Mix Networks: Existing Scenarios and Future Directions on Security and Privacy

2019 ◽  
Vol 14 ◽  
Author(s):  
Khaleel Ahmad ◽  
Afsar Kamal

Background: Privacy enhancing techniques are developed in order to provide strong protection to cyberspace. These techniques aim to allow users to keep their identities hidden during the communication when they are sending email, making payments online, browsing the Web or posting to newsgroups. MixNet is the most practical solution for concealing identities of message and sender’s identities. Objective: It provides sender and receiver anonymity as well as message security. The main goal of MixNet is to overcome vulnerability and enhance the performance of communication. It can efficiently handle the messages of various length and produce desirable results with privacy. The main objective of this paper is to acquire information and concepts regarding MixNet. We also provide guidelines for future research and references. Methods : The designing of MixNet depends on what cryptosystem method is used. Symmetric and Asymmetric both are used. Other methods could be also used such as PIR, CSP and FDR model, RPC, Token-based approach or others. Result: In this paper we provide an overview of MixNet approaches and presented a survey on MixNet based techniques and different models. We also constructed the comparison tables as per our requirements for better understanding. For this purpose, we found a total of 120 articles related to the MixNet published between 1990 and 2018 from the most relevant scientific resources. However, only 86 papers were analyzed due to comprehensiveness and relevancy to this article. Conclusion: Focused on the security and privacy of communication and how it can be achieved. This survey also reveals research progress and research gap on MixNet.

2020 ◽  
Vol 2020 ◽  
pp. 1-31 ◽  
Author(s):  
Sahar Shah ◽  
Mahnoor Khan ◽  
Ahmad Almogren ◽  
Ihsan Ali ◽  
Lianwen Deng ◽  
...  

In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.


10.29007/jlq6 ◽  
2019 ◽  
Author(s):  
Thabang Mofokeng

The technology devices introduced in recent years are not only vulnerable to Internet risks but are also unable to elevate the growth of B2C e-commerce. These concerns are particularly relevant today, as the world transitions into the Fourth Industrial Revolution. To date, existing research has largely focused on obstacles to customer loyalty. Studies have tested e-commerce models guided by the establishment of trusting, satisfied and loyal consumers in various international contexts. In South Africa, however, as an emerging market, there has been limited research on the success factors of online shopping.This study examines the influence of security and privacy on trust, seen as a moderator of customer satisfaction, which in turn, has an effect on loyalty towards websites. Based on an exhaustive review of literature, a conceptual model is proposed on the relationships between security and privacy on the one hand, and customer trust, satisfaction and loyalty on the other. A total of 250 structured, self-administered questionnaires was distributed to a purposively selected sample of respondents using face-to-face surveys in Johannesburg, South Africa. A multivariate data analysis technique was used to draw inferences from the data. With an 80.1% response rate, the findings showed that privacy and security do influence customer trust; security strongly influences customer trust and weakly influences satisfaction. In South Africa, customer loyalty towards websites is strongly determined by satisfaction and weakly determined by trust. Trust significantly moderates the effect of customer satisfaction on loyalty. The study implications and limitations are presented and future research directions are suggested.


2020 ◽  
Vol 21 (13) ◽  
pp. 996-1008
Author(s):  
Mengli Wang ◽  
Qiuzheng Du ◽  
Lihua Zuo ◽  
Peng Xue ◽  
Chao Lan ◽  
...  

