Application of IoT in Industries: A Survey of Security Concern

2021 ◽  
pp. 1-9
Author(s):  
Abhishek Das ◽  
Apurba Bhattacharya ◽  
Prithvi Dey ◽  
Biswarup Neogi ◽  
Indranath Sarkar
Keyword(s):  
Author(s):  
Ekta Y

As IT sector is ruling the world now,confidentiality and security of information has become the most important inseparable aspect in information communication system. Keeping in view the same, a new approach called Visual Cryptography (VC) has been suggested by many researchers but there are some limitations with this scheme and cheating is one of the main problem among them. This paper intends to show the basis of cheating in VC in terms of cheating process, its detection methods and its prevention methods suggested by various researchers along with their merits and demerits. Finally, a good Cheating Immune Visual Cryptography Scheme (CIVCS) has been discussed which states the properties to be adopted by every Visual Cryptography scheme to make it immune to cheating attacks.


2019 ◽  
Vol 13 (2) ◽  
pp. 14-31
Author(s):  
Mamdouh Alenezi ◽  
Muhammad Usama ◽  
Khaled Almustafa ◽  
Waheed Iqbal ◽  
Muhammad Ali Raza ◽  
...  

NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.


Author(s):  
María Fabiana Jorge

With the outbreak of the Coronavirus there is a new realization of the vulnerabilities of the U.S. drug supply chain. However, while such concerns may have been amplified by the pandemic, they preceded Covid-19 and were well documented before 2020. Indeed, in past years the U.S. Congress held several hearings addressing potential vulnerabilities in the U.S. drug supply chain, in part due to the increasing dependency on China as a dominant supplier of active pharmaceutical ingredients (APIs) and some finished pharmaceutical products. These vulnerabilities go well beyond health policy and constitute a national security concern. The article addresses how U.S. trade policy plays a significant role in shaping the pharmaceutical industry at home and abroad and is in part responsible for some of the current vulnerabilities of the U.S. drug supply chain.


China Report ◽  
2021 ◽  
pp. 000944552110470
Author(s):  
Rudolf Fürst

Deepening globalisation and worldwide availability of free information and ideas raise concerns of the communist China’s political leadership about the stability of the regime and the sustainability of the state ideological orthodoxy. Therefore, the state’s tightening control of the public communication to curtail the domestic criticism and occasional public discontent is becoming framed and legitimised in terms of cultural security as a non-traditional security concern. This study argues that the restrictive impacts of the politicisation of culture in the centralised agenda of President Xi Jinping reinvigorate China’s anti-Western narratives and attitudes. The research focuses on the state’s cultural security-related and applicable strategy in the political and institutional agenda and media. Moreover, the study also traces the state cultural security policy in the field of the civic and non-governmental sector, religious and ethnic minorities policy, literature, film and audiovisual sectors. The findings assess the concern that the intellectually anachronistic, self-restraining and internationally hostile policy devaluates China’s cultural potential and complexity.


Author(s):  
Amer Kareem ◽  
Rejwan Bin Sulaiman ◽  
Muhammad Umer Farooq

2018 ◽  
Vol 6 (1) ◽  
pp. 21-27 ◽  
Author(s):  
Akanksha Upadhyaya ◽  
Bhajneet Kaur

The aim of this research paper is to explore the electronic payment system (EPS) acceptability determinants, from the consumer perspective. Exploratory factor analysis has been used to explore the factors based on different statements. The study has been conducted in North-West region of Delhi. Data has been collected from male-female of different age groups by using the questionnaire tool of data collection. For extraction of factors Principal component analyses and Varimax with Kaiser Normalization rotation method was used. The rotated component matrix shows best fitting of items to form a factor. As per the convergence of items, 4 factors were extracted and named. These factors are security concern, Knowledge, awareness and acceptability & convenience which are contributing for acceptability of electronic payment system among the consumers.


2018 ◽  
Vol 26 (1) ◽  
pp. 115
Author(s):  
Herdi Sahrasad ◽  
Al Chaidar ◽  
M. Akmal ◽  
Saifullah Ali ◽  
Nanda Amalia ◽  
...  

<p>Southeast Asia is a region that is vulnerable to terrorism. Of the total terrorism cases that occurred in the world, 50 percents occurred in this region. Mindanao is one of the regions in Southeast Asia that since a long time ago has been the basis of world-class terrorism. This situation is getting worse due to the presence of terrorist groups with a strong tradition of maritime piracy. The nexus between terrorism and piracy makes the issue of maritime terrorism in Southeast Asia a regional security concern. Abu Sayyaf Group is a terrorist group in the Southern Philippines that is very well-known but difficult to map. This makes the Abu Sayyaf a source of prolonged tension in the Southern Philippines in particular and in the Southeast Asia region in general. This study is a field observation that uses descriptive analysis to reveal the details of the Abu Sayyaf and the issue of terrorism in Mindanao.</p>


2021 ◽  
Vol 6 (2) ◽  
Author(s):  
Iyos Rosidin Pajar

The issue of data security seems to be one of the most intriguing topics to observe in the development of information technology in recent time/. The information technology related to the management processes, one of which is the SIMAK application at   the University of Siliwangi needs a higher security concern. This study aims to determine the level of security of the SIMAK application in which the researchers can provide recommendations to SIMAK managers. This could be the basis for the future improvements. Researchers used 4 domains from ISO / IEC 27002: 2013, namely domain 5, it contains information security policies. Domain 6, it contains organizational information security. Domain 9, it contains access control. Lastly, Domain 11, it contains physical and environmental security.  When they are specified from the four domains, 38 controls are obtained. Security, from the results of the questionnaire and weighting, the result of the 5 domains maturity value is= 1.49, the result of the domain 6 maturity value is= 1.52, while domain 9 maturity value is= 1.32 and domain 11 maturity value constitute to 1.97.  If it is averaged,  the Siliwangi University SIMAK application is at level 2 or repeatable.


2011 ◽  
Vol 2011 ◽  
pp. 1-8 ◽  
Author(s):  
Swapna Iyer

The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with.


Sign in / Sign up

Export Citation Format

Share Document