首页 > 最新文献

International Journal of Pervasive Computing and Communications最新文献

英文 中文
Weighted ensemble classifier for malicious link detection using natural language processing 基于自然语言处理的恶意链接检测加权集成分类器
IF 2.6 Q1 Computer Science Pub Date : 2023-01-03 DOI: 10.1108/ijpcc-09-2022-0312
S. A, S. Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran, K. R
PurposeThe internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about people and organizations is available online, which encourages the proliferation of cybercrimes. Cybercriminals often use malicious links for large-scale cyberattacks, which are disseminated via email, SMS and social media. Recognizing malicious links online can be exceedingly challenging. The purpose of this paper is to present a strong security system that can detect malicious links in the cyberspace using natural language processing technique.Design/methodology/approachThe researcher recommends a variety of approaches, including blacklisting and rules-based machine/deep learning, for automatically recognizing malicious links. But the approaches generally necessitate the generation of a set of features to generalize the detection process. Most of the features are generated by processing URLs and content of the web page, as well as some external features such as the ranking of the web page and domain name system information. This process of feature extraction and selection typically takes more time and demands a high level of expertise in the domain. Sometimes the generated features may not leverage the full potentials of the data set. In addition, the majority of the currently deployed systems make use of a single classifier for the classification of malicious links. However, prediction accuracy may vary widely depending on the data set and the classifier used.FindingsTo address the issue of generating feature sets, the proposed method uses natural language processing techniques (term frequency and inverse document frequency) that vectorize URLs. To build a robust system for the classification of malicious links, the proposed system implements weighted soft voting classifier, an ensemble classifier that combines predictions of base classifiers. The ability or skill of each classifier serves as the base for the weight that is assigned to it.Originality/valueThe proposed method performs better when the optimal weights are assigned. The performance of the proposed method was assessed by using two different data sets (D1 and D2) and compared performance against base machine learning classifiers and previous research results. The outcome accuracy shows that the proposed method is superior to the existing methods, offering 91.4% and 98.8% accuracy for data sets D1 and D2, respectively.
目的互联网已经完全融入了当代生活。人们沉迷于在日常活动中使用互联网服务。因此,网上有大量关于个人和组织的信息,这助长了网络犯罪的扩散。网络犯罪分子经常使用恶意链接进行大规模网络攻击,这些攻击通过电子邮件、短信和社交媒体传播。在线识别恶意链接可能极具挑战性。本文的目的是提出一个强大的安全系统,可以利用自然语言处理技术检测网络空间中的恶意链接。设计/方法论/方法研究人员推荐了多种方法,包括列入黑名单和基于规则的机器/深度学习,用于自动识别恶意链接。但这些方法通常需要生成一组特征来概括检测过程。大多数特征是通过处理网页的URL和内容生成的,以及一些外部特征,如网页的排名和域名系统信息。这种特征提取和选择过程通常需要更多的时间,并且需要该领域的高水平专业知识。有时生成的特征可能无法充分利用数据集的潜力。此外,目前部署的大多数系统都使用单个分类器对恶意链接进行分类。然而,根据所使用的数据集和分类器,预测精度可能会有很大差异。发现为了解决生成特征集的问题,所提出的方法使用了自然语言处理技术(术语频率和文档反向频率)来对URL进行矢量化。为了建立一个用于恶意链接分类的鲁棒系统,所提出的系统实现了加权软投票分类器,这是一种结合了基本分类器预测的集成分类器。每个分类器的能力或技能是分配给它的权重的基础。原始性/值当分配了最佳权重时,所提出的方法表现更好。通过使用两个不同的数据集(D1和D2)评估了所提出方法的性能,并将其与基本机器学习分类器和先前的研究结果进行了比较。结果准确度表明,该方法优于现有方法,对D1和D2数据集的准确度分别为91.4%和98.8%。
{"title":"Weighted ensemble classifier for malicious link detection using natural language processing","authors":"S. A, S. Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran, K. R","doi":"10.1108/ijpcc-09-2022-0312","DOIUrl":"https://doi.org/10.1108/ijpcc-09-2022-0312","url":null,"abstract":"\u0000Purpose\u0000The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about people and organizations is available online, which encourages the proliferation of cybercrimes. Cybercriminals often use malicious links for large-scale cyberattacks, which are disseminated via email, SMS and social media. Recognizing malicious links online can be exceedingly challenging. The purpose of this paper is to present a strong security system that can detect malicious links in the cyberspace using natural language processing technique.