Domain ontologies for data sharing–an example from environmental monitoring using field GIS

2002 ◽  
Vol 28 (1) ◽  
pp. 95-102 ◽  
Author(s):  
Hardy Pundt ◽  
Yaser Bishr
2014 ◽  
Vol 687-691 ◽  
pp. 779-782
Author(s):  
Zhi Guo Cheng ◽  
Jun Pan ◽  
Su Xian Chen

Wireless Sensor Network (WSN) is becoming increasingly important for environmental monitoring.However, there is seldom applications that address the data sharing standard and interoperability among different applications.In this paper, we present a gateway system for wireless sensor network based on environmental monitoring. Resource sharing and long-distance accessing are important issues for application of wireless sensor network and environmental monitoring.


PLoS ONE ◽  
2021 ◽  
Vol 16 (9) ◽  
pp. e0258062
Author(s):  
Xiaodong Yang ◽  
Wanting Xi ◽  
Aijia Chen ◽  
Caifen Wang

Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our paper, a new data sharing scheme is proposed by using attribute-based encryption, identity-based signature and cloud computing technology to meet the requirements of confidentiality, integrity, verifiability, and unforgerability of environmental monitoring data. The monitoring equipment encrypts the monitored environmental data and uploads it to the environmental cloud server. Then, monitoring users can request access to the environmental cloud server. If the monitoring user meets the access policy, the plaintext is finally obtained through the fog node decryption. Our proposal mainly uses attribute-based encryption technology to realize the privacy protection and fine-grained access control of monitoring data. The integrity and unforgeability of the monitoring data are ensured by the digital signature. In addition, outsourcing computing technology saves the computing overhead of monitoring equipment and monitoring users. The security analysis illustrates that our proposal can achieve security purposes. Finally, the performance of our proposal and related schemes is evaluated from the aspects of communication overhead and computing overhead. The results indicate that our proposal is secure and efficient in environmental monitoring.


2014 ◽  
pp. 99-122
Author(s):  
M. Levin ◽  
K. Matrosova

The paper considers monitoring of environmental change as the central element of environmental regulation. Monitoring, as each kind of principalagent relations, easily gives rise to corruptive behavior. In the paper we analyze economic models of environmental monitoring with high costs, incomplete information and corruption. These models should be the elements of environmental economics and are needed to create an effective system of nature protection measures.


Sign in / Sign up

Export Citation Format

Share Document