Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.
{"title":"A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework","authors":"Glorin Sebastian","doi":"10.4018/ijsppc.315591","DOIUrl":"https://doi.org/10.4018/ijsppc.315591","url":null,"abstract":"Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130659312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to introduce a novel heart disease prediction model. Originally, the input data is subjected for preprocessing, in which the data cleaning takes place. The features like statistical, higher order statistical features, and symmetrical uncertainty are extracted from the preprocessed data. Then, the selected features are subjected to the classification process with an ensemble model that combines the classifiers like deep belief network (DBN), random forest (RF), and neural network (NN). At last, the score level fusion is carried out to provide the final output. To make the classification more precise and accurate, it is intended to tune the weights of DBN more optimally. A new self-adaptive honey bee mating optimization (SAHBMO) algorithm is implemented in this work for this optimal tuning. Finally, the performance of the presented scheme is computed over the existing approaches in terms of different metrics.
{"title":"Heart Disease Prediction Model Using Varied Classifiers with Score-Level Fusion","authors":"Mohammad Haider Syed","doi":"10.4018/ijsppc.313587","DOIUrl":"https://doi.org/10.4018/ijsppc.313587","url":null,"abstract":"This paper aims to introduce a novel heart disease prediction model. Originally, the input data is subjected for preprocessing, in which the data cleaning takes place. The features like statistical, higher order statistical features, and symmetrical uncertainty are extracted from the preprocessed data. Then, the selected features are subjected to the classification process with an ensemble model that combines the classifiers like deep belief network (DBN), random forest (RF), and neural network (NN). At last, the score level fusion is carried out to provide the final output. To make the classification more precise and accurate, it is intended to tune the weights of DBN more optimally. A new self-adaptive honey bee mating optimization (SAHBMO) algorithm is implemented in this work for this optimal tuning. Finally, the performance of the presented scheme is computed over the existing approaches in terms of different metrics.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bello Alhaji Buhari, A. Obiniyi, S. Junaidu, A. Kana
This research performs a literature survey of remote user authentication researches based on smart card and external memory. The main security confidence of smart card based schemes is temper-resistance property. Other reasons are small physical size, portability, convenience of non-volatile memory, and security provided by a single chip computer embedded in a plastic card. The most efficient schemes are those that used hash function or ECC. The high cost of the cards and readers and their deployment remains a burden to issuers or users. This is what motivates the use of external memory instead of smart card. But the problem of non-temper resistance property associated with external memory limited researches in that direction. There are also, absence of other activities that are essential in user authentication such as forgot/reset password and re-registration in case the external memory or smart card is stolen or lost in all the reviewed researches.
{"title":"Trends in Remote User Authentication Based on Smart Card and External Memory","authors":"Bello Alhaji Buhari, A. Obiniyi, S. Junaidu, A. Kana","doi":"10.4018/ijsppc.307148","DOIUrl":"https://doi.org/10.4018/ijsppc.307148","url":null,"abstract":"This research performs a literature survey of remote user authentication researches based on smart card and external memory. The main security confidence of smart card based schemes is temper-resistance property. Other reasons are small physical size, portability, convenience of non-volatile memory, and security provided by a single chip computer embedded in a plastic card. The most efficient schemes are those that used hash function or ECC. The high cost of the cards and readers and their deployment remains a burden to issuers or users. This is what motivates the use of external memory instead of smart card. But the problem of non-temper resistance property associated with external memory limited researches in that direction. There are also, absence of other activities that are essential in user authentication such as forgot/reset password and re-registration in case the external memory or smart card is stolen or lost in all the reviewed researches.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115896761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The artificial neural network has been called for its application as alphanumeric characters recognizing the network. The idea is to maintain the obsolete data available in hard copy form and to convert that data into digital form. Some specific bit patterns that correspond to the character are trained using the network. The numbers of input and output layer neurons are chosen. As there are many ways to do but in this the algorithm used for training the network is called the Backpropagation Algorithm using the delta rule. The testing and training patterns are provided for which weights are calculated in the program and patterns are recognized and analysis is done. The effect of variations in the hidden layers is also observed with pattern matrices.