\u0000\u0000\u0000Design/methodology/approach\u0000The researcher recommends a variety of approaches, including blacklisting and rules-based machine/deep learning, for automatically recognizing malicious links. But the approaches generally necessitate the generation of a set of features to generalize the detection process. Most of the features are generated by processing URLs and content of the web page, as well as some external features such as the ranking of the web page and domain name system information. This process of feature extraction and selection typically takes more time and demands a high level of expertise in the domain. Sometimes the generated features may not leverage the full potentials of the data set. In addition, the majority of the currently deployed systems make use of a single classifier for the classification of malicious links. However, prediction accuracy may vary widely depending on the data set and the classifier used.\u0000\u0000\u0000Findings\u0000To address the issue of generating feature sets, the proposed method uses natural language processing techniques (term frequency and inverse document frequency) that vectorize URLs. To build a robust system for the classification of malicious links, the proposed system implements weighted soft voting classifier, an ensemble classifier that combines predictions of base classifiers. The ability or skill of each classifier serves as the base for the weight that is assigned to it.\u0000\u0000\u0000Originality/value\u0000The proposed method performs better when the optimal weights are assigned. The performance of the proposed method was assessed by using two different data sets (D1 and D2) and compared performance against base machine learning classifiers and previous research results. The outcome accuracy shows that the proposed method is superior to the existing methods, offering 91.4% and 98.8% accuracy for data sets D1 and D2, respectively.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47959785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimized security algorithm for connected vehicular network 互联车辆网络的优化安全算法
IF 2.6 Q1 Computer Science Pub Date : 2023-01-02 DOI: 10.1108/ijpcc-12-2021-0300
Deepak Choudhary
PurposeAs the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.Design/methodology/approachIoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.FindingsWith the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.Originality/valueIn light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the
目的随着连接物联网(IoT)的设备数量的增长,隐私和安全问题也随之而来。由于物联网设备收集了如此多的敏感信息,如用户名、位置、电话号码,甚至他们通常如何使用能源,因此保护用户的隐私和安全非常重要。物联网技术将很难在客户端使用,因为支持物联网的设备没有明确的隐私和安全控制。如果物联网不能提供足够明确的方式来保护用户的隐私和安全,那么设计/方法/方法物联网技术将更难在客户端使用。本研究的目标是通过使用对立人工菌群优化(EGPKC-OAFA)算法为ElGamal公钥密码系统(EGPKC)生成最佳密钥,来保护人们在物联网中的隐私。EGPKC-OAFA方法最重视MAC的IEEE 802.15.4标准,这是该标准最重要的部分。安全字段是本标准MAC报头的一部分。此外,MAC报头包括EGPKC,这使得可以尽快生成身份验证密钥。发现随着物联网设备的普及,隐私和安全已成为学术界的主要关注点。由于物联网设备获取了大量个人身份信息,如姓名、位置、电话号码和能源使用情况,因此安全和隐私至关重要。物联网技术的客户端部署将因缺乏物联网提供的明确的隐私和安全解决方案而受到阻碍。本研究的目的是使用EGPKC-OAFA算法为EGPKC提供最佳密钥生成,以保护物联网背景下的个人隐私。EGPKC-OAFA方法涉及由IEEE 802.15.4标准定义的MAC标准,该标准在其MAC报头中包括安全字段。此外,MAC标头包含EGPKC,它可以实现尽可能快的身份验证密钥生成。此外,最佳方法论奖授予OAFA策略,该策略通过结合基于反对派的(OBL)和标准AFA思想,成功地实现了最佳EGPKC选择策略。EGPKC-OAFA方法已在大量模拟中被证明可以有效地分析性能,并确定了各种函数的结果。独创性/价值鉴于物联网的日益普及,越来越多的人对他们在线保存的个人数据的保护和保密感到焦虑。鉴于越来越多的东西与互联网相连,这一点尤其正确。物联网能够收集个人身份信息,如姓名、地址和电话号码,以及使用的能源量。由于担心用户生成的数据的安全性和隐私性,客户采用物联网技术将是一项挑战。在这项工作中,EGPKC与对抗性人工菌群配对,从而提高了EGPKC为物联网(EGPKC-OAFA)提供的隐私安全性。作为IEEE 802.15.4标准一部分的MAC安全字段是EGPKC-OAFA协议高度关注的领域之一。认证密钥生成协议密钥协议(也称为EGPKCA)用于MAC报头。该协议的缩写是EGPKCA。OAFA技术,也称为OBL和AFA的组合,是选择EGPKC最成功的方法。这种方法的首字母缩写为OAFA。通过各种模拟表明,EGPKC-OAFA技术是进行性能分析的一种非常有用的工具。
{"title":"Optimized security algorithm for connected vehicular network","authors":"Deepak Choudhary","doi":"10.1108/ijpcc-12-2021-0300","DOIUrl":"https://doi.org/10.1108/ijpcc-12-2021-0300","url":null,"abstract":"\u0000Purpose\u0000As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.\u0000\u0000\u0000Design/methodology/approach\u0000IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.\u0000\u0000\u0000Findings\u0000With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.\u0000\u0000\u0000Originality/value\u0000In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42186331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on various detectors in massive MIMO technology: a performance analysis 大规模MIMO技术中各种检测器的综述:性能分析
