106 research outputs found

    Privacy preserving cloud computation using Domingo-Ferrer scheme

    Get PDF
    Homomorphic encryption system (HES) schemes are anticipated to play a significant role in cloud-based applications. Moving to cloud-based storage and analytic services securely are two of the most important advantages of HES. Several HES schemes have been recently proposed. However, the majority of them either have limited capabilities or are impractical in real-world applications. Various HES schemes provide the ability to perform computations for statistical analysis (e.g. average, mean and variance) on encrypted data. Domingo-Ferrer is one scheme that has privacy homomorphism properties to perform the basic mathematical operations (addition, subtraction and multiplication) in a convenient and secure way. However, it works only in the positive numbers’ range which is considered as a limitation because several applications require both positive and negative ranges in which to work, especially those that have to implement analytical services in cloud computing. In this paper, we extend Domingo-Ferrer’s scheme to be able to perform arithmetic operations for both positive and negative numbers. We also propose using a lightweight data aggregation function to compute both maximum and minimum values of the aggregated data that works for both positive and negative numbers

    Design and implementation of a wearable gas sensor network for oil and gas industry workers

    Get PDF
    Industrial environment usually involves some types of hazardous substances including toxic and/or flammable gases. Accidental gas leakage can cause potential dangers to a plant, its employees and surrounding neighborhoods. Around 64% of accidents that happen in the oil fields are due to combustibles and/or toxic gases. The safety plan of most industries includes measures to reduce risk to humans and plants by incorporating early-warning devices, such as gas detectors. Most existing tools for monitoring gases are stationary and incapable of accurately measuring individual exposures that depend on personal lifestyles and environment. This paper provides a design and implementation of a wearable gas sensor network by building sensor nodes with wireless communication modules which communicate their data along the network. The system is designed to be flexible, low cost, low maintenance and with accurate performance to detect toxic gases in a timely fashion to warn employees before an existence of a disaste

    A review on various Smart Grid Technologies used in Power System

    Get PDF
    Electrical infrastructure is expanding day by day due to which smart grid gives better vision for electrical reliability. Various parameters like quality and quantity of power transmitted should be available with the electricity board which can be achieved using smart sensing, metering and communication technologies. If all the above requirements are met in power system then it is called smart grid (SG). SG also helps consumers to manage the load patters and also to manage their expenses. The main component of SG is the communication technology to share data between consumers and grid since grid operators requires real time data to schedule their supply. The Wireless Sensor Network (WSN) uses Aggregation Protocol with Error Detection (APED) to improve the security of data. The SG with SCADA is facilitated by data acquisitions which includes the meter reading, system conditions, etc. that are monitored and transmitted at regular intervals in real time. This paper reviews the modern technologies used in smart grid communication based on IEEE 802.15.4 standard to the SG and how it is modified to ensure effective, efficient and economical and secured communication of the huge real time data from the smart meters

    Preface

    Get PDF
    Over the past few years, the Internet of things (IoT) has introduced the possibility to design a whole new concept of our world "smart environments...

    A New Handover Management Model for Two-Tier 5G Mobile Networks

    Get PDF
    There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets, smartphones, and laptops. The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand. One solution to the problem is the emergence of fifth-generation (5G) wireless communication, which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption. The application of small cells is the fundamental mechanism for the 5G technology. The use of small cells can enhance the facility for higher capacity and reuse. However, it must be noted that small cells deployment will lead to frequent handovers of mobile nodes. Considering the importance of small cells in 5G, this paper aims to examine a new resource management scheme that can work to minimize the rate of handovers for mobile phones through careful resources allocation in a two-tier network. Therefore, the resource management problem has been formulated as an optimization issue that we aim to overcome through an optimal solution. To find a solution to the existing problem of frequent handovers, a heuristic approach has been used. This solution is then evaluated and validated through simulation and testing, during which the performance was noted to improve by 12% in the context of handover costs. Therefore, this model has been observed to be more efficient as compared to the existing model

    Cryptanalysis of an online/offline certificateless signature scheme for Internet of Health Things

