The Internet of Things : New Interoperability, Management and Security Challenges
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung School of Computing, Engineering and Mathematics, Western Sydney University, Sydney, Australia
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,management, and privacy
Internet of Things, Wireless Network, Security, Privacy, Management & Interoperability
For More Details :
http://aircconline.com/ijnsa/V8N2/8216ijnsa06.pdf
Volume Link :
http://airccse.org/journal/jnsa16_current.html
Wearable Technology Devices Security and Privacy Vulnerability Analysis
Ke Wan Ching and Manmeet Mahinderjit Singh School of Computer Sciences,University Sains MalaysiaPenang, Malaysia
Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable technology is not mature yet in term of device security and privacy acceptance of the public. There exists some security weakness that prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is authentication issue. The low processing due to less computing power of wearable device cause the developer's inability to equip some complicated security mechanisms and algorithm on the device. In this study, an overview of security and privacy vulnerabilities on wearable devices is presented.
Wearable Technology; Wearable Devices; GoogleGlass; Smartwatch
For More Details :
http://aircconline.com/ijnsa/V8N3/8316ijnsa02.pdf
Volume Link :
http://airccse.org/journal/jnsa16_current.html
Big Data Security and Privacy Issues in the CLOUD
Ali Gholami and Erwin Laure High Performance Computing and Visualization Department, KTH- Royal Institute of Technology, Stockholm, Sweden
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. This paper reviews the existing technologies and a wide array of both earlier and state-ofthe-art projects on cloud security and privacy. We categorize the existing research according to the cloud reference architecture orchestration, resource control, physical resource, and cloud service management layers, in addition to reviewing the recent developments for enhancing the Apache Hadoop security as one of the most deployed big data infrastructures. We also outline the frontier research on privacy-preserving data-intensive applications in cloud computing such as privacy threat modeling and privacy enhancing solutions
Cloud Security, Privacy, Trust, Big Data, Virtualization, Data Protection
For More Details :
http://aircconline.com/ijnsa/V8N1/8116ijnsa04.pdf
Volume Link :
http://airccse.org/journal/jnsa16_current.html
An Intelligent Classification Model for Phishing Email Detection
Adwan Yasin and Abdelmunem Abuhasan College of Engineering and Information Technology, Arab American University, Palestine
Phishing attacks are one of the trending cyber-attacks that apply socially engineered messages that are communicated to people from professional hackers aiming at fooling users to reveal their sensitive information, the most popular communication channel to those messages is through users’ emails. This paper presents an intelligent classification model for detecting phishing emails using knowledge discovery, data mining and text processing techniques. This paper introduces the concept of phishing terms weighting which evaluates the weight of phishing terms in each email. The pre-processing phase is enhanced by applying text stemming and WordNet ontology to enrich the model with word synonyms. The model applied the knowledge discovery procedures using five popular classification algorithms and achieved a notable enhancement in classification accuracy; 99.1% accuracy was achieved using the Random Forest algorithm and 98.4% using J48, which is –to our knowledge- the highest accuracy rate for an accredited data set. This paper also presents a comparative study with similar proposed classification techniques.
phishing, data mining, email classification, Random Forest, J48
For More Details :
http://aircconline.com/ijnsa/V8N4/8416ijnsa05.pdf
Volume Link :
http://airccse.org/journal/jnsa16_current.html
A Benchmark for Designing Usable and Secure Text-Based Captchas
Suliman A. Alsuhibany Computer Science Department, College of Computer, Qassim University, Buridah, Saudi Arabia
An automated public Turing test to distinguish between computers and humans known as CAPTCHA is a widely used technique on many websites to protect their online services from malicious users. Two fundamental aspects of captcha considered in various studies in the literature are robustness and usability. A widely accepted standard benchmark, to guide the text-based captcha developers is not yet available. So this paper proposes a benchmark for designing usable-secure text-based captchas based on a community driven evaluation of the usability and security aspects. Based on this benchmark, we develop four new textbased captcha schemes, and conduct two separate experiments to evaluate both the security and usability perspectives of the developed schemes. The result of this evaluation indicates that the proposed benchmark provides a basis for designing usable-secure text-based captchas.
Text-Based CAPTCHA, security, usability, benchmark
For More Details :
http://aircconline.com/ijnsa/V8N4/8416ijnsa04.pdf
Volume Link :
http://airccse.org/journal/jnsa16_current.html