IF 2.6 Q1 Computer Science Pub Date : 2023-01-01 DOI: 10.1108/IJPCC-11-2020-0188
M. ManjuV., S. GaneshR.
{"title":"Review on various detectors in massive MIMO technology: a performance analysis","authors":"M. ManjuV., S. GaneshR.","doi":"10.1108/IJPCC-11-2020-0188","DOIUrl":"https://doi.org/10.1108/IJPCC-11-2020-0188","url":null,"abstract":"","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62802273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection IoT attacks using Lasso regression algorithm with ensemble classifier 使用Lasso回归算法和集成分类器检测物联网攻击
IF 2.6 Q1 Computer Science Pub Date : 2022-12-29 DOI: 10.1108/ijpcc-09-2022-0316
K. Sheelavathy, V. Udaya Rani
PurposeInternet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are allocated with a unique internet address, namely, Internet Protocol, which is used to perform the data broadcasting with the external objects using the internet. The sudden increment in the number of attacks generated by intruders, causes security-related problems in IoT devices while performing the communication. The main purpose of this paper is to develop an effective attack detection to enhance the robustness against the attackers in IoT.Design/methodology/approachIn this research, the lasso regression algorithm is proposed along with ensemble classifier for identifying the IoT attacks. The lasso algorithm is used for the process of feature selection that modeled fewer parameters for the sparse models. The type of regression is analyzed for showing higher levels when certain parts of model selection is needed for parameter elimination. The lasso regression obtains the subset for predictors to lower the prediction error with respect to the quantitative response variable. The lasso does not impose a constraint for modeling the parameters caused the coefficients with some variables shrink as zero. The selected features are classified by using an ensemble classifier, that is important for linear and nonlinear types of data in the dataset, and the models are combined for handling these data types.FindingsThe lasso regression with ensemble classifier–based attack classification comprises distributed denial-of-service and Mirai botnet attacks which achieved an improved accuracy of 99.981% than the conventional deep neural network (DNN) methods.Originality/valueHere, an efficient lasso regression algorithm is developed for extracting the features to perform the network anomaly detection using ensemble classifier.
物联网(internet of Things, IoT)是一个网络,它提供了与智能机器、智能家电等各种物理对象的连接。物理对象被分配一个唯一的互联网地址,即互联网协议,用于通过互联网与外部对象进行数据广播。入侵者产生的攻击数量突然增加,导致物联网设备在执行通信时出现安全相关问题。本文的主要目的是开发一种有效的攻击检测方法,以增强物联网中对攻击者的鲁棒性。设计/方法/方法在本研究中,提出了套索回归算法和集成分类器来识别物联网攻击。lasso算法用于稀疏模型的特征选择过程,对稀疏模型建模的参数较少。当模型选择的某些部分需要用于参数消除时,分析回归类型以显示更高的水平。套索回归得到预测者的子集,以降低相对于定量响应变量的预测误差。套索没有对参数建模施加约束,导致某些变量的系数收缩为零。所选择的特征通过使用集成分类器进行分类,这对于数据集中的线性和非线性类型的数据很重要,并且将模型组合起来处理这些数据类型。使用基于集成分类器的lasso回归方法对分布式拒绝服务攻击和Mirai僵尸网络攻击进行分类,准确率比传统深度神经网络(DNN)方法提高了99.981%。在此基础上,提出了一种高效的套索回归算法,用于提取特征,并使用集成分类器进行网络异常检测。
{"title":"Detection IoT attacks using Lasso regression algorithm with ensemble classifier","authors":"K. Sheelavathy, V. Udaya Rani","doi":"10.1108/ijpcc-09-2022-0316","DOIUrl":"https://doi.org/10.1108/ijpcc-09-2022-0316","url":null,"abstract":"\u0000Purpose\u0000Internet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are allocated with a unique internet address, namely, Internet Protocol, which is used to perform the data broadcasting with the external objects using the internet. The sudden increment in the number of attacks generated by intruders, causes security-related problems in IoT devices while performing the communication. The main purpose of this paper is to develop an effective attack detection to enhance the robustness against the attackers in IoT.\u0000\u0000\u0000Design/methodology/approach\u0000In this research, the lasso regression algorithm is proposed along with ensemble classifier for identifying the IoT attacks. The lasso algorithm is used for the process of feature selection that modeled fewer parameters for the sparse models. The type of regression is analyzed for showing higher levels when certain parts of model selection is needed for parameter elimination. The lasso regression obtains the subset for predictors to lower the prediction error with respect to the quantitative response variable. The lasso does not impose a constraint for modeling the parameters caused the coefficients with some variables shrink as zero. The selected features are classified by using an ensemble classifier, that is important for linear and nonlinear types of data in the dataset, and the models are combined for handling these data types.\u0000\u0000\u0000Findings\u0000The lasso regression with ensemble classifier–based attack classification comprises distributed denial-of-service and Mirai botnet attacks which achieved an improved accuracy of 99.981% than the conventional deep neural network (DNN) methods.\u0000\u0000\u0000Originality/value\u0000Here, an efficient lasso regression algorithm is developed for extracting the features to perform the network anomaly detection using ensemble classifier.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedding and Siamese deep neural network-based malware detection in Internet of Things 物联网中的嵌入和暹罗深度神经网络恶意软件检测
