9 research outputs found

    Edge Computing: Applications and Security Features

    Get PDF

    Privacy and security challenges in smart and sustainable mobility

    Get PDF
    The current era of computing is witnessing a huge amount of data being generated with every passing moment. This massive data if nourished efectively can open new horizons for the computing world. The modern world is slowly but surely moving towards the automation age where every entity and object is being automated to perform desired tasks without the need of human interventions. This has made the lives of people more convenient and comfortable. Automation has taken over every single feld of computing and even beyond. Smart mobility is one such example of automation wherein the users get real time information about the trafc conditions as well as alternate route suggestions in case of trafic jams. Transportation is considered as the backbone of every business. The automated intelligent transportation system (ITS) has completely transformed the way how people, goods and services are transported and is quite important for achieving sustainability. This paper provides an overview of the existing ITS system, concept of smart mobility and existing vulnerabilities in these systems. Their security concerns and scenarios are also analyzed. Furthermore, in this paper the importance and need for securing these intelligent systems is highlighted and future trends in ITS is also suggested. Although ITS and smart mobility technology are already providing convenient transportation and navigational facilities, there is still a huge scope to improve these facilities for the end users. The suggested future trends if integrated in an efective manner can provide exemplary means to provide state-of-the-art navigational facilities and smart mobility in a true sense.5311-8814-F0ED | Sara Maria da Cruz Maia de Oliveira PaivaN/

    BECA: A Blockchain-Based Edge Computing Architecture for Internet of Things Systems

    Get PDF
    The scale of Internet of Things (IoT) systems has expanded in recent times and, in tandem with this, IoT solutions have developed symbiotic relationships with technologies, such as edge Computing. IoT has leveraged edge computing capabilities to improve the capabilities of IoT solutions, such as facilitating quick data retrieval, low latency response, and advanced computation, among others. However, in contrast with the benefits offered by edge computing capabilities, there are several detractors, such as centralized data storage, data ownership, privacy, data auditability, and security, which concern the IoT community. This study leveraged blockchain’s inherent capabilities, including distributed storage system, non-repudiation, privacy, security, and immutability, to provide a novel, advanced edge computing architecture for IoT systems. Specifically, this blockchain-based edge computing architecture addressed centralized data storage, data auditability, privacy, data ownership, and security. Following implementation, the performance of this solution was evaluated to quantify performance in terms of response time and resource utilization. The results show the viability of the proposed and implemented architecture, characterized by improved privacy, device data ownership, security, and data auditability while implementing decentralized storage

    Privacy Preservation and Analytical Utility of E-Learning Data Mashups in the Web of Data

    Get PDF
    Virtual learning environments contain valuable data about students that can be correlated and analyzed to optimize learning. Modern learning environments based on data mashups that collect and integrate data from multiple sources are relevant for learning analytics systems because they provide insights into students' learning. However, data sets involved in mashups may contain personal information of sensitive nature that raises legitimate privacy concerns. Average privacy preservation methods are based on preemptive approaches that limit the published data in a mashup based on access control and authentication schemes. Such limitations may reduce the analytical utility of the data exposed to gain students' learning insights. In order to reconcile utility and privacy preservation of published data, this research proposes a new data mashup protocol capable of merging and k-anonymizing data sets in cloud-based learning environments without jeopardizing the analytical utility of the information. The implementation of the protocol is based on linked data so that data sets involved in the mashups are semantically described, thereby enabling their combination with relevant educational data sources. The k-anonymized data sets returned by the protocol still retain essential information for supporting general data exploration and statistical analysis tasks. The analytical and empirical evaluation shows that the proposed protocol prevents individuals' sensitive information from re-identifying.The Spanish National Research Agency (AEI) funded this research through the project CREPES (ref. PID2020-115844RB-I00) with ERDF funds

    A multistage successive approximation method for riccati differential equations

    Get PDF

    Security and Privacy Issues in Cloud, Fog and Edge Computing

    No full text
    <p>FOSET Academic Meet 2023</p&gt

    Security and Privacy Issues in Cloud, Fog and Edge Computing

    No full text

    Cyber Security and Critical Infrastructures

    Get PDF
    This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues
    corecore