758 research outputs found

    A Watermark-Based in-Situ Access Control Model for Image Big Data

    Get PDF
    When large images are used for big data analysis, they impose new challenges in protecting image privacy. For example, a geographic image may consist of several sensitive areas or layers. When it is uploaded into servers, the image will be accessed by diverse subjects. Traditional access control methods regulate access privileges to a single image, and their access control strategies are stored in servers, which imposes two shortcomings: (1) fine-grained access control is not guaranteed for areas/layers in a single image that need to maintain secret for different roles; and (2) access control policies that are stored in servers suffers from multiple attacks (e.g., transferring attacks). In this paper, we propose a novel watermark-based access control model in which access control policies are associated with objects being accessed (called an in-situ model). The proposed model integrates access control policies as watermarks within images, without relying on the availability of servers or connecting networks. The access control for images is still maintained even though images are redistributed again to further subjects. Therefore, access control policies can be delivered together with the big data of images. Moreover, we propose a hierarchical key-role-area model for fine-grained encryption, especially for large size images such as geographic maps. The extensive analysis justifies the security and performance of the proposed model

    In Vivo Quantitative Study of Sized-Dependent Transport and Toxicity of Single Silver Nanoparticles Using Zebrafish Embryos

    Get PDF
    Nanomaterials possess distinctive physicochemical properties (e.g., small sizes and high surface area-to-volume ratios) and promise a wide variety of applications, ranging from the design of high quality consumer products to effective disease diagnosis and therapy. These properties can lead to toxic effects, potentially hindering advances in nanotechnology. In this study, we have synthesized and characterized purified and stable (nonaggregation) silver nanoparticles (Ag NPs, 41.6 ± 9.1 nm in average diameter) and utilized early developing (cleavage-stage) zebrafish embryos (critical aquatic and eco- species) as in vivo model organisms to probe the diffusion and toxicity of Ag NPs. We found that single Ag NPs (30-72 nm diameters) passively diffused into the embryos through chorionic pores via random Brownian motion and stayed inside the embryos throughout their entire development (120 hours-post-fertilization, hpf). Dose-and size-dependent toxic effects of the NPs on embryonic development were observed, showing the possibility of tuning biocompatibility and toxicity of the NPs. At lower concentrations of the NPs (≤0.02 nM), 75-91% of embryos developed into normal zebrafish. At the higher concentrations of NPs (≥0.20 nM), 100% of embryos became dead. At the concentrations in between (0.02-0.2 nM), embryos developed into various deformed zebrafish. Number and sizes of individual Ag NPs embedded in tissues of normal and deformed zebrafish at 120 hpf were quantitatively analyzed, showing deformed zebrafish with higher number of larger NPs than normal zebrafish and size-dependent nanotoxicity. By comparing with our previous studies of smaller Ag NPs (11.6 ± 3.5 nm), we found striking size-dependent nanotoxicity that, at the same molar concentration, the larger Ag NPs (41.6 ± 9.1 nm) are more toxic than the smaller Ag NPs (11.6 ± 3.5 nm)

    Assessing the vulnerabilities and securing MongoDB and Cassandra databases

    Get PDF
    Due to the increasing amounts and the different kinds of data that need to be stored in the databases, companies, and organizations are rapidly adopting NoSQL databases to compete. These databases were not designed with security as a priority. NoSQL open-source software was primarily developed to handle unstructured data for the purpose of business intelligence and decision support. Over the years, security features have been added to these databases but they are not as robust as they should be, and there is a scope for improvement as the sophistication of the hackers has been increasing. Moreover, the schema-less design of these databases makes it more difficult to implement traditional RDBMS like security features in these databases. Two popular NoSQL databases are MongoDB and Apache Cassandra. Although there is a lot of research related to security vulnerabilities and suggestions to improve the security of NoSQL databases, this research focusses specifically on MongoDB and Cassandra databases. This study aims to identify and analyze all the security vulnerabilities that MongoDB and Cassandra databases have that are specific to them and come up with a step-by-step guide that can help organizations to secure their data stored in these databases. This is very important because the design and vulnerabilities of each NoSQL database are different from one another and hence require security recommendations that are specific to them

