright may be transferred without notice, after which this version may no
longer be accessibl
Recommended from our members
Data trading based on seller preferences within blockchain smart contract
This thesis was submitted for the award of Master of Philosophy and was awarded by Brunel University LondonOnline data trading has not focused on the necessary control of data selling
by the data seller preferences (DSP) using blockchain technology. This
research aims to explore the DSP using smart contract over blockchain
within the domain of online data trading. Data trading has been carried out
for several decades, but cutting-edge technologies and cloud services have
grown dramatically worldwide. Industries are gaining benefits from
accessing the data that enabled them to perform mission-critical tasks by
performing data analysis on the massively available data and getting a
higher return on investment (ROI).
This research aims to make online data trading possible only if the buyer
can satisfy the conditions predefined by the seller. For example, DSP can
restrict the data purchase if the participating buyer is doing business from
a specific geographic location, or it can further restrict a particular type and
size of business. So, data trading will be controlled by smart contract
validation based on DSP hence the novel DSP artefact has been achieved
and evaluated via a personal blockchain Ganache, which is always set to
automatics mining. Even though the DSP Dapp artefact has been explored
with a limited scope of seller preferences and data volume, future
researchers may evolve the DSP Dapp artefact framework to achieve
complex seller preferences such as ethical selling (e.g., green credentials).
The smart contract serves as an automated contract depending on DSP, between seller and buyer, without the involvement of any broker or third
party.
After the first chapter's introduction has set up the context for chapter two
to review the literature, present the research question, and set the aims
and objectives. Chapter three selected the DSR methodology for this
research and analysed the requirements to set the building block for
chapters four and five. Chapters four and five fulfilled objective two by
designing and developing the DSP artefact using a smart contract to control
data trading. Chapter 6 validated the DSP trading system to confirm the
novelty of this research, and finally, chapter 7 summarised the contribution
and future research.
The research proposes a new approach to online data trading that controls
the data selling depending on DSP within smart contract over blockchain
and opens new doors for the researchers for future work in this area
Distributed Ledger Technologies for Network Slicing: A Survey
Network slicing is one of the fundamental tenets of Fifth Generation (5G)/Sixth Generation (6G) networks. Deploying slices requires end-to-end (E2E) control of services and the underlying resources in a network substrate featuring an increasing number of stakeholders. Beyond the technical difficulties this entails, there is a long list of administrative negotiations among parties that do not necessarily trust each other, which often requires costly manual processes, including the legal construction of neutral entities. In this context, Blockchain comes to the rescue by bringing its decentralized yet immutable and auditable lemdger, which has a high potential in the telco arena. In this sense, it may help to automate some of the above costly processes. There have been some proposals in this direction that are applied to various problems among different stakeholders. This paper aims at structuring this field of knowledge by, first, providing introductions to network slicing and blockchain technologies. Then, state-of-the-art is presented through a global architecture that aggregates the various proposals into a coherent whole while showing the motivation behind applying Blockchain and smart contracts to network slicing. And finally, some limitations of current work, future challenges and research directions are also presented.This work was supported in part by the Spanish Formación Personal Investigador (FPI) under Grant PRE2018-086061, in part by the TRUE5G under Grant PID2019-108713RB-C52/AEI/10.13039/501100011033, and in part by the European Union (EU) H2020 The 5G Infrastructure Public Private Partnership (5GPPP) 5Growth Project 856709.Publicad
Security Risk Management for the Internet of Things
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT systems. Risk assessments for modern IoT systems must be frequent, dynamic and driven by knowledge about both cyber and physical assets. Furthermore, they should be more proactive, more automated, and able to leverage information shared across IoT value chains. This book introduces a set of novel risk assessment techniques and their role in the IoT Security risk management process. Specifically, it presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm. It also highlights machine learning techniques that boost the automation and proactiveness of IoT security risk assessments. Furthermore, blockchain solutions for open and transparent sharing of IoT security information across the supply chain are introduced. Frameworks for privacy awareness, along with technical measures that enable privacy risk assessment and boost GDPR compliance are also presented. Likewise, the book illustrates novel solutions for security certification of IoT systems, along with techniques for IoT security interoperability. In the coming years, IoT security will be a challenging, yet very exciting journey for IoT stakeholders, including security experts, consultants, security research organizations and IoT solution providers. The book provides knowledge and insights about where we stand on this journey. It also attempts to develop a vision for the future and to help readers start their IoT Security efforts on the right foot
Digital Forensics Investigation Frameworks for Cloud Computing and Internet of Things
Rapid growth in Cloud computing and Internet of Things (IoT) introduces new vulnerabilities that can be exploited to mount cyber-attacks. Digital forensics investigation is commonly used to find the culprit and help expose the vulnerabilities. Traditional digital forensics tools and methods are unsuitable for use in these technologies. Therefore, new digital forensics investigation frameworks and methodologies are required. This research develops frameworks and methods for digital forensics investigations in cloud and IoT platforms
- …