Search results

1 – 10 of 19
Article
Publication date: 14 December 2021

Rhea Gupta, Sara Dharadhar and Prathamesh Churi

Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and…

Abstract

Purpose

Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and applications that can be quickly retrieved and released. Despite its numerous merits, it faces setbacks in data security and privacy. Data encryption is one of the most popular solutions for data security in the cloud. Various encryption algorithms have been implemented to address security concerns. These algorithms have been reviewed along with the Jumbling Salting algorithm and its applications. The framework for using Jumbling Salting to encrypt text files in the cloud environment (CloudJS) has been thoroughly studied and improvised. The purpose of this paper is to implement the CloudJS algorithm, to discuss its performance and compare the obtained results with existing cloud encryption schemes.

Design/methodology/approach

The paper uses six research questions to analyze the performance of CloudJS algorithm in the cloud environment. The research questions are about measuring encryption time and throughput, decryption time and throughput, the ratio of cipher to the plain text of CloudJS algorithm with respect to other Cloud algorithms like AES and DES. For this purpose, the algorithm has been implemented using dockers-containers in the Linux environment.

Findings

It was found that CloudJS performs well in terms of encryption time, decryption time and throughput. It is marginally better than AES and undoubtedly better than DES in these parameters. The performance of the algorithm is not affected by a number of CPU cores, RAM size and Line size of text files. It performs decently well in all scenarios and all resultant values fall in the desired range.

Research limitations/implications

CloudJS can be tested with cloud simulation platforms (CloudSim) and cloud service providers (AWS, Google Cloud). It can also be tested with other file types. In the future, CloudJS algorithm can also be implemented in images and other files.

Originality/value

To the best of the knowledge, this is the first attempt to implement and analysis of a custom encryption algorithm (CloudJS) in the cloud environment using dockers-containers.

Details

World Journal of Engineering, vol. 20 no. 3
Type: Research Article
ISSN: 1708-5284

Keywords

Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 18 April 2023

Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo and Brighton Mukorera

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before…

Abstract

Purpose

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.

Design/methodology/approach

Design Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.

Findings

While the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.

Originality/value

The evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Content available
Article
Publication date: 23 June 2021

Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…

1334

Abstract

Purpose

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.

Design/methodology/approach

An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.

Findings

Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.

Practical implications

A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.

Originality/value

Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.

Article
Publication date: 11 December 2020

Jiajun Liu and Pingyu Jiang

Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the…

536

Abstract

Purpose

Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the dynamic, service-oriented and personalized market demands. In social manufacturing, MSMEs cooperate with each other through manufacturing resource sharing. However, because MSMEs are distributed and decentralized, the efficiency of establishing reliable cooperation between MSMEs is relatively low. Therefore, this paper presents a blockchain-driven cyber-credit evaluation system (BCCES) to implement distributed cyber-credit evaluation. BCCES can provide reliable cyber-credit for distributed MSMEs without the trusted third party. This can improve the efficiency of establishing reliable cooperation among unauthentic MSMEs.

Design/methodology/approach

The paper proposes a BCCES to evaluate MSMEs' cyber-credit in decentralized environment. In BCCES, a cyber-credit evaluation model is proposed by improving set pair analysis (SPA) method, and cyber-credit smart contract and distributed consensus mechanism are designed according to the runtime logic of distributed cyber-credit evaluation.

Findings

The results confirmed that BCCES is feasible and effective to implement cyber-credit evaluation without the trusted third party. With the advantages of blockchain, BCCES can automatically realize cyber-credit evaluation through smart contract and distributed consensus. At the same time, BCCES can evaluate the real-time cyber-credit of MSMEs based on their latest service evaluation. In addition, we can design corresponding smart contracts according to actual requirements, which makes blockchain applicable to different distributed scenarios.

Originality/value

The paper combines blockchain and SPA to implement cyber-credit evaluation in social manufacturing and provides a new feasible idea for cyber-credit evaluation without the trusted third party. This can also provide MSMEs a reference of applying blockchain to other distributed scenarios through combining smart contract and different algorithms.

