7 research outputs found

    Looking into the definition and characteristics of u-learning

    Get PDF
    This paper describes a new learning paradigm,known as ubiquitous learning or u-learning, which is supported by the ubiquitous computing technologies.In addition, the paper also aims at providing specific information related to u-learning for researchers who are interested in venturing the new area of ubiquitous computing.The u-learning definition and characteristics are also compared and discussed. As a result, a conclusive definition of u-learning together with its characterization is proposed. Finally, some of the u-learning applications are explained to further enhance the understanding of u-learning concept

    Anonymous Authentication Against Man-In-The-Middle Attack

    Get PDF
    Evolving enterprise in application and data with flexible and scalable infrastructure in cloud services could improve efficiency and productivity of a business operation. Cloud services also offer resource sharing, data storage and application platform as on-demand services that could reduce the operational expenditure. Nevertheless, increasing usage and accessibility to the cloud services require strong security control to preserve user’s privacy and data integrity due to network communication vulnerabilities. There are many possible attacks that could cause security breach and abuse the user’s identity, leading to illegal access to the server. Man-inthe-middle attack is one of the attacks that can intercept communication between users and collect all users’ information. The attacker can misuse the information and act as a legal user to gain access to the system. It is a big challenge to preserve user’s privacy and provide protection from malicious attack. This paper proposes anonymous authentication scheme to preserve user’s privacy and provide protection to such possible attacks. The proposed scheme also provides secure mutual authentication, anonymity, session key establishment and non-dependency with the third party. The proposed scheme uses password-based authentication as an authentication method with anonymity feature to preserve user’s privacy. Experiment was conducted to test and validate the proposed scheme with man-in-the-middle attack. The result of the experiment shows that the proposed scheme is able to provide the privacy to mitigate and successfully preserve the user’s identity from the attack

    Looking into the Definition and Characteristics of U-Learning

    Get PDF
    ABSTRACT This paper describes a new learning paradig

    An Analysis Of Standardized Data For Fog Computing Storage Capacity Using Non-Relational Database

    Get PDF
    Computer applications nowadays relies on physical storage either to store the computation information or for the application itself. As the application become more complex and being used day after day, the data will be growing causing issue with lack of free space especially in fog computing where the storage resource is limited. Despite increasing disk storage or even migrating the data into the cloud would resolve this issue but this would also increase the overall cost as well. Thus, the objective of this paper is to analyse the difference between non-relational database with relational database in term of storage capacity. First the data from relational database will be taken and converted into a standard format and later turned into non-relational database. The result from the analysis will provide motivation for proposing database storage to be implemented in fog computing environmen

    Handling the convergence of mobile sub-networks in a personal distributed environment

    No full text
    A Personal Distributed Environment (PDE) is a personal communications concept designed for future mobile communications. In a single PDE, there exist several Sub-networks hosting devices located across the infrastructure, which will inter-work with one another through the coordination of a Device Management Entity (DME). Some of these Sub-networks are fixed and some are mobile. One of the issues concerning the Mobile Sub-networks in a PDE is the convergence and de-convergence of Mobile Sub-networks. In this paper a comparison is made between two approaches proposed to handle the convergence and de-convergence of Mobile Sub-networks by use of a detailed simulation model
    corecore