9 research outputs found

    State of the Art Intrusion Detection System for Cloud Computing

    Get PDF
    The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies  are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper surveys, explores and informs researchers about the latest developed Cloud Intrusion Detection Systems by providing a comprehensive taxonomy and investigating possible solutions to detect intrusions in cloud computing systems. As a result, we provide a comprehensive review of Cloud Intrusion Detection System research, while highlighting the specific properties of Cloud Intrusion Detection System. We also present taxonomy on the key issues in Cloud Intrusion Detection System area and discuss the different approaches taken to solve the issues. We conclude the paper with a critical analysis of challenges that have not fully solved

    Evaluation of Enterobacter sp. strain G87 as potential probiont against Vibrio harveyi infection in Artemia nauplii and Asian seabass (Lates calcarifer) larvae

    Get PDF
    Probiotic has gained many interests as an alternative method in preventing and treating diseases in aquaculture. The benefits include improving feed value, inhibition of pathogenic microorganisms, anti-mutagenic and anti-carcinogenic activity, growth promoting factors, and increase host immune response. This research was carried out in order to evaluate the potential of probiont Enterobacter sp. G87 in conferring protection to Artemia and seabass larvae against Vibrio harveyi infection. In preliminary in vivo test, Artemia nauplii was treated with Enterobacter sp. G87 at three different concentrations 104, 106 and 108 CFU mL-1 and challenged with V. harveyi at 105 CFU mL-1. After challenged, significant increased survival was found in Artemia (78±2%) treated with 106 CFU mL-1 of Enterobacter sp. G87 compared with challenged group with no probiont added (48±2%). From the results, two concentrations of probiont (106 and 108 CFU mL-1) were selected to be used in seabass larvae in vivo challenge assay. After challenged with V. harveyi at 105 CFU mL-1 highest survival was found in seabass larvae treated with 106 CFU mL-1 of Enterobacter sp. G87 (95±3%). Additionally, Enterobacter sp. G87 was also able to reduce Vibrio counts both in Artemia and seabass larvae culture. This study showed that probiont Enterobacter sp. G87 was able to protect Artemia nauplii and seabass larvae from Vibrio harveyi infection and has a potential to be further studied in a larger scale

    A block cipher based on genetic algorithm

    Get PDF
    The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. Permutation functions are components that are commonly used in block cipher to ensure that the ciphers are efficient. However, it would be more effective if we can use the optimum and suitable technique for crossover and mutation function. This research will concentrate on increasing the complexity and the efficiency of block cipher algorithm. This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. Other than that, the evolvement of technology will also contribute towards the development of new block ciphers. To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. The study identifies the similarity elements and highlights the essential computation elements, namely crossover and mutation that generate idea to computational model. It can be applied in designing a new block cipher that fulfils Shanon’s confusion and diffusion properties. The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. The avalanche effect or bit independence analysis has been carried out using correlation coefficient and key sensitivity in experiments and satisfies the confusion property in non-linearity transformation and sensitivity of the ciphertext generated in the block cipher. It also measures the diffusion property in cryptanalysis using branch number in estimating the possible success of differential and linear attacks. Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed such as NIST Statistical Test, avalanche effect, cryptanalysis and efficiency to justify that it is a secure block cipher algorithm. Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders or interested parties as one of the secure algorithm to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research

    Systematic literature review: Trend analysis on the design of lightweight block cipher

    No full text
    Lightweight block ciphers have become a standard for security protections on IoT devices. Advanced technology is required to secure the data, thus encryption is the method that can provide information security. From previous studies, comparisons of lightweight algorithms in various literature focus on their performance and implementation. However, a lack of analysis has been done on the relationship between the algorithm components and their security strength. This information is crucial for developers in designing secure algorithms. In this paper, a comprehensive systematic literature review on 101 existing lightweight algorithms is presented. This review focuses on the security aspect of lightweight algorithms that cover the identification of secure design components based on substitution and permutation. Security analysis and the evolution of lightweight algorithms are also presented. This research includes the results and discussions to observe the selections of substitution and permutation functions to analyse their impact on the security strength. Recommendations from the developer’s insight on methods and considerations for designing an algorithm are also presented. Findings from the research indicate that various techniques can be used to develop a secure algorithm. Most importantly, an algorithm must be provided with confusion and diffusion properties in the design to ensure sufficient security

    LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application

    No full text
    Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the security of encryption algorithms is by using 3D designs on symmetric block ciphers. Although a 3D cipher design could improve the algorithms, the existing methods enlarge the block sizes that will also expand the key sizes and encryption rounds, thus decreasing their efficiency. Therefore, we propose the LAO-3D block cipher using a 3D permutation that offers security by providing confusion and diffusion characteristics. Five security analyses were conducted to assess the strengths of LAO-3D. The findings suggest that LAO-3D achieves better results compared to other existing lightweight block ciphers, with 98.2% non-linearity, 50% bit error rates for both plaintext and key modifications, surpasses 100% of the randomness test, and is immune to differential and linear cryptanalysis attacks. Moreover, the block cipher obtains competitive performance results in software applications. From the security analyses and performance tests, it is proven that LAO-3D can provide sufficient security at low costs in mobile encryption applications

    Entrepreneurship Project : nasa inc / Nurul Shahirah Abdul Aziz...[et al.]

    No full text
    NASA INC. is a company providing the latest technology of wireless charging, suitable for people with up-to-date devices. As people nowadays depended on technology to get through the day easy and stress free, NASA INC. comes out with the newest and advanced technology in the market to make things more convenient and easy for people living a busy lifestyle. NASA INC. would love to introduce new product Stick-It-Bank, a portable power bank only for wireless charging. Stick-It-Bank is a power bank powered by solar, exclusively for devices that enable wireless charging. It works by electromagnetic induction. This power bank is targeted for people who owned the latest devices available on the market. People nowadays are always looking forward to the release of the current technology available, we introduce Stick-It-Bank to provide portable and easy charging for devices that enable wireless charging. As power banks available in the market are mostly heavy and bulky, NASA INC. proposes a power bank that is light-weighted and flexible, making it easier to carry anywhere

    State of the art intrusion detection system for cloud computing

    No full text
    The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper surveys, explores and informs researchers about the latest developed Cloud Intrusion Detection Systems by providing a comprehensive taxonomy and investigating possible solutions to detect intrusions in cloud computing systems. As a result, we provide a comprehensive review of Cloud Intrusion Detection System research, while highlighting the specific properties of Cloud Intrusion Detection System. We also present taxonomy on the key issues in Cloud Intrusion Detection System area and discuss the different approaches taken to solve the issues. We conclude the paper with a critical analysis of challenges that have not fully solved

    Molecular dynamics simulation of collagen binding to an amyloid-beta monomer and its effect on the peptide structure

    No full text
    Alzheimer’s disease (AD) is a progressive neurodegenerative disease associated with the accumulation of amyloid beta (Aβ) peptides in the central nervous system (CNS). The extracellular matrix (ECM) proteins play an important role in the AD process. Fibrillar type III collagen is one of the major constituents of the ECM, providing the tissue with tensile strength and influencing cell attachment and migration. However, its structural properties and the binding mechanism of the Aβ42 monomer with type III collagen at the molecular level are largely unknown. In this study, the binding interactions of type III collagen with the Aβ42 monomer and the conformational dynamics of the Aβ42 monomer were investigated through molecular docking and molecular dynamics (MD) simulations. Docking results showed that type III collagen formed hydrogen bonds and hydrophobic contacts with the N-terminal, hydrophobic (CHC and SHR) and C-terminal regions of the Aβ42 monomer. Whereas MD results revealed that type III collagen reduced the helical content and promoted an aggregation-prone β-sheet conformation in the Aβ42 peptide structure. This finding suggests that type III collagen, and possibly other collagens, may play a role in regulating amyloid fibril formation. The results indicate that the localization of type III collagen may be an important initial event in amyloid plaque formation. Thus, our findings provide a preliminary understanding of the interaction of the Aβ peptide with type III collagen in Alzheimer’s disease

    Hydrogel Application in Urban Farming: Potentials and Limitations—A Review

    Get PDF
    Urban agriculture plays a vital role in ensuring the self-sufficiency of a great variety of fresh vegetables and nutrients. It promotes a sustainable food system as well as reducing the dependency on imports for the growing population. Urban farming has made it possible for agriculture practices to be implemented anywhere at any time in a sophisticated way. Hydrogel has been introduced in urban agriculture in the past few decades. However, the application of hydrogel in urban agriculture is still being explored in terms of hydrogel types, structure, physical and chemical properties, change due to external factors, and its suitability for different plant species. This review discusses the potentials and limitations of hydrogel in different application conditions. We present the state of knowledge on hydrogel production and crosslinking methods, hydrogel characteristics, water absorption and release mechanisms of hydrogel, hydrogel advantages and limitations, and current and future applications in urban farming
    corecore