{"title":"The Current Status and Challenges of Cybersecurity Risks","authors":"Xudong Sun","doi":"10.11648/j.iotcc.20241201.12","DOIUrl":"https://doi.org/10.11648/j.iotcc.20241201.12","url":null,"abstract":"<i>Research Context and Aims</i>: The swift expansion of internet technologies has rendered the digital network essential to contemporary life, highlighting the significance of cybersecurity. Network data not only encompasses personal information management and communication but also pertains to the protection of confidential corporate, governmental, and vital national infrastructures. Consequently, cybersecurity has become a critical issue in current society. Frequent occurrences like privacy violations, data thefts, and national security threats underline the critical need for enhanced network defenses and protective measures. <i>Research Approach</i>: This study examines the state of cybersecurity by assessing pertinent studies across public databases such as PubMed, CNKI, and CrossRef. It compiles and evaluates significant cybersecurity events including data breaches, malware attacks, and phishing, outlining key security challenges faced by networks. The paper also evaluates the current cybersecurity technologies and methods, pinpointing their effectiveness and limitations in addressing network threats. <i>Research Findings</i>: The findings reveal that cyber attackers have refined their methods, employing sophisticated, covert techniques for prolonged periods, which often outpace current defenses. In cases of data breaches, perpetrators frequently utilize precise social engineering or deploy advanced persistent threats (APTs). Additionally, the proliferation of IoT technology has not only obscured the boundaries of cybersecurity but also broadened potential attack vectors. Despite the implementation of security measures like encryption and multi-factor authentication, these can be compromised by managerial or operational oversights. <i>Research Conclusions</i>: With the cybersecurity landscape becoming increasingly challenging, future defenses will likely prioritize the adoption of integrated, proactive strategies. It is crucial to foster the development of smart security solutions, such as leveraging artificial intelligence to detect and respond to anomalies. Furthermore, boosting security awareness among users and ensuring standardized practices are imperative. Ultimately, formulating future cybersecurity policies will require a holistic approach, integrating technological, managerial, legal, and educational initiatives to forge a robust network defense architecture.\u0000","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":" 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141678443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chidi Ukamaka Betrand, C. Onukwugha, M. Benson-Emenike, Christopher ifeanyi Ofoegbu, Nneka Martina Awaji
{"title":"File Storage Security in Cloud Computing Using Hybrid Encryption","authors":"Chidi Ukamaka Betrand, C. Onukwugha, M. Benson-Emenike, Christopher ifeanyi Ofoegbu, Nneka Martina Awaji","doi":"10.11648/j.iotcc.20241201.11","DOIUrl":"https://doi.org/10.11648/j.iotcc.20241201.11","url":null,"abstract":"","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":" 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139625864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on Cybersecurity Control and Monitoring Techniques in Industrial IoT: Industrial Control Systems","authors":"Boye Aziboledia Frederick, Onate Egerton Taylor","doi":"10.11648/j.iotcc.20231101.11","DOIUrl":"https://doi.org/10.11648/j.iotcc.20231101.11","url":null,"abstract":"","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Quality of Service on Customer Loyalty: A Critical Study of Cellular Mobile Broadband Sector in Pakistan","authors":"Imran Khan, Alamgir Naushad, M. Sheharyar","doi":"10.11648/j.iotcc.20221004.11","DOIUrl":"https://doi.org/10.11648/j.iotcc.20221004.11","url":null,"abstract":": Quality of Service (QoS) is the degree to which a service provided by an operator promotes customer satisfaction. In telecommunications sector service quality is a set of specific parameters provided by service providers to their customers, which are necessary for achieving the required functionality of the requested service. In current global competitive telecommunication business market, the quality of a service is being considered as a differentiator for users if service features or price of services of service providers are similar. The potential of growth and scope for telecommunication services in general and mobile broadband services in developing countries like Pakistan is encouraging. The objective of this research work is to analyze the impact of service quality gaps with customer loyalty in the mobile broadband sector of Pakistan. The cellular mobile operators in Pakistan are facing issue of declining customer loyalty and increasing churn rate of customers in search of their expected quality of service. In this research the service quality gaps will be considered as independent variables while customer loyalty as dependent variable. The SERVQUAL model proposed by Parasuraman, Zeithaml and Berry (1988) will be used to probe the effects of five dimensions of service quality viz. tangibility, assurance, responsiveness, reliability, and empathy on consumer loyalty. Data of 200 current LTE broadband consumers using mobile service of four cellular mobile operators of Pakistan (Jazz-PMCL, Ufone-PTML, Zong-CMPak and Telenor) will be collected through structured questionnaires. The response received from end users of broadband services through these questionnaires will be analyzed through SPSS to determine the causal relationship of service quality dimensions and customer loyalty. The results of analysis will depict that the service quality dimensions will have significant and positive impact on customer loyalty.