Blockchain Compliance in Supply Chain Regulations: A Comprehensive Overview DOI

B Thamizhkani.,

Neeraj Varshney, Mallikarjuna Rao Gundavarapu

et al.

Published: Nov. 23, 2024

Language: Английский

Enhancing accuracy through ensemble based machine learning for intrusion detection and privacy preservation over the network of smart cities DOI Creative Commons

Mudita Uppal,

Yonis Gulzar, Deepali Gupta

et al.

Discover Internet of Things, Journal Year: 2025, Volume and Issue: 5(1)

Published: Feb. 12, 2025

Language: Английский

Citations

0

A Novel Approach to Strengthening Web-Based Cloud Services: Two-Factor Access Control DOI Creative Commons

Praveen Kumar,

C. Raghavendra,

Ratnam Dodda

et al.

E3S Web of Conferences, Journal Year: 2024, Volume and Issue: 472, P. 02001 - 02001

Published: Jan. 1, 2024

In this paper we introduce a recent and evolved two-factor authentication (2FA) access govern system specially designed for webbased cloud computing services. Our innovative encompasses an attribute-based mechanism that combines user’s secret key with lightweight safety device. significantly improves security, particularly in scenarios where multiple users share single computer web-based services, as is contingent on the presence of both components. addition, enables server to enforce constraints based identical attributes, while maintaining highest extent user confidentiality protection. The server’s verification procedure focuses exclusively verifying meet necessitated criteria, without accessing their exact identities. To further confirm practicability usefulness our 2FA system, conduct in-depth simulation portion study.

Language: Английский

Citations

2

Advancing Cloud Security Frameworks Implementing Distributed Ledger Technology for Robust Data Protection and Decentralized Security Management in Cloud Computing Environments DOI

P. Rajasekar,

K. Kalaiselvi,

Raju Shanmugam

et al.

Published: July 24, 2024

Language: Английский

Citations

2

Approaches and Methodologies for Distributed Systems: Threats, Challenges, and Future Directions DOI

Bhawna,

Veena Parihar

Published: March 8, 2024

The widespread use of distributed systems has led to a growing concern over their security. With the increasing number devices connected Internet, risk security breaches in these become major issue. In this chapter, we will explore various threats that face, including hacking, malware, and denial service attacks. We also examine current state standards protocols for systems, those proposed by industry groups government organizations. addition, discuss challenges wireless communication integration into existing networks. chapter cover access control methods, such as role-based (RBAC), discretionary (DAC), mandatory (MAC), can be applied systems. Finally, summarize key issues securing future directions research development.

Language: Английский

Citations

1

Data Encryption in Cloud Storage DOI Open Access

Sandeep Reddy Gudimetla

International Research Journal of Modernization in Engineering Technology and Science, Journal Year: 2024, Volume and Issue: unknown

Published: March 21, 2024

Among the critical aspects directly linked to technology evolvement is cloud computing.Over years, amount of data among people and businesses has been growing, posing a challenge its storage management.To help address this issue, tech professionals companies have attempted find secure, reliable, trusted, user-friendly solution management, such solutions being computing.Storing in promotes on-demand services intense applications boosted by secured system configurable computing resources.However, before user decides outsource personal cloud, it must be protected integrating distinct encryption techniques.Data essential advancing security any that users store storage.Data classified into symmetric asymmetric encryption.

Language: Английский

Citations

1

Maturity Model for Information Access Management of Peruvian IT Service Providers based on ISO/IEC 27001 and CMMI Security Controls DOI

Sergio Huamán,

Luis Ponce,

Lenis Wong

et al.

Published: April 24, 2024

In the current context of increasing cyber threats to Latin American IT service providers, cost data breaches is expected increase 31% by 2023, which highlights urgency strengthening security practices. Therefore, it proposed improve maturity in access management, with development a model based on ISO/IEC 27001:2022 designed for Peruvian providers. The study consists three stages: analysis, design, and validation. first stage, comparative analysis made between success factors, cybersecurity aspects, models management mechanisms. second third stages cover building phases according De Bruin's methodology. evaluation scope, level structure CMMI are defined as well criteria where user life cycle, type regulatory compliance. Finally, validated experts field deployed an enterprise sector. results obtained from validation showed that "understandability", "usefulness practicality", "accuracy", "comprehensiveness", "sufficiency", "relevance", "usability" "accuracy" average rating 4.6 (agree). respect implementation model, elimination phase had index 0.14, placed at initial level. On other hand, exceeded 0.55, placing them highest levels achievable. this way, improvement proposal was accepted.

Language: Английский

Citations

1

Algorithmic Approaches to Securing Cloud Environments in the Realm of Cybersecurity DOI

A. Devipriya,

R. Anto Arockia Rosaline,

M. Ramkumar Prabhu

et al.

Published: April 12, 2024

This paper introduces a systematic methodology for enhancing cloud security in information systems by applying mathematical algorithms cybersecurity. Using the most sophisticated computational methods, our approach strives to boost posture of cloud-based platforms not only identifying but also blocking, and rectifying various cyber threats. We start with detailed review analysis algorithms, which contribute identification gaps current research landscape solutions already existing. proceed performing requirement during we set up targets environment be optimized. The second step consists deliberation on what best are is involved process that will meet identified requirements. did development work prototype described beforehand. It was integrated tested KPI result. Performance metrics, including detection accuracy (98.5%), false positive rate (0.2%), response time (25 milliseconds), resource utilization (CPU: JSON-LD, Microformats, MAP-trees (10%, 30%, 40%) were assessed determine functionality algorithms. Thus, effectiveness values obtained following way: malware (99%) – intrusion (97%) data breach prevention (95%) insider threat (98%) determined through comprehensive testing numerous One more thing I would like mention scalability parameter they function both 1,000 concurrent users handle 1TB per day requests second. team calculated found out 95% over 90% thus highly scalable growing demand. Besides, user satisfaction ratings were; (4.5), (4.3), (4.7) (4.6) usability, reliability, performance respectively scale one five using feedback from stakeholder end-users as rating tool.

Language: Английский

Citations

1

Cloud-Enhanced Machine Learning Models for Predictive Maintenance in Industrial IoT DOI

R. Usharani,

V. M. Sivagami,

K. Saravanan

et al.

Published: March 22, 2024

Language: Английский

Citations

1

Unveiling Blockchain's Potential with Consensus Algorithms and Real-World Applications in Supply Chain Management DOI

M. Balasubramani,

K. Subathra,

Swathi Agarwal

et al.

Published: March 22, 2024

Language: Английский

Citations

1

SDN-based Port Hopping Technique for Mitigating Network Attacks DOI
Joseph Henry Anajemba, Nedal Ababneh, Yasir Hamid

et al.

2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Journal Year: 2023, Volume and Issue: 12, P. 1 - 6

Published: Sept. 21, 2023

Software Defined-Network (SDN) scheme has recently proven to be efficient in resisting different attack vectors which plague the Internet of Things (IoT) and other networks. Logically, SDN utilizes port hopping as an active defense mechanisms through consolidated regulation network programmable characteristics for mitigation attacks such Denial-of-Service (Dos), scanning attempts, kinds reconnaissance a network. However, existing techniques are limited terms inability completely mask service use extra hardware capabilities apparently results overhead. To address these issues, this paper proposes technique based on masked communication services (PHCSS) not only have capacity detecting clarifying malevolent data packets more efficiently compared but also reduce cost protected server, resist both DoS, internal attacks, attempts. Results our experiments suggest that approach can successfully secure from DoS while overwhelming excessive resources controller.

Language: Английский

Citations

3