首页 > 最新文献

2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Security Framework for IoT and Fog Computing Networks 物联网和雾计算网络安全框架
Dominik Soukup, Ondřej Hujňák, Simon Štefunko, Radek Krejcí, Erik Gresak
Our environment becomes more and more interconnected. Various devices like refrigerators, doors or light bulbs communicate over different networks and provide information for applications that are supposed to make our lives easier and more comfortable. However, such data provide sensitive information about our presence or habits and become captivating for network attackers. It is very challenging to detect incidents in heterogeneous IoT networks where different devices come in and out or change their network profiles quite frequently. We propose a security framework for IoT and fog computing networks to address these challenges. Our framework is very flexible and designed even for devices with limited computational power. All components can be deployed on one network node or distributed among many, which also allows easy scalability. Part of our solution is software IoT gateway that provides the capability to analyse traffic from non-IP IoT sensors. This project covers full-stack security solution because it contains collectors, detectors and management tools. This framework has only software components with no relation to any specific hardware device. It is developed as an open-source project and it is publicly available for the worldwide community. Currently developed detectors detect identified vulnerabilities for Z-Wave, Long Range Wide Area Network (Lo-RaWAN), BLE and IP based IoT protocols.
我们的环境变得越来越相互联系。冰箱、门或灯泡等各种设备通过不同的网络进行通信,并为应用程序提供信息,这些应用程序本应使我们的生活更轻松、更舒适。然而,这些数据提供了关于我们的存在或习惯的敏感信息,并成为网络攻击者的吸引力。在异构物联网网络中,检测不同设备进出或频繁更改其网络配置文件的事件非常具有挑战性。我们提出了一个物联网和雾计算网络的安全框架来应对这些挑战。我们的框架非常灵活,甚至为计算能力有限的设备设计。所有组件都可以部署在一个网络节点上,也可以分布在多个网络节点上,这也允许容易的可伸缩性。我们的解决方案的一部分是软件物联网网关,提供分析来自非ip物联网传感器的流量的能力。该项目涵盖了全栈安全解决方案,因为它包含收集器、检测器和管理工具。这个框架只有软件组件,与任何特定的硬件设备没有关系。它是作为一个开源项目开发的,它对全球社区公开可用。目前开发的探测器可检测Z-Wave、远程广域网(Lo-RaWAN)、BLE和基于IP的物联网协议的已识别漏洞。
{"title":"Security Framework for IoT and Fog Computing Networks","authors":"Dominik Soukup, Ondřej Hujňák, Simon Štefunko, Radek Krejcí, Erik Gresak","doi":"10.1109/I-SMAC47947.2019.9032592","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032592","url":null,"abstract":"Our environment becomes more and more interconnected. Various devices like refrigerators, doors or light bulbs communicate over different networks and provide information for applications that are supposed to make our lives easier and more comfortable. However, such data provide sensitive information about our presence or habits and become captivating for network attackers. It is very challenging to detect incidents in heterogeneous IoT networks where different devices come in and out or change their network profiles quite frequently. We propose a security framework for IoT and fog computing networks to address these challenges. Our framework is very flexible and designed even for devices with limited computational power. All components can be deployed on one network node or distributed among many, which also allows easy scalability. Part of our solution is software IoT gateway that provides the capability to analyse traffic from non-IP IoT sensors. This project covers full-stack security solution because it contains collectors, detectors and management tools. This framework has only software components with no relation to any specific hardware device. It is developed as an open-source project and it is publicly available for the worldwide community. Currently developed detectors detect identified vulnerabilities for Z-Wave, Long Range Wide Area Network (Lo-RaWAN), BLE and IP based IoT protocols.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of Masking Techniques to Find out Security and other Efficiency Issues in Healthcare Domain 通过屏蔽技术分析医疗保健领域的安全性和其他效率问题
B. Siddartha, G. Ravikumar
Increased use of modern advanced electronic devices rapidly increased the data collection rate, most of the advanced healthcare industries today are using updated healthcare facilities with the advanced healthcare technologies to collect and process the data. Healthcare data generated by the most of the industries are in the digital format. Provisioning protection and security to the PHI is the major concern but it is very difficult to safeguard the generated data from unauthorized users or breaches. There are many advanced techniques are in use today to protect the individuals sensitive data. Data masking approach is the advanced technique that enables security provisioning of personnel health records. This paper presented the in-depth study on current healthcare security techniques and summarized the gaps in security provisioning. Conclusion part of the paper highlights the some of the acts and policies adopted by the countries to safeguard the citizens' healthcare data.
