scholarly journals A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Daoqi Han ◽  
Songqi Wu ◽  
Zhuoer Hu ◽  
Hui Gao ◽  
Enjie Liu ◽  
...  

The edge computing node plays an important role in the evolution of the artificial intelligence-empowered Internet of things (AIoTs) that converge sensing, communication, and computing to enhance wireless ubiquitous connectivity, data acquisition, and analysis capabilities. With full connectivity, the issue of data security in the new cloud-edge-terminal network hierarchy of AIoTs comes to the fore, for which blockchain technology is considered as a potential solution. Nevertheless, existing schemes cannot be applied to the resource-constrained and heterogeneous IoTs. In this paper, we consider the blockchain design for the AIoTs and propose a novel classified ledger framework based on lightweight blockchain (CLF-LB) that separates and stores data rights at the source and enables a thorough data flow protection in the open and heterogeneous network environment of AIoT. In particular, CLF-LB divides the network into five functional layers for optimal adaptation to AIoTs applications, wherein an intelligent collaboration mechanism is also proposed to enhance the across-layer operation. Unlike traditional full-function blockchain models, our framework includes novel technical modules, such as block regenesis, iterative reinforcement of proof-of-work, and efficient chain uploading via the system-on-chip system, which are carefully designed to fit the cloud-edge-terminal hierarchy in AIoTs networks. Comprehensive experimental results are provided to validate the advantages of the proposed CLF-LB, showing its potentials to address the secrecy issues of data storage and sharing in AIoTs networks.

2020 ◽  
Vol 96 (3s) ◽  
pp. 89-96
Author(s):  
А.А. Беляев ◽  
Я.Я. Петричкович ◽  
Т.В. Солохина ◽  
И.А. Беляев

Рассмотрены особенности архитектуры и основные характеристики аппаратного видеокодека по стандарту H.264, входящего в состав микросхемы 1892ВМ14Я (MCom-02). Описан механизм синхронизации потоков данных на основе набора флагов событий. Приведены экспериментальные результаты измерения характеристик производительности разработанного видеокодека на реальных видеосюжетах при различных форматах передаваемого изображения. The paper considers main architectural features and characteristics of H.264 hardware video codec IP-core as a part of MCom- 02 system-on-chip (SoC). Bedides, it presents data flow synchronization mechanism based on event flags set, as well as experimental results of performance measurements for the designed video codec IP-core obtained for different video sequences and different image formats.


2012 ◽  
Vol 2012 ◽  
pp. 1-12 ◽  
Author(s):  
Shaily Mittal ◽  
Nitin

Nowadays, Multiprocessor System-on-Chip (MPSoC) architectures are mainly focused on by manufacturers to provide increased concurrency, instead of increased clock speed, for embedded systems. However, managing concurrency is a tough task. Hence, one major issue is to synchronize concurrent accesses to shared memory. An important characteristic of any system design process is memory configuration and data flow management. Although, it is very important to select a correct memory configuration, it might be equally imperative to choreograph the data flow between various levels of memory in an optimal manner. Memory map is a multiprocessor simulator to choreograph data flow in individual caches of multiple processors and shared memory systems. This simulator allows user to specify cache reconfigurations and number of processors within the application program and evaluates cache miss and hit rate for each configuration phase taking into account reconfiguration costs. The code is open source and in java.


In the cryptocurrency era, Blockchain is one of the expeditiously growing information technologies that help in providing security to the data. Data tampering and authentication problems generally occur in centralized servers while sharing and storing the data. Blockchain provides the platform for big data and cloud storage in enhancing the security by evading from pernicious users. In this paper, we have discussed the exhaustive description of blockchain and its need, features and applications. Analysis of blockchain is done for different domains such as big data, cloud, internet of things and mobile cloud where the differences V’s are compared with big data and blockchain. SWOT (Strength Weakness Opportunities Threats) analysis is performed to address the merits and limitations in blockchain technology. The survey in aspects of data security, data storage, data sharing and data authentication through blockchain technology is done and the challenges are discussed to overcome the problem that leads in big data and cloud storage. The detailed comparative analysis proves that the blockchain technology overcomes the problems in big data storage and data security in cloud.


