11,067 research outputs found

    Security Implications of Fog Computing on the Internet of Things

    Full text link
    Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications.Comment: 5 pages, conference paper, to appear in Proceedings of the ICCE 2019, IEEE 37th International Conference on Consumer Electronics (ICCE), Jan 11- 13, 2019, Las Vegas, NV, US

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view

    A Novel Design to Minimise the Energy Consumption and Node Traversing in Blockchain Over Cloud Using Ensemble Cuckoo Model

    Get PDF
    The article outlines the Blockchain’s behavioral model for services. Their reliability is proven through the use of experimental evidence. The authors highlight the major technical aspects and characteristics that are associated with the transmission of data through the network. The authors define the scheme for the network, which works with blockchain transactions, and the relationship between network characteristics on parameters used by the application. They examine the use of this model to identification of the blockchain service and also the likelihood of existing security mechanisms that are based on the technology being bypassed. Additionally, the article provides guidelines to conceal the Blockchain's traffic profile to make it more difficult for its detection in the information network. This study offers a thorough analysis of blockchain-based trust models applied to cloud computing. The paper highlights the challenges that remain unsolved and offers suggestions for future studies in the area based on new cloud-edge trust management system and double-blockchain structure, which is a cloud-based transaction model. The paper also identifies the existing challenges and offers suggestions for future studies in the area based on new cloud-edge trust management system and double-blockchain structure, which is a cloud-based transaction model. The flow of the network will be supported by models that are enhanced by cuckoo to frame the perfect network transform of data from one point to cluster, or alternatively

    The implications of industry 4.0 for the auditing profession

    Get PDF
    The technological development resulting from Industry 4.0 is also affecting the auditing profession. If on the one hand the new technological components of Industry 4.0 demonstrate how their implementation can facilitate the auditor's work and improve the decision-making process in business management, on the other hand they require new skills and knowledge to the professional exercise Thus, the objective of this study in a real work context - fieldwork - is to analyze the impact of the new technologies of Industry 4.0 in the Auditing profession. With this work, it was possible to understand that the digital transformation and the use of the new technologies provided by Industry 4.0, besides serving as an aid to management and to the auditing professional, do not replace man, in his social, sentimental, and thought relations, crucial aspects for the profession of Auditor.publishe

    Moving Toward A Consensus on Climate Policy: The Essential Role of Global Public Disclosure

    Get PDF
    Among climate scientists, there is no longer any serious debate about whether greenhouse gas emissions from human activity are altering the earth’s climate. There is also a broad consensus on two issues related to reducing emissions. First, developing countries must be full participants in global emissions control, because they will be most heavily impacted by global warming, and because they are rapidly approaching parity with developed countries in the scale of their emissions. Second, efficient emissions control will require carbon pricing via market-based instruments (charges or cap-and-trade). These points of consensus are sufficient to establish a clear way forward, despite continued disagreements over the choice of specific instrument and the appropriate carbon charge level. Since all market-based systems that regulate emissions sources require the same emissions information, the international community should immediately establish an institution mandated to collect, verify and publicly disclose information about emissions from all significant global carbon sources. Its mandate should extend to best-practice estimation and disclosure of emissions sources in countries that initially refuse to participate. This institution will serve four purposes. First, it will lay the necessary foundation for implementing any market-based system of emissions source regulation. Second, it will provide an excellent credibility test, since a country’s acceptance of full disclosure will signal its true willingness to participate in globally-efficient emissions reduction. Third, global public disclosure will itself reduce carbon emissions, by focusing stakeholder pressure on major emitters and providing reputational rewards for clean producers. Fourth, disclosure will make it very hard to cheat once market-based instruments are implemented. This will be essential for preserving the credibility of an international agreement to reduce emissions.climate change
    • …
    corecore