Background: As a new tumor therapy, targeted therapy is becoming a hot topic due to its high efficiency and low toxicity. Drug effects of targeted tumor drugs are closely related to pharmacokinetics, so it is important to understand their distribution and metabolism in vivo. Methods: A systematic review of the literature on the metabolism and distribution of targeted drugs over the past 20 years was conducted, and the pharmacokinetic parameters of approved targeted drugs were summarized in combination with the FDA's drug instructions. Targeting drugs are divided into two categories: small molecule inhibitors and monoclonal antibodies. Novel targeting drugs and their mechanisms of action, which have been developed in recent years, are summarized. The distribution and metabolic processes of each drug in the human body are reviewed. Results: In this review, we found that the distribution and metabolism of small molecule kinase inhibitors (TKI) and monoclonal antibodies (mAb) showed different characteristics based on the differences of action mechanism and molecular characteristics. TKI absorbed rapidly (Tmax ≈ 1-4 h) and distributed in large amounts (Vd > 100 L). It was mainly oxidized and reduced by cytochrome P450 CYP3A4. However, due to the large molecular diameter, mAb was distributed to tissues slowly, and the volume of distribution was usually very low (Vd < 10 L). It was mainly hydrolyzed and metabolized into peptides and amino acids by protease hydrolysis. In addition, some of the latest drugs are still in clinical trials, and the in vivo process still needs further study. Conclusion: According to the summary of the research progress of the existing targeting drugs, it is found that they have high specificity, but there are still deficiencies in drug resistance and safety. Therefore, the development of safer and more effective targeted drugs is the future research direction. Meanwhile, this study also provides a theoretical basis for clinical accurate drug delivery.


Author(s):  
Deepa Mangala ◽  
Pooja Kumari

Fraud has become a worldwide phenomenon and prime issue of concern. It dwells in all countries and affects all types of organizations irrespective of their size, profitability or industry. The primary objective of this paper is to provide an in-depth understanding of literature related to corporate fraud in order to understand why fraud occurs and how to combat it. Research studies published during the period commencing from the year 1984 to 2014 have been reviewed. The study aims to provide an in-depth discussion on significant red flags that may exist before fraud occurrence. It, also, provides a comprehensive view about fraud detection and prevention methods. Findings reveal that red flag is an important mechanism to prevent fraud. Application of single fraud detection technique will not curb the fraud effectively. Also, the top executives were found to be responsible for implementing anti-fraud policies and techniques within business organization. Further, the present study tries to discern the research gap in existing literature and explore the area of future research.


Author(s):  
Tera D. Letzring

This chapter identifies several well-established findings and overarching themes within personality trait accuracy research, and highlights especially promising directions for future research. Topics include (1) theoretical frameworks for accuracy, (2) moderators of accuracy and the context or situation in which judgments are made, (3) the important consequences of accuracy, (4) interventions and training programs to increase judgmental ability and judgability, (5) the generalizability of previous findings, and (6) standardized tests of the accuracy of judging personality traits. The chapter ends by stating that it is an exciting time to be a researcher studying the accuracy of personality trait judgments.


Author(s):  
Matilda A. Haas ◽  
Harriet Teare ◽  
Megan Prictor ◽  
Gabi Ceregra ◽  
Miranda E. Vidgen ◽  
...  

AbstractThe complexities of the informed consent process for participating in research in genomic medicine are well-documented. Inspired by the potential for Dynamic Consent to increase participant choice and autonomy in decision-making, as well as the opportunities for ongoing participant engagement it affords, we wanted to trial Dynamic Consent and to do so developed our own web-based application (web app) called CTRL (control). This paper documents the design and development of CTRL, for use in the Australian Genomics study: a health services research project building evidence to inform the integration of genomic medicine into mainstream healthcare. Australian Genomics brought together a multi-disciplinary team to develop CTRL. The design and development process considered user experience; security and privacy; the application of international standards in data sharing; IT, operational and ethical issues. The CTRL tool is now being offered to participants in the study, who can use CTRL to keep personal and contact details up to date; make consent choices (including indicate preferences for return of results and future research use of biological samples, genomic and health data); follow their progress through the study; complete surveys, contact the researchers and access study news and information. While there are remaining challenges to implementing Dynamic Consent in genomic research, this study demonstrates the feasibility of building such a tool, and its ongoing use will provide evidence about the value of Dynamic Consent in large-scale genomic research programs.


