scholarly journals QUANTUM FOG CLOUD MODEL IN INTERNET OF THINGS WITH ANALYSIS OF GREEN COMPUTING

2017 ◽  
Vol 5 (1) ◽  
pp. 230-238
Author(s):  
Sayantan Gupta

The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing. Moreover, we would like to introduce the latest algorithms like Stack Algorithm, Address Algorithm and many others which will help in the analysis of Green-Quantum Computing Technology in the modern society and would create a technological revolution. With the Internet of Things rising in the modern world time, new security issues have also been developed. So, our proposed Model the Fog-Things Model will help us to determine the security issues and indeed secure the entire IoT network.

2021 ◽  
Vol 18 (1) ◽  
pp. 9-20
Author(s):  
Bayadir Issa ◽  
Qabeela Thabit

Over the previous decade, significant research has been conducted in the field of healthcare services and their technological advancement. To be more precise, the Internet of Things (IoT) has demonstrated potential for connecting numerous medical devices, sensors, and healthcare professionals in order to deliver high-quality medical services in remote locations. This has resulted in an increase in patient safety, a decrease in healthcare expenses, an increase in the healthcare services’ accessibility, and an increase in the industry’s healthcare operational efficiency. This paper provides an overview of the possible healthcare uses of Internet of Things (IoT)-based technologies. The evolution of the HIoT application has been discussed in this article in terms of enabling technology, services of healthcare, and applications for resolving different healthcare challenges. Additionally, effort difficulties and drawbacks with the HIoT system are explored. In summary, this study provides a complete source of information on the many applications of HIoT together the purpose is to help future academics who are interested in working in the field and making advances gain knowledge into the issue.


Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


Author(s):  
Giuseppe Del Fiore ◽  
Luca Mainetti ◽  
Vincenzo Mighali ◽  
Luigi Patrono ◽  
Stefano Alletto ◽  
...  

The Internet of Things, whose main goal is to automatically predict users' desires, can find very interesting opportunities in the art and culture field, as the tourism is one of the main driving engines of the modern society. Currently, the innovation process in this field is growing at a slower pace, so the cultural heritage is a prerogative of a restricted category of users. To address this issue, a significant technological improvement is necessary in the culture-dedicated locations, which do not usually allow the installation of hardware infrastructures. In this paper, we design and validate a no-invasive indoor location-aware architecture able to enhance the user experience in a museum. The system relies on the user's smartphone and a wearable device (with image recognition and localization capabilities) to automatically deliver personalized cultural contents related to the observed artworks. The proposal was validated in the MUST museum in Lecce (Italy).


2018 ◽  
Vol 8 (2) ◽  
pp. 113-129 ◽  
Author(s):  
Sangeeta Gupta ◽  
Narsimha Gugulothu

The work presented in this article brings into light the security issues with NoSQL databases- MongoDB, HBase and Cassandra. A literature survey is carried out to identify the modern world scenarios of the applications using NoSQL databases and limitations are identified. A solution is proposed by designing a framework to achieve security for the web crawler applications using Cassandra, a NoSQL data store. Experimental results are presented to show the effectiveness of the work by designing an appropriate algorithm to trigger security for scalable web crawler architecture. Amazon Web Services (AWS), a familiar cloud platform, and bitnami cloud hosting services are used to procure the required servers and virtual machines. Performance changes on the virtual machines are brought into consideration before and after encrypting and decrypting the voluminous data and an improvement in efficiency is observed with the proposed model.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


Author(s):  
Babak Esmaeilpour Ghouchani ◽  
Susan Jodaki ◽  
Maryam Joudaki ◽  
Alireza Balali ◽  
Lila Rajabion

Purpose Nowadays, the Internet of Things (IoT) offers new intelligent services and business model opportunities by extending the internet connectivity into physical devices and daily objects. Recently, this technology has had a deep impact on all the aspects of human societies from industry to management and business. Therefore, the purpose of this paper is to predict the impact of using IoT services on the development of electronic business (e-business). Design/methodology/approach For evaluating the model’s elements, a questionnaire was designed. It was revised by experts with significant experiences. For statistical analysis, SmartPLS 3.2 is used. Findings The findings have confirmed the validity of the proposed model. The results also have indicated that the quality of IoT services (scalability, availability, reliability and ease of use), security of IoT services (trust, reputation, privacy and encryption) and IT knowledge of users (usage skills, awareness, experience and accuracy) have a positive and significant impact on development of e-business. Furthermore, the obtained results have revealed that the operating cost of IoT services (transmission time, storage capacity, functionality and stability) is significantly influenced by the development of e-business. Research limitations/implications By capturing a number of important factors in the proposed model, this study can provide a significant theoretical influence for researchers in the related area of interest. In fact, this study provides a worthwhile direction by assessing e-business performance, which, so far, has not been well assessed in many developing countries. Practical implications From a practical perspective, the statistical results support the crucial role of the following factors: quality of IoT services, the security of IoT services, operating cost of IoT services and IT knowledge of users. Hence, aspects relating to these factors must be the focus of attention of any organization in their endeavor to development of e-business. Originality/value This study meaningfully contributes to the knowledge and literature by focusing more on development e-business and IoT as original technology for further understanding, investigating other important features and applying advanced statistical analyses technique. By doing so, this study was able to develop the current understanding regarding the main aspects of development e-business and IoT services.


Author(s):  
D. R. Kolisnyk ◽  
◽  
K. S. Misevych ◽  
S. V. Kovalenko

The article considers the issues of system architecture IoT-Fog-Cloud, considers the interaction between the three levels of IoT, Fog and Cloud for the effective implementation of programs for big data analysis and cybersecurity. The article also discusses security issues, solutions and directions for future research in the field of the Internet of Things and nebulous computing.


2019 ◽  
Vol 8 (2S8) ◽  
pp. 1809-1812

The significance of Internet of Things (IoT) makes different objects connected and it has also been known as the tech revolution. One of the many applications of IoT is in healthcare to examine the patient’s health report, internet of things makes medical technology more efficient and less complicated by giving access to real-time analysis of the patient’s health, in which it focuses on acquiring the data regarding the patient’s health and eliminate the possible human flaws. In the internet of things, a patient’s health statistics get transmitted through various medical equipment through a gateway, where they are stored and monitored. The main challenges in the implementation of the internet of things for healthcare services are checking all patients from different places. Therefore, the internet of things in the healthcare field gives the basic solutions for effective patient monitoring at less cost and also reduces the tensions between patient outcomes and disease management. This paper gives emphases on the different techniques used to monitor the patients while working for the healthcare department.


Sign in / Sign up

Export Citation Format

Share Document