现代先进电子设备使用的增加迅速提高了数据收集速度,当今大多数先进的医疗保健行业都在使用具有先进医疗保健技术的最新医疗保健设施来收集和处理数据。大多数行业生成的医疗保健数据都是数字格式的。为PHI提供保护和安全性是主要问题,但保护生成的数据不受未经授权的用户或破坏是非常困难的。今天有许多先进的技术被用来保护个人的敏感数据。数据屏蔽方法是一种高级技术,可实现人员健康记录的安全配置。本文对当前的医疗安全技术进行了深入的研究,并总结了安全提供方面的差距。论文的结论部分重点介绍了各国为保护公民医疗保健数据而采取的一些行为和政策。
{"title":"Analysis of Masking Techniques to Find out Security and other Efficiency Issues in Healthcare Domain","authors":"B. Siddartha, G. Ravikumar","doi":"10.1109/I-SMAC47947.2019.9032431","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032431","url":null,"abstract":"Increased use of modern advanced electronic devices rapidly increased the data collection rate, most of the advanced healthcare industries today are using updated healthcare facilities with the advanced healthcare technologies to collect and process the data. Healthcare data generated by the most of the industries are in the digital format. Provisioning protection and security to the PHI is the major concern but it is very difficult to safeguard the generated data from unauthorized users or breaches. There are many advanced techniques are in use today to protect the individuals sensitive data. Data masking approach is the advanced technique that enables security provisioning of personnel health records. This paper presented the in-depth study on current healthcare security techniques and summarized the gaps in security provisioning. Conclusion part of the paper highlights the some of the acts and policies adopted by the countries to safeguard the citizens' healthcare data.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Natural language processing and Machine learning based phishing website detection system 基于自然语言处理和机器学习的钓鱼网站检测系统
V. M. Yazhmozhi, B. Janet
Because of the colossal growth of internet, most of the users have changed their preference from traditional shopping, banking etc. to online mode. This paved the way for a lot of cybercrimes including phishing into existence. The attackers try to extract sensitive/personal details such as user ID, passwords and debit card/credit card information by disguising themselves as reliable websites. Identifying whether the Uniform Resource Locator (URL) of a website is legitimate or phishing is a difficult task because it exploits the user's vulnerabilities. Although many products are available for detecting phishing websites, they are just making use of heuristic approach and black lists and hence they can't prevent phishing in a more effective way. A system that detects phishing websites in real time has been proposed in this paper. It uses five different classification algorithms with two different feature sets using natural language processing and word vectors to identify which performs better. After analyzing the accuracy of different machine learning classification algorithms like naive bayes, logistic regression, support vector machine, decision tree and random forest using different features, it has been found that random Forest algorithm with features based on natural language processing has performed better with an accuracy of 97.99.
由于互联网的巨大增长,大多数用户的偏好已经从传统的购物、银行等转变为在线模式。这为包括网络钓鱼在内的许多网络犯罪铺平了道路。攻击者将自己伪装成可靠的网站,试图提取敏感/个人信息,如用户ID、密码和借记卡/信用卡信息。识别网站的统一资源定位符(URL)是合法的还是网络钓鱼是一项艰巨的任务,因为它利用了用户的漏洞。虽然有很多产品可以检测网络钓鱼网站,但他们只是使用启发式方法和黑名单,因此他们不能更有效地防止网络钓鱼。本文提出了一种实时检测网络钓鱼网站的系统。它使用五种不同的分类算法和两种不同的特征集,使用自然语言处理和词向量来识别哪一种表现更好。通过分析朴素贝叶斯、逻辑回归、支持向量机、决策树、随机森林等不同机器学习分类算法使用不同特征的准确率,发现基于自然语言处理特征的随机森林算法表现更好,准确率为97.99。
{"title":"Natural language processing and Machine learning based phishing website detection system","authors":"V. M. Yazhmozhi, B. Janet","doi":"10.1109/I-SMAC47947.2019.9032492","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032492","url":null,"abstract":"Because of the colossal growth of internet, most of the users have changed their preference from traditional shopping, banking etc. to online mode. This paved the way for a lot of cybercrimes including phishing into existence. The attackers try to extract sensitive/personal details such as user ID, passwords and debit card/credit card information by disguising themselves as reliable websites. Identifying whether the Uniform Resource Locator (URL) of a website is legitimate or phishing is a difficult task because it exploits the user's vulnerabilities. Although many products are available for detecting phishing websites, they are just making use of heuristic approach and black lists and hence they can't prevent phishing in a more effective way. A system that detects phishing websites in real time has been proposed in this paper. It uses five different classification algorithms with two different feature sets using natural language processing and word vectors to identify which performs better. After analyzing the accuracy of different machine learning classification algorithms like naive bayes, logistic regression, support vector machine, decision tree and random forest using different features, it has been found that random Forest algorithm with features based on natural language processing has performed better with an accuracy of 97.99.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114290526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic classification of ANA HEp-2 Immunofluorescence images based on the texture features using artificial neural network 基于纹理特征的ANA HEp-2免疫荧光图像的人工神经网络自动分类
