-
Identifying the Top Threats in Cloud Computing and Its Suggested Solutions: A Survey
Najib A. Kofahi,
Areej Rasmi Al-Rabadi
Issue:
Volume 6, Issue 1, June 2018
Pages:
1-13
Received:
14 February 2018
Accepted:
1 March 2018
Published:
20 March 2018
Abstract: The interest in cloud computing has increased rapidly in the last two decades. This increased interest is attributed to the important role played by cloud computing in the various aspects of our life. Cloud computing is recently emerged as a new paradigm for hosting and delivering services over the Internet. It is attractive to business owners as well as to researchers as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. As cloud computing is done through the Internet, it faces several kinds of threats due to its nature, where it depends on the network and its users who are distributed around the world. These threats differ in type, its side effect, its reasons, and its main purposes. This survey presents the most critical threats to cloud computing with its impacts, its reasons, and some suggested solutions. In addition, this survey determines what the main aspects of the cloud and the security attributes that are affected by each one of these threats. As a result of this survey, we order the most critical threats according to the level of its impact.
Abstract: The interest in cloud computing has increased rapidly in the last two decades. This increased interest is attributed to the important role played by cloud computing in the various aspects of our life. Cloud computing is recently emerged as a new paradigm for hosting and delivering services over the Internet. It is attractive to business owners as w...
Show More
-
Method for Constructing the Topological Structure of an Access Network with a Distributed Structure
Nishanbayev Tuygun Nishanbayevich,
Abdullaev Mirjamol Mirkamilovich,
Matkurbonov Dilshod Matkurbon Ogli
Issue:
Volume 6, Issue 1, June 2018
Pages:
14-20
Received:
12 February 2018
Accepted:
5 March 2018
Published:
26 March 2018
Abstract: The article proposes a method for constructing the topological structure of the access network of the information and communication network (ICN), which has a distributed structure. The essence of the method is reduced to the fact that initially the region is divided into zones, then in each zone a star-shaped graph with a vertex in one of the possible locations of the switch is formed. When forming the subnet structure in the next zone, a fixed set of terminal systems adds the point where the switch of the previous zone is located. This approach allows, in the construction of a subnet topology in zones, to simultaneously form one connected (core) topology of the backbone network between the zones. In the next stage, the topology of the desired K-connected structure of the distributed access network of the ICN is constructed. The problem is solved by using sections of dominant sets and P-medians of graph theory.
Abstract: The article proposes a method for constructing the topological structure of the access network of the information and communication network (ICN), which has a distributed structure. The essence of the method is reduced to the fact that initially the region is divided into zones, then in each zone a star-shaped graph with a vertex in one of the poss...
Show More
-
An Improved Forest Fire Alerting System Using Wireless Sensor Network
Saeed Ullah Jan,
Fazal Khaliq
Issue:
Volume 6, Issue 1, June 2018
Pages:
21-39
Received:
17 February 2018
Accepted:
10 March 2018
Published:
29 March 2018
Abstract: Wireless Sensor Network is a self-organization network that consists of a distributed number of minor devices for performing the monitoring activities within the deployed environment. Many wildfires cause forest damages affecting a large number of living organisms. This research study discusses a system design approach to wireless sensor network (WSN) based on the monitoring of wildfire. The main goal of the proposed solution is to intelligently estimate the scale and intensity of the wildfire which is ignited in the forest. The energy efficient and priority based techniques have been implemented for the data communication between the wireless sensor networks. The dynamic routing paths can be created with the help of the proposed data communication solution. These dynamic paths are developed depending upon a number of parameters such as weight, energy, fire, weather index and security. For the sake of validation, the proposed solution designs and implements a prototype by using Microsoft Framework (tools and technologies) to accomplish an extensive number of simulation experiments. The results and evaluations clearly show the efficiency and dependability of our proposed approach based on the wireless sensor network.
Abstract: Wireless Sensor Network is a self-organization network that consists of a distributed number of minor devices for performing the monitoring activities within the deployed environment. Many wildfires cause forest damages affecting a large number of living organisms. This research study discusses a system design approach to wireless sensor network (W...
Show More
-
Rivest Shamir Adleman Encryption Scheme Based on the Chinese Remainder Theorem
Salifu Abdul-Mumin,
Kazeem Alabge Gbolagade
Issue:
Volume 6, Issue 1, June 2018
Pages:
40-47
Received:
19 February 2018
Accepted:
13 March 2018
Published:
4 April 2018
Abstract: Sensitive information is transmitted across the internet every day and keeping such information as sacred is an important adventure. This is because malicious activities are on the increase as hackers are doing everything possible to steal such information. In this paper, we have implemented a new Rivest Shamir Adleman (RSA) encryption scheme based on the Chinese Remainder Theorem (CRT). The scheme consists of two level of encryption and two level of decryption. The first level of encryption is the classical RSA encryption and in the second level of encryption, we used forward conversion technique in Residue Number System. In the first level of decryption, we employed the CRT and the classical RSA decryption process is used for the second level of decryption. This new scheme will ensure that smaller messages, m for which c=me<n can be encrypted which would otherwise not be able to be encrypted with the classical RSA encryption scheme. The proposed scheme is evaluated with the state of the art and the classical RSA cryptosystem. The proposed scheme performs better than the classical RSA cryptosystem for smaller messages in terms of security and performs better than the state of the art in terms of delay and cost. The private key length in the new scheme is also enhanced by 1-bit as against the state of the art.
Abstract: Sensitive information is transmitted across the internet every day and keeping such information as sacred is an important adventure. This is because malicious activities are on the increase as hackers are doing everything possible to steal such information. In this paper, we have implemented a new Rivest Shamir Adleman (RSA) encryption scheme based...
Show More
-
Communication Technologies and Network Protocols of Automotive Systems
Aroosa Umair,
Muhammad Gufran Khan
Issue:
Volume 6, Issue 1, June 2018
Pages:
48-65
Received:
31 May 2018
Accepted:
19 June 2018
Published:
11 July 2018
Abstract: Automotive industry has gone through rapid changes in the past few years. The usage of electronics and electronic control units (ECUs) have increased manifold, and this has also affected the way different subsystems communicate. Communication technologies and protocols are required to fulfill demands of fault-tolerance, dependability, bandwidth and determinism of demanding and safety-critical applications. This paper presents a survey of state-of-the-art and the most commonly employed communication technologies and protocols; both wired and wireless for in-vehicle and vehicle to vehicle (V2V) communication in the automotive systems. The technologies such as LIN (Local Interconnect Network), CAN (Controller Area Network), MOST (Media Oriented Systems Transport), and Flexray are compared in terms of the performance, reliability, cost and protocol characteristics. The study shows that Flexray is an excellent network topology for in-vehicle communication that has higher degree of fault tolerance, and is suitable for hard real time systems with high bandwidth. Moreover, wireless technologies i.e. Bluetooth, ZigBee, Wi-Fi and UWB are discussed that satisfy different requirements of diagnostics and multimedia communication for in-vehicle and vehicle to vehicle communication and can be used for advanced autonomous driving systems. The paper also presented issues that need to be addressed to fully realize the potential of these communication technologies and other advancements in automotive industry.
Abstract: Automotive industry has gone through rapid changes in the past few years. The usage of electronics and electronic control units (ECUs) have increased manifold, and this has also affected the way different subsystems communicate. Communication technologies and protocols are required to fulfill demands of fault-tolerance, dependability, bandwidth and...
Show More