Search results
1 – 10 of 19Rhea Gupta, Sara Dharadhar and Prathamesh Churi
Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and…
Abstract
Purpose
Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and applications that can be quickly retrieved and released. Despite its numerous merits, it faces setbacks in data security and privacy. Data encryption is one of the most popular solutions for data security in the cloud. Various encryption algorithms have been implemented to address security concerns. These algorithms have been reviewed along with the Jumbling Salting algorithm and its applications. The framework for using Jumbling Salting to encrypt text files in the cloud environment (CloudJS) has been thoroughly studied and improvised. The purpose of this paper is to implement the CloudJS algorithm, to discuss its performance and compare the obtained results with existing cloud encryption schemes.
Design/methodology/approach
The paper uses six research questions to analyze the performance of CloudJS algorithm in the cloud environment. The research questions are about measuring encryption time and throughput, decryption time and throughput, the ratio of cipher to the plain text of CloudJS algorithm with respect to other Cloud algorithms like AES and DES. For this purpose, the algorithm has been implemented using dockers-containers in the Linux environment.
Findings
It was found that CloudJS performs well in terms of encryption time, decryption time and throughput. It is marginally better than AES and undoubtedly better than DES in these parameters. The performance of the algorithm is not affected by a number of CPU cores, RAM size and Line size of text files. It performs decently well in all scenarios and all resultant values fall in the desired range.
Research limitations/implications
CloudJS can be tested with cloud simulation platforms (CloudSim) and cloud service providers (AWS, Google Cloud). It can also be tested with other file types. In the future, CloudJS algorithm can also be implemented in images and other files.
Originality/value
To the best of the knowledge, this is the first attempt to implement and analysis of a custom encryption algorithm (CloudJS) in the cloud environment using dockers-containers.
Details
Keywords
Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe
In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…
Abstract
Purpose
In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.
Design/methodology/approach
Design Science Research (DSR) is the research method implemented in this study.
Findings
General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.
Research limitations/implications
The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.
Practical implications
Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.
Originality/value
The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.
Details
Keywords
Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo and Brighton Mukorera
Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before…
Abstract
Purpose
Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.
Design/methodology/approach
Design Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.
Findings
While the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.
Originality/value
The evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.
Details
Keywords
Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…
Abstract
Purpose
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.
Design/methodology/approach
An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.
Findings
Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.
Practical implications
A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.
Originality/value
Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
Details
Keywords
- Software development
- Blockchain
- Cybersecurity
- Operational flight program
- Secure development environment
- Secure virtual machine
- Zero trust
- Embedded systems
- Mission-critical systems
- OFP
- DevOps
- DevSecOps
- Software support activity
- SSA
- SDE
- Permissioned blockchain
- Cryptocurrency
- Time-limited authorization for developer action
- TADA
- Code signing
- Trusted software guard
- SGX
- Trusted eXecution technology
- TXT
- Trusted platform module
- Self-hosting
- Controlled access blockchain
- CABlock
- Role-based access control
- RBAC
Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the…
Abstract
Purpose
Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the dynamic, service-oriented and personalized market demands. In social manufacturing, MSMEs cooperate with each other through manufacturing resource sharing. However, because MSMEs are distributed and decentralized, the efficiency of establishing reliable cooperation between MSMEs is relatively low. Therefore, this paper presents a blockchain-driven cyber-credit evaluation system (BCCES) to implement distributed cyber-credit evaluation. BCCES can provide reliable cyber-credit for distributed MSMEs without the trusted third party. This can improve the efficiency of establishing reliable cooperation among unauthentic MSMEs.
Design/methodology/approach
The paper proposes a BCCES to evaluate MSMEs' cyber-credit in decentralized environment. In BCCES, a cyber-credit evaluation model is proposed by improving set pair analysis (SPA) method, and cyber-credit smart contract and distributed consensus mechanism are designed according to the runtime logic of distributed cyber-credit evaluation.