Sachin Kumar, S. V., Vijayalaxmi
Indirect Immunfluorsece method (IFA) is one of the important laboratory procedures for the diagnosis of the autoimmune disease, but it suffers from low throughput and subjectivity due to manual interpretation. The Human Epithelial type-2 (HEp-2) pattern, such as homogeneous, speckled, centromere, Nucleolar pattern images, gives the diagnosis of different autoimmune diseases. For the current study, different patterns are obtained from the publicly available datasets A.I.D.A ((Auto- Immunity Diagnosis by Computer) project of 1000 images. The images pre-processed and features such as statistical and textural features extracted and explored to find the appropriate one for the detection and the classification of ANA HEp2 cells pattern. The paper uses the Analysis of Variance (ANOVA) for the identification of appropriate features and Artifical Neural network (ANN) for classification. The result obtained indicates that textural features are the better features in comparison with other extracted features, with the results obtained average accuracy around 92% using ANN as the classifier. The outcome thus produced is useful for the further design of cost-effective image analysis in the autoimmune diagnosis
间接免疫荧光法(IFA)是诊断自身免疫性疾病的重要实验室方法之一,但由于人工解释,存在低通量和主观性的问题。人类上皮2型(HEp-2)模式,如均匀、斑点、着丝粒、核仁模式图像,可用于诊断不同的自身免疫性疾病。在目前的研究中,不同的模式是从公开可用的数据集A.I.D.A(计算机自动免疫诊断)项目的1000幅图像中获得的。对图像进行预处理,提取统计特征、纹理特征等特征进行探索,寻找适合ANA HEp2细胞模式检测和分类的特征。本文使用方差分析(ANOVA)识别合适的特征,并使用人工神经网络(ANN)进行分类。结果表明,纹理特征与其他提取的特征相比是更好的特征,使用ANN作为分类器的结果平均准确率在92%左右。由此产生的结果是有用的进一步设计具有成本效益的图像分析在自身免疫诊断
{"title":"Automatic classification of ANA HEp-2 Immunofluorescence images based on the texture features using artificial neural network","authors":"Sachin Kumar, S. V., Vijayalaxmi","doi":"10.1109/I-SMAC47947.2019.9032666","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032666","url":null,"abstract":"Indirect Immunfluorsece method (IFA) is one of the important laboratory procedures for the diagnosis of the autoimmune disease, but it suffers from low throughput and subjectivity due to manual interpretation. The Human Epithelial type-2 (HEp-2) pattern, such as homogeneous, speckled, centromere, Nucleolar pattern images, gives the diagnosis of different autoimmune diseases. For the current study, different patterns are obtained from the publicly available datasets A.I.D.A ((Auto- Immunity Diagnosis by Computer) project of 1000 images. The images pre-processed and features such as statistical and textural features extracted and explored to find the appropriate one for the detection and the classification of ANA HEp2 cells pattern. The paper uses the Analysis of Variance (ANOVA) for the identification of appropriate features and Artifical Neural network (ANN) for classification. The result obtained indicates that textural features are the better features in comparison with other extracted features, with the results obtained average accuracy around 92% using ANN as the classifier. The outcome thus produced is useful for the further design of cost-effective image analysis in the autoimmune diagnosis","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Greenhouse Monitoring and Controlling using Modified K Means Clustering Algorithm 改进K均值聚类算法的温室监测与控制
B. Neethu, S. Jayanthy, J JudesonAntonyKovilpillai.
An embedded system is developed for monitoring and controlling the parameters that affect the growth of plants using STM32F401RE ARM Cortex M4 based Microcontrollers. Parameters such as Light intensity, Soil Moisture, CO2, Temperature, are monitored. The measured values are processed using Modified K Means Clustering Algorithm to find if the values are needed to be optimized to the required level to enhance the plant growth. The results are compared with the Traditional K-Means Clustering algorithm. The results indicate that the proposed algorithm gives better results in terms of accuracy and execution time compared to traditional one. The data that are measured and predicted are viewed using Cool Term.