IF 2.6 Q1 Computer Science Pub Date : 2022-11-07 DOI: 10.1108/ijpcc-06-2022-0236
T. S. Lakshmi, M. Govindarajan, Asadi Srinivasulu
PurposeA proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud. Because of the encryption techniques used by the attackers, network security experts struggle to develop an efficient malware detection technique. Though few machine learning-based techniques are used by researchers for malware detection, large amounts of data must be processed and detection accuracy needs to be improved for efficient malware detection. Deep learning-based methods have gained significant momentum in recent years for the accurate detection of malware. The purpose of this paper is to create an efficient malware detection system for the IoT using Siamese deep neural networks.Design/methodology/approachIn this work, a novel Siamese deep neural network system with an embedding vector is proposed. Siamese systems have generated significant interest because of their capacity to pick up a significant portion of the input. The proposed method is efficient in malware detection in the IoT because it learns from a few records to improve forecasts. The goal is to determine the evolution of malware similarity in emerging domains of technology.FindingsThe cloud platform is used to perform experiments on the Malimg data set. ResNet50 was pretrained as a component of the subsystem that established embedding. Each system reviews a set of input documents to determine whether they belong to the same family. The results of the experiments show that the proposed method outperforms existing techniques in terms of accuracy and efficiency.Originality/valueThe proposed work generates an embedding for each input. Each system examined a collection of data files to determine whether they belonged to the same family. Cosine proximity is also used to estimate the vector similarity in a high-dimensional area.
目的正确理解恶意软件的特征对于保护因物联网、大数据和云技术的进步而产生的大量数据是必要的。由于攻击者使用的加密技术,网络安全专家很难开发出有效的恶意软件检测技术。尽管研究人员很少使用基于机器学习的技术进行恶意软件检测,但必须处理大量数据,并且需要提高检测精度才能有效检测恶意软件。近年来,基于深度学习的方法在准确检测恶意软件方面取得了显著进展。本文的目的是使用暹罗深度神经网络为物联网创建一个高效的恶意软件检测系统。设计/方法论/方法在这项工作中,提出了一种新的带有嵌入向量的暹罗深度神经网络系统。暹罗系统已经引起了人们的极大兴趣,因为它们能够接收很大一部分输入。所提出的方法在物联网中的恶意软件检测中是有效的,因为它从一些记录中学习以改进预测。目标是确定新兴技术领域中恶意软件相似性的演变。Findings云平台用于对Malimg数据集进行实验。ResNet50作为建立嵌入的子系统的一个组件进行了预训练。每个系统都会查看一组输入文档,以确定它们是否属于同一个族。实验结果表明,该方法在精度和效率方面优于现有技术。创意/价值建议的作品为每个输入生成一个嵌入。每个系统都检查了一组数据文件,以确定它们是否属于同一个族。余弦邻近度也用于估计高维区域中的向量相似性。
{"title":"Embedding and Siamese deep neural network-based malware detection in Internet of Things","authors":"T. S. Lakshmi, M. Govindarajan, Asadi Srinivasulu","doi":"10.1108/ijpcc-06-2022-0236","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0236","url":null,"abstract":"\u0000Purpose\u0000A proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud. Because of the encryption techniques used by the attackers, network security experts struggle to develop an efficient malware detection technique. Though few machine learning-based techniques are used by researchers for malware detection, large amounts of data must be processed and detection accuracy needs to be improved for efficient malware detection. Deep learning-based methods have gained significant momentum in recent years for the accurate detection of malware. The purpose of this paper is to create an efficient malware detection system for the IoT using Siamese deep neural networks.\u0000\u0000\u0000Design/methodology/approach\u0000In this work, a novel Siamese deep neural network system with an embedding vector is proposed. Siamese systems have generated significant interest because of their capacity to pick up a significant portion of the input. The proposed method is efficient in malware detection in the IoT because it learns from a few records to improve forecasts. The goal is to determine the evolution of malware similarity in emerging domains of technology.\u0000\u0000\u0000Findings\u0000The cloud platform is used to perform experiments on the Malimg data set. ResNet50 was pretrained as a component of the subsystem that established embedding. Each system reviews a set of input documents to determine whether they belong to the same family. The results of the experiments show that the proposed method outperforms existing techniques in terms of accuracy and efficiency.\u0000\u0000\u0000Originality/value\u0000The proposed work generates an embedding for each input. Each system examined a collection of data files to determine whether they belonged to the same family. Cosine proximity is also used to estimate the vector similarity in a high-dimensional area.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41616960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving GPU performance in multimedia applications through FPGA based adaptive DMA controller 通过FPGA自适应DMA控制器提高多媒体应用中GPU的性能
