scholarly journals A Secure Communication using Smart Mobile and Cloud Process

Information storage and security is one of key areas where much research is been done in this digital world where we communicate the data over using third party devices such as cloud by using smart devices such as mobiles so the security is an quite challenging factor where we access our data across the globe and with the social media coming into factor for the storage and accessibility of the data so there are many risk factors coming into process so we need to implement a smart and secure system for the authentication threats so here in this paper we implement a smart system in which face recognition aunthication system is implement between the cloud and mobile activity which give more security in terms of data storage and communication and then we evaluate using different graphs and also analyses the attacks

Information storage and security is one of key areas where much research is been done in this digital world where we communicate the data over using third party devices such as cloud by using smart devices such as mobiles so the security is an quite challenging factor where we access our data across the globe and with the social media coming into factor for the storage and accessibility of the data so there are many risk factors coming into process so we need to implement a smart and secure system for the authentication threats so here in this paper we implement a smart system in which face recognition aunthication system is implement between the cloud and mobile activity which give more security in terms of data storage and communication and then we evaluate using different graphs and also analyses the attacksThe Remote Sensor Networks (WSN) are subjected to different assaults in which Blackhole a sort of Denial of Service attack(DoS) assaults is exceptionally hard to distinguish and secure. Inblackholeattack,theviolater catches and reprograms lot of hubs in system to hinder bundles they get as opposed to sending them towards the base station.The data ensures the malicious node and when it enters the zone it will be known and cannot be allowed into the field and very less output may occur. The lesser amount measure of work is improved the situation location and anticipation of blackhole assault in the WSN making its recognition and aversion extremely critical according to organize perfomance is assured.In our concept at first the effect of blackhole assault to be estimated on the system limitations pursued by proposition of a publication procedure for discovery & avoidance of blackhole assault in WSN.


2019 ◽  
Vol 16 (10) ◽  
pp. 4345-4349
Author(s):  
Latika Kakkar ◽  
Deepali Gupta ◽  
Sapna Saxena ◽  
Sarvesh Tanwar

The Internet of Things (IoT) comprises of various smart devices which are networked together to detect, accumulate, process, improve and interchange significant data over the Internet. IoT has improved our lifestyle by offering various applications such as intelligent home, smart healthcare, traffic monitoring and smart city devices. The IoT devices have restriction of power, battery life, memory and network constraints, so cloud can be used for accumulating and analyzing the IoT data. Due to the considerable increase in data transfer over Internet and other devices, the confidential information from the IoT sources required to be secure from any third party access. Cloud computing (CC) on the other side provides a protected, abrupt and advantageous data storage and computing services all over the internet. The integration of both these technologies can prove to be beneficial for each other. Therefore, we need an efficient and authentic method for secure communication in the IoT and cloud based big data environment. This paper provides a review of amalgamation of the IoT and cloud by featuring the implementation challenges and integration benefits.


2019 ◽  
Vol 15 (01) ◽  
pp. 1-8
Author(s):  
Ashish C Patel ◽  
C G Joshi

Current data storage technologies cannot keep pace longer with exponentially growing amounts of data through the extensive use of social networking photos and media, etc. The "digital world” with 4.4 zettabytes in 2013 has predicted it to reach 44 zettabytes by 2020. From the past 30 years, scientists and researchers have been trying to develop a robust way of storing data on a medium which is dense and ever-lasting and found DNA as the most promising storage medium. Unlike existing storage devices, DNA requires no maintenance, except the need to store at a cool and dark place. DNA has a small size with high density; just 1 gram of dry DNA can store about 455 exabytes of data. DNA stores the informations using four bases, viz., A, T, G, and C, while CDs, hard disks and other devices stores the information using 0’s and 1’s on the spiral tracks. In the DNA based storage, after binarization of digital file into the binary codes, encoding and decoding are important steps in DNA based storage system. Once the digital file is encoded, the next step is to synthesize arbitrary single-strand DNA sequences and that can be stored in the deep freeze until use.When there is a need for information to be recovered, it can be done using DNA sequencing. New generation sequencing (NGS) capable of producing sequences with very high throughput at a much lower cost about less than 0.1 USD for one MB of data than the first sequencing technologies. Post-sequencing processing includes alignment of all reads using multiple sequence alignment (MSA) algorithms to obtain different consensus sequences. The consensus sequence is decoded as the reversal of the encoding process. Most prior DNA data storage efforts sequenced and decoded the entire amount of stored digital information with no random access, but nowadays it has become possible to extract selective files (e.g., retrieving only required image from a collection) from a DNA pool using PCR-based random access. Various scientists successfully stored up to 110 zettabytes data in one gram of DNA. In the future, with an efficient encoding, error corrections, cheaper DNA synthesis,and sequencing, DNA based storage will become a practical solution for storage of exponentially growing digital data.