采用基于ARM Cortex M4的STM32F401RE微控制器,开发了一种用于监测和控制影响植物生长参数的嵌入式系统。监测光照强度、土壤湿度、二氧化碳、温度等参数。利用改进K均值聚类算法对测量值进行处理,以确定是否需要将测量值优化到所需水平以促进植物生长。结果与传统的k -均值聚类算法进行了比较。结果表明,该算法在精度和执行时间上都优于传统算法。使用Cool Term查看测量和预测的数据。
{"title":"Greenhouse Monitoring and Controlling using Modified K Means Clustering Algorithm","authors":"B. Neethu, S. Jayanthy, J JudesonAntonyKovilpillai.","doi":"10.1109/I-SMAC47947.2019.9032656","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032656","url":null,"abstract":"An embedded system is developed for monitoring and controlling the parameters that affect the growth of plants using STM32F401RE ARM Cortex M4 based Microcontrollers. Parameters such as Light intensity, Soil Moisture, CO2, Temperature, are monitored. The measured values are processed using Modified K Means Clustering Algorithm to find if the values are needed to be optimized to the required level to enhance the plant growth. The results are compared with the Traditional K-Means Clustering algorithm. The results indicate that the proposed algorithm gives better results in terms of accuracy and execution time compared to traditional one. The data that are measured and predicted are viewed using Cool Term.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Electrically Tilted Broadband Antenna using Negative Refractive Index material 使用负折射率材料的电倾斜宽带天线
T. Upadhyaya, Riki H. Patel, A. Desai, Upesh Patel, K. Pandya, K. Kaur
A negative refractive index material loaded wideband patch resonator is presented for the wireless applications. The negative refraction has been achieved by creating a semi-circular and linear defect in the antenna ground plane. The antenna demonstrates an electrical tilt. This presents the ability to keep the communication module mechanically vertical. The engineered metallic strip excites the resonance mode. The structure of the metallic strip is a modification of thin wire and split-ring resonator (SRR) which are responsible for negative values of permeability and permittivity respectively. The finite truncated ground plane significantly helps to improve the antenna bandwidth. The antenna has an electrical length of $0.65lambda times 0.65lambda$ where $lambda$ is the wavelength at lowest resonance. The resonating frequencies of antenna are 2.46, 3.5, and 5.5 GigaHertz, respectively. The antenna has impedance bandwidth of 8.94%, 14.57% and 8.72% for the presented center frequencies respectively. The antenna prototype was fabricated where measured and simulated results show good correlation.
提出了一种用于无线应用的负折射率材料加载宽带贴片谐振器。负折射是通过在天线地平面上产生半圆形和线性缺陷来实现的。天线显示出电倾斜。这提供了保持通信模块机械垂直的能力。工程金属条激发共振模式。金属条的结构是由细线和裂环谐振器(SRR)的结构改造而成的,这两种结构分别造成了磁导率和介电常数的负值。有限截断地平面对提高天线带宽有显著的帮助。天线的电长度为$0.65lambda 乘以$0.65lambda $,其中$lambda$为最低共振波长。天线的谐振频率分别为2.46、3.5和5.5 ghz。在给定的中心频率下,天线的阻抗带宽分别为8.94%、14.57%和8.72%。制作了天线样机,测量结果与仿真结果具有良好的相关性。
{"title":"Electrically Tilted Broadband Antenna using Negative Refractive Index material","authors":"T. Upadhyaya, Riki H. Patel, A. Desai, Upesh Patel, K. Pandya, K. Kaur","doi":"10.1109/I-SMAC47947.2019.9032570","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032570","url":null,"abstract":"A negative refractive index material loaded wideband patch resonator is presented for the wireless applications. The negative refraction has been achieved by creating a semi-circular and linear defect in the antenna ground plane. The antenna demonstrates an electrical tilt. This presents the ability to keep the communication module mechanically vertical. The engineered metallic strip excites the resonance mode. The structure of the metallic strip is a modification of thin wire and split-ring resonator (SRR) which are responsible for negative values of permeability and permittivity respectively. The finite truncated ground plane significantly helps to improve the antenna bandwidth. The antenna has an electrical length of $0.65lambda times 0.65lambda$ where $lambda$ is the wavelength at lowest resonance. The resonating frequencies of antenna are 2.46, 3.5, and 5.5 GigaHertz, respectively. The antenna has impedance bandwidth of 8.94%, 14.57% and 8.72% for the presented center frequencies respectively. The antenna prototype was fabricated where measured and simulated results show good correlation.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Light Weight Secure Data Sharing Scheme for Mobile Cloud Computing 面向移动云计算的轻量级安全数据共享方案
