{"title":"Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications","authors":"Dinesh Kumar Anguraj","doi":"10.36548/jitdw.2022.2.006","DOIUrl":"https://doi.org/10.36548/jitdw.2022.2.006","url":null,"abstract":"The data surge caused by the increase in the use of IoT devices in our day-to-day activities requires careful storage and maintenance systems to ensure the protection and integrity of private information. Users are provided with prospects to use rule-based programs and services that can be interconnected with their devices thereby enabling automation in the prodigious IoT ecosystem. The sensitive IoT data is generally stored and processed in cloud services. This data may be vulnerable to several threats. It is crucial to protect rule-based programs and sensitive IoT information against cyberattacks. The rule-based program and IoT data integrity and confidentiality can be maintained with the help of the framework proposed in this work. An end-to-end data encryption model based on advanced encryption standard and Intel SGX are used to design the framework of the data privacy preservation model. Real as well as simulated IoT device data are used for securely executing the rule-based programs in the SGX to evaluate the proposed framework.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121581701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"C-FPA: A Cloud-Based FPA Novel Approach to Defend Hotspot Issues and Attacks in WSN","authors":"J. Ananthi, S. Shobana","doi":"10.36548/jitdw.2022.2.004","DOIUrl":"https://doi.org/10.36548/jitdw.2022.2.004","url":null,"abstract":"Wireless Sensor Network (WSN) is a distributed network formed by sensor nodes that perform a specific sensing task like temperature, humidity, fire attacks, and so on. Used in all sorts of application like military, medical, industrial, scientific, and so on, WSN’s are well known for high performance operations. Till date, power conservation and sensor node lifetime remained as the major drawback in such networks where the development of optimization techniques and routing protocols were proposed to overcome them. Also, attacks like DoS (Denial Of Service), Sybil attack, wormhole attack, HELLO flood attack, and identity replication attack are mostly common in a WSN. At present, Hotspot-based issues and attacks is found as one of the major and performance-degrading factor in wireless sensor network. In this paper, we propose a novel cloud-based FPA scheme or approach to defend and withstand such hotspot-related issues and attacks in WSN. Developed with the principle of Cloud, the simulation results prove that the proposed scheme offer high privacy, and routing stability.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of a Human Activity Monitoring System through IoT Sensor and Blynk Cloud Platform","authors":"N. Krishnaraj","doi":"10.36548/jitdw.2022.2.005","DOIUrl":"https://doi.org/10.36548/jitdw.2022.2.005","url":null,"abstract":"Human activity monitoring system plays a major role in the application of surveillance. It can be analyzed through cameras, sensors, and microphone. The traditional approach requires a human intervention for validating the human movement recorded by a surveillance camera and microphone. Therefore, the sensor based approaches are developed to make an alert signal through a buzzer or light, irrespective of the threshold value given to its output. But such sensor based technique also requires a human attention in the monitoring room. The motive of the proposed concept is to address such limitations by connecting the sensors with an Internet of Things (IoT) network and cloud platform for remote recording and monitoring purposes. The proposed work utilizes the Blynk IoT application and cloud server for the analytics.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Artificial Intelligence and its Implementations in Digital Era","authors":"M. Duraipandian","doi":"10.36548/jitdw.2022.2.003","DOIUrl":"https://doi.org/10.36548/jitdw.2022.2.003","url":null,"abstract":"Artificial Intelligence (AI) moderns the present society and opens the door for many applications to boom digitally. AI plays a key role in the field of agriculture to space science. The development on cloud storage and wireless communication systems are assisting the AI to reach certain goals in the digital world. Also the improvements made to the electronic processors and other chips are helping the AI to gain its computational efficiency. The design of micro electronic devices are opening the possibility of moving the sensors to keep in distinguished locations though Internet of Things (IoT) communication. The objective of the paper is to review the performances of AI methodologies in various applications for identifying the research gaps.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Getis-Ord (Gi*) based Farmer Suicide Hotspot Detection","authors":"Amisha Bharti, S. Minz","doi":"10.36548/jitdw.2022.2.002","DOIUrl":"https://doi.org/10.36548/jitdw.2022.2.002","url":null,"abstract":"Farmer suicidal hotspot detection proposed in this paper aims to reduce the death of the farmers. Using geographical information system is vital in predicting potential hotspots for farmer suicide. This study has collected and analyzed data on farmer suicide in India, using state-wise information from the National Crime Records Bureau and has determined the recent higher rate of farmer suicide. Spatial statistics analysis tools that address average nearest neighbor analysis has been used. Global analysis through Moran's Index, analyzed that the farmer suicides have a clustered pattern and plotted a farmer suicidal hotspot map using Getis-Ord (Gi*) analysis. The results show the highest farmer suicide index is in Maharashtra and hence, farmer suicidal hotspot has been found district wise. There are four farmer suicidal factors such as, number of farmer suicide, the population density of farmers, climate, and income. This hotspot geographical region helps to identify future suicidal risk by studying the hotspot map. Moreover, government policy may suggest a hotspot zone to help the overall development of the country’s growth.