Details

Industrial Management & Data Systems, vol. 121 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 2 June 2021

Subramonian Krishna Sarma

The cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service…

Abstract

Purpose

The cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service, platform as a service and software as a service. The containers in the cloud are defined as “standalone and self-contained units that package software and its dependencies together”. Similar to virtual machines, the virtualization method facilitates the resource on a specific server that could be used by numerous appliances.

Design/methodology/approach

This study introduces a new Dragon Levy updated squirrel algorithm (DLU-SA) for container aware application scheduling. Furthermore, the solution of optimal resource allocation is attained via defining the objective function that considers certain criteria such as “total network distance (TND), system failure (SF), balanced cluster use (BC) and threshold distance (TD)”. Eventually, the supremacy of the presented model is confirmed over existing models in terms of cost and statistical analysis.

Findings

On observing the outcomes, the total cost of an adopted model for Experimentation 1 has attained a lesser cost value, and it was 0.97%, 10.45% and 10.37% superior to traditional velocity updated grey wolf (VU-GWO), squirrel search algorithm (SSA) and dragonfly algorithm (DA) models, respectively, for mean case scenario. Especially, under best case scenario, the implemented model has revealed a minimal cost value of 761.95, whereas, the compared models such as whale random update assisted lion algorithm, VU-GWO, SSA and DA has revealed higher cost value of 761.98, 779.46, 766.62 and 766.51, respectively. Thus, the enhancement of the developed model has been validated over the existing works.

Originality/value

This paper proposes a new DLU-SA for container aware application scheduling. This is the first work that uses the DLU-SA model for optimal container resource allocation by taking into consideration of certain constraints such as TND, SF, BC and TD.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 July 2020

Kapil Netaji Vhatkar and Girish P. Bhole

The containerization application is one among the technologies that enable microservices architectures, which is observed to be the model for operating system (OS) virtualization…

Abstract

Purpose

The containerization application is one among the technologies that enable microservices architectures, which is observed to be the model for operating system (OS) virtualization. Containers are the virtual instances of the OS that are structured as the isolation for the OS atmosphere and its file system, which are executed on the single kernel and a single host. Hence, every microservice application is evolved in a container without launching the total virtual machine. The system overhead is minimized in this way as the environment is maintained in a secured manner. The exploitation of a microservice is as easy to start the execution of a new container. As a result, microservices could scale up by simply generating new containers until the required scalability level is attained. This paper aims to optimize the container allocation.

Design/methodology/approach

This paper introduces a new customized rider optimization algorithm (C-ROA) for optimizing the container allocation. The proposed model also considers the impact of system performance along with its security. Moreover, a new rescaled objective function is defined in this work that considers threshold distance, balanced cluster use, system failure, total network distance and security as well. At last, the performance of proposed work is compared over other state-of-the-art models with respect to convergence and cost analysis.

Findings

For experiment 1, the implemented model at 50th iteration has achieved minimal value, which is 29.24%, 24.48% and 21.11% better from velocity updated grey wolf optimisation (VU-GWO), whale random update assisted LA (WR-LA) and rider optimization algorithm (ROA), respectively. Similarly, on considering Experiment 2, the proposed model at 100th iteration attained superior performance than conventional models such as VU-GWO, WR-LA and ROA by 3.21%, 7.18% and 10.19%, respectively. The developed model for Experiment 3 at 100th iteration is 2.23%, 5.76% and 6.56% superior to VU-GWO, WR-LA and ROA.

Originality/value

This paper presents the latest fictional optimization algorithm named ROA for optimizing the container allocation. To the best of the authors’ knowledge, this is the first study that uses the C-ROA for optimization.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 26 December 2023

Jiajun Tan, Wai Peng Wong, Chee Keong Tan, Suriyan Jomthanachai and Chee Peng Lim

Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is…

Abstract

Purpose

Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is to explore how the current blockchain technology can be implemented in the logistics industry with the aim of improving logistic services amongst the network of logistics service providers (LSPs). The second is to propose the development of a blockchain model for the small and medium logistics service supply chain.