Sunanda Nalajala, K. Akhil, V. Sai, D. Shekhar, Praveen Tumuluru
Nowadays more and more data is stored and retrieved through Cloud Computing. With advancement there arises a problem in security. This means the data can be decrypted easily and the content being accessed by strangers and the privacy of the data will be lost. We have introduced a new algorithm known as “Cipher Attribute Based Encryption Algorithm” with symmetric key in our newly proposed light weight data sharing scheme for mobile cloud computing. Light weight in the sense, data with a fairly light storage capacity like files, audio clips etc. will be secured based on our proposed concept LDSS. The LDSS structure is modified and used as an access control in Cipher Attribute Based Encryption (CP-ABE). To reduce the user cost, it introduced attribute description fields to implement lazy revocation which is difficult in CP-ABE working systems. Everything in this operation might not be applicable in all mobile devices because the components are small and flexibility is less. The results from this paper show the issues related to data privacy have been solved in most cases for light weight data sharing scheme.
如今,越来越多的数据通过云计算进行存储和检索。随着技术的进步,安全问题也随之而来。这意味着数据可以很容易地解密,内容被陌生人访问,数据的隐私将丢失。我们在新提出的移动云计算轻量级数据共享方案中引入了一种新的算法,称为“基于密码属性的对称密钥加密算法”。轻量级的意思是,基于我们提出的LDSS概念,具有相当轻的存储容量的数据(如文件、音频剪辑等)将得到保护。对LDSS结构进行了改进,并将其作为基于密码属性的加密(CP-ABE)中的访问控制。为了降低用户成本,引入了属性描述字段,实现了在CP-ABE工作系统中难以实现的延迟撤销。此操作中的所有内容可能并不适用于所有移动设备,因为组件较小,灵活性较差。结果表明,轻量级数据共享方案在大多数情况下都解决了数据隐私问题。
{"title":"Light Weight Secure Data Sharing Scheme for Mobile Cloud Computing","authors":"Sunanda Nalajala, K. Akhil, V. Sai, D. Shekhar, Praveen Tumuluru","doi":"10.1109/I-SMAC47947.2019.9032618","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032618","url":null,"abstract":"Nowadays more and more data is stored and retrieved through Cloud Computing. With advancement there arises a problem in security. This means the data can be decrypted easily and the content being accessed by strangers and the privacy of the data will be lost. We have introduced a new algorithm known as “Cipher Attribute Based Encryption Algorithm” with symmetric key in our newly proposed light weight data sharing scheme for mobile cloud computing. Light weight in the sense, data with a fairly light storage capacity like files, audio clips etc. will be secured based on our proposed concept LDSS. The LDSS structure is modified and used as an access control in Cipher Attribute Based Encryption (CP-ABE). To reduce the user cost, it introduced attribute description fields to implement lazy revocation which is difficult in CP-ABE working systems. Everything in this operation might not be applicable in all mobile devices because the components are small and flexibility is less. The results from this paper show the issues related to data privacy have been solved in most cases for light weight data sharing scheme.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Text to vector image conversion and Adaptive Resonance Theory applied for Crisis communication 文本到矢量图像的转换和自适应共振理论在危机传播中的应用
Padmaveni Krishnan, D. Aravindhar, D. P. Kumar
The fast and up-to-date communication of disaster and recovery information during crisis plays a very important role in victims' life. Most of the information will reach as text and could be communicated as such. But this needs proper network coverage. In this research paper, a new software is developed to convert the text into vector images ie., syntagms into signagrams, and groups the crisis into categories using adaptive resonance theory. The proposed software can be used for delivering a quick and effective communication during crisis.