2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Maliha Sultana ◽  
Afrida Hossain ◽  
Fabiha Laila ◽  
Kazi Abu Taher ◽  
Muhammad Nazrul Islam

Abstract Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data vulnerable to cyber attacks. Medical records in particular seem to be the regular victims of hackers. Several data breach incidents throughout history have warranted the invention of security measures against these threats. Although various security procedures like firewalls, virtual private networks, encryption, etc are present, a mix of these approaches are required for maximum security in medical image and data sharing. Methods Relatively new, blockchain has become an effective tool for safeguarding sensitive information. However, to ensure overall protection of medical data (images), security measures have to be taken at each step, from the beginning, during and even after transmission of medical images which is ensured by zero trust security model. In this research, a number of studies that deal with these two concepts were studied and a decentralized and trustless framework was proposed by combining these two concepts for secured medical data and image transfer and storage. Results Research output suggested blockchain technology ensures data integrity by maintaining an audit trail of every transaction while zero trust principles make sure the medical data is encrypted and only authenticated users and devices interact with the network. Thus the proposed model solves a lot of vulnerabilities related to data security. Conclusions A system to combat medical/health data vulnerabilities has been proposed. The system makes use of the immutability of blockchain, the additional security of zero trust principles, and the scalability of off chain data storage using Inter Planetary File Systems (IPFS). The adoption of this system suggests to enhance the security of medical or health data transmission.


2022 ◽  
Vol 2146 (1) ◽  
pp. 012036
Author(s):  
Yungui Chen ◽  
Liwei Tian ◽  
Lei Yang ◽  
Longqing Zhang

Abstract With the development of Internet technology, with the continuous increase of data volume, it has become more and more difficult to maintain the traditional centralized data storage method. Data is easy to copy, difficult to share, high storage costs, and low data usage efficiency. Further trigger the demand for more efficient data storage technology. This article aims to study the application of blockchain technology in the data security storage and sharing system. On the basis of analyzing the problems of data sharing and cryptography, the functional modules of the data security storage and sharing system are designed. Encryption uses public key encryption algorithm to ensure encryption performance. The simulation experiment results show that the system is effective for file sharing, and the average generation time of the algorithm in this paper is within the controllable range.


Energies ◽  
2021 ◽  
Vol 14 (7) ◽  
pp. 1873
Author(s):  
Robert Karaszewski ◽  
Paweł Modrzyński ◽  
Joanna Modrzyńska

Blockchain technology is currently one of the trends considered to have a tremendous future ahead. It ensures data security, data sharing protection and automation development—elements that are of colossal importance in the era of cloud solutions, big data and Internet of Things (IoT) reality. Additionally, blockchain technology allows one to create new programmable ecosystems on an unprecedented scale. The implementation of blockchain technology leads not only to improving the flow of documents and data storage, as is the case with the creation of shared service centers (SSCs), but—as this paper shows—allows one to reduce the carbon footprint when servicing SSCs at a considerably higher organizational level at the same time. The example of an SSC in Elbląg, Poland, proves that cloud solutions enabling electronic documents flow and data storage combined with blockchain technology are tools essential for further SSCs development. Furthermore, such tools allow us not only to obtain economic effects (i.e., cost reduction), but also to achieve positive ecological effects (i.e., carbon footprint reduction).


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Siriboon Chaisawat ◽  
Chalee Vorakulpipat

The growing number of e-voting applications indicates the need in resolving issues that exist in the traditional election model. By integrating with blockchain technology, we could extend the model’s capabilities by presenting transparency in logic execution and integrity in data storage. Despite these advantages, blockchain brings in new challenges regarding system performance and data privacy. Due to distributed nature of blockchain, any new updating request needs to be reflected in all network’s peers before proceeding to the subsequence requests. This process produces delay and possibility in request rejection due to update conflict. In addition, data removal is no longer feasible since each record is protected by immutable hashed link. To overcome these limitations, the integration model of blockchain and message queue is proposed in this paper. The design addresses security concerns in data exchanging patterns, voter anonymization, and proof of system actor’s legitimacy. Performance tests are conducted on system prototypes which were deployed on two different settings. The result shows that the system can perform well in production environment, and introduction of message queue handling scheme can cope with blockchain’s errors in unexpected scenarios.


2019 ◽  
pp. 65-72
Author(s):  
E. V. Timoschenko ◽  
A. F. Razhkov

An effective method for solving data security problems is proposed. A new approach to the design of steganographic system based on the three basic methods - the introduction of parts of a shared secret into images with the possibility of further extraction of secret information, authentication of parts of a secret, self-healing of this security system. Such a system provides a greater degree of protection and secure data storage. The Windows application implements the proposed steganographic model, has no analogues and meets all the requirements set for steganographic software.


Sign in / Sign up

Export Citation Format

Share Document