Search results

1 – 10 of 16
Content available
Article
Publication date: 3 April 2009

Jong Hyuk Park, Stefanos Gritzalis and Ching-Hsien Hsu

457

Abstract

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 17 September 2019

Jeong Hoon Jo, Shailendra Rathore, Vincenzo Loia and Jong Hyuk Park

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while…

532

Abstract

Purpose

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Design/methodology/approach

The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Findings

Analysis of the proposed architecture with a use case scenario demonstrates that it provides a robust security measure against unauthorized network intrusions.

Originality/value

Unlike the existing security zone, this paper adopts a method of storing data by using blockchain. It meets the need to study integrated authentication management methods of future research.

Details

The Electronic Library, vol. 37 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 3 April 2009

Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park and Spyros Kokolakis

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

1434

Abstract

Purpose

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

Design/methodology/approach

The paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.

Findings

A significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.

Research limitations/implications

This paper identifies key research issues and provides directions for future research.

Originality/value

This study contributes by identifying major challenges that should be addressed, so that a set of “fair information principles” can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Sajid Hussain, Firdous Kausar, Ashraf Masood and Jong Hyuk Park

As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because…

Abstract

Purpose

As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because they provide better performance and security solutions for scalable applications in dynamic environments. Random key pre‐distribution schemes are vulnerable to collusion attacks. The purpose of this paper is to propose an efficient collusion resistant security mechanism for heterogeneous sensor networks.

Design/methodology/approach

The authors consider a heterogeneous sensor network (HSN) consists of a small number of powerful high‐end H‐sensors and a large number of ordinary low‐end L‐sensors. However, homogeneous sensor network (MSN) consists of only L‐sensors. Since the collusion attack on key pre‐distribution scheme mainly takes advantage of the globally applicable keys, which are selected from the same key pool, they update the key ring after initial deployment and generate new key rings by using one‐way hash function on nodes' IDs and initial key rings. Further, in the proposed scheme, every node is authenticated by the BS in order to join the network.

Findings

The analysis of the proposed scheme shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys near the compromised nodes, while other keys in the network remain safe.

Originality/value

The proposed key management scheme described in the paper outperforms the previous random key pre‐distribution schemes by: considerably reducing the storage requirement, and providing more resiliency against node capture and collusion attacks.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Geon Woo Kim, Deok Gyu Lee, Jong Wook Han, Seung Hyun Lee and Sang Wook Kim

The purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the…

2222

Abstract

Purpose

The purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the home network and the relationships among them.

Design/methodology/approach

The research model is designed to support three functions: authentication, authorization, and security policy. Authentication is tested in several methodologies such as id/pw, certificate, or bio; authorization is tested using RBAC methodologies; and security policy is specified using newly‐designed script language, such as xHDL.

Findings

The findings for “authentication” suggest that home network users can access services conveniently and securely. In addition, the findings for “security policy” suggest that security policy for home network requires specialized rather than general specification.

Practical implications

The paper identifies three security functions essential for home network: authentication that supports most existing authentication mechanisms, so as to maximize user accessibility; authorization that is middleware‐independent and beyond the physical transport layer; and security policy optimized for the home network environment.

Originality/value

The paper focuses on an implementation‐based security model for the home network. Though interest and research in home network security are increasing, only limited authentication applications have been adopted in real deployment up to now. This paper introduces an integrated security model and emphasizes safety and convenience so as to promote reliability in home network services.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Shunshan Piao, Jeongmin Park and Eunseok Lee

This paper seeks to develop an approach to problem localization and an algorithm to address the issue of determining the dependencies among system metrics for automated system…

Abstract

Purpose

This paper seeks to develop an approach to problem localization and an algorithm to address the issue of determining the dependencies among system metrics for automated system management in ubiquitous computing systems.

Design/methodology/approach

This paper proposes an approach to problem localization for learning the knowledge of dynamic environment using probabilistic dependency analysis to automatically determine problems. This approach is based on Bayesian learning to describe a system as a hierarchical dependency network, determining root causes of problems via inductive and deductive inferences on the network. An algorithm of preprocessing is performed to create ordering parameters that have close relationships with problems.

Findings

The findings show that using ordering parameters as input of network learning, it reduces learning time and maintains accuracy in diverse domains especially in the case of including large number of parameters, hence improving efficiency and accuracy of problem localization.

Practical implications

An evaluation of the work is presented through performance measurements. Various comparisons and evaluations prove that the proposed approach is effective on problem localization and it can achieve significant cost savings.

Originality/value

This study contributes to research into the application of probabilistic dependency analysis in localizing the root cause of problems and predicting potential problems at run time after probabilities propagation throughout a network, particularly in relation to fault management in self‐managing systems.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Rodrigo Roman and Javier Lopez

This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology…

2699

Abstract

Purpose

This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology mechanisms are suitable and can be applied in this context.