{"title":"Recognition of Alphanumeric Patterns Using Backpropagation Algorithm for Design and Implementation With ANN","authors":"Alankrita Aggarwal, Shivani Gaba, Shally Chawla, Anoopa Arya","doi":"10.4018/ijsppc.295086","DOIUrl":"https://doi.org/10.4018/ijsppc.295086","url":null,"abstract":"The artificial neural network has been called for its application as alphanumeric characters recognizing the network. The idea is to maintain the obsolete data available in hard copy form and to convert that data into digital form. Some specific bit patterns that correspond to the character are trained using the network. The numbers of input and output layer neurons are chosen. As there are many ways to do but in this the algorithm used for training the network is called the Backpropagation Algorithm using the delta rule. The testing and training patterns are provided for which weights are calculated in the program and patterns are recognized and analysis is done. The effect of variations in the hidden layers is also observed with pattern matrices.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Even with advancement of communications technologies, home automation and application have received major attention. Today's digital world is mostly reliant on the internet so that there is a need to design such a solution to make more efficient from unauthorized components to safeguard the data that may work in wireless mode alone. This system provides guidance towards operational operations specifically surveillance on the areas and its structure and managing assets over the internet utilizing web applications employing IoT techniques. Home automation is a vital unit which must meet the main criteria like user interface and safety. In the current situation, the complete process depends on the Bolt IoT platform, a home automation system where it can access and manage house devices remotely from anywhere. The user may use this system to operate different equipment like LEDs, fans, or DC motors as well as to keep an eye on the environment's temperature. In addition, the Bolt IoT module enables cloud connectivity to the system, and sensor data is communicated to the cloud.
{"title":"Home Automation and Application With Bolt IoT","authors":"Ashish Sudhir Kakne, P. Chouragade","doi":"10.4018/ijsppc.313047","DOIUrl":"https://doi.org/10.4018/ijsppc.313047","url":null,"abstract":"Even with advancement of communications technologies, home automation and application have received major attention. Today's digital world is mostly reliant on the internet so that there is a need to design such a solution to make more efficient from unauthorized components to safeguard the data that may work in wireless mode alone. This system provides guidance towards operational operations specifically surveillance on the areas and its structure and managing assets over the internet utilizing web applications employing IoT techniques. Home automation is a vital unit which must meet the main criteria like user interface and safety. In the current situation, the complete process depends on the Bolt IoT platform, a home automation system where it can access and manage house devices remotely from anywhere. The user may use this system to operate different equipment like LEDs, fans, or DC motors as well as to keep an eye on the environment's temperature. In addition, the Bolt IoT module enables cloud connectivity to the system, and sensor data is communicated to the cloud.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The internet of things is a paradigm of interconnected devices able to communicate and exchange information to achieve users' requirements. In spite of their expansion in the last years, IoT systems still face challenges that hinder gaining major advantages from them. One of these challenges is to automatically adapt the system to the user's context and preferences. As a proposition to deal with this problem, this paper presents a methodology to design and develop IoT systems that adapt their behavior to their context, which can be a user or environmental context. This methodology is based on dynamic software product line engineering and uses Markov process to design the adaptation plan of the system and a reinforcement learning algorithm to implement it.
{"title":"A DSPL and Reinforcement Learning Approach for Context-Aware IoT Systems Development","authors":"Amal Hallou, Tarik Fissaa, H. Hafiddi, M. Nassar","doi":"10.4018/ijsppc.310084","DOIUrl":"https://doi.org/10.4018/ijsppc.310084","url":null,"abstract":"The internet of things is a paradigm of interconnected devices able to communicate and exchange information to achieve users' requirements. In spite of their expansion in the last years, IoT systems still face challenges that hinder gaining major advantages from them. One of these challenges is to automatically adapt the system to the user's context and preferences. As a proposition to deal with this problem, this paper presents a methodology to design and develop IoT systems that adapt their behavior to their context, which can be a user or environmental context. This methodology is based on dynamic software product line engineering and uses Markov process to design the adaptation plan of the system and a reinforcement learning algorithm to implement it.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127813595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The integrity and confidentiality of transmitted data are the main requirements of any data security system. To achieve these goals, many techniques have been developed, including cryptography and steganography. Recently, DNA-based steganography has emerged as a very powerful and promising approach to ensure the safety of sensitive information transmitted over an untrusted channel. In this paper, a two-level encryption/decryption scheme combining cryptography and steganography is proposed. First, the plain-text is concealed in a cover image by scattering its letters over randomly selected pixels. Then, the modified image is encrypted by encoding its pixels in a DNA sequence using a symmetric key. Simulations have shown that the proposed scheme is more robust than any other system based on standalone techniques and requires less computing resources.
{"title":"DNA-Based LSB Steganography","authors":"Abdelkader Khobzaoui, Boualem Mansouri, Kadda Benyahia","doi":"10.4018/ijsppc.302010","DOIUrl":"https://doi.org/10.4018/ijsppc.302010","url":null,"abstract":"The integrity and confidentiality of transmitted data are the main requirements of any data security system. To achieve these goals, many techniques have been developed, including cryptography and steganography. Recently, DNA-based steganography has emerged as a very powerful and promising approach to ensure the safety of sensitive information transmitted over an untrusted channel. In this paper, a two-level encryption/decryption scheme combining cryptography and steganography is proposed. First, the plain-text is concealed in a cover image by scattering its letters over randomly selected pixels. Then, the modified image is encrypted by encoding its pixels in a DNA sequence using a symmetric key. Simulations have shown that the proposed scheme is more robust than any other system based on standalone techniques and requires less computing resources.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129504345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rafat Ul Aman Sajid, Siraj-ul-Islam, A. K. M. Rakib, Amandeep Kaur
Cloud computing is growing wide and first-rate promising technology. There are three forms of cloud computing: infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS). There are many cloud service providers. Among these, AWS (Amazon Web Service), Azure (Microsoft Cloud), IBM Cloud, Oracle Cloud, and VMware are immensely popular. In this paper, the authors study the Google Cloud Platform (GCP) and a few principally used popular services. Google Cloud Platform could be a cloud provider; they supply servers and services that are used on-demand and at scale. Google Cloud Platform is the fastest growing cloud service supplier now.
