BlockAM: An Adaptive Middleware for Intelligent Data Storage Selection for Internet of Things

Author(s):  
Syed Muhammad Danish ◽  
Kaiwen Zhang ◽  
Hans-Arno Jacobsen
2018 ◽  
Vol 3 (2) ◽  
pp. 74
Author(s):  
Helina Apriyani ◽  
Sismadi Sismadi ◽  
Sefrika Sefrika

AbstrakInternet of things (IoT) adalah sebuah konsep yang menghubungkan komputer dan perangkat elektronik melalui internet dan dapat dikendalikan dari jarak jauh. Konsep terpenting dalam Internet of things (Iot) adalah modul sistem informasi, koneksi internet dan penyimpanan datanya dalam cloud computing. Konsep ini memiliki manfaat besar dalam perkembangan usaha dan kelangsungan bisnis perusahaan dimana hampir semua bidang menggunakan IoT untuk dapat bersaing di pasaran. Indonesia merupakan sebuah negara yang dianugerahi kekayaan alam yang melimpah ruah. Salah satu komoditi unggulan adalah produk pertanian. Penelitian ini bertujuan untuk membantu para petani dalam memasarkan produknya melalui e-commerce dengan menggunakan konsep Internet of things IoT. Metode penelitian dengan menggunakan metode incremental.  Incremental digunakan untuk mendesai produk, kemudian  diimplementasikan, dan diuji secara bertahap (setiap modul akan ditambahkan bertahap) hingga produk selesai. Hasil penelitian ini digunakan untuk membantu petani di Kabupaten Bogor untuk mendistribusikan penjualannya secara luas, meningkatkan revenue dan memutus rantai panjang proses penjualan. Kata kunci— sistem penjualan, incremental, Internet of Things (IoT), produk pertanian, Kabupaten Bogor Abstract Internet of things (IoT) is a concept that connects computers and electronic devices via the internet and can be controlled remotely. The main concept in Internet of things (IoT) is information systems, internet connections and data storage in cloud computing. This concept has great benefits in the efforts and efforts used to use IoT to be able to compete in the market. Indonesia is a country that is blessed with abundant natural resources. One of the leading commodities is agricultural products. This study aims to help farmers market their products through e-commerce using the IoT Internet of things concept. Research method using incremental method. Incremental to design the product, then implemented, and gradually delay (each module will be added gradually) until the product is finished. The results of this study are to help farmers in Bogor Regency to distribute sales widely, increase revenue and break the sales process. Keywords—sales system, incremental, Internet of Things (IoT), agricultural products, Kabupaten Bogor


2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


Author(s):  
John Shiny J. ◽  
Karthikeyan P.

Cloud computing has become one of the most important technologies in our day-to-day lives. The computing resources are delivered to the customers based on subscription basis via internet. Big data storage and processing are main application of cloud. Furthermore, the development of internet of things provides the platform for interconnecting devices over internet. This includes everything from mobile phones, washing machines, lamps, headphones, wearable devices, and everything else we never think of. This enables machine-to-machine communication, also applies to the components of the machine. The main objective of this chapter is to give an overview of cloud computing, big data, and internet of things and the advance research topics.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


Symmetry ◽  
2018 ◽  
Vol 10 (8) ◽  
pp. 353 ◽  
Author(s):  
Tran Phuc ◽  
Changhoon Lee

BM123-64 block cipher, which was proposed by Minh, N.H. and Bac, D.T. in 2014, was designed for high speed communication applications factors. It was constructed in hybrid controlled substitution–permutation network (CSPN) models with two types of basic controlled elements (CE) in distinctive designs. This cipher is based on switchable data-dependent operations (SDDO) and covers dependent-operations suitable for efficient primitive approaches for cipher constructions that can generate key schedule in a simple way. The BM123-64 cipher has advantages including high applicability, flexibility, and portability with different algorithm selection for various application targets with internet of things (IoT) as well as secure protection against common types of attacks, for instance, differential attacks and linear attacks. However, in this paper, we propose methods to possibly exploit the BM123-64 structure using related-key attacks. We have constructed a high probability related-key differential characteristics (DCs) on a full eight rounds of BM123-64 cipher. The related-key amplified boomerang attack is then proposed on all three different cases of operation-specific designs with effective results in complexity of data and time consumptions. This study can be considered as the first cryptographic results on BM123-64 cipher.


Sign in / Sign up

Export Citation Format

Share Document