Related papers
Cloud computing security for e-learning during COVID-19 pandemic
Indonesian Journal of Electrical Engineering and Computer Science
Indonesian Journal of Electrical Engineering and Computer Science, 2022
The demand for e-learning services increased during the developments of the COVID-19 virus and its rapid spread, and the recommendations of the World Health Organization (WHO) that social distancing should be required. The rapid transition to the e-learning environment quickly led to the neglect of some security aspects, which led to an increase in cyber attacks targeting computer accounts, which is one of the most important pillars of e-learning. In these papers, the attacks that target the cloud computer used in the most important e-learning have been studied and classified according to the victim using an inductive methodology based on global statistics related to cyber attacks and recent research. And suggest appropriate solutions to avoid its occurrence in the near future and raise the level of protection for those computer clouds.
View PDFchevron_right
HYBRID CLOUD-EDGE ARCHITECTURES FOR AI-DRIVEN APPLICATIONS: OPPORTUNITIES AND CHALLENGES
IJCSMC Journal
International Journal of Computer Science and Mobile Computing (IJCSMC), 2020
IoT has seen an exponential rise in the number of devices, and actual-time processing of data has become necessary, making AI-driven applications adopt hybrid Cloud-edge designs. These systems are able to process and analyze data in an optimal way using the advantages of edge and cloud computing ; moreover, they are able to face problems associated with a prolonged delay in delivery and limited bandwidth as well as data vulnerability. The prospects of utilizing hybrid cloud-edge are discussed in this paper for handling improved network capacity for data handling, faster response time, optimal usage of resources, and enhanced security. It also considers the challenges of implementing and deploying these designs, chiefly in terms of addressing concerns with risk, data coordination, and compliance. This report has been written with the intent of tackling the possible challenges and engaging in relevant recommendations which may help in optimizing the use of such architectures.
View PDFchevron_right
Vehicle Tracking System Approaches: A Systematic Literature Review
IJCSMC Journal
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
The efficiency, security, and privacy of vehicle tracking systems can be improved through the development of a sophisticated real-time tracking system, the implementation of security measures to safeguard vehicles and their cargo, and the proposal of innovative solutions and best practices. This research adopts a comprehensive approach, which includes an extensive review of existing literature, the design and implementation of the tracking system, and systematic evaluations of its impact on transportation and logistics. The findings of this study demonstrate that the advanced tracking system provides accurate and up-to-date information on vehicle locations and performance, while the integration of security measures enhances the protection of vehicles and cargo. Furthermore, this research identifies the current state of vehicle tracking technology, identifies areas for improvement, and offers recommendations to advance the field. Overall, this study contributes to the progress of vehicle tracking technology by offering practical solutions, promoting data privacy, and optimizing compatibility, while also providing valuable insights into the performance and significance of these systems in the realm of logistics and transportation.
View PDFchevron_right
IT Security Management Challenges of State Universities and Colleges
Cognizance Journal Multidisciplinary Studies
Cognizance Journal of Multidisciplinary Studies (CJMS), 2024
This study aimed to evaluate the cybersecurity management challenges encountered by state universities and colleges in the Zamboanga Peninsula region during the 2021-2022 academic year. The findings revealed that the key challenges included inadequate management support, budget limitations, infrastructure deficiencies, and skills gaps. The conclusions drawn from the study indicated the need for enhancing IT security management practices among state universities and colleges, underscoring the significance of addressing the identified challenges. Recommendations were provided for various stakeholders, including university officials, deans, heads of management offices, program chairs, faculty members, employees, students, and future researchers, with the aim of improving IT security practices and promoting awareness and education in this field.
