A novel smart multilevel security approach for secure data outsourcing in crisis

被引:3
|
作者
Sarhan, Akram Y. [1 ]
机构
[1] Univ Jeddah, Coll Comp & Informat Technol, Dept Informat Technol, Jeddah, Mecca Province, Saudi Arabia
关键词
Future network; Multilevel security; cyber security; Data sharing; Network algorithm; Packet scheduling; Heuristics; Secure Data Sharing; ALGORITHMS;
D O I
10.7717/peerj-cs.1367
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Interconnected Network or the Internet has revolutionized digital communi-cations. It has expanded worldwide over the past four decades due to numerous features such as connectivity, transparency, hierarchy, and openness. Several drawbacks, including mobility, scalability, controllability, security, etc., have been presented due to continuous developments. Although several network paradigms exist to address such drawbacks, many issues still persist. This research proposed a future network paradigm that addresses multilevel security shortcomings. It suggested the following: (i) a two -router network-based cyber security architecture for multilevel data sharing; (ii) using a scheduler to deal with the multilevel transmitted packets scheduling problem; (iii) five algorithms for the studied difficult problem; and (iv) providing an experimental result to show the optimal results obtained by the developed algorithms and comparing it with algorithms in the literature. The experimental result shows that the random-grouped classification with shortest scheduling algorithm (RGS) performed the best at 37.7% with a gap of 0.03. This result proves the practicality of our approach in terms of two -machine scheduling problems.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Smart and Secure Sensor Data Sharing in Crisis Response and Management
    Genc, Zulkuf
    van Splunter, Sander
    Oey, Michel
    Brazier, Frances M. T.
    2013 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY - WORKSHOPS (WI-IAT), VOL 3, 2013, : 96 - 99
  • [2] An approach for secure data transmission in smart grids
    Pandey, Jagdish Chandra
    Kalra, Mala
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (3-4) : 348 - 365
  • [3] Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile data to Cloud
    Sujithra, M.
    Padmavathi, G.
    Narayanan, Sathya
    GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 : 480 - 485
  • [4] Novel Approach to Secure Data Transmission
    Lemos, Nikita
    Khanvilkar, Sushma
    Patil, Saurabh
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [5] NOVEL APPROACH OF PLAYFAIR CIPHER FOR MULTILEVEL INFORMATION SECURITY
    Patel, Sweti S.
    Gupta, Vinit
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 486 - 489
  • [6] Secure Outsourcing of Geospatial Vector Data
    Chaudhari, Sangita
    Venkatachalam, Parvatham
    Buddhiraju, Krishna Mohan
    2019 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2019), 2019, : 871 - 874
  • [7] Dividing secrets to secure data outsourcing
    Emekci, Fatih
    Methwally, Ahmed
    Agrawal, Divyakant
    El Abbadi, Amr
    INFORMATION SCIENCES, 2014, 263 : 198 - 210
  • [8] ESO: An Efficient and Secure Outsourcing Scheme for Smart Grid
    Li, Qi
    Li, Hongwei
    Yang, Yi
    Luo, Hongwei
    Choi, Bong Jun
    Zhou, Liang
    2013 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2013), 2013,
  • [9] A Secure Wireless Data Collection Approach for Smart Grid
    Mao, Yuxin
    Wei, Guiyi
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (12): : 3929 - 3939
  • [10] A Secure and LightWeight Approach for Critical Data Security in Cloud
    Gupta, Sanchika
    Sardana, Anjali
    Kumar, Padam
    Abraham, Ajith
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 315 - 320