危机中快速、及时的灾后恢复信息沟通对受害者的生活起着非常重要的作用。大多数信息将以文本形式送达,并可以以文本形式进行交流。但这需要适当的网络覆盖。本文开发了一种将文本转换为矢量图像的软件。使用自适应共振理论将危机分类。所提出的软件可用于在危机期间提供快速有效的沟通。
{"title":"Text to vector image conversion and Adaptive Resonance Theory applied for Crisis communication","authors":"Padmaveni Krishnan, D. Aravindhar, D. P. Kumar","doi":"10.1109/I-SMAC47947.2019.9032609","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032609","url":null,"abstract":"The fast and up-to-date communication of disaster and recovery information during crisis plays a very important role in victims' life. Most of the information will reach as text and could be communicated as such. But this needs proper network coverage. In this research paper, a new software is developed to convert the text into vector images ie., syntagms into signagrams, and groups the crisis into categories using adaptive resonance theory. The proposed software can be used for delivering a quick and effective communication during crisis.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123083906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Machine learning based Social Media and Sentiment analysis for medical data applications 基于机器学习的社交媒体和情感分析在医疗数据应用中的研究
R. Meena, V. T. Bai
Due to the rapid advancements in social media, it generates voluminous data in almost different areas of applications. Large amount of potential health related data are being available in large scale in various sources of internet. We explored the small use case of social media data for a particular disease, cancer on three different social media platforms such as google trends, twitter and online forums with the sentiment analysis of the mined text. The study shows that people are more relied on social media for their health related queries and the twitter analysis shows that there is a significant raise in the percentage of positive sentiments in the tweets shared by the organizations and individuals on cancer.
由于社交媒体的快速发展,它在几乎不同的应用领域产生了大量的数据。大量潜在的健康相关数据在互联网的各种来源中大量可用。我们在三个不同的社交媒体平台(如google trends, twitter和在线论坛)上探索了针对特定疾病的社交媒体数据的小用例,并对挖掘的文本进行了情感分析。研究表明,人们更依赖社交媒体来查询与健康相关的问题,推特分析表明,组织和个人分享的关于癌症的推文中积极情绪的比例显著增加。
{"title":"Study on Machine learning based Social Media and Sentiment analysis for medical data applications","authors":"R. Meena, V. T. Bai","doi":"10.1109/I-SMAC47947.2019.9032580","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032580","url":null,"abstract":"Due to the rapid advancements in social media, it generates voluminous data in almost different areas of applications. Large amount of potential health related data are being available in large scale in various sources of internet. We explored the small use case of social media data for a particular disease, cancer on three different social media platforms such as google trends, twitter and online forums with the sentiment analysis of the mined text. The study shows that people are more relied on social media for their health related queries and the twitter analysis shows that there is a significant raise in the percentage of positive sentiments in the tweets shared by the organizations and individuals on cancer.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121848764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Network Security Tools and Applications in Research Perspective 网络安全工具及其应用研究展望
S. Vyshnavi, S. Sree, N. Jayapandian
The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.
现代世界的技术是文明的、全球化的、现代化的。社交网络和电子商务应用的技术发展产生了更大的数据。由于设备间的通信需要网络终端,因此数据通信是一项重要的任务。这种数据传输是不安全的,因为不同类型的工具和软件可以破坏现有的网络。在网络安全领域中,数据在从一个特定节点到另一个节点的传输过程中会发生一些安全漏洞,这是该领域的关键问题之一。这种网络安全的原因是不同类型的数据攻击发生在日常生活中。建立一个新网络很容易,但保护整个网络是一个大问题。这种网络安全一般有两个参数,一是通信,二是数据自动化。网络安全领域与数据加密的概念有着直接或间接的联系。网络安全的发展已经使我们从签名回到了拇指指纹。例如,维护数据安全,我们使用的锁系统是一种指纹类型。这种技术帮助我们保护了物理数据被盗,但逻辑数据被盗仍然是数据传输的问题。本文将简要介绍网络安全,并介绍各种网络安全类型。这些类型是有线和无线网络安全。除了网络安全,本文还讨论了以下主题。即网络安全协议和网络安全仿真工具。网络安全研究的主要问题是数据的保密性和脆弱性。
{"title":"Network Security Tools and Applications in Research Perspective","authors":"S. Vyshnavi, S. Sree, N. Jayapandian","doi":"10.1109/I-SMAC47947.2019.9032526","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032526","url":null,"abstract":"The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131334950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1