scholarly journals A Privacy-Preserving Message Forwarding Framework with Key Caching for Low Latency Cloud of Things

For exchanging messages over opportunistic exchanges in cloud calculating-empowered Internet of Things (IoT), opportunistic Cloud of Things (CoT) is encouraging for customers by means of an emergent conveying policy. In recent times, for predicting upcoming interactions by the determination of enlightening message promoting effectiveness as well as system quantity, several informally-awake structures have been placed onward, influencing consumers’ communal features as well as interaction account. Nevertheless, in the extrapolation procedure as well as communication phase of unprincipled CoT distinct secrecy remains commonly ignored. Towards assuring distinct secrecy as well as improving communication effectiveness, in this broadsheet, we develop a secrecy preservative communication promoting context aimed at unprincipled CoT. For improving transmission effectiveness of incurable customers, we mainly assemble twofold-level design of a cloud server. The proposed method can efficiently safeguard distinct secrecy through incorporating a safety-centered flexibility extrapolation procedure using an overpowering assessment procedure. This paper also introduces data key caching to reduce the latency during the transmission process. The proposed method outperforms the conventional methods.

For exchanging messages over opportunistic exchanges in cloud calculating-empowered Internet of Things (IoT), opportunistic Cloud of Things (CoT) is encouraging for customers by means of an emergent conveying policy. In recent times, for predicting upcoming interactions by the determination of enlightening message promoting effectiveness as well as system quantity, several informally-awake structures have been placed onward, influencing consumers’ communal features as well as interaction account. Nevertheless, in the extrapolation procedure as well as communication phase of unprincipled CoT distinct secrecy remains commonly ignored. Towards assuring distinct secrecy as well as improving communication effectiveness, in this broadsheet, we develop a secrecy preservative communication promoting context aimed at unprincipled CoT. For improving transmission effectiveness of incurable customers, we mainly assemble twofold-level design of a cloud server. The proposed method can efficiently safeguard distinct secrecy through incorporating a safety-centered flexibility extrapolation procedure using an overpowering assessment procedure. This paper also introduces data key caching to reduce the latency during the transmission process. The proposed method outperforms the conventional methods.


Author(s):  
Vladislav N. Slepnev ◽  
◽  
Alexander F. Maksimenko ◽  
Elena V. Glebova ◽  
Alla Т. Volokhina ◽  
...  

The choice of risk assessment procedure is one of the essential stages of efficient structuring of processes on prevention, localization and elimination of the consequences of accidents at main pipeline transport facilities. The authors analyzed themed publications and regulatory documents, governing procedures of risk assessment and forecasting of the consequences of possible accidents, and defined main problems in this area. Procedure for the risk assessment of accidents at main pipeline facilities was developed, the basis of which is the expert evaluation method. The procedure includes the determination of the main criteria for the assessment the probability of accident initiation and development and the evaluation of the severity of its consequences, an expert evaluation of criteria significance, their classification, and creation of a rating for hazardous pipeline sections. The application of the procedure application allows to specify the list of facilities that require high priority forecasting of accidents consequences, thus to optimize the distribution of resources and the overall increase of efficiency in planning while defining forces and special technical devices, necessary for containment and rectification of emergencies. Expert evaluation method application allows considering the specifics of certain enterprises, their technical and technological peculiarities, thereby increasing forecasting accuracy.


Author(s):  
Lamya Alkhariji ◽  
Nada Alhirabi ◽  
Mansour Naser Alraja ◽  
Mahmoud Barhamgi ◽  
Omer Rana ◽  
...  

Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little conceptual understanding of what is meant by privacy. A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions to learn how to incorporate different privacy-preserving ideas into their IoT application designs. This article lays the foundations toward developing such a privacy assistant by synthesising existing PbD knowledge to elicit requirements. It is believed that such a privacy assistant should not just prescribe a list of privacy-preserving ideas that developers should incorporate into their design. Instead, it should explain how each prescribed idea helps to protect privacy in a given application design context—this approach is defined as “Explainable Privacy.” A total of 74 privacy patterns were analysed and reviewed using ten different PbD schemes to understand how each privacy pattern is built and how each helps to ensure privacy. Due to page limitations, we have presented a detailed analysis in Reference [3]. In addition, different real-world Internet of Things (IoT) use-cases, including a healthcare application, were used to demonstrate how each privacy pattern could be applied to a given application design. By doing so, several knowledge engineering requirements were identified that need to be considered when developing a privacy assistant. It was also found that, when compared to other IoT application domains, privacy patterns can significantly benefit healthcare applications. In conclusion, this article identifies the research challenges that must be addressed if one wishes to construct an intelligent privacy assistant that can truly augment software developers’ capabilities at the design phase.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3715
Author(s):  
Ioan Ungurean ◽  
Nicoleta Cristina Gaitan

In the design and development process of fog computing solutions for the Industrial Internet of Things (IIoT), we need to take into consideration the characteristics of the industrial environment that must be met. These include low latency, predictability, response time, and operating with hard real-time compiling. A starting point may be the reference fog architecture released by the OpenFog Consortium (now part of the Industrial Internet Consortium), but it has a high abstraction level and does not define how to integrate the fieldbuses and devices into the fog system. Therefore, the biggest challenges in the design and implementation of fog solutions for IIoT is the diversity of fieldbuses and devices used in the industrial field and ensuring compliance with all constraints in terms of real-time compiling, low latency, and predictability. Thus, this paper proposes a solution for a fog node that addresses these issues and integrates industrial fieldbuses. For practical implementation, there are specialized systems on chips (SoCs) that provides support for real-time communication with the fieldbuses through specialized coprocessors and peripherals. In this paper, we describe the implementation of the fog node on a system based on Xilinx Zynq UltraScale+ MPSoC ZU3EG A484 SoC.


2021 ◽  
Vol 25 (1) ◽  
pp. 34-38
Author(s):  
Jonathan Oostvogels ◽  
Fan Yang ◽  
Sam Michiels ◽  
Wouter Joosen ◽  
Danny Hughes

Latency-sensitive applications for the Internet of Things (IoT) often require performance guarantees that contemporary wireless networks fail to offer. Application scenarios involving real-time control of industrial machinery, robotics, or delay-sensitive actuation therefore typically still rely on cables: today's wireless networks cannot deliver messages in a sufficiently small and predictable amount of time. Drop-in wireless replacements for these cabled systems would nevertheless provide great benefit by eliminating the high cost and complexity associated with running cables in harsh industrial environments [1]. The symbolsynchronous bus, introduced in this article and embodied in a platform called Zero-Wire, is a novel wireless networking paradigm that addresses this gap. Using concurrent optical transmissions, it strives to bring low-latency deterministic networking to the wireless IoT.


2013 ◽  
Vol 475-476 ◽  
pp. 1150-1153 ◽  
Author(s):  
Yan Zeng Gao ◽  
Ling Yan Wei

Smart home can apply new internet of things concepts along cloud service technologies. This paper introduces a novel method for smart home system building. The system is driven by use case and it is composed of home control center, zigbee end devices, smart phone applications and cloud server. The home control center is based on arm-linux embedded system, it is the relay of cloud server and home devices. Wireless network of smart home devices was designed according to zigbee. A smart phone application was developed as the role of the user interface.


2016 ◽  
Vol 3 (11) ◽  
pp. 1351-1362 ◽  
Author(s):  
Zhengyang Zhou ◽  
Lukáš Palatinus ◽  
Junliang Sun

The combination of PXRD and ED is applied to determine modulated structures which resist solution by more conventional methods.


Sign in / Sign up

Export Citation Format

Share Document