Findings
The results confirmed that BCCES is feasible and effective to implement cyber-credit evaluation without the trusted third party. With the advantages of blockchain, BCCES can automatically realize cyber-credit evaluation through smart contract and distributed consensus. At the same time, BCCES can evaluate the real-time cyber-credit of MSMEs based on their latest service evaluation. In addition, we can design corresponding smart contracts according to actual requirements, which makes blockchain applicable to different distributed scenarios.
Originality/value
The paper combines blockchain and SPA to implement cyber-credit evaluation in social manufacturing and provides a new feasible idea for cyber-credit evaluation without the trusted third party. This can also provide MSMEs a reference of applying blockchain to other distributed scenarios through combining smart contract and different algorithms.
Details
Keywords
The cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service…
Abstract
Purpose
The cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service, platform as a service and software as a service. The containers in the cloud are defined as “standalone and self-contained units that package software and its dependencies together”. Similar to virtual machines, the virtualization method facilitates the resource on a specific server that could be used by numerous appliances.
Design/methodology/approach
This study introduces a new Dragon Levy updated squirrel algorithm (DLU-SA) for container aware application scheduling. Furthermore, the solution of optimal resource allocation is attained via defining the objective function that considers certain criteria such as “total network distance (TND), system failure (SF), balanced cluster use (BC) and threshold distance (TD)”. Eventually, the supremacy of the presented model is confirmed over existing models in terms of cost and statistical analysis.
Findings
On observing the outcomes, the total cost of an adopted model for Experimentation 1 has attained a lesser cost value, and it was 0.97%, 10.45% and 10.37% superior to traditional velocity updated grey wolf (VU-GWO), squirrel search algorithm (SSA) and dragonfly algorithm (DA) models, respectively, for mean case scenario. Especially, under best case scenario, the implemented model has revealed a minimal cost value of 761.95, whereas, the compared models such as whale random update assisted lion algorithm, VU-GWO, SSA and DA has revealed higher cost value of 761.98, 779.46, 766.62 and 766.51, respectively. Thus, the enhancement of the developed model has been validated over the existing works.
Originality/value
This paper proposes a new DLU-SA for container aware application scheduling. This is the first work that uses the DLU-SA model for optimal container resource allocation by taking into consideration of certain constraints such as TND, SF, BC and TD.
Details
Keywords
Kapil Netaji Vhatkar and Girish P. Bhole
The containerization application is one among the technologies that enable microservices architectures, which is observed to be the model for operating system (OS) virtualization…
Abstract
Purpose
The containerization application is one among the technologies that enable microservices architectures, which is observed to be the model for operating system (OS) virtualization. Containers are the virtual instances of the OS that are structured as the isolation for the OS atmosphere and its file system, which are executed on the single kernel and a single host. Hence, every microservice application is evolved in a container without launching the total virtual machine. The system overhead is minimized in this way as the environment is maintained in a secured manner. The exploitation of a microservice is as easy to start the execution of a new container. As a result, microservices could scale up by simply generating new containers until the required scalability level is attained. This paper aims to optimize the container allocation.
Design/methodology/approach
This paper introduces a new customized rider optimization algorithm (C-ROA) for optimizing the container allocation. The proposed model also considers the impact of system performance along with its security. Moreover, a new rescaled objective function is defined in this work that considers threshold distance, balanced cluster use, system failure, total network distance and security as well. At last, the performance of proposed work is compared over other state-of-the-art models with respect to convergence and cost analysis.
Findings
For experiment 1, the implemented model at 50th iteration has achieved minimal value, which is 29.24%, 24.48% and 21.11% better from velocity updated grey wolf optimisation (VU-GWO), whale random update assisted LA (WR-LA) and rider optimization algorithm (ROA), respectively. Similarly, on considering Experiment 2, the proposed model at 100th iteration attained superior performance than conventional models such as VU-GWO, WR-LA and ROA by 3.21%, 7.18% and 10.19%, respectively. The developed model for Experiment 3 at 100th iteration is 2.23%, 5.76% and 6.56% superior to VU-GWO, WR-LA and ROA.
Originality/value
This paper presents the latest fictional optimization algorithm named ROA for optimizing the container allocation. To the best of the authors’ knowledge, this is the first study that uses the C-ROA for optimization.
