Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application DOI

Torana Kamble,

Madhuri Ghuge,

Ritu Jain

и другие.

Cluster Computing, Год журнала: 2024, Номер 28(2)

Опубликована: Ноя. 26, 2024

Язык: Английский

Tides of Blockchain in IoT Cybersecurity DOI Creative Commons
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim

и другие.

Sensors, Год журнала: 2024, Номер 24(10), С. 3111 - 3111

Опубликована: Май 14, 2024

This paper surveys the implementation of blockchain technology in cybersecurity Internet Things (IoT) networks, presenting a comprehensive framework that integrates with intrusion detection systems (IDS) to enhance IDS performance. reviews articles from various domains, including AI, blockchain, IDS, IoT, and Industrial IoT (IIoT), identify emerging trends challenges this field. An analysis approaches incorporating AI demonstrates potentiality integrating transform IDS. paper’s structure establishes foundation for further investigation provides blueprint development is accessible, scalable, transparent, immutable, decentralized. A demonstration case studies shows viability combining duo Despite posed by resource constraints privacy concerns, it notable key securing networks continued innovation area necessary. Further research into lightweight cryptography, efficient consensus mechanisms, privacy-preserving techniques needed realize all potential blockchain-powered IoT.

Язык: Английский

Процитировано

8

Federated Learning for Privacy-Preserving Cybersecurity: A Review on Secure Threat Detection DOI Open Access

Nirav Kumar Prajapati

International Journal of Advanced Research in Science Communication and Technology, Год журнала: 2025, Номер unknown, С. 520 - 528

Опубликована: Апрель 12, 2025

Federated Learning's (FL) distributed threat detection technique is a significant advancement in cybersecurity as it preserves privacy while processing data decentralized manner. Centralized security systems that rely on raw collection present two major threats to users because they create regulatory problems addition breaches. FL removes concerns through its model-building process, allowing different organizations work together without sharing private data. This document investigates FL's role an analysis of malware/ransomware detection, IDS applications, secure and network traffic anomaly detection. The paper explores effective privacy-protecting techniques: implementations are protected against Byzantine backdoor attacks using Secure Multi-Party Computation (SMPC), Homomorphic Encryption (HE), Differential Privacy (DP), Model Aggregation. delivers advantages but encounters challenges mainly related excessive communication demands well performance deterioration under adversarial conditions, difficulties with system expansion. research provides exhaustive FL-based frameworks discussing existing applications future developments for these the need advanced methods improve dependability solutions.

Язык: Английский

Процитировано

0

Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application DOI

Torana Kamble,

Madhuri Ghuge,

Ritu Jain

и другие.

Cluster Computing, Год журнала: 2024, Номер 28(2)

Опубликована: Ноя. 26, 2024

Язык: Английский

Процитировано

1