CINXE.COM

3rd International Conference on IOT, Cloud and Big Data (IOTCB 2024)

<!DOCTYPE html> <html> <head> <!--Import Google Icon Font--> <link href="https://fonts.googleapis.com/icon?family=Material+Icons" rel="stylesheet"> <link href="https://fonts.googleapis.com/css?family=Roboto+Condensed" rel="stylesheet"> <!--Import materialize.css--> <link type="text/css" rel="stylesheet" href="css/materialize.min.css" media="screen,projection" /> <link rel="stylesheet" href="https://use.fontawesome.com/releases/v5.0.13/css/all.css" integrity="sha384-DNOHZ68U8hZfKXOrtjWvjxusGo9WQnrNx2sqG0tfsghAvtVlRW3tvkXWZh58N9jp" crossorigin="anonymous"> <link type="text/css" rel="stylesheet" href="css/main.css" /> <meta charset="UTF-8"> <!--Let browser know website is optimized for mobile--> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <title>3rd International Conference on IOT, Cloud and Big Data (IOTCB 2024)</title> <link rel="icon" type="image/ico" href="img/logo.ico"> </head> <body> <!-- Header --> <header class="main-header"> <nav class="transparent"> <div class="container"> <div class="nav-wrapper"> <a href="#" class="brand-logo">IOTCB </a> <a href="#" data-activates="mobile-nav" class="button-collapse"> <i class="fa fa-bars"></i> </a> <ul class="right hide-on-med-and-down"> <li> <a href="index">HOME</a> </li> <li> <a href="papersubmission">PAPER SUBMISSION</a> </li> <li> <a href="committee">PROGRAM COMMITTEE</a> </li> <li> <a class="active-link" href="#">ACCEPTED PAPERS</a> </li> <li> <a href="contact">CONTACT US</a> </li> </ul> <ul class="side-nav grey darken-1 white-text" id="mobile-nav"> <h4 class="center">IOTCB 2024</h4> <li> <div class="divider"></div> </li> <li > <a href="index"> <i class="fa fa-home white-text"></i>Home </a> </li> <li> <a href="papersubmission"> <i class="fa fa-user white-text"></i>Paper Submission </a> </li> <li> <a href="committee"> <i class="fa fa-user white-text"></i>Program Committee </a> </li> <li> <a class="active-link" href="papers"> <i class="fa fa-newspaper white-text"></i>Accepted Papers </a> </li> <li> <a href="contact"> <i class="fa fa-phone white-text"></i>Contact Us </a> </li> <li> <div class="divider"></div> </li> <li> <a href="/submission/index.php" target="blank" class="btn grey waves-effect waves-light">Paper Submission</a> </li> </ul> </div> </div> </nav> <!-- Showcase --> <div class="showcase container"> <div class="row"> <div class="col s12 m10 offset-m1 center grey-text text-darken-3"> <h5>Welcome to IOTCB 2024</h5> <h2>3<sup>rd</sup> International Conference on IOT, Cloud and Big Data (IOTCB 2024)</h2> <p>July 13 ~ 14, 2024, Virtual Conference</p> <br> <br> </div> </div> </div> </header> <section class="section section-icons "> <div class="container"> <div class="row"> <div class="col s12 m12"> <div class="card-panel grey darken-2 z-depth-3 white-text center"> <i class="fa fa-paper-plane fa-3x"></i> <h5>Accepted Papers</h5> </div> </div> <div class="col s12 m12"> <div class="card-panel white z-depth-3 "> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Security Concerns in IOT Light Bulbs: Investigating Covert Channels</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Janvi Panwar Ravisha Rohilla</p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">The proliferation of Internet of Things (IoT) devices has raised significant concerns regarding their security vulnerabilities. This paper explores the security risks associated with smart light systems, focusing on covert communication channels. Drawing upon previous research highlighting vulnerabilities in communication protocols and encryption flaws, the study investigates the potential for exploiting smart light systems for covert data transmission. Specifically, the paper replicates and analyzes an attack method introduced by Ronen and Shamir, which utilizes the Philips Hue White lighting system to create a covert channel through visible light communication (VLC). Experimental results demonstrate the feasibility of transmitting data covertly through subtle variations in brightness levels, leveraging the inherent functionality of smart light bulbs. Despite limitations imposed by device constraints and communication protocols, the study underscores the need for heightened awareness and security measures in IoT environments. Ultimately, the findings emphasize the importance of implementing robust security practices and exercising caution when deploying networked IoT devices in sensitive environments.</p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Internet of Things: Domesticated Toolsets for Solving Major Challenges Faced by Individuals With Health Problems </b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Tunbosun Oyewale Oladoyinbo<sup>1</sup> and Isiaka Akinkunmi Adeyemo<sup>2</sup>, <sup>1</sup>University of Maryland Global Campus, Maryland, United States of America, <sup>2</sup>Ladoke Akintola University of Technology, Ogbomoso Oyo State, Nigeri </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">In this modern era of globalization, technology has increasingly infiltrated all aspects of human life. Health is no exception to this advance. Provision of health services has undergone evolution to reach the current status. However, many people, especially in developing countries, do not enjoy optimum health services due to several constraints. This is where technology continues to grow and be beneficial for all strata of society. From the direct provision of health services, technology can also help to prevent, optimize diagnosis, and treatment of diseases. One of the latest breakthroughs in health service provision is the integration of the Internet of Things (IoT). Utilization of IoT is expected to bring a radical change to the provision of health services. This is in line with the principle approach of preventive, predictive, and personalized that so far has not been applied optimally due to limitations and constraints of health resources. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Globalization, internet of things, health, quality of life, chronic conditions, companion devices, wearable devices. </p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Forecasting Network Capacity for Global Enterprise Backbone Networks using Machine Learning Techniques</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Kapil Patil and Bhavin Desai </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">This paper presents a machine learning approach to forecasting network capacity for global enterpriselevel backbone networks. By leveraging historical traffic data, we develop a predictive model that accurately forecasts future demands. The effectiveness of our approach is validated through rigorous testing against established benchmarks, demonstrating significant improvements in forecasting accuracy.</p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>KEYWORDS</b></h6> <p style="color:black;text-align:justify">Network capacity forecasting, Machine learning, Time series forecasting, ARIMA, Predictive modelling & Capacity Planning.</p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>The Toe Theory and Cloud Computing: Exploring Factors Affecting the Adoption of Cloud Computing </b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Tunbosun Oyewale Oladoyinbo<sup>1</sup>, Isiaka Akinkunmi Adeyemo<sup>2</sup> Oluseun Babatunde Oladoyinbo<sup>3</sup>, <sup>1</sup>University of Maryland Global Campus, Maryland, United States of America, <sup>2</sup>Ladoke Akintola University of Technology, Ogbomoso Oyo State, Nigeri, <sup>3</sup>Oyo state College of Agriculture Igboora Oyo State Nigeria</p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">This study investigates the elements anticipated to affect healthcare hospitals' decision to use cloud computing. A quantitative technique is applied in this work. To find out how prepared and able the IT departments of various hospitals were to embrace cloud computing, 200 questionnaires were utilised. The decision of organisations to view cloud computing as a wise investment was influenced by Technology, Organisational, and Environmental aspects (TOE), as determined by multiple regression testing of the data. The study's results revealed that every element significantly improved hospitals' intention to use cloud computing, with the technological element having the biggest influence on the choice.</p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>KEYWORDS</b></h6> <p style="color:black;text-align:justify">organizations, adapt, global market, efficiency, IT industry, cloud computing, investment, environment, technological advancements.</p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Empowering Healthcare: a Blockchain-based Secure and Decentralized Data Sharing Scheme With Searchable Encryption </b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Seyed mohammad and Sajad Meisam, Worcester Polytechnic Institute, United States of America</p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;"> Medical care is one of the most important parts of human lives, and now with the invention of the internet of things(IOT) and cloud computing streamlining the treatment process is becoming a main topic of research. The problem is the sensitivity of the medical data which raises concerns about data privacy in the system. storing vast amount of patients’ data in the cloud which is controlled by a single trusted third party is common nowadays but, this manner poses great privacy risks and security concerns because it makes it possible for the cloud to use the stored data for illegal purposes. In this paper we try to answer this question that ’how to resolve these problems using the blockchain technology?’. we propose a novel protocol that combines Blockchain technology and cryptographic primitives such as ring signature and searchable encryption in order to remove the need for a trusted third party and providing an efficient privacy preserving access control mechanism. Also when it comes to the applications of the blockchains in areas other than cryptocurrencies, combining this technology to other cryptographic primitives can lead to unique features. In this paper we used ring signatures in order to protect the patients’ privacy and also by using the blockchain technology we were able to eliminate the need for a trusted third party and provide security for a searchable encryption scheme.</p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>KEYWORDS</b></h6> <p style="color:black;text-align:justify">Blockcchain, IOT, privacy, cryptography, searchable encryption.</p> <br> </div> </div> </div> </div> </section> <!-- Section: Scope --> <!-- Section: Footer --> <footer class="page-footer grey lighten-1"> <div class="container"> <div class="row"> <div class="col s12 m6"> <h5 class="grey-text lighten-3"><font color="#FFF">Contact Us</font></h5> <a href="mailto:iotcb@iotcb2024.org" style="color:#000">iotcb@iotcb2024.org</a> </div> </div> </div> <div class="footer-copyright grey darken-2"> <div class="container center"> Copyright &copy; IOTCB 2024 </div> </div> </footer> <!--Import jQuery before materialize.js--> <script type="text/javascript" src="https://code.jquery.com/jquery-3.2.1.min.js"></script> <script type="text/javascript" src="js/materialize.min.js"></script> <script> $(document).ready(function () { // Custom JS & jQuery here $('.button-collapse').sideNav(); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10