2020 ◽  
Vol 86 ◽  
pp. 01025
Author(s):  
Arlinta C. Barus ◽  
Marianna Simanjuntak ◽  
Verawati Situmorang

Indonesia is a country which is rich of various traditional cultures and values. One of its representation is traditional woven clothes (well known in Indonesian as kain tenun) which is wide spread throughout Indonesian regions. To support the traditional woven industry, as a relevancy to the industry 4.0 era, we develop DiTenun which is a multiplatform application that is able to produce new motifs of traditional woven intelligently using machine learning approach. The presence of the apps aims to support the growth of traditional weaving industry particularly the small and medium scale ones. The dissemination of the apps is very challenging as traditional woven centers are mostly located in rural area where the digital world has been rarely accessed. In this paper, we present “Ulos” as a case study in the utilization of DiTenun. The implementation of the sustainability of the Ulos industry by DiTenun needs to be adjusted to the development of the industrial era 4.0. Ulos is a traditional woven cloth from Batak tribe, which is located in several rural regions surrounding Toba highland in North Sumatera Utara province. The workflow for producing an item that is marketable is to produce woven fabrics with motifs that have been produced by smart devices. The results of DiTenun can have an impact on the technology produced and on the social life and culture of the weavers. The study shows how DiTenun is designed to support Ulos weavers in creating new motifs of Ulos and to support the economy of relevant small and medium scale industry of Ulos.


2019 ◽  
Vol 3 (2) ◽  
pp. 5-13
Author(s):  
Ammar Asaad ◽  
Ali Adil Yassin Alamri

The continuous development of the information technology and mobile communication world and the potentials available in the smart devices make these devices widely used in daily life. The mobile applications with the internet are distinguished simple, essay to use in any time/anywhere, communication between relatives and friends in different places in the world. The social application networks make these devices received several of the duplicate files daily which lead to many drawbacks such inefficient use of storage, low performance of CPU, RAM, and increasing consumption battery. In this paper, we present a good scheme to remove from the duplicate files, and we focus on image files as a common case in social apps. Our work overcomes on the above-mentioned issues and focuses to use hash function and Huffman code to build unique code for each image. Our experiments improve the performance from 1046770, 1995808 ns to 950000, and 1981154 ns in Galaxy and HUAWEI, respectively. In the storage side, the proposed scheme saves storage space from 1.9 GB, 1.24 GB to 2 GB, and 1.54 GB, respectively.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1343
Author(s):  
Faiza Loukil ◽  
Khouloud Boukadi ◽  
Rasheed Hussain ◽  
Mourad Abed

The insurance industry is heavily dependent on several processes executed among multiple entities, such as insurer, insured, and third-party services. The increasingly competitive environment is pushing insurance companies to use advanced technologies to address multiple challenges, namely lack of trust, lack of transparency, and economic instability. To this end, blockchain is used as an emerging technology that enables transparent and secure data storage and transmission. In this paper, we propose CioSy, a collaborative blockchain-based insurance system for monitoring and processing the insurance transactions. To the best of our knowledge, the existing approaches do not consider collaborative insurance to achieve an automated, transparent, and tamper-proof solution. CioSy aims at automating the insurance policy processing, claim handling, and payment using smart contracts. For validation purposes, an experimental prototype is developed on Ethereum blockchain. Our experimental results show that the proposed approach is both feasible and economical in terms of time and cost.


Author(s):  
Hong Guo

Many new media technologies have emerged in modern society. The application of new media technologies has impacted traditional TV news media, which not only faces great challenges, but also brings some lessons for the development of TV news media. New media technology relies on powerful information processing technology and data storage technology to develop and grow continuously. Compared with traditional news, new media technology has more powerful information storage capacity and dissemination capacity. Firstly, this paper briefly introduces the concept of new media technology, summarizes the typical characteristics of new media technology, and analyzes the existing problems in the application of new media technology in the news communication industry based on the necessity of applying new media technology. Finally, some Suggestions are put forward based on this, hoping to provide some reference for the development of news communication industry.


2016 ◽  
Vol 34 (1) ◽  
pp. 155-198
Author(s):  
Elizabeth Bussiere

Sweeping across the social and political landscape of the northeastern United States during the late 1820s and early 1830s, the Antimasonic Party has earned a modest immortality as the first “third” party in American history. In pamphlets, speeches, sermons, protests, and other venues, Antimasons lambasted the fraternal order of Freemasonry as undemocratic, inegalitarian, and un-Christian, reviling it as a threat to the moral order and civic health of the Early Republic. Because they believed that the fraternal organization largely controlled all levels of government, antebellum Antimasons first created a social movement and then an independent political party. Even before the full emergence of modern mass democratic politics, Antimasons demonstrated the benefits of party organization, open national nominating conventions, and party platforms. Scholars with otherwise different perspectives on the “party period” tend to agree that Antimasonry had an important impact on what became the first true mass party organizations—the Jacksonian Democrats and the Whigs—and helped push the political culture in a more egalitarian and populist direction.


Sign in / Sign up

Export Citation Format

Share Document