67 research outputs found

    An Exploratory Study for Understanding Reasons of (Not-)Using Internet of Things

    Get PDF
    The potential of things or objects generating and processing data about day-to-day activities of its users has given a new level of popularity to Internet of Things (IoT) among its consumers. Even though the popularity has seen a steady increase, the use of IoT devices has been slow and abandonment rapid. To build on the existing literature and advance our understanding of the sociological processes of use and non-use of these devices, this paper presents results from the survey of 489 IoT users. Our qualitative analysis of open ended questions revealed that the motives for use include multi-functionality of devices that provide control over daily activities, social competitive edge, economic advantage, and habit. The justifications for limiting or stopping the use include privacy concerns, information overload and inaccuracy, demotivation because of the reminders about pending or failed goals, no excitement after satisfying initial curiosity, and maintenance becoming unmanageable in terms of effort, time, and money

    Investigating Regulative Implications for User-generated Content and a Design Proposal

    Get PDF
    The rapid increase of the Internet connectivity and the data publishing activity, like user-generated content, has lead Internet Service Providers (ISPs) to establish more efficient mechanisms for content delivery, such as caching. Mechanisms such as content-aware-networks and in-network caching reduce network load, server load, and user response time, thus, manage the network. However, caching of content also raises major implications in terms of legal acts and bills (e.g., data privacy, copyright), dealing with access control, validation scheme, and regulations (e.g., contractual obligation, legal restrictions). In general, user-generated content is linked with sensitive information, such as geographical information, medical and financial information, personal identifiable data, photos, videos, and contact information. Therefore, it is essential to secure data and regulate access. The latter, is gained by including access control mechanisms in the data exchange process, where a user requesting data must prove his access rights. Therefore, a user has to show an access ticket, which includes his rights based on legal and regulative implications. In order to secure any kind of data exchange, authentication of each participating communication entity (e.g., content owner, server, and end-user) is essential, which is part of the proposed two-way authentication handshake in this paper that is performed to generate a secure communication channel. The main contribution of this paper is to show that transmission, storage, and usage of user-generated data in caches within the network is manageable within the legal laws on sensitivity, copyright, and privacy. The scope of studying these laws, acts, and policies is restricted to Switzerland (CH), the European Union (EU), and the United States of America (USA). Finally, a solution is presented including access ticketing and two-way authentication mechanisms based oncommonstandards from IP network

    VANET: Analysis of Black hole Attack using CBR/UDP Traffic Pattern with Hash Function and GPSR Routing Protocol

    Get PDF
    With momentum of time huge development occurred in the field of MANET and VANET. As we know when new technology emerges it came with many advanages but definitely some limitation must be there. In WSN security is one of biggest challenges which we need to tackle to implement adhoc network. Main reason behind this is dynamic topology of sensing node because nodes are dynamic in nature rather than static. As technology came into existence side by side unethical activity also take place which try to access the data illegally to gain personnel profit. There are so many types of attack possibilities are there in adhoc network. Attack can be classified into active and passive. In our research article oue main concern is on black hole attack. According to this attack a malicious node with high priority number is deployed in between other nodes. Now this malicious node access the data and sends acknowledgement to source that data received. Source node will think that acknowledgement is sent by destination node but actually it is sent by malicious node.  In this research article performance analysis of the black hole attack in Vehicular Ad Hoc Network is executed

    Scalable Mixed-Mode MPC

    Get PDF
    Protocols for secure multi-party computation (MPC) supporting mixed-mode computation have found a lot of applications in recent years due to their flexibility in representing the function to be evaluated. However, existing mixed-mode MPC protocols are only practical for a small number of parties: they are either tailored to the case of two/three parties, or scale poorly for a large number of parties. In this paper, we design and implement a new system for highly efficient and scalable mixed-mode MPC tolerating an arbitrary number of semi-honest corruptions. Our protocols allow secret data to be represented in Encrypted, Boolean, Arithmetic, or Yao form, and support efficient conversions between these representations. 1. We design a multi-party table-lookup protocol, where both the index and the table can be kept private. The protocol is scalable even with hundreds of parties. 2. Using the above protocol, we design efficient conversions between additive arithmetic secret sharings and Boolean secret sharings for a large number of parties. For 32 parties, our conversion protocols require 1184Ă— to 8141Ă— less communication compared to the state- of-the-art protocols MOTION and MP-SPDZ; this leads to up to 1275Ă— improvement in running time under 1 Gbps network. The improvements are even larger with more parties. 3. We also use new protocols to design an efficient multi-party distributed garbling protocol. The protocol could achieve asymptotically constant communication per party. Our implementation will be made public

    A study to compare ramosetron and ondansetron for prevention of post-operative nausea and vomiting in patients undergoing laparoscopic cholecystectomy under general anesthesia