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Multi-sensor Data Fusion in Greenhouse","authors":"Li Guangzhong","doi":"10.11648/J.IOTCC.20210901.12","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20210901.12","url":null,"abstract":"With the development of communication, computer and sensor technology, the application of Internet of things technology to agricultural monitoring is the trend of modern agricultural development. Real time and accurate acquisition of farmland environmental information is the basis of precision operation and intelligent management of agriculture, and it is also an important part of agricultural information construction. A farmland environment information monitoring system based on wireless sensor network is designed, crop growth environment parameters are collected by sensor nodes distributed in the field, using CC2530 to build ZigBee data transmission network, the information transmission between ZigBee network, GPRS network is realized by embedded gateway, and the remote monitoring of farmland environmental information is realized. Before data is transmitted, The negligent errors in the measurement data are excluded by Grubbs’ criterion, then the rest of the data are preprocessed based on the arithmetic mean and the batch estimates, lastly the data are fused using adaptive weighted fusion algo-rithm in the condition of minimal mean square error. The results show that the data by hybrid algorithm has perfect accuracy and minimal error. Using this hybrid data processing method, a large number of data can be fused into a data closest to the real situation, and more accurate environmental information can be obtained. The practical results show that, this solution enhances accuracy and reliability of the greenhouse environment detection. This system improves the information level of greenhouse planting, and applys to the management of greenhouse.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123316081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Edge Computing Offload Method Based on NSGA-II for Power Internet of Things","authors":"Yue Ma, Xin Li, Liao Jianbin","doi":"10.11648/J.IOTCC.20210901.11","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20210901.11","url":null,"abstract":"In the ubiquitous power Internet of things, all kinds of growing power terminal equipment and business applications will generate massive data, which will cause huge pressure to the master station, and high delay and security cannot meet the requirements of new business forms. Edge computing organically integrates computing, storage, and other resources on the edge of the network and responds to the task request of the network edge node timely and effectively according to the principle of nearest service. Due to the limited resources of edge nodes, such as power monitoring camera capability, resources, bandwidth, energy, etc., computing offload is a key problem of edge computing. To solve this problem, this paper proposes a method of edge computing offload based on genetic algorithm. Firstly, in the edge-computing scenario of the power Internet of things, we analyze the computing unloading problem model under the time sequence condition. Then, aiming at the optimal decision-making problem of energy consumption and time delay of terminal equipment, we creatively transform the problem of computational offload into the problem of multi-objective optimization. In the genetic algorithm, we use NSGA-II to achieve the multi-objective optimization of the decision-making. Through conversion, time delay and energy consumption, the optimization can be achieved. Finally, we designed a simulation experiment. The results show that the unloading decision of NSGA-II can reach the best. The results show that the results of NSGA-II can be distributed in a wider range.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126586283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Block Chain Product Evaluation System","authors":"Shao Yong, Yan Changshun","doi":"10.11648/J.IOTCC.20200804.13","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20200804.13","url":null,"abstract":"Block chain technology has occupied a very important position in today's society. This emerging technology has been successfully explored and developed in many fields and scenarios. However, due to the fact that block chain technology is still in the exploratory stage, there is no rigid specification and index for block chain products, Integrating the research results of block chain technology architecture and security risk assessment, this paper designs a set of evaluation indicators for block chain products. The indicators are divided into six aspects, including P2P network technology evaluation index, distributed ledger technology evaluation index, asymmetric encryption technology evaluation index, smart contract evaluation index, consensus mechanism evaluation index and other security technologies Evaluation indicators, each big evaluation index is subdivided into several more in-depth evaluation indicators, and each of the specific analysis and explanation. Finally, based on the previous analysis and design work, a block chain product evaluation software is developed, which provides users with the function of comprehensive evaluation of block chain products. The design and software implementation of the block chain product evaluation system can effectively improve the efficiency in the development of block chain products and the quality of the products themselves, which is conducive to the further development of the block chain field.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Farhad Hossain, S. Islam, Partha Chakraborty, A. K. Majumder
