scholarly journals Optimized and secured data collection and recovery for IoT applications

2018 ◽  
Vol 7 (2.7) ◽  
pp. 433
Author(s):  
M. Tanooj Kumar ◽  
T. Praveena ◽  
T. Lakshman ◽  
M. Sai Krishna

This paper proposes a new compressive sensing based method for data collection and recovery related to IoT based systems. It performs data capturing, its compression and encryption at the same time, transmission, storage and its recovery. The measurement matrix, used in compressive sensing, is generated based on the user private key and is utilized for encrypting the captured data. Basis Pursuit is used for reconstruction of the data. The results shows that it is very suitable for the IoT based applications by considering data security, transmission cost and storage cost.  

2018 ◽  
Vol 8 (8) ◽  
pp. 1293 ◽  
Author(s):  
Tong Jia ◽  
Dongyue Chen ◽  
Ji Wang ◽  
Dong Xu

Compressive sensing theory has addressed the limitations of traditional methods in the field of information technology, and led to a revolution. On the basis of compressive sensing theory research, this study utilized the exterior determinacy and inherent randomness of chaotic sequences, designed a pseudo-random circulant measurement matrix based on chaotic sequence. Compared with other deterministic measurement matrices, the restoration effect of the designed measurement matrix remarkably improved and showed advantages in hardware and storage. Then, this study developed a single-pixel imaging scheme that could accurately obtain color information. The proposed improved measurement matrix combined with the hardware system could accurately reconstruct color images and had good robustness according to various experimental data.


2014 ◽  
Vol 14 (4) ◽  
pp. 901-916 ◽  
Author(s):  
D. Molinari ◽  
S. Menoni ◽  
G. T. Aronica ◽  
F. Ballio ◽  
N. Berni ◽  
...  

Abstract. In recent years, awareness of a need for more effective disaster data collection, storage, and sharing of analyses has developed in many parts of the world. In line with this advance, Italian local authorities have expressed the need for enhanced methods and procedures for post-event damage assessment in order to obtain data that can serve numerous purposes: to create a reliable and consistent database on the basis of which damage models can be defined or validated; and to supply a comprehensive scenario of flooding impacts according to which priorities can be identified during the emergency and recovery phase, and the compensation due to citizens from insurers or local authorities can be established. This paper studies this context, and describes ongoing activities in the Umbria and Sicily regions of Italy intended to identifying new tools and procedures for flood damage data surveys and storage in the aftermath of floods. In the first part of the paper, the current procedures for data gathering in Italy are analysed. The analysis shows that the available knowledge does not enable the definition or validation of damage curves, as information is poor, fragmented, and inconsistent. A new procedure for data collection and storage is therefore proposed. The entire analysis was carried out at a local level for the residential and commercial sectors only. The objective of the next steps for the research in the short term will be (i) to extend the procedure to other types of damage, and (ii) to make the procedure operational with the Italian Civil Protection system. The long-term aim is to develop specific depth–damage curves for Italian contexts.


2020 ◽  
Vol 63 (10) ◽  
pp. 1490-1499
Author(s):  
Zhichao Yang ◽  
Dung H Duong ◽  
Willy Susilo ◽  
Guomin Yang ◽  
Chao Li ◽  
...  

Abstract Hierarchical identity-based signature (HIBS) plays a core role in a large community as it significantly reduces the workload of the root private key generator. To make HIBS still available and secure in post-quantum era, constructing lattice-based schemes is a promising option. In this paper, we present an efficient HIBS scheme in polynomial rings. Although there are many lattice-based signatures proposed in recent years, to the best of our knowledge, our HIBS scheme is the first ring-based construction. In the center of our construction are two new algorithms to extend lattice trapdoors to higher dimensions, which are non-trivial and of independent interest. With these techniques, the security of the new scheme can be proved, assuming the hardness of the Ring-SIS problem. Since operations in the ring setting are much faster than those over integers and the new construction is the first ring-base HIBS scheme, our scheme is more efficient and practical in terms of computation and storage cost when comparing to the previous constructions.


Sign in / Sign up

Export Citation Format

Share Document