9 research outputs found

    Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities

    Get PDF
    Smart cities wireless advertising (smart mobile-AD) filed is one of the well-known area of research where smart devices using mobile ad hoc networks (MANET) platform for advertisement and marketing purposes. Wireless advertising through multiple fusion internet of things (IoT) sensors is one of the important field where the sensors combines multiple sensors information and accomplish the control of self-governing intelligent machines for smart cities advertising framework. With many advantages, this field has suffered with data security. In order to tackle security threats, intrusion detection system (IDS) is adopted. However, the existing IDS system are not able to fulfill the security requirements. This paper proposes an intellectual characteristic selection algorithm (ICSA) integrated with normalized intelligent genetic algorithm-based min-max feature selection (NIGA-MFS). The proposed solution designs for wireless advertising system for business/advertising data security and other transactions using independent reconfigurable architecture. This approach supports the wireless advertising portals to manage the data delivery by using 4G standard. The proposed reconfigurable architecture is validated by using applications specific to microcontrollers with multiple fusion IoT sensors

    State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing

    Get PDF
    Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to make the cloud and data security challenges more understandable, to briefly explain the techniques used to achieve privacy and data integrity, to compare various recent studies in both pre-quantum and post-quantum, and to focus on current gaps in solving privacy and data integrity issues

    Enhancing Smart Cities with IoT and Cloud Computing: A Study on Integrating Wireless Ad Hoc Networks for Efficient Communication

    Get PDF
    شهدت المدن الذكية تطورا جوهريا زاد من امكانياتها بشكل كبير .في الواقع ، لقد أتاحت التطورات الحديثة في انترنت الاشياء (IOT) فرصا جديدة من خلال حل عدد  من المشاكل الحرجة والتي ادت الى ابتكار المدن الذكية بالاضافة الى انشاء و حوسبة الخدمات و التطبيقات المتطورة للعديد من  المجاميع المطورة في المدينة . من اجل تعزيز تنمية المدن الذكية بأتجاه التواصل و المشاركة ،تركز هذه الدراسة على التطور في مجال المعلوماتية في ضوء انترنت الاشياء (IOT) و الحوسبة السحابية (CC) .جمعت بيانات انترنت الاشياء والتي تخص المدن الذكية بشكل متجانس . اصبح انترنت الاشياء الذي يسمح بتواصل الاشخاص مع بعضهم ممكنا باستخدام الذكاء الاصطناعي .بناءا على ذلك ،استخدمنا (ARF) في حسابات الذكاء الاصطناعي .للتبسيط ،ننصح باستخدام تخصيص اصول الالة الافتراضية للحوسبة السحابية التكيفية (ACC-VMRA ) .لتاكيد جدواها ،سنفحص و نضاعف كيفية تطبيق تطورات انترنت الاشياء (IOT ) و الحوسبة السحابية (CC) في المدن الذكية.تظهر نتائج التجربة ان حساب التحسين الموصى به اكثر انتاجية من الطرق الاخرى المستخدمة حاليا.Smart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things, which enables gadgets to connect with one another mostly without human involvement, is made possible by AI. In line with this, The Ad Hoc Routing Function (ARF) AI computation is used for multi-rule simplification, the use of Adaptive Cloud Computing Virtual Machine Asset Allotment Technique (ACC-VMRA) is advised. To confirm its viability, the applied developments of IoT and CC in smart cities is examined and duplicated. The experiment results show that the recommended enhancement calculation is more productive than other currently used methods

    State-of-the-art in privacy preserved k-anonymity revisited

    No full text
    The prevalent conditions in data sharing and mining have necessitated the release and revelation of certain vulnerable private information. Thus the preservation of privacy has become an eminent field o f study in data security. In addressing this issue, K anonymity is amongst the most reliable and valid algorithms used for privacy preservation in data mining. It is ubiquitously used in myriads of fields in recent years for its characteristic effective prevention ability towards the loss of vulnerable information under linking attacks. This study presents the basic notions and deep insight of the existing privacy preserved K anonymity model and its possible enhancement. Furthermore, the present challenges, excitements an d future progression of privacy preservation in K anonymity are emphasized. Moreover, this study is grounded on the fundamental ideas and concepts of the existing K anonymity privacy preservation, K anonymity model and enhanced the K anonymity model. Finally, it extracted the developmental direction of privacy preservation in K anonymity

    A survey paper on privacy issue in cloud computing

    No full text
    In past few years, cloud computing is one of the popular paradigm to host and deliver services over Internet. It is having popularity by offering multiple computing services as cloud storage, cloud hosting and cloud servers etc., for various types of businesses as well as in academics. Though there are several benefits of cloud computing, it suffers from security and privacy challenges. Privacy of cloud system is a serious concern for the customers. Considering the privacy within the cloud there are numerous threats to the user's sensitive data on cloud storage. In this study, we give a survey on numerous works on cloud computing, provide a survey on several research on cloud privacy issues, classify current solutions for privacy issues in cloud environments as architectures, approaches and methods and the advantages and disadvantages of current studies are tabulated. Moreover, it also discusses open research challenges and recommends future research directions. The main goal of this study is to offer a better understanding of the privacy challenges of cloud computing and to focus on current gaps to fulfil the privacy issue

    State of the art survey on security issue in cloud computing architectures, approaches and methods

    Get PDF
    The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the cloud, enterprise customers are still unwilling to position their business in the cloud. Security and privacy are the main issues which decrease the growth of cloud computing and preservation of data continue to plague the market. In this paper, we present the vulnerabilities and attacks; identify relevant solution directives to strengthen security in the cloud environment. The main goal of this paper is to offer a better understanding of the security challenges of cloud computing and identify architecture, approaches and methods that have been proposed
    corecore