    Get PDF
    Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal of Healthcare Engineering, vol. 2020] presented a new certificateless offline/online signature scheme for Internet of Health Things (IoHT) to fulfill the authenticity requirements of the resource-constrained environment of (IoHT) devices. The authors claimed that the newly proposed scheme is formally secured against Type-I adversary under the Random Oracle Model (ROM). Unfortunately, their scheme is insecure against adaptive chosen message attacks. It is demonstrated that an adversary can forge a valid signature on a message by replacing the public key. Furthermore, we performed a comparative analysis of the selective parameters including computation time, communication overhead, security, and formal proof by employing Evaluation based on Distance from Average Solution (EDAS). The analysis shows that the designed scheme of Khan et al. doesn’t have any sort of advantage over the previous schemes. Though, the authors utilized a lightweight hyperelliptic curve cryptosystem with a smaller key size of 80-bits. Finally, we give some suggestions on the construction of a concrete security scheme under ROM

    Perceptions and attitudes of Rohingya community stakeholders to pregnancy termination services: a qualitative study in camps of Cox’s Bazar, Bangladesh

    Get PDF
    Background: Rohingya women suffer from inaccessibility to sexual and reproductive health services in Myanmar. After the forcible displacement of the Rohingya from Myanmar to Bangladesh in 2017, pregnancy termination services have been increasingly important and desired, while knowledge gaps and obstacles to access services still exist. The role of community stakeholders is critical as gatekeepers and decision-makers to improve and strengthen pregnancy termination services for women in camps. However, there is paucity of evidence on their perspectives about pregnancy termination. This qualitative study aims to understand the perception and attitudes of Rohingya community stakeholders to pregnancy termination in the camps of Cox’s Bazar. Methods: We used purposive sampling to select 48 participants from the community stakeholders, 12 from each group: majhis (Rohingya leaders), imams (religious leaders), school teachers, and married men. We conducted in-depth interviews of all the participants between May-June 2022 and October-November 2022. Data were coded on Atlas.ti and analysed using a thematic content analysis approach. Results: Multiple socio-cultural and religious factors, gendered norms and stigma associated with pregnancy termination acted as barriers to women seeking services for it. From a religious stance, there was greater acceptance of pregnancy termination in the earlier period than in the later period of pregnancy. We observed that pregnancy termination among community stakeholders in earlier stages of pregnancy than later. However, circumstances, such as a woman’s marital status, whether she sought her husband’s permission or her ability of childcare capacity, were often framed by community stakeholders as ‘acceptable’ for pregnancy termination. Health concerns and social and contextual factors can influence community stakeholders supporting pregnancy termination. Conclusions: The community stakeholders perspectives on barriers and enablers of pregnancy termination were variable with the context. These perspectives may support or impede women’s ability to choice to seek pregnancy termination services. To improve women’s choice to pregnancy termination, it is critical to consider roles of community stakeholders in creating their supporting attitudes to women’s choice and access, and to designing targeted culturally appropriate interventions with communities support and engagement

    Mental illness and injuries: emerging health challenges of urbanisation in South Asia

    Get PDF
    This article was published in the BMJ (Online) [© 2017 BMJ Publishing Group] and the definitive version is available at: http://doi.org10.1136/bmj.j1126 The Journal's website is at: http://www.bmj.com/content/357/bmj.j1126Publishe

    D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems

    Full text link
    Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a Collaborative Intrusion Detection System successfully detects and prevents various attacks, it is possible that an inside attacker performs a malicious act and compromises an Intrusion Detection System node. A compromised node can inflict considerable damage on the whole collaborative network. For instance, when a malicious node gives a false alert of an attack, the other nodes will unnecessarily increase their security and close all of their services, thus, degrading the system's performance. On the contrary, if the spurious node approves malicious traffic into the system, the other nodes would also be compromised. Therefore, to detect a compromised node in the network, this article introduces a device integrity check mechanism based on 'Digital Genome.' In medical science, a genome refers to a set that contains all of the information needed to build and maintain an organism. Based on the same concept, the digital genome is computed over a device's vital hardware, software, and other components. Hence, if an attacker makes any change in a node's hardware and software components, the digital genome will change, and the compromised node will be easily detected. It is envisaged that the proposed integrity attestation protocol can be used in diverse Internet of Things and other information technology applications to ensure the legitimate operation of end devices. This study also proffers a comprehensive security and performance analysis of the proposed framework
    corecore