{"title":"Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices","authors":"Xixi Yan, Chaochao Yang, Qichao Zhang, Jinxia Yu","doi":"10.1504/ijes.2020.110655","DOIUrl":"https://doi.org/10.1504/ijes.2020.110655","url":null,"abstract":"Attribute-based encryption mechanism is widely used in outsourcing systems because of its characteristics of 'one-to-many' communication. However, users' attributes often change dynamically. In order to solve the problem of attribute revocation in the attribute-based encryption scheme in the outsourcing systems, a revocable ciphertext policy attribute-based encryption in data outsourcing systems from lattices is proposed. The scheme uses the LWE problem to construct the encryption and decryption algorithm, which can resist the quantum attack. Tree-access structure is adopted to realise flexible fine-grained access strategy. In addition, with the help of the data outsourcing management server, the attribute key and ciphertext are updated to achieve immediate attribute revocation. The scheme is proved to be secure under the selective attribute and selective plaintext attacks. The comparative analysis shows that the scheme has a significant improvement in performance, and it supports immediate attribute revocation, which is more suitable for the dynamic change of users in the outsourcing systems, such as social network platforms.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature selection optimisation of software product line using metaheuristic techniques","authors":"Hitesh Yadav, A. Charan Kumari, R. Chhikara","doi":"10.1504/ijes.2020.10026155","DOIUrl":"https://doi.org/10.1504/ijes.2020.10026155","url":null,"abstract":"The role of software product line (SPL) is very important in representing the same system with multiple variants. Feature models are used to define SPL. In this paper, genetic algorithm (GA), hyper-heuristic algorithm and particle swarm optimisation (PSO) have been applied for feature selection optimisation in SPL. Also, an improved fitness function is applied for optimisation of features in SPL. The objective function is designed by taking reusability and consistency of features (components) into consideration. Furthermore, we have used a case study and discussed about software product line in detail. A non-parametric test, i.e., Kruskal-Wallis test has been performed to analyse performance and computation time of 20 to 1,000 features sets and identify core features. Through extensive experimental analysis, it is observed that PSO outperforms GA and hyper-heuristic algorithm.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122151289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A feature selection model for prediction of software defects","authors":"Amit Kumar, Y. Kumar, Ashima Kukkar","doi":"10.1504/ijes.2020.10029444","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029444","url":null,"abstract":"Software is a collection of computer programs written in a programming language. Software contains various modules which make it a complex entity and it can increase the defect probability at the time of development of the modules. In turn, cost and time to develop the software can be increased. Sometimes, these defects can lead to failure of entire software. It will lead to untimely delivery of the software to the customer. This untimely delivery can responsible for withdrawal or cancellation of project in future. Hence, in this research work, some machine learning algorithms are applied to ensure timely delivery and prediction of defects. Further, several feature selection techniques are also adopted to determine relevant features for defect prediction.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications","authors":"B. Gupta, Megha Quamara","doi":"10.1504/ijes.2020.10029445","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029445","url":null,"abstract":"With exploding growth in information technology (IT), numerous services and applications having enhanced capabilities are coming into picture with an aim to serve the users. Internet of things (IoT) along with its enabling cutting-edge technologies is establishing a scenario where these services can be utilised effectively. However, with large number of users and applications, it becomes challenging to safeguard the identifying information being transmitted to provide access to these services. This paper presents a refined version of an integrated attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications. System-wide attributes not only restrict the users to access the remote cloud services, but also ensure user anonymity. We also implement the proposed mechanism on ACPT and AVISPA tool for its validation and to verify its correctness. Moreover, we present an analysis of its security and performance efficiency on the basis of different parameters.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114305944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of vision aided strapdown integrated navigation in lane vehicles","authors":"Qi Wang, Chang-song Yang, Shaoen Wu","doi":"10.1504/ijes.2020.10029469","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029469","url":null,"abstract":"The application of global navigation satellite system (GNSS) is extensive in lane applications with the development of science and technology. Vision aided strapdown integrated navigation is an effective aided-navigation method in the case of GNSS failure in lane vehicles, which plays an important role in realising high-precision navigation of lane navigation system. A vision-aided navigation system based on GNSS positioning is constructed using the electrical powered platform as the research object. The hardware platform of vision navigation system is presented and digital image processing is used to segment the collected lane image. The image pre-processing operation, including denoising filtering and greyscale processing, is carried out to complete the segmentation and get the effective navigation area. According to the effective area of navigation, a navigation datum line is extracted by the least squares linear fitting and Hough transform. According to the camera imaging model and the camera's internal and external parameters, the navigation datum line in the image coordinates is transformed into the world coordinates, and the heading angle is calculated. Kalman filter algorithm is used to fuse the navigation parameters of the vision navigation module and the GNSS positioning module, and the integrated navigation model is established.