581,345 research outputs found

    Embedded Trusted Monitoring and Management Modules for Smart Solar Panels

    Get PDF
    This paper investigates developing a prototype of smart solar panels. This architecture consists of a panel monitoring module and the central management unit. The monitoring module is to be embedded inside each PV panel making it secure to transfer the trusted data via Wi-Fi to the central Management unit (which can accommodate an array of PV panels in an installation). This module is required for data storage and provides the ability to upload secure data to the cloud. This platform presents the ability to securely manage large numbers of rooftop solar panels in a distributed ledger by implementing block chain algorithm. For achieving this purpose, Module 400 is envisaged to be turned into a Blockchain node as it provides the infrastructure to implement this technology

    Survey on security issues in file management in cloud computing environment

    Full text link
    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.Comment: 5 pages, 1 tabl

    A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

    Full text link
    Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies, but it also comes with its challenges - such as governance, security, and privacy. This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications. The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management. Furthermore, authorized access to protected cloud SaaS resources have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component and a Policy Activity Monitor (PAM) component have been introduced. In addition, other subcomponents such as a Policy Validation Unit (PVU) and a Policy Proxy DB (PPDB) have also been established for optimized service delivery. A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.Comment: 6 Page

    Achieving Secure and Transparent Supply Chains With Blockchain Technology

    Get PDF
    The advent of Industry 5.0 has introduced unprecedented challenges for organizations in maintaining the effectiveness, transparency, and security of their operations, leading to disruptions in supply chain management. The traditional methods of managing transactions and data sharing in supply chain networks are proving inadequate in the face of these complexities. The need for a comprehensive solution that addresses these issues has become critical. In response, editors Mustafa Khan, Naveed R. Khan, and Arsalan Ghouri present Achieving Secure and Transparent Supply Chains With Blockchain Technology, a groundbreaking edited collection that offers a compelling solution. This book provides a thorough overview of blockchain technology and its potential to enhance supply chain efficiency, security, and resilience. By leveraging its decentralized and secure platform, blockchain emerges as a game-changing technology that can transform supply chain management. By delving into contemporary theoretical frameworks and the latest empirical findings, this book equips academics, practitioners, policymakers, researchers, professionals, and students with the necessary knowledge and understanding to harness the power of blockchain technology for supply chain management. From exploring the applications of blockchain in traceability and resilience to examining its impact on sustainability and ethical sourcing, this book covers a wide range of topics critical to achieving secure and transparent supply chains

    Next-Generation EU DataGrid Data Management Services

    Full text link
    We describe the architecture and initial implementation of the next-generation of Grid Data Management Middleware in the EU DataGrid (EDG) project. The new architecture stems out of our experience and the users requirements gathered during the two years of running our initial set of Grid Data Management Services. All of our new services are based on the Web Service technology paradigm, very much in line with the emerging Open Grid Services Architecture (OGSA). We have modularized our components and invested a great amount of effort towards a secure, extensible and robust service, starting from the design but also using a streamlined build and testing framework. Our service components are: Replica Location Service, Replica Metadata Service, Replica Optimization Service, Replica Subscription and high-level replica management. The service security infrastructure is fully GSI-enabled, hence compatible with the existing Globus Toolkit 2-based services; moreover, it allows for fine-grained authorization mechanisms that can be adjusted depending on the service semantics.Comment: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla,Ca, USA, March 2003 8 pages, LaTeX, the file contains all LaTeX sources - figures are in the directory "figures

    SECURE CONTENT MANAGEMENT & MONITORING

    Get PDF
    The Secure Content Management & Monitoring solution is a robust and efficient information security software solution developed for document distribution oversight and governance. This solution is on the cutting edge of security monitoring technology in the information security industry by leveraging key innovation such Document Capture, Security, Big Data Analytics and customer DLP integration. It’s the first product to provide capture, archive, and audit capabilities of device activities such as print, scan, fax, copy, and send jobs. The Secure Content Management & Monitoring solution deters intentional or unintentional data leaks of important and valuable information processed through MFP or printing devices. If such data leakage does occur, crucial information such as who, what, when, and where this event occurred as well as key words within the data can be quickly retrieved and appropriate personnel notified

    Practice Safe Science: Five reasons to protect your scientific data

    Get PDF
    Research data management is quickly becoming one of the most pressing issues facing the scientific community, not just for university management teams, but for every individual researcher. The tech company Digital Science produced an infographic that captures five reasons why more attention is needed to attain a more secure system. Nathan Westgarth elaborates on the points presented and on how the research process can be made more efficient through the better use of technology
    • …
    corecore