{"title":"Watermarking of EEG Data to Provide Security Based on DWT-SVD and Optimized by Firefly Algorithm","authors":"A. Gupta, Chinmay Chakraborty, B. Gupta","doi":"10.4018/ijdst.307902","DOIUrl":"https://doi.org/10.4018/ijdst.307902","url":null,"abstract":"A watermark embedding into digital media or signal is called digital watermarking for the purpose of enhancing security from copyright encroachment. In this paper, an optimized and advanced watermarking technique has been proposed, which is based on singular value decomposition (SVD) in the discrete wavelet transform (DWT) domain using the firefly algorithm (FA). In this, a watermark logo is embedded into electroencephalogram (EEG) data. To optimize the scaling factor, robustness and imperceptibility have been considered. Further, the performance of the proposed algorithm is also analyzed against various attacks. The results show the adequacy of the proposed algorithm and indicate a higher value of NCC of 0.95 as robustness and PSNR 51.83 as imperceptibility in contrast with the related existing method.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authorization Model for Securing Cloud SaaS Services (Netflix)","authors":"Tanveer Ahmad, R. Pandey, Mohammad Faisal","doi":"10.4018/ijdst.307903","DOIUrl":"https://doi.org/10.4018/ijdst.307903","url":null,"abstract":"At the enterprise level, cloud software as a service (SaaS) is in high demand. As software as a service (SaaS) can be easily provided in a multitenant way, its execution assessment, information inactivity, and authorization are critical issues related to the cloud supplier at the time of providing administrations to sellers. Netflix is a mixed media supplier that gives online streaming from a library of movies and TV arrangement. Netflix services are exclusively based on cloud SaaS. The highlight of the study is to analyze the finest hones over secure cloud environment in authorization perspective based on behavioral biometrics. A conceptual authorization is displayed in this paper to secure cloud services, especially SaaS, when unauthorized access is supported by legitimate users. The use case is taken as Netflix.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123398150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li
{"title":"Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems","authors":"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li","doi":"10.4018/ijdst.307956","DOIUrl":"https://doi.org/10.4018/ijdst.307956","url":null,"abstract":"Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128785969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Granular Approach to Secure the Privacy of Electronic Health Records Through Blockchain Technology","authors":"Megha Jain, D. Pandey, Kewal Krishan Sharma","doi":"10.4018/ijdst.307899","DOIUrl":"https://doi.org/10.4018/ijdst.307899","url":null,"abstract":"The method of storing data in traditional Electronic Health Records (EHRs) becomes even more obsolete when it has to undertake data from more than one institution. This problem is bigger than it seems as, most of the times the patients' medical data is scattered among various Healthcare Centers. Also, these multiple and inconsistent health records are almost never reviewed which further makes them unreliable. All this can be achieved by implementing the Blockchain Technology into the traditional Electronic Health Records. We propose a blockchain technology based Electronic Health Record portal for patients, doctors, and other users to provide temper proof, secure, and efficient access to health records while maintaining the privacy of patient’s health records. The aim of this paper is to deal with the various needs of patients, doctors, and third parties, as well as to see how the system could resolve privacy and security issues in the healthcare industry.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"2023 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115819229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an Assistant Decision Support System for Sports Training Based on Association Rules","authors":"Zhiliang Zeng, Qianqiu Jiang","doi":"10.4018/ijdst.307959","DOIUrl":"https://doi.org/10.4018/ijdst.307959","url":null,"abstract":"In order to quantitatively evaluate the effect of sports training, it is necessary to track the dynamic characteristics of sports by using sports training aided decision support system. When the existing sports training assistant decision support system extracts the features of decision association rules, some redundant features will appear when establishing the global association rules, which increases the amount and difficulty of data calculation and affects the effect of assistant decision support. On this basis, the data fusion of assistant decision support information is carried out, and the optimal assistant decision support scheme is obtained according to the fusion results. The experimental results show that the design system is superior to the existing auxiliary decision-making system in motion recognition rate, motion result accuracy rate, and decision-making accuracy rate, which can provide users with auxiliary decision-making support for sports training and has good practical application effect.