Design/methodology/approach

The paper considers the possible approaches that can be used to connect a WSN with the internet, and analyzes the security of their interactions.

Findings

By providing the services of the network through a front‐end proxy, a sensor network and the internet can interact securely. There are other challenges to be solved if the sensor nodes are integrated into the internet infrastructure, although there exists interesting advances on his matter.

Research limitations/implications

The complete integration of sensor networks and the internet still remains as an open issue.

Practical implications

With the current state of the art, it is possible to develop a secure sensor network that can provide its services to internet hosts with certain security properties.

Originality/value

The paper studies the interactions between sensor networks and the internet from the point of view of security. It identifies both solutions and research challenges.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Yuan‐Chu Hwang and Soe‐Tsyr Yuan

The authors seek to propose the notion of ubiquitous proximity e‐service for exploring collective wisdom in the ubiquitous environment. Ubiquitous proximity e‐service highlights…

Abstract

Purpose

The authors seek to propose the notion of ubiquitous proximity e‐service for exploring collective wisdom in the ubiquitous environment. Ubiquitous proximity e‐service highlights the collective effort focused on collecting the user group's power as the reference for ubiquitous trust decisions.

Design/methodology/approach

This paper provides some theoretical utility support for ubiquitous proximity e‐service. The “homophily” describes the tendency of individuals to associate and bond with similar others. By highlighting the “homophily” of e‐service participants, these isolated individuals can be treated as a group with proximity. The main value of ubiquitous proximity e‐service utilizes the network effect from the collective effort of interpersonal social network.

Findings

In order to leap the trust barrier for users to embrace these ubiquitous e‐services, ubiquitous proximity e‐service makes it possible for users to collaborate with their nearby user groups to establish a reliable and trustworthy interaction environment. The simulation outcomes for trust decision quality enhancement show a significant improvement in a variety of environment settings.

Practical implications

A significant value of ubiquitous proximity e‐service lies in the increased possibility of establishing innovative social network relationships. From the interpersonal perspective, unfamiliar strangers can make connections with individuals who are proximal and homoplastic to them. The strength of proximity gives people better chances to make interpersonal connections, including both weak ties and strong ties. By combining those interpersonal tie relationships, ubiquitous proximity e‐service can easily cause information diffusion and effectively encourage collective wisdom.

Originality/value

The paper advocates the utility of ubiquitous proximity e‐service that can be realized in the e‐commerce environment and which enables information diffusion effectively.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

U.M. Mbanaso, G.S. Cooper, David Chadwick and Anne Anderson

This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the…

Abstract

Purpose

This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control.

Design/methodology/approach

Existing access control and privacy protection systems are typically unilateral and provider‐centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user‐centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties.

Findings

The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today.

Practical implications

This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery.

Originality/value

The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 16 October 2023

Chien-Wen Shen and Phung Phi Tran

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news…

Abstract

Purpose

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news articles. This study displays the developmental status of each subject based on the interrelationships of each topic cluster by analyzing high-frequency keywords extracted from the collected data. Moreover, applying above methodologies will help understanding top research topics, authors, venues, institutes and countries. The differences of blockchain research and new are identified.

Design/methodology/approach

To identify and find blockchain development linkages, researchers have used search terms such as co-occurrence, bibliographic coupling, co-citation and co-authorship to help us understand the top research topics, authors, venues, institutes and countries. This study also used text mining analysis to identify blockchain articles' primary concepts and semantic structures.

Findings

The findings show the fundamental topics based on each topic cluster's links. While “technology”, “transaction”, “privacy and security”, “environment” and “consensus” were most strongly associated with blockchain in research, “platform”, “big data and cloud”, “network”, “healthcare and business” and “authentication” were closely tied to blockchain news. This article classifies blockchain principles into five patterns: hardware and infrastructure, data, networking, applications and consensus. These statistics helped the authors comprehend the top research topics, authors, venues, publication institutes and countries.

Research limitations/implications

Since Web of Science (WoS) and LexisNexis Academic data are used, the study has few sources. Others advise merging foreign datasets. WoS is one of the world's largest and most-used databases for assessing scientific papers.

Originality/value

This study has several uses and benefits. First, key concept discoveries can help academics understand blockchain research trends so they can prioritize research initiatives. Second, bibliographic coupling links academic papers on blockchain. It helps information seekers search and classify the material. Co-citation analysis results can help researchers identify potential partners and leaders in their field. The network's key organizations or countries should be proactive in discovering, proposing and creating new relationships with other organizations or countries, especially those from the journal network's border, to make the overall network more integrated and linked. Prominent members help recruit new authors to organizations or countries and link them to the co-authorship network. This study also used concept-linking analysis to identify blockchain articles' primary concepts and semantic structures. This may lead to new authors developing research ideas or subjects in primary disciplines of inquiry.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 16