Energies ◽  
2021 ◽  
Vol 14 (12) ◽  
pp. 3530
Author(s):  
Fukang Ma ◽  
Shuanlu Zhang ◽  
Zhenfeng Zhao ◽  
Yifang Wang

The hydraulic free-piston engine (HFPE) is a kind of hybrid-powered machine which combines the reciprocating piston-type internal combustion engine and the plunger pump as a whole. In recent years, the HFPE has been investigated by a number of research groups worldwide due to its potential advantages of high efficiency, energy savings, reduced emissions and multi-fuel operation. Therefore, our study aimed to assess the operating characteristics, core questions and research progress of HFPEs via a systematic review and meta-analysis. We included operational control, starting characteristics, misfire characteristics, in-cylinder working processes and operating stability. We conducted the literature search using electronic databases. The research on HFPEs has mainly concentrated on four kinds of free-piston engine, according to piston arrangement form: single piston, dual pistons, opposed pistons and four-cylinder complex configuration. HFPE research in China is mainly conducted in Zhejiang University, Tianjin University, Jilin University and the Beijing Institute of Technology. In addition, in China, research has mainly focused on the in-cylinder combustion process while a piston is free by considering in-cylinder combustion machinery and piston dynamics. Regarding future research, it is very important that we solve the instabilities brought about by chance fluctuations in the combustion process, which will involve the hydraulic system’s efficiency, the cyclical variation, the method of predicting instability and the recovery after instability.


Author(s):  
Shuangjun Li ◽  
Linglong Chen ◽  
Zhong Ma ◽  
Guisheng Li ◽  
Dieqing Zhang

AbstractThe emission of nitrogen oxides (NOx) increases year by year, causing serious problems to our livelihoods. The photocatalytic oxidation of NOx has attracted more attention recently because of its efficient removal of NOx, especially for low concentrations of NOx. In this review, the mechanism of the photocatalytic oxidation of NOx is described. Then, the recent progress on the development of photocatalysts is reviewed according to the categories of inorganic semiconductors, bismuth-based compounds, nitrogen carbide polymer, and metal organic frameworks (MOFs). In addition, the photoelectrocatalytic oxidation of NOx, a method involving the application of an external voltage on the photocatalytic system to further increase the removal efficiency of NOx, and its progress are summarized. Finally, we outline the remaining challenges and provide our perspectives on the future directions for the photocatalytic oxidation of NOx.


Agriculture ◽  
2021 ◽  
Vol 11 (7) ◽  
pp. 575
Author(s):  
Shangyi Lou ◽  
Jin He ◽  
Hongwen Li ◽  
Qingjie Wang ◽  
Caiyun Lu ◽  
...  

Subsoiling has been acknowledged worldwide to break compacted hardpan, improve soil permeability and water storage capacity, and promote topsoil deepening and root growth. However, there exist certain factors which limit the wide in-field application of subsoiling machines. Of these factors, the main two are poor subsoiling quality and high energy consumption, especially the undesired tillage depth obtained in the field with cover crops. Based on the analysis of global adoption and benefits of subsoiling technology, and application status of subsoiling machines, this article reviewed the research methods, technical characteristics, and developing trends in five key aspects, including subsoiling shovel design, anti-drag technologies, technologies of tillage depth detection and control, and research on soil mechanical interaction. Combined with the research progress and application requirements of subsoiling machines across the globe, current problems and technical difficulties were analyzed and summarized. Aiming to solve these problems, improve subsoiling quality, and reduce energy consumption, this article proposed future directions for the development of subsoiling machines, including optimizing the soil model in computer simulation, strengthening research on the subsoiling mechanism and comprehensive effect, developing new tillage depth monitoring and control systems, and improving wear-resisting properties of subsoiling shovels.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-42
Author(s):  
Abdullah Qasem ◽  
Paria Shirani ◽  
Mourad Debbabi ◽  
Lingyu Wang ◽  
Bernard Lebel ◽  
...  

In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.


Sign in / Sign up

Export Citation Format

Share Document