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115695436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Description and Implementation of Accounting Digital Rights Management Based on Semantics","authors":"Wei Wang","doi":"10.4018/ijdst.308002","DOIUrl":"https://doi.org/10.4018/ijdst.308002","url":null,"abstract":"Aiming at the problem of security risk of accounting secret information outflow to illegal users due to the introduction of XBRL GL(eXtensible Business Repo Rting Lang Uage for Global Ledg er) technology in accounting information release, a semantic-based accounting digtal rights management description language (ADRM L) is proposed. This method is based on the introduction of digital rights mechanism, this paper describes the rights and obligations of different accounting information publishers and users,ADRML language to facilitate the safe use of semantic segments (accounting elements) defined by the semantic network, in the following, the algorithm of ADRM L parser will be further studied and optimized to improve the parsing efficiency.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Edge Computing Advances in Children's Behavior Observation for Social Internet of Things Systems in Preschool Education","authors":"Danqing Liu, Luqun Liu","doi":"10.4018/ijdst.307952","DOIUrl":"https://doi.org/10.4018/ijdst.307952","url":null,"abstract":"Teachers who observe and analyze children's conduct can learn more about children and the reasons for their behavior. Promoting the fusion of adult and preschool vision through discussion is a basic competency of preschool teachers.Social Internet of Things (SIoT) uses recent advances in collaborativeand social relationships among SIoT users to take advantage of the network's strengths while posing new challenges.With the help of the theory of development, behavioral cues, and individual circumstances, a thorough and holistic interpretation can be made of children's behavior.There is a brief introduction to the concepts of collaborative edge computing and data storage in addition to examples of various socially-minded solutions; for long last, a list of research obstacles is provided. When measured numerically, the ECBO has a positive impact on student accomplishment (97.9%), developmental progress (95.3%), interpersonal interaction (94.6%), parental participation (98.5%), and attention ratio (98%).","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Network Vulnerability Detection and Semantic Data Analysis Optimization Based on Artificial Intelligence","authors":"Huiyan Li, Xinhua Xiao","doi":"10.4018/ijdst.308000","DOIUrl":"https://doi.org/10.4018/ijdst.308000","url":null,"abstract":"In order to solve the network security vulnerabilities in the process of network information interaction, which affect the integrity and confidentiality of data. The computer network vulnerability detection and semantic data analysis optimization based on artificial intelligence are proposed, and the results show that the final accuracy of the test set is improved to 88.5%, but the false positive rate is as high as 18%. Based on the direct classification model, the code under test is compared with the vulnerability template, the model fuses the two direct classification models and reduces the false positive rate to less than 5% under the condition that the accuracy is basically the same.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Deep Learning Techniques in Fruit Disease Detection","authors":"Somya Goel, Kavita Pandey","doi":"10.4018/ijdst.307901","DOIUrl":"https://doi.org/10.4018/ijdst.307901","url":null,"abstract":"The improvement in computer vision techniques made the implementation of various agriculture related problems easy. One such problem is fruit disease detection. There has been enormous research on different fruits like the apple, mango, olive, kiwi, orange, passion fruit, and others using deep learning techniques. This article summarizes the major contributions of this field over past few years. As per the authors' knowledge, there is no survey paper specifically on fruit disease detection using deep learning techniques. The technical analysis of deep learning techniques to predict diseases in fruits have been done in this article. The study also presents a comparative study of image acquisition, image pre-processing, and segmentation techniques along with the deep learning models used. The study concluded the fact that the best fit deep learning model can be different depending on the computation power of the system and the data used. Directions of future research have also been discussed in the article.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Application of the Internet of Things Service Platform Based on Semantic Network","authors":"Min Ren","doi":"10.4018/ijdst.308004","DOIUrl":"https://doi.org/10.4018/ijdst.308004","url":null,"abstract":"In order to study the Internet of Things service platform based on semantic Network, a service-oriented clustering labeling method is proposed, firstly, a semantic Web service similarity computing method is proposed to solve the shortcomings of the existing methods. This method describes the designed semantic Web service annotation clustering algorithm based on AP algorithm. The distance matrix and related parameters of the algorithm are calculated and assigned according to the results of similarity calculation. The correctness of preference parameter selection will be compared and verified in the service discovery system. The greater the value of damping coefficient, the more iterations, and the slower the convergence rate. However, when the value of damping coefficient is 0.7, the number of iterations is moderate and the convergence rate is the best, which proves that this method has a better effect on service function matching.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}