Collections

Security and Privacy Paradigm for Big Data with Internet of Everything (IoE)
Publication years
Loading ...
Article types
Loading ...
  • Select all
  • RESEARCH ARTICLE
    Ashish SINGH, Abhinav KUMAR, Suyel NAMASUDRA
    Frontiers of Computer Science, 2024, 18(1): 181801. https://doi.org/10.1007/s11704-022-2193-3

    The Internet of Everything (IoE) based cloud computing is one of the most prominent areas in the digital big data world. This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud. The IoE-based cloud computing services are located at remote locations without the control of the data owner. The data owners mostly depend on the untrusted Cloud Service Provider (CSP) and do not know the implemented security capabilities. The lack of knowledge about security capabilities and control over data raises several security issues. Deoxyribonucleic Acid (DNA) computing is a biological concept that can improve the security of IoE big data. The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol (StS KAP) and Feistel cipher algorithms. This paper proposed a DNA-based cryptographic scheme and access control model (DNACDS) to solve IoE big data security and access issues. The experimental results illustrated that DNACDS performs better than other DNA-based security schemes. The theoretical security analysis of the DNACDS shows better resistance capabilities.

  • RESEARCH ARTICLE
    Yaoqi YANG, Xianglin WEI, Renhui XU, Weizheng WANG, Laixian PENG, Yangang WANG
    Frontiers of Computer Science, 2023, 17(3): 173704. https://doi.org/10.1007/s11704-022-1550-6

    Recently revealed beam stealing attacks could greatly threaten the security and privacy of IEEE 802.11ad communications. The premise to restore normal network service is detecting and locating beam stealing attackers without their cooperation. Current consistency-based methods are only valid for one single attacker and are parameter-sensitive. From the viewpoint of image processing, this paper proposes an algorithm to jointly detect and locate multiple beam stealing attackers based on RSSI (Received Signal Strength Indicator) map without the training process involved in deep learning-based solutions. Firstly, an RSSI map is constructed based on interpolating the raw RSSI data for enabling high-resolution localization while reducing monitoring cost. Secondly, three image processing steps, including edge detection and segmentation, are conducted on the constructed RSSI map to detect and locate multiple attackers without any prior knowledge about the attackers. To evaluate our proposal’s performance, a series of experiments are conducted based on the collected data. Experimental results have shown that in typical parameter settings, our algorithm’s positioning error does not exceed 0.41 m with a detection rate no less than 91%.

  • RESEARCH ARTICLE
    Muazzam MAQSOOD, Sadaf YASMIN, Saira GILLANI, Maryam BUKHARI, Seungmin RHO, Sang-Soo YEO
    Frontiers of Computer Science, 2023, 17(4): 174329. https://doi.org/10.1007/s11704-022-2050-4

    Innovations on the Internet of Everything (IoE) enabled systems are driving a change in the settings where we interact in smart units, recognized globally as smart city environments. However, intelligent video-surveillance systems are critical to increasing the security of these smart cities. More precisely, in today’s world of smart video surveillance, person re-identification (Re-ID) has gained increased consideration by researchers. Various researchers have designed deep learning-based algorithms for person Re-ID because they have achieved substantial breakthroughs in computer vision problems. In this line of research, we designed an adaptive feature refinement-based deep learning architecture to conduct person Re-ID. In the proposed architecture, the inter-channel and inter-spatial relationship of features between the images of the same individual taken from nonidentical camera viewpoints are focused on learning spatial and channel attention. In addition, the spatial pyramid pooling layer is inserted to extract the multiscale and fixed-dimension feature vectors irrespective of the size of the feature maps. Furthermore, the model’s effectiveness is validated on the CUHK01 and CUHK02 datasets. When compared with existing approaches, the approach presented in this paper achieves encouraging Rank 1 and 5 scores of 24.6% and 54.8%, respectively.