View PDFchevron_right
Enhancing Data Security through Advanced Cryptographic Techniques
Mohammad Abudalou, IJCSMC Journal
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
In a time when digital technology is everywhere, it is essential to have strong data security, This study addresses data security, focusing on advanced encryption methods, A secure connection, or encryption, protects private data from tampering and unauthorized access, The research explores modern cryptographic technologies, including blockchain-based solutions, quantum-resistant algorithms, and homomorphic cryptography, These evolving approaches provide increased defense against changing cyber threats, The study examines the theoretical foundations, real-world applications, and potential impacts on data security across a range of industries. The paper will first provide a comprehensive analysis of the cryptographic techniques now in use and then highlight emerging and contemporary risks to data security, Next, you will focus on the basics of contemporary encryption technologies, emphasizing their importance and potential uses. Case studies from healthcare, finance, and the Internet of Things (IoT) demonstrate how advanced encryption is used in real-world settings and how it impacts data security, The case studies highlight the necessity of new and innovative technologies to protect data (in all scenarios) when it is in motion, at rest, and during processing. In this paper, a rigorous methodology for evaluating the security and usability of cutting-edge cryptographic algorithms will be covered, the utility of these techniques in enhancing data security is highlighted by presenting experimental results and comprehensive data analysis. This paper concludes by highlighting how important it is to implement advanced cryptographic methods to address today's data security issues, it highlights the critical role that cryptography plays in protecting confidential information and provides a solid foundation for upcoming investigations and developments in the field of data security.
View PDFchevron_right
CYBER SECURITY FOR CHEMICAL PLANT USING ARTIFICIAL INTELLIGENCE
IJCSMC Journal
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
The adding number of cyber-attacks on diligence demands immediate attention for furnishing further secure mechanisms to guard diligence and minimize pitfalls. An administrative control and data accession (SCADA) system employing the distributed networks of detectors and selectors that interact with the physical terrain is vulnerable to attacks that target the interface between the cyber and physical subsystems. These cyber-attacks are generally vicious conduct that beget uninvited results in the cyber physical world, for illustration, the Stuxnet( 2010) attack that targeted Iran's nuclear centrifuges. An attack that hijacks the detectors in an attempt to give false readings to the regulator can be used to dissemble normal system operation for the control system, while the bushwhacker can commandeer the selectors to shoot the system beyond its safety range. AI result can identify shadow data, cover for abnormalities in data access and alert cybersecurity professional about implicit pitfalls by anyone penetrating the data or sensitive information. This proposes a process- apprehensive approach with the use of steady equations grounded on the physical and chemical parcels of the process and a Multiple Security sphere Nondeducibility (MSDND) frame to descry when a detector signal is being virulently manipulated. A system without any MSDND secure information flows between the AI and cyber observers has smaller sins that can be exploited.
View PDFchevron_right
Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey
Tim Murkomen
GSC Advanced Research and Reviews, 2024
TCP/IP is the backbone of modern network communication, connecting devices across the world. TCP/IP at its core is a suite of protocols that enables the transmission of data between computers, facilitating the foundation of the interconnected global network. At the Application Layer of TCP/IP is where the interaction between software applications and the network occurs. The user-centric protocols such as HTTP, SMTP, FTP, POP3, IMAP and DNS facilitate various tasks at this layer such as web browsing, email communication, and file transfer. This comprehensive survey conducted an exploration of the performance, security and privacy issues at the application layer of the TCP/IP. It initiated by providing a background of TCP/IP model, it's architecture and the core characteristics, with major focus on the application layer. This paper aimed to discuss the state-of-the-art of performance, privacy and security concerns in TCP/IP application layer. It also proposed future research areas to equip researchers, practitioners, policy makers and the decision makers with tangible knowledge, offering guidance in navigating the performance, privacy and security concerns in TCP/IP Application Layer. It aimed to discuss the current performance, privacy and security research gaps at the Application Layer of the TCP/IP Model. The findings of this research sheds light on the performance, privacy and security issues while suggesting the countermeasures to strengthen and optimize the overall performance, security and privacy of TCP/IP model at the application layer. The paper finally suggests future directions and research areas at the TCP/IP application layer.
View PDFchevron_right
The Innocent Perpetrators: Reflectors and Reflection Attacks
Srinivas Arukonda
2015
In this paper we make a comparable study of the various types of Reflector Denial of Service attacks popularly known as DRDoS attacks. We discuss their cause, effects, defense mechanisms proposed so far, the effectiveness of these defense mechanisms and their future relevance. We have also shown how reflection attacks are a potential threat to the cloud which is one of the most popular and highly evolving arenas in the Internet.
View PDFchevron_right
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
ASMA QAISER
2024
View PDFchevron_right
Privacy Preserving Authentication of IoMT in Cloud Computing
BRAMAH HAZELA
EAI endorsed transactions on internet of things, 2024
View PDFchevron_right