IF 2.6 Q1 Computer Science Pub Date : 2022-10-17 DOI: 10.1108/ijpcc-06-2022-0241
S. B, K. E.
PurposeDeep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but require bottlenecks in achieving the high speed and low latency synchronization while being implemented in the real hardware architectures. Though direct memory access controller (DMAC) has gained a brighter light of research for achieving bulk data transfers, existing direct memory access (DMA) systems continue to face the challenges of achieving high-speed communication. The purpose of this study is to develop an adaptive-configured DMA architecture for bulk data transfer with high throughput and less time-delayed computation.Design/methodology/approachThe proposed methodology consists of a heterogeneous computing system integrated with specialized hardware and software. For the hardware, the authors propose an field programmable gate array (FPGA)-based DMAC, which transfers the data to the graphics processing unit (GPU) using PCI-Express. The workload characterization technique is designed using Python software and is implementable for the advanced risk machine Cortex architecture with a suitable communication interface. This module offloads the input streams of data to the FPGA and initiates the FPGA for the control flow of data to the GPU that can achieve efficient processing.FindingsThis paper presents an evaluation of a configurable workload-based DMA controller for collecting the data from the input devices and concurrently applying it to the GPU architecture, bypassing the hardware and software extraneous copies and bottlenecks via PCI Express. It also investigates the usage of adaptive DMA memory buffer allocation and workload characterization techniques. The proposed DMA architecture is compared with the other existing DMA architectures in which the performance of the proposed DMAC outperforms traditional DMA by achieving 96% throughput and 50% less latency synchronization.Originality/valueThe proposed gated recurrent unit has produced 95.6% accuracy in characterization of the workloads into heavy, medium and normal. The proposed model has outperformed the other algorithms and proves its strength for workload characterization.
目的深度学习技术在医疗保健、计算机视觉、网络安全等领域是不可避免的。这些算法需要高数据传输,但在实际硬件架构中实现时,在实现高速和低延迟同步方面需要瓶颈。尽管直接存储器存取控制器(DMAC)在实现大容量数据传输方面获得了更光明的研究前景,但现有的直接存储器存取(DMA)系统仍然面临着实现高速通信的挑战。本研究的目的是开发一种自适应配置的DMA架构,用于具有高吞吐量和较少时延计算的批量数据传输。设计/方法论/方法论所提出的方法论由集成了专用硬件和软件的异构计算系统组成。在硬件方面,作者提出了一种基于现场可编程门阵列(FPGA)的DMAC,它使用PCI Express将数据传输到图形处理单元(GPU)。工作负载表征技术是使用Python软件设计的,并且可以在具有适当通信接口的高级风险机器Cortex架构中实现。该模块将输入数据流卸载到FPGA,并启动FPGA以控制到GPU的数据流,从而实现高效处理。发现本文对一种基于可配置工作负载的DMA控制器进行了评估,该控制器用于从输入设备收集数据,并同时将其应用于GPU架构,通过PCI Express绕过硬件和软件无关的副本和瓶颈。它还研究了自适应DMA内存缓冲区分配和工作负载表征技术的使用。将所提出的DMA架构与其他现有DMA架构进行比较,其中所提出的DMAC的性能优于传统DMA,实现了96%的吞吐量和50%的延迟同步。独创性/价值所提出的门控递归单元在将工作量分为重、中和正常时的准确率为95.6%。所提出的模型优于其他算法,并证明了其在工作负载表征方面的优势。
{"title":"Improving GPU performance in multimedia applications through FPGA based adaptive DMA controller","authors":"S. B, K. E.","doi":"10.1108/ijpcc-06-2022-0241","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0241","url":null,"abstract":"\u0000Purpose\u0000Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but require bottlenecks in achieving the high speed and low latency synchronization while being implemented in the real hardware architectures. Though direct memory access controller (DMAC) has gained a brighter light of research for achieving bulk data transfers, existing direct memory access (DMA) systems continue to face the challenges of achieving high-speed communication. The purpose of this study is to develop an adaptive-configured DMA architecture for bulk data transfer with high throughput and less time-delayed computation.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed methodology consists of a heterogeneous computing system integrated with specialized hardware and software. For the hardware, the authors propose an field programmable gate array (FPGA)-based DMAC, which transfers the data to the graphics processing unit (GPU) using PCI-Express. The workload characterization technique is designed using Python software and is implementable for the advanced risk machine Cortex architecture with a suitable communication interface. This module offloads the input streams of data to the FPGA and initiates the FPGA for the control flow of data to the GPU that can achieve efficient processing.\u0000\u0000\u0000Findings\u0000This paper presents an evaluation of a configurable workload-based DMA controller for collecting the data from the input devices and concurrently applying it to the GPU architecture, bypassing the hardware and software extraneous copies and bottlenecks via PCI Express. It also investigates the usage of adaptive DMA memory buffer allocation and workload characterization techniques. The proposed DMA architecture is compared with the other existing DMA architectures in which the performance of the proposed DMAC outperforms traditional DMA by achieving 96% throughput and 50% less latency synchronization.\u0000\u0000\u0000Originality/value\u0000The proposed gated recurrent unit has produced 95.6% accuracy in characterization of the workloads into heavy, medium and normal. The proposed model has outperformed the other algorithms and proves its strength for workload characterization.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46957573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data 基于超混沌序列的ElGamal算法增强云数据的安全性
