Search results for "cloud server"

showing 3 items of 3 documents

Timing and Side Channel Attacks

2015

How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza a…

PentagonMemory cycleBusinessSide channel attackComputer securitycomputer.software_genreCloud servercomputer
researchProduct

Sensor Node Network for Remote Moisture Measurement in Timber Based on Bluetooth Low Energy and Web-Based Monitoring System

2021

This paper proposes an IoT system based on wireless BLE connectivity to monitor the moisture content of wood, using a compact and low-cost moisture device that relies on a resistance measurement method valid for an ultra-wide range of resistance values. This device is digitally controlled with a BLE-incorporated micro-controller characterized by its small size and low power consumption, providing long-life battery. The proposed system consists of two main parts: first, the BLE moisture device including the moisture content measurement and wireless capability (BLE)

Battery (electricity)IoTComputer scienceReal-time computingCloud computingwood moisture sensorcloud server02 engineering and technologylcsh:Chemical technologyBiochemistryArticleAnalytical ChemistryMoisture measurement0202 electrical engineering electronic engineering information engineeringWirelessWeb applicationlcsh:TP1-1185Electrical and Electronic EngineeringWood industryInstrumentationWater contentInternetMoisturebusiness.industry020206 networking & telecommunicationsXarxes locals sense fil Wi-Fiweb applicationmoisture estimationAtomic and Molecular Physics and OpticsVisualizationIoT networkSensor nodeBLE020201 artificial intelligence & image processingSoCbusiness
researchProduct

Traceable hierarchical attribute-based authentication for the cloud

2015

When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …

Structure (mathematical logic)HierarchyAuthenticationDatabasebusiness.industryComputer scienceAllowance (money)Cloud computingComputer securitycomputer.software_genreEncryptionbusinessCloud servercomputer2015 IEEE Conference on Communications and Network Security (CNS)
researchProduct