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Release and collection method of residual energy for one-dimensional linear-zone internet of things","authors":"Haibo Luo, Zhiqiang Ruan","doi":"10.1504/ijes.2020.10029454","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029454","url":null,"abstract":"Energy consumption is one of the most important considerations when designing routing and transmission protocols of sensing networks in internet of things. In order to achieve low and balanced power consumption, an effective method is to refer to the residual energy of nodes. Some existing energy-efficiency routing algorithms are designed according to the residual energy of nodes, but they do not give the way of residual energy collection. In this paper, we design a strategy for releasing and collecting residual energy for one-dimensional linear topology networks. By listening to the broadcast messages and evaluating residual energy of forward nodes, nodes can dynamically update the residual energy information of all potential forwarders. The collection error is also analysed theoretically. This method can be applied to opportunistic routing and relay node selection algorithms. The simulation results show that our proposed method has very low collection error, and the error will not accumulate with the operation of the network.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121574622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bhabendu Kumar Mohanta, B. Sahoo, A. K. Turuk, Srichandan Sobhanayak, Kavita Jaiswal, Debasish Jena
{"title":"Container-based task scheduling for edge computing in IoT-cloud environment using improved HBF optimisation algorithm","authors":"Bhabendu Kumar Mohanta, B. Sahoo, A. K. Turuk, Srichandan Sobhanayak, Kavita Jaiswal, Debasish Jena","doi":"10.1504/ijes.2020.10029448","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029448","url":null,"abstract":"In conventional cloud computing technology, cloud resources are provided centrally by massive data centres. Therefore, edge computing technology has been proposed, where cloud services can be extended to the edge of the network to decrease a network congestion. The management of the resources is a major challenge before the researcher. Therefore, in this paper, a task scheduling algorithm based on hybrid bacteria foraging optimisation (HBFA) has been proposed for allocating and executing an application's tasks. The proposed algorithm aims to minimise the completion time and maximise resource utilisation in the edge network. A rigorous simulation has been done to test performance of the proposed strategy to compare it with state of art algorithms. The proposed strategy shows better performance compared to the existing work.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Home security alarm system for middle-aged people living alone","authors":"Guangyi Ma, Hui Xu, Xijie Zhou, Wei Sun","doi":"10.1504/ijes.2020.10029446","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029446","url":null,"abstract":"How to ensure middle-aged people's security has become an urgent social issue in China. Existing security systems are difficult to initialise with fast electrodes consumption. Therefore, we designed a smart security device suitable for middle-aged and elderly users. We select STM32 and CC2530 as master controller for the device, which is equipped with a camera module, GSM/GPRS module, smoke sensors, flame sensors, and infrared sensors. The camera module is used to capture the live pictures of the monitored areas, then these pictures will be transmitted to the users by the GSM module. Multiple CPU can increase the speed of operation, and ZigBee technology for wireless transmission can lower the loss of the supply. Compared with other security systems, the proposed program optimises the interface to make interaction operation easier for middle-aged and older users. The experimental results show that the proposed system has low power dissipation, convenient operation and high stability.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127345787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID aided SINS integrated navigation system for lane applications","authors":"Qi Wang, Chang-song Yang, Shaoen Wu","doi":"10.1504/ijes.2020.10029468","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029468","url":null,"abstract":"To improve the lane vehicle position accuracy, RFID technology is applied to correct the position of the SINS irregularly with label positioning. The acceleration data of the vehicle in three directions is measured by the accelerometers of the inertial measurement unit; the attitude matrix is updated in real time using the angular velocity of the gyroscope output space, and the acceleration component is transformed into the geographic coordinate system, and the acceleration of the inertial measurement unit. The data is subjected to an integral operation process to obtain a spatial displacement value of the vehicle. The real-time updating algorithm of the attitude matrix and the processing of the inertial measurement unit signal are presented. The quaternion-based algorithm is used to solve the attitude matrix as well as updating the coordinate system of the inertial navigation attitude matrix in real time. The Hilbert-Huang transform is used to filter the acceleration signal to solve the integrator saturation problem caused by the low-frequency component of the acceleration signal. The EMD algorithm based on the continuous root mean square error is applied in rejecting the low-frequency components in the signal. The simulation experiments show that the system can be reliable and high precision.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122695933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the lifetime of NAND flash-based SSD through compacted write","authors":"Haitao Wu, Tianming Yang, Ping Huang, Wen-Kuang Chou","doi":"10.1504/ijes.2020.10029449","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029449","url":null,"abstract":"In the traditional file system, the partial page write will result in internal fragmentation and write amplification of NAND flash-based SSDs due to the page-alignment of write. Although large page sizes are useful for increasing the flash capacity and throughput, they may decrease the performance and lifetime of flash storage systems for the frequent partial page writes. After analysing the various realistic workload traces, we observe that the partial page writes are common for those heads and tails of large write requests. This observation makes compacted write possible, which compresses two partial page writes from the same large write request into one page before data are written into flash. Therefore, we propose a compacted write for page-level FTL scheme, called CWFTL, to extend the lifetime of SSD. The experiment results show that CWFTL really reduces the times of data written to flash and the average read/write response time.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127234316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}