The advent of the Internet of Things (IoT) has ushered in the concept of smart cities – urban environments where everything from traffic lights to waste management is interconnected and digitally managed. While this transformation offers unparalleled efficiency and innovation, it opens the door to myriad cyber-attacks. Threats range from data breaches to infrastructure disruptions, with one subtle yet potent risk emerging: fake clients. These seemingly benign entities have the potential to carry out a multitude of cyber attacks, leveraging their deceptive appearance to infiltrate and compromise systems. This research presents a novel simulation model for a smart city based on the Internet of Things using the Netsim program. This city consists of several sectors, each of which consists of several clients that connect to produce the best performance, comfort and energy savings for this city. Fake clients are added to this simulation, who are they disguise themselves as benign clients while, in reality, they are exploiting this trust to carry out cyber attacks on these cities, then after preparing the simulation perfectly, the data flow of this system is captured and stored in a CSV file and classified into fake and normal, then this data set is subjected to several experiments using the Machine Learning using the MATLAB program. Each of them shows good results, based on the detection results shown by Model Machine Learning. The highest detection accuracy was in the third experiment using the k-nearest neighbors classifier and was 98.77\%. Concluding, the research unveils a robust prevention model.
Authored by Mahmoud Aljamal, Ala Mughaid, Rabee Alquran, Muder Almiani, Shadi bi
Patient’s data security is critical and cannot be undermined. The patient data must always be kept confidential. Any compromise of patient data not only results in loss of trust but can also lead to legal action. To understand data security measures and to prevent data theft, this study evaluates the cyber security position of electronic medical records using Systematic Literature Review (SLR). It primarily studies the various threats the EMRs are exposed to, more specifically in the cloud environment. It also discusses the possible ways to lower the possibility of EMR data breach. The value addition of this study is the proposition of a Risk Assessment Framework (RAF) to make the EMR software secure and safe from cyber-attacks. The cyclic RAF is proposed to manage and mitigate the risks involved in medical data storage and access.
Authored by Raghav Sandhane, Kanchan Patil, Arun Sharma
A growing number of attacks and the introduction of new security standards, e.g. ISO 21434, are increasingly shifting the focus of industry and research to the cybersecurity of vehicles. Being cyber-physical systems, compromised vehicles can pose a safety risk to occupants and the environment. Updates over the air and monitoring of the vehicle fleet over its entire lifespan are therefore established in current and future vehicles. Elementary components of such a strategy are security sensors in the form of firewalls and intrusion detection systems, for example, and an operations center where monitoring and response activities are coordinated. A critical step in defending against, detecting, and remediating attacks is providing knowledge about the vehicle and fleet context. Whether a vehicle is driving on the highway or parked at home, what software version is installed, or what security incidents have occurred affect the legitimacy of data and network traffic. However, current security measures lack an understanding of how to operate in an adjusted manner in different contexts. This work is therefore dedicated to a concept to make security measures for vehicles context-aware. We present our approach, which consists of an object-oriented model of relevant context information within the vehicle and a Knowledge Graph for the fleet. With this approach, various use cases can be addressed, according to the different requirements for the use of context knowledge in the vehicle and operations center.
Authored by Daniel Grimm, Eric Sax
The world has seen a quick transition from hard devices for local storage to massive virtual data centers, all possible because of cloud storage technology. Businesses have grown to be scalable, meeting consumer demands on every turn. Cloud computing has transforming the way we do business making IT more efficient and cost effective that leads to new types of cybercrimes. Securing the data in cloud is a challenging task. Cloud security is a mixture of art and science. Art is to create your own technique and technologies in such a way that the user should be authenticated. Science is because you have to come up with ways of securing your application. Data security refers to a broad set of policies, technologies and controls deployed to protect data application and the associated infrastructure of cloud computing. It ensures that the data has not been accessed by any unauthorized person. Cloud storage systems are considered to be a network of distributed data centers which typically uses cloud computing technologies like virtualization and offers some kind of interface for storing data. Virtualization is the process of grouping the physical storage from multiple network storage devices so that it looks like a single storage device.Storing the important data in the cloud has become an essential argument in the computer territory. The cloud enables the user to store the data efficiently and access the data securely. It avoids the basic expenditure on hardware, software and maintenance. Protecting the cloud data has become one of the burdensome tasks in today’s environment. Our proposed scheme "Certificateless Compressed Data Sharing in Cloud through Partial Decryption" (CCDSPD) makes use of Shared Secret Session (3S) key for encryption and double decryption process to secure the information in the cloud. CC does not use pairing concept to solve the key escrow problem. Our scheme provides an efficient secure way of sharing data to the cloud and reduces the time consumption nearly by 50 percent as compared