IF 2.6 Q1 Computer Science Pub Date : 2022-10-13 DOI: 10.1108/ijpcc-06-2022-0240
Aruna Kumari Koppaka, V. N. Lakshmi
PurposeIn the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the privacy of important and sensitive data needs to be safeguarded from unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased computational complexity. The purpose of this research study is to develop an effective cryptosystem algorithm to secure the outsourced data with minimum computational complexity.Design/methodology/approachA new cryptosystem algorithm is proposed in this paper to address the above-mentioned concerns. The introduced cryptosystem algorithm has combined the ElGamal algorithm and hyperchaotic sequence, which effectively encrypts the outsourced data and diminishes the computational complexity of the system.FindingsIn the resulting section, the proposed improved ElGamal cryptosystem (IEC) algorithm performance is validated using the performance metrics like encryption time, execution time, decryption time and key generation comparison time. The IEC algorithm approximately reduced 0.08–1.786 ms of encryption and decryption time compared to the existing model: secure data deletion and verification.Originality/valueThe IEC algorithm significantly enhances the data security in cloud environments by increasing the power of key pairs. In this manuscript, the conventional ElGamal algorithm is integrated with the pseudorandom sequences for a pseudorandom key generation for improving the outsourced cloud data security.
目的在云计算环境下,对云数据进行隐私保护和安全保护是一项至关重要且要求很高的任务。无论是在商业领域还是学术界,都需要保护重要敏感数据的隐私,防止未经授权的用户使用,以提高其安全性。因此,针对云环境下的数据隐私保护,开发了几种密钥生成、加密和解密算法。尽管如此,外包数据仍然存在数据安全性最低、耗时和计算复杂性增加等问题。本研究的目的是开发一种有效的密码系统算法,以最小的计算复杂度来保护外包数据。设计/方法/方法本文提出了一种新的密码系统算法来解决上述问题。该算法将ElGamal算法与超混沌序列相结合,有效地对外包数据进行加密,降低了系统的计算复杂度。在结果部分中,使用诸如加密时间、执行时间、解密时间和密钥生成比较时间等性能指标验证了所提出的改进的ElGamal密码系统(IEC)算法的性能。与现有模型相比,IEC算法大约减少了0.08-1.786 ms的加密和解密时间:安全的数据删除和验证。原创性/价值IEC算法通过增加密钥对的能力显著提高了云环境中的数据安全性。本文将传统的ElGamal算法与伪随机序列相结合,生成伪随机密钥,以提高外包云数据的安全性。
{"title":"ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data","authors":"Aruna Kumari Koppaka, V. N. Lakshmi","doi":"10.1108/ijpcc-06-2022-0240","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0240","url":null,"abstract":"\u0000Purpose\u0000In the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the privacy of important and sensitive data needs to be safeguarded from unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased computational complexity. The purpose of this research study is to develop an effective cryptosystem algorithm to secure the outsourced data with minimum computational complexity.\u0000\u0000\u0000Design/methodology/approach\u0000A new cryptosystem algorithm is proposed in this paper to address the above-mentioned concerns. The introduced cryptosystem algorithm has combined the ElGamal algorithm and hyperchaotic sequence, which effectively encrypts the outsourced data and diminishes the computational complexity of the system.\u0000\u0000\u0000Findings\u0000In the resulting section, the proposed improved ElGamal cryptosystem (IEC) algorithm performance is validated using the performance metrics like encryption time, execution time, decryption time and key generation comparison time. The IEC algorithm approximately reduced 0.08–1.786 ms of encryption and decryption time compared to the existing model: secure data deletion and verification.\u0000\u0000\u0000Originality/value\u0000The IEC algorithm significantly enhances the data security in cloud environments by increasing the power of key pairs. In this manuscript, the conventional ElGamal algorithm is integrated with the pseudorandom sequences for a pseudorandom key generation for improving the outsourced cloud data security.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42526360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Source location privacy preservation in IoT-enabled event-driven WSNs 物联网事件驱动的无线传感器网络中的源位置隐私保护
IF 2.6 Q1 Computer Science Pub Date : 2022-10-10 DOI: 10.1108/ijpcc-05-2022-0214
Nidhi Sharma, Ravindara Bhatt
PurposePrivacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.Design/methodology/approachThis paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.FindingsThe sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.Originality/valueThe authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.
