585 research outputs found
Unlinkable content playbacks in a multiparty DRM system
We present a solution to the problem of privacy invasion in a multiparty
digital rights management scheme. (Roaming) users buy content licenses from a
content provider and execute it at any nearby content distributor. Our
approach, which does not need any trusted third party--in contrast to most
related work on privacy-preserving DRM--is based on a re-encryption scheme that
runs on any mobile Android device. Only a minor security-critical part needs to
be performed on the device's smartcard which could, for instance, be a SIM
card
Environmentally-Aware and Energy-Efficient Multi-Drone Coordination and Networking for Disaster Response
In a Disaster Response Management (DRM) Scenario, Communication and Coordination Are Limited, and Absence of Related Infrastructure Hinders Situational Awareness. Unmanned Aerial Vehicles (UAVs) or Drones Provide New Capabilities for DRM to Address These Barriers. However, There is a Dearth of Works that Address Multiple Heterogeneous Drones Collaboratively Working Together to Form a Flying Ad-Hoc Network (FANET) with Air-To-Air and Air-To-Ground Links that Are Impacted By: (I) Environmental Obstacles, (Ii) Wind, and (Iii) Limited Battery Capacities. in This Paper, We Present a Novel Environmentally-Aware and Energy-Efficient Multi-Drone Coordination and Networking Scheme that Features a Reinforcement Learning (RL) based Location Prediction Algorithm Coupled with a Packet Forwarding Algorithm for Drone-To-Ground Network Establishment. We Specifically Present Two Novel Drone Location-Based Solutions (I.e., Heuristic Greedy, and Learning-Based) in Our Packet Forwarding Approach to Support Application Requirements. These Requirements Involve Improving Connectivity (I.e., Optimize Packet Delivery Ratio and End-To-End Delay) Despite Environmental Obstacles, and Improving Efficiency (I.e., by Lower Energy Use and Time Consumption) Despite Energy Constraints. We Evaluate Our Scheme with State-Of-The-Art Networking Algorithms in a Trace-Based DRM FANET Simulation Testbed Featuring Rural and Metropolitan Areas. Results Show that Our Strategy overcomes Obstacles and Can Achieve 81-To-90% of Network Connectivity Performance Observed under No Obstacle Conditions. in the Presence of Obstacles, Our Scheme Improves the Network Connectivity Performance by 14-To-38% While Also Providing 23-To-54% of Energy Savings in Rural Areas; the Same in Metropolitan Areas Achieved an Average of 25% Gain When Compared with Baseline Obstacle Awareness Approaches with 15-To-76% of Energy Savings
Secured Framework for Data Outsourcing using ABE in Cloud Computing
Cloud has been around for two decades and it comprises of the tremendous measure of data from everywhere throughout the world. The vast majority of the general population at an individual level and association level have moved their data to the cloud and share data over all around the globe. The fundamental test looked by everybody is to share the data everywhere throughout the world or at hierarchical level safely without giving endlessly the essential data to any exploiters. To beat the test to share the data safely finished the cloud, a productive data encryption calculation for scrambling data before sending it to the cloud. In this proposed we are utilizing a mix of Attribute-Based Encryption Algorithm for scrambling the data previously sending it to the cloud. This will push the client to safely store and share the data in encoded shape. Additionally we utilize the AES (Advance Standard Encryption) calculation for data encryption and decryption reason
Flexpop: A popularity-based caching strategy for multimedia applications in information-centric networking
Information-Centric Networking (ICN) is the dominant architecture for the future Internet.
In ICN, the content items are stored temporarily in network nodes such as routers. When the memory of routers becomes full and there is no room for a new
arriving content, the stored contents are evicted to cope with the limited cache size of the routers. Therefore, it is crucial to develop an effective caching strategy for keeping popular contents for a longer period of time. This study proposes a new caching strategy, named Flexible Popularity-based Caching (FlexPop) for storing popular contents.
The FlexPop comprises two mechanisms, i.e., Content Placement Mechanism (CPM), which is responsible for content caching, and Content Eviction Mechanism
(CEM) that deals with content eviction when the router cache is full and there is no space for the new incoming content. Both mechanisms are validated using Fuzzy Set Theory, following the Design Research Methodology (DRM) to manifest that the research is rigorous and repeatable under comparable conditions. The performance of FlexPop is evaluated through simulations and the results are compared with those of the Leave Copy Everywhere (LCE), ProbCache, and Most Popular Content (MPC) strategies. The results show that the FlexPop strategy outperforms LCE, ProbCache,
and MPC with respect to cache hit rate, redundancy, content retrieval delay, memory utilization, and stretch ratio, which are regarded as extremely important metrics (in various studies) for the evaluation of ICN caching. The outcomes exhibited in this study are noteworthy in terms of making FlexPop acceptable to users as they can verify
the performance of ICN before selecting the right caching strategy. Thus FlexPop has potential in the use of ICN for the future Internet such as in deployment of the IoT technology
Cyber Security
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition
Proxcache: A new cache deployment strategy in information-centric network for mitigating path and content redundancy
One of the promising paradigms for resource sharing with maintaining the basic Internet semantics is the Information-Centric Networking (ICN). ICN distinction with the current Internet is its ability to refer contents by names with partly dissociating the host-to-host practice of Internet Protocol addresses. Moreover, content caching in ICN is the major action of achieving content networking to reduce the amount of server access.
The current caching practice in ICN using the Leave Copy Everywhere (LCE) progenerate problems of over deposition of contents known as content redundancy,
path redundancy, lesser cache-hit rates in heterogeneous networks and lower content diversity. This study proposes a new cache deployment strategy referred to as ProXcache to acquire node relationships using hyperedge concept of hypergraph for cache positioning. The study formulates the relationships through the path and distance approximation to mitigate content and path redundancy. The study adopted the Design Research Methodology approach to achieve the slated research objectives. ProXcache was investigated using simulation on the Abilene, GEANT and the DTelekom network topologies for LCE and ProbCache caching strategies with the Zipf distribution to differ
content categorization. The results show the overall content and path redundancy are minimized with lesser caching operation of six depositions per request as compared to nine and nineteen for ProbCache and LCE respectively. ProXcache yields
better content diversity ratio of 80% against 20% and 49% for LCE and ProbCache respectively as the cache sizes varied. ProXcache also improves the cache-hit ratio through proxy positions. These thus, have significant influence in the development of the ICN for better management of contents towards subscribing to the Future Internet
Cyber Security
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition
- …