scholarly journals Person Re-Identification Microservice over Artificial Intelligence Internet of Things Edge Computing Gateway

Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2264
Author(s):  
Ching-Han Chen ◽  
Chao-Tsu Liu

With the increase in the number of surveillance cameras being deployed globally, an important topic is person re-identification (Re-ID), which identifies the same person from multiple different angles and different directions across multiple cameras. However, because of the privacy issues involved in the identification of individuals, Re-ID systems cannot send the image data to cloud, and these data must be processed on edge servers. However, there has been a significant increase in computing resources owing to the processing of artificial intelligence (AI) algorithms through edge computing (EC). Consequently, the traditional AI internet of things (AIoT) architecture is no longer sufficient. In this study, we designed a Re-ID system at the AIoT EC gateway, which utilizes a microservice to perform Re-ID calculations on EC and balances efficiency with privacy protection. Experimental results indicate that this architecture can provide sufficient Re-ID computing resources to allow the system to scale up or down flexibly to support different scenarios and demand loads.

2021 ◽  
Author(s):  
Su Liu ◽  
Jian Wang

Ethereum is a public blockchain platform with smart contract. However, it has transaction privacy issues due to the openness of the underlying ledger. Decentralized mixing schemes are presented to hide transaction relationship and transferred amount, but suffer from high transaction cost and long transaction latency. To overcome the two challenges, we propose the idea of batch accounting, adopting batch processing at the time of accounting. For further realization, we introduce payment channel technology into decentralized mixer. Since intermediate transactions between two parties do not need network consensus, our scheme can reduce both transaction cost and transaction latency. Moreover, we provide informal definitions and proofs of our scheme's security. Finally, our scheme is implemented based on zk-SNARKs and Ganache, and experimental results show that the higher number of transactions in batch, the better our scheme performs.


Author(s):  
Atiqur Rahman ◽  
Guangfu Wu ◽  
Ali Md Liton

Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Rongxin Tu ◽  
Wenying Wen ◽  
Changsheng Hua

Cloud platforms provide a good stage for storing and sharing big image data for users, although some privacy issues arise. Image encryption technology can prevent privacy leakage and can ensure secure image data sharing on cloud platforms. Hence, in this paper, an unequal encryption scheme based on saliency detection is proposed. First, based on the mechanism of visual perception and the theory of feature integration, the visual attention model is employed to realize the recognition of significant regions and insignificant regions. Then, a dynamic DNA encryption algorithm is proposed to exploit heavyweight encryption for significant regions, while semi-tensor product compressed sensing is introduced to exploit lightweight encryption and compression for insignificant regions. Experimental results demonstrate that the proposed framework can serve to secure big image data services.


Author(s):  
Abdulmalik Alwarafy ◽  
Khaled A. Al-Thelaya ◽  
Mohamed Abdallah ◽  
Jens Schneider ◽  
Mounir Hamdi

Author(s):  
Monjur Ahmed ◽  
Nurul I. Sarkar

Cloud computing, internet of things (IoT), edge computing, and fog computing are gaining attention as emerging research topics and computing approaches in recent years. These computing approaches are rather conceptual and contextual strategies rather than being computing technologies themselves, and in practice, they often overlap. For example, an IoT architecture may incorporate cloud computing and fog computing. Cloud computing is a significant concept in contemporary computing and being adopted in almost every means of computing. All computing architectures incorporating cloud computing are termed as cloud-based computing (CbC) in general. However, cloud computing itself is the basis of CbC because it significantly depends on resources that are remote, and the remote resources are often under third-party ownership where the privacy of sensitive data is a big concern. This chapter investigates various privacy issues associated with CbC. The data privacy issues and possible solutions within the context of cloud computing, IoT, edge computing, and fog computing are also explored.


2020 ◽  
Vol 7 (10) ◽  
pp. 9224-9226
Author(s):  
Lei Yang ◽  
Xu Chen ◽  
Samir M. Perlaza ◽  
Junshan Zhang

Author(s):  
Dr. Sivaganesan D.

The advancements in the technologies and the increase in the digital miniaturization day by day are causing devices to become smarter and smarter and the emergence of the internet of things and the cloud has made things even better with insightful suggestions for organization as well as the way the people work and lead their life. The limitations in the cloud paradigm in terms of processing complexity, the latency in the service provisioning and improper resource scheduling, remains as a reason leading to shifting of applications from cloud to edge. More over the emergence of the artificial intelligence in the edge computing has turned out to be center of attention as it improves the speed and the range of the IOT applications. The paper also puts forth the design of the AI-enabled Edge computing for developing a Smart Farming.


CONVERTER ◽  
2021 ◽  
pp. 70-79
Author(s):  
Dongxian Yu, Jiatao Kang, Junlei Dong

The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ideas of the Internet of things are perception, control, transmission and intelligence. Through technical means to achieve the coordination between things, people and things, and people, so as to form a larger complex network system on the basis of sensor network, Internet and mobile communication network. The data Shared by Internet of things information is closely related to personal life behaviors, and the information has a greater perceived correlation with each other. This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing. However, due to the characteristics of network structure, terminal equipment, communication mode and application scenario, some security and privacy issues unique to the Internet of things cannot be solved directly through existing Internet security technologies. It is necessary to conduct in-depth research on the key technologies of Internet of things security and privacy protection. This article briefly describes the Internet of things security and privacy issues, then, it gives the research and application status of Internet of things security and privacy protection at home and abroad, then lists the key technical problems in Internet of things security and privacy protection. And for communication between large scale collaborative services. Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture for managing service synergy interactions, achieve confidentiality of data exchange between services and privacy protection of service policies.


Computing ◽  
2018 ◽  
Vol 101 (7) ◽  
pp. 729-742 ◽  
Author(s):  
Ping Zhang ◽  
Mimoza Durresi ◽  
Arjan Durresi

Sign in / Sign up

Export Citation Format

Share Document