在支持物联网(IoT)的事件驱动无线传感器网络(wsn)中,隐私保护是一个重要问题。如果事件不发生,事件驱动系统中的低能量利用率是必不可少的。当事件发生时,需要启用物联网的传感器网络来处理来自需求数据交付集中的巨大流量。本文旨在探索一种有效的事件驱动wsn源隐私保护框架。本文讨论了物联网事件驱动wsn中的三种算法:用于事件检测的源位置隐私(SLP_ED)、棋盘改变模式(SLP_ED_CBA)和基于网格的源位置隐私(GB_SLP)。利用仿真结果对该方案进行了性能评估和安全性分析。传感器在感兴趣的领域观察网络区域内的绑定事件或敏感项目。开放的无线信道允许对手搜索流量设计,跟踪并到达开始节点或事件检测节点。SLP_ED和SLP_ED_CBA提供了比动态最短路径方案和节能源位置隐私保护方案更好的安全级别结果。本文讨论了GB_SLP的安全性分析。对比分析表明,该方案在安全水平上优于现有方案。原创性/价值作者在支持物联网的事件驱动wsn中开发了隐私保护方案。事件有两类:名义事件和关键事件。从源到接收的路由选择依赖于两种类型的事件:名义事件或关键事件;事件所需的隐私级别;以及活动所需的能量消耗。此外,为了保证源位置的隐私性,设计了虚拟节点选择方案。
{"title":"Source location privacy preservation in IoT-enabled event-driven WSNs","authors":"Nidhi Sharma, Ravindara Bhatt","doi":"10.1108/ijpcc-05-2022-0214","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0214","url":null,"abstract":"\u0000Purpose\u0000Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.\u0000\u0000\u0000Design/methodology/approach\u0000This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.\u0000\u0000\u0000Findings\u0000The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.\u0000\u0000\u0000Originality/value\u0000The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48589771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment 一种云计算环境下任务批量分配的负载平衡混合启发式算法
IF 2.6 Q1 Computer Science Pub Date : 2022-10-05 DOI: 10.1108/ijpcc-06-2022-0220
Sophiya Shiekh, Mohammad Shahid, Manas Sambare, R. Haidri, D. Yadav
PurposeCloud computing gives several on-demand infrastructural services by dynamically pooling heterogeneous resources to cater to users’ applications. The task scheduling needs to be done optimally to achieve proficient results in a cloud computing environment. While satisfying the user’s requirements in a cloud environment, scheduling has been proven an NP-hard problem. Therefore, it leaves scope to develop new allocation models for the problem. The aim of the study is to develop load balancing method to maximize the resource utilization in cloud environment.Design/methodology/approachIn this paper, the parallelized task allocation with load balancing (PTAL) hybrid heuristic is proposed for jobs coming from various users. These jobs are allocated on the resources one by one in a parallelized manner as they arrive in the cloud system. The novel algorithm works in three phases: parallelization, task allocation and task reallocation. The proposed model is designed for efficient task allocation, reallocation of resources and adequate load balancing to achieve better quality of service (QoS) results.FindingsThe acquired empirical results show that PTAL performs better than other scheduling strategies under various cases for different QoS parameters under study.Originality/valueThe outcome has been examined for the real data set to evaluate it with different state-of-the-art heuristics having comparable objective parameters.