    Get PDF
    Background: The incidence of nausea and vomiting following laparoscopic cholecystectomy is very high. 5-hydroxytryptamine receptor antagonists are drug of choice for prevention of post-operative nausea and vomiting (PONV) because of their good efficacy and very few side effects in comparison to other antiemetics. Aims and Objectives: This study was undertaken to compare the efficacy and safety of intravenous ramosetron 0.3 mg and ondansetron 8 mg for prevention of PONV in patients undergoing laparoscopic cholecystectomy under general anesthesia. Materials and Methods: One hundred patients between 18 and 70 years of age with American Society of Anesthesiology Grade I and II scheduled for elective laparoscopic cholecystectomy were randomly divided into two groups of 50 patients each. Group A patients were given injection ondansetron 8 mg and Group B patients were given injection ramosetron 0.3 mg approximately 5 min just before the induction of general anesthesia. Results: Difference in Nausea, vomiting/retching, and PONV score assessed at 4, 8, 12, and 24 h interval postoperatively in both groups was found to be statistically insignificant (P>0.05). The severity of nausea was assessed by visual analogue scale at various time intervals and use of rescue antiemetics in both the groups were found statistically insignificant. Incidence of side effects was also comparable in both the groups. Conclusion: Ramosetron and ondansetron are equally effective for prevention of PONV in patients who underwent elective laparoscopic cholecystectomy under general anesthesia when used prophylactically. Both drugs are safe and have low incidence of side effects

    Gallbladder reporting and data system (GB-RADS) for risk stratification of gallbladder wall thickening on ultrasonography:an international expert consensus

    Get PDF
    The Gallbladder Reporting and Data System (GB-RADS) ultrasound (US) risk stratification is proposed to improve consistency in US interpretations, reporting, and assessment of risk of malignancy in gallbladder wall thickening in non-acute setting. It was developed based on a systematic review of the literature and the consensus of an international multidisciplinary committee comprising expert radiologists, gastroenterologists, gastrointestinal surgeons, surgical oncologists, medical oncologists, and pathologists using modified Delphi method. For risk stratification, the GB-RADS system recommends six categories (GB-RADS 0–5) of gallbladder wall thickening with gradually increasing risk of malignancy. GB-RADS is based on gallbladder wall features on US including symmetry and extent (focal vs. circumferential) of involvement, layered appearance, intramural features (including intramural cysts and echogenic foci), and interface with the liver. GB-RADS represents the first collaborative effort at risk stratifying the gallbladder wall thickening. This concept is in line with the other US-based risk stratification systems which have been shown to increase the accuracy of detection of malignant lesions and improve management. Graphical abstract: [Figure not available: see fulltext.]

    The impact of immediate breast reconstruction on the time to delivery of adjuvant therapy: the iBRA-2 study

    Get PDF
    Background: Immediate breast reconstruction (IBR) is routinely offered to improve quality-of-life for women requiring mastectomy, but there are concerns that more complex surgery may delay adjuvant oncological treatments and compromise long-term outcomes. High-quality evidence is lacking. The iBRA-2 study aimed to investigate the impact of IBR on time to adjuvant therapy. Methods: Consecutive women undergoing mastectomy ± IBR for breast cancer July–December, 2016 were included. Patient demographics, operative, oncological and complication data were collected. Time from last definitive cancer surgery to first adjuvant treatment for patients undergoing mastectomy ± IBR were compared and risk factors associated with delays explored. Results: A total of 2540 patients were recruited from 76 centres; 1008 (39.7%) underwent IBR (implant-only [n = 675, 26.6%]; pedicled flaps [n = 105,4.1%] and free-flaps [n = 228, 8.9%]). Complications requiring re-admission or re-operation were significantly more common in patients undergoing IBR than those receiving mastectomy. Adjuvant chemotherapy or radiotherapy was required by 1235 (48.6%) patients. No clinically significant differences were seen in time to adjuvant therapy between patient groups but major complications irrespective of surgery received were significantly associated with treatment delays. Conclusions: IBR does not result in clinically significant delays to adjuvant therapy, but post-operative complications are associated with treatment delays. Strategies to minimise complications, including careful patient selection, are required to improve outcomes for patients

    Investigating regulative implications for user-generated content and a design proposal

    Full text link
    The rapid increase of the Internet connectivity and the data publishing activity, like user-generated content, has lead Internet Service Providers (ISPs) to establish more efficient mechanisms for content delivery, such as caching. Mechanisms such as content-aware-networks and in-network caching reduce network load, server load, and user response time, thus, manage the network. However, caching of content also raises major implications in terms of legal acts and bills (e.g., data privacy, copyright), dealing with access control, validation scheme, and regulations (e.g., contractual obligation, legal restrictions). In general, user-generated content is linked with sensitive information, such as geographical information, medical and financial information, personal identifiable data, photos, videos, and contact information. Therefore, it is essential to secure data and regulate access. The latter, is gained by including access control mechanisms in the data exchange process, where a user requesting data must prove his access rights. Therefore, a user has to show an access ticket, which includes his rights based on legal and regulative implications. In order to secure any kind of data exchange, authentication of each participating communication entity (e.g., content owner, server, and end-user) is essential, which is part of the proposed two-way authentication handshake in this paper that is performed to generate a secure communication channel. The main contribution of this paper is to show that transmission, storage, and usage of user-generated data in caches within the network is manageable within the legal laws on sensitivity, copyright, and privacy. The scope of studying these laws, acts, and policies is restricted to Switzerland (CH), the European Union (EU), and the United States of America (USA). Finally, a solution is presented including access ticketing and two-way authentication mechanisms based on common standards from IP networks
    • …
    corecore