to the existing mCL-PKE scheme in encryption and decryption process.Distributed Cloud Environment (DCE) has the ability to store the da-ta and share it with others. One of the main issues arises during this is, how safe the data in the cloud while storing and sharing. Therefore, the communication media should be safe from any intruders residing between the two entities. What if the key generator compromises with intruders and shares the keys used for both communication and data? Therefore, the proposed system makes use of the Station-to-Station (STS) protocol to make the channel safer. The concept of encrypting the secret key confuses the intruders. Duplicate File Detector (DFD) checks for any existence of the same file before uploading. The scheduler as-signs the work of generating keys to the key manager who has less task to complete or free of any task. By these techniques, the proposed system makes time-efficient, cost-efficient, and resource efficient compared to the existing system. The performance is analysed in terms of time, cost and resources. It is necessary to safeguard the communication channel between the entities before sharing the data. In this process of sharing, what if the key manager’s compromises with intruders and reveal the information of the user’s key that is used for encryption. The process of securing the key by using the user’s phrase is the key concept used in the proposed system "Secure Storing and Sharing of Data in Cloud Environment using User Phrase" (S3DCE). It does not rely on any key managers to generate the key instead the user himself generates the key. In order to provide double security, the encryption key is also encrypted by the public key derived from the user’s phrase. S3DCE guarantees privacy, confidentiality and integrity of the user data while storing and sharing. The proposed method S3DCE is more efficient in terms of time, cost and resource utilization compared to the existing algorithm DaSCE (Data Security for Cloud Environment with Semi Trusted Third Party) and DACESM (Data Security for Cloud Environment with Scheduled Key Managers).For a cloud to be secure, all of the participating entities must be secure. The security of the assets does not solely depend on an individual s security measures. The neighbouring entities may provide an opportunity to an attacker to bypass the user s defences. The data may compromise due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. Cloudsim allows to create a network that contains a set of Intelligent Sense Point (ISP) spread across an area. Each ISPs will have its own unique position and will be different from other ISPs. Cloud is a cost-efficient solution for the distribution of data but has the challenge of a data breach. The data can be compromised of attacks of ISPs. Therefore, in OSNQSC (Optimized Selection of Nodes for Enhanced in Cloud Environment), an optimized method is proposed to find the best ISPs to place the data fragments that considers the channel quality, distance and the remaining energy of the ISPs. The fragments are encrypted before storing. OSNQSC is more efficient in terms of total upload time, total download time, throughput, storage and memory consumption of the node with the existing Betweenness centrality, Eccentricity and Closeness centrality methods of DROPS (Division and Replication of Data in the Cloud for Optimal Performance and Security).
Authored by Jeevitha K, Thriveni J
Blockchain security issues in relation to encryption for data privacy and integrity in cloud computing have become challenging due to the decentralized and peer-to-peer systems for securing data storage and transfer in smart contracts. Further, Blockchain technology continues revolutionizing how we handle data, from improving transparency to enhancing security. However, various instances of data breaches, piracy, and hacking attacks have compromised the safety measures employed by these providers. The paper aims to explore Blockchain technology and how encryption algorithms are used to leverage security properties to uphold data privacy and integrity in a cloud environment to enhance security. The novelty contribution of the paper is threefold. First, we explore existing blockchain attacks, vulnerabilities, and their impact on the cloud computing environment supported by numerous cloud services that enable clients to store and share data online. Secondly, we used an encryption approach to detect data security by combining AES encryption, cloud storage, and Ethereum smart contracts in cloud AWS S3. Finally, we recommend control mechanisms to improve blockchain security in the cloud environment. The paper results show that AES algorithms can be used in blockchain smart contracts to enhance security, privacy, and integrity to ensure secure data in transit and at rest.
Authored by Abel Yeboah-Ofori, Sayed Sadat, Iman Darvishi
Recent advancements in technology have transformed conventional mechanical vehicles into sophisticated computer systems on wheels. This transition has elevated their intelligence and facilitated seamless connectivity. However, such development has also escalated the possibility of compromising the vehicle’s cyber security expanding the overall cyber threat landscape. This necessitates an increased demand for security measures that manifest flexibility and adaptability instead of static threshold-based measures. Context-awareness techniques can provide a promising direction for such security solutions. Integration of context-awareness in security analysis helps in analysing the behaviour of the environment where IoT devices are deployed, enabling adaptive decision-making that aligns with the current situation. While the incorporation of context-awareness into adaptive systems has been explored extensively, its application to support the cyber security of vehicular ecosystem is relatively new. In this paper, we proposed a context-aware conceptual framework for automotive vehicle security that allows us to analyse real-time situations thereby identifying security threats. The usability of the framework is demonstrated considering an Electric Vehicle(EV) Charging case study.