Details
Keywords
Jiajun Tan, Wai Peng Wong, Chee Keong Tan, Suriyan Jomthanachai and Chee Peng Lim
Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is…
Abstract
Purpose
Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is to explore how the current blockchain technology can be implemented in the logistics industry with the aim of improving logistic services amongst the network of logistics service providers (LSPs). The second is to propose the development of a blockchain model for the small and medium logistics service supply chain.
Design/methodology/approach
A prototype blockchain-based logistics system has been created and tested in a case study with a real logistics company. The primary technologies for developing a blockchain model on the Hyperledger platform as well as how the system is designed based on the logistics service flow are explained.
Findings
The study has resulted in the successful implementation of the proposed prototype blockchain-based logistics system. In particular, the case company has managed to fully utilise the developed tracking and tracing system. Whilst utilising the prototype, the participants have been able to fulfil their responsibilities in an effective manner. The performance of LSPs has improved following the World Bank Logistics Performance Index (LPI) criteria.
Originality/value
This paper contributes to current research in the application of blockchain technologies in the domain of logistics and the supply chain to progress LSPs towards Logistics 4.0. The current frameworks for Logistics 4.0 and how blockchain as a disruptive technology revolutionises logistic services are reviewed. In addition, this paper highlights the benefits of blockchain technology that LSPs can leverage to further improve their performance based on the LPI criteria.
Details
Keywords
Madhulika Bhatia, Shubham Sharma, Madhurima Hooda and Narayan C. Debnath
Recent research advances in artificial intelligence, machine learning, and neural networks are becoming essential tools for building a wide range of intelligent applications…
Abstract
Recent research advances in artificial intelligence, machine learning, and neural networks are becoming essential tools for building a wide range of intelligent applications. Moreover, machine learning helps to automate analytical model building. Machine learning based frameworks and approaches allow making well-informed and intelligent choices for improving daily eating habits and extension of healthy lifestyle. This book chapter presents a new machine learning approach for meal classification and assessment of nutrients values based on weather conditions along with new and innovative ideas for further study and research on health care-related applications.
Details
Keywords
This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.
Abstract
Purpose
This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.
Design/methodology/approach
Systematic literature review is used as the research strategy for this investigation and other aspects of the preferred reporting items for systematic reviews and meta-analyses framework have been incorporated to create a scholarly publications evaluation of the blockchain-based application in the financial arena and its future. The research looks at 86 studies published between 2018 and 2022.
Findings
There has been a steady but noticeable increase in the study of blockchain’s potential in many application domains over the past few of years. This rising tendency illustrates the newness and potential of blockchain technology, as well as the increasing attention from academics. According to the findings, blockchain is an appropriate solution for processing transactions using cryptocurrencies; nevertheless, it still has significant technical issues and limits that require to be exploring and solving before it can be considered a viable option. It is therefore, necessary to have a high level of reliability for payments and confidentiality, in addition to maintaining the anonymity of nodes, to stop assaults and efforts to disrupt transactions in the blockchain.
Practical implications
This study has several important theoretical and practical implications. First, it adds to the body of knowledge on blockchain and Fintech, focusing on the transaction side. While much blockchain research has focused on how the technology may affect strategic choices, this study has shed light on its potential from the perspective of financial reporting. Second, by highlighting the importance of the demand for the prompt identification of losses, this work adds to the body of knowledge on the factors that influence transaction frauds involving paper money. Additionally, by establishing the link between transparency and virtual transactions, the author backs up the asymmetric responses of investors to different investment possibilities. It looks at the evolution of financial technology (Fintech) and shows how it can be used to take the advantage of unique opportunities.
Originality/value
The study is different and novel from the previously published literature on this topic mainly because of its comprehensiveness, as it revolves around all industrial and commercial areas. The three main lines of research have been outlined, namely, classifying the many blockchain-based innovations that will alter the financial landscape in many industries; identifying whether these industries are a good fit for blockchain’s wealth creation potential; and directing researchers by outlining prospective study pathways.
Details