{"title":"Predicting Daily Closing Prices of Selected Shares of Dhaka Stock Exchange (DSE) Using Support Vector Machines","authors":"Md. Farhad Hossain, S. Islam, Partha Chakraborty, A. K. Majumder","doi":"10.11648/J.IOTCC.20200804.12","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20200804.12","url":null,"abstract":"Support Vector Machines (SVM) has been a naval research field in scientific research for forecasting. This study deals with the application of SVM in financial time series predicting. This paper suggests a model of stock market prediction based on SVMs with appropriate parameter values. A data set of daily closing prices of five selected companies such as Alhaj Textiles Limited, Apex Tannery Limited, Jamuna Bank Limited, Padma Oil Company, and Square Pharmaceuticals Limited of the Dhaka Stock Exchange (DSE) from 01 January 2017 to 13 August 2019 was selected and uses these data to train the model and checks the predictive power of the model. The obtained results show that all the companies closing stock prices are non-stationary. Also the number of support vectors and mean square error is decreasing pattern with the increase of kernel parameter. It is also found that original data and predicted data are very much identical. The result shows that in all the cases SVM model has some predictive power it can be used to forecast financial time series. Several methods, such as SVM, ARIMA, single exponential smoothing, and double exponential smoothing, were performed to predict Bangladesh's stock market. Amazingly, the outcome shows the most efficient method to be Support Vector Machine because of its lowest forecasting errors.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things (IoT): The Technology, Architecture and Applications – Prospects in Nigeria","authors":"Ayeni Ayobami Joshua","doi":"10.11648/J.IOTCC.20200804.11","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20200804.11","url":null,"abstract":"There is presently a technological revolution in the world and our way of life has started changing at a fast forward pace. Thanks to Information and Communication Technology (ICT) and the Internet. The Internet is a global inter-connection of systems over a Wide Area Network (WAN). The Things in the Internet of Things could be described as intelligent objects capable of connecting to the Internet while the objects are software or electronically embedded. Internet of Things (IOT) is an enhanced technology that allows connectivity between physical objects wirelessly through the internet and enables information sharing with other networks for the purpose of processing such for the users; an interaction between the physical and digital worlds through a loose assemblage of sensors and actuators without human intervention. IoT is the new platform for network communication. Infrastructure, Communication, Interfaces, Protocols and standard are some of the fundamental issues involve in the development of Internet of Things. IoT applications are developed software embedded with objects such as the sensors to drive the Air-Conditioners in homes, Cars, home and street lightening systems, Micro waves transportation and the automotive industries. This paper discusses the IoT as one of the emerging concepts of the ICT revolution - the technology, architecture and applications. Finally, a brief elicitation of the benefits of this great concept (IoT) and its applications to Nigeria and Nigerians is presented.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130645960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad B. A. Joolfoo, Radhika Dhurmoo, R. Jugurnauth
{"title":"Design of a Recommender System (RS) for Job Searching Using Hybrid System","authors":"Muhammad B. A. Joolfoo, Radhika Dhurmoo, R. Jugurnauth","doi":"10.11648/J.IOTCC.20200803.11","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20200803.11","url":null,"abstract":"By and large, searching for work while examining a rundown of enlisting positions on enrollment locales, which truly cost a lot of time and cash is an irritating thing to do Although most of the time those jobs are not always suitable with users, or users are not satisfy. By doing this, recruiters waste their time by making sure that they are qualify or not. This paper seeks to address a very important issue on the recruitment process which is about matching jobs seekers with jobs offers. These days, the coordinating procedure between the candidate and the activity offers is one of the serious issue’s organizations need to deal with. Short listing candidates and screening resumes are long time-consuming tasks for the company, especially when 80 percent to 90 percent of the resumes received for a role are unquailed. We have designed and proposed a hybrid personalized recommender system used for job seeking and online recruiting websites adapted to the cold start problem using a collaborating predictive algorithm. The hybrid system is composed of Content-Based filtering as well as Knowledge-based Approach which will be has been coded using the Python language. Precise Recommender Systems are very important nowadays.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127007274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}