The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There has been increasing interest in adopting BlockChain (BC), that underpins the crypto-currency Bitcoin, in Internet of Things (IoT) for security and privacy. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for most IoT devices. This paper proposes a lightweight BC-based architecture for IoT that virtually eliminates the overheads...
Cloud data provenance is metadata that records the history of the creation and operations performed on a cloud data object. Secure data provenance is crucial for data accountability, forensics and privacy. In this paper, we propose a decentralized and trusted cloud data provenance architecture using blockchain technology. Blockchain-based data provenance can provide tamper-proof records, enable the...
The paper presents an example Sensor-cloud architecture that integrates security as its native ingredient. It is based on the multi-layer client-server model with separation of physical and virtual instances of sensors, gateways, application servers and data storage. It proposes the application of virtualised sensor nodes as a prerequisite for increasing security, privacy, reliability and data protection...
In recent years Cloud Computing is widely adopted for MapReduce computation. Data security is on top of the major concerns of data processing. The researches focused on the verification of data integrity are increasingly important, especially on MapReduce processing in Cloud Computing. This paper presents new architecture for secure MapReduce computation in cloud. The main goal of Secure Tag-MapReduce...
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm from an even greater impact: While most technological...
Security is the main concern in the cloud computing environment. The usage of the cloud computing in increasing gradually, where the security is still lagging. Traditionally, use of single cloud in cloud computing environment leads to security issues, malicious users, and also untrusted users. The recent research proved that Multi cloud computing provides all the services in a single architecture...
We present an IoT privacy architecture covering End-2-End data handling at devices, connections and in the cloud. The system is driven by privacy policies negotiated between service providers and consumers.
The IT system is one of the key infrastructures in order to add intelligent feature to power grids. Many papers anticipated a rocky road for IT system integration into power system and suggested the cloud computing adoption as a smart grid IT infrastructure to smooth the integration. Though cloud computing could overcome some of these integration challenges, it would bring some of its own. This study...
Addressing security and privacy requirements for Mobile and Cloud platforms is always made in isolation. This lack of coherence has impacts when data are permanently travelling between such platforms. In this paper we propose a symmetric architecture that takes into account the privacy and security requirements of the two platforms and offers a straightforward instantiation pattern for realizing an...
In the context of Data Integration Systems (DIS), integrating data across organizations varying in security and privacy requirements in addition to trust levels raises concerns of data leakage threats. In order to prevent these threats, an in depth threat analysis reflected on the architectural components of a DIS is required. This paper analyses data leakage threats and locations within the DIS architecture...
As the paradigm of future information technology architecture, cloud computing has been a hot issue since it emerged. However, data privacy protection is perceived as the most important challenge that cloud tenants concern, and conventional protection technology sometimes can not be applied to cloud data efficiently. In this paper, a scheme is proposed to protect the tenants' data privacy in cloud...
Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. It is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. The cloud environment is required to have efficient security techniques as it contains precious assets such as data, users, technologies, resources...
The broad capabilities of widespread mobile devices have paved the way for People-Centric Sensing (PCS). This emerging paradigm enables direct user involvement in possibly large-scale and diverse data collection and sharing. Unavoidably, this raises significant privacy concerns, as participants may inadvertently reveal a great deal of sensitive information. However, ensuring user privacy, e.g., by...
As the promise of the Internet of Things (IoT) materializes in our everyday lives, we are often challenged with a number of concerns regarding the efficacy of the current data privacy solutions that support the pervasive components at play in IoT. The privacy and security concerns surrounding IoT often manifests themselves as a treat to end-user adoption and negatively impacts trust among end-users...
This research paper aims to explore the underlying cloud computing architectures with respect to security and auditing services. As most of the standards have not been defined yet for cloud computing, academic and industrial researchers are participating with their ideas and proofs. We have surveyed and classified the available cloud computing architectures into three categories which are 1) Architecture...
The recent introduction of the smart grids poses the need for a distributed communication infrastructure able to efficiently transmit the energy measurements collected by the smart meters, while simultaneously coping with several privacy and security constraints. In this work we introduce a novel communication architecture able to efficiently solve such a problem. Our proposal is based on a heterogeneous...
The widespread deployment of Automatic Metering Infrastructures in Smart Grid scenarios rises great concerns about privacy preservation of user-related data, from which detailed information about customer's habits and behaviours can be deduced. Therefore, the users' individual measurements should be aggregated before being provided to External Entities such as utilities, grid managers and third parties...
This paper focusing on the data collected ubiquitously and conserved by cloud providers are assured that, the clients and users can assess that information globally as per their versatility, where as the cloud providers should gave some limited transparency policy to maintain client's secrecy. Usually the private data collected by the service providers can be shared with in their other platforms....
There is today an increasing interest in environmental monitoring for a variety of specific applications, with great impact especially on natural resource management and preservation, economy, and people's life and health. Typical uses encompass, for example, Earth observation, meteorology, natural resource monitoring, agricultural and forest monitoring, pollution control, natural disaster observation...
Migration to an electronically controlled electrical grid to transmit, distribute, and deliver power to consumers has helped enhance the reliability and efficiency of conventional electricity systems. At the same time, this digitally enabled technology called the Smart Grid has brought new challenges to businesses and consumers alike. A key component of such a grid is the smart-metering technology,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.