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132365997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT based Smart Power Extender with Timer Feature Controlled through a Mobile App","authors":"A. Prathik, S. Ahiraj, Y. Harsha, Kevin Prince","doi":"10.36548/jitdw.2022.2.001","DOIUrl":"https://doi.org/10.36548/jitdw.2022.2.001","url":null,"abstract":"The purpose of the task is to construct a prototype of the Smart Power Extender and bridge the distance between the conventional and futuristic extension board. The proposed machine includes a microcontroller-primarily based improvement board that controls this prototype. Also, this prototype presents real-time tracking of the equipment's utilization to a Backend Server that manages the Internet of Things (IoT). This prototype also includes different protection functions provided by app interface, allowing the equipment to run most straightforwardly for a selected time limit. These functions permit the consumer to govern and protect the home equipment linked to it everywhere around the sector with the Internet's assistance.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"June 2021","authors":"","doi":"10.36548/jitdw.2021.2","DOIUrl":"https://doi.org/10.36548/jitdw.2021.2","url":null,"abstract":"","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129435459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURE AND COST EFFICIENT IMPLEMENTATION OF THE MOBILE COMPUTING USING OFFLOADING TECHNIQUE","authors":"Abul Bashar Dr","doi":"10.36548/jitdw.2019.1.006","DOIUrl":"https://doi.org/10.36548/jitdw.2019.1.006","url":null,"abstract":"The offloading techniques have become more prominent among the mobile computing due to the increased number of users and enormous amount of information flowing through the internet. The offloading techniques enhance the competence of the mobile computing by reducing the congestion in the network caused by increased number of users and the enormous data traffic experienced. However in many cases the authentication becomes very essential for the connection establishment. So the paper proposes a secure and cost efficient data offloading technique for the mobile computing to make it safe, secure with an effective management of network traffic. The performance analysis of the security measures proffered in the paper for authentication of the offloading techniques in terms of the security, cost and the delay in the offloading ensures that the proposed method is superior to the existing methods.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT","authors":"Jennifer S. Raj Dr, Vijitha Ananthi J Ms","doi":"10.36548/jitdw.2019.1.005","DOIUrl":"https://doi.org/10.36548/jitdw.2019.1.005","url":null,"abstract":"Green house is generally a building of small or large structures. The structure of the green house is made of walls and the translucent roof, with the capability of maintaining the planned climatic condition. It ensures the growth of plants that requires a specified level of soil moisture, sunlight, humidity and temperature. The green house systems available are human monitored systems that entail the continuous human visit causing distress to the worker and also decrease in the yield if the temperature and the humidity are not properly and regularly maintained. This paves way for the concept of the green house automation. The green house automation formed by the incorporation of the Internet of things and the embedded system addresses the problem faced in the green house and provides with the automated controlling and monitoring of the green house environment replacing the undeviating administration of the farmers. This paper also proposes the automation using internet of things in green house environment by using the Netduino 3 and employing the sensors for the sensing the moisture, temperature, sunlight and humidity, to enhance the production rate and minimize the discomfort caused to the farmers.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EXPLORING DEVOPS: CHALLENGES AND BENEFITS","authors":"Joby P P Dr","doi":"10.36548/jitdw.2019.1.004","DOIUrl":"https://doi.org/10.36548/jitdw.2019.1.004","url":null,"abstract":"The continuous evolving of the information technology towards the enhanced agile and collective strides of working from the document driven working has turned the focus to the features of the information system development and the operations. These agile approaches have paved way for the concepts that provide an incorporated development and operations coined as the DevOps. The DevOps is an enterprise software development and viewed as the appropriate perception for the simultaneous distribution and the positioning of the working software. It enhances and modifies the relationship by promoting improved communication and the cooperation among the business unit. However the adoption of the Development and the Operation being a complex task the paper presents the review on the challenges and the benefits of the DevOps and also explores the DevOps to offer an enhancement in the adoption of the DevOps in the information systems.","PeriodicalId":405344,"journal":{"name":"Journal of Information Technology and Digital World","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}