6 research outputs found
A REVIEW ON INTERNET OF THINGS ARCHITECTURE FOR BIG DATA PROCESSING
The importance of big data implementations is increased due to large amount of gathered data via the online gates. The businesses and organizations would benefit from the big data analysis i.e. analyze the political, market, and social interests of the people. The Internet of Things (IoT) presents many facilities that support the big data transfer between various Internet objects. The integration between the big data and IoT offer a lot of implementations in the daily life like GPS, Satellites, and airplanes tracking. There are many challenges face the integration between big data transfer and IoT technology. The main challenges are the transfer architecture, transfer protocols, and the transfer security. The main aim of this paper is to review the useful architecture of IoT for the purpose of big data processing with the consideration of the various requirements such as the transfer protocol. This paper also reviews other important issues such as the security requirements and the multiple IoT applications. In addition, the future directions of the IoT-Big data are explained in this paper
Hybrid information security system via combination of compression, cryptography, and image steganography
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet
A Review of Various Steganography Techniques in Cloud Computing
One of the latest trends in IT sector is cloud computing. It develops the capabilities of organizations dynamically without training new employees, obtaining new software licenses or investing in infrastructure. At present, user keeps and share a high amount of data on cloud, and hence, the security of cloud computing is necessary so that there is no threat to any of the use
A Review of Various Steganography Techniques in Cloud Computing
One of the latest trends in IT sector is cloud computing. It develops the capabilities of organizations dynamically without training new employees, obtaining new software licenses or investing in infrastructure. At present, user keeps and share a high amount of data on cloud, and hence, the security of cloud computing is necessary so that there is no threat to any of the user’s data. Steganography is becoming a standard practice for both cloud users and cloud service providers as a mechanism against unauthorized surveillance. Steganography refers to writing hidden messages in a way that only the sender and receiver have the ability to safely know and transfer the hidden information in the means of communications. The aim of this paper is to provide an overview of steganography in cloud computing and compare various studies on the basis of technique selection, carrier formats, payload capacity and embedding algorithm to open important research directions
CLINICAL DATA WAREHOUSE: A REVIEW
- Clinical decisions are crucial because they are
related to human lives. Thus, managers and decision makers in
the clinical environment seek new solutions that can support
their decisions. A clinical data warehouse (CDW) is an
important solution that is used to achieve clinical stakeholders’
goals by merging heterogeneous data sources in a central
repository and using this repository to find answers related to
the strategic clinical domain, thereby supporting clinical
decisions. CDW implementation faces numerous obstacles,
starting with the data sources and ending with the tools that
view the clinical information. This paper presents a systematic
overview of purpose of CDWs as well as the characteristics;
requirements; data sources; extract, transform and load (ETL)
process; security and privacy concerns; design approach;
architecture; and challenges and difficulties related to
implementing a successful CDW. PubMed and Google Scholar
are used to find papers related to CDW. Among the total of 784
papers, only 42 are included in the literature review. These
papers are classified based on five perspectives, namely
methodology, data, system, ETL tool and purpose, to find
insights related to aspects of CDW. This review can contribute
answers to questions related to CDW and provide
recommendations for implementing a successful CDW
A multilayer model to enhance data security in cloud computing
Cloud computing has introduced substantial advancements to the field of information technology, offering businesses enhanced features, flexibility, reliability, scalability, and a wide range of services. However, it also presents security challenges like data theft and manipulation. To minimize the risks associated with these threats, a model that depends on encryption and steganography is proposed with the aim of applying a security model in a cloud environment. The proposed cloud security model utilizes amulti-layer model that includes a Rivest-Shamir-Adleman (RSA), advanced encryption standard (AES), identity-based encryption (IBE) methods, least significant bit (LSB) method, and the Brotli method. This comprehensive approach effectively safeguards data integrity, confidentiality, and privacy against potential intruders. In addition, it enhances the flexibility and efficiency of the cloud by enabling the secure storage and transmission of large amounts of data