    Internet of underground things in precision agriculture: Architecture and technology aspects

    Get PDF
    The projected increases in World population and need for food have recently motivated adoption of information technology solutions in crop fields within precision agriculture approaches. Internet Of Underground Things (IOUT), which consists of sensors and communication devices, partly or completely buried underground for real-time soil sensing and monitoring, emerge from this need. This new paradigm facilitates seamless integration of underground sensors, machinery, and irrigation systems with the complex social network of growers, agronomists, crop consultants, and advisors. In this paper, state-of-the-art communication architectures are reviewed, and underlying sensing technology and communication mechanisms for IOUT are presented. Moreover, recent advances in the theory and applications of wireless underground communication are also reported. Finally, major challenges in IOUT design and implementation are identified

    Wireless Multimedia Sensor Networks Applications and Security Challenges

    Get PDF
    The emergence of low-cost and mature technologies in wireless communication, visual sensor devices, and digital signal processing facilitate of wireless multimedia sensor networks (WMSNs). Like sensor networks which respond to sensory information such as humidity and temperature, WMSN interconnects autonomous devices for capturing and processing video and audio sensory information. WMSNs will enable new applications such as multimedia surveillance, traffic enforcement and control systems, advanced health care delivery, structural health monitoring, and industrial process control. Due to WMSNs have some novel features which stem the fact that some of the sensor node will have video cameras and higher computation capabilities. Consequently, the WMSNs bring new security of challenges as well as new opportunities. This paper presents WMSNs application and security challenges

    Copyright protection of scalar and multimedia sensor network data using digital watermarking

    Get PDF
    This thesis records the research on watermarking techniques to address the issue of copyright protection of the scalar data in WSNs and image data in WMSNs, in order to ensure that the proprietary information remains safe between the sensor nodes in both. The first objective is to develop LKR watermarking technique for the copyright protection of scalar data in WSNs. The second objective is to develop GPKR watermarking technique for copyright protection of image data in WMSN

    Fractal Analysis

    Get PDF
    Fractal analysis is becoming more and more common in all walks of life. This includes biomedical engineering, steganography and art. Writing one book on all these topics is a very difficult task. For this reason, this book covers only selected topics. Interested readers will find in this book the topics of image compression, groundwater quality, establishing the downscaling and spatio-temporal scale conversion models of NDVI, modelling and optimization of 3T fractional nonlinear generalized magneto-thermoelastic multi-material, algebraic fractals in steganography, strain induced microstructures in metals and much more. The book will definitely be of interest to scientists dealing with fractal analysis, as well as biomedical engineers or IT engineers. I encourage you to view individual chapters

    Current Advances in Internet of Underground Things

    Get PDF
    The latest developments in Internet of Underground Things are covered in this chapter. First, the IOUT Architecture is discussed followed by the explanation of the challenges being faced in this paradigm. Moreover, a comprehensive coverage of the different IOUT components is presented that includes communications, sensing, and system integration with the cloud. An in-depth coverage of the applications of the IOUT in various disciplines is also surveyed. These applications include areas such as decision agriculture, pipeline monitoring, border control, and oil wells

    Decision Agriculture

    Get PDF
    In this chapter, the latest developments in the field of decision agriculture are discussed. The practice of management zones in digital agriculture is described for efficient and smart faming. Accordingly, the methodology for delineating management zones is presented. Modeling of decision support systems is explained along with discussion of the issues and challenges in this area. Moreover, the precision agriculture technology is also considered. Moreover, the chapter surveys the state of the decision agriculture technologies in the countries such as Bulgaria, Denmark, France, Israel, Malaysia, Pakistan, United Kingdom, Ukraine, and Sweden. Finally, different field factors such as GPS accuracy and crop growth are also analyzed
    • …
    corecore