217,558 research outputs found

    Data Storage Security in Cloud Computing

    Get PDF
    Cloud computing has achieved a lot of publicity in the current world of I.T. Cloud computing is the biggest thing in the Internet world. Cloud computing is the use of the Internet for the tasks performed on the computer and it is visualized as next generation architecture of IT industry. The Cloud represents the internet. Internet is used for the communication. Cloud computing is used for the companies and the organizations. Cloud computing is related to several technologies. The different service models ie. SaaS, laaS, PaaP and development model i.e. Private, Public, Hybrid which are used with the companies and the organizations for the data security. In comparison to conventional methods Cloud Computing transfer application software and databases to the large data centers, where the data and services will not be fully trustworthy. This researcher paper, focus on secure data storage in cloud

    6G wireless systems : a vision, architectural elements, and future directions

    Get PDF
    Internet of everything (IoE)-based smart services are expected to gain immense popularity in the future, which raises the need for next-generation wireless networks. Although fifth-generation (5G) networks can support various IoE services, they might not be able to completely fulfill the requirements of novel applications. Sixth-generation (6G) wireless systems are envisioned to overcome 5G network limitations. In this article, we explore recent advances made toward enabling 6G systems. We devise a taxonomy based on key enabling technologies, use cases, emerging machine learning schemes, communication technologies, networking technologies, and computing technologies. Furthermore, we identify and discuss open research challenges, such as artificial-intelligence-based adaptive transceivers, intelligent wireless energy harvesting, decentralized and secure business models, intelligent cell-less architecture, and distributed security models. We propose practical guidelines including deep Q-learning and federated learning-based transceivers, blockchain-based secure business models, homomorphic encryption, and distributed-ledger-based authentication schemes to cope with these challenges. Finally, we outline and recommend several future directions. © 2013 IEEE

    DPWSim: A Devices Profile for Web Services (DPWS) Simulator

    Get PDF
    The Devices Profile for Web Services (DPWS) standard enables the use of Web services for resource-constrained devices, main components of the Internet of Things (IoT). DPWS can power the next generation of IoT applications connecting millions of networked devices and services on the Web. This article presents a simulator, called DPWSim, to support the use of this technology. DPWSim featuring secure messaging, dynamic discovery, service description, service invocation, and publishsubscribe eventing can be used to prototype, develop, and test products in terms of DPWS communication protocols. It can also support the collaboration between manufacturers, developers, and designers during the new product development process

    A Survey on Trend and Classification of Internet of Things Reviews

    Get PDF
    The Internet of Things (IoT) is shaping the current and next generation of the Internet. The vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and dense heterogeneous devices network. This vision includes the adaptation of secure mobile networks, anytime, anywhere, by anyone or anything with new intelligent applications and services. Many efforts have been made to review the literature related to the IoT for the benefit of IoT development. However, many issues need to be addressed to overtake the full potential of the IoT. Therefore, this paper aims to classify and standardize IoT research areas by considering review papers that were published between 2010 and 2019. This paper analyzes a total of 95 related reviews, which were manually selected from databases based on 6 chosen areas. This paper presents the trends and classification of IoT reviews based on 6 research areas, namely, application, architecture, communication, challenges, technology, and security. IoT communication research has been dominating the trends with 21% of total reviews and more than 100% research growth in the last 10 years. Hence, this paper can provide useful insights into specific emerging areas of IoT to assist future research

    Recursive internetwork architecture, investigating RINA as an alternative to TCP/IP (IRATI)

    Get PDF
    Driven by the requirements of the emerging applications and networks, the Internet has become an architectural patchwork of growing complexity which strains to cope with the changes. Moore’s law prevented us from recognising that the problem does not hide in the high demands of today’s applications but lies in the flaws of the Internet’s original design. The Internet needs to move beyond TCP/IP to prosper in the long term, TCP/IP has outlived its usefulness. The Recursive InterNetwork Architecture (RINA) is a new Internetwork architecture whose fundamental principle is that networking is only interprocess communication (IPC). RINA reconstructs the overall structure of the Internet, forming a model that comprises a single repeating layer, the DIF (Distributed IPC Facility), which is the minimal set of components required to allow distributed IPC between application processes. RINA supports inherently and without the need of extra mechanisms mobility, multi-homing and Quality of Service, provides a secure and configurable environment, motivates for a more competitive marketplace and allows for a seamless adoption. RINA is the best choice for the next generation networks due to its sound theory, simplicity and the features it enables. IRATI’s goal is to achieve further exploration of this new architecture. IRATI will advance the state of the art of RINA towards an architecture reference model and specifcations that are closer to enable implementations deployable in production scenarios. The design and implemention of a RINA prototype on top of Ethernet will permit the experimentation and evaluation of RINA in comparison to TCP/IP. IRATI will use the OFELIA testbed to carry on its experimental activities. Both projects will benefit from the collaboration. IRATI will gain access to a large-scale testbed with a controlled network while OFELIA will get a unique use-case to validate the facility: experimentation of a non-IP based Internet
    • …
    corecore