{"title":"Interpretation on the Google Cloud Platform and Its Wide Cloud Services","authors":"Rafat Ul Aman Sajid, Siraj-ul-Islam, A. K. M. Rakib, Amandeep Kaur","doi":"10.4018/ijsppc.313586","DOIUrl":"https://doi.org/10.4018/ijsppc.313586","url":null,"abstract":"Cloud computing is growing wide and first-rate promising technology. There are three forms of cloud computing: infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS). There are many cloud service providers. Among these, AWS (Amazon Web Service), Azure (Microsoft Cloud), IBM Cloud, Oracle Cloud, and VMware are immensely popular. In this paper, the authors study the Google Cloud Platform (GCP) and a few principally used popular services. Google Cloud Platform could be a cloud provider; they supply servers and services that are used on-demand and at scale. Google Cloud Platform is the fastest growing cloud service supplier now.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134440548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Conducting the exam in different shifts means the variation in the difficulty level of the different shifts of the exam. Various recruitment bodies adopt normalization process to solve this issue. This paper contains a detailed study of the normalization process carried out by the recruitment bodies. The study also includes the effect of normalization in the candidate's score and it depends on the difficulty level of the shift in which the candidate appears in the exam. This work can be further enhanced by comparing the different methods adopted by similar recruitment/selection organization and adopting the best, more appropriate approach to improve the system. This analysis will help in improving the evaluation system and make the system more robust and accurate. So that a more accurate merit list can be prepared and all the stakeholders can be reassured. It is very important to make the system transparent, so that the stakeholders have a clear understanding of the system and at the same time they should be aware of the advantages and disadvantages of the system.
{"title":"Analysis of a Multiple-Shift Computer-Based Examination Evaluation System","authors":"Hemlata A.","doi":"10.4018/ijsppc.307112","DOIUrl":"https://doi.org/10.4018/ijsppc.307112","url":null,"abstract":"Conducting the exam in different shifts means the variation in the difficulty level of the different shifts of the exam. Various recruitment bodies adopt normalization process to solve this issue. This paper contains a detailed study of the normalization process carried out by the recruitment bodies. The study also includes the effect of normalization in the candidate's score and it depends on the difficulty level of the shift in which the candidate appears in the exam. This work can be further enhanced by comparing the different methods adopted by similar recruitment/selection organization and adopting the best, more appropriate approach to improve the system. This analysis will help in improving the evaluation system and make the system more robust and accurate. So that a more accurate merit list can be prepared and all the stakeholders can be reassured. It is very important to make the system transparent, so that the stakeholders have a clear understanding of the system and at the same time they should be aware of the advantages and disadvantages of the system.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electronic voting, often referred to as "e-voting," has gained popularity in recent years because it reduces the cost and time of counting, increases voter participation, and reduces human resources, thereby reducing fraud and increasing transparency. In this paper, an e-voting system is designed and implemented using symmetric DNA encryption. The proposed scheme consists of using DNA-XOR as secret sharing operator for multi-authority secret ballot elections which enables end-to-end vote verification. The transmitted data is divided into segments and converted into DNA sequences. The main contributions of the resulting system are our proposal for secret sharing between authorities via DNA cryptosystem which ensures that no single authority can compromise the integrity of the ballot without the approval of the other authorities and the proposal's computational and architectural scalability, which makes it simple to implement.
{"title":"DNA-Based E-Voting System","authors":"Hadj Gharib, Abdelkader Khobzaoui","doi":"10.4018/ijsppc.302008","DOIUrl":"https://doi.org/10.4018/ijsppc.302008","url":null,"abstract":"Electronic voting, often referred to as \"e-voting,\" has gained popularity in recent years because it reduces the cost and time of counting, increases voter participation, and reduces human resources, thereby reducing fraud and increasing transparency. In this paper, an e-voting system is designed and implemented using symmetric DNA encryption. The proposed scheme consists of using DNA-XOR as secret sharing operator for multi-authority secret ballot elections which enables end-to-end vote verification. The transmitted data is divided into segments and converted into DNA sequences. The main contributions of the resulting system are our proposal for secret sharing between authorities via DNA cryptosystem which ensures that no single authority can compromise the integrity of the ballot without the approval of the other authorities and the proposal's computational and architectural scalability, which makes it simple to implement.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116750100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}