PurposeCloud计算通过动态汇集异构资源来满足用户的应用程序,从而提供多种按需基础设施服务。需要优化任务调度,以在云计算环境中获得熟练的结果。在云环境中满足用户需求的同时,调度已被证明是一个NP难题。因此,它为开发新的分配模型留下了空间。本研究的目的是开发负载平衡方法,以最大限度地提高云环境中的资源利用率。设计/方法论/方法本文针对来自不同用户的作业,提出了负载平衡并行任务分配(PTAL)混合启发式算法。这些作业在到达云系统时以并行方式逐个分配到资源上。该算法分为三个阶段:并行化、任务分配和任务重新分配。所提出的模型旨在实现高效的任务分配、资源的重新分配和充分的负载平衡,以获得更好的服务质量(QoS)结果。实验结果表明,在不同的QoS参数下,PTAL在各种情况下都比其他调度策略表现得更好。原创性/价值已经对真实数据集的结果进行了检查,以使用具有可比目标参数的不同最先进的启发式方法对其进行评估。
{"title":"A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment","authors":"Sophiya Shiekh, Mohammad Shahid, Manas Sambare, R. Haidri, D. Yadav","doi":"10.1108/ijpcc-06-2022-0220","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0220","url":null,"abstract":"\u0000Purpose\u0000Cloud computing gives several on-demand infrastructural services by dynamically pooling heterogeneous resources to cater to users’ applications. The task scheduling needs to be done optimally to achieve proficient results in a cloud computing environment. While satisfying the user’s requirements in a cloud environment, scheduling has been proven an NP-hard problem. Therefore, it leaves scope to develop new allocation models for the problem. The aim of the study is to develop load balancing method to maximize the resource utilization in cloud environment.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, the parallelized task allocation with load balancing (PTAL) hybrid heuristic is proposed for jobs coming from various users. These jobs are allocated on the resources one by one in a parallelized manner as they arrive in the cloud system. The novel algorithm works in three phases: parallelization, task allocation and task reallocation. The proposed model is designed for efficient task allocation, reallocation of resources and adequate load balancing to achieve better quality of service (QoS) results.\u0000\u0000\u0000Findings\u0000The acquired empirical results show that PTAL performs better than other scheduling strategies under various cases for different QoS parameters under study.\u0000\u0000\u0000Originality/value\u0000The outcome has been examined for the real data set to evaluate it with different state-of-the-art heuristics having comparable objective parameters.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46539485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data 媒体云数据增强的基于密文策略属性的加密和序列化
IF 2.6 Q1 Computer Science Pub Date : 2022-10-05 DOI: 10.1108/ijpcc-06-2022-0223
M. R., H. M. T. Gadiyar, Sharath S. M., M. Bharathrajkumar, S. K
PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.
目的通过执行加密操作和特征来提供有效的云和物联网(IoT)访问控制,有各种系统技术或模型用于访问控制。特别是在云计算环境中,这些传统的对称加密技术大规模分布。这些对称加密技术对加密和解密过程使用相同的密钥。然而,在这些阶段的执行过程中,它们都面临着密钥分配和管理的问题。本研究的目的在于提供云端运算环境下有效的密钥管理与密钥分配。设计/方法/方法本文采用Cipher - text-Policy Attribute-Based Encryption (CP-ABE)技术,采用适当的访问控制策略,在云和物联网环境中通过加密过程提供数据所有者的控制和共享数据。数据在云存储的帮助下共享,甚至在授权用户在场的情况下也是如此。本研究采用的主要方法是增强型CP-ABE串行化(e -CP-ABE)方法。结果通过加密时间、完成时间和解密时间来衡量,与现有的CP-ABE技术相比,结果更好。对比分析表明,本文提出的e -CP-ABE在256个密钥长度下完成时间为2373 ms,而现有的CP-ABE完成时间为3129 ms。除此之外,现有的高级加密标准(AES)方案的完成时间为3449毫秒。本研究采用E-CP-ABES访问控制技术,验证具有非常敏感的数据集约束的隐藏属性,解决物联网和云计算环境中存在的密钥管理问题和访问控制机制。该研究的新颖之处在于,所提出的E-CP-ABES通过使用一个称为序列化过程的过程结合了可扩展的、部分隐藏的约束策略,并将其序列化为字节流。冗余余数系统被认为是为了消除在处理串行化中获得的位或数据时发生的错误。使用反序列化过程恢复数据流。
{"title":"Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data","authors":"M. R., H. M. T. Gadiyar, Sharath S. M., M. Bharathrajkumar, S. K","doi":"10.1108/ijpcc-06-2022-0223","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0223","url":null,"abstract":"\u0000Purpose\u0000There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.\u0000\u0000\u0000Design/methodology/approach\u0000This paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.\u0000\u0000\u0000Findings\u0000The results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.\u0000\u0000\u0000Originality/value\u0000The proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44979570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Pervasive Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1