Search results

1 – 2 of 2
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 28 December 2020

Sridhar Reddy Vulapula and Srinivas Malladi

Hybrid cloud composing of public and private cloud is seen as a solution for storage of health care data characterized by many private and sensitive data. In many hybrid…

92

Abstract

Purpose

Hybrid cloud composing of public and private cloud is seen as a solution for storage of health care data characterized by many private and sensitive data. In many hybrid cloud-based solutions, the data are perturbed and kept in public cloud, and the perturbation credentials are kept in private cloud.

Design/methodology/approach

Hybrid cloud is a model combing private and public cloud. Security for the data is enforced using this distribution in hybrid clouds. However, these mechanisms are not efficient for range query and retrieval of data from cloud. In this work, a secure and efficient retrieval solution combining K-mean clustering, geometric perturbation and R-Tree indexing is proposed for hybrid clouds.

Findings

Compared to existing solution, the proposed indexing on perturbed data is able to achieve 33% reduced retrieval time. The security of indexes as measured using variance of differences was 66% more than existing solutions.

Originality/value

This study is an attempt for efficient retrieval of data with range queries using R-Tree indexing approach.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Access Restricted. View access options
Article
Publication date: 6 June 2016

Ema Kusen and Mark Strembeck

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision…

884

Abstract

Purpose

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.

Design/methodology/approach

The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.

Findings

Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.

Originality/value

To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 2 of 2
Per page
102050