Authored by Teena Kumari, Abdur Rakib, Arkady Zaslavsky, Hesamaldin Jadidbonab, Valeh Moghaddam
Cloud computing is a nascent paradigm in the field of data technology and computer science which is predicated on the use of the Internet, often known as the World Wide Web. One of the prominent concerns within this field is the security aspects of cloud computing. Contrarily, ensuring the preservation of access to the protection of sensitive and confidential information inside financial organizations, banks and other pertinent enterprises holds significant significance. This holds significant relevance. The efficacy of the security measures in providing assurance is not infallible and can be compromised by malevolent entities. In the current study, our objective is to examine the study about the security measures through the use of a novel methodology. The primary objective of this research is to investigate the subject of data access in the realm of cloud computing, with a particular emphasis on its ramifications for corporations and other pertinent organizations. The implementation of locationbased encryption facilitates the determination of accurate geographical coordinates. In experiment apply Integrated Location Based Security using Multi objective Optimization (ILBS-MOO) on different workflows and improve performance metrics significantly. Time delay averagely approximates improvement 6-7\%, storage 10-12\% and security 8-10\%.
Authored by Deepika, Rajneesh Kumar, Dalip
Wireless Sensor Networks (WSNs) play a pivotal role in critical applications, ranging from industrial control systems to healthcare monitoring. As these networks become increasingly integrated into our daily lives, understanding their energy consumption behavior is paramount for achieving sustainability and resilience. This paper delves into the intricate relationship between energy consumption patterns in WSNs and their security implications within critical contexts. We commence by conducting a comprehensive analysis of energy consumption behavior in WSNs, considering factors such as data transmission, node mobility, and sensing activities. Through empirical studies and simulations, we identify key parameters influencing energy utilization and establish a foundation for further investigation. Building upon this understanding, we explore the security impacts associated with the energy profile of WSNs operating in critical environments. We address potential vulnerabilities arising from compromised nodes due to energy depletion, communication constraints, and malicious attacks. By examining these security challenges, we highlight the urgency of developing robust solutions to ensure the reliability and integrity of WSNs in critical applications. In response to these challenges, we propose mitigation strategies that synergistically address both energy consumption and security concerns. Our approach based on security information and event management with deep learning security use case algorithms for impact mitigation. These strategies aim to enhance the overall sustainability and security of WSNs, ensuring their continued functionality in demanding and sensitive environments. In conclusion, this paper provides a comprehensive overview of the intricate interplay between energy consumption behavior and security impacts in WSNs within critical contexts. Our findings underscore the need for holistic approaches that integrate energy-awareness and security measures to fortify the resilience of WSNs, fostering their sustainable deployment in critical applications.
Authored by Ayoub Toubi, Abdelmajid Hajami
Cloud computing allows us to access available systems and pay for what we require whenever needed. When there is access to the internet, it uses some techniques like Service-Oriented Architecture (SOA), virtualization, distributed computing, etc. Cloud computing has transformed the way people utilize and handle computer services. It enables sharing, pooling, and accessing resources on the Internet. It offers tremendous advantages that enhance the cost-effectiveness and efficiency of organizations, which is marked by security challenges or threats that can compromise data, service safety and privacy. This paper gives an overview of cloud computing and explores the threats and vulnerabilities related to cloud computing with its countermeasures. It also explores the recent advancement in cloud computing threats and countermeasures. Further, this paper highlights the case studies on recent attacks and vulnerabilities which are compromised. Finally, this paper concludes that cloud computing is efficiently used to mitigate the threats and vulnerabilities with its countermeasures.
Authored by Ashish Gupta, Shreya Sinha, Harsh Singh, Bharat Bhushan
In the rapidly evolving technological landscape, securing cloud computing environments while optimizing resource allocation is of paramount importance. This research study introduces a novel approach that seamlessly integrates deep learning with a nature-inspired optimization algorithm for achieving joint security and resource allocation. The proposed methodology harnesses the power of ResNet, a proven deep learning architecture, to bolster cloud security by identifying and mitigating threats effectively. Complementing this, the Flower Pollination Algorithm (FPA), inspired by natural pollination processes, is employed to strike an optimal balance between resource utilization and cost efficiency. This amalgamation creates a robust framework for managing cloud resources, ensuring the confidentiality, integrity, and availability of data and services, all while maintaining efficient resource allocation. The approach is flexible, adaptive, and capable of addressing the dynamic nature of cloud environments, making it a valuable asset for organizations seeking to enhance their cloud security posture without compromising on resource efficiency.
Authored by Mudavath Naik, C. Sivakumar
The Internet of Things, or IoT, is a paradigm in which devices interact with the physical world through sensors and actuators, while still communicating with other computers over various types of networks. IoT devices can be found in many environments, often in the hands of non-technical users. This presents unique security concerns, since compromised devices can be used not only for typical objectives like network footholds, but also to cause harm in the real world (for instance, by unlocking the door to a house or changing safety configurations in an industrial control system). This work in progress paper presents a series of laboratory exercises under development at a large Midwestern university that introduces undergraduate cyber security engineering students to the Internet of Things and its (in)security considerations. The labs will be part of a 400-level technical elective course offered to cyber security engineering majors. The design of the labs has been grounded in the experiential learning process. The concepts in each lab module are couched in hands-on activities and integrate real world problems into the laboratory environment. The laboratory exercises are conducted using an Internet testbed and a combination of actual IoT devices and virtualized devices to showcase various IoT environments, vulnerabilities, and attacks.
Authored by Megan Ryan, Julie Rursch