Design/methodology/approach

A prototype blockchain-based logistics system has been created and tested in a case study with a real logistics company. The primary technologies for developing a blockchain model on the Hyperledger platform as well as how the system is designed based on the logistics service flow are explained.

Findings

The study has resulted in the successful implementation of the proposed prototype blockchain-based logistics system. In particular, the case company has managed to fully utilise the developed tracking and tracing system. Whilst utilising the prototype, the participants have been able to fulfil their responsibilities in an effective manner. The performance of LSPs has improved following the World Bank Logistics Performance Index (LPI) criteria.

Originality/value

This paper contributes to current research in the application of blockchain technologies in the domain of logistics and the supply chain to progress LSPs towards Logistics 4.0. The current frameworks for Logistics 4.0 and how blockchain as a disruptive technology revolutionises logistic services are reviewed. In addition, this paper highlights the benefits of blockchain technology that LSPs can leverage to further improve their performance based on the LPI criteria.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Book part
Publication date: 30 September 2020

Madhulika Bhatia, Shubham Sharma, Madhurima Hooda and Narayan C. Debnath

Recent research advances in artificial intelligence, machine learning, and neural networks are becoming essential tools for building a wide range of intelligent applications…

Abstract

Recent research advances in artificial intelligence, machine learning, and neural networks are becoming essential tools for building a wide range of intelligent applications. Moreover, machine learning helps to automate analytical model building. Machine learning based frameworks and approaches allow making well-informed and intelligent choices for improving daily eating habits and extension of healthy lifestyle. This book chapter presents a new machine learning approach for meal classification and assessment of nutrients values based on weather conditions along with new and innovative ideas for further study and research on health care-related applications.

Details

Big Data Analytics and Intelligence: A Perspective for Health Care
Type: Book
ISBN: 978-1-83909-099-8

Keywords

Article
Publication date: 15 December 2023

Umar Nawaz Kayani

This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.

Abstract

Purpose

This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.

Design/methodology/approach

Systematic literature review is used as the research strategy for this investigation and other aspects of the preferred reporting items for systematic reviews and meta-analyses framework have been incorporated to create a scholarly publications evaluation of the blockchain-based application in the financial arena and its future. The research looks at 86 studies published between 2018 and 2022.

Findings

There has been a steady but noticeable increase in the study of blockchain’s potential in many application domains over the past few of years. This rising tendency illustrates the newness and potential of blockchain technology, as well as the increasing attention from academics. According to the findings, blockchain is an appropriate solution for processing transactions using cryptocurrencies; nevertheless, it still has significant technical issues and limits that require to be exploring and solving before it can be considered a viable option. It is therefore, necessary to have a high level of reliability for payments and confidentiality, in addition to maintaining the anonymity of nodes, to stop assaults and efforts to disrupt transactions in the blockchain.

Practical implications

This study has several important theoretical and practical implications. First, it adds to the body of knowledge on blockchain and Fintech, focusing on the transaction side. While much blockchain research has focused on how the technology may affect strategic choices, this study has shed light on its potential from the perspective of financial reporting. Second, by highlighting the importance of the demand for the prompt identification of losses, this work adds to the body of knowledge on the factors that influence transaction frauds involving paper money. Additionally, by establishing the link between transparency and virtual transactions, the author backs up the asymmetric responses of investors to different investment possibilities. It looks at the evolution of financial technology (Fintech) and shows how it can be used to take the advantage of unique opportunities.

Originality/value

The study is different and novel from the previously published literature on this topic mainly because of its comprehensiveness, as it revolves around all industrial and commercial areas. The three main lines of research have been outlined, namely, classifying the many blockchain-based innovations that will alter the financial landscape in many industries; identifying whether these industries are a good fit for blockchain’s wealth creation potential; and directing researchers by outlining prospective study pathways.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 10 of 19