scholarly journals A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement

2021 ◽  
pp. 1-24
Author(s):  
Md Morshed Alam ◽  
Weichao Wang

Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.

2020 ◽  
Vol 3 (2) ◽  
pp. 38-41
Author(s):  
Anand Mohan

IoT has turned into an amazing system of worldwide and worldwide changes, including numerous internet advisors, interchanges, and information trade. This paper presents state-of-the-art background, introduction, characteristics, challenges, threats, attacks, related work, and security architecture and research limitation of IoT technology. This paper discusses key security issues and attacks over different layers of IOT along with its existing prevention techniques. This paper deals with the security of services used in IoT. In detail, IoT devices are mentioned in this paper, which are the premise of IoT and their significance. In addition, IoT Security Architecture highlights some recent studies. This paper is far from comprehensive and mainly focuses on attacks and IoT devices prevention mechanism and covers related discussion and arguments.


2019 ◽  
Vol 23 (2) ◽  
pp. 1441-1463 ◽  
Author(s):  
Rui Hu ◽  
Zheng Yan ◽  
Wenxiu Ding ◽  
Laurence T. Yang

AbstractInternet of Things (IoT), as a typical representation of cyberization, enables the interconnection of physical things and the Internet, which provides intelligent and advanced services for industrial production and human lives. However, it also brings new challenges to IoT applications due to heterogeneity, complexity and dynamic nature of IoT. Especially, it is difficult to determine the sources of specified data, which is vulnerable to inserted attacks raised by different parties during data transmission and processing. In order to solve these issues, data provenance is introduced, which records data origins and the history of data generation and processing, thus possible to track the sources and reasons of any problems. Though some related researches have been proposed, the literature still lacks a comprehensive survey on data provenance in IoT. In this paper, we first propose a number of design requirements of data provenance in IoT by analyzing the features of IoT data and applications. Then, we provide a deep-insight review on existing schemes of IoT data provenance and employ the requirements to discuss their pros and cons. Finally, we summarize a number of open issues to direct future research.


Author(s):  
Usman Naseem ◽  
Imran Razzak ◽  
Shah Khalid Khan ◽  
Mukesh Prasad

Word representation has always been an important research area in the history of natural language processing (NLP). Understanding such complex text data is imperative, given that it is rich in information and can be used widely across various applications. In this survey, we explore different word representation models and its power of expression, from the classical to modern-day state-of-the-art word representation language models (LMS). We describe a variety of text representation methods, and model designs have blossomed in the context of NLP, including SOTA LMs. These models can transform large volumes of text into effective vector representations capturing the same semantic information. Further, such representations can be utilized by various machine learning (ML) algorithms for a variety of NLP-related tasks. In the end, this survey briefly discusses the commonly used ML- and DL-based classifiers, evaluation metrics, and the applications of these word embeddings in different NLP tasks.


This book presents a critical assessment of progress on the use of nuclear magnetic resonance spectroscopy to determine the structure of proteins, including brief reviews of the history of the field along with coverage of current clinical and in vivo applications. The book, in honor of Oleg Jardetsky, one of the pioneers of the field, is edited by two of the most highly respected investigators using NMR, and features contributions by most of the leading workers in the field. It will be valued as a landmark publication that presents the state-of-the-art perspectives regarding one of today's most important technologies.


This volume vividly demonstrates the importance and increasing breadth of quantitative methods in the earth sciences. With contributions from an international cast of leading practitioners, chapters cover a wide range of state-of-the-art methods and applications, including computer modeling and mapping techniques. Many chapters also contain reviews and extensive bibliographies which serve to make this an invaluable introduction to the entire field. In addition to its detailed presentations, the book includes chapters on the history of geomathematics and on R.G.V. Eigen, the "father" of mathematical geology. Written to commemorate the 25th anniversary of the International Association for Mathematical Geology, the book will be sought after by both practitioners and researchers in all branches of geology.


Insects ◽  
2021 ◽  
Vol 12 (2) ◽  
pp. 100
Author(s):  
Piotr Olszewski ◽  
Petr Bogusch ◽  
Krzysztof Szpila

The first comprehensive information on the bionomics of the digger wasp Oxybelus variegatus Wesmael, 1852 is presented. Females nested in small aggregations in crevices between paving stones of a frequently used pedestrian pathway in lowland agricultural wasteland. Nests were dug in the ground using mandibles, legs and abdomen. The nest consists of a main burrow with one or, rarely, two cells. The mature larva is described for the first time. The egg stage lasts for about two days before the larva hatches. The female provisioned each cell with an average of 11 paralysed male flies of Delia platura (Meigen, 1826) (Diptera: Anthomyiidae). Numerous females of dipteran kleptoparasites were observed in the nesting area of O. variegatus. However, only a few nests were infested by larvae of Senotainia conica (Fallen, 1810).


2021 ◽  
pp. 1-9
Author(s):  
Horacio Merchant-Larios ◽  
Verónica Díaz-Hernández ◽  
Diego Cortez

The discovery in mammals that fetal testes are required in order to develop the male phenotype inspired research efforts to elucidate the mechanisms underlying gonadal sex determination and differentiation in vertebrates. A pioneer work in 1966 that demonstrated the influence of incubation temperature on sexual phenotype in some reptilian species triggered great interest in the environment’s role as a modulator of plasticity in sex determination. Several chelonian species have been used as animal models to test hypotheses concerning the mechanisms involved in temperature-dependent sex determination (TSD). This brief review intends to outline the history of scientific efforts that corroborate our current understanding of the state-of-the-art in TSD using chelonian species as a reference.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5248
Author(s):  
Aleksandra Pawlicka ◽  
Marek Pawlicki ◽  
Rafał Kozik ◽  
Ryszard S. Choraś

This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented. The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity. Moreover, this paper attempts to complete a comprehensive survey of recommender types, after noticing that other works usually mention two–three types at once and neglect the others.


2021 ◽  
Vol 5 ◽  
pp. 239784732110222
Author(s):  
David Thorne ◽  
Roman Wieczorek ◽  
Toshiro Fukushima ◽  
Han-Jae Shin ◽  
Robert Leverette ◽  
...  

During a Cooperation Centre for Scientific Research Relative to Tobacco (CORESTA) meeting, the in vitro toxicity testing Sub-Group (IVT SG) met to discuss the evolving field of aerosol exposure research. Given the diversity of exposure parameters and biological endpoints being used, it was considered a high priority to investigate and contextualise the responses obtained. This is particularly driven by the inability to compare between studies on different exposure systems due to user preferences and protocol differences. Twelve global tobacco and contract research companies met to discuss this topic and formulate an aligned approach on how this diverging field of research could be appropriately compared. Something that is becoming increasingly important, especially in the light of more focused regulatory scrutiny. A detailed and comprehensive survey was conducted on over 40 parameters ranging from aerosol generation, dilution and data analysis across eight geographically independent laboratories. The survey results emphasise the diversity of in vitro exposure parameters and methodologies employed across the IVT SG and highlighted pockets of harmonisation. For example, many of the biological protocol parameters are consistent across the Sub-Group. However, variables such as cell type and exposure time remain largely inconsistent. The next steps for this work will be to map parameters and system data against biological findings and investigate whether the observed inconsistencies translate into increased biological variability. The results from the survey provide improved awareness of parameters and nuances, that may be of substantial benefit to scientists in intersecting fields and in the development of harmonised approaches.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 28
Author(s):  
Rameez Asif ◽  
Kinan Ghanem ◽  
James Irvine

A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the sources and reasons of any cyber attack. In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and future research challenges.


Sign in / Sign up

Export Citation Format

Share Document